CN112241524A - iOS device account password importing method and system - Google Patents
iOS device account password importing method and system Download PDFInfo
- Publication number
- CN112241524A CN112241524A CN201910641023.3A CN201910641023A CN112241524A CN 112241524 A CN112241524 A CN 112241524A CN 201910641023 A CN201910641023 A CN 201910641023A CN 112241524 A CN112241524 A CN 112241524A
- Authority
- CN
- China
- Prior art keywords
- key
- password
- decrypting
- account password
- account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 230000008676 import Effects 0.000 claims abstract description 13
- 230000004048 modification Effects 0.000 claims description 4
- 238000012986 modification Methods 0.000 claims description 4
- 238000004891 communication Methods 0.000 claims description 3
- 239000000284 extract Substances 0.000 claims description 2
- 230000008569 process Effects 0.000 description 7
- VYZAMTAEIAYCRO-UHFFFAOYSA-N Chromium Chemical compound [Cr] VYZAMTAEIAYCRO-UHFFFAOYSA-N 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 150000003839 salts Chemical class 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 241001522296 Erithacus rubecula Species 0.000 description 1
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention belongs to the technical field of iOS equipment information import, and particularly relates to an iOS equipment account password import method and system. The method comprises the steps of decrypting a keyhain.plist file for storing an account password; extracting a key corresponding to the ClassID of the key collection package, encoding and encrypting the password data containing the account number which is pre-imported through the key and a corresponding algorithm to form a new node item, and adding the new node item into a decrypted key in. The method has the advantages that the key chain.plist file added with the new node item is backed up and restored to the iOS device, the account password can be safely added to the device needing to be imported in batches, manual addition of people is not needed, and therefore a series of troubles caused by manual addition of the account password are avoided.
Description
Technical Field
The invention belongs to the technical field of iOS equipment information import, and particularly relates to an iOS equipment account password import method and system.
Background
Each user has a plurality of websites, App, WiFi and bank card account passwords, and can only memorize the commonly used account passwords or memorize the account passwords better than a stout point and memorize the passwords on paper in many cases, but inconvenience is brought in the use process.
With the upgrading of the iOS system, a password automatic filling function is added, a WiFi password is automatically memorized, and the account password filling of a bank card is also automatically carried out. The password automatic filling function can be used for automatically filling the corresponding account passwords in the browser and the App, so that great convenience is provided for a user to log in the App and the browser; the WiFi password is automatically memorized, and the password can be logged in next time without inputting; the account password filling principle of the bank card is similar to the password automatic filling function; however, the convenience brought by these functions is also a problem, and a common account password needs to be added in advance.
At present, a Password management tool is provided on a PC device, such as 1Password, Chrome browser Password management, DashLane, LastPass, and the like. These conventional software can export the account number and password of the user in batch. However, due to the sealing of the iOS system, no interface capable of importing the exported account passwords into the password automatic filling function in batch is available, and the account passwords can only be added manually one by one; for users with a large number of account passwords, manual addition is not only tedious and inefficient, but also often encounters special characters, and repeated input and checking are required, even some unnecessary troubles are brought, for example, account blocking, password resetting and the like.
Although the prior art can realize batch import of account passwords by using vulnerabilities of the iOS system, the prior art has the following defects:
1. the method has the advantages that the jail crossing is needed, the jail crossing difficulty is high, the jail crossing tool has requirements on iPhone and iPad equipment models and iOS system versions, and the limitation is high;
2. with the upgrading of the iOS system, under the condition that the bug is repaired, the method is invalid at the same time, and the method cannot be compatible with a new system;
3. once the device is out of prison, the iOS system is insecure and the user would not be willing to risk for password bulk import.
In summary, the method for importing the account number and the password of the iOS device, which is provided by the invention, can realize batch import of the account number and the password of the iOS device without going through the prison, is compatible with the latest iOS system, and supports the original setting of the device.
Disclosure of Invention
The technical problem to be solved by the invention is how to import account passwords into the iOS device in batches without prison, and the device is compatible with the latest iOS system and supports the original setting of the device.
