CN113852626A - Method, system, device and storage medium for monitoring divulgence - Google Patents

Method, system, device and storage medium for monitoring divulgence Download PDF

Info

Publication number
CN113852626A
CN113852626A CN202111115358.5A CN202111115358A CN113852626A CN 113852626 A CN113852626 A CN 113852626A CN 202111115358 A CN202111115358 A CN 202111115358A CN 113852626 A CN113852626 A CN 113852626A
Authority
CN
China
Prior art keywords
divulgence
wireless signal
message
monitoring
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202111115358.5A
Other languages
Chinese (zh)
Inventor
张月明
丁莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Anheng Information Security Technology Co Ltd
Original Assignee
Hangzhou Anheng Information Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Anheng Information Security Technology Co Ltd filed Critical Hangzhou Anheng Information Security Technology Co Ltd
Priority to CN202111115358.5A priority Critical patent/CN113852626A/en
Publication of CN113852626A publication Critical patent/CN113852626A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/318Received signal strength
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/18Multiprotocol handlers, e.g. single devices capable of handling multiple protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters

Abstract

The invention discloses a divulgence monitoring method, a system, a device and a storage medium, which are applied to a processor in the divulgence monitoring device. The secret divulgence monitoring scheme can monitor whether the messages in the wireless signals in the public areas of the sensitive office environment, the secret place and the sensitive personnel contain the secret divulgence information or not, and can determine the position of the secret divulgence equipment based on the signal strength of the wireless signals for transmitting the messages containing the secret divulgence information.

