CN102572123A - Method for monitoring call record uploading of eavesdropping software X undercover - Google Patents

Method for monitoring call record uploading of eavesdropping software X undercover Download PDF

Info

Publication number
CN102572123A
CN102572123A CN2011104312564A CN201110431256A CN102572123A CN 102572123 A CN102572123 A CN 102572123A CN 2011104312564 A CN2011104312564 A CN 2011104312564A CN 201110431256 A CN201110431256 A CN 201110431256A CN 102572123 A CN102572123 A CN 102572123A
Authority
CN
China
Prior art keywords
program
application program
data traffic
monitoring
hook
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011104312564A
Other languages
Chinese (zh)
Other versions
CN102572123B (en
Inventor
虞忠辉
董琳
包亮
闵波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU 30RUITONG MOBILE COMMUNICATION Co Ltd
Original Assignee
CHENGDU 30RUITONG MOBILE COMMUNICATION Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU 30RUITONG MOBILE COMMUNICATION Co Ltd filed Critical CHENGDU 30RUITONG MOBILE COMMUNICATION Co Ltd
Priority to CN201110431256.4A priority Critical patent/CN102572123B/en
Publication of CN102572123A publication Critical patent/CN102572123A/en
Application granted granted Critical
Publication of CN102572123B publication Critical patent/CN102572123B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention belongs to the field of mobile phone security, and discloses a method for monitoring the call record uploading of eavesdropping software X undercover. The method specifically comprises the following steps of: registering a static broadcast receiver for receiving a call end on-hook message, starting Service monitoring and recording the data traffic of each application program after call end on-hook, judging whether the data traffic of each application program is increased after the call end on-hook or not to further judge whether any application program uploading call records is executed or not, judging whether the executed application program has a user interaction interface or not to further judge whether the executed application program is a pure background program, and if the program is the pure background program and the data traffic of the application program is increased after the call end on-hook, determining that the program is a malicious program, and starting an alarming interface. By the method, whether the application program exists or not can be directly judged, and the application program can be quickly locked.

Description

A kind of X of monitoring planted agent eavesdropping type method that the software calling record is uploaded
Technical field
The present invention relates to mobile phone and prevent to eavesdrop technical field, relate in particular to a kind of X of monitoring planted agent eavesdropping type method that the software calling record is uploaded.
Background technology
Along with increasing substantially of smart mobile phone popularity rate, smart mobile phone is when bringing convenience to us, and its safe and secret problem also highlights day by day, if smart mobile phone is mounted eavesdropping software, can carry out ambience listening to being monitored mobile phone.The eavesdropping class software that relatively spreads unchecked at present is like " X planted agent " software, in case quilt is implanted user mobile phone,
During user's communication, can dialog context be recorded, behind the end of conversation, the calling record file will be uploaded in the appointment mailbox that monitoring side is provided with in advance and gone.Can realize the whole process of this subscriber phone information is monitored.
Calling record to above-mentioned X planted agent eavesdropping type software is uploaded behavior, is necessary to study a kind of X of monitoring planted agent eavesdropping type method that the software calling record is uploaded.
Summary of the invention
Calling record to above-mentioned X planted agent eavesdropping type software is uploaded behavior, the invention discloses a kind of X of monitoring planted agent eavesdropping type method that the software calling record is uploaded.Be used on the smart mobile phone, can prevent effectively that similar calling record from uploading.Adopt receiving system telephone-broadcast mode; Detect conversation on-hook message, detect after the on-hook in the certain hour flow simultaneously and upload the process list, and combine authority to differentiate whether backstage recording behavior etc. is arranged; Differentiate and whether exist the backstage to divide into groups to send calling record behavior, prompt alarm after the discovery.
The object of the invention is realized through following technical proposals:
A kind of X of monitoring planted agent eavesdropping type method that the software calling record is uploaded; It specifically comprises following steps: register static radio receiver; Be used to receive end of conversation on-hook message; After the end of conversation on-hook, start the data traffic of Service monitoring and difference records application program; Whether increase after the end of conversation on-hook according to the application's data flow and to judge whether to exist application program that calling record is uploaded carrying out; Whether there is the user to hand over the interface, family to judge whether to be pure background program according to this application program of carrying out simultaneously,, judges that then this program is dangerous program start warning interface if this program is pure background program and this application's data flow increase after the end of conversation on-hook.
Preferably, said startup Service monitoring and respectively the application program of record be the application program that has access to netwoks and recording privilege feature.
Preferably, said startup Service monitoring and respectively the data traffic of records application program be the application program data traffic of this day.
Preferably, this program of said judgement is that dangerous program start warning interface specifically comprises: encapsulation should start the warning interface after the danger program related information, and transmitted packaging information to this interface of reporting to the police.
Preferably, after said method comprises that also the warning interface starts, add mode of vibration through jingle bell immediately and report to the police, and the program packaging information that passes over is shown through tabulation, supply the user to check.
Preferably, the said data traffic that starts Service monitoring and difference records application program in startup Service monitoring after the end of conversation on-hook and after the data traffic of records application program is to talk about the end on-hook respectively in 3 seconds.
Preferably; Saidly judge the application's data flow is specially whether increasing after the end of conversation on-hook: the monitoring in time application's data flow after the data traffic in records application program in 50 seconds; And compare with data traffic that monitors and data recorded flow, whether its data traffic increases is judged whether the application's data flow increases.
Preferably; Saidly judge the application's data flow is specially whether increasing after the end of conversation on-hook: monitoring application's data flow after the data traffic in records application program and in the blanking time of this conversation and conversation next time; And compare with data traffic that monitors and data recorded flow, whether its data traffic increases is judged whether the application's data flow increases.
Beneficial effect of the present invention: according to whether application program is arranged behind end of conversation is that carry out on pure backstage; And whether the data traffic of this backstage working procedure increases is come directly to judge whether to exist an X planted agent eavesdropping type software calling record to upload; Because if upload calling record, then data traffic is inevitable obviously increases, and just can directly judge whether to exist this application program and this application program of quick lock in through above-mentioned method; Simultaneously whether exist the user to hand over the interface, family to judge whether to be pure background program according to application program again; If application program exists the user to hand over the interface, family, then be not pure background program, otherwise then be pure background program; The application program of non-pure background program is excluded, do not influence the normal application program of using of user.
Description of drawings
Accompanying drawing 1 is the monitoring X planted agent eavesdropping type method flow diagram that the software calling record is uploaded of the present invention.
Embodiment
The monitoring X planted agent eavesdropping type method flow diagram that the software calling record is uploaded of the present invention as shown in Figure 1.The invention discloses a kind of X of monitoring planted agent eavesdropping type method that the software calling record is uploaded; It specifically comprises following steps: register static radio receiver; Be used to receive end of conversation on-hook message; After the end of conversation on-hook, start the data traffic of Service monitoring and difference records application program; Whether increase after the end of conversation on-hook according to the application's data flow and to judge whether to exist application program that calling record is uploaded carrying out; Whether there is the user to hand over the interface, family to judge whether to be pure background program according to this application program of carrying out simultaneously,, judges that then this program is dangerous program start warning interface if this program is pure background program and this application's data flow increase after the end of conversation on-hook.The method that above-mentioned monitoring calling record is uploaded is mainly receiving system telephone-broadcast mode, on-hook message detection, flow and uploads that process is judged, the process authority is judged; Get access to all flows of this time period process list of uploading and the size of uploading flow; And produced in the process that flow uploads at these and to have realized the authority coupling; Searching possesses the process of eavesdropping software authority characteristic, in case find to report to the police immediately.According to whether application program is arranged behind end of conversation is that carry out on pure backstage; And whether the data traffic of this backstage working procedure increases is come directly to judge whether to exist an X planted agent eavesdropping type software calling record to upload; Because if upload calling record, then data traffic is inevitable obviously increases, and just can directly judge whether to exist this application program and this application program of quick lock in through above-mentioned method; Simultaneously whether exist the user to hand over the interface, family to judge whether to be pure background program according to application program again; If application program exists the user to hand over the interface, family, then be not pure background program, otherwise then be pure background program; The application program of non-pure background program is excluded, do not influence the normal application program of using of user.
Preferably, above-mentioned startup Service monitoring and respectively the application program of record be the application program that has access to netwoks and recording privilege feature.Just possibly realize the calling record that intercepts is uploaded because only possess the application program of above-mentioned access to netwoks and recording privilege feature, make the range of applications of monitoring and record dwindle, improve the efficient of this method.
Preferably, above-mentioned startup Service monitoring and respectively the data traffic of records application program be the application program data traffic of this day.The data traffic numeral of minute book day is less relatively, is convenient to write down and compare.
Preferably, this program of above-mentioned judgement is that dangerous program start warning interface specifically comprises: encapsulation should start the warning interface after the danger program related information, and transmitted packaging information to this interface of reporting to the police.The quick lock in application program also is presented at it on warning interface, and being convenient to the timely processing of user should the danger program.
Preferably, after said method comprises that also the warning interface starts, add mode of vibration through jingle bell immediately and report to the police, and the program packaging information that passes over is shown through tabulation, supply the user to check.The very first time this dangerous program of notice user processing, assurance user's information security.
Preferably, the above-mentioned data traffic that starts Service monitoring and difference records application program in startup Service monitoring after the end of conversation on-hook and after the data traffic of records application program is to talk about the end on-hook respectively in 3 seconds.An X planted agent eavesdropping type software calling record upload file because file content is bigger, is difficult for preserving in that mobile phone is local, so generally after user's on-hook, spread out of on immediately.In 3 seconds, start the Service monitoring and respectively the data traffic of records application program and the data traffic in the follow-up time section comparing, whether the judgment data flow increases.
Preferably; Above-mentionedly judge the application's data flow is specially whether increasing after the end of conversation on-hook: the monitoring in time application's data flow after the data traffic in records application program in 50 seconds; And compare with data traffic that monitors and data recorded flow, whether its data traffic increases is judged whether the application's data flow increases.
Preferably; Above-mentionedly judge the application's data flow is specially whether increasing after the end of conversation on-hook: monitoring application's data flow after the data traffic in records application program and in the blanking time of this conversation and conversation next time; And compare with data traffic that monitors and data recorded flow, whether its data traffic increases is judged whether the application's data flow increases.
Given coefficient and parameter in the above embodiments; Provide to those skilled in the art and realize or use of the present invention; The present invention does not limit and only gets aforementioned disclosed numerical value, and under the situation that does not break away from invention thought of the present invention, those skilled in the art can make various modifications or adjustment to the foregoing description; Thereby protection scope of the present invention do not limit by the foregoing description, and should be the maximum magnitude that meets the inventive features that claims mention.

Claims (8)

1. monitor the X planted agent eavesdropping type method that the software calling record is uploaded for one kind; It specifically comprises following steps: register static radio receiver; Be used to receive end of conversation on-hook message; After the end of conversation on-hook, start the data traffic of Service monitoring and difference records application program; Whether increase after the end of conversation on-hook according to the application's data flow and to judge whether to exist application program that calling record is uploaded carrying out; Whether there is the user to hand over the interface, family to judge whether to be pure background program according to this application program of carrying out simultaneously,, judges that then this program is dangerous program start warning interface if this program is pure background program and this application's data flow increase after the end of conversation on-hook.
2. monitoring X as claimed in claim 1 acts as a planted agent and eavesdrops type method that the software calling record is uploaded, and it is characterized in that said startup Service monitoring and the application program that writes down respectively are to have access to netwoks and the application program of the privilege feature of recording.
3. the monitoring as claimed in claim 1 X planted agent eavesdropping type method that the software calling record is uploaded, it is characterized in that said startups Service monitors and respectively the data traffic of records application program be the application program data traffic of this day.
4. the monitoring X planted agent eavesdropping type method that the software calling record is uploaded as claimed in claim 1; It is characterized in that this program of said judgement is that dangerous program start warning interface specifically comprises: encapsulation should start the warning interface after the danger program related information, and transmitted packaging information to this interface of reporting to the police.
5. the monitoring X planted agent eavesdropping type method that the software calling record is uploaded as claimed in claim 4; After it is characterized in that said method comprises that also the warning interface starts; Add mode of vibration through jingle bell immediately and report to the police, and the program packaging information that passes over is shown through tabulation, supply the user to check.
6. like the described monitoring of any claim of the claim 1-5 X planted agent eavesdropping type method that the software calling record is uploaded, it is characterized in that said start after the end of conversation on-hook Service monitoring and respectively the data traffic of records application program start the Service monitoring and the data traffic of records application program respectively in for 3 seconds after the conversation words finish on-hook.
7. like the described monitoring of any claim of the claim 1-5 X planted agent eavesdropping type method that the software calling record is uploaded; It is characterized in that saidly judging the application's data flow is specially whether increasing after the end of conversation on-hook: the monitoring in time application's data flow after the data traffic in records application program in 50 seconds; And compare with data traffic that monitors and data recorded flow, whether its data traffic increases is judged whether the application's data flow increases.
8. like the described monitoring of any claim of the claim 1-5 X planted agent eavesdropping type method that the software calling record is uploaded; It is characterized in that saidly judging the application's data flow is specially whether increasing after the end of conversation on-hook: monitoring application's data flow after the data traffic in records application program and in the blanking time of this conversation and conversation next time; And compare with data traffic that monitors and data recorded flow, whether its data traffic increases is judged whether the application's data flow increases.
CN201110431256.4A 2011-12-21 2011-12-21 Method for monitoring call record uploading of eavesdropping software X undercover Expired - Fee Related CN102572123B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110431256.4A CN102572123B (en) 2011-12-21 2011-12-21 Method for monitoring call record uploading of eavesdropping software X undercover

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110431256.4A CN102572123B (en) 2011-12-21 2011-12-21 Method for monitoring call record uploading of eavesdropping software X undercover

Publications (2)

Publication Number Publication Date
CN102572123A true CN102572123A (en) 2012-07-11
CN102572123B CN102572123B (en) 2014-10-22

Family

ID=46416562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110431256.4A Expired - Fee Related CN102572123B (en) 2011-12-21 2011-12-21 Method for monitoring call record uploading of eavesdropping software X undercover

Country Status (1)

Country Link
CN (1) CN102572123B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103118184A (en) * 2013-01-18 2013-05-22 浙江长天信息技术有限公司 Environment recording alarm method
WO2014043876A1 (en) * 2012-09-20 2014-03-27 华为终端有限公司 Method for detecting interception behaviour and terminal device
US9137385B2 (en) 2006-11-02 2015-09-15 Digifonica (International) Limited Determining a time to permit a communications session to be conducted
US9143608B2 (en) 2006-11-29 2015-09-22 Digifonica (International) Limited Intercepting voice over IP communications and other data communications
US9154417B2 (en) 2009-09-17 2015-10-06 Digifonica (International) Limited Uninterrupted transmission of internet protocol transmissions during endpoint changes
CN105721492A (en) * 2016-03-25 2016-06-29 宇龙计算机通信科技(深圳)有限公司 Voice processing method and apparatus and terminal
CN106203098A (en) * 2016-07-14 2016-12-07 中国科学院信息工程研究所 Application layer eavesdropping means of defence and device
US9565307B2 (en) 2007-03-26 2017-02-07 Voip-Pal.Com, Inc. Emergency assistance calling for voice over IP communications systems
US10880721B2 (en) 2008-07-28 2020-12-29 Voip-Pal.Com, Inc. Mobile gateway

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1414190A1 (en) * 2002-10-22 2004-04-28 Alcatel Method and system for informing a user about a WLAN accessibility
CN101584150A (en) * 2006-11-29 2009-11-18 迪吉福尼卡(国际)有限公司 Intercepting voice over IP communications and other data communications
CN102110220A (en) * 2011-02-14 2011-06-29 宇龙计算机通信科技(深圳)有限公司 Application program monitoring method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1414190A1 (en) * 2002-10-22 2004-04-28 Alcatel Method and system for informing a user about a WLAN accessibility
CN101584150A (en) * 2006-11-29 2009-11-18 迪吉福尼卡(国际)有限公司 Intercepting voice over IP communications and other data communications
CN102110220A (en) * 2011-02-14 2011-06-29 宇龙计算机通信科技(深圳)有限公司 Application program monitoring method and device

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9537762B2 (en) 2006-11-02 2017-01-03 Voip-Pal.Com, Inc. Producing routing messages for voice over IP communications
US11171864B2 (en) 2006-11-02 2021-11-09 Voip-Pal.Com, Inc. Determining a time to permit a communications session to be conducted
US10218606B2 (en) 2006-11-02 2019-02-26 Voip-Pal.Com, Inc. Producing routing messages for voice over IP communications
US9998363B2 (en) 2006-11-02 2018-06-12 Voip-Pal.Com, Inc. Allocating charges for communications services
US9948549B2 (en) 2006-11-02 2018-04-17 Voip-Pal.Com, Inc. Producing routing messages for voice over IP communications
US9935872B2 (en) 2006-11-02 2018-04-03 Voip-Pal.Com, Inc. Producing routing messages for voice over IP communications
US9137385B2 (en) 2006-11-02 2015-09-15 Digifonica (International) Limited Determining a time to permit a communications session to be conducted
US9826002B2 (en) 2006-11-02 2017-11-21 Voip-Pal.Com, Inc. Producing routing messages for voice over IP communications
US9813330B2 (en) 2006-11-02 2017-11-07 Voip-Pal.Com, Inc. Producing routing messages for voice over IP communications
US9179005B2 (en) 2006-11-02 2015-11-03 Digifonica (International) Limited Producing routing messages for voice over IP communications
US9143608B2 (en) 2006-11-29 2015-09-22 Digifonica (International) Limited Intercepting voice over IP communications and other data communications
US9549071B2 (en) 2006-11-29 2017-01-17 Voip-Pal.Com, Inc. Intercepting voice over IP communications and other data communications
US10038779B2 (en) 2006-11-29 2018-07-31 Voip-Pal.Com, Inc. Intercepting voice over IP communications and other data communications
US9565307B2 (en) 2007-03-26 2017-02-07 Voip-Pal.Com, Inc. Emergency assistance calling for voice over IP communications systems
US11172064B2 (en) 2007-03-26 2021-11-09 Voip-Pal.Com, Inc. Emergency assistance calling for voice over IP communications systems
US10880721B2 (en) 2008-07-28 2020-12-29 Voip-Pal.Com, Inc. Mobile gateway
US10021729B2 (en) 2009-09-17 2018-07-10 Voip-Pal.Com, Inc. Uninterrupted transmission of internet protocol transmissions during endpoint changes
US9154417B2 (en) 2009-09-17 2015-10-06 Digifonica (International) Limited Uninterrupted transmission of internet protocol transmissions during endpoint changes
US10932317B2 (en) 2009-09-17 2021-02-23 VolP-Pal.com, Inc. Uninterrupted transmission of internet protocol transmissions during endpoint changes
US9740861B2 (en) 2012-09-20 2017-08-22 Huawei Device Co., Ltd. Method for detecting eavesdropping activity and terminal device
JP2014534712A (en) * 2012-09-20 2014-12-18 ▲華▼▲為▼終端有限公司Huawei Device Co., Ltd. Method and terminal device for detecting eavesdropping activity
EP2728918A4 (en) * 2012-09-20 2014-10-29 Huawei Device Co Ltd Method for detecting interception behaviour and terminal device
EP2988472A1 (en) * 2012-09-20 2016-02-24 Huawei Device Co., Ltd. Method for detecting eavesdropping activity and terminal device
EP2728918A1 (en) * 2012-09-20 2014-05-07 Huawei Device Co., Ltd. Method for detecting interception behaviour and terminal device
WO2014043876A1 (en) * 2012-09-20 2014-03-27 华为终端有限公司 Method for detecting interception behaviour and terminal device
CN103118184B (en) * 2013-01-18 2015-01-14 浙江长天信息技术有限公司 Environment recording alarm method
CN103118184A (en) * 2013-01-18 2013-05-22 浙江长天信息技术有限公司 Environment recording alarm method
CN105721492B (en) * 2016-03-25 2019-10-11 宇龙计算机通信科技(深圳)有限公司 A kind of method, apparatus and terminal of speech processes
CN105721492A (en) * 2016-03-25 2016-06-29 宇龙计算机通信科技(深圳)有限公司 Voice processing method and apparatus and terminal
CN106203098A (en) * 2016-07-14 2016-12-07 中国科学院信息工程研究所 Application layer eavesdropping means of defence and device

Also Published As

Publication number Publication date
CN102572123B (en) 2014-10-22

Similar Documents

Publication Publication Date Title
CN102572123B (en) Method for monitoring call record uploading of eavesdropping software X undercover
JP5001380B2 (en) Apparatus and method for locating, tracking and / or recovering wireless communication devices
Greenwald NSA collecting phone records of millions of Verizon customers daily
CN101518111B (en) Terminal apparatus, device, unauthorized use preventing system, unauthorized use preventing method, and program
CA2526755A1 (en) Ip phone intruder security monitoring system
CN101179802A (en) Communication equipment, network appliance and alarm method
CN101400163B (en) Method for preventing unauthorized use of mobile phone and mobile phone thereof
CN202167123U (en) Security system
US20090251318A1 (en) Anti-theft system of mobile device
US20150213708A1 (en) Apparatus and methods for tracking in wireless communication systems in response to an activation event
CN103544435A (en) Method and device for preventing secret photography
WO2013175741A1 (en) Apparatus and method for transmitting messages
AU2010220798A8 (en) Automatic control of a security protection mode of an electronic device
CN104506711A (en) Communication information processing method and device for terminal
CN101309479A (en) Anti-theft mobile terminal and anti-theft method
WO2005089242A3 (en) System and method for client-server-based wireless intrusion detection
CN102546897B (en) Method for preventing X undercover interception software from environment monitoring
CN101640722A (en) Mobile phone with safety protection function and safety protection method thereof
CN105162973A (en) Equipment loss prevention method based on Bluetooth technology
CN102185922A (en) Point-to-point access method for wireless IoT (Internet of Things) video monitoring terminal based on 2.5G communication and handset mailbox
US20090111439A1 (en) System and method for monitoring a monitored mobile phone
CN101232677A (en) Method and apparatus for start-up logging of mobile terminal
WO2015188500A1 (en) Text monitoring method and device
CN103150243A (en) Monitoring method for application program of mobile terminal
CN101332804B (en) Vehicle alarm system and method and system combination-controlled by Internet

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20141022

Termination date: 20211221