CN102214395B - Road traffic flow monitoring method considering privacy protection - Google Patents
Road traffic flow monitoring method considering privacy protection Download PDFInfo
- Publication number
- CN102214395B CN102214395B CN201110126396.0A CN201110126396A CN102214395B CN 102214395 B CN102214395 B CN 102214395B CN 201110126396 A CN201110126396 A CN 201110126396A CN 102214395 B CN102214395 B CN 102214395B
- Authority
- CN
- China
- Prior art keywords
- base station
- traffic flow
- mobile phone
- data
- vtl
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The invention belongs to the technical field of urban traffic management and relates to a road traffic flow monitoring method considering privacy protection. The method provided by the invention comprises the following steps of: plotting mobile communication base stations on a map according to coordinate information of the mobile communication base stations; dividing the map into a plurality of polygons surrounding a GSM (Global System for Mobile Communication) base station, wherein distances from points of the edges of the polygons to the peripheral base stations are the same; drawing line segments which are vertical to the roads on intersection points of the polygons and the roads on the map and marking the line segments as virtual traveling lines (VTL), wherein a VTL pair is formed by adjacent two virtual travelling lines; carrying out information screening on the cell phone communication data and encrypting the reversed cell phone numbers or international mobile subscriber identification number (IMSI); and calculating the observing data between each VTL pair to monitor the traffic flow. The road traffic flow monitoring method considering privacy protection provided by the invention can protect the privacy data of a user and obtain the effective information from the data so that the mobile information data can be used for carrying out traffic flow monitoring.
Description
Technical field
The invention belongs to the urban traffic control technical field, relate to a kind of traffic flow monitoring method.
Background technology
In recent years, along with China's economy constantly develops, the continuous quickening of Urbanization in China, the urban transportation congestion problems is serious day by day and general, and the city people's social production and social life has been produced deep effect.At first, in the traffic congestion process, great amount of fuel oil has been wasted, and has caused serious economy loss; Secondly, waste a large amount of time of people, caused very big loss.Simultaneously, when accident took place, traffic congestion issues greatly reduced emergency reaction speed, had caused the many unnecessary economic assets or even the loss of people's life.Therefore, road traffic flow is monitored and early warning,, just seem very necessary for the public and relevant departments such as emergent provide the road real-time information.A large amount of monitor and control facilitys is installed on road is undoubtedly way the most effectively, but the economy input that needs is very huge.How to utilize existing infrastructure to finish this extremely urgent task? in the middle of the very high city of mobile phone popularity rate, a large amount of mobile message data provide a crucial approach for we solve this difficult problem.
In the process of handling the mobile message data, how to protect user's private data and the effective information that gets access in the data is exactly the work that the present invention finishes.
Summary of the invention
The objective of the invention is, propose a kind ofly to have considered utilizing the mobile message data to carry out in the traffic flow monitoring, can and get access to the method for the effective information in the data at protection user's private data.For this reason, the present invention adopts following technical scheme.
A kind of road traffic flow monitoring method of considering secret protection, this method utilize the mobile communication data to realize the traffic flow monitoring, comprise step:
1) according to the coordinate information of mobile communication base station, on map, marks and draws the mobile communication base station;
2) around the mobile communication base station, map is divided into many polygons, guarantees that the point on the polygonal limit equates to the peripheral base station distance;
3) the intersection point place of the road on polygon and map makes the line segment perpendicular to road, is labeled as fictitious tour line VTL, and it is right that two adjacent fictitious tour lines constitute a VTL;
4) the mobile phone communication data is carried out information sifting, the information of reservation comprises: comprise phone number or international mobile subscriber identity IMSI, and comprise the information of mobile phone and each base station communication;
5) phone number or the international mobile subscriber identity IMSI that is kept carried out encryption;
6) statistics each VTL between observation data, realize the traffic flow monitoring.
As preferred implementation, the information of mobile phone and each base station communication comprises mobile phone place base station IDs in the step 4), base station IDs on the mobile phone place, and the next base station IDs that mobile phone will move, mobile phone enters the current base station time, and mobile phone leaves the current base station time.
The invention provides a kind of user data fields screening technique; make when utilizing the mobile communication network data to monitor with early warning to traffic flow; do not need to know user's call-information, therefore will contain the field deletion of call-information in the data of obtaining, thus the protection privacy of user.
Description of drawings
Fig. 1 flow chart of data processing block diagram of the present invention.
Embodiment
Mainly contain three partial datas in the data in mobile phone and relate to privacy of user:
1. subscriber phone number (or mobile phone unique identification IMSI)
2. user's circuit of going on a journey because by the user trajectory positional information, can disclose the user and be which responsive place, and then is judged user's privacy informations such as medical conditions, political orientation and love affair
3. user's communication information, call-information comprise the user when to which number call how long, and then can judge privacy information between user and the dialing numbers
At these 3 kinds of privacy informations, the invention provides and a kind ofly can when utilizing the mobile communication data, can protect the traffic flow monitoring method of cellphone subscriber's privacy.
The present invention at first sets up the fictitious tour route model according to the mobile communication data; main thought is to use fictitious tour line (VTL) that all users' itinerary is cut; and the data in mobile phone that receives carried out statistical study based on VTL pair i; traffic flow is monitored and early warning; thereby make that the private data of unique user is sightless in whole process, protected privacy of user.
Referring to Fig. 1, the key step of method for secret protection of the present invention is that fictitious tour circuit model structure, field filter, field encryption and use fictitious tour circuit model carry out the traffic flow monitoring and warning, and key step is as follows:
1. the fictitious tour circuit model makes up
Mainly may further comprise the steps:
Map is marked and drawed: the GSM base station according to coordinate, is marked and drawed on map;
Map partition: draw polygon around the base station, map is divided into many polygons, guarantee that the point on the capable limit of polygon equates near base station distance.For example, under ideal state, the base station evenly distributes, and it is the regular hexagon at center with the base station that map will be divided into cellular, many; In reality, the base station right and wrong are equally distributed, on map, be linked to be line segment between the adjacent base station, do perpendicular bisector, the intersection point of getting perpendicular bisector is a polygon vertex, map can be divided into many adjacent polygons, guarantee that the point on the capable limit of polygon equates near base station distance.
Mark VTL pair: the intersection point place of the road on polygon and map, work is perpendicular to the line segment of road, be labeled as fictitious tour line (Virtual Trip Line), and be labeled as VTL i (1<=i<=n, n is the quantity of all VTL on the map), two adjacent VTL are VTL pair, promptly VTL is right, be labeled as VTL pair i (1<=i<=m, m are the quantity of all VTL pair on the map)
2. data field screening
Data are input as the raw data of mobile communication network, read raw data, with the data field reservation of needs, relate to the call-information data deletion of privacy of user.The field that needs to keep comprises phone number (or mobile phone unique identification IMSI), mobile phone place base station IDs, base station IDs on the mobile phone place, the next base station IDs that mobile phone will move, mobile phone enters the current base station time, and mobile phone leaves fields such as current base station time.Need the field of deletion comprise mobile phone dial number, mobile phone dial call off time beginning, mobile phone is dialled fields such as crying the concluding time, these fields relate to privacy of user, and little to traffic flow monitoring and forewarning function.
3. field encryption
To the data that screen, the data field that will be referred to privacy of user is encrypted, the protection privacy of user.For example, for phone number (or mobile phone unique identification IMSI, be called international mobile subscriber identity) field, this field is encrypted, being about to this field mappings is the unduplicated mobile phone ID of a picked at random, then this field is not relate to privacy of user for data processing and analysis and research personnel.For example, 1000 mobile phones are arranged, phone number (or mobile phone unique identification IMSI) is mapped to an integer between the 1-10000, that be not used immediately, and with these 1000 corresponding relation records.Run into duplicate numbers and can be mapped to respective integer according to the corresponding relation of record.Simultaneously, the field encryption process is to finish at mobile service provider's server place, is physically-isolated for other people, need not worry that other people obtain changing the corresponding relation record, invades privacy of user.
4. use the fictitious tour circuit model to carry out the traffic flow monitoring and warning
All users of statistics between VTL pair i traffic data (passage rate, transit time) uses statistical methods such as linear regression, logistic regression and maximum likelihood estimation to carry out statistical learning, and then traffic flow is monitored and early warning.
Because with the cutting of all users' itinerary, and the data between the statistics VTL pair i draw a statistical indicator, and then make that all users' complete itinerary information is invisible, thus the protection privacy of user.
Three following tables are the general data format chart through obtaining after the data processing of secret protection.
Table 1 table 2
Table 3
Fictitious tour line field in the following his-and-hers watches 3 describes:
ID: the unique identification of fictitious tour circuit (VTL);
Starting point x: fictitious tour circuit (VTL) is a line segment, and x is the x coordinate on a summit of this line segment;
Starting point y: fictitious tour circuit (VTL) is a line segment, and x is the y coordinate on a summit of this line segment;
Terminal point x: fictitious tour circuit (VTL) is a line segment, and x is the x coordinate on the another one summit of this line segment;
Terminal point y: fictitious tour circuit (VTL) is a line segment, and x is the y coordinate on the another one summit of this line segment;
Adjacent base station ID1: the ID of a base station in adjacent two base stations of fictitious tour circuit (VTL);
Adjacent base station ID2: the ID of another one base station in adjacent two base stations of fictitious tour circuit (VTL).
Claims (2)
1. road traffic flow monitoring method of considering secret protection, this method utilize the mobile communication data to realize the traffic flow monitoring, comprise step:
1) according to the coordinate information of mobile communication base station, on map, marks and draws the mobile communication base station;
2) around the mobile communication base station, map is divided into many polygons, guarantees that the point on the polygonal limit equates to the peripheral base station distance;
3) the intersection point place of the road on polygon and map makes the line segment perpendicular to road, is labeled as fictitious tour line VTL, and it is right that two adjacent fictitious tour lines constitute a VTL;
4) the mobile phone communication data is carried out information sifting, the information of reservation comprises: phone number or international mobile subscriber identity IMSI, and the mobile phone information of communicating by letter with each mobile communication base station;
5) phone number or the international mobile subscriber identity IMSI that is kept carried out encryption;
6) statistics each VTL between observation data, realize the traffic flow monitoring.
2. road traffic flow monitoring method according to claim 1, it is characterized in that, the information of mobile phone and each base station communication comprises mobile phone place base station IDs in the step 4), base station IDs on the mobile phone place, the next base station IDs that mobile phone will move, mobile phone enter the current base station time and mobile phone leaves the current base station time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110126396.0A CN102214395B (en) | 2011-05-13 | 2011-05-13 | Road traffic flow monitoring method considering privacy protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110126396.0A CN102214395B (en) | 2011-05-13 | 2011-05-13 | Road traffic flow monitoring method considering privacy protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102214395A CN102214395A (en) | 2011-10-12 |
CN102214395B true CN102214395B (en) | 2013-07-31 |
Family
ID=44745689
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110126396.0A Expired - Fee Related CN102214395B (en) | 2011-05-13 | 2011-05-13 | Road traffic flow monitoring method considering privacy protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102214395B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105355045A (en) * | 2015-10-29 | 2016-02-24 | 浪潮集团有限公司 | Method and device for assisting in determining driver identity |
WO2019215982A1 (en) * | 2018-05-07 | 2019-11-14 | ソニー株式会社 | Communication terminal, sensing device, and server |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2369709B (en) * | 2000-11-30 | 2004-08-04 | Nec Technologies | System and method for measuring traffic flow |
AU2006262311B2 (en) * | 2005-06-23 | 2011-06-23 | Airsage, Inc. | Method and system for using cellular data for transportation planning and engineering |
CN101334465A (en) * | 2007-06-28 | 2008-12-31 | 陈茂荣 | Mobile article positioning system and its carrier unit |
CN101510357B (en) * | 2009-03-26 | 2011-05-11 | 美慧信息科技(上海)有限公司 | Method for detecting traffic state based on mobile phone signal data |
CN101996486A (en) * | 2009-08-31 | 2011-03-30 | 西门子(中国)有限公司 | Method, system and device for acquiring traffic information |
-
2011
- 2011-05-13 CN CN201110126396.0A patent/CN102214395B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN102214395A (en) | 2011-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105488120B (en) | Population spatial distribution and large passenger flow method for early warning are acquired in real time based on mobile phone big data | |
CN105243128B (en) | A kind of user behavior method of trajectory clustering based on data of registering | |
Caceres et al. | Deriving origin–destination data from a mobile phone network | |
CN1901725B (en) | Statistic system and method for crowd short-term density | |
CN102097004B (en) | Mobile phone positioning data-based traveling origin-destination (OD) matrix acquisition method | |
CN202306831U (en) | Road condition issuing system | |
CN102752367B (en) | Global automobile wisdom perception and unified identification system based on group identification (GID) | |
CN105741486B (en) | Urban Public Space based on mobile phone location data tramples accident real time early warning method | |
CN103281672A (en) | Method for protecting position privacy by mobile terminals | |
CN104732756A (en) | Method for conducting public transportation planning by utilizing mobile communication data mining | |
CN104751536A (en) | Bus station optimization evaluation method and system | |
CN104750751A (en) | Method and device for annotating trace data | |
CN109885636B (en) | User portrait drawing method and server | |
CN102281498A (en) | Mining method for user commuting OD (Origin-Destination) in mobile phone call data | |
CN107578350A (en) | A kind of intelligent tourism system based on big data Joint construction and sharing | |
CN104462193A (en) | Vehicle movement trajectory searching system and method based on time-space matching | |
CN106504524B (en) | A method of express highway section is divided based on mobile signaling protocol dynamic | |
Sierpiński et al. | Use of GSM Technology as the Support to Manage the Modal Distribution in the Cities | |
CN103906086B (en) | A kind of personnel based on mobile network flow to monitoring method and device | |
Zin et al. | Estimation of originating-destination trips in Yangon by using big data source | |
CN110910293A (en) | Subway crowd behavior tag identification method based on base station position | |
CN102214395B (en) | Road traffic flow monitoring method considering privacy protection | |
Yuan et al. | Recognition of functional areas based on call detail records and point of interest data | |
CN108882152A (en) | A kind of privacy of user guard method reported based on Path selection | |
CN110958571A (en) | Population subdivision method based on mobile signaling data under condition of difference compensation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20130731 Termination date: 20210513 |