Business Client need Mobile App Development

Contact person: Business Client

Phone:Show

Email:Show

Location: Hong Kong, China

Budget: Recommended by industry experts

Time to start: As soon as possible

Project description:
"Core Requirements:

Software Analysis and Extraction: The contractor must use legal and compliant tools to extract the target software's IPA files from official channels and perform static and dynamic analysis to understand the software's internal structure and enable legitimate optimization and enhancement.

Data Visualization Function Development: Develop a lightweight dynamic library to implement a "viewpoint" perspective function, designed to help visualize certain data during internal testing. This function is hidden by default and can only be activated through specific gestures or passwords, and must not interfere with the normal operation or core functionality of the software.

Seamless Connection and Security: The injected dynamic library must ensure that the connection between the software and the original server is unaffected and will not tamper with or interfere with core functionality. The injection process must strictly comply with iOS development specifications and must not trigger any anti-fraud mechanisms or violate platform rules.

Device Authorization Binding: Ensure that the software is bound to a specified authorized device (verified via UDID), and is limited to installation and use on authorized devices.

Technical Requirements:

Legal Tools and Platform Compliance: The contractor must use legal and compliant tools to extract the IPA file. All injection and modification operations must comply with the iOS development platform's regulations, avoiding any actions that violate development specifications, cause memory leaks, crashes, or other issues.

Deliverables:

A signed and valid IPA file + installation tutorial, ensuring successful installation on the specified devices;

A "Viewpoint" feature user manual, detailing how to activate and use the feature;

A complete interoperability verification report, ensuring that the injected functionality will not affect the normal operation of the application and will not trigger any anti-fraud mechanisms.

Data Confidentiality and Security Requirements: The contractor must strictly maintain the confidentiality of all involved technical data and documents, and ensure that all related files are deleted after project completion. No related data may be retained or leaked." (client-provided description)


Matched companies (5)

...

Kiantechwise Pvt. Ltd.

Kiantechwise is a creative tech company delivering innovative web design, software solutions, branding, and digital marketing. With expertise and vis… Read more

...

Mobiweb Global Solutions

Mobiweb Global Solutions is a full-service IT company specializing in web development, mobile app development, blockchain, AI, IoT, and game developm… Read more

...

Junkies Coder

Junkies Coder is a leading technology solution provider across 15 countries and 50+ Rockstar Developers is our strength, We're specializing in web de… Read more

...

Breeze Website Designers

We create beautiful websites that grow your business. https://www.youtube.com/watch?v=haBOAGGBbE8

...

Chirag Solutions

Chirag Solutions is extending its services in website designing & development and software development. Our web and software development is committed… Read more