CN112995342A - Report monitoring method and system based on public security intranet and intranet transmission - Google Patents

Report monitoring method and system based on public security intranet and intranet transmission Download PDF

Info

Publication number
CN112995342A
CN112995342A CN202110433035.4A CN202110433035A CN112995342A CN 112995342 A CN112995342 A CN 112995342A CN 202110433035 A CN202110433035 A CN 202110433035A CN 112995342 A CN112995342 A CN 112995342A
Authority
CN
China
Prior art keywords
public security
server
data
packet
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110433035.4A
Other languages
Chinese (zh)
Other versions
CN112995342B (en
Inventor
孙继东
吴跃搏
任俊杰
孔连锋
曹景超
田恬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aerospace Shenzhou Wisdom System Technology Co ltd
Original Assignee
Aerospace Shenzhou Wisdom System Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aerospace Shenzhou Wisdom System Technology Co ltd filed Critical Aerospace Shenzhou Wisdom System Technology Co ltd
Priority to CN202110433035.4A priority Critical patent/CN112995342B/en
Publication of CN112995342A publication Critical patent/CN112995342A/en
Application granted granted Critical
Publication of CN112995342B publication Critical patent/CN112995342B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Educational Administration (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a report monitoring method and a system based on public security internal and external network transmission, which comprises the following steps: the illegal reporting information is submitted through a mobile client, transmitted to a front FTP of a public security internal and external network through the Internet and transmitted to a public security internal network through a synchronous service; establishing an early warning mechanism for a transmission channel for forming data transmission between the internet and the public security intranet, wherein the early warning mechanism comprises: monitoring communication state, alarming communication abnormity and analyzing packet loss; and after receiving and auditing the illegal reporting information, the public security department transfers the feedback file to a rear server of the Internet end through synchronous service flow, and feeds the auditing result back to the reported mobile client through the Internet. According to the scheme of the invention, by means of technologies such as data exchange, boundary transmission and the like, the reporting information submitted by the public at the WeChat end is safely and effectively transmitted to the public security intranet, and the processing result of the public security organ on the reporting of the public is timely fed back to the WeChat end, so that the efficient operation of the system is ensured.

