CN102214395B - Road traffic flow monitoring method considering privacy protection - Google Patents

Road traffic flow monitoring method considering privacy protection Download PDF

Info

Publication number
CN102214395B
CN102214395B CN201110126396.0A CN201110126396A CN102214395B CN 102214395 B CN102214395 B CN 102214395B CN 201110126396 A CN201110126396 A CN 201110126396A CN 102214395 B CN102214395 B CN 102214395B
Authority
CN
China
Prior art keywords
base station
traffic flow
mobile phone
data
vtl
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110126396.0A
Other languages
Chinese (zh)
Other versions
CN102214395A (en
Inventor
王文俊
及东辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201110126396.0A priority Critical patent/CN102214395B/en
Publication of CN102214395A publication Critical patent/CN102214395A/en
Application granted granted Critical
Publication of CN102214395B publication Critical patent/CN102214395B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention belongs to the technical field of urban traffic management and relates to a road traffic flow monitoring method considering privacy protection. The method provided by the invention comprises the following steps of: plotting mobile communication base stations on a map according to coordinate information of the mobile communication base stations; dividing the map into a plurality of polygons surrounding a GSM (Global System for Mobile Communication) base station, wherein distances from points of the edges of the polygons to the peripheral base stations are the same; drawing line segments which are vertical to the roads on intersection points of the polygons and the roads on the map and marking the line segments as virtual traveling lines (VTL), wherein a VTL pair is formed by adjacent two virtual travelling lines; carrying out information screening on the cell phone communication data and encrypting the reversed cell phone numbers or international mobile subscriber identification number (IMSI); and calculating the observing data between each VTL pair to monitor the traffic flow. The road traffic flow monitoring method considering privacy protection provided by the invention can protect the privacy data of a user and obtain the effective information from the data so that the mobile information data can be used for carrying out traffic flow monitoring.

Description

A kind of road traffic flow monitoring method of considering secret protection
Technical field
The invention belongs to the urban traffic control technical field, relate to a kind of traffic flow monitoring method.
Background technology
In recent years, along with China's economy constantly develops, the continuous quickening of Urbanization in China, the urban transportation congestion problems is serious day by day and general, and the city people's social production and social life has been produced deep effect.At first, in the traffic congestion process, great amount of fuel oil has been wasted, and has caused serious economy loss; Secondly, waste a large amount of time of people, caused very big loss.Simultaneously, when accident took place, traffic congestion issues greatly reduced emergency reaction speed, had caused the many unnecessary economic assets or even the loss of people's life.Therefore, road traffic flow is monitored and early warning,, just seem very necessary for the public and relevant departments such as emergent provide the road real-time information.A large amount of monitor and control facilitys is installed on road is undoubtedly way the most effectively, but the economy input that needs is very huge.How to utilize existing infrastructure to finish this extremely urgent task? in the middle of the very high city of mobile phone popularity rate, a large amount of mobile message data provide a crucial approach for we solve this difficult problem.
In the process of handling the mobile message data, how to protect user's private data and the effective information that gets access in the data is exactly the work that the present invention finishes.
Summary of the invention
The objective of the invention is, propose a kind ofly to have considered utilizing the mobile message data to carry out in the traffic flow monitoring, can and get access to the method for the effective information in the data at protection user's private data.For this reason, the present invention adopts following technical scheme.
A kind of road traffic flow monitoring method of considering secret protection, this method utilize the mobile communication data to realize the traffic flow monitoring, comprise step:
1) according to the coordinate information of mobile communication base station, on map, marks and draws the mobile communication base station;
2) around the mobile communication base station, map is divided into many polygons, guarantees that the point on the polygonal limit equates to the peripheral base station distance;
3) the intersection point place of the road on polygon and map makes the line segment perpendicular to road, is labeled as fictitious tour line VTL, and it is right that two adjacent fictitious tour lines constitute a VTL;
4) the mobile phone communication data is carried out information sifting, the information of reservation comprises: comprise phone number or international mobile subscriber identity IMSI, and comprise the information of mobile phone and each base station communication;
5) phone number or the international mobile subscriber identity IMSI that is kept carried out encryption;
6) statistics each VTL between observation data, realize the traffic flow monitoring.
As preferred implementation, the information of mobile phone and each base station communication comprises mobile phone place base station IDs in the step 4), base station IDs on the mobile phone place, and the next base station IDs that mobile phone will move, mobile phone enters the current base station time, and mobile phone leaves the current base station time.
The invention provides a kind of user data fields screening technique; make when utilizing the mobile communication network data to monitor with early warning to traffic flow; do not need to know user's call-information, therefore will contain the field deletion of call-information in the data of obtaining, thus the protection privacy of user.
Description of drawings
Fig. 1 flow chart of data processing block diagram of the present invention.
Embodiment
Mainly contain three partial datas in the data in mobile phone and relate to privacy of user:
1. subscriber phone number (or mobile phone unique identification IMSI)
2. user's circuit of going on a journey because by the user trajectory positional information, can disclose the user and be which responsive place, and then is judged user's privacy informations such as medical conditions, political orientation and love affair
3. user's communication information, call-information comprise the user when to which number call how long, and then can judge privacy information between user and the dialing numbers
At these 3 kinds of privacy informations, the invention provides and a kind ofly can when utilizing the mobile communication data, can protect the traffic flow monitoring method of cellphone subscriber's privacy.
The present invention at first sets up the fictitious tour route model according to the mobile communication data; main thought is to use fictitious tour line (VTL) that all users' itinerary is cut; and the data in mobile phone that receives carried out statistical study based on VTL pair i; traffic flow is monitored and early warning; thereby make that the private data of unique user is sightless in whole process, protected privacy of user.
Referring to Fig. 1, the key step of method for secret protection of the present invention is that fictitious tour circuit model structure, field filter, field encryption and use fictitious tour circuit model carry out the traffic flow monitoring and warning, and key step is as follows:
1. the fictitious tour circuit model makes up
Mainly may further comprise the steps:
Map is marked and drawed: the GSM base station according to coordinate, is marked and drawed on map;
Map partition: draw polygon around the base station, map is divided into many polygons, guarantee that the point on the capable limit of polygon equates near base station distance.For example, under ideal state, the base station evenly distributes, and it is the regular hexagon at center with the base station that map will be divided into cellular, many; In reality, the base station right and wrong are equally distributed, on map, be linked to be line segment between the adjacent base station, do perpendicular bisector, the intersection point of getting perpendicular bisector is a polygon vertex, map can be divided into many adjacent polygons, guarantee that the point on the capable limit of polygon equates near base station distance.
Mark VTL pair: the intersection point place of the road on polygon and map, work is perpendicular to the line segment of road, be labeled as fictitious tour line (Virtual Trip Line), and be labeled as VTL i (1<=i<=n, n is the quantity of all VTL on the map), two adjacent VTL are VTL pair, promptly VTL is right, be labeled as VTL pair i (1<=i<=m, m are the quantity of all VTL pair on the map)
2. data field screening
Data are input as the raw data of mobile communication network, read raw data, with the data field reservation of needs, relate to the call-information data deletion of privacy of user.The field that needs to keep comprises phone number (or mobile phone unique identification IMSI), mobile phone place base station IDs, base station IDs on the mobile phone place, the next base station IDs that mobile phone will move, mobile phone enters the current base station time, and mobile phone leaves fields such as current base station time.Need the field of deletion comprise mobile phone dial number, mobile phone dial call off time beginning, mobile phone is dialled fields such as crying the concluding time, these fields relate to privacy of user, and little to traffic flow monitoring and forewarning function.
3. field encryption
To the data that screen, the data field that will be referred to privacy of user is encrypted, the protection privacy of user.For example, for phone number (or mobile phone unique identification IMSI, be called international mobile subscriber identity) field, this field is encrypted, being about to this field mappings is the unduplicated mobile phone ID of a picked at random, then this field is not relate to privacy of user for data processing and analysis and research personnel.For example, 1000 mobile phones are arranged, phone number (or mobile phone unique identification IMSI) is mapped to an integer between the 1-10000, that be not used immediately, and with these 1000 corresponding relation records.Run into duplicate numbers and can be mapped to respective integer according to the corresponding relation of record.Simultaneously, the field encryption process is to finish at mobile service provider's server place, is physically-isolated for other people, need not worry that other people obtain changing the corresponding relation record, invades privacy of user.
4. use the fictitious tour circuit model to carry out the traffic flow monitoring and warning
All users of statistics between VTL pair i traffic data (passage rate, transit time) uses statistical methods such as linear regression, logistic regression and maximum likelihood estimation to carry out statistical learning, and then traffic flow is monitored and early warning.
Because with the cutting of all users' itinerary, and the data between the statistics VTL pair i draw a statistical indicator, and then make that all users' complete itinerary information is invisible, thus the protection privacy of user.
Three following tables are the general data format chart through obtaining after the data processing of secret protection.
Figure BDA0000061160110000031
Table 1 table 2
Figure BDA0000061160110000032
Table 3
Fictitious tour line field in the following his-and-hers watches 3 describes:
ID: the unique identification of fictitious tour circuit (VTL);
Starting point x: fictitious tour circuit (VTL) is a line segment, and x is the x coordinate on a summit of this line segment;
Starting point y: fictitious tour circuit (VTL) is a line segment, and x is the y coordinate on a summit of this line segment;
Terminal point x: fictitious tour circuit (VTL) is a line segment, and x is the x coordinate on the another one summit of this line segment;
Terminal point y: fictitious tour circuit (VTL) is a line segment, and x is the y coordinate on the another one summit of this line segment;
Adjacent base station ID1: the ID of a base station in adjacent two base stations of fictitious tour circuit (VTL);
Adjacent base station ID2: the ID of another one base station in adjacent two base stations of fictitious tour circuit (VTL).

Claims (2)

1. road traffic flow monitoring method of considering secret protection, this method utilize the mobile communication data to realize the traffic flow monitoring, comprise step:
1) according to the coordinate information of mobile communication base station, on map, marks and draws the mobile communication base station;
2) around the mobile communication base station, map is divided into many polygons, guarantees that the point on the polygonal limit equates to the peripheral base station distance;
3) the intersection point place of the road on polygon and map makes the line segment perpendicular to road, is labeled as fictitious tour line VTL, and it is right that two adjacent fictitious tour lines constitute a VTL;
4) the mobile phone communication data is carried out information sifting, the information of reservation comprises: phone number or international mobile subscriber identity IMSI, and the mobile phone information of communicating by letter with each mobile communication base station;
5) phone number or the international mobile subscriber identity IMSI that is kept carried out encryption;
6) statistics each VTL between observation data, realize the traffic flow monitoring.
2. road traffic flow monitoring method according to claim 1, it is characterized in that, the information of mobile phone and each base station communication comprises mobile phone place base station IDs in the step 4), base station IDs on the mobile phone place, the next base station IDs that mobile phone will move, mobile phone enter the current base station time and mobile phone leaves the current base station time.
CN201110126396.0A 2011-05-13 2011-05-13 Road traffic flow monitoring method considering privacy protection Expired - Fee Related CN102214395B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110126396.0A CN102214395B (en) 2011-05-13 2011-05-13 Road traffic flow monitoring method considering privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110126396.0A CN102214395B (en) 2011-05-13 2011-05-13 Road traffic flow monitoring method considering privacy protection

Publications (2)

Publication Number Publication Date
CN102214395A CN102214395A (en) 2011-10-12
CN102214395B true CN102214395B (en) 2013-07-31

Family

ID=44745689

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110126396.0A Expired - Fee Related CN102214395B (en) 2011-05-13 2011-05-13 Road traffic flow monitoring method considering privacy protection

Country Status (1)

Country Link
CN (1) CN102214395B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105355045A (en) * 2015-10-29 2016-02-24 浪潮集团有限公司 Method and device for assisting in determining driver identity
WO2019215982A1 (en) * 2018-05-07 2019-11-14 ソニー株式会社 Communication terminal, sensing device, and server

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2369709B (en) * 2000-11-30 2004-08-04 Nec Technologies System and method for measuring traffic flow
AU2006262311B2 (en) * 2005-06-23 2011-06-23 Airsage, Inc. Method and system for using cellular data for transportation planning and engineering
CN101334465A (en) * 2007-06-28 2008-12-31 陈茂荣 Mobile article positioning system and its carrier unit
CN101510357B (en) * 2009-03-26 2011-05-11 美慧信息科技(上海)有限公司 Method for detecting traffic state based on mobile phone signal data
CN101996486A (en) * 2009-08-31 2011-03-30 西门子(中国)有限公司 Method, system and device for acquiring traffic information

Also Published As

Publication number Publication date
CN102214395A (en) 2011-10-12

Similar Documents

Publication Publication Date Title
CN105488120B (en) Population spatial distribution and large passenger flow method for early warning are acquired in real time based on mobile phone big data
CN105243128B (en) A kind of user behavior method of trajectory clustering based on data of registering
Caceres et al. Deriving origin–destination data from a mobile phone network
CN1901725B (en) Statistic system and method for crowd short-term density
CN102097004B (en) Mobile phone positioning data-based traveling origin-destination (OD) matrix acquisition method
CN202306831U (en) Road condition issuing system
CN102752367B (en) Global automobile wisdom perception and unified identification system based on group identification (GID)
CN105741486B (en) Urban Public Space based on mobile phone location data tramples accident real time early warning method
CN103281672A (en) Method for protecting position privacy by mobile terminals
CN104732756A (en) Method for conducting public transportation planning by utilizing mobile communication data mining
CN104751536A (en) Bus station optimization evaluation method and system
CN104750751A (en) Method and device for annotating trace data
CN109885636B (en) User portrait drawing method and server
CN102281498A (en) Mining method for user commuting OD (Origin-Destination) in mobile phone call data
CN107578350A (en) A kind of intelligent tourism system based on big data Joint construction and sharing
CN104462193A (en) Vehicle movement trajectory searching system and method based on time-space matching
CN106504524B (en) A method of express highway section is divided based on mobile signaling protocol dynamic
Sierpiński et al. Use of GSM Technology as the Support to Manage the Modal Distribution in the Cities
CN103906086B (en) A kind of personnel based on mobile network flow to monitoring method and device
Zin et al. Estimation of originating-destination trips in Yangon by using big data source
CN110910293A (en) Subway crowd behavior tag identification method based on base station position
CN102214395B (en) Road traffic flow monitoring method considering privacy protection
Yuan et al. Recognition of functional areas based on call detail records and point of interest data
CN108882152A (en) A kind of privacy of user guard method reported based on Path selection
CN110958571A (en) Population subdivision method based on mobile signaling data under condition of difference compensation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130731

Termination date: 20210513