CN102572123A - Method for monitoring call record uploading of eavesdropping software X undercover - Google Patents
Method for monitoring call record uploading of eavesdropping software X undercover Download PDFInfo
- Publication number
- CN102572123A CN102572123A CN2011104312564A CN201110431256A CN102572123A CN 102572123 A CN102572123 A CN 102572123A CN 2011104312564 A CN2011104312564 A CN 2011104312564A CN 201110431256 A CN201110431256 A CN 201110431256A CN 102572123 A CN102572123 A CN 102572123A
- Authority
- CN
- China
- Prior art keywords
- program
- application program
- data traffic
- monitoring
- hook
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention belongs to the field of mobile phone security, and discloses a method for monitoring the call record uploading of eavesdropping software X undercover. The method specifically comprises the following steps of: registering a static broadcast receiver for receiving a call end on-hook message, starting Service monitoring and recording the data traffic of each application program after call end on-hook, judging whether the data traffic of each application program is increased after the call end on-hook or not to further judge whether any application program uploading call records is executed or not, judging whether the executed application program has a user interaction interface or not to further judge whether the executed application program is a pure background program, and if the program is the pure background program and the data traffic of the application program is increased after the call end on-hook, determining that the program is a malicious program, and starting an alarming interface. By the method, whether the application program exists or not can be directly judged, and the application program can be quickly locked.
Description
Technical field
The present invention relates to mobile phone and prevent to eavesdrop technical field, relate in particular to a kind of X of monitoring planted agent eavesdropping type method that the software calling record is uploaded.
Background technology
Along with increasing substantially of smart mobile phone popularity rate, smart mobile phone is when bringing convenience to us, and its safe and secret problem also highlights day by day, if smart mobile phone is mounted eavesdropping software, can carry out ambience listening to being monitored mobile phone.The eavesdropping class software that relatively spreads unchecked at present is like " X planted agent " software, in case quilt is implanted user mobile phone,
During user's communication, can dialog context be recorded, behind the end of conversation, the calling record file will be uploaded in the appointment mailbox that monitoring side is provided with in advance and gone.Can realize the whole process of this subscriber phone information is monitored.
Calling record to above-mentioned X planted agent eavesdropping type software is uploaded behavior, is necessary to study a kind of X of monitoring planted agent eavesdropping type method that the software calling record is uploaded.
Summary of the invention
Calling record to above-mentioned X planted agent eavesdropping type software is uploaded behavior, the invention discloses a kind of X of monitoring planted agent eavesdropping type method that the software calling record is uploaded.Be used on the smart mobile phone, can prevent effectively that similar calling record from uploading.Adopt receiving system telephone-broadcast mode; Detect conversation on-hook message, detect after the on-hook in the certain hour flow simultaneously and upload the process list, and combine authority to differentiate whether backstage recording behavior etc. is arranged; Differentiate and whether exist the backstage to divide into groups to send calling record behavior, prompt alarm after the discovery.
The object of the invention is realized through following technical proposals:
A kind of X of monitoring planted agent eavesdropping type method that the software calling record is uploaded; It specifically comprises following steps: register static radio receiver; Be used to receive end of conversation on-hook message; After the end of conversation on-hook, start the data traffic of Service monitoring and difference records application program; Whether increase after the end of conversation on-hook according to the application's data flow and to judge whether to exist application program that calling record is uploaded carrying out; Whether there is the user to hand over the interface, family to judge whether to be pure background program according to this application program of carrying out simultaneously,, judges that then this program is dangerous program start warning interface if this program is pure background program and this application's data flow increase after the end of conversation on-hook.
Preferably, said startup Service monitoring and respectively the application program of record be the application program that has access to netwoks and recording privilege feature.
Preferably, said startup Service monitoring and respectively the data traffic of records application program be the application program data traffic of this day.
Preferably, this program of said judgement is that dangerous program start warning interface specifically comprises: encapsulation should start the warning interface after the danger program related information, and transmitted packaging information to this interface of reporting to the police.
Preferably, after said method comprises that also the warning interface starts, add mode of vibration through jingle bell immediately and report to the police, and the program packaging information that passes over is shown through tabulation, supply the user to check.
Preferably, the said data traffic that starts Service monitoring and difference records application program in startup Service monitoring after the end of conversation on-hook and after the data traffic of records application program is to talk about the end on-hook respectively in 3 seconds.
Preferably; Saidly judge the application's data flow is specially whether increasing after the end of conversation on-hook: the monitoring in time application's data flow after the data traffic in records application program in 50 seconds; And compare with data traffic that monitors and data recorded flow, whether its data traffic increases is judged whether the application's data flow increases.
Preferably; Saidly judge the application's data flow is specially whether increasing after the end of conversation on-hook: monitoring application's data flow after the data traffic in records application program and in the blanking time of this conversation and conversation next time; And compare with data traffic that monitors and data recorded flow, whether its data traffic increases is judged whether the application's data flow increases.
Beneficial effect of the present invention: according to whether application program is arranged behind end of conversation is that carry out on pure backstage; And whether the data traffic of this backstage working procedure increases is come directly to judge whether to exist an X planted agent eavesdropping type software calling record to upload; Because if upload calling record, then data traffic is inevitable obviously increases, and just can directly judge whether to exist this application program and this application program of quick lock in through above-mentioned method; Simultaneously whether exist the user to hand over the interface, family to judge whether to be pure background program according to application program again; If application program exists the user to hand over the interface, family, then be not pure background program, otherwise then be pure background program; The application program of non-pure background program is excluded, do not influence the normal application program of using of user.
Description of drawings
Accompanying drawing 1 is the monitoring X planted agent eavesdropping type method flow diagram that the software calling record is uploaded of the present invention.
Embodiment
The monitoring X planted agent eavesdropping type method flow diagram that the software calling record is uploaded of the present invention as shown in Figure 1.The invention discloses a kind of X of monitoring planted agent eavesdropping type method that the software calling record is uploaded; It specifically comprises following steps: register static radio receiver; Be used to receive end of conversation on-hook message; After the end of conversation on-hook, start the data traffic of Service monitoring and difference records application program; Whether increase after the end of conversation on-hook according to the application's data flow and to judge whether to exist application program that calling record is uploaded carrying out; Whether there is the user to hand over the interface, family to judge whether to be pure background program according to this application program of carrying out simultaneously,, judges that then this program is dangerous program start warning interface if this program is pure background program and this application's data flow increase after the end of conversation on-hook.The method that above-mentioned monitoring calling record is uploaded is mainly receiving system telephone-broadcast mode, on-hook message detection, flow and uploads that process is judged, the process authority is judged; Get access to all flows of this time period process list of uploading and the size of uploading flow; And produced in the process that flow uploads at these and to have realized the authority coupling; Searching possesses the process of eavesdropping software authority characteristic, in case find to report to the police immediately.According to whether application program is arranged behind end of conversation is that carry out on pure backstage; And whether the data traffic of this backstage working procedure increases is come directly to judge whether to exist an X planted agent eavesdropping type software calling record to upload; Because if upload calling record, then data traffic is inevitable obviously increases, and just can directly judge whether to exist this application program and this application program of quick lock in through above-mentioned method; Simultaneously whether exist the user to hand over the interface, family to judge whether to be pure background program according to application program again; If application program exists the user to hand over the interface, family, then be not pure background program, otherwise then be pure background program; The application program of non-pure background program is excluded, do not influence the normal application program of using of user.
Preferably, above-mentioned startup Service monitoring and respectively the application program of record be the application program that has access to netwoks and recording privilege feature.Just possibly realize the calling record that intercepts is uploaded because only possess the application program of above-mentioned access to netwoks and recording privilege feature, make the range of applications of monitoring and record dwindle, improve the efficient of this method.
Preferably, above-mentioned startup Service monitoring and respectively the data traffic of records application program be the application program data traffic of this day.The data traffic numeral of minute book day is less relatively, is convenient to write down and compare.
Preferably, this program of above-mentioned judgement is that dangerous program start warning interface specifically comprises: encapsulation should start the warning interface after the danger program related information, and transmitted packaging information to this interface of reporting to the police.The quick lock in application program also is presented at it on warning interface, and being convenient to the timely processing of user should the danger program.
Preferably, after said method comprises that also the warning interface starts, add mode of vibration through jingle bell immediately and report to the police, and the program packaging information that passes over is shown through tabulation, supply the user to check.The very first time this dangerous program of notice user processing, assurance user's information security.
Preferably, the above-mentioned data traffic that starts Service monitoring and difference records application program in startup Service monitoring after the end of conversation on-hook and after the data traffic of records application program is to talk about the end on-hook respectively in 3 seconds.An X planted agent eavesdropping type software calling record upload file because file content is bigger, is difficult for preserving in that mobile phone is local, so generally after user's on-hook, spread out of on immediately.In 3 seconds, start the Service monitoring and respectively the data traffic of records application program and the data traffic in the follow-up time section comparing, whether the judgment data flow increases.
Preferably; Above-mentionedly judge the application's data flow is specially whether increasing after the end of conversation on-hook: the monitoring in time application's data flow after the data traffic in records application program in 50 seconds; And compare with data traffic that monitors and data recorded flow, whether its data traffic increases is judged whether the application's data flow increases.
Preferably; Above-mentionedly judge the application's data flow is specially whether increasing after the end of conversation on-hook: monitoring application's data flow after the data traffic in records application program and in the blanking time of this conversation and conversation next time; And compare with data traffic that monitors and data recorded flow, whether its data traffic increases is judged whether the application's data flow increases.
Given coefficient and parameter in the above embodiments; Provide to those skilled in the art and realize or use of the present invention; The present invention does not limit and only gets aforementioned disclosed numerical value, and under the situation that does not break away from invention thought of the present invention, those skilled in the art can make various modifications or adjustment to the foregoing description; Thereby protection scope of the present invention do not limit by the foregoing description, and should be the maximum magnitude that meets the inventive features that claims mention.
Claims (8)
1. monitor the X planted agent eavesdropping type method that the software calling record is uploaded for one kind; It specifically comprises following steps: register static radio receiver; Be used to receive end of conversation on-hook message; After the end of conversation on-hook, start the data traffic of Service monitoring and difference records application program; Whether increase after the end of conversation on-hook according to the application's data flow and to judge whether to exist application program that calling record is uploaded carrying out; Whether there is the user to hand over the interface, family to judge whether to be pure background program according to this application program of carrying out simultaneously,, judges that then this program is dangerous program start warning interface if this program is pure background program and this application's data flow increase after the end of conversation on-hook.
2. monitoring X as claimed in claim 1 acts as a planted agent and eavesdrops type method that the software calling record is uploaded, and it is characterized in that said startup Service monitoring and the application program that writes down respectively are to have access to netwoks and the application program of the privilege feature of recording.
3. the monitoring as claimed in claim 1 X planted agent eavesdropping type method that the software calling record is uploaded, it is characterized in that said startups Service monitors and respectively the data traffic of records application program be the application program data traffic of this day.
4. the monitoring X planted agent eavesdropping type method that the software calling record is uploaded as claimed in claim 1; It is characterized in that this program of said judgement is that dangerous program start warning interface specifically comprises: encapsulation should start the warning interface after the danger program related information, and transmitted packaging information to this interface of reporting to the police.
5. the monitoring X planted agent eavesdropping type method that the software calling record is uploaded as claimed in claim 4; After it is characterized in that said method comprises that also the warning interface starts; Add mode of vibration through jingle bell immediately and report to the police, and the program packaging information that passes over is shown through tabulation, supply the user to check.
6. like the described monitoring of any claim of the claim 1-5 X planted agent eavesdropping type method that the software calling record is uploaded, it is characterized in that said start after the end of conversation on-hook Service monitoring and respectively the data traffic of records application program start the Service monitoring and the data traffic of records application program respectively in for 3 seconds after the conversation words finish on-hook.
7. like the described monitoring of any claim of the claim 1-5 X planted agent eavesdropping type method that the software calling record is uploaded; It is characterized in that saidly judging the application's data flow is specially whether increasing after the end of conversation on-hook: the monitoring in time application's data flow after the data traffic in records application program in 50 seconds; And compare with data traffic that monitors and data recorded flow, whether its data traffic increases is judged whether the application's data flow increases.
8. like the described monitoring of any claim of the claim 1-5 X planted agent eavesdropping type method that the software calling record is uploaded; It is characterized in that saidly judging the application's data flow is specially whether increasing after the end of conversation on-hook: monitoring application's data flow after the data traffic in records application program and in the blanking time of this conversation and conversation next time; And compare with data traffic that monitors and data recorded flow, whether its data traffic increases is judged whether the application's data flow increases.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110431256.4A CN102572123B (en) | 2011-12-21 | 2011-12-21 | Method for monitoring call record uploading of eavesdropping software X undercover |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110431256.4A CN102572123B (en) | 2011-12-21 | 2011-12-21 | Method for monitoring call record uploading of eavesdropping software X undercover |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102572123A true CN102572123A (en) | 2012-07-11 |
CN102572123B CN102572123B (en) | 2014-10-22 |
Family
ID=46416562
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110431256.4A Expired - Fee Related CN102572123B (en) | 2011-12-21 | 2011-12-21 | Method for monitoring call record uploading of eavesdropping software X undercover |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102572123B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103118184A (en) * | 2013-01-18 | 2013-05-22 | 浙江长天信息技术有限公司 | Environment recording alarm method |
WO2014043876A1 (en) * | 2012-09-20 | 2014-03-27 | 华为终端有限公司 | Method for detecting interception behaviour and terminal device |
US9137385B2 (en) | 2006-11-02 | 2015-09-15 | Digifonica (International) Limited | Determining a time to permit a communications session to be conducted |
US9143608B2 (en) | 2006-11-29 | 2015-09-22 | Digifonica (International) Limited | Intercepting voice over IP communications and other data communications |
US9154417B2 (en) | 2009-09-17 | 2015-10-06 | Digifonica (International) Limited | Uninterrupted transmission of internet protocol transmissions during endpoint changes |
CN105721492A (en) * | 2016-03-25 | 2016-06-29 | 宇龙计算机通信科技(深圳)有限公司 | Voice processing method and apparatus and terminal |
CN106203098A (en) * | 2016-07-14 | 2016-12-07 | 中国科学院信息工程研究所 | Application layer eavesdropping means of defence and device |
US9565307B2 (en) | 2007-03-26 | 2017-02-07 | Voip-Pal.Com, Inc. | Emergency assistance calling for voice over IP communications systems |
US10880721B2 (en) | 2008-07-28 | 2020-12-29 | Voip-Pal.Com, Inc. | Mobile gateway |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1414190A1 (en) * | 2002-10-22 | 2004-04-28 | Alcatel | Method and system for informing a user about a WLAN accessibility |
CN101584150A (en) * | 2006-11-29 | 2009-11-18 | 迪吉福尼卡(国际)有限公司 | Intercepting voice over IP communications and other data communications |
CN102110220A (en) * | 2011-02-14 | 2011-06-29 | 宇龙计算机通信科技(深圳)有限公司 | Application program monitoring method and device |
-
2011
- 2011-12-21 CN CN201110431256.4A patent/CN102572123B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1414190A1 (en) * | 2002-10-22 | 2004-04-28 | Alcatel | Method and system for informing a user about a WLAN accessibility |
CN101584150A (en) * | 2006-11-29 | 2009-11-18 | 迪吉福尼卡(国际)有限公司 | Intercepting voice over IP communications and other data communications |
CN102110220A (en) * | 2011-02-14 | 2011-06-29 | 宇龙计算机通信科技(深圳)有限公司 | Application program monitoring method and device |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9537762B2 (en) | 2006-11-02 | 2017-01-03 | Voip-Pal.Com, Inc. | Producing routing messages for voice over IP communications |
US11171864B2 (en) | 2006-11-02 | 2021-11-09 | Voip-Pal.Com, Inc. | Determining a time to permit a communications session to be conducted |
US10218606B2 (en) | 2006-11-02 | 2019-02-26 | Voip-Pal.Com, Inc. | Producing routing messages for voice over IP communications |
US9998363B2 (en) | 2006-11-02 | 2018-06-12 | Voip-Pal.Com, Inc. | Allocating charges for communications services |
US9948549B2 (en) | 2006-11-02 | 2018-04-17 | Voip-Pal.Com, Inc. | Producing routing messages for voice over IP communications |
US9935872B2 (en) | 2006-11-02 | 2018-04-03 | Voip-Pal.Com, Inc. | Producing routing messages for voice over IP communications |
US9137385B2 (en) | 2006-11-02 | 2015-09-15 | Digifonica (International) Limited | Determining a time to permit a communications session to be conducted |
US9826002B2 (en) | 2006-11-02 | 2017-11-21 | Voip-Pal.Com, Inc. | Producing routing messages for voice over IP communications |
US9813330B2 (en) | 2006-11-02 | 2017-11-07 | Voip-Pal.Com, Inc. | Producing routing messages for voice over IP communications |
US9179005B2 (en) | 2006-11-02 | 2015-11-03 | Digifonica (International) Limited | Producing routing messages for voice over IP communications |
US9143608B2 (en) | 2006-11-29 | 2015-09-22 | Digifonica (International) Limited | Intercepting voice over IP communications and other data communications |
US9549071B2 (en) | 2006-11-29 | 2017-01-17 | Voip-Pal.Com, Inc. | Intercepting voice over IP communications and other data communications |
US10038779B2 (en) | 2006-11-29 | 2018-07-31 | Voip-Pal.Com, Inc. | Intercepting voice over IP communications and other data communications |
US9565307B2 (en) | 2007-03-26 | 2017-02-07 | Voip-Pal.Com, Inc. | Emergency assistance calling for voice over IP communications systems |
US11172064B2 (en) | 2007-03-26 | 2021-11-09 | Voip-Pal.Com, Inc. | Emergency assistance calling for voice over IP communications systems |
US10880721B2 (en) | 2008-07-28 | 2020-12-29 | Voip-Pal.Com, Inc. | Mobile gateway |
US10021729B2 (en) | 2009-09-17 | 2018-07-10 | Voip-Pal.Com, Inc. | Uninterrupted transmission of internet protocol transmissions during endpoint changes |
US9154417B2 (en) | 2009-09-17 | 2015-10-06 | Digifonica (International) Limited | Uninterrupted transmission of internet protocol transmissions during endpoint changes |
US10932317B2 (en) | 2009-09-17 | 2021-02-23 | VolP-Pal.com, Inc. | Uninterrupted transmission of internet protocol transmissions during endpoint changes |
US9740861B2 (en) | 2012-09-20 | 2017-08-22 | Huawei Device Co., Ltd. | Method for detecting eavesdropping activity and terminal device |
JP2014534712A (en) * | 2012-09-20 | 2014-12-18 | ▲華▼▲為▼終端有限公司Huawei Device Co., Ltd. | Method and terminal device for detecting eavesdropping activity |
EP2728918A4 (en) * | 2012-09-20 | 2014-10-29 | Huawei Device Co Ltd | Method for detecting interception behaviour and terminal device |
EP2988472A1 (en) * | 2012-09-20 | 2016-02-24 | Huawei Device Co., Ltd. | Method for detecting eavesdropping activity and terminal device |
EP2728918A1 (en) * | 2012-09-20 | 2014-05-07 | Huawei Device Co., Ltd. | Method for detecting interception behaviour and terminal device |
WO2014043876A1 (en) * | 2012-09-20 | 2014-03-27 | 华为终端有限公司 | Method for detecting interception behaviour and terminal device |
CN103118184B (en) * | 2013-01-18 | 2015-01-14 | 浙江长天信息技术有限公司 | Environment recording alarm method |
CN103118184A (en) * | 2013-01-18 | 2013-05-22 | 浙江长天信息技术有限公司 | Environment recording alarm method |
CN105721492B (en) * | 2016-03-25 | 2019-10-11 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method, apparatus and terminal of speech processes |
CN105721492A (en) * | 2016-03-25 | 2016-06-29 | 宇龙计算机通信科技(深圳)有限公司 | Voice processing method and apparatus and terminal |
CN106203098A (en) * | 2016-07-14 | 2016-12-07 | 中国科学院信息工程研究所 | Application layer eavesdropping means of defence and device |
Also Published As
Publication number | Publication date |
---|---|
CN102572123B (en) | 2014-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102572123B (en) | Method for monitoring call record uploading of eavesdropping software X undercover | |
JP5001380B2 (en) | Apparatus and method for locating, tracking and / or recovering wireless communication devices | |
Greenwald | NSA collecting phone records of millions of Verizon customers daily | |
CN101518111B (en) | Terminal apparatus, device, unauthorized use preventing system, unauthorized use preventing method, and program | |
CA2526755A1 (en) | Ip phone intruder security monitoring system | |
CN101179802A (en) | Communication equipment, network appliance and alarm method | |
CN101400163B (en) | Method for preventing unauthorized use of mobile phone and mobile phone thereof | |
CN202167123U (en) | Security system | |
US20090251318A1 (en) | Anti-theft system of mobile device | |
US20150213708A1 (en) | Apparatus and methods for tracking in wireless communication systems in response to an activation event | |
CN103544435A (en) | Method and device for preventing secret photography | |
WO2013175741A1 (en) | Apparatus and method for transmitting messages | |
AU2010220798A8 (en) | Automatic control of a security protection mode of an electronic device | |
CN104506711A (en) | Communication information processing method and device for terminal | |
CN101309479A (en) | Anti-theft mobile terminal and anti-theft method | |
WO2005089242A3 (en) | System and method for client-server-based wireless intrusion detection | |
CN102546897B (en) | Method for preventing X undercover interception software from environment monitoring | |
CN101640722A (en) | Mobile phone with safety protection function and safety protection method thereof | |
CN105162973A (en) | Equipment loss prevention method based on Bluetooth technology | |
CN102185922A (en) | Point-to-point access method for wireless IoT (Internet of Things) video monitoring terminal based on 2.5G communication and handset mailbox | |
US20090111439A1 (en) | System and method for monitoring a monitored mobile phone | |
CN101232677A (en) | Method and apparatus for start-up logging of mobile terminal | |
WO2015188500A1 (en) | Text monitoring method and device | |
CN103150243A (en) | Monitoring method for application program of mobile terminal | |
CN101332804B (en) | Vehicle alarm system and method and system combination-controlled by Internet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20141022 Termination date: 20211221 |