CN111310175A - iOS application safety monitoring and protecting method and device based on plug-in - Google Patents

iOS application safety monitoring and protecting method and device based on plug-in Download PDF

Info

Publication number
CN111310175A
CN111310175A CN201911388234.7A CN201911388234A CN111310175A CN 111310175 A CN111310175 A CN 111310175A CN 201911388234 A CN201911388234 A CN 201911388234A CN 111310175 A CN111310175 A CN 111310175A
Authority
CN
China
Prior art keywords
plug
framework
monitoring
application program
ios
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911388234.7A
Other languages
Chinese (zh)
Inventor
杨焱
刘永辉
张鹤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Suninfo Technology Co ltd
Original Assignee
Shanghai Suninfo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Suninfo Technology Co ltd filed Critical Shanghai Suninfo Technology Co ltd
Priority to CN201911388234.7A priority Critical patent/CN111310175A/en
Publication of CN111310175A publication Critical patent/CN111310175A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Abstract

The embodiment of the disclosure provides a plug-in-based iOS application security monitoring and protecting method, a plug-in-based iOS application security monitoring and protecting device and electronic equipment, belonging to the field of mobile internet security, wherein the method comprises the following steps: in an application program of the system, an iOS plug-in mode is used for constructing a framework; when an application program runs, importing the framework, and setting configuration options needing to be managed and controlled in the framework; and based on the configuration options, carrying out safety monitoring and protection on the application program. The invention adopts a plug-in mode, is convenient and quick to integrate, can be configured globally, can also carry out special limit control on certain functions in a targeted manner, has high configuration freedom degree, and simultaneously improves the protection effect of private information.

