User track similarity judgment method and related device

A trajectory similarity and user trajectory technology, applied in the field of network security, can solve the problem of low accuracy

Inactive Publication Date: 2019-12-24
WUHAN ANTIY MOBILE SECURITY
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But we know that the paths of A and B still have a large deviation, so the accuracy of this path judgment method is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User track similarity judgment method and related device
  • User track similarity judgment method and related device
  • User track similarity judgment method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] figure 1 It is a flowchart of a method for judging user trajectory similarity according to Embodiment 1 of the method of the present invention. see see figure 1 , in this embodiment, the method includes:

[0035] Step S11, determine the path of two users with time sequence, this path includes all spatial location information of staying and the time period information of staying in each spatial location;

[0036] Specifically, the spatial location information and short stay time information contained in the user's time-ordered route can be obtained through a device that directly or indirectly obtains the geographic location, for example, using an app with positioning information, or using the user to send a network request The exposed ip, or wifi or base station, etc.

[0037] Step S13, determine the common sub-paths of the two users, the common sub-paths of the two users contain the same spatial location, and the order of stay time is the same, and determine the common...

Embodiment 2

[0047] figure 2 It is a flow chart of a method for judging user trajectory similarity according to Embodiment 2 of the method of the present invention. see see figure 2 , in this embodiment, the method includes:

[0048] Step S21, determine the path of two users with time sequence, this path includes all spatial location information of stay and the time period information of staying in each spatial location;

[0049] Step S22, for a certain user, if staying in at least two identical spatial locations continuously, update at least two identical spatial locations to one spatial location, and update the time of the spatial location to the continuous stay time, so as to The user's path is simplified;

[0050] Step S23, determine the public sub-paths of the two users, the spatial positions contained in the public sub-paths of the two users are the same, and the order of stay time is consistent, and the public sub-path with the longest spatial path is determined as the longest ...

Embodiment 3

[0069] image 3 It is a flowchart of a method for judging user trajectory similarity according to Embodiment 3 of the method of the present invention. see see image 3 , in this embodiment, the method includes:

[0070] Step S31, determine the path of two users with time sequence, this path includes all spatial location information of staying and the time period information of staying in each spatial location;

[0071] Step S32, for a certain user, if staying in at least two identical spatial locations continuously, then update at least two identical spatial locations as one spatial location, and update the time of the spatial location as the continuous stay time, so as to The user's path is simplified;

[0072] Step S33, determine the public sub-paths of the two users, the spatial positions contained in the public sub-paths of the two users are the same, and the order of stay time is consistent, and the public sub-path with the longest spatial path is determined as the longe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a user trajectory similarity judgment method, a corresponding device, computer equipment and a computer storage medium, and relates to the technical field ofnetwork security. The user trajectory similarity judgment method comprises the following steps: determining paths with a time sequence of two users; determining the longest common sub-path of the twousers; and determining the track similarity of the two users according to the time overlapping degree of each corresponding adjacent space in the longest common sub-paths of the two users, and/or thenumber of spatial positions contained in the longest common sub-paths, and/or the number of the longest common sub-paths. According to the invention, paths of two users are converted into a time sequence of spatial positions based on the idea of pattern recognition; a time interval covering method is used for replacing a time threshold value, the user track similarity can be accurately obtained, by means of the method, if a single suspicious person starts from the perspective of the single suspicious person, a suspicious gang similar to the single suspicious person can be rapidly found, and conversion from a single user portrait to a group user portrait is achieved.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a user track similarity judgment method, device, computer equipment and computer storage program. Background technique [0002] With the rapid development of social economy, the incidence rate of gang crimes continues to rise. Compared with general criminal cases, gang crimes are more harmful to society. In addition, from the perspective of national security, it is particularly important to identify suspicious organizations, members of dangerous organizations and their movements, and to monitor dangerous groups in real time. At present, the relevant security departments mostly use the mobile phone information of dangerous elements to do heuristic monitoring work. Relevant agencies and departments also use mobile phone user portraits to profile massive mobile phone log data and find dangerous and suspicious elements. However, whether it is heuristic monitoring or...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62H04W4/029G06Q50/26
CPCH04W4/029G06Q50/265G06F18/22
Inventor 张路潘宣辰
Owner WUHAN ANTIY MOBILE SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products