Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security method and platform for sensitive areas

A sensitive area and community information technology, applied in the communication field, can solve problems such as data mining applications that are not considered, and achieve the effect of maintaining national security and interests

Active Publication Date: 2020-08-28
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing technology, operators only mine mobile phone basic data for their own business development, and do not consider the application of data mining in national security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security method and platform for sensitive areas
  • A security method and platform for sensitive areas
  • A security method and platform for sensitive areas

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] figure 1 This is a schematic flow diagram of a security method for a sensitive area provided in the first embodiment, such as figure 1 As shown, the method includes:

[0052] Step 101: Obtain a mobile user identification that visits a sensitive area.

[0053] Step 102: Determine whether the mobile user identifier is included in the pre-generated trusted user database corresponding to the sensitive area; if not, perform step 103; if so, the process ends.

[0054] Step 103: Determine whether the mobile user identifier is included in the pre-generated backtracking database corresponding to the sensitive area, if yes, execute step 104; if not, the process ends.

[0055] Step 104: Generate access information corresponding to the mobile user identifier according to the backtracking database.

[0056] Step 105: Perform an early warning based on the access information.

[0057] The security method for the sensitive area provided by this embodiment obtains the mobile user identification th...

Embodiment 2

[0059] figure 2 This is a schematic flow chart of a security method for a sensitive area provided in the second embodiment, such as figure 2 As shown, the method includes:

[0060] Step 201: Collect trusted numbers and trusted mobile user IMSI codes in the sensitive area.

[0061] Preferably, each step in this embodiment is executed by a security platform in a sensitive area.

[0062] Sensitive areas can be the surrounding areas of multiple key security units involved in national security scattered throughout the country.

[0063] Specifically, the trusted number is the mobile phone number of the staff in the sensitive area, and the trusted mobile user IMSI code is the IMSI (International Mobile Subscriber Identification Number, International Mobile Subscriber Identification Number) of the mobile users in the resident sensitive area or around the sensitive area. The staff in the sensitive area and the mobile users who live in or around the sensitive area are all trusted users.

[006...

Embodiment 3

[0095] image 3 This third embodiment provides a schematic structural diagram of a security platform in a sensitive area, such as image 3 As shown, the platform includes an acquisition module 11, a judgment module 12, a generation module 13, and an early warning module 14.

[0096] The obtaining module 11 is used to obtain a mobile user identification that visits a sensitive area.

[0097] The judging module 12 is used to judge whether the mobile user identification is included in the pre-generated trusted user database corresponding to the sensitive area, and whether the mobile user identification is included in the pre-generated backtracking database corresponding to the sensitive area .

[0098] The generating module 13 is configured to generate access information corresponding to the mobile user identification according to the backtracking database.

[0099] The early warning module 14 is used for early warning based on the access information.

[0100] Further, the generating mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security method and platform for a sensitive area. The method comprises the following steps: acquiring a mobile subscriber identity for accessing the sensitive area; judgingwhether a pre-generated trusted user database corresponding to the sensitive area includes the mobile subscriber identity or not; if not, judging whether a pre-generated backtracking database corresponding to the sensitive area includes the mobile subscriber identity or not; and if so, generating access information corresponding to the mobile subscriber identity according to the backtracking database, and making an early warning according to the access information. The tracks of mobile subscribers are mined on the basis of core network data of an operator, so that mobile subscribers frequentlyapproaching the sensitive area can be found in time, and the national security and interests are maintained effectively.

Description

Technical field [0001] The invention relates to the field of communication technology, in particular to a security method and platform for sensitive areas. Background technique [0002] At present, big data technology has become a new driving force for social and economic development. With the improvement of data collection methods and capabilities, it has also brought about big data technological changes with high-performance large-scale data processing capabilities as the core technology. The core of big data technology involves data mining algorithms. Specifically, it extracts features from big data, generates new data through scientific modeling, and finally obtains predictive analysis results. At the same time, in the telecommunications industry, mobile phones have been greatly popularized. The popularity of mobile phones has driven operators' traffic applications. Mining the basic mobile phone data collected by operators can bring more added value. Specifically, the basic d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/021H04W8/18H04W8/20G06F16/9537
CPCG06F2216/03H04W4/021H04W8/18H04W8/205
Inventor 李希金
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products