CN110324779A - Location data monitoring method and relevant device based on information security - Google Patents

Location data monitoring method and relevant device based on information security Download PDF

Info

Publication number
CN110324779A
CN110324779A CN201910425218.4A CN201910425218A CN110324779A CN 110324779 A CN110324779 A CN 110324779A CN 201910425218 A CN201910425218 A CN 201910425218A CN 110324779 A CN110324779 A CN 110324779A
Authority
CN
China
Prior art keywords
information
coordinate information
unique identification
terminal
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910425218.4A
Other languages
Chinese (zh)
Inventor
陈翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201910425218.4A priority Critical patent/CN110324779A/en
Publication of CN110324779A publication Critical patent/CN110324779A/en
Priority to PCT/CN2019/117293 priority patent/WO2020232999A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Abstract

The present invention relates to field of information security technology more particularly to a kind of location data monitoring methods and relevant device based on information security.This method comprises: application software obtains unique identification and terminal geographic location coordinate information, terminal geographic location coordinate information, unique identification and user information are uploaded to back-end server;Back-end server obtains reference geographical location coordinate information by unique identification, range difference is calculated to reference geographical location coordinate information and terminal geographic location coordinate information, judge whether range difference is more than preset error threshold, if being more than, then it is judged as there are imitation behavior, user information and location data fraud information is recorded in trust evaluation table.The present invention determines the substantially coordinate of user terminal by the unique identification of acquisition positioning device, is compared with the coordinate information of terminal system identification, and the imitation behavior of energy effective monitoring user terminal provides reliable trust evaluation data for subsequent financial business.

Description

Location data monitoring method and relevant device based on information security
Technical field
The present invention relates to field of information security technology more particularly to a kind of location data monitoring methods based on information security And relevant device.
Background technique
APP software (application software), refers to and is mounted on intelligent subscriber terminal, former to improve such as the application software on mobile phone The deficiency and personalized service of beginning system.With popularizing for user terminal, APP software is widely used.Positioning in APP software Information is also more and more applied in various projects.
Mobile phone is positioned by APP software, when obtaining location information, exists and is distorted by Part Development tool GPS positioning data distort the behavior of GPS positioning data by simulator or mode of escaping from prison etc., cause GPS positioning information to fake existing As leading to security risk problem.
Summary of the invention
In view of this, it is necessary to cause asking for GPS imitation behavior for using developing instrument, simulator or the mode of escaping from prison Topic, provides a kind of location data monitoring method and relevant device based on information security.
A kind of location data monitoring method based on information security, comprising:
Application software obtains the unique identification for the positioning device connecting with user terminal, and the application software defaults in described In user terminal;
The application software sends Location Request to the terminal system of the user terminal, and obtains the terminal system and return The terminal geographic location coordinate information returned, will be in the terminal geographic location coordinate information, the unique identification and user information Reach back-end server;
The back-end server receives the terminal geographic location coordinate information, the unique identification and user letter Breath, obtains reference geographical location coordinate information by the unique identification;
The back-end server is to the reference geographical location coordinate information and the terminal geographic location coordinate information meter Range difference is calculated, judges whether the range difference is more than preset error threshold, if being more than, is judged as there are imitation behavior, it will The user information and location data fraud information are recorded in preset trust evaluation table, the location data fraud information Including current time, the reference geographical location coordinate information and the terminal geographic location coordinate information.
In a kind of possible design, the application software obtains the unique identification for the positioning device connecting with user terminal, The application software defaults in the user terminal, comprising:
The application software by application interface scan periphery hotspot WIFI equipment, obtain it is all scan it is described The website lan address and signal strength parameter of WIFI equipment;
Judge the number of the WIFI equipment scanned, it is described if the number, which is less than, is equal to predetermined number threshold value The number of unique identification is identical as the number of the WIFI equipment that scanning is arrived, by the website local area network of each WIFI equipment Address is defined as the unique identification;
Otherwise, the number of the unique identification is identical as number threshold value, and all WIFI equipments are pressed the signal Intensive parameter sorts from high to low, takes the highest number WIFI equipment identical with the number threshold value, will be each described The website lan address of WIFI equipment is defined as the unique identification.
In a kind of possible design, the application software obtains the unique identification for the positioning device connecting with user terminal, The application software defaults in the user terminal, comprising:
The application software inquires current serving BS equipment by application interface, obtains the base station of the base station equipment The Base Station Identification and regional areas code are defined as the unique identification by mark and regional areas code together.
In a kind of possible design, the back-end server receives the terminal geographic location coordinate information, described unique Mark and the user information, obtain reference geographical location coordinate information by the unique identification, comprising:
The unique identification is inquired in preset coordinate inquiry table, if containing described in the coordinate inquiry table Unique identification then reads the corresponding coordinate information of the unique identification, and the coordinate information is defined as reference geographical location and is sat Mark information;
If not containing the unique identification in the coordinate inquiry table, inquiry request is sent to third party system, from institute It states third party system and obtains the corresponding reference geographical location coordinate information of the unique identification;
The reference geographical location coordinate information and corresponding unique identification that obtain from the third party system are added into institute It states in coordinate inquiry table.
In a kind of possible design, the back-end server is to the reference geographical location coordinate information and the terminal It manages location coordinate information and calculates range difference, judge whether the range difference is more than preset error threshold, comprising:
It is poor to calculate the distance between the reference geographical location coordinate information and the terminal geographic location coordinate information, away from The calculation formula of deviation L is as follows:
L=R arccos (cos (wa)cos(wb)cos(jb-ja)+sin(wa)sin(wb))
Wherein, R is earth radius, (ja,wa) be the reference geographical location coordinate information latitude and longitude coordinates, (jb,wb) For the latitude and longitude coordinates of the terminal geographic location coordinate information;
Judge whether the range difference L is more than the error threshold.
In a kind of possible design, if described be more than, it is judged as there are imitation behavior, by the user information and positioning Data fabrication information is recorded in preset trust evaluation table, and the location data fraud information includes current time, described Reference geographical location coordinate information and the terminal geographic location coordinate information, comprising:
Search whether that there are the user informations in preset trust evaluation table, and if it exists, then by the positioning number It is added into the trust evaluation table corresponding with the user information according to fraud information, according to the range difference by the use Information corresponding confidence value in family carries out deduction, obtains current credibility value, and the current credibility value is replaced the user Confidence value in the corresponding trust evaluation table of information;
If it does not exist, then the user information and corresponding location data fraud information are added into the trust evaluation In table, preset initial trusted angle value is obtained, the initial trusted angle value is carried out by deduction according to the range difference, is obtained current The current credibility value is added into the trust evaluation table corresponding with the user information by confidence value.
In a kind of possible design, further includes:
Periodically the trust evaluation table is inquired, the user by the confidence value lower than preset monitoring threshold value Information and corresponding confidence value extract;
It inquires in preset key monitoring table with the presence or absence of the user information, and if it exists, then update the user information Otherwise the user information and corresponding confidence value are added into the key monitoring table by the corresponding confidence value;
The key monitoring table is automatically transmitted to target user by preset sending method.
A kind of location data monitoring device based on information security, comprising:
Unique identification module is obtained, the unique identification for the positioning device connecting with user terminal is obtained for application software, The application software defaults in the user terminal;
End coordinates module is obtained, positioning is sent to the terminal system of the user terminal for the application software and asks It asks, and obtains the terminal geographic location coordinate information that the terminal system returns, by the terminal geographic location coordinate information, institute It states unique identification and user information is uploaded to back-end server;
Reference coordinate module is obtained, receives the terminal geographic location coordinate information, described for the back-end server Unique identification and the user information obtain reference geographical location coordinate information by the unique identification;
Fraud information module is recorded, for the back-end server to the reference geographical location coordinate information and the end It holds geographical position coordinates information to calculate range difference, judges whether the range difference is more than preset error threshold, if being more than, is sentenced Break as there are imitation behaviors, the user information and location data fraud information be recorded in preset trust evaluation table, The location data fraud information includes that current time, the reference geographical location coordinate information and the terminal geographic position are sat Mark information.
A kind of computer equipment, including memory and processor are stored with computer-readable instruction in the memory, institute When stating computer-readable instruction and being executed by the processor, so that the processor executes the above-mentioned positioning number based on information security The step of according to monitoring method.
A kind of storage medium being stored with computer-readable instruction, the computer-readable instruction are handled by one or more When device executes, so that the step of one or more processors execute the above-mentioned location data monitoring method based on information security.
Above-mentioned location data monitoring method and relevant device based on information security, including application software obtain and user's end The unique identification of the positioning device of connection is held, the application software defaults in the user terminal;The application software is to institute The terminal system for stating user terminal sends Location Request, and obtains the terminal geographic position coordinates letter that the terminal system returns Breath, is uploaded to back-end server for the terminal geographic location coordinate information, the unique identification and user information;The rear end Server receives the terminal geographic location coordinate information, the unique identification and the user information, passes through unique mark Knowledge obtains reference geographical location coordinate information;The back-end server is to the reference geographical location coordinate information and the terminal Geographical position coordinates information calculates range difference, judges whether the range difference is more than preset error threshold, if being more than, is judged For there are imitation behaviors, the user information and location data fraud information are recorded in preset trust evaluation table, institute Stating location data fraud information includes current time, the reference geographical location coordinate information and the terminal geographic position coordinates Information.The present invention determines the substantially coordinate of user terminal, the terminal with user terminal by the unique identification of acquisition positioning device The coordinate information of system identification is compared, it is determined whether there are the cheating of GPS positioning data or fakement phenomenas, can effective monitoring use The imitation behavior of family terminal provides reliable trust evaluation data for subsequent financial business.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention Limitation.
Fig. 1 is the flow chart of the location data monitoring method based on information security in one embodiment of the invention;
Fig. 2 is the structure chart of the location data monitoring device based on information security in one embodiment of the invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.
Fig. 1 is the flow chart of the location data monitoring method based on information security in one embodiment of the invention, such as Fig. 1 It is shown, a kind of location data monitoring method based on information security, comprising the following steps:
Step S1, obtain unique identification: application software obtains the unique identification for the positioning device connecting with user terminal, answers It is defaulted in user terminal with software.
The application software (APP software) of this step is default in the user terminal, and user terminal can be mobile phone, plate electricity Brain, computer etc. can load the terminal device of application software.Application software is obtained by preset application api interface and user The unique identification of any positioning device of terminal connection.
In one embodiment, positioning device can be periphery WIFI equipment, then step S1, comprising:
Step S101, Scan orientation equipment: application software scans periphery hotspot WIFI equipment by application interface, obtains Take the website lan address and signal strength parameter of all WIFI equipments scanned.
Application software scans periphery WIFI equipment using api interface by calling, and obtains the station of multiple periphery WIFI equipments Point lan address BSSID and signal strength parameter.Each WIFI equipment has unique BSSID, the model of signal strength parameter It encloses for 0.0-1.0.
Step S102 judges number and defines unique identification: the number for the WIFI equipment that judgement scans, if number is less than Equal to predetermined number threshold value, then the number of unique identification is identical as the number for the WIFI equipment that scanning is arrived, by each WIFI equipment Website lan address be defined as a unique identification.
When the WIFI equipment scanned is less, it is no more than number threshold value, then all by all corresponding BSSID of WIFI equipment It is included in term of reference, all BSSID is defined as unique identification, unique identification contains multiple at this time.For example, number threshold Value takes 5, and when scanning to WIFI equipment is 3, then unique identification is also 3, the corresponding BSSID of respectively 3 WIFI equipments.
Step S103, sequence and definition unique identification: otherwise, the number of unique identification is identical as number threshold value, will own WIFI equipment sort from high to low by signal strength parameter, take highest number WIFI equipment identical with number threshold value, will The website lan address of each WIFI equipment is defined as a unique identification.
When the WIFI equipment scanned is more, it is more than number threshold value, is then screened, it is higher to filter out signal strength The corresponding BSSID of several WIFI equipments be all included in term of reference.For example, number threshold value takes 5, when scanning is to WIFI equipment 8,8 WIFI equipments are sorted from high to low by signal strength parameter, take highest 5 WIFI equipments, then unique identification is 5 The corresponding BSSID of 5 WIFI equipments that is a, respectively taking out.
Present embodiment is using WIFI equipment as positioning device, with the uniqueness of the BSSID of WIFI equipment, as subsequent ginseng The initial data for examining geographical position coordinates information can be used as the authentic data of the substantially coordinate of subsequent determining user terminal.
In one embodiment, positioning device can be base station equipment, then step S1, comprising:
Application software inquires current serving BS equipment by application interface, obtains the Base Station Identification and ground of base station equipment Base Station Identification and regional areas code are defined as unique identification by region code together.
Application software in the present embodiment inquires current serving BS equipment using api interface by calling, and obtains base Base Station Identification CID code, the regional areas code LAC code of station equipment return.CID code is the abbreviation of Cell Tower ID, and LAC code is The abbreviation of Location Area Code, CID code and LAC code are the call parameters of base station location, indispensable, are otherwise unable to base Stand firm position, thus the present embodiment by CID code and LAC code together as unique identification.
The present embodiment is using base station equipment as positioning device, with the uniqueness of CID code and LAC code in base station equipment, as The initial data of subsequent reference geographical position coordinates information can be used as the reliable number of the substantially coordinate of subsequent determining user terminal According to.
Step S2, obtain end coordinates: application software sends Location Request to the terminal system of user terminal, and obtains end The terminal geographic location coordinate information that end system returns, will be in terminal geographic location coordinate information, unique identification and user information Reach back-end server.
Application software obtains the terminal that terminal system returns by the api interface for calling terminal system to develop in this step Geographical position coordinates information.User information in this step is to log in the user information of the user of application software, and user is applying After being registered on software, registration information is recorded in preset storage location by application software automatically, this registration information is User information.
The application software of this step is when being uploaded to back-end server for data, by the way of network request, by terminal Geographical position coordinates information, unique identification and user information long-distance Log server are into back-end server.
Step S3, obtain reference coordinate: back-end server receives terminal geographic location coordinate information, unique identification and user Information obtains reference geographical location coordinate information by unique identification.
The unique identification of this step is the mark for determining location data, by identifying that unique identification can determine user Terminal referring generally to position, i.e. reference geographical location coordinate information.Multiple unique identifications if it exists, then by multiple unique identifications All obtain corresponding reference geographical location coordinate information.
In one embodiment, step S3, comprising:
Inquiry: step S301 unique identification is inquired in preset coordinate inquiry table, if containing in coordinate inquiry table There is unique identification, then read the corresponding coordinate information of unique identification, coordinate information is defined as reference geographical location coordinate information.
It is preset with a coordinate inquiry table in the database of back-end server, includes unique identification in coordinate inquiry table And the corresponding coordinate information of unique identification, this coordinate information is geographical position coordinates data, therefore coordinate information includes longitude And latitude, it is a kind of latitude and longitude coordinates data, this step passes through the latitude and longitude coordinates data definition that coordinate inquiry table will inquire For reference geographical location coordinate information.
Request: step S302 if not containing unique identification in coordinate inquiry table, sends inquiry to third party system and asks It asks, obtains the corresponding reference geographical location coordinate information of unique identification from third party system.
Since coordinate inquiry table is in the database for be preset in back-end server, it is understood that there may be it is incomplete, lack part The possibility of unique identification carries out inquiry to unique identification to third party system by way of request at this time and obtains corresponding reference Geographical position coordinates information.For example third-party electronic map development platform of third party system in this step.
Step S303, add data: by the reference geographical location coordinate information obtained from third party system and it is corresponding only One mark is added into coordinate inquiry table.
When in order to avoid inquiry next time, still lack unique identification in coordinate inquiry table, this step by coordinate inquiry table into Row is abundant, is added into reference geographical location coordinate information is got from third party system every time in coordinate inquiry table, increases straight The success rate for inquiring unique identification from database is connect, the efficiency for obtaining reference geographical location coordinate information is improved.
The present embodiment obtains in such a way that inquiry coordinate inquiry table and request third party system combine with reference to geographical position Coordinate information is set, whether fakes for subsequent location data and authentic data is provided.
Step S4, record fraud information: back-end server sits reference geographical location coordinate information and terminal geographic position It marks information and calculates range difference, judge whether range difference is more than preset error threshold, if being more than, be judged as in the presence of row of faking User information and location data fraud information to be recorded in preset trust evaluation table, location data fraud packet Include current time, reference geographical location coordinate information and terminal geographic location coordinate information.
Trust evaluation table in this step is preset in back-end server, and trust evaluation table includes user information, right Location data fraud information, the confidence value answered.Date-time, back-end server when location data fraud information includes record The terminal geographic location coordinate information that reference geographical location coordinate information, the user terminal obtained according to unique identification provides, together One user information may exist multinomial location data fraud information.Trust evaluation table in this step can be using such as following table Shown in 1:
Table 1
Multiple reference geographical location coordinate informations if it exists, then respectively by each reference geographical location coordinate information with Terminal geographic location coordinate information calculates range difference, obtains multiple range differences, judges whether each range difference is more than error respectively Threshold value, if any range difference is more than error threshold, then it is assumed that there are imitation behaviors.
In one embodiment, step S4, comprising:
Step S401 calculates range difference: calculate reference geographical location coordinate information and terminal geographic location coordinate information it Between range difference, the calculation formula of range difference L is as follows:
L=R arccos (cos (wa)cos(wb)cos(jb-ja)+sin(wa)sin(wb))
Wherein, R is earth radius, (ja,wa) be reference geographical location coordinate information latitude and longitude coordinates, (jb,wb) it is eventually Hold the latitude and longitude coordinates of geographical position coordinates information.
The data of reference geographical location coordinate information and terminal geographic location coordinate information are latitude and longitude coordinates, therefore can To combine above-mentioned range difference calculation formula according to latitude and longitude coordinates, distance between the two is obtained.
Step S402, judges range difference: judging whether range difference L is more than error threshold, if being more than, is judged as to exist and make False behavior searches whether that there are user informations in preset trust evaluation table, and if it exists, then location data is faked information It is added into trust evaluation table corresponding with user information, is subtracted the corresponding confidence value of user information according to range difference Point, current credibility value is obtained, by the confidence value in the corresponding trust evaluation table of current credibility value replacement user information.
When this step judges whether range difference L is more than error threshold, error threshold can be taken as one kilometer.Range difference L is not More than one kilometer, then it is assumed that terminal geographic location coordinate information is true, works without typing.If range difference L is more than one kilometer, Then think there are imitation behavior, typing is carried out to the corresponding location data fraud information of imitation behavior.
The corresponding several location data fraud information of the existing user information of possibility in the trust evaluation table of this step, when When there is imitation behavior again, as long as location data fraud information is added into corresponding user information.Confidence value Deduction mode is that range difference is bigger, and deduction is bigger.For example, range difference deduction can be directly used in deduction mode, range difference is taken Confidence value is directly subtracted integer by the integer of absolute value, fractions omitted, obtains current credibility value.When there are multiple distances When poor, using maximum value in range difference as deduction foundation, deduction is carried out to confidence value.
User information and corresponding location data fraud information are then added into confidence level and commented by step S403 if it does not exist In valence table, preset initial trusted angle value is obtained, initial trusted angle value is carried out by deduction according to range difference, obtains current credibility Value, current credibility value is added into trust evaluation table corresponding with user information.
When user information is not present in trust evaluation table, it is believed that there is not imitation behavior before the user information, Increase the user information and corresponding position data fabrication information in trust evaluation table.It is preset in the database of back-end server One initial trusted angle value carries out deduction to initial trusted angle value according to range difference, obtains current credibility value, and will be current Confidence value is also added in trust evaluation table, and filling corresponding with user information.
The present embodiment obtains range difference L using range difference calculation formula, by comparing range difference L with error threshold Compared with judging whether there is imitation behavior, realize monitoring user's location data fakement phenomena.When if it exists the case where imitation behavior, Location data fraud information is recorded in trust evaluation table, provides reasonable authentic data for subsequent financial business.
It in one embodiment, further include step S5, comprising:
Step S501 is periodically inquired: periodically being inquired trust evaluation table, and confidence value is lower than preset monitoring The user information of threshold value and corresponding confidence value extract.
This step can use timed task, realize periodically inquiry purpose.Monitoring threshold value can be according to the need of financial business It asks, is set as multiple, confidence value is compared with multiple monitoring threshold values respectively, when being lower than a certain monitoring threshold value, extracts user Information and confidence value, this step can be inquired and be extracted using structured query language SQL statement.
Step S502 adds data: inquiring in preset key monitoring table with the presence or absence of user information, and if it exists, then more User information and corresponding confidence value, are otherwise added into key monitoring table by the corresponding confidence value of new user information.
Since confidence level requirement of the different financial business to user is different, such as loan process is to confidence value requirement It can be very high.If being preset with multiple monitoring threshold values in step S501, the key monitoring table in this step is also preset with identical Number, the corresponding key monitoring table of each monitoring threshold value.Confidence value lower than which monitoring threshold value, then the user information extracted and Corresponding confidence value is added into corresponding key monitoring table.
Step S503 sends table: key monitoring table is automatically transmitted to target user by preset sending method.
The regular key monitoring table inquired and updated is sent to corresponding target by way of sending automatically by this step User, use when target user checks confidence level for financial business.Such as when carrying out loan transaction, staff By calling this key monitoring table, according to the corresponding confidence value of user information, inquire whether user meets loan transaction.
Trust evaluation table is periodically carried out subsequent follow-up by the present embodiment, passes through inquiry to trust evaluation table and ratio It is right, it checks out the lower user of confidence value and carries out key monitoring, generate key monitoring table, be sent to financial business party in request, Realize the meaning of monitoring to location data.
Location data monitoring method of the present embodiment based on information security, by scanning the WIFI equipment of user terminal or looking into Current serving BS equipment is ask, unique identification is obtained, reference geographical location coordinate information is obtained by unique identification, this coordinate Information is the true location information of user terminal, the terminal geographic provided by reference to geographical position coordinates information and user terminal Location coordinate information is compared, and investigation user whether there is location data imitation behavior, and investigation mode is accurate and reliable, can be effective The imitation behavior for monitoring user terminal, provides reliable confidence packets for subsequent financial business.
In one embodiment it is proposed that a kind of location data monitoring device based on information security, as shown in Fig. 2, packet Include following module:
Unique identification module is obtained, the unique identification for the positioning device connecting with user terminal is obtained for application software, Application software defaults in user terminal;
End coordinates module is obtained, sends Location Request to the terminal system of user terminal for application software, and obtain The terminal geographic location coordinate information that terminal system returns, by terminal geographic location coordinate information, unique identification and user information It is uploaded to back-end server;
Reference coordinate module is obtained, receives terminal geographic location coordinate information, unique identification and use for back-end server Family information obtains reference geographical location coordinate information by unique identification;
Fraud information module is recorded, reference geographical location coordinate information and terminal geographic position are sat for back-end server It marks information and calculates range difference, judge whether range difference is more than preset error threshold, if being more than, be judged as in the presence of row of faking User information and location data fraud information to be recorded in preset trust evaluation table, location data fraud packet Include current time, reference geographical location coordinate information and terminal geographic location coordinate information.
In one embodiment it is proposed that a kind of computer equipment, including memory and processor, it is stored in memory Computer-readable instruction, when computer-readable instruction is executed by processor, so that reality when processor executes computer-readable instruction Step in the location data monitoring method based on information security of existing the various embodiments described above.
In one embodiment it is proposed that a kind of storage medium for being stored with computer-readable instruction, computer-readable finger When order is executed by one or more processors so that one or more processors execute the various embodiments described above based on information security Location data monitoring method in step.Wherein, storage medium can be non-volatile memory medium.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage Medium may include: read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc..
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
Some exemplary embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but It cannot be construed as a limitation to the scope of the present invention.It should be pointed out that for the ordinary skill people of this field For member, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to of the invention Protection scope.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (10)

1. a kind of location data monitoring method based on information security characterized by comprising
Application software obtains the unique identification for the positioning device connecting with user terminal, and the application software defaults in the user In terminal;
The application software sends Location Request to the terminal system of the user terminal, and obtains what the terminal system returned The terminal geographic location coordinate information, the unique identification and user information are uploaded to by terminal geographic location coordinate information Back-end server;
The back-end server receives the terminal geographic location coordinate information, the unique identification and the user information, leads to It crosses the unique identification and obtains reference geographical location coordinate information;
The back-end server to the reference geographical location coordinate information and the terminal geographic location coordinate information calculate away from Deviation judges whether the range difference is more than preset error threshold, if being more than, is judged as there are imitation behavior, will be described User information and location data fraud information are recorded in preset trust evaluation table, and the location data fraud information includes Current time, the reference geographical location coordinate information and the terminal geographic location coordinate information.
2. the location data monitoring method according to claim 1 based on information security, which is characterized in that the application is soft Part obtains the unique identification for the positioning device connecting with user terminal, and the application software defaults in the user terminal, wraps It includes:
The application software scans periphery hotspot WIFI equipment by application interface, obtains all WIFI scanned The website lan address and signal strength parameter of equipment;
Judge the number of the WIFI equipment scanned, it is described unique if the number, which is less than, is equal to predetermined number threshold value The number of mark is identical as the number of the WIFI equipment that scanning is arrived, by the website lan address of each WIFI equipment It is defined as the unique identification;
Otherwise, the number of the unique identification is identical as number threshold value, and all WIFI equipments are pressed the signal strength Parameter sorts from high to low, the highest number WIFI equipment identical with the number threshold value is taken, by each WIFI The website lan address of equipment is defined as the unique identification.
3. the location data monitoring method according to claim 1 based on information security, the application software is obtained and is used The unique identification of the positioning device of family terminal connection, the application software default in the user terminal, comprising:
The application software inquires current serving BS equipment by application interface, obtains the Base Station Identification of the base station equipment With regional areas code, the Base Station Identification and regional areas code are defined as the unique identification together.
4. the location data monitoring method according to claim 1 based on information security, which is characterized in that the rear end clothes Business device receives the terminal geographic location coordinate information, the unique identification and the user information, passes through the unique identification Obtain reference geographical location coordinate information, comprising:
The unique identification is inquired in preset coordinate inquiry table, if containing described unique in the coordinate inquiry table Mark, then read the corresponding coordinate information of the unique identification, and the coordinate information is defined as reference geographical location coordinate letter Breath;
If not containing the unique identification in the coordinate inquiry table, inquiry request is sent to third party system, from described the Three method, systems obtain the corresponding reference geographical location coordinate information of the unique identification;
The reference geographical location coordinate information and corresponding unique identification that obtain from the third party system are added into the seat It marks in inquiry table.
5. the location data monitoring method according to claim 1 based on information security, which is characterized in that the rear end clothes Device of being engaged in calculates range difference to the reference geographical location coordinate information and the terminal geographic location coordinate information, judgement it is described away from Whether deviation is more than preset error threshold, comprising:
Calculate poor, the range difference of the distance between the reference geographical location coordinate information and the terminal geographic location coordinate information The calculation formula of L is as follows:
L=R arccos (cos (wa)cos(wb)cos(jb-ja)+sin(wa)sin(wb))
Wherein, R is earth radius, (ja,wa) be the reference geographical location coordinate information latitude and longitude coordinates, (jb,wb) for institute State the latitude and longitude coordinates of terminal geographic location coordinate information;
Judge whether the range difference L is more than the error threshold.
6. the location data monitoring method according to claim 1 based on information security, which is characterized in that if described super It crosses, is then judged as there are imitation behavior, the user information and location data fraud information are recorded in preset confidence level and commented In valence table, the location data fraud information includes current time, the reference geographical location coordinate information and the terminal Manage location coordinate information, comprising:
Search whether that there are the user informations in preset trust evaluation table, and if it exists, then make the location data False information is added into the trust evaluation table corresponding with the user information, is believed the user according to the range difference It ceases corresponding confidence value and carries out deduction, obtain current credibility value, the current credibility value is replaced into the user information Confidence value in the corresponding trust evaluation table;
If it does not exist, then the user information and corresponding location data fraud information are added into the trust evaluation table In, preset initial trusted angle value is obtained, the initial trusted angle value is carried out by deduction according to the range difference, obtains currently may be used The current credibility value is added into the trust evaluation table corresponding with the user information by certainty value.
7. the location data monitoring method according to claim 6 based on information security, which is characterized in that further include:
Periodically the trust evaluation table is inquired, the user information by the confidence value lower than preset monitoring threshold value And corresponding confidence value extracts;
It inquires in preset key monitoring table with the presence or absence of the user information, and if it exists, it is corresponding then to update the user information The confidence value, otherwise the user information and corresponding confidence value are added into the key monitoring table;
The key monitoring table is automatically transmitted to target user by preset sending method.
8. a kind of location data monitoring device based on information security characterized by comprising
Unique identification module is obtained, the unique identification for the positioning device connecting with user terminal is obtained for application software, it is described Application software defaults in the user terminal;
End coordinates module is obtained, sends Location Request to the terminal system of the user terminal for the application software, and Obtain the terminal geographic location coordinate information that the terminal system returns, by the terminal geographic location coordinate information, it is described only One mark and user information are uploaded to back-end server;
Reference coordinate module is obtained, receives the terminal geographic location coordinate information, described unique for the back-end server Mark and the user information, obtain reference geographical location coordinate information by the unique identification;
Fraud information module is recorded, to the reference geographical location coordinate information and the terminal for the back-end server It manages location coordinate information and calculates range difference, judge whether the range difference is more than preset error threshold, if being more than, is judged as There are imitation behaviors, and the user information and location data fraud information are recorded in preset trust evaluation table, described Location data fraud information includes current time, the reference geographical location coordinate information and terminal geographic position coordinates letter Breath.
9. a kind of computer equipment, which is characterized in that including memory and processor, being stored with computer in the memory can Reading instruction, when the computer-readable instruction is executed by the processor, so that the processor executes such as claim 1 to 7 Any one of location data monitoring method described in claim based on information security the step of.
10. a kind of storage medium for being stored with computer-readable instruction, which is characterized in that the computer-readable instruction is by one Or multiple processors are when executing, so that one or more processors are executed as described in any one of claims 1 to 7 claim The step of location data monitoring method based on information security.
CN201910425218.4A 2019-05-21 2019-05-21 Location data monitoring method and relevant device based on information security Pending CN110324779A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910425218.4A CN110324779A (en) 2019-05-21 2019-05-21 Location data monitoring method and relevant device based on information security
PCT/CN2019/117293 WO2020232999A1 (en) 2019-05-21 2019-11-12 Information security-based positioning data monitoring method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910425218.4A CN110324779A (en) 2019-05-21 2019-05-21 Location data monitoring method and relevant device based on information security

Publications (1)

Publication Number Publication Date
CN110324779A true CN110324779A (en) 2019-10-11

Family

ID=68113405

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910425218.4A Pending CN110324779A (en) 2019-05-21 2019-05-21 Location data monitoring method and relevant device based on information security

Country Status (2)

Country Link
CN (1) CN110324779A (en)
WO (1) WO2020232999A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110855620A (en) * 2019-10-16 2020-02-28 平安普惠企业管理有限公司 Position verification method and device, computer equipment and storage medium
WO2020232999A1 (en) * 2019-05-21 2020-11-26 平安普惠企业管理有限公司 Information security-based positioning data monitoring method and related device
CN112118244A (en) * 2020-09-10 2020-12-22 安恒环境科技(北京)股份有限公司 Water quality online monitoring data verification method and verification system

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114241612A (en) * 2021-12-15 2022-03-25 青岛海尔科技有限公司 Verification method and system for mobile attendance checking position
CN114399850B (en) * 2021-12-27 2022-11-22 四川领歌智谷科技有限公司 Attendance checking method based on voice and position recognition, electronic student identity card and storage medium
CN114727226A (en) * 2022-06-09 2022-07-08 广州斯沃德科技有限公司 Virtual fence management system and method based on multiple positioning
CN115660622B (en) * 2022-12-28 2023-09-08 在路上(北京)科技有限公司 Data processing method and system applied to travel

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270717A (en) * 2014-03-29 2015-01-07 华为技术有限公司 Positional accuracy control device and method
CN104914455A (en) * 2015-06-08 2015-09-16 浙江每日互动网络科技有限公司 Method and system for solving inaccurate GPS positioning of mobile equipment
CN105472737A (en) * 2015-12-31 2016-04-06 上海华为技术有限公司 Terminal positioning method and server
CN105491516A (en) * 2014-09-19 2016-04-13 中兴通讯股份有限公司 Monitoring method and device and uploading method for sales distribution
CN108322886A (en) * 2017-12-15 2018-07-24 腾讯科技(深圳)有限公司 The method for authenticating and device of terminal positioning data
CN109274732A (en) * 2018-09-05 2019-01-25 北京达佳互联信息技术有限公司 Geographical location acquisition methods, device, electronic equipment and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101440836B1 (en) * 2010-07-08 2014-11-04 에스케이텔레콤 주식회사 Method And Apparatus for Detecting Positioning Error by Using WLAN Signal
CN103685428B (en) * 2012-09-25 2017-04-12 阿里巴巴集团控股有限公司 A method and an apparatus for positioning a terminal
CN103731800B (en) * 2012-10-15 2017-07-21 阿里巴巴集团控股有限公司 Method of locating terminal and device
CN104101863A (en) * 2013-04-07 2014-10-15 苏州红亭信息科技有限公司 Locating system based on intelligent mobile device and locating method
US9967750B1 (en) * 2016-07-28 2018-05-08 United Services Automobile Association (Usaa) Location verification based on environmental sensor data
CN108399546B (en) * 2017-02-06 2023-02-28 百度在线网络技术(北京)有限公司 Method, device, equipment and storage medium for identifying false positioning
CN109151827B (en) * 2018-07-28 2021-04-02 中国人民解放军战略支援部队信息工程大学 WiFi positioning spoofing detection method and device based on radio frequency fingerprint
CN110324779A (en) * 2019-05-21 2019-10-11 平安普惠企业管理有限公司 Location data monitoring method and relevant device based on information security

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270717A (en) * 2014-03-29 2015-01-07 华为技术有限公司 Positional accuracy control device and method
CN105491516A (en) * 2014-09-19 2016-04-13 中兴通讯股份有限公司 Monitoring method and device and uploading method for sales distribution
CN104914455A (en) * 2015-06-08 2015-09-16 浙江每日互动网络科技有限公司 Method and system for solving inaccurate GPS positioning of mobile equipment
CN105472737A (en) * 2015-12-31 2016-04-06 上海华为技术有限公司 Terminal positioning method and server
CN108322886A (en) * 2017-12-15 2018-07-24 腾讯科技(深圳)有限公司 The method for authenticating and device of terminal positioning data
CN109274732A (en) * 2018-09-05 2019-01-25 北京达佳互联信息技术有限公司 Geographical location acquisition methods, device, electronic equipment and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020232999A1 (en) * 2019-05-21 2020-11-26 平安普惠企业管理有限公司 Information security-based positioning data monitoring method and related device
CN110855620A (en) * 2019-10-16 2020-02-28 平安普惠企业管理有限公司 Position verification method and device, computer equipment and storage medium
CN110855620B (en) * 2019-10-16 2023-03-21 平安普惠企业管理有限公司 Position verification method and device, computer equipment and storage medium
CN112118244A (en) * 2020-09-10 2020-12-22 安恒环境科技(北京)股份有限公司 Water quality online monitoring data verification method and verification system

Also Published As

Publication number Publication date
WO2020232999A1 (en) 2020-11-26

Similar Documents

Publication Publication Date Title
CN110324779A (en) Location data monitoring method and relevant device based on information security
CN110166943B (en) Method for processing terminal position information
CN100365385C (en) Method and apparatus for providing location information
KR101490132B1 (en) Method for tracking credit card fraud
US9898727B2 (en) Credit card fraud prevention system
US7454192B1 (en) Postal address validation using mobile telephone location information
CN110337059B (en) Analysis algorithm, server and network system for family relationship of user
CN109302434B (en) Prompt message pushing method and device, service platform and storage medium
CN108680896B (en) Positioning information correction method, device, storage medium and equipment
US6999777B1 (en) Method for providing location information of a wireless communication device
CN108810806B (en) Positioning information correction method, client, storage medium and equipment
US7995988B2 (en) System and method for identifying the position of mobile terminals
CN106991185A (en) The hotel's latitude and longitude information maintaining method and system of OTA websites
CN105590382B (en) The telephone-moving monitoring system and telephone-moving monitoring method of POS terminal
CN106296855A (en) A kind of movable attendance checking method based on cell phone platform and system thereof
US20170061533A1 (en) Method and device for security assessment
CN106028279A (en) Network registration method and device
CN108243495A (en) A kind of location fingerprint database building method, device and method of locating terminal
CN106714179B (en) Identify the method and device of pseudo-base station information
CN110503546A (en) Location information antifraud method and relevant device based on information security
US8290469B2 (en) System and method for associating communication terminals to users based on spatial correlation
RU2359423C2 (en) Method and device for processing of routing requests
CN103188609B (en) Realize the system of fixed-point data mass-sending at regular time and quantity
CN110611689B (en) Information identification method and device and computer readable storage medium
CN106101994A (en) The treating method and apparatus of warning message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191011