Therefore, according to a first aspect, an embodiment of the present invention discloses an iOS device account password importing method, including:
decrypting a keyhide.plist file for storing the account password; extracting a key corresponding to the ClassID of the key collection package, encoding and encrypting the password data containing the account number which is pre-imported through the key and a corresponding algorithm to form a new node item, and adding the new node item into a decrypted key in. And backing up and restoring the keyhain.plist file added with the new node item to the iOS device, and finishing batch addition of the account number and the password.
Optionally, accessing the iOS device, and starting backup service after detecting that the communication meets the requirement; acquiring/setting a backup password of the iOS device; a first backup containing the keyhide.plist file is backed up, the first backup further comprises a Manifest.plist file and an encrypted Manifest.db database, and the Manifest.plist file contains an encrypted key collection package.
Optionally, the step a further includes: decrypting the key set package, wherein the key set package comprises keys { key1, key2, …, keyn } and Class IDs { Class1, Class2, …, Class } corresponding to the keys; decrypting the Manifest.db database by combining the key collection package, wherein the encrypted attribute package comprises an encrypted key.plist file; and decrypting an attribute package by using the backup password and a corresponding algorithm, and then decrypting the keyhain.
Optionally, creating a new Manifest.db database only containing the information related to the keyhain.plist file added with the new node item; building a second backup by using a Manifest.plist file in a matching manner; and designating a second backup restoration path, and restoring the second backup to the iOS device.
Optionally, extracting key1 in a Class1 associated key collection package in the Manifest. plist file; the first random number of the encrypted Manifest.db database is decrypted through the key1 and the corresponding algorithm, and the Manifest.db database is decrypted through the first random number and the corresponding algorithm. Optionally, extracting key2 in the Class2 associated key collection package in the property package;
decrypting a second random number of the encrypted key in plist file through key2 and a corresponding algorithm, and decrypting the key in plist file through the second random number and the corresponding algorithm.
Optionally, extracting the original node item in which an account password is stored in the keyhain. And decrypting a third random number by using a key3 and a corresponding algorithm in the key collection packet corresponding to Class3 in the encrypted information, and decrypting first encoded data by using the third random number and the corresponding algorithm, wherein a key corresponding to the Class ID in the key collection packet is extracted as a key 3.
Optionally, encoding the pre-imported account password data to generate second encoded data; and encrypting the second encoding data by a fourth random number and a corresponding algorithm, and encrypting the fourth random number by using the key3 and the corresponding algorithm to form a new node item.
Optionally, the pre-imported Account Password data field includes App & Website, Account, Password, Creation date, and Modification date.
According to a second aspect, an embodiment of the present invention provides an iOS device account password importing system, including:
the decryption module is used for decrypting a keyhain.plist file for storing the account password;
the adding module extracts a key corresponding to the ClassID of the key collection package, encodes and encrypts password data including the pre-imported account number through the key and a corresponding algorithm to form a new node item, and adds the new node item to a decrypted key in.
And the backup restoration module is used for backing up and restoring the keyhain. plist file added with the new node item to the iOS device to complete batch addition of the account number and the password.
The invention has the beneficial effects that:
compared with the prior art that account passwords are imported in batches by utilizing vulnerabilities of an iOS system after the device breaks a prison, the scheme disclosed by the embodiment of the invention decrypts a keyhide.plist file; extracting a key corresponding to the ClassID of the key collection package, encoding and encrypting the password data containing the account number which is pre-imported through the key and a corresponding algorithm to form a new node item, and adding the new node item into a decrypted key in. The method has the advantages that the keyhide.plist file added with the new node item is backed up and restored to the iOS device, the account password can be safely added to the device needing to be imported in batches without going beyond the prison, manual addition of people is not needed, a series of troubles caused by manual addition of the account password are avoided, meanwhile, the latest iOS system is compatible, and the original setting of the device is supported.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of an iOS device account password importing method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an iOS device account password importing system according to an embodiment of the present invention;
fig. 3 is an operation flowchart of an iOS device account password importing method according to a preferred embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The scheme disclosed by the embodiment of the invention decrypts the keyhain.plist file; extracting a key corresponding to the ClassID of the key collection package, encoding and encrypting the password data containing the account number which is pre-imported through the key and a corresponding algorithm to form a new node item, and adding the new node item into a decrypted key in. The backup restore adds the keyhain. plist file of the new node item to the iOS device. The device to be imported can be safely added with the account passwords in batches under the condition of not crossing the prison, and manual addition of people is not needed, so that a series of troubles caused by manual addition of the account passwords are avoided, the latest iOS system is compatible, and the original setting of the device is supported.
The embodiment of the invention also provides a corresponding system, and the detailed description is respectively provided below.
Fig. 1 shows a flowchart of an iOS device account password importing method according to an embodiment of the present invention.
Referring to fig. 1, the iOS device account password importing method includes:
and S11, decrypting the keyhain. plist file for storing the account password. This is because the stored account password file is stored only in key in. Then, the question comes why is the keyhain. The reason is that in the protection mechanism of the iOS system, keyhain.plist includes important account password information, and a common backup file without setting a backup password does not include a keyhain.plist file, so that the keyhain.plist file storing the account password information can be backed up in an encrypted form only by setting the backup password. Plist files are very small, only a few hundred KB, and the decryption process is fast.
Therefore, before decryption, the encrypted keyhain. Firstly, judging whether an iOS driver exists under the current system or not, if not, installing the driver of the latest version, and preparing for iOS hardware identification and communication; and then, after the device is accessed, whether the device is unlocked and trusted or not is judged, and the user is guided to unlock and lock the screen password and carry out trust authorization so as to identify the iOS device to prepare for starting backup service subsequently.
After preparation for starting backup service is made, in order to ensure that a keyhide.plist file can be backed up in an encrypted form, whether an iOS device is provided with a backup password is detected; prompting the user to input a backup password, if not, setting a default backup password for the user, and recording the password state; and then starting a backup service to obtain a first backup, wherein the first backup further comprises a Manifest.plist file and an encrypted Manifest.db database, and the Manifest.plist file contains an encryption key collection package.
Knowing why the encrypted keyhain.plist file is decrypted and obtained, then seeing how the keyhain.plist file is decrypted:
firstly, because the backup password is set, the key collection package which is backed up is encrypted, and therefore the key collection package needs to be decrypted firstly. After the encryption key collection package is analyzed from BackupKeyBag item data in a backup file Manifest. plist, the encryption key collection package is decrypted by matching with a corresponding algorithm by reading SALT (data protection SALT value), ITER (abbreviations of iterations, round robin value, namely, the number of rounds), DPSL (data protection) value and a backup password in the BackupKeyBag; the corresponding algorithms are PBKDF2 algorithm, AESUnwrap algorithm, PBKDF2 algorithm prefers PKCS5_ PBKDF2_ HMAC _ SHA256 and PKCS5_ PBKDF2_ HMAC _ SHA 1. The key set comprises keys { key1, key2, …, keyn } and Class IDs { Class1, Class2, …, Class }, corresponding to the keys. When the value is not null, the password is correct, and the key is stored in the key corresponding to the ClassID after decryption for subsequent decryption of the encrypted key (the key refers to the random number encrypted by backup).
Wherein the Class ID represents the ID number in the Class Key, because the key packet collection has multiple groups of key packets, different groups of key packets are added with different ID numbers according to the categories, and then which group of key packets is used externally records the ID value thereof for association.
And then decrypting the Manifest.db database by combining the key collection package. The encryption attribute package containing the encrypted keyhain. Specifically, by extracting key1 in a Class1 associated key collection package in the Manifest.plist file, the Class1 has a MainfestKey value in the Manifest.plist file; decrypting a first random number of the encrypted Manifest.db database through the key1 and a corresponding algorithm, wherein the algorithm for unlocking the first random number is AESUnwrap; and decrypting the Manifest.db database by using the first random number and a corresponding algorithm, wherein the algorithm for unlocking the Manifest.db database is AESdcryptCBC.
Then, the attribute packet is decrypted by using the backup password and the corresponding algorithm, specifically, the encrypted attribute packet is decrypted by using the base64, the backup password and the SHA1 and the AES _ cbc _ encrypt algorithm; decrypting the key in plist file by combining the key collection package, and specifically, extracting key2 in a Class2 related key collection package in the attribute package; decrypting a second random number of the encrypted key in. plist file through key2 and a corresponding algorithm, wherein the algorithm for unlocking the second random number is AESUnwrap; and decrypting the key in.
After the step S11 is executed, the account password information that is pre-imported needs to be constructed into a new node item and added to the keyhain.
S12, extracting a key corresponding to the ClassID from the key collection package, encoding and encrypting the password data containing the pre-imported account number through the key and a corresponding algorithm to form a new node item, and adding the new node item into the decrypted key in.
In the step S12, before extracting the key of the ClassID corresponding to the key collection package, the method includes: extracting the original node item stored with the account password in the keyhain. The original node item comprises encrypted first encoded data and encrypted information (an encrypted version number, a key corresponding to ClassID, and a key length); decrypting a third random number by using a key3 and a corresponding algorithm in the key collection package corresponding to Class3 in the encrypted information, wherein the algorithm corresponding to the key3 is aesewrap; decrypting the first coded data through the third random number and a corresponding algorithm, wherein the algorithm corresponding to the third random number is gcm _ decryption; the key3 is the key of the extraction key collection package corresponding to the ClassID. The decrypted first encoding data is decoded by the DERENCode to obtain the account number, the password creation time, the modification time and the domain name content of the corresponding website or APP.
Further, encoding and encrypting the password data containing the account number which is pre-imported by the key3 and the corresponding algorithm to form a new node item specifically includes: coding the pre-imported account password data to generate second coded data, wherein the coding is carried out by using DERENCode; encrypting the second coded data through a fourth random number and a corresponding algorithm, wherein the algorithm for encrypting the second coded data is a gcm _ encrypt algorithm; encrypting the fourth random number by using the key3 and a corresponding algorithm, wherein the algorithm for encrypting the fourth random number is an AESwrap algorithm; and forming a new node item, wherein the new node item comprises the encrypted second encoding data, the encrypted version number, the corresponding ClassID, the encrypted fourth random numerical value length, the encrypted fourth random number and data generated by encrypting the second encoding data, and the formed new node item is correspondingly added into the inet item or the gen item of the key in.
After executing step S12, further:
and S13, backing up and restoring the keyhain. plist file added with the new node item to the iOS device, and finishing batch addition of the account number and the password. Creating a new Manifest.db database only containing the related information of the keychain.plist file added with the new node item; building a second backup by using a Manifest.plist file in a matching manner; and designating a second backup restoration path, and restoring the second backup to the iOS device. After the recovery, the newly added account password can be seen to appear in the automatic filling function of the iOS device, the WiFi password and the mailbox bank card information are automatically memorized, the original setting of the iOS device can be recovered, and the backup password is emptied by detecting the password state and if the password state is existed; and if the state is not available, the user is guided to input a backup password so as to finish the whole process.
All the pre-imported Account passwords are generally exported from some tool management tools, the exported Account passwords are subjected to modular decoding to obtain first coded data before coding, and the first coded data are classified according to fields of App & Website, Account, Password, Creation data and Modification data, and then are further subjected to coding encryption and the like.
Referring to fig. 2, an operation flow chart of an iOS device account password importing method according to an embodiment of the present invention is shown, and content overlapping with the above content is not repeated.
And S21, identifying the access equipment.
And S22, after accessing, firstly detecting whether the equipment sets the backup password, if the step S23 is set, the step S24 is not set.
And S23, detecting that the backup password is set, and prompting the user to input the backup password.
And S24, detecting no backup password, setting a backup password by default and recording the password state.
And S25, after the backup password is obtained, starting backup service, backing up equipment data and carrying out first backup.
And S26, after the backup is finished, sequentially decrypting the key collection package and the Manifest.db database.
And S27, after the decryption work in the step S26 is completed, decrypting the keyhain. plist file by using the decrypted information.
S28, carrying out encryption and decoding on the node items in the decrypted key in.
S29, after obtaining the keyhain.plist file to which the new node item is added, construct a backup package of keyhain.plist to be replaced, and a second backup.
And S30, after the second backup is constructed, restoring the backup package file to the device updating data, and adding the account number and the password to the iOS device in batch.
S31, detecting the initial state of the password, executing S32 in a state, and executing S33 in a non-state.
And S32, if the state exists, clearing the backup password and ending.
S33, the user is guided to enter the backup password without the state and the operation is terminated.
The method comprises the steps of decrypting a key in plist file, further extracting a key of a key collection package corresponding to ClassID, encoding and encrypting password data including a pre-imported account number through the key and a corresponding algorithm to form a new node item, and adding the new node item into the decrypted key in plist file; and backing up and restoring the keyhain.plist file added with the new node item to the iOS device to complete batch addition of the account number and the password. By adopting the scheme of the invention to complete batch addition of the account passwords, the method has the following advantages in comparison with the prior art:
1. the device does not need to cross prisons and manually add by users;
2. the system is compatible with the latest iOS system, and the application range is wide;
3. after the account password is imported, the original setting of the iOS equipment is supported;
4. and meanwhile, the import of account Password data exported by different Password management tools, such as 1 Passsword, Chrome browser Password management, DashLane and LastPass Password management tools, is supported.
It should be understood that, in the above embodiments, the order of execution of the steps is not meant to imply any order, and the order of execution of the steps should be determined by their function and inherent logic, and should not limit the implementation process of the embodiments of the present invention.
Fig. 3 shows a schematic diagram of an Apple ID account removal system according to an embodiment of the present invention, and for convenience of description, only the parts related to the embodiment of the present invention are shown.
In an embodiment of the present invention, the system is configured to implement the iOS device account password importing method described in the above embodiment of fig. 1, and may be a software unit, a hardware unit, or a unit combining software and hardware that is built in a computer and a server.
Referring to fig. 3, the system includes:
a decryption module 41, which decrypts a keyhain.
The adding module 42 is used for extracting a key corresponding to the ClassID of the key collection package, encoding and encrypting the password data containing the pre-imported account number through the key and a corresponding algorithm to form a new node item, and adding the new node item into the decrypted key in.
And the backup restoration module 43 is used for backing up and restoring the keyhain. plist file added with the new node item to the iOS device to complete batch addition of the account number and the password.
It should be noted that the apparatus in the embodiment of the present invention may be configured to implement all technical solutions in the foregoing method embodiments, and the functions of each functional module may be implemented specifically according to the method in the foregoing method embodiments, and the specific implementation process may refer to the relevant description in the foregoing example, which is not described herein again.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. An iOS device account password importing method is characterized by comprising the following steps:
decrypting a keyhide.plist file for storing the account password;
extracting a key corresponding to the ClassID of the key collection package, encoding and encrypting the password data containing the account number which is pre-imported through the key and a corresponding algorithm to form a new node item, and adding the new node item into a decrypted key in.
And backing up and restoring the keyhain.plist file added with the new node item to the iOS device, and finishing batch addition of the account number and the password.
2. The iOS device account password importing method according to claim 1, wherein obtaining a keyhain. plist file that stores an account password file comprises:
accessing the iOS equipment, and starting backup service after detecting that the communication meets the requirement;
acquiring/setting a backup password of the iOS device;
a first backup containing an encrypted key.plist file is backed up, the first backup further comprising a Manifest.plist file and an encrypted Manifest.db database, the Manifest.plist file containing an encrypted key collection package.
3. The iOS device account password importing method according to claim 2, wherein decrypting the keyhain. plist file that stores the account password specifically includes:
decrypting the key set package, wherein the key set package comprises keys { key1, key2, …, keyn } and Class IDs { Class1, Class2, …, Class } corresponding to the keys;
decrypting the Manifest.db database by combining the key collection package, wherein the encrypted attribute package comprises an encrypted key.plist file;
and decrypting an attribute package by using the backup password and a corresponding algorithm, and then decrypting the keyhain.
4. The iOS device account password importing method according to claim 2, wherein the restoring the keyhain. plist file backup to which the new node item is added to the iOS device comprises:
creating a new Manifest.db database only containing the related information of the keychain.plist file added with the new node item;
building a second backup by using a Manifest.plist file in a matching manner;
and designating a second backup restoration path, and restoring the second backup to the iOS device.
5. The iOS device account password importing method according to claim 3, wherein decrypting the Manifest.db database in combination with the key collection package specifically includes:
extracting key1 in a Class1 associated key collection package in the Manifest. plist file;
and decrypting a first random number of the encrypted Manifest.db database through the key1 and a corresponding algorithm, and decrypting the Manifest.db database through the first random number and the corresponding algorithm.
6. The iOS device account password importing method according to claim 3, wherein decrypting the keyhain. plist file by combining the key collection package specifically includes:
extracting key2 in a Class2 associated key collection package in the property package;
decrypting a second random number of the encrypted key in plist file through key2 and a corresponding algorithm, and decrypting the key in plist file through the second random number and the corresponding algorithm.
7. The iOS device account password import method of claim 1, wherein before extracting the key of the ClassID corresponding to the key collection package, the method comprises:
extracting the original node item stored with an account password in the keyhain.
Decrypting a third random number by using a key3 and a corresponding algorithm in the key collection package corresponding to the Class3 in the encrypted information;
and decrypting the first coded data through the third random number and a corresponding algorithm, wherein the key corresponding to the ClassID of the key collection packet is key 3.
8. The iOS device account password importing method according to claim 7, wherein encoding and encrypting data including the account password that is pre-imported by the key and the corresponding algorithm to form a new node item specifically includes:
encoding the pre-imported account password data to generate second encoded data;
and encrypting the second encoding data by a fourth random number and a corresponding algorithm, and encrypting the fourth random number by using the key3 and the corresponding algorithm to form a new node item.
9. The iOS device Account Password import method according to any of claims 1 to 8, wherein the Account Password data field for pre-import has App & Website, Account, Passsword, Creation date, and Modification date.
10. An iOS device account password import system, comprising:
the decryption module is used for decrypting a keyhain.plist file for storing the account password;
the adding module extracts a key corresponding to the ClassID of the key collection package, encodes and encrypts password data including the pre-imported account number through the key and a corresponding algorithm to form a new node item, and adds the new node item to a decrypted key in.
And the backup restoration module is used for backing up and restoring the keyhain. plist file added with the new node item to the iOS device to complete batch addition of the account number and the password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910641023.3A CN112241524B (en) | 2019-07-16 | IOS equipment account password importing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910641023.3A CN112241524B (en) | 2019-07-16 | IOS equipment account password importing method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112241524A true CN112241524A (en) | 2021-01-19 |
CN112241524B CN112241524B (en) | 2024-06-28 |
Family
ID=
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110252234A1 (en) * | 2010-04-07 | 2011-10-13 | Apple Inc. | System and method for file-level data protection |
CN102750495A (en) * | 2012-06-07 | 2012-10-24 | 北京锐安科技有限公司 | System for cracking and restoring iPhone encrypted backup files |
US20130034229A1 (en) * | 2011-08-05 | 2013-02-07 | Apple Inc. | System and method for wireless data protection |
US20140281540A1 (en) * | 2013-01-18 | 2014-09-18 | Apple Inc. | Keychain syncing |
US20140281571A1 (en) * | 2013-03-13 | 2014-09-18 | Fred Federspiel | Systems, Methods, and Devices for Encrypted Data Management |
WO2015058596A1 (en) * | 2013-10-22 | 2015-04-30 | 天地融科技股份有限公司 | Dynamic password generation method and system, and transaction request processing method and system |
US20160350238A1 (en) * | 2015-05-31 | 2016-12-01 | Apple Inc. | Backup Accessible By Subset Of Related Devices |
CN109670296A (en) * | 2018-12-05 | 2019-04-23 | 深圳软牛科技有限公司 | A kind of method and apparatus removing iOS backup password |
CN109669813A (en) * | 2018-12-05 | 2019-04-23 | 深圳软牛科技有限公司 | A kind of the incremental backup restoring method and device of iOS data |
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110252234A1 (en) * | 2010-04-07 | 2011-10-13 | Apple Inc. | System and method for file-level data protection |
US20130034229A1 (en) * | 2011-08-05 | 2013-02-07 | Apple Inc. | System and method for wireless data protection |
CN102750495A (en) * | 2012-06-07 | 2012-10-24 | 北京锐安科技有限公司 | System for cracking and restoring iPhone encrypted backup files |
US20140281540A1 (en) * | 2013-01-18 | 2014-09-18 | Apple Inc. | Keychain syncing |
US20140281571A1 (en) * | 2013-03-13 | 2014-09-18 | Fred Federspiel | Systems, Methods, and Devices for Encrypted Data Management |
WO2015058596A1 (en) * | 2013-10-22 | 2015-04-30 | 天地融科技股份有限公司 | Dynamic password generation method and system, and transaction request processing method and system |
US20160350238A1 (en) * | 2015-05-31 | 2016-12-01 | Apple Inc. | Backup Accessible By Subset Of Related Devices |
CN109670296A (en) * | 2018-12-05 | 2019-04-23 | 深圳软牛科技有限公司 | A kind of method and apparatus removing iOS backup password |
CN109669813A (en) * | 2018-12-05 | 2019-04-23 | 深圳软牛科技有限公司 | A kind of the incremental backup restoring method and device of iOS data |
Non-Patent Citations (2)
Title |
---|
JEAN-BAPTISTE等: ""iPhone data protection in depth"", pages 1 - 59, Retrieved from the Internet <URL:https://archive.conference.hitb.org/hitbsecconf2011ams/materials/D2T2%20-%20Jean-Baptiste%20Be%cc%81drune%20&%20Jean%20Sigwald%20-%20iPhone%20Data%20Protection%20in%20Depth.pdf> * |
金星;孙波;曹雪芬;: "备份文件加密的iPhone手机取证研究", 警察技术, no. 05, pages 12 - 14 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2022200795B2 (en) | Encrypted userdata transit and storage | |
EP2430789B1 (en) | Protection of encryption keys in a database | |
US9998441B2 (en) | Client authentication using social relationship data | |
US9448949B2 (en) | Mobile data vault | |
CN106506159A (en) | Encryption method and equipment for key safety | |
CN108965222B (en) | Identity authentication method, system and computer readable storage medium | |
CN108270739B (en) | Method and device for managing encryption information | |
US20170099144A1 (en) | Embedded encryption platform comprising an algorithmically flexible multiple parameter encryption system | |
US20210349988A1 (en) | Systems and methods for decentralized recovery of identity attributes | |
JP2009510616A (en) | System and method for protecting sensitive data in a database | |
Park et al. | A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system | |
CN102821110B (en) | A kind of password method for retrieving for audio/video storage device | |
CN111711521B (en) | Block chain account private key resetting method and system | |
US20090044284A1 (en) | System and Method of Generating and Providing a Set of Randomly Selected Substitute Characters in Place of a User Entered Key Phrase | |
JP7138642B2 (en) | Method and apparatus for performing secure backup and restore | |
JP4588991B2 (en) | File management system | |
CN112446982A (en) | Method, device, computer readable medium and equipment for controlling intelligent lock | |
CN112241524A (en) | iOS device account password importing method and system | |
CN112241524B (en) | IOS equipment account password importing method and system | |
CN112306563B (en) | Method, device, equipment and storage medium for resetting IOS screen using time password | |
CN115150193A (en) | Method and system for encrypting sensitive information in data transmission and readable storage medium | |
Shin et al. | Forensic analysis of note and journal applications | |
CN109933994B (en) | Data hierarchical storage method and device and computing equipment | |
US20160092886A1 (en) | Methods of authorizing a computer license | |
CN114095154B (en) | Method, device, equipment and medium for realizing dynamic password of App login |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |