Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-monitoring method and system for mobile terminal

A technology of mobile terminal and monitoring method, which is applied in the direction of electrical components, wireless communication, security devices, etc., can solve the problems of illegal recording and dissemination of call content, achieve the effect of protecting personal privacy and safety, and improving satisfaction

Active Publication Date: 2011-05-04
BEIJING QIHOO TECH CO LTD
View PDF2 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide an anti-monitoring method and system for a mobile terminal, so as to prevent the call content of the mobile terminal from being illegally recorded and disseminated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-monitoring method and system for mobile terminal
  • Anti-monitoring method and system for mobile terminal
  • Anti-monitoring method and system for mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0017] The current illegal monitoring program mainly calls the recording module of the mobile phone through a Trojan horse program, or the Trojan horse program itself has a recording function, resides in the user's mobile terminal, records voice clips privately during the user's call, and then passes the multimedia message Or Internet upload to listeners. Therefore, if during a mobile phone call, whether the recording module is running or started by monitoring, it is possible to effectively prevent the Trojan horse program from monitoring the call.

[0018] And the recording module described in the present invention, both can be the recording software that this mobile terminal carries, also can be other software with recording function installed later. As for whether there is a recording function, it can be judged in various ways, such as a pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an anti-monitoring method and system for a mobile terminal. The anti-monitoring method comprising the following steps: when the mobile terminal initiates or answers a call, indexing the process of an existing running program; and if judging that the process of a sound recording module runs currently, closing the process of the sound recoding module, and establishing conversation. The anti-monitoring method and system are used to ensure that conversation content of a user can not be recorded and spread illegally during the conversation, thus effectively protecting individual privacy and safety of the user, and improving degree of satisfaction of the user.

Description

technical field [0001] The present invention relates to an anti-monitoring method and system, in particular to an anti-monitoring method and system for mobile terminals. Background technique [0002] At present, mobile terminals such as mobile phones have been widely popularized and developed. Therefore, various applications around mobile terminals are also emerging one after another. Especially after the emergence of smart phones, users can constantly update the functions of mobile phones through programs provided by a large number of third-party service providers. It can be expanded and wireless network access can be realized through the mobile communication network, and various mobile phone applications have emerged accordingly. [0003] However, as people rely more and more on mobile phones, users are often threatened by some malicious programs while enjoying the pleasure brought by rich and colorful mobile phone applications. These malicious programs have various manife...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W88/02H04W12/126
Inventor 李涛黄礼强
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products