Description

Report monitoring method and system based on public security intranet and intranet transmission
Technical Field
The invention relates to the technical field of trans-network transmission of public security, in particular to a report monitoring method, a report monitoring system, electronic equipment and a computer readable storage medium based on internal and external network transmission of public security.
Background
With the continuous development and application of advanced information technologies such as cloud computing, big data, mobile internet and the like, advanced algorithms and technologies such as face recognition, living body identification and the like are taken as supports, the micro-police service is a new form and a new mode of the police service derived by the deep fusion of the 'internet + idea' and the traditional police service, and has great potential in the aspects of convenience for people, communication of the police and people, propaganda and launch, public opinion guidance, information disclosure and the like, and the development of the micro-police service in the future can embody the development trends of clustering, deepening and intellectualization and the like.
At present, public security organs accept the problems of black and badness involvement of the masses, gun involvement and explosion, terrorism and extreme personal violent crimes, and reporting ways for highlighting illegal crime clues such as robbery, yellow gambling poison, food and drug rings and the like are 'telephone reporting, mailbox reporting, visiting reporting, letter reporting' and the like, and the reporting ways have the defects of complicated process operation, irregular clue information, opaque processing links, incapability of feeding back processing information in time and the like. In addition, most of the existing online reporting modes are online page reporting, such as a network illegal crime reporting website, a yellow gambling illegal crime reporting platform, an illegal and bad information reporting center, a national blackout and blackout intelligent reporting platform and the like, all of the websites are reporting platforms of crime clues of a certain type, and are lack of an integral and uniform reporting entrance, and most of the reporting platforms are not directly butted with professional platforms of public security service departments.
At present, a WeChat service platform is opened by most public security departments in China, and convenient police service is mainly provided for individuals or legal persons. Such as: in Beijing, Shanghai, Guangzhou, Shijiazhuang, Zhengzhou, Xian, Xinjiang and other places, however, most of the WeChat service platforms do not have the function of a systematic reporting center, or only relate to the reporting of a single illegal criminal clue, but also do not support the business requirement of rewarding reporting, and cannot fully mobilize the enthusiasm of social masses participating in clue submission.
Disclosure of Invention
The present invention is directed to solve at least one of the above technical problems in the background art, and provides a report monitoring method, system, electronic device and computer-readable storage medium based on public security intranet and intranet transmission.
In order to achieve the above object, the present invention provides a report monitoring method based on public security intranet and intranet transmission, which is characterized by comprising:
the illegal reporting information is submitted through a mobile client, transmitted to a front FTP of a public security internal and external network through the Internet and transmitted to a public security internal network through a synchronous service;
establishing an early warning mechanism for a transmission channel for forming data transmission between the internet and the public security intranet, wherein the early warning mechanism comprises: monitoring communication state, alarming communication abnormity and analyzing packet loss;
and after receiving and auditing the illegal reporting information, the public security department transfers the feedback file to a rear server of the Internet end through synchronous service flow, and feeds the auditing result back to the reported mobile client through the Internet.
According to an aspect of the invention, the communication state monitoring comprises:
carrying out real-time data exchange monitoring on the data exchange task being executed;
and carrying out real-time server state monitoring on the self running condition of the server, wherein the monitoring comprises network interface monitoring, CPU utilization rate monitoring, memory utilization rate monitoring, hard disk space monitoring and network condition monitoring.
According to one aspect of the invention, the communication abnormality alarm is: and when monitoring that the resource state is abnormal, sending alarm information to a manager, and simultaneously recording the alarm information by the system.
According to one aspect of the invention, the triggering form of the early warning mechanism of the communication abnormity warning comprises the following steps:
(1) the triggering form is as follows: deploying a program on the service server A, wherein the program sends a data packet X to a gateway FTP server 1 in 3 rd minute through an FTP protocol, the gateway FTP can automatically send the data packet to a boundary server, and the boundary server can transmit the data packet to an intranet data exchange server 1 after receiving the packet;
an early warning mechanism: if the failure of sending the data packet to the gateway FTP server 1 indicates that the gateway FTP has a problem, directly notifying a related manager to process the problem through an alarm short message;
(2) the triggering form is as follows: deploying a program in the service server B, wherein the program checks whether a data packet X exists in a directory of the intranet data exchange server 2 every minute;
an early warning mechanism: if the data packet X is not detected, the boundary server is indicated to have a problem, and a related manager is directly notified to process the problem through an alarm short message;
(3) the triggering form is as follows: a program on the service server B sends a data packet Y to the intranet data exchange server 2 every minute, and the data packet Y is forwarded to the gatekeeper FTP server 2, the gatekeeper FTP automatically sends the data packet to the boundary server, and the boundary server receives the packet and then sends the packet to the extranet data exchange server 1;
early warning mechanism 1): the program on the service server B checks whether the forwarding program on the intranet data exchange server 2 is normal every minute, and the forwarding program is directly restarted when the forwarding program is abnormal; if the server is down, directly notifying a related manager to process through an alarm short message;
early warning mechanism 2): if the failure of sending the data packet to the gateway FTP server 2 indicates that the gateway FTP has a problem, directly notifying a related manager to process the problem through an alarm short message;
(4) the triggering form is as follows: the program on the service server A automatically checks whether a data packet Y exists in the directory of the extranet data exchange server 1 every 3 minutes;
an early warning mechanism: if the data packet Y is not detected, the boundary server is indicated to have a problem, and a related manager is directly notified to process the problem through an alarm short message;
(5) other cases are as follows: other problems related to data packet intranet and extranet transmission occur, and when no related alarm exists, the fact that the data packet intranet and extranet channel is irrelevant to the public security intranet and extranet channel and related to the service program can be determined, and only the service program is checked.
According to one aspect of the present invention, the packet loss analysis is implemented by deploying a log information collection module on a dedicated security device of a border link, and the packet loss analysis is implemented by transmitting collected log information to a border data security analysis system of a public security intranet through a border uniformly by the dedicated security device of the border for comprehensive comparison, so as to determine a packet loss situation.
According to an aspect of the present invention, the packet loss analysis includes:
(1) packet loss condition determination
Judging whether a packet loss condition exists in a boundary link or not by comprehensively comparing and analyzing related data about packet data in log information of an access service system and special safety equipment, including information such as the number and the size of transmitted data packets;
(2) packet loss cause analysis
If the packet loss phenomenon exists, specifically positioning the reason of the packet loss by comparing and analyzing information such as the number, the size and the like of data packets recorded by logs of an access service system and special safety equipment in a segmentation manner, and determining whether the packet loss is caused by boundary equipment or the packet loss is caused by the reason of the service system;
