Search

CN-116545664-B - IOS (input-output) terminal virtual positioning vulnerability identification method, system, equipment and medium

CN116545664BCN 116545664 BCN116545664 BCN 116545664BCN-116545664-B

Abstract

The invention discloses a method, a system, equipment and a medium for identifying virtual positioning loopholes of an IOS (input/output) terminal, wherein the method comprises the following steps of calling an IOS terminal application to perform positioning request operation; the method and the device for positioning the apple end based on the GPX virtual positioning can perform more accurate recognition on the GPX virtual positioning method of the apple end, can efficiently and accurately judge whether a user adopts virtual positioning or not through double recognition logic, can effectively improve the authenticity and the safety of the positioning function of the application of the apple end, improve the user experience and have higher application value, and can be used for obtaining partial callback positioning data in response to positioning request operation, generating a first vulnerability recognition result according to the data parameters of the partial callback positioning data, generating a final vulnerability recognition result according to the request parameters of the positioning request operation and the time parameters of the partial callback positioning data in response to the first vulnerability recognition result as a non-virtual positioning result.

Inventors

  • LIN FEI

Assignees

  • 苏州摩多多信息科技有限公司

Dates

Publication Date
20260505
Application Date
20230419

Claims (5)

  1. 1. The IOS virtual positioning vulnerability identification method is characterized by comprising the following steps of: calling an IOS end application to perform positioning request operation; responding to the positioning request operation, and acquiring partial callback positioning data; generating a first vulnerability identification result according to the data parameters of the partial callback positioning data; Responding to the first vulnerability identification result as a non-virtual positioning result, and generating a final vulnerability identification result according to the request parameters of the positioning request operation and the time parameters of the partial callback positioning data; the positioning request operation comprises setting a first request time, calling the IOS terminal application, and initiating a positioning request to an IOS mobile terminal according to the first request time; The method comprises the steps of obtaining partial callback positioning data, wherein the method comprises the steps of setting callback time length, and collecting first positioning data returned by the positioning request operation as the partial callback positioning data in the callback time length; The method comprises the steps of generating a first vulnerability identification result according to data parameters of the partial callback positioning data, wherein the first vulnerability identification result comprises the steps of identifying a positioning data elevation value, a positioning data instant speed and a positioning data elevation precision of the partial callback positioning data, enabling the positioning data elevation value, the positioning data instant speed and the positioning data elevation precision to serve as the data parameters, setting a first reference value, a second reference value and a third reference value, and generating the first vulnerability identification result based on the data parameters, the first reference value, the second reference value and the third reference value; the generating a first vulnerability identification result based on the data parameter, the first reference value, the second reference value and the third reference value comprises generating a virtual positioning result as the first vulnerability identification result in response to the situation that the altitude value of the positioning data is the first reference value, the instant speed of the positioning data is the second reference value and the altitude precision of the positioning data is the third reference value; The method comprises the steps of enabling a first request time to serve as a request parameter, identifying the number of data strips of the partial callback positioning data, obtaining response time of the partial callback positioning data, calculating average data time of the partial callback positioning data, enabling the response time and the average data time to serve as time parameters, setting a first proportion value, and generating the final vulnerability identification result according to the request parameter, the number of data strips, the time parameter and the first proportion.
  2. 2. The IOS-side virtual location vulnerability identification method of claim 1, comprising the steps of: the step of generating the final vulnerability identification result according to the request parameter, the number of data pieces, the time parameter and the first proportion comprises the following steps: Calculating a product of the average data time and the first proportional value; Calculating a floating time range according to the product value and the average data time; comparing the response time to the floating time range; comparing the first request times with the data pieces; Generating the confirmed virtual positioning result as the final vulnerability identification result in response to the response time being within the floating time range and the first request times being consistent with the number of data bars; And generating a true positioning result as the final vulnerability identification result in response to the response time not being within the floating time range or the first request times not being consistent with the number of data stripes.
  3. 3. The IOS virtual positioning vulnerability identification system based on the IOS virtual positioning vulnerability identification method according to any one of claims 1-2, wherein the system comprises a positioning request module, a data callback module, a preliminary identification judgment module and a final identification judgment module; The positioning request module is used for calling the IOS terminal application to perform positioning request operation; The data callback module is used for responding to the positioning request operation and obtaining partial callback positioning data; The preliminary identification judging module is used for generating a first vulnerability identification result according to the data parameters of the partial callback positioning data; and the final recognition judging module is used for responding to the first vulnerability recognition result as a non-virtual positioning result and generating a final vulnerability recognition result according to the request parameters of the positioning request operation and the time parameters of the partial callback positioning data.
  4. 4. A computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, and the computer program when executed by a processor implements the steps of the IOS-side virtual location vulnerability identification method according to any one of claims 1-2.
  5. 5. The computer equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are in communication with each other through the communication bus, and the computer equipment comprises the following components: The memory is used for storing a computer program; The processor is configured to execute the steps of the IOS terminal virtual location vulnerability identification method according to any one of claims 1-2 by running a program stored on the memory.

