Movatterモバイル変換


[0]ホーム

URL:


CN102572123B - Method for monitoring call record uploading of eavesdropping software X undercover - Google Patents

Method for monitoring call record uploading of eavesdropping software X undercover
Download PDF

Info

Publication number
CN102572123B
CN102572123BCN201110431256.4ACN201110431256ACN102572123BCN 102572123 BCN102572123 BCN 102572123BCN 201110431256 ACN201110431256 ACN 201110431256ACN 102572123 BCN102572123 BCN 102572123B
Authority
CN
China
Prior art keywords
application program
data traffic
program
monitoring
hook
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110431256.4A
Other languages
Chinese (zh)
Other versions
CN102572123A (en
Inventor
虞忠辉
董琳
包亮
闵波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU 30RUITONG MOBILE COMMUNICATION Co Ltd
Original Assignee
CHENGDU 30RUITONG MOBILE COMMUNICATION Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU 30RUITONG MOBILE COMMUNICATION Co LtdfiledCriticalCHENGDU 30RUITONG MOBILE COMMUNICATION Co Ltd
Priority to CN201110431256.4ApriorityCriticalpatent/CN102572123B/en
Publication of CN102572123ApublicationCriticalpatent/CN102572123A/en
Application grantedgrantedCritical
Publication of CN102572123BpublicationCriticalpatent/CN102572123B/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Landscapes

Abstract

The invention belongs to the field of mobile phone security, and discloses a method for monitoring the call record uploading of eavesdropping software X undercover. The method specifically comprises the following steps of: registering a static broadcast receiver for receiving a call end on-hook message, starting Service monitoring and recording the data traffic of each application program after call end on-hook, judging whether the data traffic of each application program is increased after the call end on-hook or not to further judge whether any application program uploading call records is executed or not, judging whether the executed application program has a user interaction interface or not to further judge whether the executed application program is a pure background program, and if the program is the pure background program and the data traffic of the application program is increased after the call end on-hook, determining that the program is a malicious program, and starting an alarming interface. By the method, whether the application program exists or not can be directly judged, and the application program can be quickly locked.

Description

A kind of method that the X of monitoring planted agent wiretapping type software calling record is uploaded
Technical field
The present invention relates to mobile phone and prevent Eavesdropping field, relate in particular to a kind of method that the X of monitoring planted agent wiretapping type software calling record is uploaded.
Background technology
Along with increasing substantially of smart mobile phone popularity rate, smart mobile phone is when bringing convenience to us, and its safe and secret problem also highlights day by day, if smart mobile phone is mounted eavesdropping software, can carry out ambience listening to monitored mobile phone.The wiretapping type software relatively spreading unchecked is at present as " X planted agent " software, once implanted user mobile phone,
During user's communication, dialog context can be recorded, after end of conversation, calling record file goes be uploaded in the appointment mailbox that monitoring side arranges in advance.Can realize the whole process of this subscriber phone information is monitored.
Calling record for above-mentioned X planted agent wiretapping type software is uploaded behavior, is necessary to study a kind of method that the X of monitoring planted agent wiretapping type software calling record is uploaded.
Summary of the invention
Calling record for above-mentioned X planted agent wiretapping type software is uploaded behavior, the invention discloses a kind of method that the X of monitoring planted agent wiretapping type software calling record is uploaded.Be used on smart mobile phone, can effectively prevent that similar calling record from uploading.Adopt receiving system telephone-broadcast mode, detect call on-hook message, detect after on-hook flow in certain hour simultaneously and upload process list, and differentiate whether there is backstage recording behavior etc. in conjunction with authority, differentiate and whether exist backstage grouping to send calling record behavior, prompt alarm after finding.
Object of the present invention realizes by following technical proposals:
A kind of method that the X of monitoring planted agent wiretapping type software calling record is uploaded, it specifically comprises following steps: register static radio receiver, be used for receiving end of conversation on-hook message, after end of conversation on-hook, start the data traffic that Service monitored and distinguished records application program, according to the data traffic of application program, after end of conversation on-hook, whether increase to judge whether to exist the application program that calling record is uploaded carrying out, according to this application program of carrying out, whether there is user to hand over interface, family to determine whether pure background program simultaneously, if this program be pure background program and after end of conversation on-hook the data traffic of this application program increase, judge that this program starts warning interface as dangerous program.
Preferably, the application program that described startup Service monitors and records is respectively the application program that has access to netwoks and recording privilege feature.
Preferably, described startup Service monitoring and respectively the data traffic of records application program be the application program data traffic of this day.
Preferably, describedly judge that this program starts warning interface as dangerous program and specifically comprises: after encapsulating this danger program related information, start warning interface, and transmit packaging information to this interface of reporting to the police.
Preferably, described method adds mode of vibration by jingle bell immediately and reports to the police, and the program packaging information passing over is shown by list after also comprising that warning interface starts, and for user, checks.
Preferably, described after end of conversation on-hook, start Service monitoring and respectively the data traffic of records application program in 3 seconds after call words finish on-hook, start the data traffic that Service monitored and distinguished records application program.
Preferably, describedly judge whether the data traffic of application program increases and be specially after end of conversation on-hook: the data traffic of the monitoring in time application program after the data traffic of records application program in 50 seconds, and compare by the data traffic of the data traffic monitoring and record, whether its data traffic increases to judge whether the data traffic of application program increases.
Preferably, describedly judge whether the data traffic of application program increases and be specially after end of conversation on-hook: the data traffic of monitoring and measuring application program after the data traffic of records application program and within the interval time of this call and call next time, and compare by the data traffic of the data traffic monitoring and record, whether its data traffic increases to judge whether the data traffic of application program increases.
Beneficial effect of the present invention: be that carry out on pure backstage according to whether there is application program after end of conversation, and whether the data traffic of this backstage working procedure increases directly judges whether to exist X planted agent wiretapping type software calling record to upload, because if upload calling record, data traffic is inevitable obviously increases, by above-mentioned method, just can directly judge whether to exist this application program this application program of quick lock in, according to application program, whether exist user to hand over interface, family to determine whether pure background program again simultaneously, if application program exists user to hand over interface, family, it is not pure background program, otherwise be pure background program, the application program of non-pure background program is excluded, do not affect the normal application program of using of user.
Accompanying drawing explanation
The method flow diagram that accompanying drawing 1 is uploaded for monitoring X planted agent wiretapping type software calling record of the present invention.
Embodiment
The method flow diagram that monitoring X planted agent wiretapping type software calling record of the present invention is uploaded as shown in Figure 1.The invention discloses a kind of method that the X of monitoring planted agent wiretapping type software calling record is uploaded, it specifically comprises following steps: register static radio receiver, be used for receiving end of conversation on-hook message, after end of conversation on-hook, start the data traffic that Service monitored and distinguished records application program, according to the data traffic of application program, after end of conversation on-hook, whether increase to judge whether to exist the application program that calling record is uploaded carrying out, according to this application program of carrying out, whether there is user to hand over interface, family to determine whether pure background program simultaneously, if this program be pure background program and after end of conversation on-hook the data traffic of this application program increase, judge that this program starts warning interface as dangerous program.The method that above-mentioned monitoring calling record is uploaded is mainly receiving system telephone-broadcast mode, on-hook message detection, flow and uploads process judgement, the judgement of process authority, get all flows of this time period the process list of uploading and the size of uploading flow, and produced in the process that flow uploads and realized permission match at these, searching possesses the process of eavesdropping software authority feature, once find to report to the police immediately.According to whether there is application program after end of conversation, be that carry out on pure backstage, and whether the data traffic of this backstage working procedure increases directly judges whether to exist X planted agent wiretapping type software calling record to upload, because if upload calling record, data traffic is inevitable obviously increases, by above-mentioned method, just can directly judge whether to exist this application program this application program of quick lock in, according to application program, whether exist user to hand over interface, family to determine whether pure background program again simultaneously, if application program exists user to hand over interface, family, it is not pure background program, otherwise be pure background program, the application program of non-pure background program is excluded, do not affect the normal application program of using of user.
Preferably, the application program that above-mentioned startup Service monitors and records is respectively the application program that has access to netwoks and recording privilege feature.Because only possess the application program of above-mentioned access to netwoks and recording privilege feature, just may realize the calling record intercepting is uploaded, the range of applications of monitoring and record is dwindled, improve the efficiency of this method.
Preferably, above-mentioned startup Service monitoring and respectively the data traffic of records application program be the application program data traffic of this day.The data traffic numeral of minute book day is relatively little, is convenient to record and compares.
Preferably, above-mentionedly judge that this program starts warning interface as dangerous program and specifically comprises: after encapsulating this danger program related information, start warning interface, and transmit packaging information to this interface of reporting to the police.Quick lock in application program is also presented on warning interface, is convenient to user and processes in time this danger program.
Preferably, said method adds mode of vibration by jingle bell immediately and reports to the police, and the program packaging information passing over is shown by list after also comprising that warning interface starts, and for user, checks.The very first time notifies user to process this dangerous program, guarantees user's information security.
Preferably, above-mentioned after end of conversation on-hook, start Service monitoring and respectively the data traffic of records application program in 3 seconds after call words finish on-hook, start the data traffic that Service monitored and distinguished records application program.The upload file of X planted agent wiretapping type software calling record, because file content is larger, is difficult for preserving mobile phone is local, so generally after user's on-hook, spread out of on immediately.In 3 seconds, start Service monitoring and respectively the data traffic of records application program and the data traffic in follow-up time section comparing, judge whether data traffic increases.
Preferably, above-mentionedly judge whether the data traffic of application program increases and be specially after end of conversation on-hook: the data traffic of the monitoring in time application program after the data traffic of records application program in 50 seconds, and compare by the data traffic of the data traffic monitoring and record, whether its data traffic increases to judge whether the data traffic of application program increases.
Preferably, above-mentionedly judge whether the data traffic of application program increases and be specially after end of conversation on-hook: the data traffic of monitoring and measuring application program after the data traffic of records application program and within the interval time of this call and call next time, and compare by the data traffic of the data traffic monitoring and record, whether its data traffic increases to judge whether the data traffic of application program increases.
Given coefficient and parameter in the above embodiments; be to provide to those skilled in the art and realize or use of the present invention; the present invention does not limit and only gets aforementioned disclosed numerical value; without departing from the present invention in the case of the inventive idea; those skilled in the art can make various modifications or adjustment to above-described embodiment; thereby protection scope of the present invention do not limit by above-described embodiment, and it should be the maximum magnitude that meets the inventive features that claims mention.

Claims (8)

1. monitor the method that X planted agent wiretapping type software calling record is uploaded for one kind, it specifically comprises following steps: register static radio receiver, be used for receiving end of conversation on-hook message, after end of conversation on-hook, start the data traffic that Service monitored and distinguished records application program, according to the data traffic of application program, after end of conversation on-hook, whether increase to judge whether to exist the application program that calling record is uploaded carrying out, according to this application program of carrying out, whether there is user to hand over interface, family to determine whether pure background program simultaneously, if this program be pure background program and after end of conversation on-hook the data traffic of this application program increase, judge that this program starts warning interface as dangerous program, the method that above-mentioned monitoring calling record is uploaded is mainly receiving system telephone-broadcast mode, on-hook message detection, flow and uploads process judgement, the judgement of process authority, get all flows of this time period the process list of uploading and the size of uploading flow, and produced in the process that flow uploads and realized permission match at these, searching possesses the process of eavesdropping software authority feature, once find to report to the police immediately.
CN201110431256.4A2011-12-212011-12-21Method for monitoring call record uploading of eavesdropping software X undercoverExpired - Fee RelatedCN102572123B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201110431256.4ACN102572123B (en)2011-12-212011-12-21Method for monitoring call record uploading of eavesdropping software X undercover

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201110431256.4ACN102572123B (en)2011-12-212011-12-21Method for monitoring call record uploading of eavesdropping software X undercover

Publications (2)

Publication NumberPublication Date
CN102572123A CN102572123A (en)2012-07-11
CN102572123Btrue CN102572123B (en)2014-10-22

Family

ID=46416562

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201110431256.4AExpired - Fee RelatedCN102572123B (en)2011-12-212011-12-21Method for monitoring call record uploading of eavesdropping software X undercover

Country Status (1)

CountryLink
CN (1)CN102572123B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CA3045681C (en)2006-11-022021-10-12Voip-Pal.Com, Inc.Producing routing messages for voice over ip communications
KR20090095621A (en)2006-11-292009-09-09디지포니카 (인터내셔널) 리미티드Intercepting voice over ip communications and other data communications
CA2681984C (en)2007-03-262019-04-02Digifonica (International) LimitedEmergency assistance calling for voice over ip communications systems
US8630234B2 (en)2008-07-282014-01-14Digifonica (International) LimitedMobile gateway
PL2478678T3 (en)2009-09-172016-05-31Digifonica Int LtdUninterrupted transmission of internet protocol transmissions during endpoint changes
EP2988472B1 (en)*2012-09-202017-03-29Huawei Device Co., Ltd.Method for detecting eavesdropping activity and terminal device
CN103118184B (en)*2013-01-182015-01-14浙江长天信息技术有限公司Environment recording alarm method
CN105721492B (en)*2016-03-252019-10-11宇龙计算机通信科技(深圳)有限公司 Method, device and terminal for voice processing
CN106203098A (en)*2016-07-142016-12-07中国科学院信息工程研究所Application layer eavesdropping means of defence and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP1414190A1 (en)*2002-10-222004-04-28AlcatelMethod and system for informing a user about a WLAN accessibility
CN101584150A (en)*2006-11-292009-11-18迪吉福尼卡(国际)有限公司Intercepting voice over IP communications and other data communications
CN102110220A (en)*2011-02-142011-06-29宇龙计算机通信科技(深圳)有限公司Application program monitoring method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP1414190A1 (en)*2002-10-222004-04-28AlcatelMethod and system for informing a user about a WLAN accessibility
CN101584150A (en)*2006-11-292009-11-18迪吉福尼卡(国际)有限公司Intercepting voice over IP communications and other data communications
CN102110220A (en)*2011-02-142011-06-29宇龙计算机通信科技(深圳)有限公司Application program monitoring method and device

Also Published As

Publication numberPublication date
CN102572123A (en)2012-07-11

Similar Documents

PublicationPublication DateTitle
CN102572123B (en)Method for monitoring call record uploading of eavesdropping software X undercover
JP5001380B2 (en) Apparatus and method for locating, tracking and / or recovering wireless communication devices
CN101141721B (en)Safety mobile telephone based communication custom
CN101548506B (en) Devices and Security Nodes for Determining Security Attacks
EP2728918B1 (en)Method for detecting interception behaviour and terminal device
CN104135717B (en)A kind of calling for help and emergency method based on mobile phone
US9544773B2 (en)System and method for enforcing communication policies
US20150213708A1 (en)Apparatus and methods for tracking in wireless communication systems in response to an activation event
US20090251318A1 (en)Anti-theft system of mobile device
US9866665B2 (en)Method for operating a communication system, and communication system
CN101257688A (en)Anti-theft mobile phone and implementing method thereof
CN103680089B (en)Video monitoring police service linkage system
CN102185922A (en)Point-to-point access method for wireless IoT (Internet of Things) video monitoring terminal based on 2.5G communication and handset mailbox
CN102186166A (en)Method for preventing environmental monitoring and environmental sound-recording based on Bluetooth technology
CN102546897A (en)Method for preventing X undercover interception software from environment monitoring
EP2193676A1 (en)Mobile phone location and data security
US20090111439A1 (en)System and method for monitoring a monitored mobile phone
CN102438263A (en)Wireless router with voice alarm function
KR101660534B1 (en)A method for protecting personal information in audience measurement of the digital broadcasting system
CN101232677A (en)Method and apparatus for start-up logging of mobile terminal
WO2015188500A1 (en)Text monitoring method and device
PL2220625T3 (en)Method for the reliable and targeted suppression of alarms in a monitoring and control centre
WO2005089242A3 (en)System and method for client-server-based wireless intrusion detection
CN107517458B (en)Tracking determination method and device, and terminal
CA2986595C (en)Capturing data from a mobile device in an off-network environment

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C14Grant of patent or utility model
GR01Patent grant
CF01Termination of patent right due to non-payment of annual fee
CF01Termination of patent right due to non-payment of annual fee

Granted publication date:20141022

Termination date:20211221


[8]ページ先頭

©2009-2025 Movatter.jp