(3) packet loss file location
The data file of specific packet loss is determined through the collected log information;
(4) retransmission of lost packet data
And informing the service system of the analyzed packet loss condition, and enabling the service system to be responsible for retransmitting the packet loss data.
In order to achieve the above object, the present invention further provides a report monitoring system based on the internal and external network transmission of the public security, comprising:
the system comprises a first data transmission module, a second data transmission module and a third data transmission module, wherein the first data transmission module is used for submitting illegal reporting information through a mobile client, transmitting the illegal reporting information to a front FTP of a public security internal and external network through the Internet and transmitting the illegal reporting information to the public security internal network through a synchronous service;
the early warning module establishes an early warning mechanism for a transmission channel for forming data transmission between the internet and the public security intranet, wherein the early warning mechanism comprises: monitoring communication state, alarming communication abnormity and analyzing packet loss;
and the second data transmission module is used for transferring the feedback file after the public security department verifies the illegal reporting information to a rear server of the Internet end through a synchronous service flow and feeding the verification result back to the reported mobile client through the Internet.
To achieve the above object, the present invention also provides an electronic device, which includes a processor and a memory, where the memory stores machine executable instructions capable of being executed by the processor, and the processor can execute the machine executable instructions to implement the above method.
To achieve the above object, the present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the above method.
According to the scheme of the invention, the clue processing efficiency is improved, the difficult problem of information transmission of a public security intranet and the Internet is solved, the reporting information submitted by the public at the WeChat end is safely and effectively transmitted to the public security intranet by means of the technologies of data exchange, boundary transmission and the like, the processing result of the public security organization on the reporting of the public is timely fed back to the WeChat end, and the efficient operation of the system is ensured. The method provides reporting contents such as a lottery accompanied by a prize, a black-sweeping and disappearing report, an external report, a yellow-involved gambling food and drug crime report, a virus-involved report, an urban management accompanied by a beat and the like for the social population, widens the collection way of reporting information, improves the intelligent circulation processing efficiency of clues, arouses the enthusiasm of the population participating in clue collection and illegal reporting, and opens up a new mode of mutual watching and helping of the police in a new period.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 schematically illustrates a method for monitoring a report based on a public security intranet/intranet transmission according to the present invention;
FIG. 2 schematically shows a architectural diagram of a method according to the invention;
figures 3 and 4 schematically show network architecture diagrams according to the method of the invention;
fig. 5 is a block diagram schematically illustrating a report monitoring system based on the internal and external network transmission of the public security according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the scope of the present invention.
Fig. 1 schematically shows a method for monitoring reports based on the internal and external network transmission of a public security according to the present invention. As shown in fig. 1, the report monitoring method based on the internal and external network transmission of the public security according to the present invention includes:
a. the illegal reporting information is submitted through a mobile client, transmitted to a front FTP of a public security internal and external network through the Internet and transmitted to a public security internal network through a synchronous service;
b. establishing an early warning mechanism for a transmission channel for forming data transmission between the internet and the public security intranet, wherein the early warning mechanism comprises: monitoring communication state, alarming communication abnormity and analyzing packet loss;
c. and after receiving and auditing the illegal reporting information, the public security department transfers the feedback file to a rear server of the Internet end through synchronous service flow, and feeds the auditing result back to the reported mobile client through the Internet.
According to an embodiment of the present invention, the monitoring of the communication status in the early warning mechanism includes: data exchange monitoring and server status monitoring. The data exchange monitoring is to realize real-time monitoring on the data exchange task which is being executed, so that the information such as the running state, the number of data exchange pieces, the flow and the like of the task can be accurately known, and the operation of stopping running of the task which is being executed can be carried out at any time. The server state monitoring is realized by strictly controlling the starting and stopping of the data exchange server, and the running condition of the server is monitored in real time, and comprises network interface monitoring, CPU utilization rate monitoring, memory utilization rate monitoring, hard disk space monitoring and network condition monitoring.
The abnormal alarm in the early warning mechanism is as follows: and when monitoring that the resource state is abnormal, sending alarm information to a manager, and simultaneously recording the alarm information by the system. Specifically, the triggering form of the early warning mechanism of the communication abnormality alarm includes:
(1) the triggering form is as follows: deploying a program on the service server a, the program sending a data packet X to the gatekeeper FTP server 1 through the FTP protocol in 3 rd minute, the gatekeeper FTP automatically sending the data packet to the border server, and the border server receiving the packet and then sending the data packet to the intranet data exchange server 1.
An early warning mechanism: if the failure of sending the data packet to the gateway FTP server 1 indicates that the gateway FTP has a problem, the failure is directly notified to relevant personnel through an alarm short message to process the problem.
(2) The triggering form is as follows: a program is deployed in the service server B, which checks every minute whether there is a data packet X in the directory of the intranet data exchange server 2.
An early warning mechanism: if the data packet X is not detected, the boundary server is indicated to have a problem, and related personnel are directly notified to process the problem through an alarm short message.
(3) The triggering form is as follows: the program on the service server B sends a data packet Y to the intranet data exchange server 2 every minute, and the data packet Y is forwarded to the gatekeeper FTP server 2, the gatekeeper FTP automatically sends the data packet to the border server, and the border server receives the data packet and then sends the data packet to the extranet data exchange server 1.
Early warning mechanism 1): the program on the service server B will check every minute whether the forwarding program on the intranet data exchange server 2 is normal, and directly restart the forwarding program when the forwarding program is abnormal. If the server is down, the server directly informs related personnel of processing through an alarm short message.
Early warning mechanism 2): if the failure of sending the data packet to the gateway FTP server 2 indicates that the gateway FTP has a problem, the problem is directly notified to relevant personnel through an alarm short message to process the problem.
(4) The triggering form is as follows: the program on the service server a automatically checks every 3 minutes whether there is a data packet Y in the directory of the extranet data exchange server 1.
An early warning mechanism: if the data packet Y is not detected, the boundary server is indicated to have problems, and related personnel are directly notified to process the problems through the alarm short message.
(5) Other cases are as follows: in addition, other problems related to data packet internal and external network transmission appear, as long as no related alarm exists, the problems can be determined to be unrelated to the public security internal and external network channel and related to the service program, only the service program needs to be checked, and the problem of manually checking the channel does not need to be spent.
