CN112241524A - iOS device account password importing method and system - Google Patents

iOS device account password importing method and system Download PDF

Info

Publication number
CN112241524A
CN112241524A CN201910641023.3A CN201910641023A CN112241524A CN 112241524 A CN112241524 A CN 112241524A CN 201910641023 A CN201910641023 A CN 201910641023A CN 112241524 A CN112241524 A CN 112241524A
Authority
CN
China
Prior art keywords
key
password
decrypting
account password
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910641023.3A
Other languages
Chinese (zh)
Other versions
CN112241524B (en
Inventor
朱志强
李盛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Afirstsoft Co Ltd
Original Assignee
Afirstsoft Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Afirstsoft Co Ltd filed Critical Afirstsoft Co Ltd
Priority to CN201910641023.3A priority Critical patent/CN112241524B/en
Priority claimed from CN201910641023.3A external-priority patent/CN112241524B/en
Publication of CN112241524A publication Critical patent/CN112241524A/en
Application granted granted Critical
Publication of CN112241524B publication Critical patent/CN112241524B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of iOS equipment information import, and particularly relates to an iOS equipment account password import method and system. The method comprises the steps of decrypting a keyhain.plist file for storing an account password; extracting a key corresponding to the ClassID of the key collection package, encoding and encrypting the password data containing the account number which is pre-imported through the key and a corresponding algorithm to form a new node item, and adding the new node item into a decrypted key in. The method has the advantages that the key chain.plist file added with the new node item is backed up and restored to the iOS device, the account password can be safely added to the device needing to be imported in batches, manual addition of people is not needed, and therefore a series of troubles caused by manual addition of the account password are avoided.

Description

iOS device account password importing method and system
Technical Field
The invention belongs to the technical field of iOS equipment information import, and particularly relates to an iOS equipment account password import method and system.
Background
Each user has a plurality of websites, App, WiFi and bank card account passwords, and can only memorize the commonly used account passwords or memorize the account passwords better than a stout point and memorize the passwords on paper in many cases, but inconvenience is brought in the use process.
With the upgrading of the iOS system, a password automatic filling function is added, a WiFi password is automatically memorized, and the account password filling of a bank card is also automatically carried out. The password automatic filling function can be used for automatically filling the corresponding account passwords in the browser and the App, so that great convenience is provided for a user to log in the App and the browser; the WiFi password is automatically memorized, and the password can be logged in next time without inputting; the account password filling principle of the bank card is similar to the password automatic filling function; however, the convenience brought by these functions is also a problem, and a common account password needs to be added in advance.
At present, a Password management tool is provided on a PC device, such as 1Password, Chrome browser Password management, DashLane, LastPass, and the like. These conventional software can export the account number and password of the user in batch. However, due to the sealing of the iOS system, no interface capable of importing the exported account passwords into the password automatic filling function in batch is available, and the account passwords can only be added manually one by one; for users with a large number of account passwords, manual addition is not only tedious and inefficient, but also often encounters special characters, and repeated input and checking are required, even some unnecessary troubles are brought, for example, account blocking, password resetting and the like.
Although the prior art can realize batch import of account passwords by using vulnerabilities of the iOS system, the prior art has the following defects:
1. the method has the advantages that the jail crossing is needed, the jail crossing difficulty is high, the jail crossing tool has requirements on iPhone and iPad equipment models and iOS system versions, and the limitation is high;
2. with the upgrading of the iOS system, under the condition that the bug is repaired, the method is invalid at the same time, and the method cannot be compatible with a new system;
3. once the device is out of prison, the iOS system is insecure and the user would not be willing to risk for password bulk import.
In summary, the method for importing the account number and the password of the iOS device, which is provided by the invention, can realize batch import of the account number and the password of the iOS device without going through the prison, is compatible with the latest iOS system, and supports the original setting of the device.
Disclosure of Invention
The technical problem to be solved by the invention is how to import account passwords into the iOS device in batches without prison, and the device is compatible with the latest iOS system and supports the original setting of the device.
Therefore, according to a first aspect, an embodiment of the present invention discloses an iOS device account password importing method, including:
decrypting a keyhide.plist file for storing the account password; extracting a key corresponding to the ClassID of the key collection package, encoding and encrypting the password data containing the account number which is pre-imported through the key and a corresponding algorithm to form a new node item, and adding the new node item into a decrypted key in. And backing up and restoring the keyhain.plist file added with the new node item to the iOS device, and finishing batch addition of the account number and the password.
Optionally, accessing the iOS device, and starting backup service after detecting that the communication meets the requirement; acquiring/setting a backup password of the iOS device; a first backup containing the keyhide.plist file is backed up, the first backup further comprises a Manifest.plist file and an encrypted Manifest.db database, and the Manifest.plist file contains an encrypted key collection package.
Optionally, the step a further includes: decrypting the key set package, wherein the key set package comprises keys { key1, key2, …, keyn } and Class IDs { Class1, Class2, …, Class } corresponding to the keys; decrypting the Manifest.db database by combining the key collection package, wherein the encrypted attribute package comprises an encrypted key.plist file; and decrypting an attribute package by using the backup password and a corresponding algorithm, and then decrypting the keyhain.
Optionally, creating a new Manifest.db database only containing the information related to the keyhain.plist file added with the new node item; building a second backup by using a Manifest.plist file in a matching manner; and designating a second backup restoration path, and restoring the second backup to the iOS device.
Optionally, extracting key1 in a Class1 associated key collection package in the Manifest. plist file; the first random number of the encrypted Manifest.db database is decrypted through the key1 and the corresponding algorithm, and the Manifest.db database is decrypted through the first random number and the corresponding algorithm. Optionally, extracting key2 in the Class2 associated key collection package in the property package;
decrypting a second random number of the encrypted key in plist file through key2 and a corresponding algorithm, and decrypting the key in plist file through the second random number and the corresponding algorithm.
Optionally, extracting the original node item in which an account password is stored in the keyhain. And decrypting a third random number by using a key3 and a corresponding algorithm in the key collection packet corresponding to Class3 in the encrypted information, and decrypting first encoded data by using the third random number and the corresponding algorithm, wherein a key corresponding to the Class ID in the key collection packet is extracted as a key 3.
Optionally, encoding the pre-imported account password data to generate second encoded data; and encrypting the second encoding data by a fourth random number and a corresponding algorithm, and encrypting the fourth random number by using the key3 and the corresponding algorithm to form a new node item.
Optionally, the pre-imported Account Password data field includes App & Website, Account, Password, Creation date, and Modification date.
According to a second aspect, an embodiment of the present invention provides an iOS device account password importing system, including:
the decryption module is used for decrypting a keyhain.plist file for storing the account password;
the adding module extracts a key corresponding to the ClassID of the key collection package, encodes and encrypts password data including the pre-imported account number through the key and a corresponding algorithm to form a new node item, and adds the new node item to a decrypted key in.