Description

Method, system, device and storage medium for monitoring divulgence
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method, a system, an apparatus, and a storage medium for monitoring disclosure.
Background
With the continuous development of information technology, in sensitive office environments, secret places and public areas where sensitive people are located, there are inevitably situations where leaked information is emitted by a leaked device through wireless signals, for example, real-time position information of key people, wirelessly transmitted travel information, wirelessly code-transmitted secret information, and the like are exposed. If the divulgence information cannot be monitored in time and the position of the divulgence equipment cannot be determined, the divulgence information can be leaked.
Disclosure of Invention
The invention aims to provide a method, a system, a device and a storage medium for monitoring divulgence, which realize the divulgence monitoring in sensitive office environments, secret places and public areas where sensitive personnel are located.
In order to solve the above technical problem, the present invention provides a divulgence monitoring method, which is applied to a processor in a divulgence monitoring device, and includes:
acquiring a wireless signal received by a wireless signal receiving matrix;
determining a protocol identification type of a message in the wireless signal;
analyzing the message according to the protocol identification type;
judging whether the analyzed message contains divulgence information or not;
and if so, determining the position of the divulgence equipment based on the signal strength of the wireless signal of the message transmitting the divulgence information.
Preferably, the acquiring the wireless signals received by the wireless signal receiving matrix includes:
wireless signals received by the RF signal receiving matrix are acquired.
Preferably, determining the protocol identification type of the packet in the wireless signal includes:
identifying a frequency of the wireless signal;
and determining the protocol identification type of the message in the wireless signal according to the corresponding relation between the frequency of the wireless signal and the preset frequency protocol identification type.
Preferably, the determining whether the analyzed message contains divulgence information includes:
judging whether the analyzed message contains a preset sensitive field or not in a regular matching sensitive field mode;
and if so, judging that the analyzed message contains the secret information.
Preferably, the preset sensitive field includes one or more of longitude and latitude, name, code, work and rest time, project, secret level and secret.
Preferably, the frequency range of the wireless signal is 125KHz-5 GHz.
Preferably, the determining the location of the compromised device based on the signal strength of the wireless signal transmitting the message containing the compromised information includes:
controlling a display module to display and transmit a wireless signal of a message containing the divulgence information;
determining a wireless line number designated by a user from a wireless signal for transmitting a message containing the divulgence information based on a user instruction;
controlling the display module to display the signal strength of the wireless line number specified by the user so that the user can move the divulgence monitoring device according to the signal strength;
and when the user moves the divulgence monitoring device, controlling the display module to display the signal intensity of the wireless line number specified by the user at the current position of the divulgence monitoring device, so that the user can obtain the position of the divulgence equipment based on the position of the divulgence monitoring device when the signal intensity is maximum.
In order to solve the above technical problem, the present invention further provides a divulgence monitoring system, including:
the wireless signal acquisition unit is used for acquiring wireless signals received by the wireless signal receiving matrix;
a protocol identification type determining unit, configured to determine a protocol identification type of a packet in the wireless signal;
the analysis unit is used for analyzing the message according to the protocol identification type;
the judging unit is used for judging whether the analyzed message contains divulgence information or not, and if so, triggering the divulgence equipment determining unit;
the secret divulging device determining unit is used for determining the position of the secret divulging device based on the signal strength of the wireless signal of the message which transmits the message containing the secret divulging information.
In order to solve the above technical problem, the present invention further provides a disclosure monitoring apparatus, including:
a memory for storing a computer program;
and the processor is used for realizing the steps of the leakage monitoring method when executing the computer program.
In order to solve the above technical problem, the present invention further provides a storage medium, where a computer program is stored, and when the computer program is executed by a processor, the steps of the divulgence monitoring method are implemented.
The invention discloses a divulgence monitoring method, a system, a device and a storage medium, which are applied to a processor in the divulgence monitoring device. The secret divulgence monitoring scheme realizes monitoring whether the messages in the wireless signals in the public areas of the sensitive office environment, the secret place and the sensitive personnel contain the secret divulgence information or not, and can determine the position of the secret divulgence equipment based on the signal strength of the wireless signals for transmitting the messages containing the secret divulgence information.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed in the prior art and the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1 is a process flow diagram of a method for monitoring a compromise provided by the present invention;
FIG. 2 is a process flow diagram of another method of disclosure for monitoring for compromise;
FIG. 3 is a schematic diagram of a frame of a divulgence monitoring apparatus according to the present invention;
fig. 4 is a schematic structural diagram of a divulgence monitoring system provided in the present invention;
fig. 5 is a schematic structural diagram of a disclosure monitoring apparatus according to the present invention.
Detailed Description
The core of the invention is to provide a method, a system, a device and a storage medium for monitoring the divulgence, which realize the divulgence monitoring in the public areas of sensitive office environment, secret places and sensitive personnel.
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a process flow diagram of a disclosure monitoring method.
The invention provides a divulgence monitoring method, which is applied to a processor in a divulgence monitoring device and comprises the following steps:
s11: acquiring a wireless signal received by a wireless signal receiving matrix;
s12: determining a protocol identification type of a message in a wireless signal;
s13: analyzing the message according to the protocol identification type;
s14: judging whether the analyzed message contains divulgence information or not, and if so, entering S15;
s15: the location of the compromised device is determined based on the signal strength of the wireless signal transmitting the message containing the compromised information.
In consideration of the fact that the divulgence information may be transmitted by the divulgence device through wireless signals in sensitive office environments, secret places and public areas where sensitive people are located, the divulgence information is monitored in time, the position of the divulgence device is determined, and the divulgence of the divulgence information is prevented. In order to solve the above technical problem, in the present application, considering that a wireless signal is a carrier for message transmission, a message is transmitted through the wireless signal, and in order to determine whether the message in the wireless signal contains divulgence information, in the present application, first, a wireless signal received by a wireless signal receiving matrix is obtained, where the wireless signal received by the wireless signal receiving matrix may be a plurality of wireless signals with different frequencies. And then determining the protocol identification type of the message in the wireless signal, wherein the protocol identification types corresponding to the messages transmitted by the wireless signals with different frequencies are possibly different. Considering that the message of the wireless signal may contain the leakage information, the message may be analyzed according to the protocol identification type corresponding to the message transmitted by the wireless signal with different frequencies, and then whether the analyzed message contains the leakage information is determined. The signal strength of the wireless signal transmitting the message containing the divulgence information may vary with the position from the divulgence device, and if the analyzed message contains the divulgence information, the position of the divulgence device may be determined based on the signal strength of the wireless signal transmitting the message containing the divulgence information. Therefore, by adopting the mode, whether the wireless signals in the surrounding sensitive area have the divulgence information or not can be automatically monitored, and the position of the divulgence equipment can be timely determined.
In addition, the wireless signals may be classified into RFID (Radio Frequency Identification), NFC (Near Field Communication), FM (Frequency modulation), Long Range, NB-IOT (Narrow Band Internet of Things), GSM (Global System for Mobile Communications), Zigbee, Bluetooth, GPS (Global Positioning System), MQTT (Message Queuing Telemetry), CoAP (Constrained Application Protocol), HTTP (HyperText Protocol, HyperText Transfer Protocol), DDS (Digital data Synthesis), Direct Synthesis (Direct Synthesis), and Advanced Messaging (Advanced Messaging Protocol), according to the Protocol Identification type, and the Radio Frequency Identification (Radio Frequency Identification), NFC (Near Field Communication), FM (Long Range), NB-IOT (Narrow Band Internet of Things), GSM (Global System for Mobile Communications), Zigbee, Bluetooth, GPS (Global Positioning System), MQTT (Global Positioning System), mrtt (Message Queuing Telemetry ), wap (Constrained Application Protocol), HTTP (HyperText Transfer Protocol, DDS (Direct Messaging Protocol), DDS (Digital Messaging, Direct Synthesis (Direct Messaging Protocol), and qp (Extensible Messaging Protocol), which are different types of the wireless signals and the Radio Frequency Identification (Messaging) Protocol, and the sip, and the extended Messaging Protocol is also different protocols, the frequency range of the wireless signal may be 125KHz-5GHz, and the application is not particularly limited.
In addition, the wireless signal receiving matrix may be, but is not limited to, a Radio Frequency (RF) signal receiving matrix.
The divulgence information may include sensitive information, such as latitude and longitude, name, code, work and rest time, project, secret level, secret, and other sensitive fields, and the application is not limited herein.
For example, a wireless signal with a frequency of 89MHz is obtained, the frequency of the wireless signal is in a range of 87.0-108.0MHz, it can be determined that a protocol identification type of a message in the wireless signal is an FM protocol identification type, then the content of the message is analyzed by using a modular code according to the FM protocol identification type, the content of the message is analyzed to include real-time location information of a key person, it is determined that the message includes divulgence information, and then the location of the divulgence device is determined according to the signal strength of the wireless signal transmitting the message including the divulgence information.
In summary, the disclosure monitoring method achieves monitoring whether a message in a wireless signal in a public area in which a sensitive office environment, a secret place, and a sensitive person are located includes disclosure information, and can determine the location of a disclosure device based on the signal strength of the wireless signal transmitting the message including the disclosure information.
On the basis of the above-described embodiment:
referring to fig. 2, fig. 2 is a process flow diagram of another disclosure monitoring method.
As a preferred embodiment, acquiring the wireless signals received by the wireless signal receiving matrix includes:
wireless signals received by the RF signal receiving matrix are acquired.
In this embodiment, the wireless signal receiving matrix may be an RF signal receiving matrix. The RF signal receiving matrix has the advantages of large frequency dynamic range of receiving wireless signals, high reliability and the like. The wireless signals received by the RF signal receiving matrix are acquired so as to judge whether the messages transmitted by the wireless signals contain secret leakage information or not in the following process, and the wireless signals in a large frequency dynamic range in a surrounding sensitive area can be monitored.
As a preferred embodiment, determining a protocol identification type of a packet in a wireless signal includes:
identifying a frequency of the wireless signal;
and determining the protocol identification type of the message in the wireless signal according to the corresponding relation between the frequency of the wireless signal and the preset frequency protocol identification type.
Specifically, after the wireless signals received by the wireless signal receiving matrix are obtained, in consideration of the possibility that protocol identification types of messages transmitted by the wireless signals with different frequencies are different, in this embodiment, the frequency of the wireless signals is firstly identified, then the protocol identification type of the message in the wireless signals can be determined according to the corresponding relationship between the frequency of the wireless signals and the preset frequency protocol identification type, and the protocol identification type of the message in the wireless signals is determined by this way, which is simple and reliable.
Referring to table 1, table 1 is a table of correspondence between frequencies of wireless signals and identification types of predetermined frequency protocols provided in the present application.
TABLE 1
Figure BDA0003275061010000061
Figure BDA0003275061010000071
For example, the frequency of the wireless signal is 3500MHz, and then the protocol identification type of the message in the wireless signal can be determined to be the 5G protocol identification type according to the protocol identification type of 5G corresponding to the wireless signal frequency range of 3400-3600 MHz.
In addition, for example, the frequency of the wireless signal is 2.4GHz, a protocol identification type, which is Wifi, of the protocol identification types of the messages in the wireless signal can be determined according to the corresponding relationship between the frequency of the wireless signal and the protocol identification type of the preset frequency, and then the specific type of the protocol identification type needs to be determined to be one of MQTT, CoAP, HTTP, DDS, AMQP, or XMPP according to the matching of the header field of the message in the wireless signal.
As a preferred embodiment, the determining whether the analyzed message contains the divulgence information includes:
judging whether the analyzed message contains a preset sensitive field or not in a regular matching sensitive field mode;
and if so, judging that the analyzed message contains the secret information.
Considering that the message of the wireless signal may contain the divulgence information, the message of the wireless signal may be analyzed according to the protocol identification types corresponding to different messages. In order to determine whether the analyzed message contains the divulgence information, in this embodiment, it may be determined whether the analyzed message contains a preset sensitive field in a regular matching sensitive field manner, where the regular matching sensitive field manner is that a character string representing the sensitive field is preset, then it is searched whether the analyzed message matches the preset character string representing the sensitive field, if the analyzed message contains the preset sensitive field, it is determined that the analyzed message contains the divulgence information, and by this manner, it may be effectively determined whether the analyzed message contains the divulgence information, so as to monitor the divulgence information in time and determine the location of the divulgence device.
In addition, the message of the wireless signal may be analyzed by using a modular code, which is not particularly limited herein.
In a preferred embodiment, the predetermined sensitive fields include a combination of one or more of latitude and longitude, name, code, time of work or rest, project, secret, and secret.
Specifically, the preset sensitive field may include, but is not limited to, a combination of one or more of the foregoing, so that the preset sensitive field has various specific implementations.
The names may be names of key characters, and the latitudes and longitudes may be real-time location information of the key characters, and of course, the specific implementation is not limited to the above examples, and may also be other implementation manners, which is determined according to actual situations, and the present application is not particularly limited herein.
Therefore, when the preset sensitive fields comprise the longitude and latitude, the name, the code, the work and rest time, the item, the confidentiality level and the confidentiality, the function of whether the message after matching analysis contains the divulgence information or not can be realized, and the realization mode is accurate and reliable.
As a preferred embodiment, the frequency range of the wireless signal is 125KHz-5 GHz.
In particular, the frequency range of the wireless signal may include, but is not limited to, the frequency ranges described above, such that the frequency range of the wireless signal has a variety of specific implementations.
The frequency of the wireless signal may be 125KHz or 13.54MHz, and of course, the specific implementation is not limited to the above example, and other implementations may also be implemented, which is determined by the actual situation, and the present application is not particularly limited herein.
Therefore, when the frequency range of the wireless signal is the above frequency range, the frequency range of the wireless signal of each frequency band can be covered, and the implementation mode is accurate and reliable.
Referring to fig. 3, fig. 3 is a schematic diagram of a frame of a disclosure monitoring apparatus provided in the present application.
As a preferred embodiment, the determining the location of the compromised device based on the signal strength of the wireless signal transmitting the message containing the compromised information comprises:
controlling a display module to display a wireless signal for transmitting a message containing divulgence information;
determining a wireless line number designated by a user from a wireless signal for transmitting a message containing the leakage information based on a user instruction;
the control display module displays the signal intensity of the wireless line number appointed by the user so that the user can move the divulgence monitoring device according to the signal intensity;
when the user moves the divulgence monitoring device, the display module is controlled to display the signal intensity of the wireless line number appointed by the user at the current position of the divulgence monitoring device, so that the user can obtain the position of the divulgence device based on the position of the divulgence monitoring device when the signal intensity is maximum.
Specifically, in view of the above-mentioned embodiment that after the analyzed message is determined to contain the divulgence information, the processor controls the display module to display the wireless signal for transmitting the message containing the divulgence information, and the interface display may enable the user to more intuitively know the wireless signal for transmitting the message containing the divulgence information, where the display module may display a plurality of wireless signals for transmitting the message containing the divulgence information, so that the user specifies the wireless signal for transmitting the message containing the divulgence information, for example, the user may specify one of the wireless signals for transmitting the message containing the divulgence information from the plurality of wireless signals for transmitting the message containing the divulgence information to monitor and determine the location of the divulgence device corresponding to the wireless signal. The method comprises the steps of determining a wireless line number appointed by a user from wireless signals for transmitting messages containing leakage information based on a user instruction, and controlling a display module to display the signal intensity of the wireless line number appointed by the user, so that the user can move a leakage monitoring device according to the signal intensity, wherein the intensity of the wireless signal appointed by the user when the user moves the leakage monitoring device can be changed in real time. The strength of the designated wireless signal may be changed along with the position away from the divulgence device, and when the user moves the divulgence monitoring device, the display module is controlled to display the signal strength of the wireless line number designated by the user at the current position of the divulgence monitoring device, so that the user can obtain the position of the divulgence device based on the position of the divulgence monitoring device when the signal strength is maximum. By the method, the divulgence equipment with the divulgence information leaked can be accurately positioned.
For example, the control display module displays that the wireless signals of the message containing the information about the disclosure are FM signals and bluetooth signals, the wireless signal specified by the user is determined to be an FM signal based on the user instruction, the control display module displays the signal strength of the FM signal, and the control display module displays the signal strength of the FM signal of the current position of the disclosure monitoring apparatus when the user moves the disclosure monitoring apparatus, so that the user can obtain the position of the disclosure device based on the position of the disclosure monitoring apparatus when the signal strength is maximum.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a disclosure monitoring system, which includes:
a wireless signal acquisition unit 41 for acquiring a wireless signal received by the wireless signal reception matrix;
a protocol identification type determining unit 42, configured to determine a protocol identification type of a packet in the wireless signal;
the analysis unit 43 analyzes the message according to the protocol identification type;
a judging unit 44, configured to judge whether the analyzed message includes divulgence information, and if so, trigger the divulgence device determining unit 45;
a compromised device determination unit 45, configured to determine a location of the compromised device based on a signal strength of a wireless signal transmitting the message containing the compromised information.
For the introduction of the disclosure monitoring system provided by the present invention, please refer to the above method embodiment, and the present invention is not described herein again.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a disclosure monitoring apparatus, which includes:
a memory 51 for storing a computer program;
a processor 52 for implementing the steps of the above-described compromise monitoring method when executing the computer program.
Specifically, the processor 52 may be, but is not limited to, an MCU (micro controller Unit).
The operating system that processor 52 may run may be, but is not limited to, an embedded Linux operating system.
For the introduction of the disclosure monitoring apparatus provided by the present invention, please refer to the above method embodiment, and the present invention is not described herein again.
The invention also provides a storage medium, wherein the storage medium is stored with a computer program, and the computer program realizes the steps of the divulgence monitoring method when being executed by a processor.
For the introduction of a storage medium provided by the present invention, please refer to the above method embodiments, which are not repeated herein.
It is to be noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method for monitoring disclosure, a processor applied in a disclosure monitoring apparatus, comprising:
acquiring a wireless signal received by a wireless signal receiving matrix;
determining a protocol identification type of a message in the wireless signal;
analyzing the message according to the protocol identification type;
judging whether the analyzed message contains divulgence information or not;
and if so, determining the position of the divulgence equipment based on the signal strength of the wireless signal of the message transmitting the divulgence information.
2. The compromise monitoring method according to claim 1, wherein acquiring the wireless signals received by the wireless signal receiving matrix comprises:
wireless signals received by the RF signal receiving matrix are acquired.
3. The method of claim 1, wherein determining a protocol identification type of a message in the wireless signal comprises:
identifying a frequency of the wireless signal;
and determining the protocol identification type of the message in the wireless signal according to the corresponding relation between the frequency of the wireless signal and the preset frequency protocol identification type.
4. The method for monitoring disclosure according to claim 1, wherein determining whether the analyzed message contains disclosure information includes:
judging whether the analyzed message contains a preset sensitive field or not in a regular matching sensitive field mode;
and if so, judging that the analyzed message contains the secret information.
5. The method of claim 4, wherein the predetermined sensitive fields include one or more of latitude and longitude, name, code, work and rest time, project, secret level and secret.
6. The method for monitoring for compromise leakage according to claim 1, wherein the frequency range of said wireless signal is 125KHz-5 GHz.
7. The method for monitoring for compromise according to any one of claims 1 to 6, wherein determining the location of the compromised device based on the signal strength of the wireless signal transmitting the message containing the compromise information comprises:
controlling a display module to display and transmit a wireless signal of a message containing the divulgence information;
determining a wireless line number designated by a user from a wireless signal for transmitting a message containing the divulgence information based on a user instruction;
controlling the display module to display the signal strength of the wireless line number specified by the user so that the user can move the divulgence monitoring device according to the signal strength;
and when the user moves the divulgence monitoring device, controlling the display module to display the signal intensity of the wireless line number specified by the user at the current position of the divulgence monitoring device, so that the user can obtain the position of the divulgence equipment based on the position of the divulgence monitoring device when the signal intensity is maximum.
8. A compromise monitoring system, comprising:
the wireless signal acquisition unit is used for acquiring wireless signals received by the wireless signal receiving matrix;
a protocol identification type determining unit, configured to determine a protocol identification type of a packet in the wireless signal;
the analysis unit is used for analyzing the message according to the protocol identification type;
the judging unit is used for judging whether the analyzed message contains divulgence information or not, and if so, triggering the divulgence equipment determining unit;
the secret divulging device determining unit is used for determining the position of the secret divulging device based on the signal strength of the wireless signal of the message which transmits the message containing the secret divulging information.
9. A compromise monitoring device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the compromise monitoring method according to any one of claims 1 to 7 when executing a computer program.
10. A storage medium, characterized in that the storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of the compromise monitoring method according to any one of claims 1 to 7.
CN202111115358.5A 2021-09-23 2021-09-23 Method, system, device and storage medium for monitoring divulgence Withdrawn CN113852626A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111115358.5A CN113852626A (en) 2021-09-23 2021-09-23 Method, system, device and storage medium for monitoring divulgence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111115358.5A CN113852626A (en) 2021-09-23 2021-09-23 Method, system, device and storage medium for monitoring divulgence

Publications (1)

Publication Number Publication Date
CN113852626A true CN113852626A (en) 2021-12-28

Family

ID=78978910

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111115358.5A Withdrawn CN113852626A (en) 2021-09-23 2021-09-23 Method, system, device and storage medium for monitoring divulgence

Country Status (1)

Country Link
CN (1) CN113852626A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105678188A (en) * 2016-01-07 2016-06-15 杨龙频 Anti-leakage protocol identification method and device for database
CN107862214A (en) * 2017-06-16 2018-03-30 平安科技(深圳)有限公司 Prevent the method, apparatus and storage medium of sensitive information leakage
CN111726810A (en) * 2020-06-17 2020-09-29 华中科技大学 Wireless signal monitoring and wireless communication behavior auditing system in numerical control processing environment
CN111726809A (en) * 2020-06-17 2020-09-29 华中科技大学 Network security auditing method and system under numerical control environment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105678188A (en) * 2016-01-07 2016-06-15 杨龙频 Anti-leakage protocol identification method and device for database
CN107862214A (en) * 2017-06-16 2018-03-30 平安科技(深圳)有限公司 Prevent the method, apparatus and storage medium of sensitive information leakage
CN111726810A (en) * 2020-06-17 2020-09-29 华中科技大学 Wireless signal monitoring and wireless communication behavior auditing system in numerical control processing environment
CN111726809A (en) * 2020-06-17 2020-09-29 华中科技大学 Network security auditing method and system under numerical control environment

Similar Documents

Publication Publication Date Title
CN113115341B (en) Method, device, equipment and storage medium for negotiating wireless sensing process
EP3002603B1 (en) Location system
US20070139199A1 (en) Method and apparatus for an active radio frequency identification tag
US10366592B2 (en) Beacon detection system for locating missing persons
US6907252B2 (en) Method and apparatus for detecting the presence of mobile terminals
US8937545B2 (en) System and method for situational awareness
CN101137913A (en) Location detecting system and RFID terminal
JP2013519335A (en) System and method for processing information related to tags and mobile phone
US11838785B2 (en) Messaging devices and methods
US9870688B2 (en) Protection support system, protection support server and protection terminal
KR101895293B1 (en) Method for localizing the position of a wireless device in an environment comprising a wireless network having at least one access point
US20020131393A1 (en) Graphic user interface for a radio location determination system
US9047749B2 (en) System and method for situational awareness
US9860679B2 (en) System and method for situational awareness
CN113852626A (en) Method, system, device and storage medium for monitoring divulgence
US20140129127A1 (en) System and Method For Situational Awareness
KR100716416B1 (en) Method for measuring quality of mobile communication data using messaging service and managing system for the same
Formosa et al. A LPWAN Case Study for Asset Tracking
US11862001B2 (en) System and methods for identifying a subject through device-free and device-oriented sensing technologies
JP2019149769A (en) Meter reading system, server, setter, and customer information generation method
US20230292088A1 (en) Determining proximity
KR100269368B1 (en) Emergency alarm system using wireless signal
CN114916060A (en) Target position identification method and device
KR20140080831A (en) Guiding method of moble phone location
CN110662000A (en) Image data transmission method and device, storage medium and monitoring equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20211228