In the early warning mechanism, a log information acquisition module is deployed on the special safety equipment of the boundary link for packet loss analysis, and the collected log information is uniformly transmitted to a boundary data safety analysis system of the public security network through the boundary by the special safety equipment for packet loss analysis to be comprehensively compared so as to judge the packet loss condition. The specific functions are as follows:
(1) packet loss condition determination
Whether the packet loss condition exists in the boundary link is judged by comprehensively comparing and analyzing the related data about the packet data in the log information of the access service system and the special safety equipment, such as the number, the size and other information of the transmitted data packets.
(2) Packet loss cause analysis
If the packet loss phenomenon exists, the reason of the packet loss is specifically positioned by comparing and analyzing the information such as the number, the size and the like of the data packets recorded by the logs of the access service system and the special safety equipment in a segmenting mode, namely the packet loss caused by the boundary equipment or the packet loss caused by the reason of the service system.
(3) Packet loss file location
And the data file of the specific packet loss is determined through the collected log information.
(4) Retransmission of lost packet data
And informing the service system of the analyzed packet loss condition, and enabling the service system to be responsible for retransmitting the packet loss data.
According to the scheme of the invention, actually, as shown in the method system architecture of fig. 2 and the method network architectures of fig. 3 and 4, in the invention, the hot people submit various illegal clues through the reporting center application platform, data flow is transferred to the reporting auditing management platform, various service police perform auditing treatment on the reporting clues, effective clues are issued in time, treatment results are fed back to the hot people, and rewards are issued to the hot people through the uniform reward issuing platform.
Specifically, the masses submit illegal reporting information through a mobile phone WeChat terminal, the illegal reporting information is transmitted to a front FTP of a 'gatekeeper boundary service' of a public security internal and external network through the Internet, the FTP is transmitted to a public security internal network through a synchronous service, and the public security department analyzes, audits and approves the reporting information of the masses at the internal network terminal.
The public security department audits the processed reporting information at the internal network end, the feedback file flows to a rear server at the internet end through the synchronous service of 'gatekeeper boundary service', and the audit result is fed back to the WeChat end reporting the masses through the internet.
Considering that the number of times of faults of the internal and external network channels is frequent at present, the reporting clues submitted by people at the internet end cannot be effectively transmitted to the public security intranet, clue data is damaged, the timeliness and effectiveness of data transmission cannot be guaranteed, and an early warning mechanism is established for the transmission channel.
According to the scheme, the invention is a reporting center system developed based on an police affair WeChat platform, which mainly comprises a reporting audit management platform, a uniform reward issuing platform and a reporting center application platform, wherein information of the internet and a public security intranet is communicated through a safety boundary, so that social public can report clues through more than 10 reporting entries provided by the reporting center application platform, the public security officer performs uniform audit on reporting clues through the reporting audit management platform, and the audited clues perform specific reward issuing through the uniform reward issuing platform.
The report center application platform consists of a WeChat entry, report requisition, information input and information submission.
(1) WeChat entry
Communicating a prize-giving entrance in the WeChat public number. The masses enter the form filling page through the entry and submit the report information, which mainly comprises report entries such as a traffic prize-winning free-hand beat, a black-sweeping and dislike report, an external-involved report, a yellow-involved gambling food and drug crime report, an internal-toxin report, an urban management free-hand beat, a WeChat 110 and the like.
(2) Alarm and notice
And issuing policy files of public security related reporting services, reporting ranges of the prize reporting and reporting the awards in a public way.
(3) Information entry
The information input comprises three parts of information of a reporter, information of a reported person and information of illegal behaviors.
(4) Information submission
And after the information form filled by the user at the WeChat end is submitted, the reporting information is submitted to a reporting audit management platform through a public security safety boundary. Meanwhile, the history record inquiry function provides detail of reported information and examination and approval condition check.
Internal and external network data transmission channel
The method comprises the steps that the masses submit illegal reporting information through a mobile phone WeChat terminal, the illegal reporting information is transmitted to a front FTP of a 'gatekeeper boundary service' of a public security internal and external network through the Internet, the illegal reporting information is transmitted to a public security internal network through a synchronous service, and the public security department analyzes, audits and approves the reporting information at the internal network.
The public security department audits the processed reporting information at the internal network end, the feedback file flows to a rear server at the internet end through the synchronous service of 'gatekeeper boundary service', and the audit result is fed back to the WeChat end reporting the masses through the internet.
The report auditing management platform consists of information management, information auditing and system management functions.
(1) Information management
The information management can delete, inquire, check, export in batches and the like the internal network cable.
(2) Information auditing
And (4) auditing and confirming: and carrying out auditing and identifying operation on the illegal information.
Information circulation: the clues reported by the masses are uniformly collected to the city bureau service department and are distributed to the affiliated bureaus for processing.
Treatment feedback: and the system automatically feeds back the information examination and approval result to the user.
(3) System management
Role setting: setting different roles for background users, including super manager users, business department users, branch business department users, city business department users, and the like.
And (3) permission division: and setting a permission selector, and dividing different operation permissions according to different roles.
Editing by a user: the operation of adding, deleting, changing and checking the user by the administrator is realized, and the user can carry out personal information management and modify the login password after logging in.
Log audit: and displaying the log-in and operation records of the system user.
The unified reward distribution platform is an important measure for promoting the service quality of the reporting center system and arousing the enthusiasm of the masses, and aims to provide a support platform for distributing rewards to the masses by the reporting center. The WeChat payment is used as the only channel for the public security organization to distribute the reward to the masses.
From the above, the report center application platform provides a unified report entrance for public security services such as lottery free-hand clapping, blacking and banning report, report on foreign relations, report on yellow-related gambling food and drug crimes, report on toxic relations, urban management free-hand clapping, WeChat 110 alarm and the like. And information interaction between the Internet and a public security intranet is realized. The report auditing management platform combines the business operation conditions of the city bureau and the branch county bureau to realize automatic circulation of clues and improve the processing efficiency of the clues. The unified reward issuing platform performs centralized reward issuing on the verified clue providers, and the participation enthusiasm of the masses is improved.
The method of the invention collects reporting clues related to public security service to the WeChat platform, and provides a uniform reporting entrance for the social public; the automatic thread circulation function is designed, and the thread treatment efficiency is improved; a new mode of internet and reporting with prize reporting is created.
In order to achieve the above object, the present invention further provides a report monitoring system based on the internal and external network transmission of the public security, a structural block diagram of which is shown in fig. 5, and the report monitoring system specifically includes:
the system comprises a first data transmission module, a second data transmission module and a third data transmission module, wherein the first data transmission module is used for submitting illegal reporting information through a mobile client, transmitting the illegal reporting information to a front FTP of a public security internal and external network through the Internet and transmitting the illegal reporting information to the public security internal network through a synchronous service;
the early warning module establishes an early warning mechanism for a transmission channel for forming data transmission between the internet and the public security intranet, wherein the early warning mechanism comprises: monitoring communication state, alarming communication abnormity and analyzing packet loss;
and the second data transmission module is used for transferring the feedback file after the public security department verifies the illegal reporting information to a rear server of the Internet end through a synchronous service flow and feeding the verification result back to the reported mobile client through the Internet.
According to an embodiment of the present invention, the monitoring of the communication state in the early warning mechanism established by the early warning module includes: data exchange monitoring and server status monitoring. The data exchange monitoring is to realize real-time monitoring on the data exchange task which is being executed, so that the information such as the running state, the number of data exchange pieces, the flow and the like of the task can be accurately known, and the operation of stopping running of the task which is being executed can be carried out at any time. The server state monitoring is realized by strictly controlling the starting and stopping of the data exchange server, and the running condition of the server is monitored in real time, and comprises network interface monitoring, CPU utilization rate monitoring, memory utilization rate monitoring, hard disk space monitoring and network condition monitoring.
The abnormal alarm in the early warning mechanism is as follows: and when monitoring that the resource state is abnormal, sending alarm information to a manager, and simultaneously recording the alarm information by the system. Specifically, the triggering form of the early warning mechanism of the communication abnormality alarm includes:
(1) the triggering form is as follows: deploying a program on the service server a, the program sending a data packet X to the gatekeeper FTP server 1 through the FTP protocol in 3 rd minute, the gatekeeper FTP automatically sending the data packet to the border server, and the border server receiving the packet and then sending the data packet to the intranet data exchange server 1.
An early warning mechanism: if the failure of sending the data packet to the gateway FTP server 1 indicates that the gateway FTP has a problem, the failure is directly notified to relevant personnel through an alarm short message to process the problem.
(2) The triggering form is as follows: a program is deployed in the service server B, which checks every minute whether there is a data packet X in the directory of the intranet data exchange server 2.
An early warning mechanism: if the data packet X is not detected, the boundary server is indicated to have a problem, and related personnel are directly notified to process the problem through an alarm short message.
(3) The triggering form is as follows: the program on the service server B sends a data packet Y to the intranet data exchange server 2 every minute, and the data packet Y is forwarded to the gatekeeper FTP server 2, the gatekeeper FTP automatically sends the data packet to the border server, and the border server receives the data packet and then sends the data packet to the extranet data exchange server 1.
Early warning mechanism 1): the program on the service server B will check every minute whether the forwarding program on the intranet data exchange server 2 is normal, and directly restart the forwarding program when the forwarding program is abnormal. If the server is down, the server directly informs related personnel of processing through an alarm short message.
Early warning mechanism 2): if the failure of sending the data packet to the gateway FTP server 2 indicates that the gateway FTP has a problem, the problem is directly notified to relevant personnel through an alarm short message to process the problem.
(4) The triggering form is as follows: the program on the service server a automatically checks every 3 minutes whether there is a data packet Y in the directory of the extranet data exchange server 1.
An early warning mechanism: if the data packet Y is not detected, the boundary server is indicated to have problems, and related personnel are directly notified to process the problems through the alarm short message.
(5) Other cases are as follows: in addition, other problems related to data packet internal and external network transmission appear, as long as no related alarm exists, the problems can be determined to be unrelated to the public security internal and external network channel and related to the service program, only the service program needs to be checked, and the problem of manually checking the channel does not need to be spent.
In the early warning mechanism, a log information acquisition module is deployed on the special safety equipment of the boundary link for packet loss analysis, and the collected log information is uniformly transmitted to a boundary data safety analysis system of the public security network through the boundary by the special safety equipment for packet loss analysis to be comprehensively compared so as to judge the packet loss condition. The specific functions are as follows:
(1) packet loss condition determination
Whether the packet loss condition exists in the boundary link is judged by comprehensively comparing and analyzing the related data about the packet data in the log information of the access service system and the special safety equipment, such as the number, the size and other information of the transmitted data packets.
(2) Packet loss cause analysis
If the packet loss phenomenon exists, the reason of the packet loss is specifically positioned by comparing and analyzing the information such as the number, the size and the like of the data packets recorded by the logs of the access service system and the special safety equipment in a segmenting mode, namely the packet loss caused by the boundary equipment or the packet loss caused by the reason of the service system.
(3) Packet loss file location
And the data file of the specific packet loss is determined through the collected log information.
(4) Retransmission of lost packet data
And informing the service system of the analyzed packet loss condition, and enabling the service system to be responsible for retransmitting the packet loss data.
According to the scheme of the invention, actually, as shown in the method system architecture of fig. 2 and the method network architectures of fig. 3 and 4, in the invention, the hot people submit various illegal clues through the reporting center application platform, data flow is transferred to the reporting auditing management platform, various service police perform auditing treatment on the reporting clues, effective clues are issued in time, treatment results are fed back to the hot people, and rewards are issued to the hot people through the uniform reward issuing platform.
Specifically, the masses submit illegal reporting information through a mobile phone WeChat terminal, the illegal reporting information is transmitted to a front FTP of a 'gatekeeper boundary service' of a public security internal and external network through the Internet, the FTP is transmitted to a public security internal network through a synchronous service, and the public security department analyzes, audits and approves the reporting information of the masses at the internal network terminal.
The public security department audits the processed reporting information at the internal network end, the feedback file flows to a rear server at the internet end through the synchronous service of 'gatekeeper boundary service', and the audit result is fed back to the WeChat end reporting the masses through the internet.
Considering that the number of times of faults of the internal and external network channels is frequent at present, the reporting clues submitted by people at the internet end cannot be effectively transmitted to the public security intranet, clue data is damaged, the timeliness and effectiveness of data transmission cannot be guaranteed, and an early warning mechanism is established for the transmission channel.
