A security method and platform for sensitive areas

A technology for sensitive areas and community information, applied in the field of communication, can solve problems such as unconsidered data mining applications, and achieve the effect of maintaining national security and interests

Active Publication Date: 2021-02-02
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing technology, operators only mine mobile phone basic data for their own business development, and do not consider the application of data mining in national security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security method and platform for sensitive areas
  • A security method and platform for sensitive areas
  • A security method and platform for sensitive areas

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] figure 1 A schematic flowchart of a security method for a sensitive area provided in Embodiment 1, as shown in figure 1 As shown, the method includes:

[0062] Step 101. Obtain mobile user IDs for accessing sensitive areas.

[0063] Step 102, judging whether the pre-generated trusted user database includes the mobile user ID, if it is judged that the pre-generated trusted user database does not include the mobile user ID, perform step 103, if it is judged that the pre-generated trusted user The mobile user ID is included in the mobile user database, and the flow ends.

[0064] Step 103: Generate the number of visits to sensitive areas corresponding to the mobile user ID according to the mobile user ID and the pre-acquired sensitive area database.

[0065] Step 104, giving an early warning according to the number of visits to the sensitive area.

[0066] The security method for the sensitive area provided by this embodiment obtains the mobile user identification for ...

Embodiment 2

[0068] figure 2 A schematic flow diagram of a method provided in Embodiment 2, such as figure 2 As shown, the method includes:

[0069] Step 201, collecting trusted numbers in sensitive areas.

[0070] Preferably, each step in this embodiment is executed by a security platform in a sensitive area.

[0071] Sensitive areas can be surrounding areas of multiple key security units involved in national security scattered across the country.

[0072] Specifically, the staff in the sensitive area and the mobile users who live in the sensitive area or around the sensitive area are all trusted users, and the mobile phone numbers corresponding to the trusted users are trusted numbers.

[0073] Step 202. Obtain an IMSI code of a trusted mobile user corresponding to the trusted number.

[0074] The trusted mobile subscriber IMSI code (International Mobile Subscriber Identification Number, International Mobile Subscriber Identification Number) corresponding to the trusted number has ...

Embodiment 3

[0119] image 3 A schematic structural diagram of a security platform in a sensitive area provided in Embodiment 3, such as image 3 As shown, the platform includes: an acquisition module 11 , a judgment module 12 , a generation module 13 and an early warning module 14 .

[0120] The obtaining module 11 is used to obtain the identification of mobile users visiting sensitive areas.

[0121] The judging module 12 is used to judge whether the pre-generated trusted user database includes the mobile user identifier.

[0122] The generating module 13 is configured to generate a sensitive area corresponding to the mobile user ID according to the mobile user ID and the pre-acquired sensitive area database if the judging module determines that the pre-generated trusted user database does not include the mobile user ID number of visits.

[0123] The early warning module 14 is used to perform early warning according to the number of visits to the sensitive area.

[0124] Further, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security method and a platform for a sensitive area. The method includes: acquiring a mobile user ID for accessing a sensitive area, judging whether the pre-generated trusted user database includes the mobile user ID, and if it is judged that the pre-generated The trusted user database does not include the mobile user ID, and the number of sensitive area visits corresponding to the mobile user ID is generated according to the mobile user ID and the pre-acquired sensitive area database, and the number of sensitive area visits is performed according to the number of sensitive area visits early warning. The invention mines the trajectory of the mobile user based on the core network data of the operator, can timely find the mobile user frequently approaching the sensitive area, and effectively maintains national security and interests.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a security method and platform for sensitive areas. Background technique [0002] At present, big data technology has become a new driving force for social and economic development. With the improvement of data collection methods and capabilities, it has also brought about a big data technology revolution with high-performance large-scale data processing capabilities as the core technology. Now The core of big data technology involves data mining algorithms. Specifically, features are mined from big data, new data is generated through scientific modeling, and predictive analysis results are finally obtained. At the same time, in the telecommunications industry, mobile phones have been greatly popularized. The popularity of mobile phones has driven the traffic application of operators. Mining the basic data of mobile phones collected by operators can bring more added value....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/021H04W4/12H04W24/08H04W48/04
CPCH04W4/021H04W4/12H04W24/08H04W48/04
Inventor 李希金
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products