WO2022092497A1 - System for providing similar case information, and method therefor - Google Patents

System for providing similar case information, and method therefor Download PDF

Info

Publication number
WO2022092497A1
WO2022092497A1 PCT/KR2021/009858 KR2021009858W WO2022092497A1 WO 2022092497 A1 WO2022092497 A1 WO 2022092497A1 KR 2021009858 W KR2021009858 W KR 2021009858W WO 2022092497 A1 WO2022092497 A1 WO 2022092497A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
criminal
similar
person
event
Prior art date
Application number
PCT/KR2021/009858
Other languages
French (fr)
Korean (ko)
Inventor
양중식
이영준
염경록
조영준
Original Assignee
(주)아이와즈
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주)아이와즈 filed Critical (주)아이와즈
Publication of WO2022092497A1 publication Critical patent/WO2022092497A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/332Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/338Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/103Formatting, i.e. changing of presentation of documents
    • G06F40/117Tagging; Marking up; Designating a block; Setting of attributes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/279Recognition of textual entities
    • G06F40/289Phrasal analysis, e.g. finite state techniques or chunking
    • G06F40/295Named entity recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Definitions

  • the present invention relates to a similar case information providing system and method, and more particularly, by combining main characteristic information of a person and an incident using a security information data bank and a criminal person knowledge network, search for similar cases and provide the information It relates to a similar event information providing system and method therefor.
  • the present invention is to provide similar case information and related data to investigative personnel by searching for similar cases based on case and person.
  • the similar incident information providing system to solve the above problems includes an integrated security information data bank and a criminal person knowledge network, and the criminal person knowledge network identifies and extracts criminal suspects from unstructured documents and structured data a criminal suspect candidate extraction module; a criminal character inference module for inferring the criminal suspect as a criminal through learning of the criminal suspect extracted from the criminal suspect candidate extraction module; a criminal name classification module in the document for creating a node candidate list by integrating the criminal name inferred from the criminal person inference module and the criminal name extracted from the security information data bank; Create a human node with the names of criminals extracted from the criminal name classification module and related names extracted from the security information data bank, and reanalyze and reconstruct the case contents through the past criminal record information of the persons and the information related to similar cases.
  • a similar incident information providing service method using a similar incident information providing system includes the steps of: inputting information related to a case currently under investigation; deriving main characteristics by analyzing cases and people in the criminal person knowledge network; It characterized in that it comprises the steps of searching for similar incidents in the integrated security information data bank by utilizing the derived main characteristics and providing information related to similar incidents to the user.
  • the step of deriving the main features based on the event may include: performing natural language processing analysis on the received information; It is characterized in that it comprises the steps of extracting the main keywords related to the event, and performing entity name recognition and tagging.
  • the step of deriving the main characteristics centered on the person may include: performing natural language processing analysis on the received information; It characterized in that it comprises the steps of performing tagging by extracting the life candidate related to the case and by classifying the position in the document for the human name.
  • the step of searching for similar events may include combining main characteristics and information centered on the event and person; retrieving past criminal records of major persons including the suspect; It characterized in that it comprises the steps of searching for an incident similar to the case input from the search result and the security information data bank, and storing the search result in the similar case information list.
  • obtaining additional case and person information related to the case input from the criminal person knowledge network It is characterized in that it further comprises a similar incident expansion search step comprising the step of re-searching the similar incident in the integrated security information data bank by adding additional information and adding the additionally confirmed information to the similar incident information list.
  • the step of providing similar event-related information includes providing a list of similar event information searched for based on the event information input by the user and providing a visualization function for the convenience of identifying similarities with the inputted event. characterized in that
  • similar incident information can be provided quickly and accurately from the security information data bank by automating the similar incident search system.
  • FIG. 1 is a conceptual diagram illustrating a similar event information providing system according to an embodiment of the present invention.
  • FIG. 2 is a block diagram of a criminal person knowledge network according to an embodiment of the present invention.
  • FIG. 3 is a flowchart of a service method using a similar event information providing system according to another embodiment of the present invention.
  • FIG. 5 is a flowchart of a step of deriving a main characteristic centering on a person.
  • 6 is a flowchart of the steps of searching for similar events.
  • the present invention provides three-dimensional information by searching for similar incidents using various big data analysis techniques and search techniques based on an integrated security information data bank and a criminal person knowledge network.
  • FIG. 1 is a conceptual diagram illustrating a similar incident information providing system according to an embodiment of the present invention.
  • incident information is input based on the integrated public security information data bank 200 and the criminal person knowledge network 100, it is a person-centered and event-centered It provides a visualization method that can identify similarities and lists of similar events by extracting key features and searching for similar events.
  • the integrated security information data bank is data collected from various security information systems managed by the National police Agency across the country, and the criminal person knowledge network creates a life node with criminals and their related persons extracted from the integrated security information data bank. It is a system that provides three-dimensional information related to a suspect through information related to past criminal records and similar incidents.
  • Figure 2 is a criminal person inference inferred as a criminal through the configuration book of the criminal person knowledge network, a criminal name candidate extraction module 10 that identifies and extracts criminal suspects from unstructured documents and structured data, and the extracted criminal suspects
  • the module 20 the integrated security information data bank 200 and the criminal name classification module 30 in the document for tagging the criminal and their related persons extracted from the biography dictionary and creating a node candidate list, the integrated security information data bank and the criminal name
  • a knowledge network construction module that creates a human node with criminals and their related people extracted from the extraction module, and re-analyses and reconstructs the case contents through information related to past criminal records and similar cases to build a criminal knowledge network (40) and an information support module 50 that supports the criminal person knowledge network information to the user.
  • the atypical document of the candidate extraction module 10 includes investigation data, 112 report data, and a report.
  • the extraction target of the present invention may include semi-structured and structured documents, including unstructured documents.
  • Data is divided into structured, semi-structured, and unstructured data according to the degree of standardization.
  • Structured data refers to data stored in a fixed field with a certain format, for example, data stored in DB or Excel
  • semi-structured data is a fixed field.
  • metadata or schema such as XML or HTML.
  • the unstructured documents and structured data are analyzed through natural language processing technology, and criminal name candidates are extracted by referring to a pre-established biographical dictionary to create a list.
  • Natural language processing technology is one of the fields of automation technology in which machine learning (deep learning) is added to artificial intelligence technology. It is a calculation technique to automate human language analysis and expression.
  • a nominative investigation means an investigation that points to the subject of an action, such as ' ⁇ goes', ⁇ is, or ⁇ in(heard). It is more likely to be placed on the root node, which is the central node of the human node.
  • the actor-subject mark is an element that distinguishes which character is the actor and the subject through morphological analysis.
  • the criminal character inference module 20 is a module for inferring a criminal suspect as a criminal through learning the location information of a specific suspect and age, gender, complex, language habits, etc., in order to generate an inference module with high probability You may need the advice of a profiler (criminal psychoanalyst).
  • the criminal name classification module 30 in the document performs the task of tagging the criminal persons extracted from the integrated security information data bank 200 and the biographical dictionary and their related persons, and creating a node candidate list.
  • the integrated security information data bank is big data of security information managed by the National police Agency. It is used for case resolution or prediction and automatically builds a life dictionary, which is one of the main elements of integrated security information management. It is one of the public services that collects suspect information from various angles and provides information to users so that security information existing in other systems can be used as related information.
  • the location where the suspect's name appears in the document and the surrounding words appearing with the suspect are extracted and trained in the classification model.
  • the people appearing in the new input document are classified into suspects and people around them, and what kind of relationship the people around them have with the suspect is automatically analyzed.
  • the input documents are atypical documents such as police reports or case documents, but they are highly structured documents with a high probability of being structured to a certain extent. It is possible to automatically classify and tag the positions or roles that the persons extracted by learning with the document have in the document.
  • the system for verifying the correct rate of the classification model is included in the criminal name classification module 30, it is frequently tested whether the correct rate of the classification model is higher than or equal to the reference value, and if it is less than the standard, the process of re-learning is repeated until it becomes higher than the standard value.
  • the standard correct answer rate can also be set through expert advice.
  • the standard probability value after expert advice is applied in the tagging process for criminals and related persons. That is, the suspects are classified in the order of highest probability, and those with probability values greater than or equal to the standard are tagged with their respective statuses, and those with lower than the standard are tagged with other classifications. It is desirable to allow the user to view and edit all status tags.
  • the knowledge network building module 40 creates a human node with the criminals and their related persons extracted from the integrated security information data bank and the criminal name extraction module, and the case contents through past criminal record information and correlation information with similar cases Reanalyze and reconstruct the criminal character knowledge network.
  • each human information is noded through the human name information list for the integrated security information data bank, which is the security information big data managed by the National police Agency, and the criminal name candidates constructed by extracting and constructing natural language processing technology from unstructured and structured data. It specifies the relationship between human nodes through the status classification tag in the document.
  • the process first creates a root node using the suspect information, and personal information other than the suspect is created and stored as a subnode of the root node according to the relationship with the root node, and the relationship between the nodes is indicated by using the status tag in the document.
  • the root node is the central node in the criminal knowledge network, and is the first node to be created and a suspect candidate.
  • a node corresponds to a point in a graph of a tree structure consisting of points and lines.
  • the highest node is called a root node and the lowest node is called a leaf.
  • a data communication network it is one or more functional units connected to a data transmission path and mainly refers to a branch point of a communication network or an access point of a terminal.
  • a node is mapped with personal information such as a suspect, an accomplice, a victim or a reporter, and a line indicates a relationship between them.
  • Building a criminal knowledge network is to search for the suspect's past criminal record information in the integrated security information data bank, analyze the information, collect relevant information, reconstruct the data according to the schema based on the six-fourth principle, and store it in the criminal name node. .
  • the criminal person knowledge network is constructed by extracting basic information from the documents input by the user to compose basic information about the suspect, and for insufficient matters, supplementary data is obtained from the data bank and basic information is prepared; As basic suspect information, if the suspect's past criminal record exists as a result of the data bank search, the record is analyzed and the original document for the case is generated as a past incident node; Creates human nodes of past events as sub-nodes of past event nodes, summarizes event contents according to schema based on the six-fold principle, for example, person, time, place, event, motive, method, etc.
  • TF-IDF Term Frequency-Inverse Document Frequency
  • the information support module 50 provides a user with a choice between selecting a suspect's name and selecting a person with the same name to the user, and provides a criminal information support service for the target selected by the user.
  • the information support module provides a visualization of all the contents analyzed by the system or the criminal person knowledge network narrowed by the user through an intermediate option, and displays the contents summarized in the six-fold principle when clicking on a past case or similar case or view the original text
  • clicking each node such as displaying the original text
  • the detailed information connected to it is displayed, and items with a high degree of similarity to the root suspect are expressed by using different colors or line thickness to allow the user to track the content related to the suspect.
  • It supports easy access establishes a criminal person knowledge network that expands by connecting people related to the case, such as accomplices, witnesses, and victims, with the suspect information as the central node, and manages so that users can modify the criminal person knowledge network providing tools, etc.
  • the visualization service in the information support module provides a visualization tool using a web browser or VR (virtual reality) based on the criminal person knowledge network.
  • the web browser visualizes the collection status and statistical information according to the monitoring results with various charts and graphs, and configures the web to provide services.
  • VR uses 3D or augmented reality development tools such as Unity to virtualize monitoring results and reflects them on the implemented virtual space engine.
  • the user provides visualization services such as various charts and graphs for the collection status and statistical information according to monitoring results through interworking with VR devices, and provides related data search results through actions such as clicking and moving data in the form of nodes and networks do.
  • a service method using a similar case information providing system including an integrated security information data bank and a criminal person knowledge network includes the steps of inputting information related to a case currently under investigation, as shown in FIG. It includes the steps of deriving main characteristics by analyzing the case and the person, using the derived main characteristics to search for similar incidents in the integrated security information data bank, and providing users with similar incident-related information.
  • the steps of deriving the main characteristics centering on the event are as shown in FIG. 4, and the steps of performing natural language processing analysis on the received information, extracting major keywords related to the event, and performing entity name recognition and tagging are performed.
  • the steps of deriving the main characteristics centering on the person are as shown in FIG. 5, and the step of performing natural language processing analysis on the input information, the step of extracting the human candidate related to the event, and the classification and tagging of the status of the person in the document It includes the step of performing
  • the human candidate extraction extracts the surrounding vocabulary of the human candidate by processing natural language processing whether the nominative investigation is combined and whether the actor and the subject are marked, and checks whether the human candidate is really a human name.
  • the position with the highest probability value is tagged as the person's position, and when the probability value is less than the standard value, other classification is tagged.
  • the tagging of a status is viewable and editable by the user.
  • the step of searching for a similar case is as shown in FIG. 6, a step of searching for a similar event in the security information data bank based on the extracted main characteristics and information, a step of combining the main characteristics and information centered on the case and person, and the main person (suspect etc.), searching for a similar case to the case input from the search result and the security information data bank, and storing the search result in a similar case information list.
  • Similar event search uses a similarity analysis algorithm such as TF-IDF.
  • the similar case expansion search step includes the steps of acquiring additional case and person information related to the case input from the criminal person knowledge network, the step of re-searching the similar case in the integrated security information data bank by adding additional information, and comparing the additionally confirmed information. adding to the event information list.
  • the step of providing similar event-related information includes providing a list of similar event information searched based on the event information input by the user, and providing a visualization function for the convenience of identifying similarities with the inputted event. .
  • the visualization function can highlight the main characteristic information extracted for the search for similar events in the search result, or provide it with a web browser or VR.
  • Candidate extraction module 20 criminal character inference module

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Tourism & Hospitality (AREA)
  • General Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Educational Administration (AREA)
  • Mathematical Physics (AREA)
  • Primary Health Care (AREA)
  • Development Economics (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A system for providing similar case information, according to the present invention, comprises an integrated security information data bank and a criminal knowledge network, searches for similar cases by combining main feature information of people and cases, and provides similar case information.

Description

유사 사건 정보제공시스템 및 그 방법Similar incident information providing system and method therefor
본 발명은 유사 사건 정보제공시스템 및 그 방법에 관한 것으로서, 더욱 상세하게는 치안정보 데이터뱅크와 범죄인물 지식망을 이용하여 인물과 사건의 주요 특징 정보를 조합하여 유사한 사례를 탐색하고 해당 정보를 제공하는 유사 사건 정보제공시스템 및 그 방법에 관한 것이다.The present invention relates to a similar case information providing system and method, and more particularly, by combining main characteristic information of a person and an incident using a security information data bank and a criminal person knowledge network, search for similar cases and provide the information It relates to a similar event information providing system and method therefor.
전국에 걸쳐 경찰청이 관리하는 다양한 치안정보 시스템들과 이 시스템들에 수십 년간 축적된 치안 정보 빅데이터인 통합 치안정보 데이터뱅크가 존재한다. 최근 이러한 빅데이터를 활용하여 유사 사건의 수사에 활용하는 정보제공시스템이 개발되고 있다.There are various security information systems managed by the National Police Agency across the country and an integrated security information data bank, which is big data for security information accumulated in these systems for decades. Recently, an information provision system that utilizes such big data to investigate similar cases has been developed.
종래의 사건 수사는 수사 인력의 유사 사건 해결 경험이나 검색 노하우에 의존하기 때문에 수사의 개인별 편차가 존재하여 사건 해결에 많은 시간이 소요되거나 실기하는 경우가 발생하고 종합적이고 효율적인 수사에는 한계가 있었다.Since the conventional case investigation relies on the similar case resolution experience or search know-how of investigative personnel, there are individual differences in the investigation.
상기의 문제를 해결하고자 본 발명은 사건 중심, 인물 중심으로 유사한 사례를 탐색하여 수사 인력에게 유사 사건 정보와 관련 데이터를 제공하고자 한다.In order to solve the above problem, the present invention is to provide similar case information and related data to investigative personnel by searching for similar cases based on case and person.
상기의 과제를 해결하고자 하는 본 발명에 따른 유사 사건 정보제공시스템은, 통합 치안정보 데이터뱅크와 범죄인물 지식망을 포함하고, 상기 범죄인물 지식망은, 비정형 문서와 정형 데이터에서 범죄용의자를 식별하여 추출하는 범죄용의자 후보추출모듈; 상기 범죄용의자 후보추출모듈로부터 추출된 범죄용의자에 대한 학습을 통해 상기 범죄용의자를 범죄인물로 추론하는 범죄인물추론모듈; 상기 범죄인물추론모듈로부터 범죄인물로 추론된 범죄인명과 치안정보 데이터뱅크로부터 추출된 범죄인명을 통합 태깅하여 노드 후보 목록을 작성하는 문서 내 범죄인명분류모듈; 상기 범죄인명분류모듈로부터 추출된 범죄인명과 치안정보 데이터뱅크로부터 추출된 연관인명들로 인명 노드를 생성하고, 상기 인물들의 과거 범죄기록 정보와 유사 사건과의 연관성 정보를 통해 사건 내용을 재분석하고 재구성하여 범죄인물 지식망을 구축하는 범죄인물 지식망구축모듈 및 상기 범죄인물 지식망 정보를 사용자에게 지원하는 정보지원모듈을 포함하여, 인물과 사건의 주요 특징 정보를 조합하여 유사한 사례를 탐색하고 유사 사건 정보를 제공하는 것을 특징으로 한다.The similar incident information providing system according to the present invention to solve the above problems includes an integrated security information data bank and a criminal person knowledge network, and the criminal person knowledge network identifies and extracts criminal suspects from unstructured documents and structured data a criminal suspect candidate extraction module; a criminal character inference module for inferring the criminal suspect as a criminal through learning of the criminal suspect extracted from the criminal suspect candidate extraction module; a criminal name classification module in the document for creating a node candidate list by integrating the criminal name inferred from the criminal person inference module and the criminal name extracted from the security information data bank; Create a human node with the names of criminals extracted from the criminal name classification module and related names extracted from the security information data bank, and reanalyze and reconstruct the case contents through the past criminal record information of the persons and the information related to similar cases. Including a criminal person knowledge network construction module that builds a criminal person knowledge network and an information support module that supports the criminal person knowledge network information to a user, search for similar cases by combining main characteristic information of a person and an event, and similar case information It is characterized in that it provides.
본 발명의 다른 실시예로서, 유사 사건 정보제공시스템을 이용한 유사 사건 정보제공 서비스 방법은, 현재 수사 중인 사건 관련 정보를 입력하는 단계; 범죄인물 지식망에서 사건과 인물을 중심으로 분석하여 주요 특징을 도출하는 단계; 도출된 주요 특징을 활용하여 통합 치안정보 데이터 뱅크에서 유사 사건을 탐색하는 단계 및 사용자에게 유사 사건 관련 정보를 제공하는 단계를 포함하는 것을 특징으로 한다.As another embodiment of the present invention, a similar incident information providing service method using a similar incident information providing system includes the steps of: inputting information related to a case currently under investigation; deriving main characteristics by analyzing cases and people in the criminal person knowledge network; It characterized in that it comprises the steps of searching for similar incidents in the integrated security information data bank by utilizing the derived main characteristics and providing information related to similar incidents to the user.
사건을 중심으로 주요 특징을 도출하는 단계는, 입력받은 정보에 대하여 자연어처리 분석을 수행하는 단계; 사건과 관련된 주요 키워드를 추출하는 단계 및 개체명 인식과 태깅을 수행하는 단계를 포함하는 것을 특징으로 한다.The step of deriving the main features based on the event may include: performing natural language processing analysis on the received information; It is characterized in that it comprises the steps of extracting the main keywords related to the event, and performing entity name recognition and tagging.
인물을 중심으로 주요 특징을 도출하는 단계는, 입력받은 정보에 대하여 자연어처리 분석을 수행하는 단계; 사건과 관련된 인명 후보를 추출하는 단계 및 인명에 대한 문서 내 지위를 분류하여 태깅을 수행하는 단계를 포함하는 것을 특징으로 한다.The step of deriving the main characteristics centered on the person may include: performing natural language processing analysis on the received information; It characterized in that it comprises the steps of performing tagging by extracting the life candidate related to the case and by classifying the position in the document for the human name.
유사 사건을 탐색하는 단계는, 사건과 인물 중심 주요 특징 및 정보를 조합하는 단계; 용의자를 포함한 주요 인물의 과거범죄기록 검색하는 단계; 검색 결과와 치안정보 데이터뱅크에서 입력받은 사건과 유사한 사건을 탐색하는 단계 및 탐색 결과를 유사 사건 정보 목록에 저장하는 단계를 포함하는 것을 특징으로 한다.The step of searching for similar events may include combining main characteristics and information centered on the event and person; retrieving past criminal records of major persons including the suspect; It characterized in that it comprises the steps of searching for an incident similar to the case input from the search result and the security information data bank, and storing the search result in the similar case information list.
유사 사건 검색은 TF-IDF 유사도 분석 알고리즘을 이용하는 것을 특징으로 한다.Similar event search is characterized by using the TF-IDF similarity analysis algorithm.
범죄인물 지식망에서 입력받은 사건과 관련한 추가적인 사건과 인물 정보를 획득하는 단계; 추가적인 정보를 추가하여 통합 치안정보 데이터뱅크에서 유사 사건 재탐색하는 단계 및 추가적으로 확인된 정보를 유사 사건 정보 목록에 추가하는 단계를 포함하는 유사 사건 확장 탐색 단계를 더 포함하는 것을 특징으로 한다.obtaining additional case and person information related to the case input from the criminal person knowledge network; It is characterized in that it further comprises a similar incident expansion search step comprising the step of re-searching the similar incident in the integrated security information data bank by adding additional information and adding the additionally confirmed information to the similar incident information list.
유사 사건 관련 정보를 제공하는 단계는, 사용자가 입력한 사건 정보를 기반으로 탐색한 유사 사건 정보 목록을 제공하는 단계 및 입력한 사건과의 유사점 파악의 편의성을 위한 시각화 기능을 제공하는 단계를 포함하는 것을 특징으로 한다.The step of providing similar event-related information includes providing a list of similar event information searched for based on the event information input by the user and providing a visualization function for the convenience of identifying similarities with the inputted event. characterized in that
본 발명은 사건 중심, 인물 중심으로 유사한 사례를 탐색하여 수사 인력에게 유사 사건 정보와 관련 데이터를 제공하여 정확하고 빠른 수사를 할 수 있다.According to the present invention, by providing similar case information and related data to investigative personnel by searching for similar cases based on the case center and the person center, it is possible to conduct an accurate and fast investigation.
또한, 유사 사건 검색시스템을 자동화하여 치안정보 데이터뱅크로부터 신속하고 정확하게 유사 사건 정보를 제공받을 수 있다.In addition, similar incident information can be provided quickly and accurately from the security information data bank by automating the similar incident search system.
도 1은 본 발명의 실시예에 따른 유사 사건 정보제공시스템을 도시한 개념도이다.1 is a conceptual diagram illustrating a similar event information providing system according to an embodiment of the present invention.
도 2는 본 발명의 실시예에 따른 범죄인물 지식망의 구성도이다.2 is a block diagram of a criminal person knowledge network according to an embodiment of the present invention.
도 3은 본 발명의 다른 실시예에 따른 유사 사건 정보제공시스템을 이용한 서비스 방법의 흐름도이다.3 is a flowchart of a service method using a similar event information providing system according to another embodiment of the present invention.
도 4는 사건을 중심으로 주요 특징을 도출하는 단계의 흐름도이다.4 is a flowchart of the steps of deriving main features based on an event.
도 5는 인물을 중심으로 주요 특징을 도출하는 단계의 흐름도이다.5 is a flowchart of a step of deriving a main characteristic centering on a person.
도 6은 유사 사건을 탐색하는 단계의 흐름도이다.6 is a flowchart of the steps of searching for similar events.
도 7은 유사 사건 확장 탐색 단계의 흐름도이다.7 is a flowchart of a similar event extension search step.
이하, 첨부 도면들 및 첨부 도면들에 기재된 내용들을 참조하여 본 발명의 실시예를 상세하게 설명하지만, 본 발명이 실시예에 의해 제한되거나 한정되는 것은 아니다.Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings and contents described in the accompanying drawings, but the present invention is not limited or limited by the embodiments.
본 발명은 통합 치안정보 데이터뱅크와 범죄인물 지식망기반으로 다양한 빅데이터 분석기법과 검색기법을 활용하여 유사 사건을 검색하여 입체적인 정보를 제공한다.The present invention provides three-dimensional information by searching for similar incidents using various big data analysis techniques and search techniques based on an integrated security information data bank and a criminal person knowledge network.
도 1은 본 발명의 실시예에 따른 유사 사건 정보제공시스템을 도시한 개념도로서, 통합 치안정보 데이터뱅크(200)와 범죄인물 지식망(100)을 기반으로 사건 정보를 입력하면 인물 중심과 사건중심으로 주요 특징을 추출하여 유사 사건을 검색하여 유사 사건의 목록과 유사점을 파악할 수 있는 시각화 방법을 제공한다.1 is a conceptual diagram illustrating a similar incident information providing system according to an embodiment of the present invention. When incident information is input based on the integrated public security information data bank 200 and the criminal person knowledge network 100, it is a person-centered and event-centered It provides a visualization method that can identify similarities and lists of similar events by extracting key features and searching for similar events.
본 발명에서 통합 치안정보 데이터뱅크는 전국에 걸쳐 경찰청이 관리하는 다양한 치안정보 시스템에서 취합한 데이터이고, 범죄인물 지식망은 통합 치안정보 데이터뱅크로부터 추출된 범죄인물 및 그 연관인물들로 인명 노드를 생성하여 과거 범죄기록 정보 및 유사 사건과의 연관성 정보를 통해 용의자와 관련된 입체적인 정보를 제공하는 시스템이다.In the present invention, the integrated security information data bank is data collected from various security information systems managed by the National Police Agency across the country, and the criminal person knowledge network creates a life node with criminals and their related persons extracted from the integrated security information data bank. It is a system that provides three-dimensional information related to a suspect through information related to past criminal records and similar incidents.
도 2는 범죄인물 지식망의 구성도서, 비정형 문서와 정형 데이터에서 범죄용의자를 식별하여 추출하는 범죄인명 후보추출모듈(10), 추출된 범죄용의자에 대한 학습을 통해 범죄인물로 추론하는 범죄인물추론모듈(20), 통합 치안정보 데이터뱅크(200)와 인명사전으로부터 추출된 범죄인물과 그 연관 인물을 태깅하고 노드 후보 목록을 작성하는 문서 내 범죄인명분류모듈(30), 통합 치안정보 데이터뱅크와 범죄인명추출모듈로부터 추출된 범죄인물과 그 연관인물들로 인명 노드를 생성하고, 과거 범죄기록 정보 및 유사 사건과의 연관성 정보를 통해 사건 내용을 재분석하고 재구성하여 범죄인물 지식망을 구축하는 지식망구축모듈(40) 및 범죄인물 지식망 정보를 사용자에게 지원하는 정보지원모듈(50)을 포함한다.Figure 2 is a criminal person inference inferred as a criminal through the configuration book of the criminal person knowledge network, a criminal name candidate extraction module 10 that identifies and extracts criminal suspects from unstructured documents and structured data, and the extracted criminal suspects The module 20, the integrated security information data bank 200 and the criminal name classification module 30 in the document for tagging the criminal and their related persons extracted from the biography dictionary and creating a node candidate list, the integrated security information data bank and the criminal name A knowledge network construction module that creates a human node with criminals and their related people extracted from the extraction module, and re-analyses and reconstructs the case contents through information related to past criminal records and similar cases to build a criminal knowledge network (40) and an information support module 50 that supports the criminal person knowledge network information to the user.
상기 후보추출모듈(10)의 비정형 문서에는 수사자료, 112신고 데이터 및 조서 등이 포함된다.The atypical document of the candidate extraction module 10 includes investigation data, 112 report data, and a report.
본 발명의 추출 대상에는 비정형 문서를 포함하여 반정형 및 정형 문서도 포함될 수 있다.The extraction target of the present invention may include semi-structured and structured documents, including unstructured documents.
데이터는 정형화 정도의 따라 정형, 반정형, 비정형 데이터로 나뉘는데, 정형데이터는 일정한 형식을 갖춘 고정된 필드에 저장된 데이터로서 예를 들면 DB나 엑셀 등에 저장된 데이터를 의미하고, 반정형 데이터는 고정된 필드에 저장되지는 않지만 XML이나 HTML과 같이 메타데이터(metadata)나 스키마(schema) 등을 포함한 데이터로 볼 수 있고, 비정형 데이터는 페이스북이나 트위터 등 SNS에 게시한 글, 블로그에 게시한 글, 사진, 동영상, 댓글, DM(direct message)으로 나눈 대화, 카톡메시지, 스마트폰 GPS 위치정보 등 고정된 필드에 형식을 갖춰서 집어넣을 수 없는 종류의 데이터들을 의미한다.Data is divided into structured, semi-structured, and unstructured data according to the degree of standardization. Structured data refers to data stored in a fixed field with a certain format, for example, data stored in DB or Excel, and semi-structured data is a fixed field. Although it is not stored in , it can be viewed as data including metadata or schema such as XML or HTML. , videos, comments, conversations divided by direct message (DM), KakaoTalk messages, smartphone GPS location information, etc.
상기 비정형 문서와 정형 데이터를 자연어처리 기술을 통해 분석하고 기 구축된 인명사전을 참고하여 범죄인명 후보를 추출하여 목록을 작성한다.The unstructured documents and structured data are analyzed through natural language processing technology, and criminal name candidates are extracted by referring to a pre-established biographical dictionary to create a list.
자연어처리 기술은 인공지능 기술에 기계학습(딥러닝)이 더해진 자동화 기술 분야 중 하나로서 인간 언어 분석과 표현을 자동화하기 위한 계산 기법이다.Natural language processing technology is one of the fields of automation technology in which machine learning (deep learning) is added to artificial intelligence technology. It is a calculation technique to automate human language analysis and expression.
추출한 인명 후보들의 주변 어휘 목록을 추출하여 해당 인명 후보가 진짜 본인인지 확인하여 본인으로 확인된 후보들을 저장한다.By extracting the list of words around the extracted human candidates, it is checked whether the candidate is the real person, and the candidates identified as the person are stored.
상기의 확인 과정에서 주격조사 결합 여부, 행위자 피행위자 표지 여부 등이 판단 항목에 포함될 수 있다. In the above confirmation process, whether or not the nominative investigation is combined, whether the actor and the subject are marked, etc. may be included in the judgment items.
주격조사란 '△△가(이), △△는(은) 또는 △△들이(들은)' 등과 같이 행위의 주체를 가리키는 조사를 뜻하며, 상기 행위가 범죄일 경우 범죄의 주범이 될 가능성이 높아져서 인명 노드(node)의 중심 노드인 root 노드에 놓이게 될 가능성이 커진다.A nominative investigation means an investigation that points to the subject of an action, such as '△△goes', △△ is, or △△in(heard). It is more likely to be placed on the root node, which is the central node of the human node.
행위자 피행위자 표지는 형태소 분석을 통해 어떤 인물이 어떤 행위의 행위자인지 피행위자인지 구분하는 요소로서, 예를 들면 '하다'는 행위자와 결합되고 '하게 되다'는 피행위자와 결합되는 표현으로 분류될 수 있다.The actor-subject mark is an element that distinguishes which character is the actor and the subject through morphological analysis. can
범죄인물추론모듈(20)은 특정 용의자의 빈출 위치 정보 및 연령, 성별, 콤플렉스, 언어습관 등의 학습을 통해 범죄용의자를 범죄인물로 추론하는 모듈(module)로서, 확률 높은 추론모듈의 생성을 위해서는 프로파일러(profiler: 범죄심리분석요원)의 자문이 필요할 수 있다.The criminal character inference module 20 is a module for inferring a criminal suspect as a criminal through learning the location information of a specific suspect and age, gender, complex, language habits, etc., in order to generate an inference module with high probability You may need the advice of a profiler (criminal psychoanalyst).
상기 문서 내 범죄인명분류모듈(30)은 통합 치안정보 데이터뱅크(200)와 인명사전으로부터 추출된 범죄인물과 그 연관 인물을 태깅하고 노드 후보 목록을 작성하는 작업을 수행한다.The criminal name classification module 30 in the document performs the task of tagging the criminal persons extracted from the integrated security information data bank 200 and the biographical dictionary and their related persons, and creating a node candidate list.
통합 치안정보 데이터뱅크는 경찰청이 관리하는 치안정보 빅데이터로서, 사건 해결 또는 예측에 활용되고 치안정보 통합 관리의 주요 요소 중 하나인 인명사전을 자동 구축하고, 이를 토대로 인명을 식별하는 시스템을 개발하여 각기 다른 시스템에 존재하는 치안정보를 연관정보로 활용할 수 있도록 용의자 정보를 다각적으로 취합하여 사용자에게 정보 제공하는 공공 서비스 중 하나다.The integrated security information data bank is big data of security information managed by the National Police Agency. It is used for case resolution or prediction and automatically builds a life dictionary, which is one of the main elements of integrated security information management. It is one of the public services that collects suspect information from various angles and provides information to users so that security information existing in other systems can be used as related information.
상기 통합 치안정보 데이터뱅크의 데이터에서 자연어분석을 통해 문서 내에서 용의자 인명이 나타나는 위치와 용의자와 함께 나타나는 주변 단어들을 추출하여 분류 모델에 학습시킨다.Through natural language analysis from the data of the integrated security information data bank, the location where the suspect's name appears in the document and the surrounding words appearing with the suspect are extracted and trained in the classification model.
구체적으로, 인공지능 기술을 활용하여 신규 입력 문서에 나타난 인명들을 용의자와 주변 인명들로 분류하고, 주변 인명들은 그 용의자와 어떤 관계를 가지고 있는지 자동으로 분석하며,Specifically, by using artificial intelligence technology, the people appearing in the new input document are classified into suspects and people around them, and what kind of relationship the people around them have with the suspect is automatically analyzed.
입력되는 문서들은 경찰조서나 사건문서 등으로서 비정형 문서이지만 어느 정도 구조화되어 있을 확률이 높은 문서들로서 용의자, 공범자, 피해자, 목격자 등의 정보는 일정한 패턴을 보일 것으로 예상되므로 그 패턴이나 특징들을 인공지능 기술로 학습시켜 추출된 상기 인명들이 그 문서 내에서 가지는 지위나 역할을 자동으로 분류하고 태깅할 수 있다.The input documents are atypical documents such as police reports or case documents, but they are highly structured documents with a high probability of being structured to a certain extent. It is possible to automatically classify and tag the positions or roles that the persons extracted by learning with the document have in the document.
예를 들면, '2019년 11월 1일 15시 30분경, 용의자 홍길동이 서울시 금천구 소재 원룸에서 김철수가 집을 비운 틈을 타 원룸에 침입하여 100만원 상당의 금품을 훔친 사건 발생. 평소 조용하던 김철수의 집이 소란스러운 것을 이상하게 여긴 이웃 주민 이영희의 신고로 현장에서 현행범으로 체포.'라는 사건 문서로부터 자동 태깅 결과는 '홍길동/용의자, 김철수/피해자, 이영희/신고자'가 된다.For example, 'Around 15:30 on November 1, 2019, the suspect Hong Gil-dong broke into the studio while Kim Chul-su was away from the studio in Geumcheon-gu, Seoul and stole money worth 1 million won. The result of automatic tagging is 'Hong Gil-dong/Suspect, Kim Cheol-soo/victim, and Lee Young-hee/reporter' from the case document 'At the scene of the report of Lee Young-hee, a neighbor who found it strange that Kim Cheol-soo's house, which was usually quiet, was disturbing.'
또한, 분류 모델의 정답률을 검증하는 시스템이 범죄인명분류모듈(30)에 포함되어 있어서, 분류 모델의 정답률이 기준치 이상인지 수시로 검정되고 기준치 미달이면 기준치 이상이 될 때까지 재학습시키는 과정을 반복한다. 기준 정답률은 전문가의 자문을 통해 설정할 수도 있다.In addition, since the system for verifying the correct rate of the classification model is included in the criminal name classification module 30, it is frequently tested whether the correct rate of the classification model is higher than or equal to the reference value, and if it is less than the standard, the process of re-learning is repeated until it becomes higher than the standard value. . The standard correct answer rate can also be set through expert advice.
또한, 범죄인물과 그 연관 인물에 대한 태깅 과정에서도 전문가 자문을 거친 기준 확률치가 적용된다. 즉, 용의자로서의 확률이 높은 순서로 분류하여 확률치가 기준치 이상인 인물에 대해 해당 지위를 태깅하고, 기준치 이하인 인물은 기타 분류로 태깅한다. 모든 지위 태그에 대하여 사용자가 확인 및 수정할 수 있도록 하는 것이 바람직하다.In addition, the standard probability value after expert advice is applied in the tagging process for criminals and related persons. That is, the suspects are classified in the order of highest probability, and those with probability values greater than or equal to the standard are tagged with their respective statuses, and those with lower than the standard are tagged with other classifications. It is desirable to allow the user to view and edit all status tags.
상기 지식망구축모듈(40)은 통합 치안정보 데이터뱅크와 범죄인명추출모듈로부터 추출된 범죄인물과 그 연관인물들로 인명 노드를 생성하고, 과거 범죄기록 정보 및 유사 사건과의 연관성 정보를 통해 사건 내용을 재분석하고 재구성하여 범죄인물 지식망을 구축한다.The knowledge network building module 40 creates a human node with the criminals and their related persons extracted from the integrated security information data bank and the criminal name extraction module, and the case contents through past criminal record information and correlation information with similar cases Reanalyze and reconstruct the criminal character knowledge network.
인명 노드 생성은, 경찰청이 관리하는 치안정보 빅데이터인 통합 치안정보 데이터뱅크와 비정형 및 정형 데이터에서 자연어처리 기술로 추출하여 구축한 범죄인명 후보에 대하여, 인명 정보 목록을 통해 각 인명 정보들을 노드화하고 문서 내 지위 분류 태그를 통하여 인명 노드 간의 관계를 명시하는 것이다.In the creation of human nodes, each human information is noded through the human name information list for the integrated security information data bank, which is the security information big data managed by the National Police Agency, and the criminal name candidates constructed by extracting and constructing natural language processing technology from unstructured and structured data. It specifies the relationship between human nodes through the status classification tag in the document.
그 과정은 먼저 용의자 정보를 활용하여 root 노드를 생성하고, 용의자 이외의 인명 정보는 root 노드와의 관계에 따라 root 노드의 하위 노드로 생성하여 저장하고 문서 내 지위 태그를 활용하여 노드간의 관계를 표기하는 것이다. root 노드는 범죄인물 지식망에서 중심이 되는 노드로서 가장 먼저 생성되는 노드이며 용의자 후보이다.The process first creates a root node using the suspect information, and personal information other than the suspect is created and stored as a subnode of the root node according to the relationship with the root node, and the relationship between the nodes is indicated by using the status tag in the document. will do The root node is the central node in the criminal knowledge network, and is the first node to be created and a suspect candidate.
참고로 노드(node)는 점과 선으로 이루어진 트리(tree) 구조의 그래프에서 점에 해당한다. 최상위 노드를 루트(root node)라고 하고 최하위 노드를 잎이라고 하는데, 데이터 통신망에서는 데이터를 전송하는 통로에 접속되는 하나 이상의 기능 단위로서 주로 통신망의 분기점이나 단말기의 접속점을 이른다. 본 발명에서 노드는 용의자, 공범자, 피해자 또는 신고자 등 인명 정보와 매핑되며, 선은 이들 서로 간의 관계를 나타낸다.For reference, a node corresponds to a point in a graph of a tree structure consisting of points and lines. The highest node is called a root node and the lowest node is called a leaf. In a data communication network, it is one or more functional units connected to a data transmission path and mainly refers to a branch point of a communication network or an access point of a terminal. In the present invention, a node is mapped with personal information such as a suspect, an accomplice, a victim or a reporter, and a line indicates a relationship between them.
범죄인물 지식망 구축은, 통합 치안정보 데이터뱅크 내에서 용의자의 과거 범죄기록 정보를 탐색하고 해당 정보를 분석하여 연관정보를 취합하고 육하원칙에 입각한 스키마에 맞춰 데이터를 재구성하고 범죄인명 노드에 저장하는 것이다.Building a criminal knowledge network is to search for the suspect's past criminal record information in the integrated security information data bank, analyze the information, collect relevant information, reconstruct the data according to the schema based on the six-fourth principle, and store it in the criminal name node. .
범죄인물 지식망 구축은, 사용자가 입력한 문서에서 기초정보를 추출하여 용의자에 대한 기초정보를 구성하고 부족한 사항들은 데이터뱅크에서 보완 데이터를 가져와서 기초정보를 작성하고; 용의자 기초정보로서, 데이터뱅크 검색 결과 해당 용의자의 과거범죄기록이 존재하면 그 기록을 분석하여 해당 사건에 대한 원본 문서를 과거사건 노드로 생성하고; 과거사건의 인명 노드들을 과거사건 노드의 하위 노드로 생성하고, 과거사건 분석 시 육하원칙에 기반한 스키마, 예를 들어 인물, 시간, 장소, 사건, 동기, 수법 등에 맞춰 사건 내용을 요약하고 그 정보를 사용자에게 제공하여 과거사건의 요점을 쉽게 파악할 수 있게 지원하고; 추가 정보를 이용하여 노드를 수정하고 범죄인물 지식망을 구축하고; 용의자와 별개로 키워드 추출 및 TF-IDF 등의 유사도 분석 기법을 통해 사용자가 입력한 문서에 나타난 사건과 유사한 사건 기록을 검색하고 그 기록을 분석하여 해당 유사 사건의 원본 문서를 유사 사건 노드로 생성하고 유사 사건에 대한 인명 노드들을 유사 사건 노드의 하위 노드로 생성하고; 유사 사건 분석 시 육하원칙에 기반한 스키마, 예를 들어 인물, 시간, 장소, 사건, 동기, 수법 등에 맞춰 사건 내용을 요약하고 그 정보를 사용자에게 제공하여 유사 사건의 요점을 쉽게 파악할 수 있게 지원하고; 추가 정보를 이용하여 노드를 수정하고 범죄인물 지식망을 확장하는 것 등을 말한다.The criminal person knowledge network is constructed by extracting basic information from the documents input by the user to compose basic information about the suspect, and for insufficient matters, supplementary data is obtained from the data bank and basic information is prepared; As basic suspect information, if the suspect's past criminal record exists as a result of the data bank search, the record is analyzed and the original document for the case is generated as a past incident node; Creates human nodes of past events as sub-nodes of past event nodes, summarizes event contents according to schema based on the six-fold principle, for example, person, time, place, event, motive, method, etc. to provide an easy access to the gist of past events; modify the node using the additional information and build a criminal knowledge network; Separately from the suspect, through similarity analysis techniques such as keyword extraction and TF-IDF, an event record similar to the event shown in the document entered by the user is searched for, and the original document of the similar case is created as a similar event node by analyzing the record. generating life nodes for the similar event as sub-nodes of the similar event node; When analyzing similar events, summarize the contents of the event according to the schema based on the six-fold principle, for example, person, time, place, event, motive, method, etc. and provide the information to the user so that the main points of the similar event can be easily grasped; It refers to modifying nodes with additional information, expanding the criminal knowledge network, and so on.
유사도 분석 기법 중 TF-IDF(Term Frequency-Inverse Document Frequency)는 단어의 빈출도와 단어의 특수성을 통해 문장 간 유사도를 계산하는 알고리즘이다.Among the similarity analysis techniques, Term Frequency-Inverse Document Frequency (TF-IDF) is an algorithm that calculates the similarity between sentences based on the frequency of words and the specificity of words.
상기 정보지원모듈(50)은 사용자에게 용의자 인명 선택과 동명이인 선택 중 택일하는 선택지를 제공하고 사용자가 선택한 대상에 대한 범죄인물 정보지원 서비스를 제공하는 것이다.The information support module 50 provides a user with a choice between selecting a suspect's name and selecting a person with the same name to the user, and provides a criminal information support service for the target selected by the user.
정보지원모듈은, 시스템이 분석한 내용 전체 또는 사용자가 중간 선택지를 통해 범위를 좁힌 범죄인물 지식망을 시각화하여 제공하고, 과거사건이나 유사 사건을 클릭할 때 육하원칙으로 요약한 내용을 표시하거나 원문보기를 클릭할 때 원문을 표시하는 등, 각 노드를 클릭할 때 그와 연결된 상세정보를 표시하고, root 용의자와 유사도가 높은 항목들을 색상 또는 선 굵기를 달리하여 표현하여 사용자가 용의자와 관련된 내용을 추적하기 쉽도록 지원하고, 용의자 정보를 중심 노드로 두고 공범자, 목격자, 피해자 등 사건과 관련된 인물들을 선으로 연결하여 확장해 나가는 범죄인물 지식망을 구축하고, 사용자가 범죄인물 지식망을 수정할 수 있도록 관리 도구를 제공하는 것 등을 말한다.The information support module provides a visualization of all the contents analyzed by the system or the criminal person knowledge network narrowed by the user through an intermediate option, and displays the contents summarized in the six-fold principle when clicking on a past case or similar case or view the original text When clicking each node, such as displaying the original text, the detailed information connected to it is displayed, and items with a high degree of similarity to the root suspect are expressed by using different colors or line thickness to allow the user to track the content related to the suspect. It supports easy access, establishes a criminal person knowledge network that expands by connecting people related to the case, such as accomplices, witnesses, and victims, with the suspect information as the central node, and manages so that users can modify the criminal person knowledge network providing tools, etc.
정보지원모듈에서 시각화 서비스는 범죄인물 지식망을 기반으로 웹브라우저나 VR(virtual reality)를 이용하여 시각화 도구를 제공한다.The visualization service in the information support module provides a visualization tool using a web browser or VR (virtual reality) based on the criminal person knowledge network.
웹브라우저는 모니터링 결과에 따른 수집 현황 및 통계 정보를 각종 차트와 그래프 등으로 시각화하여 웹으로 구성하여 서비스를 제공한다.The web browser visualizes the collection status and statistical information according to the monitoring results with various charts and graphs, and configures the web to provide services.
VR은 유니티와 같은 3D 또는 증강현실 개발툴을 이용하여 모니터링 결과를 가상화하고 이를 구현한 가상공간 엔진에 반영한다. 사용자는 VR 디바이스와의 연동을 통해 모니터링 결과에 따른 수집 현황 및 통계 정보를 각종 차트와 그래프 등의 시각화 서비스 제공하며 노드와 네트워크 형태로 구성된 데이터를 클릭, 이동 등의 액션을 통해 연관 데이터 검색 결과 제공한다.VR uses 3D or augmented reality development tools such as Unity to virtualize monitoring results and reflects them on the implemented virtual space engine. The user provides visualization services such as various charts and graphs for the collection status and statistical information according to monitoring results through interworking with VR devices, and provides related data search results through actions such as clicking and moving data in the form of nodes and networks do.
본 발명의 다른 실시예로서, 통합 치안정보 데이터뱅크와 범죄인물 지식망을 포함한 유사 사건 정보제공시스템을 이용한 서비스 방법은 도 3과 같이, 현재 수사 중인 사건 관련 정보를 입력하는 단계, 범죄인물 지식망에서 사건과 인물을 중심으로 분석하여 주요 특징을 도출하는 단계, 도출된 주요 특징을 활용하여 통합 치안정보 데이터 뱅크에서 유사 사건을 탐색하는 단계 및 사용자에게 유사 사건 관련 정보를 제공하는 단계를 포함한다. As another embodiment of the present invention, a service method using a similar case information providing system including an integrated security information data bank and a criminal person knowledge network includes the steps of inputting information related to a case currently under investigation, as shown in FIG. It includes the steps of deriving main characteristics by analyzing the case and the person, using the derived main characteristics to search for similar incidents in the integrated security information data bank, and providing users with similar incident-related information.
사건을 중심으로 주요 특징을 도출하는 단계는 도 4와 같으며, 입력받은 정보에 대하여 자연어처리 분석을 수행하는 단계, 사건과 관련된 주요 키워드를 추출하는 단계 및 개체명 인식과 태깅을 수행하는 단계를 포함한다.The steps of deriving the main characteristics centering on the event are as shown in FIG. 4, and the steps of performing natural language processing analysis on the received information, extracting major keywords related to the event, and performing entity name recognition and tagging are performed. include
인물을 중심으로 주요 특징을 도출하는 단계는 도 5와 같으며, 입력받은 정보에 대하여 자연어처리 분석을 수행하는 단계, 사건과 관련된 인명 후보를 추출하는 단계 및 인명에 대한 문서 내 지위를 분류하여 태깅을 수행하는 단계를 포함한다.The steps of deriving the main characteristics centering on the person are as shown in FIG. 5, and the step of performing natural language processing analysis on the input information, the step of extracting the human candidate related to the event, and the classification and tagging of the status of the person in the document It includes the step of performing
인명후보 추출은 주격조사 결합 여부와 행위자 및 피행위자의 표지 여부 등을 자연어 처리하여 인명 후보의 주변 어휘를 추출하고 해당 인명 후보가 정말로 인명이 맞는지 확인한다. The human candidate extraction extracts the surrounding vocabulary of the human candidate by processing natural language processing whether the nominative investigation is combined and whether the actor and the subject are marked, and checks whether the human candidate is really a human name.
인명에 대한 태깅은 확률값이 가장 높은 지위를 해당 인물의 지위로 태깅하고 확률값이 기준치 이하이면 기타 분류로 태깅한다. 지위의 태깅은 사용자가 확인할 수 있고 수정이 가능하다.In tagging a person, the position with the highest probability value is tagged as the person's position, and when the probability value is less than the standard value, other classification is tagged. The tagging of a status is viewable and editable by the user.
유사 사건을 탐색하는 단계는 도 6과 같으며, 추출한 주요 특징 및 정보를 기반으로 치안정보 데이터뱅크에서 유사 사건을 검색하는 단계로서, 사건과 인물 중심 주요 특징 및 정보를 조합하는 단계, 주요 인물(용의자 등)의 과거범죄기록 검색하는 단계, 검색 결과와 치안정보 데이터뱅크에서 입력받은 사건과 유사한 사건을 탐색하는 단계 및 탐색 결과를 유사 사건 정보 목록에 저장하는 단계를 포함한다.The step of searching for a similar case is as shown in FIG. 6, a step of searching for a similar event in the security information data bank based on the extracted main characteristics and information, a step of combining the main characteristics and information centered on the case and person, and the main person (suspect etc.), searching for a similar case to the case input from the search result and the security information data bank, and storing the search result in a similar case information list.
유사 사건 검색은 TF-IDF 등의 유사도 분석 알고리즘을 활용한다. Similar event search uses a similarity analysis algorithm such as TF-IDF.
본 발명에서는 범죄인물 지식망을 활용하여 더 넓은 범위에서 유사 사건을 도 7과 같이 탐색할 수 있다. 유사 사건 확장 탐색 단계는, 범죄인물 지식망에서 입력받은 사건과 관련한 추가적인 사건과 인물 정보를 획득하는 단계, 추가적인 정보를 추가하여 통합 치안정보 데이터뱅크에서 유사 사건 재탐색하는 단계 및 추가적으로 확인된 정보를 유사 사건 정보 목록에 추가하는 단계를 포함한다.In the present invention, similar cases can be searched for in a wider range as shown in FIG. 7 by utilizing the criminal person knowledge network. The similar case expansion search step includes the steps of acquiring additional case and person information related to the case input from the criminal person knowledge network, the step of re-searching the similar case in the integrated security information data bank by adding additional information, and comparing the additionally confirmed information. adding to the event information list.
유사 사건 관련 정보를 제공하는 단계는, 사용자가 입력한 사건 정보를 기반으로 탐색한 유사 사건 정보 목록을 제공하는 단계 및 입력한 사건과의 유사점 파악의 편의성을 위한 시각화 기능을 제공하는 단계를 포함한다.The step of providing similar event-related information includes providing a list of similar event information searched based on the event information input by the user, and providing a visualization function for the convenience of identifying similarities with the inputted event. .
시각화 기능은 유사 사건 탐색을 위해 추출했던 주요 특징 정보들을 탐색 결과에서 하이라이팅하거나, 웹브라우저 또는 VR로 제공할 수 있다.The visualization function can highlight the main characteristic information extracted for the search for similar events in the search result, or provide it with a web browser or VR.
[부호의 설명][Explanation of code]
10: 후보추출모듈 20: 범죄인물추론모듈10: Candidate extraction module 20: Criminal character inference module
30: 범죄인명분류모듈 40: 지식망구축모듈30: Criminal classification module 40: Knowledge network building module
50: 정보지원모듈50: information support module
100: 범죄인물 지식망 200: 통합 치안정보 데이터뱅크100: criminal person knowledge network 200: integrated security information data bank

Claims (8)

  1. 통합 치안정보 데이터뱅크와 범죄인물 지식망을 포함하는 유사 사건 정보제공시스템에 있어서, 상기 범죄인물 지식망은,In the similar case information providing system comprising an integrated security information data bank and a criminal person knowledge network, the criminal person knowledge network comprises:
    비정형 문서와 정형 데이터에서 범죄용의자를 식별하여 추출하는 범죄용의자 후보추출모듈;a criminal suspect candidate extraction module for identifying and extracting criminal suspects from unstructured documents and structured data;
    상기 범죄용의자 후보추출모듈로부터 추출된 범죄용의자에 대한 학습을 통해 상기 범죄용의자를 범죄인물로 추론하는 범죄인물추론모듈;a criminal character inference module for inferring the criminal suspect as a criminal through learning of the criminal suspect extracted from the criminal suspect candidate extraction module;
    상기 범죄인물추론모듈로부터 범죄인물로 추론된 범죄인명과 치안정보 데이터뱅크로부터 추출된 범죄인명을 통합 태깅하여 노드 후보 목록을 작성하는 문서 내 범죄인명분류모듈;a criminal name classification module in the document for creating a node candidate list by integrating the criminal name inferred from the criminal person inference module and the criminal name extracted from the security information data bank;
    상기 범죄인명분류모듈로부터 추출된 범죄인명과 치안정보 데이터뱅크로부터 추출된 연관인명들로 인명 노드를 생성하고, 상기 인물들의 과거 범죄기록 정보와 유사 사건과의 연관성 정보를 통해 사건 내용을 재분석하고 재구성하여 범죄인물 지식망을 구축하는 범죄인물 지식망구축모듈 및Create a human node with the names of criminals extracted from the criminal name classification module and related names extracted from the security information data bank, and re-analyze and reconstruct the case contents through the past criminal record information of the persons and the information related to similar cases. A criminal person knowledge network building module and
    상기 범죄인물 지식망 정보를 사용자에게 지원하는 정보지원모듈을 포함하여,Including an information support module that supports the criminal person knowledge network information to the user,
    인물과 사건의 주요 특징 정보를 조합하여 유사한 사례를 탐색하고 유사 사건 정보를 제공하는 것을 특징으로 하는 유사 사건 정보제공시스템. A similar event information providing system, characterized in that by combining main characteristic information of a person and an event, similar cases are searched for and similar event information is provided.
  2. 제1항의 유사 사건 정보제공시스템을 이용한 유사 사건 정보제공 서비스 방법에 있어서,In the similar event information providing service method using the similar event information providing system of claim 1,
    현재 수사 중인 사건 관련 정보를 입력하는 단계;inputting information related to the case currently under investigation;
    범죄인물 지식망에서 사건과 인물을 중심으로 분석하여 주요 특징을 도출하는 단계;deriving main characteristics by analyzing cases and people in the criminal person knowledge network;
    도출된 주요 특징을 활용하여 통합 치안정보 데이터 뱅크에서 유사 사건을 탐색하는 단계 및 Using the derived main characteristics to search for similar incidents in the integrated security information data bank and
    사용자에게 유사 사건 관련 정보를 제공하는 단계를 포함하는 것을 특징으로 하는 유사 사건 정보제공 서비스 방법.A similar event information providing service method comprising the step of providing similar event related information to a user.
  3. 제2항에 있어서,3. The method of claim 2,
    사건을 중심으로 주요 특징을 도출하는 단계는,The step of deriving the main characteristics based on the event is,
    입력받은 정보에 대하여 자연어처리 분석을 수행하는 단계;performing natural language processing analysis on the received information;
    사건과 관련된 주요 키워드를 추출하는 단계 및 extracting key keywords related to the incident; and
    개체명 인식과 태깅을 수행하는 단계를 포함하는 것을 특징으로 하는 유사 사건 정보제공 서비스 방법.A similar event information providing service method comprising the step of performing entity name recognition and tagging.
  4. 제2항에 있어서,3. The method of claim 2,
    인물을 중심으로 주요 특징을 도출하는 단계는, The step of deriving the main characteristics centering on the character is
    입력받은 정보에 대하여 자연어처리 분석을 수행하는 단계;performing natural language processing analysis on the received information;
    사건과 관련된 인명 후보를 추출하는 단계 및 extracting human candidates related to the case; and
    인명에 대한 문서 내 지위를 분류하여 태깅을 수행하는 단계를 포함하는 것을 특징으로 하는 유사 사건 정보제공 서비스 방법.A similar event information providing service method comprising the step of performing tagging by classifying the status of the person in the document.
  5. 제2항에 있어서,3. The method of claim 2,
    유사 사건을 탐색하는 단계는, The steps to search for similar events are:
    사건과 인물 중심 주요 특징 및 정보를 조합하는 단계;combining event- and person-oriented key features and information;
    용의자를 포함한 주요 인물의 과거범죄기록 검색하는 단계; retrieving past criminal records of major persons including the suspect;
    검색 결과와 치안정보 데이터뱅크에서 입력받은 사건과 유사한 사건을 탐색하는 단계 및 Searching for a case similar to the case input from the search results and the security information data bank; and
    탐색 결과를 유사 사건 정보 목록에 저장하는 단계를 포함하는 것을 특징으로 하는 유사 사건 정보제공 서비스 방법.A similar event information providing service method comprising the step of storing the search result in a similar event information list.
  6. 제4항에 있어서,5. The method of claim 4,
    유사 사건 검색은 TF-IDF 유사도 분석 알고리즘을 이용하는 것을 특징으로 하는 유사 사건 정보제공 서비스 방법.A similar event information providing service method, characterized in that the similar event search uses a TF-IDF similarity analysis algorithm.
  7. 제2항에 있어서,3. The method of claim 2,
    범죄인물 지식망에서 입력받은 사건과 관련한 추가적인 사건과 인물 정보를 획득하는 단계; obtaining additional case and person information related to the case input from the criminal person knowledge network;
    추가적인 정보를 추가하여 통합 치안정보 데이터뱅크에서 유사 사건 재탐색하는 단계 및 Re-searching for similar incidents in the integrated security information data bank by adding additional information; and
    추가적으로 확인된 정보를 유사 사건 정보 목록에 추가하는 단계를 포함하는 유사 사건 확장 탐색 단계를 더 포함하는 것을 특징으로 하는 유사 사건 정보제공 서비스 방법.Similar event information providing service method, characterized in that it further comprises a similar event expansion search step comprising the step of adding the additionally confirmed information to the similar event information list.
  8. 제2항에 있어서,3. The method of claim 2,
    유사 사건 관련 정보를 제공하는 단계는, The steps of providing information related to similar events are:
    사용자가 입력한 사건 정보를 기반으로 탐색한 유사 사건 정보 목록을 제공하는 단계 및 providing a list of similar incident information searched based on the incident information entered by the user; and
    입력한 사건과의 유사점 파악의 편의성을 위한 시각화 기능을 제공하는 단계를 포함하는 것을 특징으로 하는 유사 사건 정보제공 서비스 방법.A similar event information providing service method comprising the step of providing a visualization function for the convenience of identifying similarities with the inputted event.
PCT/KR2021/009858 2020-10-29 2021-07-29 System for providing similar case information, and method therefor WO2022092497A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR20200142424 2020-10-29
KR10-2020-0142424 2020-10-29

Publications (1)

Publication Number Publication Date
WO2022092497A1 true WO2022092497A1 (en) 2022-05-05

Family

ID=81382838

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2021/009858 WO2022092497A1 (en) 2020-10-29 2021-07-29 System for providing similar case information, and method therefor

Country Status (1)

Country Link
WO (1) WO2022092497A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117391877A (en) * 2023-12-07 2024-01-12 武汉大千信息技术有限公司 Method for quickly generating suspicious personnel relationship network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20150020428A (en) * 2013-08-14 2015-02-26 한국과학기술연구원 Apparatus for collecting contents using social relation character and method thereof
KR20160123101A (en) * 2015-04-15 2016-10-25 (주)엔텔스 Method and system for classifying types of specific criminal offender
KR20200067654A (en) * 2018-12-04 2020-06-12 한국전자통신연구원 Missing accident first response system and method for operating thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20150020428A (en) * 2013-08-14 2015-02-26 한국과학기술연구원 Apparatus for collecting contents using social relation character and method thereof
KR20160123101A (en) * 2015-04-15 2016-10-25 (주)엔텔스 Method and system for classifying types of specific criminal offender
KR20200067654A (en) * 2018-12-04 2020-06-12 한국전자통신연구원 Missing accident first response system and method for operating thereof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHUNG, TAE JIN: "Countermeasure strategy for the international crime and terrorism by use of SNA and Big data analysis", CONVERGENCE SECURITY JOURNAL, vol. 16, no. 2, 30 March 2016 (2016-03-30), pages 25 - 34, XP055925994, ISSN: 1598-7329 *
LEE, SEONGYONG: "Weekly ICT Trends. IITP. Issue 1902", WEEKLY ICT TRENDS. IITP, no. 1902, 26 June 2019 (2019-06-26), Korea , pages 1 - 44, XP009536540, ISSN: 1225-6447 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117391877A (en) * 2023-12-07 2024-01-12 武汉大千信息技术有限公司 Method for quickly generating suspicious personnel relationship network

Similar Documents

Publication Publication Date Title
WO2018036239A1 (en) Method, apparatus and system for monitoring internet media events based on industry knowledge mapping database
CN110337645A (en) The processing component that can be adapted to
Ghahremanlou et al. Geotagging twitter messages in crisis management
Kruspe et al. Detection of actionable tweets in crisis events
KR20210075511A (en) Method and Apparatus for Recommending Disaster Response
CN110046280A (en) A kind of multistation monitor video semantic retrieval system towards sampling observation
CN104834739B (en) Internet information storage system
CN111723256A (en) Government affair user portrait construction method and system based on information resource library
CN110321544A (en) Method and apparatus for generating information
WO2022092497A1 (en) System for providing similar case information, and method therefor
WO2012046906A1 (en) Device and method for providing resource search information on marked correlations between research subjects using a knowledge base from a combination of multiple resources
CN111858924A (en) System with network public opinion monitoring and analyzing functions
WO2011109195A1 (en) System and associated method for determining and applying sociocultural characteristics
WO2020111827A1 (en) Automatic profile generation server and method
CN113015171A (en) System with network public opinion monitoring and analyzing functions
Ruch Can x2vec save lives? integrating graph and language embeddings for automatic mental health classification
Diaz et al. Classifying Twitter Users for Disaster Response: A Highly Multimodal or Simple Approach?
Schneider et al. Curation technologies for the construction and utilisation of legal knowledge graphs
CN113742496B (en) Electric power knowledge learning system and method based on heterogeneous resource fusion
Yang et al. Mining open source text documents for intelligence gathering
WO2021107446A1 (en) Apparatus and method for providing knowledge graph-based marketing analysis chatbot service
US20210264113A1 (en) Automatically extending a domain taxonomy to the level of granularity present in glossaries in documents
Trujillo et al. Design of emergency call record support system applying natural language processing techniques
Diallo et al. Process of building a vocabulary for the infection domain
KR20200108937A (en) System for determining fake news, method for determining fake news, and computer-readable medium having a program recorded therein for executing the same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21886496

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21886496

Country of ref document: EP

Kind code of ref document: A1