According to the scheme, the invention is a reporting center system developed based on an police affair WeChat platform, which mainly comprises a reporting audit management platform, a uniform reward issuing platform and a reporting center application platform, wherein information of the internet and a public security intranet is communicated through a safety boundary, so that social public can report clues through more than 10 reporting entries provided by the reporting center application platform, the public security officer performs uniform audit on reporting clues through the reporting audit management platform, and the audited clues perform specific reward issuing through the uniform reward issuing platform.
The report center application platform consists of a WeChat entry, report requisition, information input and information submission.
(1) WeChat entry
Communicating a prize-giving entrance in the WeChat public number. The masses enter the form filling page through the entry and submit the report information, which mainly comprises report entries such as a traffic prize-winning free-hand beat, a black-sweeping and dislike report, an external-involved report, a yellow-involved gambling food and drug crime report, an internal-toxin report, an urban management free-hand beat, a WeChat 110 and the like.
(2) Alarm and notice
And issuing policy files of public security related reporting services, reporting ranges of the prize reporting and reporting the awards in a public way.
(3) Information entry
The information input comprises three parts of information of a reporter, information of a reported person and information of illegal behaviors.
(4) Information submission
And after the information form filled by the user at the WeChat end is submitted, the reporting information is submitted to a reporting audit management platform through a public security safety boundary. Meanwhile, the history record inquiry function provides detail of reported information and examination and approval condition check.
Internal and external network data transmission channel
The method comprises the steps that the masses submit illegal reporting information through a mobile phone WeChat terminal, the illegal reporting information is transmitted to a front FTP of a 'gatekeeper boundary service' of a public security internal and external network through the Internet, the illegal reporting information is transmitted to a public security internal network through a synchronous service, and the public security department analyzes, audits and approves the reporting information at the internal network.
The public security department audits the processed reporting information at the internal network end, the feedback file flows to a rear server at the internet end through the synchronous service of 'gatekeeper boundary service', and the audit result is fed back to the WeChat end reporting the masses through the internet.
The report auditing management platform consists of information management, information auditing and system management functions.
(1) Information management
The information management can delete, inquire, check, export in batches and the like the internal network cable.
(2) Information auditing
And (4) auditing and confirming: and carrying out auditing and identifying operation on the illegal information.
Information circulation: the clues reported by the masses are uniformly collected to the city bureau service department and are distributed to the affiliated bureaus for processing.
Treatment feedback: and the system automatically feeds back the information examination and approval result to the user.
(3) System management
Role setting: setting different roles for background users, including super manager users, business department users, branch business department users, city business department users, and the like.
And (3) permission division: and setting a permission selector, and dividing different operation permissions according to different roles.
Editing by a user: the operation of adding, deleting, changing and checking the user by the administrator is realized, and the user can carry out personal information management and modify the login password after logging in.
Log audit: and displaying the log-in and operation records of the system user.
The unified reward distribution platform is an important measure for promoting the service quality of the reporting center system and arousing the enthusiasm of the masses, and aims to provide a support platform for distributing rewards to the masses by the reporting center. The WeChat payment is used as the only channel for the public security organization to distribute the reward to the masses.
From the above, the report center application platform provides a unified report entrance for public security services such as lottery free-hand clapping, blacking and banning report, report on foreign relations, report on yellow-related gambling food and drug crimes, report on toxic relations, urban management free-hand clapping, WeChat 110 alarm and the like. And information interaction between the Internet and a public security intranet is realized. The report auditing management platform combines the business operation conditions of the city bureau and the branch county bureau to realize automatic circulation of clues and improve the processing efficiency of the clues. The unified reward issuing platform performs centralized reward issuing on the verified clue providers, and the participation enthusiasm of the masses is improved.
The method of the invention collects reporting clues related to public security service to the WeChat platform, and provides a uniform reporting entrance for the social public; the automatic thread circulation function is designed, and the thread treatment efficiency is improved; a new mode of internet and reporting with prize reporting is created.
To achieve the above object, the present invention also provides an electronic device comprising a processor and a memory, the memory storing machine executable instructions capable of being executed by the processor, the processor being capable of executing the machine executable instructions to implement the above method.
To achieve the above object, the present invention also provides a computer-readable storage medium having a computer program stored thereon, which when executed by a processor, implements the above method.
According to the scheme of the invention, social public pays attention to the mobile terminal public account, enters the reporting center functional area, can click various reporting buttons to enter a form filling page, and fills relevant information of the reporter, the involved persons and cases, including name, identity card number, mobile phone number, case description and other text information, geographical position information, pictures and video accessory information in the page, so as to realize high reduction and detailed description of illegal crime behaviors and scenes.
By means of technologies such as data exchange, boundary transmission and the like, the reporting information submitted by the masses at the wechat terminal is safely and effectively transmitted to a public security intranet, and the processing result of the public security organ on the reporting of the masses is timely fed back to the wechat terminal, so that the efficient operation of the system is ensured.
The report data submitted by the masses is collected in a report auditing management platform, automatic distribution and intelligent circulation of report information are realized according to data fields, human resources are liberated to the maximum extent, and the working efficiency is improved. Meanwhile, the functions of information retrieval, viewing, examination and approval, reward identification, batch export and the like are realized, and the full life cycle management of clues submitted by the masses is completed.
Therefore, the thread processing efficiency is improved, the difficult problem of information transmission of the public security intranet and the internet is solved, the reporting information submitted by the public at the WeChat end is safely and effectively transmitted to the public security intranet by means of the technologies of data exchange, boundary transmission and the like, the processing result of the public security organization on the reporting of the public is timely fed back to the WeChat end, and the efficient operation of the system is ensured. The method provides reporting contents such as a lottery accompanied by a prize, a black-sweeping and disappearing report, an external report, a yellow-involved gambling food and drug crime report, a virus-involved report, an urban management accompanied by a beat and the like for the social population, widens the collection way of reporting information, improves the intelligent circulation processing efficiency of clues, arouses the enthusiasm of the population participating in clue collection and illegal reporting, and opens up a new mode of mutual watching and helping of the police in a new period.
Finally, it is noted that the above-mentioned preferred embodiments illustrate rather than limit the invention, and that, although the invention has been described in detail with reference to the above-mentioned preferred embodiments, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the scope of the invention as defined by the appended claims.

Claims (9)

1. A report monitoring method based on public security internal and external network transmission is characterized by comprising the following steps:
the illegal reporting information is submitted through a mobile client, transmitted to a front FTP of a public security internal and external network through the Internet and transmitted to a public security internal network through a synchronous service;
establishing an early warning mechanism for a transmission channel for forming data transmission between the internet and the public security intranet, wherein the early warning mechanism comprises: monitoring communication state, alarming communication abnormity and analyzing packet loss;
and after receiving and auditing the illegal reporting information, the public security department transfers the feedback file to a rear server of the Internet end through synchronous service flow, and feeds the auditing result back to the reported mobile client through the Internet.
2. The report monitoring method based on the internal and external network transmission of the public security according to claim 1, wherein the communication state monitoring comprises:
carrying out real-time data exchange monitoring on the data exchange task being executed;
and carrying out real-time server state monitoring on the self running condition of the server, wherein the monitoring comprises network interface monitoring, CPU utilization rate monitoring, memory utilization rate monitoring, hard disk space monitoring and network condition monitoring.
3. The report monitoring method based on the internal and external network transmission of the public security according to claim 1, wherein the communication abnormal alarm is: and when monitoring that the resource state is abnormal, sending alarm information to a manager, and simultaneously recording the alarm information by the system.
4. The report monitoring method based on the internal and external network transmission of the public security according to claim 3, wherein the triggering form of the early warning mechanism of the communication abnormal warning comprises:
(1) the triggering form is as follows: deploying a program on the service server A, wherein the program sends a data packet X to a gateway FTP server 1 in 3 rd minute through an FTP protocol, the gateway FTP can automatically send the data packet to a boundary server, and the boundary server can transmit the data packet to an intranet data exchange server 1 after receiving the packet;
an early warning mechanism: if the failure of sending the data packet to the gateway FTP server 1 indicates that the gateway FTP has a problem, directly notifying a related manager to process the problem through an alarm short message;
(2) the triggering form is as follows: deploying a program in the service server B, wherein the program checks whether a data packet X exists in a directory of the intranet data exchange server 2 every minute;
an early warning mechanism: if the data packet X is not detected, the boundary server is indicated to have a problem, and a related manager is directly notified to process the problem through an alarm short message;
(3) the triggering form is as follows: a program on the service server B sends a data packet Y to the intranet data exchange server 2 every minute, and the data packet Y is forwarded to the gatekeeper FTP server 2, the gatekeeper FTP automatically sends the data packet to the boundary server, and the boundary server receives the packet and then sends the packet to the extranet data exchange server 1;
early warning mechanism 1): the program on the service server B checks whether the forwarding program on the intranet data exchange server 2 is normal every minute, and the forwarding program is directly restarted when the forwarding program is abnormal; if the server is down, directly notifying a related manager to process through an alarm short message;
early warning mechanism 2): if the failure of sending the data packet to the gateway FTP server 2 indicates that the gateway FTP has a problem, directly notifying a related manager to process the problem through an alarm short message;
(4) the triggering form is as follows: the program on the service server A automatically checks whether a data packet Y exists in the directory of the extranet data exchange server 1 every 3 minutes;
an early warning mechanism: if the data packet Y is not detected, the boundary server is indicated to have a problem, and a related manager is directly notified to process the problem through an alarm short message;
(5) other cases are as follows: other problems related to data packet intranet and extranet transmission occur, and when no related alarm exists, the fact that the data packet intranet and extranet channel is irrelevant to the public security intranet and extranet channel and related to the service program can be determined, and only the service program is checked.
5. The reporting monitoring method based on the internal and external network transmission of the public security according to claim 1, wherein the packet loss analysis deploys a log information collection module on the special security device of the border link, and the packet loss analysis is performed by the border special security device uniformly transmitting the collected log information to a border data security analysis system of the public security internal network through a border for comprehensive comparison to determine the packet loss condition.
6. The report monitoring method based on the internal and external network transmission of the public security according to claim 5, wherein the packet loss analysis comprises:
(1) packet loss condition determination
Judging whether a packet loss condition exists in a boundary link or not by comprehensively comparing and analyzing related data about packet data in log information of an access service system and special safety equipment, including information such as the number and the size of transmitted data packets;
(2) packet loss cause analysis
If the packet loss phenomenon exists, specifically positioning the reason of the packet loss by comparing and analyzing information such as the number, the size and the like of data packets recorded by logs of an access service system and special safety equipment in a segmentation manner, and determining whether the packet loss is caused by boundary equipment or the packet loss is caused by the reason of the service system;
(3) packet loss file location
The data file of specific packet loss is determined through the collected log information;
(4) retransmission of lost packet data
And informing the service system of the analyzed packet loss condition, and enabling the service system to be responsible for retransmitting the packet loss data.
7. The utility model provides a report monitored control system based on transmission of public security intranet and extranet which characterized in that includes:
the system comprises a first data transmission module, a second data transmission module and a third data transmission module, wherein the first data transmission module is used for submitting illegal reporting information through a mobile client, transmitting the illegal reporting information to a front FTP of a public security internal and external network through the Internet and transmitting the illegal reporting information to the public security internal network through a synchronous service;
the early warning module establishes an early warning mechanism for a transmission channel for forming data transmission between the internet and the public security intranet, wherein the early warning mechanism comprises: monitoring communication state, alarming communication abnormity and analyzing packet loss;
and the second data transmission module is used for transferring the feedback file after the public security department verifies the illegal reporting information to a rear server of the Internet end through a synchronous service flow and feeding the verification result back to the reported mobile client through the Internet.
8. An electronic device comprising a processor and a memory, the memory storing machine executable instructions executable by the processor to implement the method of any one of claims 1-6.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-6.
CN202110433035.4A 2021-04-22 2021-04-22 Report monitoring method and system based on public security intranet and intranet transmission Active CN112995342B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110433035.4A CN112995342B (en) 2021-04-22 2021-04-22 Report monitoring method and system based on public security intranet and intranet transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110433035.4A CN112995342B (en) 2021-04-22 2021-04-22 Report monitoring method and system based on public security intranet and intranet transmission

Publications (2)

Publication Number Publication Date
CN112995342A true CN112995342A (en) 2021-06-18
CN112995342B CN112995342B (en) 2021-08-06

Family

ID=76341605

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110433035.4A Active CN112995342B (en) 2021-04-22 2021-04-22 Report monitoring method and system based on public security intranet and intranet transmission

Country Status (1)

Country Link
CN (1) CN112995342B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114938368A (en) * 2022-06-13 2022-08-23 深圳市星火电子工程公司 Network boundary safety access method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040210773A1 (en) * 2003-04-16 2004-10-21 Charles Markosi System and method for network security
CN1598833A (en) * 2004-07-21 2005-03-23 锦州市公安局 Social information reporting method and system
CN101587576A (en) * 2009-04-10 2009-11-25 重庆市公安局 Public inquiring and supervising system of public security cases
US20120176218A1 (en) * 2010-03-02 2012-07-12 Ahn Hyun Jin Unmanned security system using network, method for providing unmanned security service, and method for setting unmanned security system
CN108600006A (en) * 2018-04-24 2018-09-28 银川华联达科技有限公司 A kind of Computer Data Security monitoring system
CN110838949A (en) * 2018-08-16 2020-02-25 阿里巴巴集团控股有限公司 Network flow log recording method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040210773A1 (en) * 2003-04-16 2004-10-21 Charles Markosi System and method for network security
CN1598833A (en) * 2004-07-21 2005-03-23 锦州市公安局 Social information reporting method and system
CN101587576A (en) * 2009-04-10 2009-11-25 重庆市公安局 Public inquiring and supervising system of public security cases
US20120176218A1 (en) * 2010-03-02 2012-07-12 Ahn Hyun Jin Unmanned security system using network, method for providing unmanned security service, and method for setting unmanned security system
CN108600006A (en) * 2018-04-24 2018-09-28 银川华联达科技有限公司 A kind of Computer Data Security monitoring system
CN110838949A (en) * 2018-08-16 2020-02-25 阿里巴巴集团控股有限公司 Network flow log recording method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114938368A (en) * 2022-06-13 2022-08-23 深圳市星火电子工程公司 Network boundary safety access method

Also Published As

Publication number Publication date
CN112995342B (en) 2021-08-06

Similar Documents

Publication Publication Date Title
CN106791220B (en) Method and system for preventing telephone fraud
WO2021047309A1 (en) Data processing method, system and device, and storage medium
CN111355719B (en) Community voting method, device, equipment and storage medium based on block chain technology
CN102741839A (en) URL filtering based on user browser history
CN100362805C (en) Multifunctional management system for detecting erotic images and unhealthy information in network
CN105681276A (en) Sensitive information leakage active monitoring and responsibility confirmation method and device
US10192262B2 (en) System for periodically updating backings for resource requests
CN106940643A (en) Logical APP systems between the police and the people
CN106934592A (en) A kind for the treatment of method and apparatus of report information
CN112995342B (en) Report monitoring method and system based on public security intranet and intranet transmission
CN113792308A (en) Government affair sensitive data oriented security behavior risk analysis method
CN114117264A (en) Illegal website identification method, device, equipment and storage medium based on block chain
CN108965317B (en) Network data protection system
CN113572757B (en) Server access risk monitoring method and device
CN112887105B (en) Conference security monitoring method and device, electronic equipment and storage medium
CN109600395A (en) A kind of device and implementation method of terminal network access control system
CN102271331A (en) Method and system for detecting reliability of service provider (SP) site
CN112102118A (en) Collaborative law enforcement and case handling method based on block chain
CN111506661A (en) Content access management method, device and storage medium
CN109493442A (en) Patrol method, system, device, computer equipment and the storage medium of river event handling
US20090234827A1 (en) Citizenship fraud targeting system
CN116634098A (en) Power production operation ticket operation risk identification system and method based on video monitoring
CN105631579A (en) Implementation method of business process automatic supervision aid decision making
CN108616538A (en) Attacker's formation gathering method, system, terminal, server and its storage medium
CN113922977A (en) Anti-cheating method and system based on mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant