INFORMATION INTERCEPTION PROCESSING METHOD, TERMINAL, AND COMPUTER STORAGE MEDIUM
First Claim
1. A method for information interception processing, the method comprising:
- starting, by a device comprising a memory and a processor in communication with the memory, a first application;
obtaining, by the device, a network request sent by a to-be-intercepted application; and
when the first application enters an interception mode;
monitoring, by the device, interactions of network requests in X target processes, to capture the network request, X being a natural number greater than 1,setting, by the device, hook functions in a first function sendto and a second function recvfrom that are used for representing a request message forwarding node,generating, by the device, a first monitoring function hook_sendto and a second monitoring function hook_recvfrom that are used for monitoring interactions of network requests,using, by the device, the first monitoring function hook_sendto and the second monitoring function hook_recvfrom as a monitoring detection interface, andobtaining, by the device, communication information according to the monitoring detection interface.
1 Assignment
0 Petitions
Accused Products
Abstract
An information interception method, a terminal, and a computer storage medium are disclosed. The method includes: starting a first application, extracting an application list of applications that need to be intercepted, and separately configuring an interception policy for each to-be-intercepted application in the application list; obtaining a network request sent by a to-be-intercepted application, and monitoring, when the first application enters an interception mode, according to the configured interception policy, the network request sent by the to-be-intercepted application, to obtain, through matching, communication information that conforms to the interception policy, where the communication information is associated with the network request; and matching the communication information with a preset policy, when the communication information is specified target information corresponding to the preset policy, intercepting the network request and locating and tracing the to-be-intercepted application that sends the network request.
0 Citations
20 Claims
-
1. A method for information interception processing, the method comprising:
-
starting, by a device comprising a memory and a processor in communication with the memory, a first application; obtaining, by the device, a network request sent by a to-be-intercepted application; and when the first application enters an interception mode; monitoring, by the device, interactions of network requests in X target processes, to capture the network request, X being a natural number greater than 1, setting, by the device, hook functions in a first function sendto and a second function recvfrom that are used for representing a request message forwarding node, generating, by the device, a first monitoring function hook_sendto and a second monitoring function hook_recvfrom that are used for monitoring interactions of network requests, using, by the device, the first monitoring function hook_sendto and the second monitoring function hook_recvfrom as a monitoring detection interface, and obtaining, by the device, communication information according to the monitoring detection interface. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A device for information interception processing, comprising:
-
a memory storing instructions; and a processor in communication with the memory, wherein, when the processor executes the instructions, the processor is configured to cause the device to; start a first application, obtain a network request sent by a to-be-intercepted application, and when the first application enters an interception mode; monitor interactions of network requests in X target processes, to capture the network request, X being a natural number greater than 1, set hook functions in a first function sendto and a second function recvfrom that are used for representing a request message forwarding node, generate a first monitoring function hook_sendto and a second monitoring function hook_recvfrom that are used for monitoring interactions of network requests, use the first monitoring function hook_sendto and the second monitoring function hook_recvfrom as a monitoring detection interface, and obtain communication information according to the monitoring detection interface. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium storing instructions, when the instructions are executed by a processor, the instructions configured to cause the processor to perform:
-
starting a first application; obtaining a network request sent by a to-be-intercepted application; and when the first application enters an interception mode; monitoring interactions of network requests in X target processes, to capture the network request, X being a natural number greater than 1, setting hook functions in a first function sendto and a second function recvfrom that are used for representing a request message forwarding node, generating a first monitoring function hook_sendto and a second monitoring function hook_recvfrom that are used for monitoring interactions of network requests, using the first monitoring function hook_sendto and the second monitoring function hook_recvfrom as a monitoring detection interface, and obtaining communication information according to the monitoring detection interface. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification