CN110324779A - Location data monitoring method and relevant device based on information security - Google Patents
Location data monitoring method and relevant device based on information security Download PDFInfo
- Publication number
- CN110324779A CN110324779A CN201910425218.4A CN201910425218A CN110324779A CN 110324779 A CN110324779 A CN 110324779A CN 201910425218 A CN201910425218 A CN 201910425218A CN 110324779 A CN110324779 A CN 110324779A
- Authority
- CN
- China
- Prior art keywords
- information
- coordinate information
- unique identification
- terminal
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
Abstract
The present invention relates to field of information security technology more particularly to a kind of location data monitoring methods and relevant device based on information security.This method comprises: application software obtains unique identification and terminal geographic location coordinate information, terminal geographic location coordinate information, unique identification and user information are uploaded to back-end server;Back-end server obtains reference geographical location coordinate information by unique identification, range difference is calculated to reference geographical location coordinate information and terminal geographic location coordinate information, judge whether range difference is more than preset error threshold, if being more than, then it is judged as there are imitation behavior, user information and location data fraud information is recorded in trust evaluation table.The present invention determines the substantially coordinate of user terminal by the unique identification of acquisition positioning device, is compared with the coordinate information of terminal system identification, and the imitation behavior of energy effective monitoring user terminal provides reliable trust evaluation data for subsequent financial business.
Description
Technical field
The present invention relates to field of information security technology more particularly to a kind of location data monitoring methods based on information security
And relevant device.
Background technique
APP software (application software), refers to and is mounted on intelligent subscriber terminal, former to improve such as the application software on mobile phone
The deficiency and personalized service of beginning system.With popularizing for user terminal, APP software is widely used.Positioning in APP software
Information is also more and more applied in various projects.
Mobile phone is positioned by APP software, when obtaining location information, exists and is distorted by Part Development tool
GPS positioning data distort the behavior of GPS positioning data by simulator or mode of escaping from prison etc., cause GPS positioning information to fake existing
As leading to security risk problem.
Summary of the invention
In view of this, it is necessary to cause asking for GPS imitation behavior for using developing instrument, simulator or the mode of escaping from prison
Topic, provides a kind of location data monitoring method and relevant device based on information security.
A kind of location data monitoring method based on information security, comprising:
Application software obtains the unique identification for the positioning device connecting with user terminal, and the application software defaults in described
In user terminal;
The application software sends Location Request to the terminal system of the user terminal, and obtains the terminal system and return
The terminal geographic location coordinate information returned, will be in the terminal geographic location coordinate information, the unique identification and user information
Reach back-end server;
The back-end server receives the terminal geographic location coordinate information, the unique identification and user letter
Breath, obtains reference geographical location coordinate information by the unique identification;
The back-end server is to the reference geographical location coordinate information and the terminal geographic location coordinate information meter
Range difference is calculated, judges whether the range difference is more than preset error threshold, if being more than, is judged as there are imitation behavior, it will
The user information and location data fraud information are recorded in preset trust evaluation table, the location data fraud information
Including current time, the reference geographical location coordinate information and the terminal geographic location coordinate information.
In a kind of possible design, the application software obtains the unique identification for the positioning device connecting with user terminal,
The application software defaults in the user terminal, comprising:
The application software by application interface scan periphery hotspot WIFI equipment, obtain it is all scan it is described
The website lan address and signal strength parameter of WIFI equipment;
Judge the number of the WIFI equipment scanned, it is described if the number, which is less than, is equal to predetermined number threshold value
The number of unique identification is identical as the number of the WIFI equipment that scanning is arrived, by the website local area network of each WIFI equipment
Address is defined as the unique identification;
Otherwise, the number of the unique identification is identical as number threshold value, and all WIFI equipments are pressed the signal
Intensive parameter sorts from high to low, takes the highest number WIFI equipment identical with the number threshold value, will be each described
The website lan address of WIFI equipment is defined as the unique identification.
In a kind of possible design, the application software obtains the unique identification for the positioning device connecting with user terminal,
The application software defaults in the user terminal, comprising:
The application software inquires current serving BS equipment by application interface, obtains the base station of the base station equipment
The Base Station Identification and regional areas code are defined as the unique identification by mark and regional areas code together.
In a kind of possible design, the back-end server receives the terminal geographic location coordinate information, described unique
Mark and the user information, obtain reference geographical location coordinate information by the unique identification, comprising:
The unique identification is inquired in preset coordinate inquiry table, if containing described in the coordinate inquiry table
Unique identification then reads the corresponding coordinate information of the unique identification, and the coordinate information is defined as reference geographical location and is sat
Mark information;
If not containing the unique identification in the coordinate inquiry table, inquiry request is sent to third party system, from institute
It states third party system and obtains the corresponding reference geographical location coordinate information of the unique identification;
The reference geographical location coordinate information and corresponding unique identification that obtain from the third party system are added into institute
It states in coordinate inquiry table.
In a kind of possible design, the back-end server is to the reference geographical location coordinate information and the terminal
It manages location coordinate information and calculates range difference, judge whether the range difference is more than preset error threshold, comprising:
It is poor to calculate the distance between the reference geographical location coordinate information and the terminal geographic location coordinate information, away from
The calculation formula of deviation L is as follows:
L=R arccos (cos (wa)cos(wb)cos(jb-ja)+sin(wa)sin(wb))
Wherein, R is earth radius, (ja,wa) be the reference geographical location coordinate information latitude and longitude coordinates, (jb,wb)
For the latitude and longitude coordinates of the terminal geographic location coordinate information;
Judge whether the range difference L is more than the error threshold.
In a kind of possible design, if described be more than, it is judged as there are imitation behavior, by the user information and positioning
Data fabrication information is recorded in preset trust evaluation table, and the location data fraud information includes current time, described
Reference geographical location coordinate information and the terminal geographic location coordinate information, comprising:
Search whether that there are the user informations in preset trust evaluation table, and if it exists, then by the positioning number
It is added into the trust evaluation table corresponding with the user information according to fraud information, according to the range difference by the use
Information corresponding confidence value in family carries out deduction, obtains current credibility value, and the current credibility value is replaced the user
Confidence value in the corresponding trust evaluation table of information;
If it does not exist, then the user information and corresponding location data fraud information are added into the trust evaluation
In table, preset initial trusted angle value is obtained, the initial trusted angle value is carried out by deduction according to the range difference, is obtained current
The current credibility value is added into the trust evaluation table corresponding with the user information by confidence value.
In a kind of possible design, further includes:
Periodically the trust evaluation table is inquired, the user by the confidence value lower than preset monitoring threshold value
Information and corresponding confidence value extract;
It inquires in preset key monitoring table with the presence or absence of the user information, and if it exists, then update the user information
Otherwise the user information and corresponding confidence value are added into the key monitoring table by the corresponding confidence value;
The key monitoring table is automatically transmitted to target user by preset sending method.
A kind of location data monitoring device based on information security, comprising:
Unique identification module is obtained, the unique identification for the positioning device connecting with user terminal is obtained for application software,
The application software defaults in the user terminal;
End coordinates module is obtained, positioning is sent to the terminal system of the user terminal for the application software and asks
It asks, and obtains the terminal geographic location coordinate information that the terminal system returns, by the terminal geographic location coordinate information, institute
It states unique identification and user information is uploaded to back-end server;
Reference coordinate module is obtained, receives the terminal geographic location coordinate information, described for the back-end server
Unique identification and the user information obtain reference geographical location coordinate information by the unique identification;
Fraud information module is recorded, for the back-end server to the reference geographical location coordinate information and the end
It holds geographical position coordinates information to calculate range difference, judges whether the range difference is more than preset error threshold, if being more than, is sentenced
Break as there are imitation behaviors, the user information and location data fraud information be recorded in preset trust evaluation table,
The location data fraud information includes that current time, the reference geographical location coordinate information and the terminal geographic position are sat
Mark information.
A kind of computer equipment, including memory and processor are stored with computer-readable instruction in the memory, institute
When stating computer-readable instruction and being executed by the processor, so that the processor executes the above-mentioned positioning number based on information security
The step of according to monitoring method.
A kind of storage medium being stored with computer-readable instruction, the computer-readable instruction are handled by one or more
When device executes, so that the step of one or more processors execute the above-mentioned location data monitoring method based on information security.
Above-mentioned location data monitoring method and relevant device based on information security, including application software obtain and user's end
The unique identification of the positioning device of connection is held, the application software defaults in the user terminal;The application software is to institute
The terminal system for stating user terminal sends Location Request, and obtains the terminal geographic position coordinates letter that the terminal system returns
Breath, is uploaded to back-end server for the terminal geographic location coordinate information, the unique identification and user information;The rear end
Server receives the terminal geographic location coordinate information, the unique identification and the user information, passes through unique mark
Knowledge obtains reference geographical location coordinate information;The back-end server is to the reference geographical location coordinate information and the terminal
Geographical position coordinates information calculates range difference, judges whether the range difference is more than preset error threshold, if being more than, is judged
For there are imitation behaviors, the user information and location data fraud information are recorded in preset trust evaluation table, institute
Stating location data fraud information includes current time, the reference geographical location coordinate information and the terminal geographic position coordinates
Information.The present invention determines the substantially coordinate of user terminal, the terminal with user terminal by the unique identification of acquisition positioning device
The coordinate information of system identification is compared, it is determined whether there are the cheating of GPS positioning data or fakement phenomenas, can effective monitoring use
The imitation behavior of family terminal provides reliable trust evaluation data for subsequent financial business.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field
Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention
Limitation.
Fig. 1 is the flow chart of the location data monitoring method based on information security in one embodiment of the invention;
Fig. 2 is the structure chart of the location data monitoring device based on information security in one embodiment of the invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention
Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.
Fig. 1 is the flow chart of the location data monitoring method based on information security in one embodiment of the invention, such as Fig. 1
It is shown, a kind of location data monitoring method based on information security, comprising the following steps:
Step S1, obtain unique identification: application software obtains the unique identification for the positioning device connecting with user terminal, answers
It is defaulted in user terminal with software.
The application software (APP software) of this step is default in the user terminal, and user terminal can be mobile phone, plate electricity
Brain, computer etc. can load the terminal device of application software.Application software is obtained by preset application api interface and user
The unique identification of any positioning device of terminal connection.
In one embodiment, positioning device can be periphery WIFI equipment, then step S1, comprising:
Step S101, Scan orientation equipment: application software scans periphery hotspot WIFI equipment by application interface, obtains
Take the website lan address and signal strength parameter of all WIFI equipments scanned.
Application software scans periphery WIFI equipment using api interface by calling, and obtains the station of multiple periphery WIFI equipments
Point lan address BSSID and signal strength parameter.Each WIFI equipment has unique BSSID, the model of signal strength parameter
It encloses for 0.0-1.0.
Step S102 judges number and defines unique identification: the number for the WIFI equipment that judgement scans, if number is less than
Equal to predetermined number threshold value, then the number of unique identification is identical as the number for the WIFI equipment that scanning is arrived, by each WIFI equipment
Website lan address be defined as a unique identification.
When the WIFI equipment scanned is less, it is no more than number threshold value, then all by all corresponding BSSID of WIFI equipment
It is included in term of reference, all BSSID is defined as unique identification, unique identification contains multiple at this time.For example, number threshold
Value takes 5, and when scanning to WIFI equipment is 3, then unique identification is also 3, the corresponding BSSID of respectively 3 WIFI equipments.
Step S103, sequence and definition unique identification: otherwise, the number of unique identification is identical as number threshold value, will own
WIFI equipment sort from high to low by signal strength parameter, take highest number WIFI equipment identical with number threshold value, will
The website lan address of each WIFI equipment is defined as a unique identification.
When the WIFI equipment scanned is more, it is more than number threshold value, is then screened, it is higher to filter out signal strength
The corresponding BSSID of several WIFI equipments be all included in term of reference.For example, number threshold value takes 5, when scanning is to WIFI equipment
8,8 WIFI equipments are sorted from high to low by signal strength parameter, take highest 5 WIFI equipments, then unique identification is 5
The corresponding BSSID of 5 WIFI equipments that is a, respectively taking out.
Present embodiment is using WIFI equipment as positioning device, with the uniqueness of the BSSID of WIFI equipment, as subsequent ginseng
The initial data for examining geographical position coordinates information can be used as the authentic data of the substantially coordinate of subsequent determining user terminal.
In one embodiment, positioning device can be base station equipment, then step S1, comprising:
Application software inquires current serving BS equipment by application interface, obtains the Base Station Identification and ground of base station equipment
Base Station Identification and regional areas code are defined as unique identification by region code together.
Application software in the present embodiment inquires current serving BS equipment using api interface by calling, and obtains base
Base Station Identification CID code, the regional areas code LAC code of station equipment return.CID code is the abbreviation of Cell Tower ID, and LAC code is
The abbreviation of Location Area Code, CID code and LAC code are the call parameters of base station location, indispensable, are otherwise unable to base
Stand firm position, thus the present embodiment by CID code and LAC code together as unique identification.
The present embodiment is using base station equipment as positioning device, with the uniqueness of CID code and LAC code in base station equipment, as
The initial data of subsequent reference geographical position coordinates information can be used as the reliable number of the substantially coordinate of subsequent determining user terminal
According to.
Step S2, obtain end coordinates: application software sends Location Request to the terminal system of user terminal, and obtains end
The terminal geographic location coordinate information that end system returns, will be in terminal geographic location coordinate information, unique identification and user information
Reach back-end server.
Application software obtains the terminal that terminal system returns by the api interface for calling terminal system to develop in this step
Geographical position coordinates information.User information in this step is to log in the user information of the user of application software, and user is applying
After being registered on software, registration information is recorded in preset storage location by application software automatically, this registration information is
User information.
The application software of this step is when being uploaded to back-end server for data, by the way of network request, by terminal
Geographical position coordinates information, unique identification and user information long-distance Log server are into back-end server.
Step S3, obtain reference coordinate: back-end server receives terminal geographic location coordinate information, unique identification and user
Information obtains reference geographical location coordinate information by unique identification.
The unique identification of this step is the mark for determining location data, by identifying that unique identification can determine user
Terminal referring generally to position, i.e. reference geographical location coordinate information.Multiple unique identifications if it exists, then by multiple unique identifications
All obtain corresponding reference geographical location coordinate information.
In one embodiment, step S3, comprising:
Inquiry: step S301 unique identification is inquired in preset coordinate inquiry table, if containing in coordinate inquiry table
There is unique identification, then read the corresponding coordinate information of unique identification, coordinate information is defined as reference geographical location coordinate information.
It is preset with a coordinate inquiry table in the database of back-end server, includes unique identification in coordinate inquiry table
And the corresponding coordinate information of unique identification, this coordinate information is geographical position coordinates data, therefore coordinate information includes longitude
And latitude, it is a kind of latitude and longitude coordinates data, this step passes through the latitude and longitude coordinates data definition that coordinate inquiry table will inquire
For reference geographical location coordinate information.
Request: step S302 if not containing unique identification in coordinate inquiry table, sends inquiry to third party system and asks
It asks, obtains the corresponding reference geographical location coordinate information of unique identification from third party system.
Since coordinate inquiry table is in the database for be preset in back-end server, it is understood that there may be it is incomplete, lack part
The possibility of unique identification carries out inquiry to unique identification to third party system by way of request at this time and obtains corresponding reference
Geographical position coordinates information.For example third-party electronic map development platform of third party system in this step.
Step S303, add data: by the reference geographical location coordinate information obtained from third party system and it is corresponding only
One mark is added into coordinate inquiry table.
When in order to avoid inquiry next time, still lack unique identification in coordinate inquiry table, this step by coordinate inquiry table into
Row is abundant, is added into reference geographical location coordinate information is got from third party system every time in coordinate inquiry table, increases straight
The success rate for inquiring unique identification from database is connect, the efficiency for obtaining reference geographical location coordinate information is improved.
The present embodiment obtains in such a way that inquiry coordinate inquiry table and request third party system combine with reference to geographical position
Coordinate information is set, whether fakes for subsequent location data and authentic data is provided.
Step S4, record fraud information: back-end server sits reference geographical location coordinate information and terminal geographic position
It marks information and calculates range difference, judge whether range difference is more than preset error threshold, if being more than, be judged as in the presence of row of faking
User information and location data fraud information to be recorded in preset trust evaluation table, location data fraud packet
Include current time, reference geographical location coordinate information and terminal geographic location coordinate information.
Trust evaluation table in this step is preset in back-end server, and trust evaluation table includes user information, right
Location data fraud information, the confidence value answered.Date-time, back-end server when location data fraud information includes record
The terminal geographic location coordinate information that reference geographical location coordinate information, the user terminal obtained according to unique identification provides, together
One user information may exist multinomial location data fraud information.Trust evaluation table in this step can be using such as following table
Shown in 1:
Table 1
Multiple reference geographical location coordinate informations if it exists, then respectively by each reference geographical location coordinate information with
Terminal geographic location coordinate information calculates range difference, obtains multiple range differences, judges whether each range difference is more than error respectively
Threshold value, if any range difference is more than error threshold, then it is assumed that there are imitation behaviors.
In one embodiment, step S4, comprising:
Step S401 calculates range difference: calculate reference geographical location coordinate information and terminal geographic location coordinate information it
Between range difference, the calculation formula of range difference L is as follows:
L=R arccos (cos (wa)cos(wb)cos(jb-ja)+sin(wa)sin(wb))
Wherein, R is earth radius, (ja,wa) be reference geographical location coordinate information latitude and longitude coordinates, (jb,wb) it is eventually
Hold the latitude and longitude coordinates of geographical position coordinates information.
The data of reference geographical location coordinate information and terminal geographic location coordinate information are latitude and longitude coordinates, therefore can
To combine above-mentioned range difference calculation formula according to latitude and longitude coordinates, distance between the two is obtained.
Step S402, judges range difference: judging whether range difference L is more than error threshold, if being more than, is judged as to exist and make
False behavior searches whether that there are user informations in preset trust evaluation table, and if it exists, then location data is faked information
It is added into trust evaluation table corresponding with user information, is subtracted the corresponding confidence value of user information according to range difference
Point, current credibility value is obtained, by the confidence value in the corresponding trust evaluation table of current credibility value replacement user information.
When this step judges whether range difference L is more than error threshold, error threshold can be taken as one kilometer.Range difference L is not
More than one kilometer, then it is assumed that terminal geographic location coordinate information is true, works without typing.If range difference L is more than one kilometer,
Then think there are imitation behavior, typing is carried out to the corresponding location data fraud information of imitation behavior.
The corresponding several location data fraud information of the existing user information of possibility in the trust evaluation table of this step, when
When there is imitation behavior again, as long as location data fraud information is added into corresponding user information.Confidence value
Deduction mode is that range difference is bigger, and deduction is bigger.For example, range difference deduction can be directly used in deduction mode, range difference is taken
Confidence value is directly subtracted integer by the integer of absolute value, fractions omitted, obtains current credibility value.When there are multiple distances
When poor, using maximum value in range difference as deduction foundation, deduction is carried out to confidence value.
User information and corresponding location data fraud information are then added into confidence level and commented by step S403 if it does not exist
In valence table, preset initial trusted angle value is obtained, initial trusted angle value is carried out by deduction according to range difference, obtains current credibility
Value, current credibility value is added into trust evaluation table corresponding with user information.
When user information is not present in trust evaluation table, it is believed that there is not imitation behavior before the user information,
Increase the user information and corresponding position data fabrication information in trust evaluation table.It is preset in the database of back-end server
One initial trusted angle value carries out deduction to initial trusted angle value according to range difference, obtains current credibility value, and will be current
Confidence value is also added in trust evaluation table, and filling corresponding with user information.
The present embodiment obtains range difference L using range difference calculation formula, by comparing range difference L with error threshold
Compared with judging whether there is imitation behavior, realize monitoring user's location data fakement phenomena.When if it exists the case where imitation behavior,
Location data fraud information is recorded in trust evaluation table, provides reasonable authentic data for subsequent financial business.
It in one embodiment, further include step S5, comprising:
Step S501 is periodically inquired: periodically being inquired trust evaluation table, and confidence value is lower than preset monitoring
The user information of threshold value and corresponding confidence value extract.
This step can use timed task, realize periodically inquiry purpose.Monitoring threshold value can be according to the need of financial business
It asks, is set as multiple, confidence value is compared with multiple monitoring threshold values respectively, when being lower than a certain monitoring threshold value, extracts user
Information and confidence value, this step can be inquired and be extracted using structured query language SQL statement.
Step S502 adds data: inquiring in preset key monitoring table with the presence or absence of user information, and if it exists, then more
User information and corresponding confidence value, are otherwise added into key monitoring table by the corresponding confidence value of new user information.
Since confidence level requirement of the different financial business to user is different, such as loan process is to confidence value requirement
It can be very high.If being preset with multiple monitoring threshold values in step S501, the key monitoring table in this step is also preset with identical
Number, the corresponding key monitoring table of each monitoring threshold value.Confidence value lower than which monitoring threshold value, then the user information extracted and
Corresponding confidence value is added into corresponding key monitoring table.
Step S503 sends table: key monitoring table is automatically transmitted to target user by preset sending method.
The regular key monitoring table inquired and updated is sent to corresponding target by way of sending automatically by this step
User, use when target user checks confidence level for financial business.Such as when carrying out loan transaction, staff
By calling this key monitoring table, according to the corresponding confidence value of user information, inquire whether user meets loan transaction.
Trust evaluation table is periodically carried out subsequent follow-up by the present embodiment, passes through inquiry to trust evaluation table and ratio
It is right, it checks out the lower user of confidence value and carries out key monitoring, generate key monitoring table, be sent to financial business party in request,
Realize the meaning of monitoring to location data.
Location data monitoring method of the present embodiment based on information security, by scanning the WIFI equipment of user terminal or looking into
Current serving BS equipment is ask, unique identification is obtained, reference geographical location coordinate information is obtained by unique identification, this coordinate
Information is the true location information of user terminal, the terminal geographic provided by reference to geographical position coordinates information and user terminal
Location coordinate information is compared, and investigation user whether there is location data imitation behavior, and investigation mode is accurate and reliable, can be effective
The imitation behavior for monitoring user terminal, provides reliable confidence packets for subsequent financial business.
In one embodiment it is proposed that a kind of location data monitoring device based on information security, as shown in Fig. 2, packet
Include following module:
Unique identification module is obtained, the unique identification for the positioning device connecting with user terminal is obtained for application software,
Application software defaults in user terminal;
End coordinates module is obtained, sends Location Request to the terminal system of user terminal for application software, and obtain
The terminal geographic location coordinate information that terminal system returns, by terminal geographic location coordinate information, unique identification and user information
It is uploaded to back-end server;
Reference coordinate module is obtained, receives terminal geographic location coordinate information, unique identification and use for back-end server
Family information obtains reference geographical location coordinate information by unique identification;
Fraud information module is recorded, reference geographical location coordinate information and terminal geographic position are sat for back-end server
It marks information and calculates range difference, judge whether range difference is more than preset error threshold, if being more than, be judged as in the presence of row of faking
User information and location data fraud information to be recorded in preset trust evaluation table, location data fraud packet
Include current time, reference geographical location coordinate information and terminal geographic location coordinate information.
In one embodiment it is proposed that a kind of computer equipment, including memory and processor, it is stored in memory
Computer-readable instruction, when computer-readable instruction is executed by processor, so that reality when processor executes computer-readable instruction
Step in the location data monitoring method based on information security of existing the various embodiments described above.
In one embodiment it is proposed that a kind of storage medium for being stored with computer-readable instruction, computer-readable finger
When order is executed by one or more processors so that one or more processors execute the various embodiments described above based on information security
Location data monitoring method in step.Wherein, storage medium can be non-volatile memory medium.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage
Medium may include: read-only memory (ROM, Read Only Memory), random access memory (RAM, Random
Access Memory), disk or CD etc..
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, all should be considered as described in this specification.
Some exemplary embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but
It cannot be construed as a limitation to the scope of the present invention.It should be pointed out that for the ordinary skill people of this field
For member, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to of the invention
Protection scope.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.
Claims (10)
1. a kind of location data monitoring method based on information security characterized by comprising
Application software obtains the unique identification for the positioning device connecting with user terminal, and the application software defaults in the user
In terminal;
The application software sends Location Request to the terminal system of the user terminal, and obtains what the terminal system returned
The terminal geographic location coordinate information, the unique identification and user information are uploaded to by terminal geographic location coordinate information
Back-end server;
The back-end server receives the terminal geographic location coordinate information, the unique identification and the user information, leads to
It crosses the unique identification and obtains reference geographical location coordinate information;
The back-end server to the reference geographical location coordinate information and the terminal geographic location coordinate information calculate away from
Deviation judges whether the range difference is more than preset error threshold, if being more than, is judged as there are imitation behavior, will be described
User information and location data fraud information are recorded in preset trust evaluation table, and the location data fraud information includes
Current time, the reference geographical location coordinate information and the terminal geographic location coordinate information.
2. the location data monitoring method according to claim 1 based on information security, which is characterized in that the application is soft
Part obtains the unique identification for the positioning device connecting with user terminal, and the application software defaults in the user terminal, wraps
It includes:
The application software scans periphery hotspot WIFI equipment by application interface, obtains all WIFI scanned
The website lan address and signal strength parameter of equipment;
Judge the number of the WIFI equipment scanned, it is described unique if the number, which is less than, is equal to predetermined number threshold value
The number of mark is identical as the number of the WIFI equipment that scanning is arrived, by the website lan address of each WIFI equipment
It is defined as the unique identification;
Otherwise, the number of the unique identification is identical as number threshold value, and all WIFI equipments are pressed the signal strength
Parameter sorts from high to low, the highest number WIFI equipment identical with the number threshold value is taken, by each WIFI
The website lan address of equipment is defined as the unique identification.
3. the location data monitoring method according to claim 1 based on information security, the application software is obtained and is used
The unique identification of the positioning device of family terminal connection, the application software default in the user terminal, comprising:
The application software inquires current serving BS equipment by application interface, obtains the Base Station Identification of the base station equipment
With regional areas code, the Base Station Identification and regional areas code are defined as the unique identification together.
4. the location data monitoring method according to claim 1 based on information security, which is characterized in that the rear end clothes
Business device receives the terminal geographic location coordinate information, the unique identification and the user information, passes through the unique identification
Obtain reference geographical location coordinate information, comprising:
The unique identification is inquired in preset coordinate inquiry table, if containing described unique in the coordinate inquiry table
Mark, then read the corresponding coordinate information of the unique identification, and the coordinate information is defined as reference geographical location coordinate letter
Breath;
If not containing the unique identification in the coordinate inquiry table, inquiry request is sent to third party system, from described the
Three method, systems obtain the corresponding reference geographical location coordinate information of the unique identification;
The reference geographical location coordinate information and corresponding unique identification that obtain from the third party system are added into the seat
It marks in inquiry table.
5. the location data monitoring method according to claim 1 based on information security, which is characterized in that the rear end clothes
Device of being engaged in calculates range difference to the reference geographical location coordinate information and the terminal geographic location coordinate information, judgement it is described away from
Whether deviation is more than preset error threshold, comprising:
Calculate poor, the range difference of the distance between the reference geographical location coordinate information and the terminal geographic location coordinate information
The calculation formula of L is as follows:
L=R arccos (cos (wa)cos(wb)cos(jb-ja)+sin(wa)sin(wb))
Wherein, R is earth radius, (ja,wa) be the reference geographical location coordinate information latitude and longitude coordinates, (jb,wb) for institute
State the latitude and longitude coordinates of terminal geographic location coordinate information;
Judge whether the range difference L is more than the error threshold.
6. the location data monitoring method according to claim 1 based on information security, which is characterized in that if described super
It crosses, is then judged as there are imitation behavior, the user information and location data fraud information are recorded in preset confidence level and commented
In valence table, the location data fraud information includes current time, the reference geographical location coordinate information and the terminal
Manage location coordinate information, comprising:
Search whether that there are the user informations in preset trust evaluation table, and if it exists, then make the location data
False information is added into the trust evaluation table corresponding with the user information, is believed the user according to the range difference
It ceases corresponding confidence value and carries out deduction, obtain current credibility value, the current credibility value is replaced into the user information
Confidence value in the corresponding trust evaluation table;
If it does not exist, then the user information and corresponding location data fraud information are added into the trust evaluation table
In, preset initial trusted angle value is obtained, the initial trusted angle value is carried out by deduction according to the range difference, obtains currently may be used
The current credibility value is added into the trust evaluation table corresponding with the user information by certainty value.
7. the location data monitoring method according to claim 6 based on information security, which is characterized in that further include:
Periodically the trust evaluation table is inquired, the user information by the confidence value lower than preset monitoring threshold value
And corresponding confidence value extracts;
It inquires in preset key monitoring table with the presence or absence of the user information, and if it exists, it is corresponding then to update the user information
The confidence value, otherwise the user information and corresponding confidence value are added into the key monitoring table;
The key monitoring table is automatically transmitted to target user by preset sending method.
8. a kind of location data monitoring device based on information security characterized by comprising
Unique identification module is obtained, the unique identification for the positioning device connecting with user terminal is obtained for application software, it is described
Application software defaults in the user terminal;
End coordinates module is obtained, sends Location Request to the terminal system of the user terminal for the application software, and
Obtain the terminal geographic location coordinate information that the terminal system returns, by the terminal geographic location coordinate information, it is described only
One mark and user information are uploaded to back-end server;
Reference coordinate module is obtained, receives the terminal geographic location coordinate information, described unique for the back-end server
Mark and the user information, obtain reference geographical location coordinate information by the unique identification;
Fraud information module is recorded, to the reference geographical location coordinate information and the terminal for the back-end server
It manages location coordinate information and calculates range difference, judge whether the range difference is more than preset error threshold, if being more than, is judged as
There are imitation behaviors, and the user information and location data fraud information are recorded in preset trust evaluation table, described
Location data fraud information includes current time, the reference geographical location coordinate information and terminal geographic position coordinates letter
Breath.
9. a kind of computer equipment, which is characterized in that including memory and processor, being stored with computer in the memory can
Reading instruction, when the computer-readable instruction is executed by the processor, so that the processor executes such as claim 1 to 7
Any one of location data monitoring method described in claim based on information security the step of.
10. a kind of storage medium for being stored with computer-readable instruction, which is characterized in that the computer-readable instruction is by one
Or multiple processors are when executing, so that one or more processors are executed as described in any one of claims 1 to 7 claim
The step of location data monitoring method based on information security.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910425218.4A CN110324779A (en) | 2019-05-21 | 2019-05-21 | Location data monitoring method and relevant device based on information security |
PCT/CN2019/117293 WO2020232999A1 (en) | 2019-05-21 | 2019-11-12 | Information security-based positioning data monitoring method and related device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910425218.4A CN110324779A (en) | 2019-05-21 | 2019-05-21 | Location data monitoring method and relevant device based on information security |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110324779A true CN110324779A (en) | 2019-10-11 |
Family
ID=68113405
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910425218.4A Pending CN110324779A (en) | 2019-05-21 | 2019-05-21 | Location data monitoring method and relevant device based on information security |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110324779A (en) |
WO (1) | WO2020232999A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110855620A (en) * | 2019-10-16 | 2020-02-28 | 平安普惠企业管理有限公司 | Position verification method and device, computer equipment and storage medium |
WO2020232999A1 (en) * | 2019-05-21 | 2020-11-26 | 平安普惠企业管理有限公司 | Information security-based positioning data monitoring method and related device |
CN112118244A (en) * | 2020-09-10 | 2020-12-22 | 安恒环境科技(北京)股份有限公司 | Water quality online monitoring data verification method and verification system |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114241612A (en) * | 2021-12-15 | 2022-03-25 | 青岛海尔科技有限公司 | Verification method and system for mobile attendance checking position |
CN114399850B (en) * | 2021-12-27 | 2022-11-22 | 四川领歌智谷科技有限公司 | Attendance checking method based on voice and position recognition, electronic student identity card and storage medium |
CN114727226A (en) * | 2022-06-09 | 2022-07-08 | 广州斯沃德科技有限公司 | Virtual fence management system and method based on multiple positioning |
CN115660622B (en) * | 2022-12-28 | 2023-09-08 | 在路上(北京)科技有限公司 | Data processing method and system applied to travel |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104270717A (en) * | 2014-03-29 | 2015-01-07 | 华为技术有限公司 | Positional accuracy control device and method |
CN104914455A (en) * | 2015-06-08 | 2015-09-16 | 浙江每日互动网络科技有限公司 | Method and system for solving inaccurate GPS positioning of mobile equipment |
CN105472737A (en) * | 2015-12-31 | 2016-04-06 | 上海华为技术有限公司 | Terminal positioning method and server |
CN105491516A (en) * | 2014-09-19 | 2016-04-13 | 中兴通讯股份有限公司 | Monitoring method and device and uploading method for sales distribution |
CN108322886A (en) * | 2017-12-15 | 2018-07-24 | 腾讯科技(深圳)有限公司 | The method for authenticating and device of terminal positioning data |
CN109274732A (en) * | 2018-09-05 | 2019-01-25 | 北京达佳互联信息技术有限公司 | Geographical location acquisition methods, device, electronic equipment and storage medium |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101440836B1 (en) * | 2010-07-08 | 2014-11-04 | 에스케이텔레콤 주식회사 | Method And Apparatus for Detecting Positioning Error by Using WLAN Signal |
CN103685428B (en) * | 2012-09-25 | 2017-04-12 | 阿里巴巴集团控股有限公司 | A method and an apparatus for positioning a terminal |
CN103731800B (en) * | 2012-10-15 | 2017-07-21 | 阿里巴巴集团控股有限公司 | Method of locating terminal and device |
CN104101863A (en) * | 2013-04-07 | 2014-10-15 | 苏州红亭信息科技有限公司 | Locating system based on intelligent mobile device and locating method |
US9967750B1 (en) * | 2016-07-28 | 2018-05-08 | United Services Automobile Association (Usaa) | Location verification based on environmental sensor data |
CN108399546B (en) * | 2017-02-06 | 2023-02-28 | 百度在线网络技术(北京)有限公司 | Method, device, equipment and storage medium for identifying false positioning |
CN109151827B (en) * | 2018-07-28 | 2021-04-02 | 中国人民解放军战略支援部队信息工程大学 | WiFi positioning spoofing detection method and device based on radio frequency fingerprint |
CN110324779A (en) * | 2019-05-21 | 2019-10-11 | 平安普惠企业管理有限公司 | Location data monitoring method and relevant device based on information security |
-
2019
- 2019-05-21 CN CN201910425218.4A patent/CN110324779A/en active Pending
- 2019-11-12 WO PCT/CN2019/117293 patent/WO2020232999A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104270717A (en) * | 2014-03-29 | 2015-01-07 | 华为技术有限公司 | Positional accuracy control device and method |
CN105491516A (en) * | 2014-09-19 | 2016-04-13 | 中兴通讯股份有限公司 | Monitoring method and device and uploading method for sales distribution |
CN104914455A (en) * | 2015-06-08 | 2015-09-16 | 浙江每日互动网络科技有限公司 | Method and system for solving inaccurate GPS positioning of mobile equipment |
CN105472737A (en) * | 2015-12-31 | 2016-04-06 | 上海华为技术有限公司 | Terminal positioning method and server |
CN108322886A (en) * | 2017-12-15 | 2018-07-24 | 腾讯科技(深圳)有限公司 | The method for authenticating and device of terminal positioning data |
CN109274732A (en) * | 2018-09-05 | 2019-01-25 | 北京达佳互联信息技术有限公司 | Geographical location acquisition methods, device, electronic equipment and storage medium |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020232999A1 (en) * | 2019-05-21 | 2020-11-26 | 平安普惠企业管理有限公司 | Information security-based positioning data monitoring method and related device |
CN110855620A (en) * | 2019-10-16 | 2020-02-28 | 平安普惠企业管理有限公司 | Position verification method and device, computer equipment and storage medium |
CN110855620B (en) * | 2019-10-16 | 2023-03-21 | 平安普惠企业管理有限公司 | Position verification method and device, computer equipment and storage medium |
CN112118244A (en) * | 2020-09-10 | 2020-12-22 | 安恒环境科技(北京)股份有限公司 | Water quality online monitoring data verification method and verification system |
Also Published As
Publication number | Publication date |
---|---|
WO2020232999A1 (en) | 2020-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110324779A (en) | Location data monitoring method and relevant device based on information security | |
CN110166943B (en) | Method for processing terminal position information | |
CN100365385C (en) | Method and apparatus for providing location information | |
KR101490132B1 (en) | Method for tracking credit card fraud | |
US9898727B2 (en) | Credit card fraud prevention system | |
US7454192B1 (en) | Postal address validation using mobile telephone location information | |
CN110337059B (en) | Analysis algorithm, server and network system for family relationship of user | |
CN109302434B (en) | Prompt message pushing method and device, service platform and storage medium | |
CN108680896B (en) | Positioning information correction method, device, storage medium and equipment | |
US6999777B1 (en) | Method for providing location information of a wireless communication device | |
CN108810806B (en) | Positioning information correction method, client, storage medium and equipment | |
US7995988B2 (en) | System and method for identifying the position of mobile terminals | |
CN106991185A (en) | The hotel's latitude and longitude information maintaining method and system of OTA websites | |
CN105590382B (en) | The telephone-moving monitoring system and telephone-moving monitoring method of POS terminal | |
CN106296855A (en) | A kind of movable attendance checking method based on cell phone platform and system thereof | |
US20170061533A1 (en) | Method and device for security assessment | |
CN106028279A (en) | Network registration method and device | |
CN108243495A (en) | A kind of location fingerprint database building method, device and method of locating terminal | |
CN106714179B (en) | Identify the method and device of pseudo-base station information | |
CN110503546A (en) | Location information antifraud method and relevant device based on information security | |
US8290469B2 (en) | System and method for associating communication terminals to users based on spatial correlation | |
RU2359423C2 (en) | Method and device for processing of routing requests | |
CN103188609B (en) | Realize the system of fixed-point data mass-sending at regular time and quantity | |
CN110611689B (en) | Information identification method and device and computer readable storage medium | |
CN106101994A (en) | The treating method and apparatus of warning message |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191011 |