Description

IOS (input-output) terminal virtual positioning vulnerability identification method, system, equipment and medium Technical Field The invention relates to the technical field of Internet, in particular to an application-side vulnerability processing field, and particularly relates to an IOS-side virtual positioning vulnerability identification method, system, equipment and medium. Background Along with the rapid development of the mobile terminal body quantity of the internet, a large number of APPs support positioning services, such as a card punching App, and the like, in-place card punching can be realized through the positioning services, and media applications realize user data authenticity confirmation and the like through the positioning services. At present, many users of the mobile terminal simulate the current position by using virtual positioning so as to realize operations such as virtual card punching, virtual fraud and the like, thereby leading to the enrichment of false data and virtual users in the App and seriously affecting the experience of real users and the management of specific attendance of some companies. The method is characterized in that in an apple user group, most users can realize virtual positioning by using GPX files, and the general method for preventing GPX virtual positioning by an apple mobile terminal App is to simply judge whether the altitude value of positioned data is 0 and whether the current speed is 0 or not, even do not carry out virtual positioning judgment, according to the research of user behaviors, the scenes of most users are checked in a stop state, the speed of the scenes is 0, and the recognition mechanism of the apple terminal is difficult to judge whether the scenes are virtual positioning or not under the condition, so that the simple and inaccurate judgment mode can lead the service to be abnormally operated, the authenticity of the data of the user is questioned, the loss of the user is accelerated, and the authenticity and the application safety of the positioning function of the application of the apple terminal are seriously influenced. Disclosure of Invention The invention aims to solve the problems in the prior art, and provides a method, a system, equipment and a medium for identifying virtual positioning loopholes of an IOS (input/output) terminal, so that the problems that the virtual positioning identification method of the application of the apple terminal is too simple and the authenticity and the application safety of the positioning function of the application of the apple terminal are seriously influenced in the prior art are solved. In order to solve the technical problems, the specific technical scheme of the invention is as follows: In one aspect, the invention provides a method for identifying virtual positioning vulnerabilities of an IOS (Internet of things) terminal, which comprises the following steps: calling an IOS end application to perform positioning request operation; responding to the positioning request operation, and acquiring partial callback positioning data; generating a first vulnerability identification result according to the data parameters of the partial callback positioning data; And responding to the first vulnerability identification result as a non-virtual positioning result, and generating a final vulnerability identification result according to the request parameters of the positioning request operation and the time parameters of the partial callback positioning data. As an improvement, the positioning request operation includes: Setting a first request number; and calling the IOS terminal application to initiate a positioning request to the IOS mobile terminal according to the first request times. As an improved solution, the obtaining the partial callback positioning data includes: Setting callback time length; and collecting the first positioning data returned by the positioning request operation as the partial callback data in the callback time length. As an improved solution, the generating a first vulnerability identification result according to the data parameters of the partial callback positioning data includes: Identifying the altitude value of the positioning data of the partial callback positioning data, the instant speed of the positioning data and the altitude precision of the positioning data; enabling the altitude value of the positioning data, the instant speed of the positioning data and the altitude precision of the positioning data to be used as the data parameters; setting a first reference value, a second reference value and a third reference value; And generating a first vulnerability identification result based on the data parameter, the first reference value, the second reference value and the third reference value. As an improvement, the generating the first vulnerability identification result based on the data parameter, the first reference value, the second reference value and