×

Information interception processing method, terminal, and computer storage medium

  • US 10,567,841 B2
  • Filed: 09/18/2017
  • Issued: 02/18/2020
  • Est. Priority Date: 12/30/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method for information interception processing, the method comprising:

  • starting, by a device comprising a memory and a processor in communication with the memory, a first application;

    extracting, by the device, an application list of applications that need to be intercepted;

    separately configuring, by the device, an interception policy for each respective to-be-intercepted application in the application list;

    obtaining, by the device, a network request sent by a respective to-be-intercepted application;

    when the first application enters an interception mode;

    monitoring, by the device, according to an interception policy of the respective to-be-intercepted application, the network request sent by the respective to-be-intercepted application,obtaining, by the device, through matching, communication information that conforms to the interception policy, the communication information being associated with the network request,matching, by the device, the communication information with a preset policy, andwhen it is determined, through matching, that the communication information is specified target information corresponding to the preset policy;

    intercepting, by the device, the network request, andlocating and tracing, by the device, the respective to-be-intercepted application that sends the network request; and

    wherein, when the first application enters the interception mode, monitoring, by the device according to the interception policy of the respective to-be-intercepted application, the network request sent by the respective to-be-intercepted application and obtaining, by the device through matching, the communication information being associated with the network request comprise;

    monitoring, by the device, interactions of network requests in X target processes, to capture the network request, X being a natural number greater than 1,setting, by the device, hook functions in a first function sendto and a second function recvfrom that are used for representing a request message forwarding node,generating, by the device, a first monitoring function hook_sendto and a second monitoring function hook_recvfrom that are used for monitoring interactions of network requests,using, by the device, the first monitoring function hook_sendto and the second monitoring function hook_recvfrom as a monitoring detection interface, andobtaining, by the device, the communication information according to the monitoring detection interface.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×