CN102572123B - One method x undercover eavesdropping class call recording software to upload monitoring - Google Patents

One method x undercover eavesdropping class call recording software to upload monitoring Download PDF

Info

Publication number
CN102572123B
CN102572123B CN 201110431256 CN201110431256A CN102572123B CN 102572123 B CN102572123 B CN 102572123B CN 201110431256 CN201110431256 CN 201110431256 CN 201110431256 A CN201110431256 A CN 201110431256A CN 102572123 B CN102572123 B CN 102572123B
Authority
CN
Grant status
Grant
Patent type
Prior art keywords
application
call
data traffic
monitoring
upload
Prior art date
Application number
CN 201110431256
Other languages
Chinese (zh)
Other versions
CN102572123A (en )
Inventor
虞忠辉
董琳
包亮
闵波
Original Assignee
成都三零瑞通移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Grant date

Links

Abstract

本发明属于手机安全领域,本发明公开了一种监测X卧底窃听类软件通话录音上传的方法,其具体包含以下步骤:注册静态广播接收器,用于接收通话结束挂机消息,在通话结束挂机后启动Service监测并分别记录应用程序的数据流量,根据应用程序的数据流量在通话结束挂机后是否增加来判断是否存在将通话录音上传的应用程序在执行,同时根据执行的此应用程序是否有用户交户界面来判断是否为纯后台程序,如果此程序为纯后台程序且在通话结束挂机后此应用程序的数据流量增加,则判定此程序为危险程序启动报警界面。 The present invention is in the field of mobile security, the present invention discloses a method for monitoring type X undercover eavesdropping software uploaded call recording, which comprises in particular the following steps: Register the static broadcast receiver for receiving a call end hang-up message, hang up after the call ends start Service to monitor and separately recorded data traffic of the application, according to the data flow of the application whether increased after the call ends hang to determine whether there is a call recording uploaded application execution, and whether users pay according to the application execution user interface to determine whether a pure background programs, if the program is in a pure background program and call completion data traffic increases hook of this application, it is determined that the program start danger alarm interface program. 通过上述的方法就可以直接判断是否存在此应用程序并快速锁定此应用程序。 By the above method can be directly determined whether the presence of this application and the application quick locking.

Description

一种监测X卧底窃听类软件通话录音上传的方法 A method of X undercover eavesdropping class call recording software to upload monitoring

技术领域 FIELD

[0001] 本发明涉及手机防止窃听技术领域,尤其涉及一种监测X卧底窃听类软件通话录音上传的方法。 [0001] The present invention relates to a mobile phone technology to prevent eavesdropping, and in particular relates to a method for monitoring X undercover eavesdropping software-based call recording uploaded.

背景技术 Background technique

[0002] 随着智能手机普及率的大幅度提高,智能手机在给我们带来方便的同时,其安全保密问题也日益凸显,如果智能手机被安装窃听软件,可对被监听手机进行环境监听。 [0002] With the substantial increase in smartphone penetration of smartphones has brought us convenience at the same time, its security and confidentiality issues are also increasingly prominent, if the smart phone is bugged software, can monitor the environment of the monitored phone. 目前比较泛滥的窃听类软件如"X卧底"软件,一旦被植入用户手机, Currently more rampant wiretapping class software such as "X undercover" software, once implanted in the user's phone,

[0003] 用户通话时,会将通话内容进行录音,通话结束后,通话录音文件将被上传到事前监听方设置的指定邮箱中去。 [0003] When the user calls, conversations will be recorded after the end of the call, call recording files will be uploaded to the specified mailbox advance listening party set to go. 可实现对该用户电话信息的全程监听。 It can achieve full monitor the user's telephone information.

[0004] 针对上述X卧底窃听类软件的通话录音上传行为,有必要研究一种监测X卧底窃听类软件通话录音上传的方法。 [0004] For the above-mentioned X undercover eavesdropping call recording software to upload class behavior, it is necessary to develop a method for X undercover eavesdropping class call recording software to upload monitoring.

发明内容 SUMMARY

[0005] 针对上述X卧底窃听类软件的通话录音上传行为,本发明公开了一种监测X卧底窃听类软件通话录音上传的方法。 [0005] For the X-call recording undercover eavesdropping software upload class behavior, the present invention discloses a method for monitoring X undercover eavesdropping software-based call recording uploaded. 用在智能手机上,可以有效防止类似的通话录音上传。 Used in smart phones, can effectively prevent similar call recording upload. 采用接收系统电话广播方式,检测通话挂机消息,同时检测挂机后一定时间内流量上传进程名单,并结合权限判别是否有后台录音行为等,判别是否存在后台分组发送通话录音行为, 发现后提示告警。 Using the receiving system telephone broadcast to detect the call hang-up message, while traffic after detecting hang up within a certain period of time to upload the list of processes, combined with the authority to determine whether there is a background recording behavior, determine whether there is a prompt alert after the back-end packet transmission call recording behavior found.

[0006] 本发明的目的通过下述技术方案来实现: [0006] The object of the present invention is achieved by the following technical solution:

[0007] -种监测X卧底窃听类软件通话录音上传的方法,其具体包含以下步骤:注册静态广播接收器,用于接收通话结束挂机消息,在通话结束挂机后启动Service监测并分别记录应用程序的数据流量,根据应用程序的数据流量在通话结束挂机后是否增加来判断是否存在将通话录音上传的应用程序在执行,同时根据执行的此应用程序是否有用户交户界面来判断是否为纯后台程序,如果此程序为纯后台程序且在通话结束挂机后此应用程序的数据流量增加,则判定此程序为危险程序启动报警界面。 [0007] - Method races of class X undercover eavesdropping software uploaded call recording, which comprises in particular the following steps: Register the static broadcast receiver for receiving a call end hang-up message, Service start monitoring after the end of the call and hang up the application were recorded data traffic, according to the data flow of the application whether to increase to determine whether there is a call recording uploaded application execution after the end of the call hang up, and whether users pay user interface to determine whether a pure background according to the application execution program, if this program is pure daemon hang up and call the end of the increased data traffic of this application, it is determined that this program starts warning interface for dangerous programs.

[0008] 优选地,所述启动Service监测并分别记录的应用程序为拥有网络访问及录音权限功能的应用程序。 [0008] Preferably, the monitoring start the application Service and were recorded to have network access authority and recording function applications.

[0009] 优选地,所述启动Service监测并分别记录应用程序的数据流量为应用程序本日的数据流量。 [0009] Preferably, the promoter Service monitoring data traffic and applications are recorded in the data traffic for the application of the present day.

[0010] 优选地,所述判定此程序为危险程序启动报警界面具体包括:封装该危险程序相关信息后启动报警界面,并传递封装信息给该报警界面。 [0010] Preferably, this program starts the determination as dangerous alarm interface program comprises: activating the alarm interface encapsulates the hazardous program information, and transmitting the encapsulation information to the alarm interface.

[0011] 优选地,所述方法还包括报警界面启动后,立即通过响铃加振动方式报警,并将传递过来的程序封装信息通过列表显示,供用户查看。 [0011] Preferably, the method further comprising alarm interface start ringing immediately by adding a vibration alarm mode, and transmits the program over the encapsulation information list display, for users to view.

[0012] 优选地,所述在通话结束挂机后启动Service监测并分别记录应用程序的数据流量为在通话话结束挂机后3秒内启动Service监测并分别记录应用程序的数据流量。 [0012] Preferably, the promoter Service monitoring and hang up after the end of the call are recorded application data traffic after the end of the call, then hang up Service start monitoring and 3 seconds, respectively, recorded data traffic of the application.

[0013] 优选地,所述判断应用程序的数据流量在通话结束挂机后是否增加具体为:在记录应用程序的数据流量后50秒内的时间内监测应用程序的数据流量,并用监测到的数据流量和记录的数据流量进行比较,其数据流量是否增加来判断应用程序的数据流量是否增加。 [0013] Preferably, the judgment data traffic applications are of increasing after the end of the call hangs up specifically is: the data traffic within the monitoring application within 50 seconds after data traffic recording application program, and with the monitored data and data traffic records are compared, the data traffic to determine whether to increase the data traffic applications are of increasing.

[0014] 优选地,所述判断应用程序的数据流量在通话结束挂机后是否增加具体为:在记录应用程序的数据流量后并在本次通话和下次通话的间隔时间内监测应用程序的数据流量,并用监测到的数据流量和记录的数据流量进行比较,其数据流量是否增加来判断应用程序的数据流量是否增加。 [0014] Preferably, the determining whether the application data traffic increased after the end of the call hangs up specifically is: the data flow and data recorded after the application of the monitoring application within the time interval of the current call and the next call data traffic flow, and traffic with the monitored and recorded data are compared, the data traffic to determine whether to increase the data traffic applications are of increasing.

[0015] 本发明的有益效果:根据在通话结束后是否有应用程序为纯后台执行,且此后台运行程序的数据流量是否增加来直接判断是否存在X卧底窃听类软件通话录音上传,因为如果要上传通话录音,则数据流量必然明显增加,通过上述的方法就可以直接判断是否存在此应用程序并快速锁定此应用程序,同时又根据应用程序是否存在用户交户界面判断是否为纯后台程序,如果应用程序存在用户交户界面,则不为纯后台程序,反之则为纯后台程序,将非纯后台程序的应用程序排除掉,不影响用户正常使用的应用程序。 [0015] Advantageous Effects of Invention: According to the phone call if there is an application for the pure background, and thereafter the data traffic running program station is increased directly determines whether there X undercover eavesdropping based software call recording upload, because if upload call recording, the data flow will inevitably increased significantly, by the above method can directly determine whether this application and quickly lock the applications, but also according to whether the application there is a user pay user interface to determine whether the pure daemon, if there is cross-application user user interface, it is not pure daemon, otherwise it is pure daemon, the application of pure non-daemon excluded, does not affect the normal use of applications.

附图说明 BRIEF DESCRIPTION

[0016] 附图1为本发明的监测X卧底窃听类软件通话录音上传的方法流程图。 [0016] FIG 1 X undercover eavesdropping based monitoring software of the present invention is a method to upload call recording flowchart.

具体实施方式 detailed description

[0017] 如图1所示本发明的监测X卧底窃听类软件通话录音上传的方法流程图。 [0017] As shown in Figure 1 to monitor this type of software X undercover eavesdropping invention flowchart of a method to upload call recording. 本发明公开了一种监测X卧底窃听类软件通话录音上传的方法,其具体包含以下步骤:注册静态广播接收器,用于接收通话结束挂机消息,在通话结束挂机后启动Service监测并分别记录应用程序的数据流量,根据应用程序的数据流量在通话结束挂机后是否增加来判断是否存在将通话录音上传的应用程序在执行,同时根据执行的此应用程序是否有用户交户界面来判断是否为纯后台程序,如果此程序为纯后台程序且在通话结束挂机后此应用程序的数据流量增加,则判定此程序为危险程序启动报警界面。 The present invention discloses a method for monitoring type X undercover eavesdropping software uploaded call recording, which comprises in particular the following steps: Register the static broadcast receiver for receiving a call end hang-up message, Service start monitoring after the end of the call and hang up application were recorded data flow program, according to the data flow of the application whether the increase in the end of the call hangs up to determine whether there will call recording uploaded application execution, while if there is according to the application executing user pay user interface to determine whether the pure daemon, if this program is pure daemon hang up and call the end of the increased data traffic of this application, it is determined that this program starts warning interface for dangerous programs. 上述监测通话录音上传的方法主要为接收系统电话广播方式、挂机消息检测、流量上传进程判断、进程权限判断,获取到这个时间段所有流量上传的进程名单和上传流量的大小,并在这些产生了流量上传的进程中实现权限匹配,寻找具备窃听软件权限特征的进程,一旦发现立即报警。 Said monitoring call recording upload method is mainly to receive a system telephone broadcasting, hook message detection, traffic upload process is determined, the process of right judgment, obtaining the size of the list of the process this time period all traffic uploaded and the upload traffic, and produced in these traffic upload process to achieve matching rights, privileges looking with eavesdropping software features of the process, if it is found immediately to the police. 根据在通话结束后是否有应用程序为纯后台执行,且此后台运行程序的数据流量是否增加来直接判断是否存在X卧底窃听类软件通话录音上传,因为如果要上传通话录音,则数据流量必然明显增加,通过上述的方法就可以直接判断是否存在此应用程序并快速锁定此应用程序,同时又根据应用程序是否存在用户交户界面判断是否为纯后台程序,如果应用程序存在用户交户界面, 则不为纯后台程序,反之则为纯后台程序,将非纯后台程序的应用程序排除掉,不影响用户正常使用的应用程序。 According to the call is finished if there is an application for the pure background, and thereafter the data flow to run the program sets whether to increase directly to determine whether there is X undercover eavesdropping class software call recording uploaded, because if you want to upload call recording, the data flow will inevitably obvious increased, by the above method can be directly determined whether the presence of this application and quick locking of this application, but also according to the application or absence of user deposit user interface determines whether pure daemon, if the application there is a user pay user interface, daemon is not pure, otherwise it is pure daemon, the application of pure non-daemon excluded, does not affect the normal use of applications.

[0018] 优选地,上述启动Service监测并分别记录的应用程序为拥有网络访问及录音权限功能的应用程序。 [0018] Preferably, the above-described application started are recorded and monitored Service to have network access authority and recording function applications. 因为只有具备上述网络访问及录音权限功能的应用程序才可能实现将窃听到的通话录音进行上传,使得监测和记录的应用程序范围缩小,提高本方法的效率。 Because only with an application on the network access privileges and recording function will only be achieved tapping into the call recording to upload, so that the application range of monitoring and recording reduced to improve the efficiency of the process.

[0019] 优选地,上述启动Service监测并分别记录应用程序的数据流量为应用程序本日的数据流量。 [0019] Preferably, the start-Service monitoring data traffic and applications are recorded in the data traffic for the application of the present day. 记录本日的数据流量数字相对较小,便于记录和比较。 Recording digital data traffic today is relatively small, easy to record and compare.

[0020] 优选地,上述判定此程序为危险程序启动报警界面具体包括:封装该危险程序相关信息后启动报警界面,并传递封装信息给该报警界面。 [0020] Preferably, the above-described procedure for determining the program starts hazard alarm interface comprises: activating the alarm interface encapsulates the hazardous program information, and transmitting the encapsulation information to the alarm interface. 快速锁定应用程序并将其显示在报警界面上,便于用户及时处理该危险程序。 Fast locking applications and show the alarm interface for timely processing of the user program dangerous.

[0021] 优选地,上述方法还包括报警界面启动后,立即通过响铃加振动方式报警,并将传递过来的程序封装信息通过列表显示,供用户查看。 [0021] Preferably, the method further comprising alarm interface start ringing immediately by adding a vibration alarm mode, and transmits the program over the encapsulation information list display, for users to view. 第一时间通知用户处理此危险程序,保证用户的信息安全。 First time to notify users deal with this dangerous procedures to ensure that users of information security.

[0022] 优选地,上述在通话结束挂机后启动Service监测并分别记录应用程序的数据流量为在通话话结束挂机后3秒内启动Service监测并分别记录应用程序的数据流量。 [0022] Preferably, the start-Service Monitoring and hang up after the end of the call are recorded application data traffic after the end of the call, then hang up Service start monitoring and 3 seconds, respectively, recorded data traffic of the application. X卧底窃听类软件通话录音上传文件,因为文件内容较大,不易在手机本地保存,所以一般在用户挂机后,立即上传出去。 X undercover eavesdropping class call recording software to upload files, because the contents of the file is large, do not keep the phone locally, usually after the user hangs up, immediately upload out. 在3秒内启动Service监测并分别记录应用程序的数据流量和后续时间段内的数据流量在进行比较,判断数据流量是否增加。 Service started within 3 seconds are recorded and monitored data traffic and the data traffic of the application during the subsequent period of time, and determines whether the data traffic increases.

[0023] 优选地,上述判断应用程序的数据流量在通话结束挂机后是否增加具体为:在记录应用程序的数据流量后50秒内的时间内监测应用程序的数据流量,并用监测到的数据流量和记录的数据流量进行比较,其数据流量是否增加来判断应用程序的数据流量是否增加。 [0023] Preferably, the data flow rate of the determination whether the application increases after the end of the call hangs up specifically is: the data traffic within 50 seconds after data traffic recording application within the time monitoring of the application, and use the monitored data traffic and comparing the recorded data traffic, the data traffic is increasing data to determine whether the increase in the flow application.

[0024] 优选地,上述判断应用程序的数据流量在通话结束挂机后是否增加具体为:在记录应用程序的数据流量后并在本次通话和下次通话的间隔时间内监测应用程序的数据流量,并用监测到的数据流量和记录的数据流量进行比较,其数据流量是否增加来判断应用程序的数据流量是否增加。 [0024] Preferably, the data flow rate of the application program determines whether the end of the hook after the call increases specifically is: the data traffic within the time interval after the application of the recorded data traffic and for this call and the next call monitoring application and with the monitored data traffic and traffic data records are compared, the data traffic to determine whether to increase the data traffic applications are of increasing.

[0025] 上述的实施例中所给出的系数和参数,是提供给本领域的技术人员来实现或使用本发明的,本发明并不限定仅取前述公开的数值,在不脱离本发明的发明思想的情况下,本领域的技术人员可以对上述实施例作出种种修改或调整,因而本发明的保护范围并不被上述实施例所限,而应该是符合权利要求书提到的创新性特征的最大范围。 [0025] The above-described coefficients and parameters given in the examples, is available to those skilled in the art to make or use the present invention, the present invention is not limited to only take the values ​​disclosed in the present invention without departing from the in the case of the inventive idea, those skilled in the art that various modifications or adjustments may be made to the embodiments described above, and thus the scope of the present invention is not to be limited by the above-described embodiments, but should be consistent with the innovative features mentioned in the claims the maximum range.

Claims (8)

  1. 1. 一种监测X卧底窃听类软件通话录音上传的方法,其具体包含以下步骤:注册静态广播接收器,用于接收通话结束挂机消息,在通话结束挂机后启动Service监测并分别记录应用程序的数据流量,根据应用程序的数据流量在通话结束挂机后是否增加来判断是否存在将通话录音上传的应用程序在执行,同时根据执行的此应用程序是否有用户交户界面来判断是否为纯后台程序,如果此程序为纯后台程序且在通话结束挂机后此应用程序的数据流量增加,则判定此程序为危险程序启动报警界面;上述监测通话录音上传的方法主要为接收系统电话广播方式、挂机消息检测、流量上传进程判断、进程权限判断,获取到这个时间段所有流量上传的进程名单和上传流量的大小,并在这些产生了流量上传的进程中实现权限匹配,寻找具备窃听软件权限特征的进程,一旦 1. A method for monitoring X undercover eavesdropping software-based method to upload call recording, which comprises in particular the following steps: Register the static broadcast receiver for receiving a call end hang-up message, Service start monitoring after the end of the call and hang up the application were recorded data traffic, according to the data flow of the application whether to increase to determine whether there is a call recording uploaded application execution after the end of the call hang up, and whether users pay user interface to determine if it is pure daemon according to the application execution , if the program is a pure background program and call end hook to increase the data flow of this application, it is determined that the program start alarm interface dangerous programs; said monitoring call recording upload method is mainly to receive a system telephone broadcasting, hang-up message detection, traffic upload process to determine the process right judgment, get to the size of the list process this time all traffic upload and upload traffic and generate traffic upload process to achieve the permissions to match these, look for processes with eavesdropping software permissions feature ,once 现立即报警。 Now the police.
  2. 2. 如权利要求1所述的监测X卧底窃听类软件通话录音上传的方法,其特征在于所述启动Service监测并分别记录的应用程序为拥有网络访问及录音权限功能的应用程序。 2. Monitoring X undercover eavesdropping type of software according to claim 1 a method to upload call recording, characterized in that the starting monitoring application Service and were recorded to have network access authority and recording function applications.
  3. 3. 如权利要求1所述的监测X卧底窃听类软件通话录音上传的方法,其特征在于所述启动Service监测并分别记录应用程序的数据流量为应用程序本日的数据流量。 X undercover eavesdropping software based monitoring according claim 1 a method to upload call recording, characterized in that the starting monitoring Service and data traffic applications are recorded in the data traffic for the application of the present day.
  4. 4. 如权利要求1所述的监测X卧底窃听类软件通话录音上传的方法,其特征在于所述判定此程序为危险程序启动报警界面具体包括:封装该危险程序相关信息后启动报警界面,并传递封装信息给该报警界面。 4. Monitoring X undercover eavesdropping type of software according to claim 1 a method to upload call recording, wherein said program start determination program for the hazard alarm interface comprises: activating the alarm interface encapsulates information about the program risk, and transmitting the encapsulated information to the alarm interface.
  5. 5. 如权利要求4所述的监测X卧底窃听类软件通话录音上传的方法,其特征在于所述方法还包括报警界面启动后,立即通过响铃加振动方式报警,并将传递过来的程序封装信息通过列表显示,供用户查看。 5. Monitoring X undercover eavesdropping type of software according to claim 4 method to upload call recording, wherein said method further comprising alarm interface start ringing immediately by adding a vibration alarm mode, and transmits the program over the encapsulation list shows information for the user to view.
  6. 6. 如权利要求1-5任意一个权利要求所述的监测X卧底窃听类软件通话录音上传的方法,其特征在于所述在通话结束挂机后启动Service监测并分别记录应用程序的数据流量为在通话话结束挂机后3秒内启动Service监测并分别记录应用程序的数据流量。 As claimed in any one of claims 1-5 X undercover eavesdropping based software monitoring said call recording method as claimed in claim upload, characterized in that the starting monitoring Service and hang up after the end of the call are recorded application data traffic as after the call, then hang up within three seconds to start Service to monitor and record each application's data traffic.
  7. 7. 如权利要求1-5任意一个权利要求所述的监测X卧底窃听类软件通话录音上传的方法,其特征在于所述判断应用程序的数据流量在通话结束挂机后是否增加具体为:在记录应用程序的数据流量后50秒内的时间内监测应用程序的数据流量,并用监测到的数据流量和记录的数据流量进行比较,其数据流量是否增加来判断应用程序的数据流量是否增加。 7. The method according to any one of the preceding claims tapping type X undercover monitoring software uploaded call recording as claimed in claim 1-5, wherein said determining whether the data traffic increases after application of the end-hook call specifically: the recording after the data traffic flow application data traffic monitoring application time within 50 seconds, and dried to monitor and record data flow are compared, the data traffic is increasing data to determine whether the increase in the flow application.
  8. 8. 如权利要求1-5任意一个权利要求所述的监测X卧底窃听类软件通话录音上传的方法,其特征在于所述判断应用程序的数据流量在通话结束挂机后是否增加具体为:在记录应用程序的数据流量后并在本次通话和下次通话的间隔时间内监测应用程序的数据流量, 并用监测到的数据流量和记录的数据流量进行比较,其数据流量是否增加来判断应用程序的数据流量是否增加。 8. The method according to any one of the preceding claims tapping type X undercover monitoring software uploaded call recording as claimed in claim 1-5, wherein said determining whether the data traffic increases after application of the end-hook call specifically: the recording after the data traffic of the application data traffic and data traffic monitoring application within the time interval of the current call and the next call, and use the monitored data traffic and records are compared, the data traffic is increased to determine the application whether to increase data traffic.
CN 201110431256 2011-12-21 2011-12-21 One method x undercover eavesdropping class call recording software to upload monitoring CN102572123B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110431256 CN102572123B (en) 2011-12-21 2011-12-21 One method x undercover eavesdropping class call recording software to upload monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110431256 CN102572123B (en) 2011-12-21 2011-12-21 One method x undercover eavesdropping class call recording software to upload monitoring

Publications (2)

Publication Number Publication Date
CN102572123A true CN102572123A (en) 2012-07-11
CN102572123B true CN102572123B (en) 2014-10-22

Family

ID=46416562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110431256 CN102572123B (en) 2011-12-21 2011-12-21 One method x undercover eavesdropping class call recording software to upload monitoring

Country Status (1)

Country Link
CN (1) CN102572123B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008052340A8 (en) 2006-11-02 2009-06-04 Digifonica Int Ltd Producing routing messages for voice over ip communications
EP2090024A4 (en) 2006-11-29 2012-12-05 Digifonica Int Ltd Intercepting voice over ip communications and other data communications
WO2008116296A1 (en) 2007-03-26 2008-10-02 Digifonica (International) Limited Emergency assistance calling for voice over ip communications systems
CA2812174C (en) 2009-09-17 2018-05-15 Digifonica (International) Limited Uninterrupted transmission of internet protocol transmissions during endpoint changes
EP2988472B1 (en) * 2012-09-20 2017-03-29 Huawei Device Co., Ltd. Method for detecting eavesdropping activity and terminal device
CN103118184B (en) * 2013-01-18 2015-01-14 浙江长天信息技术有限公司 Environment recording alarm method
CN105721492A (en) * 2016-03-25 2016-06-29 宇龙计算机通信科技(深圳)有限公司 Voice processing method and apparatus and terminal
CN106203098A (en) * 2016-07-14 2016-12-07 中国科学院信息工程研究所 Application-level eavesdropping preventing method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1414190A1 (en) 2002-10-22 2004-04-28 Alcatel Alsthom Compagnie Generale D'electricite Method and system for informing a user about a WLAN accessibility
CN101584150A (en) 2006-11-29 2009-11-18 迪吉福尼卡(国际)有限公司 Intercepting voice over IP communications and other data communications
CN102110220A (en) 2011-02-14 2011-06-29 宇龙计算机通信科技(深圳)有限公司 Application program monitoring method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1414190A1 (en) 2002-10-22 2004-04-28 Alcatel Alsthom Compagnie Generale D'electricite Method and system for informing a user about a WLAN accessibility
CN101584150A (en) 2006-11-29 2009-11-18 迪吉福尼卡(国际)有限公司 Intercepting voice over IP communications and other data communications
CN102110220A (en) 2011-02-14 2011-06-29 宇龙计算机通信科技(深圳)有限公司 Application program monitoring method and device

Also Published As

Publication number Publication date Type
CN102572123A (en) 2012-07-11 application

Similar Documents

Publication Publication Date Title
US8387141B1 (en) Smartphone security system
US20100130178A1 (en) Enabling Remote And Anonymous Control Of Mobile And Portable Multimedia Devices For Security, Tracking And Recovery
US20100130167A1 (en) Communication Method And Infrastructure Supporting Device Security And Tracking Of Mobile And Portable Multimedia Devices
CN103209439A (en) Method, apparatus and device for monitoring data traffic
CN101141721A (en) Safety mobile telephone based communication custom
CN103220637A (en) Mobile phone anti-theft protection method and mobile phone anti-theft protection device
CN102739868A (en) Mobile terminal loss processing method and system
CN102045712A (en) Anti-monitoring method and system for mobile terminal
CN101478591A (en) Method for preventing incoming call disturbance of mobile phone
CN103052059A (en) Intelligent terminal and data processing method in intelligent terminal
CN103347131A (en) Intelligent mobile phone anti-theft method and system
CN102523593A (en) Method for prevent self program from being uninstalled
CN101510908A (en) Method and apparatus for implementing terminal calling firewall
CN104009892A (en) Monitoring method and device for traffic of mobile terminal and client side
CN101257678A (en) Method, terminal and system for realizing mobile terminal software safe detection
CN1867014A (en) Anti-theft system and method for mobile terminal
CN101175124A (en) Intelligent alarm method based on mobile communication locating technology
CN102014209A (en) Mobile terminal and method of theft
CN103338308A (en) Mobile terminal calling method, mobile terminal controlling method and related equipment
CN103167488A (en) Method and device for prompting Wi-Fi signals
CN102917105A (en) Call information processing method and a terminal device
CN102223626A (en) Information steganography and security protection method based on wireless base station information
US20110319117A1 (en) Method and apparatus for dynamically adding participants into an existing talk group
CN102355519A (en) Malicious call dialing prevention method for mobile intelligent terminal and system thereof
CN101394234A (en) Signal prompt method, device for a mobile communication terminal, and the mobile communication terminal

Legal Events

Date Code Title Description
C06 Publication
C10 Request of examination as to substance
C14 Granted