Description

iOS application safety monitoring and protecting method and device based on plug-in
Technical Field
The disclosure relates to the field of mobile internet security, and in particular to a plug-in-based iOS application security monitoring and protecting method and device and an electronic device.
Background
In the iOS mobile platform, most mobile office projects are developed based on an MDM management mode supported by an iOS enterprise developer, and the mobile office projects are endowed with very rich authority, so that the safety control of various aspects of application can be realized. However, the limitations of the MDM model are also evident, i.e. the MDM cannot be put on the apple app store, which makes distribution of office software difficult. The integrated MDM management system has high difficulty, high cost and lower personalized customization degree, and does not conform to the trend of the domestic mobile office safety field at present. Conventional software developers are eagerly in need of an alternative.
In addition, there are many risks in practical applications of mobile office, which are mainly reflected in the following aspects:
risk one: mobile applications are less secure. The problems of APP interception, device information stealing, background stealing, malicious program entrainment and the like are rare. The security environment of the mobile application is too fragile, and information leakage is very easy to occur in the mobile office process of an enterprise.
Risk two: loss of the mobile device causes data compromise. Portability is the main reason why mobile office work has become popular, but it is because of portability that also puts the mobile device at the risk of being "easily lost". Devices containing sensitive information, which relate to mobile office, may reveal company privacy if lost, and fail to be a disincentive for hackers to attack the enterprise if lost.
Disclosure of Invention
In view of the above, embodiments of the present disclosure provide a plug-in based iOS application security monitoring and protecting method, apparatus and electronic device to at least partially solve the problems in the prior art.
In a first aspect, an embodiment of the present disclosure provides an iOS application security monitoring and protecting method based on plug-in, including:
in an application program of the system, an iOS plug-in mode is used for constructing a framework;
when an application program runs, importing the framework, and setting configuration options needing to be managed and controlled in the framework;
and based on the configuration options, carrying out safety monitoring and protection on the application program.
According to a specific implementation manner of the embodiment of the present disclosure, after the framework is imported and the configuration options that need to be managed and controlled are set in the framework when the application runs, the method includes:
acquiring a mapping relation between method names and method implementation stored in a method list;
replacing the mapping relation between the Method name and the Method implementation by adopting a Method switzling mode;
and carrying out safety monitoring and protection on the application program by using the replaced mapping relation.
According to a specific implementation manner of the embodiment of the present disclosure, after obtaining the mapping relationship between the method name and the method implementation stored in the method list, the method further includes:
defining a one-to-many dependency using an observer;
and monitoring the object needing monitoring control in the system by utilizing the observer object, and informing the observer object when the state of the subject object under monitoring control is changed so as to automatically update the use change of the equipment.
According to a specific implementation manner of the embodiment of the present disclosure, the method further includes:
and monitoring and counting screen capturing actions through HOOK of a screen capturing function of the mobile phone, and realizing user reminding through screen capturing operation.
According to a specific implementation manner of the embodiment of the present disclosure, the method further includes:
after the user captures the screen, reporting the detailed information of the screen capture interface to a safety monitoring system;
or the user may be prompted to delete the screenshot by calling a delete interface of the system.
According to a specific implementation manner of the embodiment of the present disclosure, the method further includes:
by monitoring and intercepting the copy and paste operation function and using Method switzling to perform HOOK, the data of the paste board is ensured to be null when the data is copied and pasted to other applications outside the integrated application.
According to a specific implementation manner of the embodiment of the present disclosure, the method further includes:
by preventing the debugger from attaching and detecting whether the debugger exists, debugging and cracking after application deployment are prevented.
In a second aspect, an embodiment of the present disclosure provides an iOS application security monitoring and protecting apparatus based on plug-in, including:
the using module is used for constructing a framework in an iOS plug-in mode in an application program of the system;
the import module is used for importing the framework when an application program runs and setting configuration options needing to be managed and controlled in the framework;
and the execution module is used for carrying out safety monitoring and protection on the application program based on the configuration options.
In a third aspect, an embodiment of the present disclosure further provides an electronic device, where the electronic device includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the plug-in based iOS application security monitoring and protection method of the first aspect or any implementation of the first aspect.
In a fourth aspect, the disclosed embodiments also provide a non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute the plug-in based iOS application security monitoring and protection method in the foregoing first aspect or any implementation manner of the first aspect.
In a fifth aspect, the disclosed embodiments also provide a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions that, when executed by a computer, cause the computer to perform the plug-in based iOS application security monitoring and protection method in the foregoing first aspect or any implementation manner of the first aspect.
The iOS application safety monitoring and protection scheme based on the plug-in the embodiment of the disclosure comprises that in an application program of a system, an iOS plug-in mode is used for constructing a framework; when an application program runs, importing the framework, and setting configuration options needing to be managed and controlled in the framework; and based on the configuration options, carrying out safety monitoring and protection on the application program. The invention adopts a plug-in mode, is convenient and quick to integrate, can be configured globally, can also carry out special limit control on certain functions in a targeted manner, has high configuration freedom degree, and simultaneously improves the protection effect of private information.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings needed to be used in the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present disclosure, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a method for monitoring and protecting iOS application security based on plug-in according to an embodiment of the present disclosure;
fig. 2 is a flowchart of another plug-in based iOS application security monitoring and protection method provided in an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an iOS application security monitoring and protecting device based on plug-in according to an embodiment of the present disclosure;
fig. 4 is a schematic view of an electronic device provided in an embodiment of the present disclosure.
Detailed Description
The embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
The embodiments of the present disclosure are described below with specific examples, and other advantages and effects of the present disclosure will be readily apparent to those skilled in the art from the disclosure in the specification. It is to be understood that the described embodiments are merely illustrative of some, and not restrictive, of the embodiments of the disclosure. The disclosure may be embodied or carried out in various other specific embodiments, and various modifications and changes may be made in the details within the description without departing from the spirit of the disclosure. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
It is noted that various aspects of the embodiments are described below within the scope of the appended claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the disclosure, one skilled in the art should appreciate that one aspect described herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. Additionally, such an apparatus may be implemented and/or such a method may be practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present disclosure, and the drawings only show the components related to the present disclosure rather than the number, shape and size of the components in actual implementation, and the type, amount and ratio of the components in actual implementation may be changed arbitrarily, and the layout of the components may be more complicated.
In addition, in the following description, specific details are provided to facilitate a thorough understanding of the examples. However, it will be understood by those skilled in the art that the aspects may be practiced without these specific details.
The embodiment of the disclosure provides an iOS application safety monitoring and protection method based on plug-in. The iOS application security monitoring and protection method based on plug-in provided by the embodiment may be executed by a computing device, which may be implemented as software or implemented as a combination of software and hardware, and may be integrally provided in a server, a client, and the like.
Referring to fig. 1, in an embodiment of the present disclosure, an iOS application security monitoring and protecting method based on plug-in includes:
s101, in an application program of a system, constructing a framework in an iOS plug-in mode;
s102, when an application program runs, importing the framework, and setting configuration options needing to be managed and controlled in the framework;
s103, based on the configuration options, carrying out safety monitoring and protection on the application program.
In the process of implementing steps S101 to S103, a frame plug-in technology in the Cocoa Touch framework is used, which is actually a dynamic library, and the frame framework is constructed by using an iOS-based plug-in technology and integrated into an application to achieve the functions required by the invention. The frame is a resource packaging mode used in a Cocoa/Cocoa Touch program, and can centralize code files, header files, resource files, description files and the like.
Unlike the system frame, the used Cocoa Touch frame in the app is put into the app bundle and runs in the sandbox instead of the system when the app is packaged and submitted. That is, different apps use the same frame, but have multiple copies of the frame signed, packaged, and loaded separately. The dynamic linking is performed using the Procedure Linkage Table (PLT). Firstly, the PLT lists the call of each function in the program, when the program starts to run, if the dynamic library is loaded into the memory, the PLT can search for the dynamic address and record the dynamic address, and if the function is called, the next call can be directly jumped through the PLT. In the actual use process, the user only needs to import the framework, select the functions to be controlled, and simply integrate the sentences to complete the safety management and control of the terminal, so that the use of developers is facilitated.
In addition, since the present invention relates to a plurality of functional points, the principle of implementation is different, and mainly uses the Method Swizzling and observer notification technologies.
Method switzling: each OC instance object is stored with an isa pointer and an instance variable, wherein the isa pointer belongs to a class which maintains a method list (MethodLists) capable of being received in operation; the Method lists (methodLists) hold the mapping of the selector's Method name and Method implementation (IMP, the pointer to the Method implementation). At runtime, the matching IMP is found by selector, and the specific implementation function is found accordingly.
During development, the dynamic characteristic of Objective-C can be utilized, and the method (IMP) corresponding to the selector is replaced during running, so that the purpose of replacing the original system function with the function set in the invention is achieved. FIG. 2 is a schematic diagram showing the method of replacing the IMP corresponding to the selector with MethodSwizzling.
Observer mode: the mode defines a one-to-many dependency relationship, and the invention utilizes the observer object to monitor the object which needs to be monitored and controlled in the system. This subject object, when changed in state, notifies the observer objects so that they can automatically update the device's usage changes. In short, the observer who is registered as B is interested in the change of B, and the observer notifies A when B changes, informs B that the change occurs, and reacts accordingly.
The functions and effects finally realized are as follows:
1) anti-screen capture/screen recording. Due to the safety limitation of the iOS system, the code layer cannot intercept screen capturing/screen recording operation of a user, and screen capturing/screen recording prevention cannot be realized functionally. At present, through the HOOK of the screen capturing function of the mobile phone, the screen capturing action is monitored and counted, and the screen capturing operation realizes the user reminding: the screen capture operation has been recorded. The treatment is combined through two ways, namely: after the user captures the screen, the detailed information of the screen capture interface is reported to a safety monitoring system, and secondly: and reminding the user to delete the screenshot picture by calling a deletion interface of the system.
2) And (4) copy prevention. By monitoring and intercepting the copy and paste operation function and using Method switzling to perform HOOK, the data of the paste board is ensured to be null when the data is copied and pasted to other applications outside the integrated application.
3) And (5) debugging prevention. By preventing the debugger from attaching and detecting whether the debugger exists, debugging and cracking after application deployment are prevented.
The invention mainly adopts a plug-in mode, is convenient and quick to integrate, can be configured globally, can also carry out special limit control on certain functions in a targeted manner, and has high configuration freedom. After the application of the invention is integrated, the confidential and sensitive information of the company is limited in the application, cannot be spread and cannot influence the normal use. The application is difficult to crack, reverse disassembling can not be carried out, and the protection effect of the privacy information of the company is remarkable.
According to a specific implementation manner of the embodiment of the present disclosure, after the framework is imported and the configuration options that need to be managed and controlled are set in the framework when the application runs, the method includes:
acquiring a mapping relation between method names and method implementation stored in a method list;
replacing the mapping relation between the Method name and the Method implementation by adopting a Method switzling mode;
and carrying out safety monitoring and protection on the application program by using the replaced mapping relation.
According to a specific implementation manner of the embodiment of the present disclosure, after obtaining the mapping relationship between the method name and the method implementation stored in the method list, the method further includes:
defining a one-to-many dependency using an observer;
and monitoring the object needing monitoring control in the system by utilizing the observer object, and informing the observer object when the state of the subject object under monitoring control is changed so as to automatically update the use change of the equipment.
According to a specific implementation manner of the embodiment of the present disclosure, the method further includes:
and monitoring and counting screen capturing actions through HOOK of a screen capturing function of the mobile phone, and realizing user reminding through screen capturing operation.
According to a specific implementation manner of the embodiment of the present disclosure, the method further includes:
after the user captures the screen, reporting the detailed information of the screen capture interface to a safety monitoring system;
or the user may be prompted to delete the screenshot by calling a delete interface of the system.
According to a specific implementation manner of the embodiment of the present disclosure, the method further includes:
by monitoring and intercepting the copy and paste operation function and using Method switzling to perform HOOK, the data of the paste board is ensured to be null when the data is copied and pasted to other applications outside the integrated application.
According to a specific implementation manner of the embodiment of the present disclosure, the method further includes:
by preventing the debugger from attaching and detecting whether the debugger exists, debugging and cracking after application deployment are prevented.
Corresponding to the above method embodiment, referring to fig. 3, the embodiment of the present disclosure further provides a plug-in based iOS application security monitoring and protecting apparatus 30, including:
a using module 301, configured to use an iOS plug-in mode to construct a framework in an application program of the system;
an importing module 302, configured to import the framework when an application runs, and set configuration options that need to be managed and controlled in the framework;
and the execution module 303 is configured to perform security monitoring and protection on the application program based on the configuration option.
For parts not described in detail in this embodiment, reference is made to the contents described in the above method embodiments, which are not described again here.
Referring to fig. 4, an embodiment of the present disclosure also provides an electronic device 60, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the plug-in based iOS application security monitoring and protection method of the foregoing method embodiments.
The disclosed embodiments also provide a non-transitory computer-readable storage medium storing computer instructions for causing the computer to execute the plug-in based iOS application security monitoring and protection method in the foregoing method embodiments.
The disclosed embodiments also provide a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, cause the computer to perform the plug-in based iOS application security monitoring and protection method in the aforementioned method embodiments.
Referring now to FIG. 4, a block diagram of an electronic device 60 suitable for use in implementing embodiments of the present disclosure is shown. The electronic devices in the embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., car navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 4 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 4, the electronic device 60 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 601 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 60 are also stored. The processing device 601, the ROM602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, image sensor, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the electronic device 60 to communicate with other devices wirelessly or by wire to exchange data. While the figures illustrate an electronic device 60 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring at least two internet protocol addresses; sending a node evaluation request comprising the at least two internet protocol addresses to node evaluation equipment, wherein the node evaluation equipment selects the internet protocol addresses from the at least two internet protocol addresses and returns the internet protocol addresses; receiving an internet protocol address returned by the node evaluation equipment; wherein the obtained internet protocol address indicates an edge node in the content distribution network.
Alternatively, the computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: receiving a node evaluation request comprising at least two internet protocol addresses; selecting an internet protocol address from the at least two internet protocol addresses; returning the selected internet protocol address; wherein the received internet protocol address indicates an edge node in the content distribution network.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of a unit does not in some cases constitute a limitation of the unit itself, for example, the first retrieving unit may also be described as a "unit for retrieving at least two internet protocol addresses".
It should be understood that portions of the present disclosure may be implemented in hardware, software, firmware, or a combination thereof.
The above description is only for the specific embodiments of the present disclosure, but the scope of the present disclosure is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present disclosure should be covered within the scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (10)

1. An iOS application security monitoring and protection method based on plug-in is characterized by comprising the following steps:
in an application program of the system, an iOS plug-in mode is used for constructing a framework;
when an application program runs, importing the framework, and setting configuration options needing to be managed and controlled in the framework;
and based on the configuration options, carrying out safety monitoring and protection on the application program.
2. The method according to claim 1, wherein after importing the framework and setting configuration options that need to be managed and controlled in the framework when an application program runs, the method comprises:
acquiring a mapping relation between method names and method implementation stored in a method list;
replacing the mapping relation between the Method name and the Method implementation by adopting a Method switzling mode;
and carrying out safety monitoring and protection on the application program by using the replaced mapping relation.
3. The method according to claim 2, wherein after obtaining the mapping relationship between the method name and the method implementation stored in the method list, the method further comprises:
defining a one-to-many dependency using an observer;
and monitoring the object needing monitoring control in the system by utilizing the observer object, and informing the observer object when the state of the subject object under monitoring control is changed so as to automatically update the use change of the equipment.
4. The method of claim 3, further comprising:
and monitoring and counting screen capturing actions through HOOK of a screen capturing function of the mobile phone, and realizing user reminding through screen capturing operation.
5. The method of claim 4, further comprising:
after the user captures the screen, reporting the detailed information of the screen capture interface to a safety monitoring system;
or the user may be prompted to delete the screenshot by calling a delete interface of the system.
6. The method of claim 1, further comprising:
by monitoring and intercepting the copy and paste operation function and using Method switzling to perform HOOK, the data of the paste board is ensured to be null when the data is copied and pasted to other applications outside the integrated application.
7. The method of claim 1, further comprising:
by preventing the debugger from attaching and detecting whether the debugger exists, debugging and cracking after application deployment are prevented.
8. An iOS application security monitoring and protection device based on plug-in, comprising:
the using module is used for constructing a framework in an iOS plug-in mode in an application program of the system;
the import module is used for importing the framework when an application program runs and setting configuration options needing to be managed and controlled in the framework;
and the execution module is used for carrying out safety monitoring and protection on the application program based on the configuration options.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the plug-in based iOS application security monitoring and protection method of any of the preceding claims 1-7.
10. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the plug-in based iOS application security monitoring and protection method of any of the preceding claims 1-7.
CN201911388234.7A 2019-12-30 2019-12-30 iOS application safety monitoring and protecting method and device based on plug-in Pending CN111310175A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911388234.7A CN111310175A (en) 2019-12-30 2019-12-30 iOS application safety monitoring and protecting method and device based on plug-in

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911388234.7A CN111310175A (en) 2019-12-30 2019-12-30 iOS application safety monitoring and protecting method and device based on plug-in

Publications (1)

Publication Number Publication Date
CN111310175A true CN111310175A (en) 2020-06-19

Family

ID=71154496

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911388234.7A Pending CN111310175A (en) 2019-12-30 2019-12-30 iOS application safety monitoring and protecting method and device based on plug-in

Country Status (1)

Country Link
CN (1) CN111310175A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112528320A (en) * 2020-12-03 2021-03-19 北京指掌易科技有限公司 IOS-based screen recording prevention method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104054301A (en) * 2011-11-11 2014-09-17 卡尔加里科学公司 Session transfer and suspension in remote access application framework
CN104361294A (en) * 2014-10-28 2015-02-18 深圳市大成天下信息技术有限公司 Document protection method, device and system
CN106294159A (en) * 2016-08-12 2017-01-04 腾讯科技(深圳)有限公司 A kind of method controlling screenshotss and screenshotss control device
CN106844182A (en) * 2017-02-07 2017-06-13 网易(杭州)网络有限公司 Method, system and mobile terminal for recording user behavior
CN108595989A (en) * 2018-03-15 2018-09-28 杭州电子科技大学 Mobile APP security protection systems and method under a kind of iOS

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104054301A (en) * 2011-11-11 2014-09-17 卡尔加里科学公司 Session transfer and suspension in remote access application framework
CN104361294A (en) * 2014-10-28 2015-02-18 深圳市大成天下信息技术有限公司 Document protection method, device and system
CN106294159A (en) * 2016-08-12 2017-01-04 腾讯科技(深圳)有限公司 A kind of method controlling screenshotss and screenshotss control device
CN106844182A (en) * 2017-02-07 2017-06-13 网易(杭州)网络有限公司 Method, system and mobile terminal for recording user behavior
CN108595989A (en) * 2018-03-15 2018-09-28 杭州电子科技大学 Mobile APP security protection systems and method under a kind of iOS

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112528320A (en) * 2020-12-03 2021-03-19 北京指掌易科技有限公司 IOS-based screen recording prevention method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US10176327B2 (en) Method and device for preventing application in an operating system from being uninstalled
CN110865852B (en) Webpage component loading method and device, electronic equipment and storage medium
CN111079125A (en) Method and device for calling third-party library dynamic lifting authority by application program
CN110704833A (en) Data permission configuration method, device, electronic device and storage medium
WO2022193913A1 (en) Hotfix method, apparatus, device, and storage medium
CN113407165B (en) SDK generation and self-upgrade method, device, readable medium and equipment
CN112416303B (en) Software development kit hot repair method and device and electronic equipment
CN111273967A (en) Remote hook setting method and device suitable for Android system and electronic equipment
CN110674050B (en) Memory out-of-range detection method and device, electronic equipment and computer storage medium
CN111310175A (en) iOS application safety monitoring and protecting method and device based on plug-in
CN109947659B (en) System, method and apparatus for testing applications
CN111177260A (en) Database remote copying method and device and electronic equipment
CN113448585B (en) Compiling method and device of thread pool, electronic equipment and storage medium
CN111274551B (en) Compiler-based java code protection method and device and electronic equipment
CN113391860B (en) Service request processing method and device, electronic equipment and computer storage medium
CN111625326B (en) Task pipeline execution method and device and electronic equipment
CN110764995B (en) Method, device, medium and electronic equipment for detecting file access abnormality
CN111291379B (en) Android-based vehicle-mounted system application detection method and device and electronic equipment
CN111538717B (en) Data processing method, device, electronic equipment and computer readable medium
CN111382381B (en) User data sharing method and device, mobile terminal and storage medium
CN111367590A (en) Interrupt event processing method and device
CN111125759A (en) Database login account shielding method and device and electronic equipment
CN111324347A (en) Component construction method, device and system, page generation method, equipment and medium
CN110908711A (en) Control development method and device of application program and electronic equipment
CN113448550B (en) Method and device for realizing collection management of classes, electronic equipment and computer medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination