A security method and platform for sensitive areas
A technology for sensitive areas and community information, applied in the field of communication, can solve problems such as unconsidered data mining applications, and achieve the effect of maintaining national security and interests
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0061] figure 1 A schematic flowchart of a security method for a sensitive area provided in Embodiment 1, as shown in figure 1 As shown, the method includes:
[0062] Step 101. Obtain mobile user IDs for accessing sensitive areas.
[0063] Step 102, judging whether the pre-generated trusted user database includes the mobile user ID, if it is judged that the pre-generated trusted user database does not include the mobile user ID, perform step 103, if it is judged that the pre-generated trusted user The mobile user ID is included in the mobile user database, and the flow ends.
[0064] Step 103: Generate the number of visits to sensitive areas corresponding to the mobile user ID according to the mobile user ID and the pre-acquired sensitive area database.
[0065] Step 104, giving an early warning according to the number of visits to the sensitive area.
[0066] The security method for the sensitive area provided by this embodiment obtains the mobile user identification for ...
Embodiment 2
[0068] figure 2 A schematic flow diagram of a method provided in Embodiment 2, such as figure 2 As shown, the method includes:
[0069] Step 201, collecting trusted numbers in sensitive areas.
[0070] Preferably, each step in this embodiment is executed by a security platform in a sensitive area.
[0071] Sensitive areas can be surrounding areas of multiple key security units involved in national security scattered across the country.
[0072] Specifically, the staff in the sensitive area and the mobile users who live in the sensitive area or around the sensitive area are all trusted users, and the mobile phone numbers corresponding to the trusted users are trusted numbers.
[0073] Step 202. Obtain an IMSI code of a trusted mobile user corresponding to the trusted number.
[0074] The trusted mobile subscriber IMSI code (International Mobile Subscriber Identification Number, International Mobile Subscriber Identification Number) corresponding to the trusted number has ...
Embodiment 3
[0119] image 3 A schematic structural diagram of a security platform in a sensitive area provided in Embodiment 3, such as image 3 As shown, the platform includes: an acquisition module 11 , a judgment module 12 , a generation module 13 and an early warning module 14 .
[0120] The obtaining module 11 is used to obtain the identification of mobile users visiting sensitive areas.
[0121] The judging module 12 is used to judge whether the pre-generated trusted user database includes the mobile user identifier.
[0122] The generating module 13 is configured to generate a sensitive area corresponding to the mobile user ID according to the mobile user ID and the pre-acquired sensitive area database if the judging module determines that the pre-generated trusted user database does not include the mobile user ID number of visits.
[0123] The early warning module 14 is used to perform early warning according to the number of visits to the sensitive area.
[0124] Further, the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com