And the backup restoration module is used for backing up and restoring the keyhain. plist file added with the new node item to the iOS device to complete batch addition of the account number and the password.
The invention has the beneficial effects that:
compared with the prior art that account passwords are imported in batches by utilizing vulnerabilities of an iOS system after the device breaks a prison, the scheme disclosed by the embodiment of the invention decrypts a keyhide.plist file; extracting a key corresponding to the ClassID of the key collection package, encoding and encrypting the password data containing the account number which is pre-imported through the key and a corresponding algorithm to form a new node item, and adding the new node item into a decrypted key in. The method has the advantages that the keyhide.plist file added with the new node item is backed up and restored to the iOS device, the account password can be safely added to the device needing to be imported in batches without going beyond the prison, manual addition of people is not needed, a series of troubles caused by manual addition of the account password are avoided, meanwhile, the latest iOS system is compatible, and the original setting of the device is supported.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of an iOS device account password importing method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an iOS device account password importing system according to an embodiment of the present invention;
fig. 3 is an operation flowchart of an iOS device account password importing method according to a preferred embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The scheme disclosed by the embodiment of the invention decrypts the keyhain.plist file; extracting a key corresponding to the ClassID of the key collection package, encoding and encrypting the password data containing the account number which is pre-imported through the key and a corresponding algorithm to form a new node item, and adding the new node item into a decrypted key in. The backup restore adds the keyhain. plist file of the new node item to the iOS device. The device to be imported can be safely added with the account passwords in batches under the condition of not crossing the prison, and manual addition of people is not needed, so that a series of troubles caused by manual addition of the account passwords are avoided, the latest iOS system is compatible, and the original setting of the device is supported.
The embodiment of the invention also provides a corresponding system, and the detailed description is respectively provided below.
Fig. 1 shows a flowchart of an iOS device account password importing method according to an embodiment of the present invention.
Referring to fig. 1, the iOS device account password importing method includes:
and S11, decrypting the keyhain. plist file for storing the account password. This is because the stored account password file is stored only in key in. Then, the question comes why is the keyhain. The reason is that in the protection mechanism of the iOS system, keyhain.plist includes important account password information, and a common backup file without setting a backup password does not include a keyhain.plist file, so that the keyhain.plist file storing the account password information can be backed up in an encrypted form only by setting the backup password. Plist files are very small, only a few hundred KB, and the decryption process is fast.
Therefore, before decryption, the encrypted keyhain. Firstly, judging whether an iOS driver exists under the current system or not, if not, installing the driver of the latest version, and preparing for iOS hardware identification and communication; and then, after the device is accessed, whether the device is unlocked and trusted or not is judged, and the user is guided to unlock and lock the screen password and carry out trust authorization so as to identify the iOS device to prepare for starting backup service subsequently.
After preparation for starting backup service is made, in order to ensure that a keyhide.plist file can be backed up in an encrypted form, whether an iOS device is provided with a backup password is detected; prompting the user to input a backup password, if not, setting a default backup password for the user, and recording the password state; and then starting a backup service to obtain a first backup, wherein the first backup further comprises a Manifest.plist file and an encrypted Manifest.db database, and the Manifest.plist file contains an encryption key collection package.
Knowing why the encrypted keyhain.plist file is decrypted and obtained, then seeing how the keyhain.plist file is decrypted:
firstly, because the backup password is set, the key collection package which is backed up is encrypted, and therefore the key collection package needs to be decrypted firstly. After the encryption key collection package is analyzed from BackupKeyBag item data in a backup file Manifest. plist, the encryption key collection package is decrypted by matching with a corresponding algorithm by reading SALT (data protection SALT value), ITER (abbreviations of iterations, round robin value, namely, the number of rounds), DPSL (data protection) value and a backup password in the BackupKeyBag; the corresponding algorithms are PBKDF2 algorithm, AESUnwrap algorithm, PBKDF2 algorithm prefers PKCS5_ PBKDF2_ HMAC _ SHA256 and PKCS5_ PBKDF2_ HMAC _ SHA 1. The key set comprises keys { key1, key2, …, keyn } and Class IDs { Class1, Class2, …, Class }, corresponding to the keys. When the value is not null, the password is correct, and the key is stored in the key corresponding to the ClassID after decryption for subsequent decryption of the encrypted key (the key refers to the random number encrypted by backup).
Wherein the Class ID represents the ID number in the Class Key, because the key packet collection has multiple groups of key packets, different groups of key packets are added with different ID numbers according to the categories, and then which group of key packets is used externally records the ID value thereof for association.
And then decrypting the Manifest.db database by combining the key collection package. The encryption attribute package containing the encrypted keyhain. Specifically, by extracting key1 in a Class1 associated key collection package in the Manifest.plist file, the Class1 has a MainfestKey value in the Manifest.plist file; decrypting a first random number of the encrypted Manifest.db database through the key1 and a corresponding algorithm, wherein the algorithm for unlocking the first random number is AESUnwrap; and decrypting the Manifest.db database by using the first random number and a corresponding algorithm, wherein the algorithm for unlocking the Manifest.db database is AESdcryptCBC.
Then, the attribute packet is decrypted by using the backup password and the corresponding algorithm, specifically, the encrypted attribute packet is decrypted by using the base64, the backup password and the SHA1 and the AES _ cbc _ encrypt algorithm; decrypting the key in plist file by combining the key collection package, and specifically, extracting key2 in a Class2 related key collection package in the attribute package; decrypting a second random number of the encrypted key in. plist file through key2 and a corresponding algorithm, wherein the algorithm for unlocking the second random number is AESUnwrap; and decrypting the key in.
After the step S11 is executed, the account password information that is pre-imported needs to be constructed into a new node item and added to the keyhain.
S12, extracting a key corresponding to the ClassID from the key collection package, encoding and encrypting the password data containing the pre-imported account number through the key and a corresponding algorithm to form a new node item, and adding the new node item into the decrypted key in.
In the step S12, before extracting the key of the ClassID corresponding to the key collection package, the method includes: extracting the original node item stored with the account password in the keyhain. The original node item comprises encrypted first encoded data and encrypted information (an encrypted version number, a key corresponding to ClassID, and a key length); decrypting a third random number by using a key3 and a corresponding algorithm in the key collection package corresponding to Class3 in the encrypted information, wherein the algorithm corresponding to the key3 is aesewrap; decrypting the first coded data through the third random number and a corresponding algorithm, wherein the algorithm corresponding to the third random number is gcm _ decryption; the key3 is the key of the extraction key collection package corresponding to the ClassID. The decrypted first encoding data is decoded by the DERENCode to obtain the account number, the password creation time, the modification time and the domain name content of the corresponding website or APP.
Further, encoding and encrypting the password data containing the account number which is pre-imported by the key3 and the corresponding algorithm to form a new node item specifically includes: coding the pre-imported account password data to generate second coded data, wherein the coding is carried out by using DERENCode; encrypting the second coded data through a fourth random number and a corresponding algorithm, wherein the algorithm for encrypting the second coded data is a gcm _ encrypt algorithm; encrypting the fourth random number by using the key3 and a corresponding algorithm, wherein the algorithm for encrypting the fourth random number is an AESwrap algorithm; and forming a new node item, wherein the new node item comprises the encrypted second encoding data, the encrypted version number, the corresponding ClassID, the encrypted fourth random numerical value length, the encrypted fourth random number and data generated by encrypting the second encoding data, and the formed new node item is correspondingly added into the inet item or the gen item of the key in.
After executing step S12, further:
and S13, backing up and restoring the keyhain. plist file added with the new node item to the iOS device, and finishing batch addition of the account number and the password. Creating a new Manifest.db database only containing the related information of the keychain.plist file added with the new node item; building a second backup by using a Manifest.plist file in a matching manner; and designating a second backup restoration path, and restoring the second backup to the iOS device. After the recovery, the newly added account password can be seen to appear in the automatic filling function of the iOS device, the WiFi password and the mailbox bank card information are automatically memorized, the original setting of the iOS device can be recovered, and the backup password is emptied by detecting the password state and if the password state is existed; and if the state is not available, the user is guided to input a backup password so as to finish the whole process.
All the pre-imported Account passwords are generally exported from some tool management tools, the exported Account passwords are subjected to modular decoding to obtain first coded data before coding, and the first coded data are classified according to fields of App & Website, Account, Password, Creation data and Modification data, and then are further subjected to coding encryption and the like.
Referring to fig. 2, an operation flow chart of an iOS device account password importing method according to an embodiment of the present invention is shown, and content overlapping with the above content is not repeated.
And S21, identifying the access equipment.
And S22, after accessing, firstly detecting whether the equipment sets the backup password, if the step S23 is set, the step S24 is not set.
And S23, detecting that the backup password is set, and prompting the user to input the backup password.
And S24, detecting no backup password, setting a backup password by default and recording the password state.
And S25, after the backup password is obtained, starting backup service, backing up equipment data and carrying out first backup.
And S26, after the backup is finished, sequentially decrypting the key collection package and the Manifest.db database.
And S27, after the decryption work in the step S26 is completed, decrypting the keyhain. plist file by using the decrypted information.
S28, carrying out encryption and decoding on the node items in the decrypted key in.
S29, after obtaining the keyhain.plist file to which the new node item is added, construct a backup package of keyhain.plist to be replaced, and a second backup.
And S30, after the second backup is constructed, restoring the backup package file to the device updating data, and adding the account number and the password to the iOS device in batch.
S31, detecting the initial state of the password, executing S32 in a state, and executing S33 in a non-state.
And S32, if the state exists, clearing the backup password and ending.
S33, the user is guided to enter the backup password without the state and the operation is terminated.
The method comprises the steps of decrypting a key in plist file, further extracting a key of a key collection package corresponding to ClassID, encoding and encrypting password data including a pre-imported account number through the key and a corresponding algorithm to form a new node item, and adding the new node item into the decrypted key in plist file; and backing up and restoring the keyhain.plist file added with the new node item to the iOS device to complete batch addition of the account number and the password. By adopting the scheme of the invention to complete batch addition of the account passwords, the method has the following advantages in comparison with the prior art:
1. the device does not need to cross prisons and manually add by users;
2. the system is compatible with the latest iOS system, and the application range is wide;
3. after the account password is imported, the original setting of the iOS equipment is supported;
4. and meanwhile, the import of account Password data exported by different Password management tools, such as 1 Passsword, Chrome browser Password management, DashLane and LastPass Password management tools, is supported.
It should be understood that, in the above embodiments, the order of execution of the steps is not meant to imply any order, and the order of execution of the steps should be determined by their function and inherent logic, and should not limit the implementation process of the embodiments of the present invention.
Fig. 3 shows a schematic diagram of an Apple ID account removal system according to an embodiment of the present invention, and for convenience of description, only the parts related to the embodiment of the present invention are shown.
In an embodiment of the present invention, the system is configured to implement the iOS device account password importing method described in the above embodiment of fig. 1, and may be a software unit, a hardware unit, or a unit combining software and hardware that is built in a computer and a server.
Referring to fig. 3, the system includes:
a decryption module 41, which decrypts a keyhain.
The adding module 42 is used for extracting a key corresponding to the ClassID of the key collection package, encoding and encrypting the password data containing the pre-imported account number through the key and a corresponding algorithm to form a new node item, and adding the new node item into the decrypted key in.
And the backup restoration module 43 is used for backing up and restoring the keyhain. plist file added with the new node item to the iOS device to complete batch addition of the account number and the password.
It should be noted that the apparatus in the embodiment of the present invention may be configured to implement all technical solutions in the foregoing method embodiments, and the functions of each functional module may be implemented specifically according to the method in the foregoing method embodiments, and the specific implementation process may refer to the relevant description in the foregoing example, which is not described herein again.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. An iOS device account password importing method is characterized by comprising the following steps:
decrypting a keyhide.plist file for storing the account password;
extracting a key corresponding to the ClassID of the key collection package, encoding and encrypting the password data containing the account number which is pre-imported through the key and a corresponding algorithm to form a new node item, and adding the new node item into a decrypted key in.
And backing up and restoring the keyhain.plist file added with the new node item to the iOS device, and finishing batch addition of the account number and the password.
2. The iOS device account password importing method according to claim 1, wherein obtaining a keyhain. plist file that stores an account password file comprises:
accessing the iOS equipment, and starting backup service after detecting that the communication meets the requirement;
acquiring/setting a backup password of the iOS device;
a first backup containing an encrypted key.plist file is backed up, the first backup further comprising a Manifest.plist file and an encrypted Manifest.db database, the Manifest.plist file containing an encrypted key collection package.
3. The iOS device account password importing method according to claim 2, wherein decrypting the keyhain. plist file that stores the account password specifically includes:
decrypting the key set package, wherein the key set package comprises keys { key1, key2, …, keyn } and Class IDs { Class1, Class2, …, Class } corresponding to the keys;
decrypting the Manifest.db database by combining the key collection package, wherein the encrypted attribute package comprises an encrypted key.plist file;
and decrypting an attribute package by using the backup password and a corresponding algorithm, and then decrypting the keyhain.
4. The iOS device account password importing method according to claim 2, wherein the restoring the keyhain. plist file backup to which the new node item is added to the iOS device comprises:
creating a new Manifest.db database only containing the related information of the keychain.plist file added with the new node item;
building a second backup by using a Manifest.plist file in a matching manner;
and designating a second backup restoration path, and restoring the second backup to the iOS device.
5. The iOS device account password importing method according to claim 3, wherein decrypting the Manifest.db database in combination with the key collection package specifically includes:
extracting key1 in a Class1 associated key collection package in the Manifest. plist file;
and decrypting a first random number of the encrypted Manifest.db database through the key1 and a corresponding algorithm, and decrypting the Manifest.db database through the first random number and the corresponding algorithm.
6. The iOS device account password importing method according to claim 3, wherein decrypting the keyhain. plist file by combining the key collection package specifically includes:
extracting key2 in a Class2 associated key collection package in the property package;
decrypting a second random number of the encrypted key in plist file through key2 and a corresponding algorithm, and decrypting the key in plist file through the second random number and the corresponding algorithm.
7. The iOS device account password import method of claim 1, wherein before extracting the key of the ClassID corresponding to the key collection package, the method comprises:
extracting the original node item stored with an account password in the keyhain.
Decrypting a third random number by using a key3 and a corresponding algorithm in the key collection package corresponding to the Class3 in the encrypted information;
and decrypting the first coded data through the third random number and a corresponding algorithm, wherein the key corresponding to the ClassID of the key collection packet is key 3.
8. The iOS device account password importing method according to claim 7, wherein encoding and encrypting data including the account password that is pre-imported by the key and the corresponding algorithm to form a new node item specifically includes:
encoding the pre-imported account password data to generate second encoded data;
and encrypting the second encoding data by a fourth random number and a corresponding algorithm, and encrypting the fourth random number by using the key3 and the corresponding algorithm to form a new node item.
9. The iOS device Account Password import method according to any of claims 1 to 8, wherein the Account Password data field for pre-import has App & Website, Account, Passsword, Creation date, and Modification date.
10. An iOS device account password import system, comprising:
the decryption module is used for decrypting a keyhain.plist file for storing the account password;
the adding module extracts a key corresponding to the ClassID of the key collection package, encodes and encrypts password data including the pre-imported account number through the key and a corresponding algorithm to form a new node item, and adds the new node item to a decrypted key in.
And the backup restoration module is used for backing up and restoring the keyhain. plist file added with the new node item to the iOS device to complete batch addition of the account number and the password.
CN201910641023.3A 2019-07-16 IOS equipment account password importing method and system Active CN112241524B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910641023.3A CN112241524B (en) 2019-07-16 IOS equipment account password importing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910641023.3A CN112241524B (en) 2019-07-16 IOS equipment account password importing method and system

Publications (2)

Publication Number Publication Date
CN112241524A true CN112241524A (en) 2021-01-19
CN112241524B CN112241524B (en) 2024-06-28

Family

ID=

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110252234A1 (en) * 2010-04-07 2011-10-13 Apple Inc. System and method for file-level data protection
CN102750495A (en) * 2012-06-07 2012-10-24 北京锐安科技有限公司 System for cracking and restoring iPhone encrypted backup files
US20130034229A1 (en) * 2011-08-05 2013-02-07 Apple Inc. System and method for wireless data protection
US20140281540A1 (en) * 2013-01-18 2014-09-18 Apple Inc. Keychain syncing
US20140281571A1 (en) * 2013-03-13 2014-09-18 Fred Federspiel Systems, Methods, and Devices for Encrypted Data Management
WO2015058596A1 (en) * 2013-10-22 2015-04-30 天地融科技股份有限公司 Dynamic password generation method and system, and transaction request processing method and system
US20160350238A1 (en) * 2015-05-31 2016-12-01 Apple Inc. Backup Accessible By Subset Of Related Devices
CN109670296A (en) * 2018-12-05 2019-04-23 深圳软牛科技有限公司 A kind of method and apparatus removing iOS backup password
CN109669813A (en) * 2018-12-05 2019-04-23 深圳软牛科技有限公司 A kind of the incremental backup restoring method and device of iOS data

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110252234A1 (en) * 2010-04-07 2011-10-13 Apple Inc. System and method for file-level data protection
US20130034229A1 (en) * 2011-08-05 2013-02-07 Apple Inc. System and method for wireless data protection
CN102750495A (en) * 2012-06-07 2012-10-24 北京锐安科技有限公司 System for cracking and restoring iPhone encrypted backup files
US20140281540A1 (en) * 2013-01-18 2014-09-18 Apple Inc. Keychain syncing
US20140281571A1 (en) * 2013-03-13 2014-09-18 Fred Federspiel Systems, Methods, and Devices for Encrypted Data Management
WO2015058596A1 (en) * 2013-10-22 2015-04-30 天地融科技股份有限公司 Dynamic password generation method and system, and transaction request processing method and system
US20160350238A1 (en) * 2015-05-31 2016-12-01 Apple Inc. Backup Accessible By Subset Of Related Devices
CN109670296A (en) * 2018-12-05 2019-04-23 深圳软牛科技有限公司 A kind of method and apparatus removing iOS backup password
CN109669813A (en) * 2018-12-05 2019-04-23 深圳软牛科技有限公司 A kind of the incremental backup restoring method and device of iOS data

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JEAN-BAPTISTE等: ""iPhone data protection in depth"", pages 1 - 59, Retrieved from the Internet <URL:https://archive.conference.hitb.org/hitbsecconf2011ams/materials/D2T2%20-%20Jean-Baptiste%20Be%cc%81drune%20&%20Jean%20Sigwald%20-%20iPhone%20Data%20Protection%20in%20Depth.pdf> *
金星;孙波;曹雪芬;: "备份文件加密的iPhone手机取证研究", 警察技术, no. 05, pages 12 - 14 *

Similar Documents

Publication Publication Date Title
AU2022200795B2 (en) Encrypted userdata transit and storage
EP2430789B1 (en) Protection of encryption keys in a database
US9998441B2 (en) Client authentication using social relationship data
US9448949B2 (en) Mobile data vault
CN106506159A (en) Encryption method and equipment for key safety
CN108965222B (en) Identity authentication method, system and computer readable storage medium
CN108270739B (en) Method and device for managing encryption information
US20170099144A1 (en) Embedded encryption platform comprising an algorithmically flexible multiple parameter encryption system
US20210349988A1 (en) Systems and methods for decentralized recovery of identity attributes
JP2009510616A (en) System and method for protecting sensitive data in a database
Park et al. A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system
CN102821110B (en) A kind of password method for retrieving for audio/video storage device
CN111711521B (en) Block chain account private key resetting method and system
US20090044284A1 (en) System and Method of Generating and Providing a Set of Randomly Selected Substitute Characters in Place of a User Entered Key Phrase
JP7138642B2 (en) Method and apparatus for performing secure backup and restore
JP4588991B2 (en) File management system
CN112446982A (en) Method, device, computer readable medium and equipment for controlling intelligent lock
CN112241524A (en) iOS device account password importing method and system
CN112241524B (en) IOS equipment account password importing method and system
CN112306563B (en) Method, device, equipment and storage medium for resetting IOS screen using time password
CN115150193A (en) Method and system for encrypting sensitive information in data transmission and readable storage medium
Shin et al. Forensic analysis of note and journal applications
CN109933994B (en) Data hierarchical storage method and device and computing equipment
US20160092886A1 (en) Methods of authorizing a computer license
CN114095154B (en) Method, device, equipment and medium for realizing dynamic password of App login

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant