CN106056867A - Monitoring method and apparatus - Google Patents
Monitoring method and apparatus Download PDFInfo
- Publication number
- CN106056867A CN106056867A CN201610505929.9A CN201610505929A CN106056867A CN 106056867 A CN106056867 A CN 106056867A CN 201610505929 A CN201610505929 A CN 201610505929A CN 106056867 A CN106056867 A CN 106056867A
- Authority
- CN
- China
- Prior art keywords
- information
- user
- mobile terminal
- action trail
- trail information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
- G08B21/22—Status alarms responsive to presence or absence of persons
Abstract
The invention, which relates to the technical field of information, discloses a monitoring method and apparatus, so that the searching efficiency for the particular group is improved and the security monitoring efficiency is enhanced. The method comprises: position information of all network connecting devices detecting identifier information of a mobile terminal is obtained and behavior track information corresponding to the mobile terminal is obtained based on the position information; whether the behavior track information meets a preset rule is detected; and if so, warning information is outputted. The method and apparatus are suitable for searching a particular group.
Description
Technical field
The present invention relates to a kind of areas of information technology, particularly relate to a kind of monitoring method and device.
Background technology
Along with developing rapidly of science and technology, monitoring technology is more and more ripe, and monitoring means are more and more abundanter, such as,
Video monitoring, network monitoring, long-range monitoring etc..User can be helped to supervise for some personnel by these monitoring means
Control.
The search of the specific crowd (such as terrorist, drug addict, smuggling personnel etc.) monitored is needed currently for some
Mode is to be searched by manual type.But, carrying out search by manual type can take a substantial amount of time, and influences whether
The searching efficiency of specific crowd, and then security monitoring efficiency can be affected.
Summary of the invention
In view of this, the invention provides a kind of monitoring method and device, main purpose is to improve specific crowd
Searching efficiency, security monitoring efficiency can be improved.
According to one aspect of the invention, it is provided that a kind of monitoring method, the method includes:
Obtain the positional information of each network access device of identification information mobile terminal being detected, and according to institute's rheme
Put the action trail information of the acquisition of information user corresponding with described mobile terminal;
Detect whether described action trail information meets preset rules;
The most then outputting alarm information.
According to another aspect of the invention, it is provided that a kind of supervising device, this device includes:
Acquiring unit, for obtaining the position letter of each network access device of identification information mobile terminal being detected
Breath, and the action trail information of the user corresponding with described mobile terminal is obtained according to described positional information;
Detector unit, whether the action trail information obtained for detecting described acquiring unit meets preset rules;
Output unit, if detecting that described action trail information meets preset rules for described detector unit, then exports
Warning information.
By technique scheme, the technical scheme that the embodiment of the present invention provides at least has the advantage that
A kind of monitoring method and device that the present invention provides, first acquisition detect each of the identification information of mobile terminal
The positional information of network access device, and the behavior rail of the user corresponding with described mobile terminal is obtained according to described positional information
Mark information;Then detect whether described action trail information meets preset rules;The most then outputting alarm information.With the most logical
Crossing manual type search needs the specific crowd of monitoring to compare, and the present invention by detecting the action trail information corresponding with user is
No meet preset rules, it is determined that whether this user is the targeted customer needing monitoring, the most then outputting alarm information, in order to right
This user is monitored, it is possible to achieve automatic searching needs the specific crowd of monitoring, can improve the searching efficiency of specific crowd,
And then security monitoring efficiency can be improved.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of description, and in order to allow above and other objects of the present invention, the feature and advantage can
Become apparent, below especially exemplified by the detailed description of the invention of the present invention.
Accompanying drawing explanation
By reading the detailed description of hereafter preferred implementation, various other advantage and benefit common for this area
Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, and is not considered as the present invention
Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical parts.In the accompanying drawings:
Fig. 1 shows a kind of monitoring method flow schematic diagram that the embodiment of the present invention provides;
Fig. 2 shows the another kind of monitoring method flow schematic diagram that the embodiment of the present invention provides;
Fig. 3 shows a kind of supervising device structural representation that the embodiment of the present invention provides;
Fig. 4 shows the another kind of supervising device structural representation that the embodiment of the present invention provides.
Detailed description of the invention
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although accompanying drawing shows the disclosure
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should be by embodiments set forth here
Limited.On the contrary, it is provided that these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
Embodiments provide a kind of monitoring method, as it is shown in figure 1, described method includes:
101, the positional information of each network access device of identification information mobile terminal being detected is obtained, and according to position
Put the action trail information of the acquisition of information user corresponding with mobile terminal.
Wherein, described action trail information can comprise the route track of User Activity, such as, by way during User Activity
The path locus of the composition such as the place of warp, retention place.Described identification information can be the unique device identity of mobile terminal,
It is specifically as follows MAC (Media Access Control, the hardware address) address of mobile terminal, IMEI (International
Mobile Equipment Identity, mobile device international identity code) number etc..Described network access device can be in advance
If for providing the equipment with unlimited high frequency electrical signal of network connection for mobile terminal in distance range, being specifically as follows
Wifi (Wireless-Fidelity, Wireless Fidelity) equipment harvester.
It should be noted that the use now with mobile terminal is universal, increasing mobile terminal, such as intelligence hands
Machine, intelligent watch, panel computer, electronic reader etc. occupy the highest use frequency in user lives.Generally user
At least one mobile terminal can be had, for the embodiment of the present invention, user can be obtained corresponding by the mobile terminal of user
Action trail information.Specifically, obtain the positional information of each network access device of identification information mobile terminal being detected,
And the action trail information of the user corresponding with mobile terminal is obtained according to positional information.
Such as, user a carries smart mobile phone and on the way walks, and network access device 1, network access device 2 and network are even
Connect the MAC Address that equipment 3 detects that this smart mobile phone is corresponding respectively, obtain the position of these three network access device and carry out even
Line, obtains the motion track of this smart mobile phone, owing to user a carries this smart mobile phone, can be defined as this motion track using
The route track that family a is movable.
102, whether detection action trail information meets preset rules.
Wherein, described preset rules can configure according to the actual requirements.
Such as, preset rules can be that the event trace of user is in outside the default range of activity corresponding with this user,
After getting the action trail information comprising user's a active ways line tracking corresponding to user a, according to this active ways line tracking, can
To determine whether the event trace of user a is in outside the default range of activity corresponding with user a.At the event trace of user a
When the default range of activity corresponding with user a is outer, determine that the action trail information of user a meets preset rules;When user a's
When event trace is in the default range of activity corresponding with user a, determines that the action trail information of user a does not meets and preset rule
Then.
The most such as, preset rules can be user active ways line tracking in there is preset critical place, and presetting
Time period in this active ways line tracking occurs the number of times in this place more than or equal to the frequency threshold value preset.Getting use
After the action trail information of what family a was corresponding comprise user's a active ways line tracking, pre-when the active ways line tracking of user a exists
If crucial place, and this active ways line tracking occurred within the default time period number of times in this place more than or equal to presetting
Frequency threshold value time, determine that the action trail information of user a meets preset rules;When the active ways line tracking of user a is not deposited
In preset critical place, or this active ways line tracking occurring within the default time period, the number of times in this place is secondary less than preset
During number threshold value, determine that the action trail information of user a does not meets preset rules.
If 103 detect that action trail information meets preset rules, outputting alarm information.
Wherein, described warning information can be text alert information, picture warning information, audible alarm information, video announcement
Alarming information etc..
For the embodiment of the present invention, when the action trail information of user meets preset rules, determine that the user is target
User, outputting alarm information, further, in order to this targeted customer is monitored.
Such as, after getting the movable action trail information of user a, it may be determined that user a is from place 1 comes
Carrying out population, whether there is place 2 in detection behavior trace information, wherein, place 1 is the place of a dangerous molecule, ground
Point 2 is a place needing key monitoring.If existing, then from behavior trace information, obtain user in nearest one month
Route track N that a is movable, in detection route track N, whether the occurrence number in place 2 is more than or equal to the number of times threshold being pre-configured with
Value, if occurrence number is more than or equal to frequency threshold value, determines that action trail information movable for user a meets preset rules, explanation
User a often comes place 2 in nearest one month, and this is local, may cause security threat to local 2, and then really
Determining user a is the targeted customer needing to be monitored it, and output carries the warning information of user a mark.
A kind of monitoring method that the present invention provides, first obtains each network of identification information mobile terminal being detected even
Connect the positional information of equipment, and obtain the action trail letter of the user corresponding with described mobile terminal according to described positional information
Breath;Then detect whether described action trail information meets preset rules;The most then outputting alarm information.With pass through people at present
Work mode is searched needs the specific crowd of monitoring to compare, and the present invention is by detecting whether the action trail information corresponding with user accords with
Close preset rules, it is determined that whether this user is the targeted customer needing monitoring, the most then outputting alarm information, in order to this use
Family is monitored, it is possible to achieve automatic searching needs the specific crowd of monitoring, can improve the searching efficiency of specific crowd, and then
Security monitoring efficiency can be improved.
Specifically, another kind of monitoring method is embodiments provided, as in figure 2 it is shown, described method includes:
201, the positional information of each network access device of identification information mobile terminal being detected is obtained, and according to position
Put the action trail information of the acquisition of information user corresponding with mobile terminal.
Wherein, described action trail information comprises the route track information of User Activity, such as, by way during User Activity
The path locus of the composition such as the place of warp, retention place.The concept explanation of described identification information and network access device can
To describe accordingly with reference in step 101, do not repeat them here.
Such as, in gateway, airport, gateway, railway station, the place such as high speed crossing charge station can pre-set network even
Connect equipment, when user takes train to A area, and outlet is come out of from railway station, A area, and the smart mobile phone that this user carries with
When being in network connection open mode, the network access device configured by exit position, railway station, this user can be detected
MAC Address corresponding to smart mobile phone.
It should be noted that the embodiment for detection or collection mobile terminal corresponding device identification information is not limited to
This, it is also possible to collect, in the HTTP request that user is sent by the client of mobile terminal, the equipment mark that this mobile terminal is corresponding
Knowledge information;Can also be when user connect focus wifi by mobile terminal, by the journey being pre-configured with on wifi login page
Sequence collects the equipment identification information that this mobile terminal is corresponding.
Specifically, the described action trail information obtaining the user corresponding with mobile terminal according to positional information can be wrapped
Include: according to described positional information, obtain the motion track information of described mobile terminal;Described motion track information is defined as
The action trail information of the user corresponding with described mobile terminal.
Such as, after the MAC Address that intelligent watch that user b carries is corresponding being detected, obtain from network monitoring server
Take the motion track information of the intelligent watch corresponding with this MAC Address, specifically by the network access device this MAC Address being detected
Position line, the motion track information obtained.Owing to user b can carry with this intelligent watch, can be by this motion track
Information is defined as the route track information that user b is movable.
For the embodiment of the present invention, described acquisition detects each network access device of the identification information of mobile terminal
Before positional information, also include: when there is the corresponding multiple identification information of a mobile terminal, from described mobile terminal being detected
Identification information heterogeneous networks connection equipment in obtain multiple identification informations that described mobile terminal is corresponding respectively;By described shifting
The identification information that in whole identification informations that dynamic terminal is corresponding, repetitive rate is the highest, is defined as the mark corresponding with described mobile terminal
Information.
Such as, for some, there is the mobile terminal of equipment identification information function of safety protection, connected to the network set at it
During a standby wifi connects, multiple MAC Address may be provided to network access device, in the plurality of MAC Address only
There is a MAC Address is the real MAC address of this mobile terminal, and remaining is the MAC Address of stochastic generation, and then can cause nothing
Method identifies the situation of the real MAC address which MAC Address concrete is this mobile terminal.In order to solve the problems referred to above, from inspection
The heterogeneous networks connection equipment of the MAC Address measuring this mobile terminal obtains multiple MAC ground that this mobile terminal is corresponding respectively
Location;By identification information the highest for repetitive rate in whole MAC Address corresponding for this mobile terminal, it is defined as the true of this mobile terminal
MAC Address.When equipment 1 as connected to the network in mobile device carries out wifi connection, this mobile terminal provides MAC Address 1, MAC
Address 2, MAC Address 3, when this mobile device equipment connected to the network 2 carries out wifi connection, this mobile terminal provides MAC ground
Location 4, MAC Address 2, MAC Address 6, MAC Address 2 is the MAC Address that repetitive rate is the highest, MAC Address 2 is defined as this and moves end
The real MAC address of end.
It should be noted that when there is the corresponding multiple identification information of a mobile terminal, by from detecting that this moves
The heterogeneous networks connection equipment of the identification information of terminal obtains multiple identification informations that this mobile terminal is corresponding respectively;And should
The identification information that in whole identification informations that mobile terminal is corresponding, repetitive rate is the highest, is defined as the mark corresponding with this mobile terminal
Information, can improve the acquisition accuracy of the action trail information of user corresponding with this mobile terminal.
Whether 202a, detection action trail information exist preset critical place.
Wherein, described preset critical place can configure according to the actual requirements, and such as, preset critical place can be joined
It is set to some places needing key monitoring.
If 203a action trail information exists preset critical place, then detect action trail letter in preset time period
Breath occurs the number of times in preset critical place whether more than or equal to predetermined times threshold value.
Wherein, described preset time period and described predetermined times threshold value can configure according to the actual requirements, such as,
Predetermined times threshold value be configurable to 5 times, 8 inferior.
If 204a detect in preset time period, behavior trace information occurs the number of times in preset critical place more than or
Equal to predetermined times threshold value, it is determined that action trail information meets preset rules.
Such as, after getting the movable action trail information of user b, it may be determined that user b is from place m comes
Province personnel, this place a is a place that there is terrorist, whether there is preset critical ground in detection behavior trace information
Point, this preset critical place can be that some need the place of key monitoring, if there is the pre-of place n in behavior trace information
If crucial place, then from behavior trace information, obtain route track x movable for user b in nearest two weeks, detection
In this route track x, whether the occurrence number of place n more than or equal to the frequency threshold value being pre-configured with, if occurrence number more than or
Equal to this frequency threshold value, determine that the action trail information of user b meets preset rules, illustrate that user b is in nearest two weeks
This is local often to come place n, local n may be caused security threat, need to be monitored user b.
Step 202b arranged side by side with step 202a, according to action trail information, whether the event trace of detection user is in
Outside the default range of activity corresponding with user.
Wherein, described default range of activity can be set according to the practical situation of user.
If 203b detects that the event trace of user is in outside the default range of activity corresponding with user, it is determined that behavior
Trace information meets preset rules.
Such as, it is smuggler before user c, is released after taking punishment, because there will be the possibility that user c takes up one's old trade again
Property, set the range of activity of correspondence for user c, after getting the movable route track information of user c, according to this route rail
Mark information, whether the event trace of detection user c is in outside the range of activity corresponding with user c, when the activity detecting user c
Track is in outside the range of activity corresponding with user c, as user c has gone to port area, determines the action trail information of user c
Meet preset rules, illustrate that user c has to take up one's old trade again and continue the possibility of smuggling, need user c is monitored.
If 205 action trail information meet preset rules, then outputting alarm information.
Wherein, described warning information can be text alert information, picture warning information, audible alarm information, video announcement
Alarming information etc..
Specifically, described step 205 specifically includes: obtain the ID corresponding with the identification information of described mobile terminal
Information;Output carries the warning information of described user totem information, and wherein user totem information can be the title letter of user
Breath, further, in order to this user is monitored.
Further, described method also includes: by the network access device of configuration in the range of scheduled event, determine pre-
The identification information of the mobile terminal collected in the section of fixing time, wherein, described predetermined amount of time and described default range of activity can
It is set with actual demand, such as, is engraved in a position, place during A an explosion occurred case, in conjunction with the timing length of time bomb,
Predetermined amount of time was configurable in the half an hour before the A moment or 1 hour, and scheduled event scope is configurable to place
Centered by a, radius be 20 meters or the scope of 40 meters;Obtain the position of each network access device described identification information being detected
Information, and the action trail information of the user corresponding with described mobile terminal is obtained according to described positional information;According to described row
For trace information, detect whether described user exists exception;If existing, then outputting alarm information.
Such as, b position, place it is engraved in during B an explosion occurred case, by the half an hour before the B moment, with place b
Centered by, radius be the equipment identification information that the mobile terminal collected in the range of 30 meters is corresponding, determined before the B moment
In half an hour, centered by the b of place, radius be user a movable in the range of 30 meters.By the mobile end that user a is corresponding
The equipment identification information of end, acquires the movable route track information of user a, because user a carried out place b, so this road
Line tracking information exists place b, this route track information occurring in detection two weeks before the B moment, place b's is secondary
Whether number more than or equal to 8 times, if number of times is more than or equal to 8 times, determine that user a exists abnormal, illustrate user a the B moment it
Place b is repeatedly come, it may be possible to the work of setting foot-point carried out to manufacture case of explosion, so user a may in front two weeks
For the suspect of this case of explosion, need user a is monitored, and then outputting alarm information.
The another kind of monitoring method that the present invention provides, first obtains each network of identification information mobile terminal being detected
The positional information of connection equipment, and the action trail letter of the user corresponding with described mobile terminal is obtained according to described positional information
Breath;Then detect whether described action trail information meets preset rules;The most then outputting alarm information.With pass through people at present
Work mode is searched needs the specific crowd of monitoring to compare, and whether the present invention is by detecting the action trail information corresponding with user
Meet preset rules, it is determined that whether this user is the targeted customer needing monitoring, the most then outputting alarm information, in order to this
User is monitored, it is possible to achieve automatic searching needs the specific crowd of monitoring, can improve the searching efficiency of specific crowd, enter
And security monitoring efficiency can be improved.
Further, as implementing of method described in Fig. 1, embodiments provide a kind of supervising device, as
Shown in Fig. 3, described device includes: acquiring unit 31, detector unit 32, output unit 33.
Described acquiring unit 31, may be used for obtaining each network access device of identification information mobile terminal being detected
Positional information, and obtain the action trail information of the user corresponding with described mobile terminal according to described positional information.
Described detector unit 32, whether the action trail information that may be used for detecting the acquisition of described acquiring unit 31 meets pre-
If it is regular.
Described output unit 33, if may be used for described detector unit 32 to detect that described action trail information meets default
Rule, then outputting alarm information.
It should be noted that other of each functional unit involved by a kind of supervising device of embodiment of the present invention offer are corresponding
Describe, the corresponding description being referred in Fig. 1, do not repeat them here.
A kind of supervising device that the present invention provides, first obtains each network of identification information mobile terminal being detected even
Connect the positional information of equipment, and obtain the action trail letter of the user corresponding with described mobile terminal according to described positional information
Breath;Then detect whether described action trail information meets preset rules;The most then outputting alarm information.With pass through people at present
Work mode is searched needs the specific crowd of monitoring to compare, and the present invention is by detecting whether the action trail information corresponding with user accords with
Close preset rules, it is determined that whether this user is the targeted customer needing monitoring, the most then outputting alarm information, in order to this use
Family is monitored, it is possible to achieve automatic searching needs the specific crowd of monitoring, can improve the searching efficiency of specific crowd, and then
Security monitoring efficiency can be improved.
Further, as implementing of method described in Fig. 2, embodiments provide another kind of supervising device,
As shown in Figure 4, described device includes: acquiring unit 41, detector unit 42, output unit 43.
Described acquiring unit 41, may be used for obtaining each network access device of identification information mobile terminal being detected
Positional information, and obtain the action trail information of the user corresponding with described mobile terminal according to described positional information.
Described detector unit 42, whether the action trail information that may be used for detecting the acquisition of described acquiring unit 41 meets pre-
If it is regular.
Described output unit 43, if may be used for described detector unit 42 to detect that described action trail information meets default
Rule, then outputting alarm information.
Specifically, described detector unit 42 includes: detection module 421, determine module 422.
Described detection module 421, may be used for detecting in described action trail information whether there is preset critical place.
Described detection module 421, it is also possible to if there is preset critical place for detecting in described action trail information,
Then detect in preset time period, described action trail information occurs the number of times in described preset critical place whether more than or etc.
In predetermined times threshold value.
Described determine module 422, if may be used for described detection module 421 to detect that described number of times is more than or equal to described
Predetermined times threshold value, it is determined that described action trail information meets described preset rules.
Described detection module 421, it is also possible to for according to described action trail information, detect the event trace of described user
Whether it is in outside the default range of activity corresponding with described user.
Described determine module 422, it is also possible to if detecting at the event trace of described user for described detection module 421
Outside the default range of activity corresponding with described user, it is determined that described action trail information meets described preset rules.
Specifically, described device also comprises determining that unit 44.
Described determine unit 44, may be used for, by the network access device of configuration in the range of scheduled event, determining pre-
The identification information of the mobile terminal collected in the section of fixing time.
Described acquiring unit 41, it is also possible to for obtaining the position of each network access device described identification information being detected
Confidence ceases, and obtains the action trail information of the user corresponding with described mobile terminal according to described positional information.
Described detector unit 42, it is also possible to for the action trail information obtained according to described acquiring unit 41, detects institute
State whether user exists exception.
Described output unit 43, it is also possible to if detecting that described user exists exception for described detector unit 42, the most defeated
Go out warning information.
Described acquiring unit 41, it is also possible to for when there is the corresponding multiple identification information of a mobile terminal, from detection
Obtain, in the heterogeneous networks connection equipment of the identification information of described mobile terminal, multiple marks that described mobile terminal is corresponding respectively
Knowledge information.
Described determine unit 44, may be used for the highest for repetitive rate in whole identification informations corresponding for described mobile terminal
Identification information, is defined as the identification information corresponding with described mobile terminal.
Specifically, described acquiring unit 41 includes: acquisition module 411, determine module 412.
Described acquisition module 411, may be used for, according to described positional information, obtaining the motion track letter of described mobile terminal
Breath.
Described determine module 412, may be used for being defined as corresponding with described mobile terminal by described motion track information
The action trail information of user.
Specifically, described output unit 43 includes: acquisition module 431, output module 432.
Described acquisition module 431, may be used for obtaining the ID letter corresponding with the identification information of described mobile terminal
Breath.
Described output module 432, may be used for exporting the warning information carrying described user totem information.
It should be noted that other phases of each functional unit involved by the another kind of supervising device of embodiment of the present invention offer
Should describe, the corresponding description being referred in Fig. 2, not repeat them here.
The another kind of supervising device that the present invention provides, first obtains each network of identification information mobile terminal being detected
The positional information of connection equipment, and the action trail letter of the user corresponding with described mobile terminal is obtained according to described positional information
Breath;Then detect whether described action trail information meets preset rules;The most then outputting alarm information.With pass through people at present
Work mode is searched needs the specific crowd of monitoring to compare, and the present invention is by detecting whether the action trail information corresponding with user accords with
Close preset rules, it is determined that whether this user is the targeted customer needing monitoring, the most then outputting alarm information, in order to this use
Family is monitored, it is possible to achieve automatic searching needs the specific crowd of monitoring, can improve the searching efficiency of specific crowd, and then
Security monitoring efficiency can be improved.
Embodiment of the invention discloses that:
A1, a kind of monitoring method, including:
Obtain the positional information of each network access device of identification information mobile terminal being detected, and according to institute's rheme
Put the action trail information of the acquisition of information user corresponding with described mobile terminal;
Detect whether described action trail information meets preset rules;
The most then outputting alarm information.
A2, monitoring method as described in A1, whether described detection described action trail information meets preset rules includes:
Detect in described action trail information and whether there is preset critical place;
If existing, then detect and described action trail information occurs in preset time period the secondary of described preset critical place
Whether number is more than or equal to predetermined times threshold value;
If, it is determined that described action trail information meets described preset rules.
A3, monitoring method as described in A1, whether described detection described action trail information meets preset rules includes:
According to described action trail information, detect whether the event trace of described user is in corresponding with described user pre-
If outside range of activity;
If, it is determined that described action trail information meets described preset rules.
A4, monitoring method as described in A1, described method also includes:
By the network access device of configuration in the range of scheduled event, determine the mobile end collected in predetermined amount of time
The identification information of end;
Obtain the positional information of each network access device described identification information being detected, and according to described positional information
Obtain the action trail information of the user corresponding with described mobile terminal;
According to described action trail information, detect whether described user exists exception;
If existing, then outputting alarm information.
A5, monitoring method as described in A1, described acquisition detects that each network of the identification information of mobile terminal connects
Before the positional information of equipment, described method also includes:
When there is the corresponding multiple identification information of mobile terminal, from the identification information described mobile terminal being detected
Heterogeneous networks connection equipment obtains multiple identification informations that described mobile terminal is corresponding respectively;
By identification information the highest for repetitive rate in whole identification informations corresponding for described mobile terminal, it is defined as and described shifting
The identification information that dynamic terminal is corresponding.
A6, monitoring method as described in A1, described obtain the use corresponding with described mobile terminal according to described positional information
The action trail information at family includes:
According to described positional information, obtain the motion track information of described mobile terminal;
Described motion track information is defined as the action trail information of the user corresponding with described mobile terminal.
A7, monitoring method as described in A1, described outputting alarm information includes:
Obtain the user totem information corresponding with the identification information of described mobile terminal;
Output carries the warning information of described user totem information.
B8, a kind of supervising device, including:
Acquiring unit, for obtaining the position letter of each network access device of identification information mobile terminal being detected
Breath, and the action trail information of the user corresponding with described mobile terminal is obtained according to described positional information;
Detector unit, whether the action trail information obtained for detecting described acquiring unit meets preset rules;
Output unit, if detecting that described action trail information meets preset rules for described detector unit, then exports
Warning information.
B9, supervising device as described in B8, described detector unit includes:
Detection module, is used for detecting in described action trail information whether there is preset critical place;
, there is preset critical place if being additionally operable to detect in described action trail information, then detect in described detection module
Described action trail information occurs in preset time period the number of times in described preset critical place whether more than or equal to preset
Frequency threshold value;
Determine module, if detecting that described number of times is more than or equal to described predetermined times threshold value for described detection module,
Then determine that described action trail information meets described preset rules.
B10, supervising device as described in B8, described detector unit includes:
Detection module, for according to described action trail information, whether the event trace detecting described user is in and institute
State outside the default range of activity that user is corresponding;
Determine module, if it is corresponding with described user to detect that the event trace of described user is in for described detection module
Default range of activity outside, it is determined that described action trail information meets described preset rules.
B11, supervising device as described in B8, described device also comprises determining that unit;
Described determine unit, for by the network access device of configuration in the range of scheduled event, determining the scheduled time
The identification information of the mobile terminal collected in Duan;
Described acquiring unit, is additionally operable to obtain the position letter of each network access device described identification information being detected
Breath, and the action trail information of the user corresponding with described mobile terminal is obtained according to described positional information;
Described detector unit, is additionally operable to the action trail information obtained according to described acquiring unit, and detecting described user is
No existence is abnormal;
Described output unit, if being additionally operable to described detector unit to detect that described user exists exception, then outputting alarm letter
Breath.
B12, supervising device as described in B8, described device also comprises determining that unit;
Described acquiring unit, is additionally operable to when there is the corresponding multiple identification information of a mobile terminal, described from detecting
The heterogeneous networks connection equipment of the identification information of mobile terminal obtains multiple identification informations that described mobile terminal is corresponding respectively;
Described determine unit, for by mark letter the highest for repetitive rate in whole identification informations corresponding for described mobile terminal
Breath, is defined as the identification information corresponding with described mobile terminal.
B13, supervising device as described in B8, described acquiring unit includes:
Acquisition module, for according to described positional information, obtains the motion track information of described mobile terminal;
Determine module, for described motion track information being defined as the behavior rail of the user corresponding with described mobile terminal
Mark information.
B14, supervising device as described in B8, described output unit includes:
Acquisition module, for obtaining the user totem information corresponding with the identification information of described mobile terminal;
Output module, carries the warning information of described user totem information for output.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has the portion described in detail in certain embodiment
Point, may refer to the associated description of other embodiments.
It is understood that the correlated characteristic in said method and device can mutually reference.It addition, in above-described embodiment
" first ", " second " etc. be for distinguishing each embodiment, and do not represent the quality of each embodiment.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, and the system of foregoing description,
The specific works process of device and unit, is referred to the corresponding process in preceding method embodiment, does not repeats them here.
Algorithm and display are not intrinsic to any certain computer, virtual system or miscellaneous equipment relevant provided herein.
Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system
Structure be apparent from.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to use various
Programming language realizes the content of invention described herein, and the description done language-specific above is to disclose this
Bright preferred forms.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that the enforcement of the present invention
Example can be put into practice in the case of not having these details.In some instances, it is not shown specifically known method, structure
And technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that one or more in order to simplify that the disclosure helping understands in each inventive aspect, exist
Above in the description of the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes
In example, figure or descriptions thereof.But, the method for the disclosure should not be construed to reflect an intention that i.e. required guarantor
The application claims feature more more than the feature being expressly recited in each claim protected.More precisely, as following
Claims reflected as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
The claims following detailed description of the invention are thus expressly incorporated in this detailed description of the invention, the most each claim itself
All as the independent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out the module in the equipment in embodiment adaptively
Change and they are arranged in one or more equipment different from this embodiment.Can be the module in embodiment or list
Unit or assembly are combined into a module or unit or assembly, and can put them in addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit excludes each other, can use any
Combine all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed appoint
Where method or all processes of equipment or unit are combined.Unless expressly stated otherwise, this specification (includes adjoint power
Profit requires, summary and accompanying drawing) disclosed in each feature can be carried out generation by providing identical, equivalent or the alternative features of similar purpose
Replace.
Although additionally, it will be appreciated by those of skill in the art that embodiments more described herein include other embodiments
Some feature included by rather than further feature, but the combination of the feature of different embodiment means to be in the present invention's
Within the scope of and form different embodiments.Such as, in the following claims, embodiment required for protection appoint
One of meaning can mode use in any combination.
The all parts embodiment of the present invention can realize with hardware, or to run on one or more processor
Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that and can use in practice
What microprocessor or digital signal processor (DSP) realized according to embodiments of the present invention a kind of monitors in method and device
The some or all functions of some or all parts.The present invention is also implemented as performing method as described herein
Part or all equipment or device program (such as, computer program and computer program).Such reality
The program of the existing present invention can store on a computer-readable medium, or can be to have the form of one or more signal.
Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or with any other form
There is provided.
The present invention will be described rather than limits the invention to it should be noted above-described embodiment, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference marks that should not will be located between bracket is configured to limitations on claims.Word " comprises " and does not excludes the presence of not
Arrange element in the claims or step.Word "a" or "an" before being positioned at element does not excludes the presence of multiple such
Element.The present invention and can come real by means of including the hardware of some different elements by means of properly programmed computer
Existing.If in the unit claim listing equipment for drying, several in these devices can be by same hardware branch
Specifically embody.Word first, second and third use do not indicate that any order.These word explanations can be run after fame
Claim.
Claims (10)
1. a monitoring method, it is characterised in that including:
Obtain the positional information of each network access device of identification information mobile terminal being detected, and believe according to described position
Breath obtains the action trail information of the user corresponding with described mobile terminal;
Detect whether described action trail information meets preset rules;
The most then outputting alarm information.
Monitoring method the most according to claim 1, it is characterised in that whether described detection described action trail information meets
Preset rules includes:
Detect in described action trail information and whether there is preset critical place;
If existing, then detect and described action trail information occurring in preset time period, the number of times in described preset critical place is
No more than or equal to predetermined times threshold value;
If, it is determined that described action trail information meets described preset rules.
Monitoring method the most according to claim 1, it is characterised in that whether described detection described action trail information meets
Preset rules includes:
According to described action trail information, whether the event trace detecting described user is in the default work corresponding with described user
Outside dynamic scope;
If, it is determined that described action trail information meets described preset rules.
Monitoring method the most according to claim 1, it is characterised in that described method also includes:
By the network access device of configuration in the range of scheduled event, determine the mobile terminal collected in predetermined amount of time
Identification information;
Obtain the positional information of each network access device described identification information being detected, and obtain according to described positional information
The action trail information of the user corresponding with described mobile terminal;
According to described action trail information, detect whether described user exists exception;
If existing, then outputting alarm information.
Monitoring method the most according to claim 1, it is characterised in that described acquisition detects the identification information of mobile terminal
Each network access device positional information before, described method also includes:
When there is the corresponding multiple identification information of a mobile terminal, from the difference of the identification information described mobile terminal being detected
Network access device obtains multiple identification informations that described mobile terminal is corresponding respectively;
By identification information the highest for repetitive rate in whole identification informations corresponding for described mobile terminal, it is defined as mobile whole with described
The identification information that end is corresponding.
Monitoring method the most according to claim 1, it is characterised in that described according to the acquisition of described positional information and described shifting
The action trail information of the user that dynamic terminal is corresponding includes:
According to described positional information, obtain the motion track information of described mobile terminal;
Described motion track information is defined as the action trail information of the user corresponding with described mobile terminal.
Monitoring method the most according to claim 1, it is characterised in that described outputting alarm information includes:
Obtain the user totem information corresponding with the identification information of described mobile terminal;
Output carries the warning information of described user totem information.
8. a supervising device, it is characterised in that including:
Acquiring unit, for obtaining the positional information of each network access device of identification information mobile terminal being detected, and
The action trail information of the user corresponding with described mobile terminal is obtained according to described positional information;
Detector unit, whether the action trail information obtained for detecting described acquiring unit meets preset rules;
Output unit, if detecting that described action trail information meets preset rules for described detector unit, then outputting alarm
Information.
Supervising device the most according to claim 8, it is characterised in that described detector unit includes:
Detection module, is used for detecting in described action trail information whether there is preset critical place;
, there is preset critical place if being additionally operable to detect in described action trail information, then detect in advance in described detection module
If described action trail information occurring the number of times in described preset critical place whether more than or equal to predetermined times in the time period
Threshold value;
Determine module, if detecting that described number of times is more than or equal to described predetermined times threshold value, the most really for described detection module
Fixed described action trail information meets described preset rules.
Supervising device the most according to claim 8, it is characterised in that described detector unit includes:
Detection module, for according to described action trail information, whether the event trace detecting described user is in and described use
Outside the default range of activity that family is corresponding;
Determine module, if it is corresponding with described user pre-to detect that the event trace of described user is in for described detection module
If outside range of activity, it is determined that described action trail information meets described preset rules.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610505929.9A CN106056867A (en) | 2016-06-30 | 2016-06-30 | Monitoring method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610505929.9A CN106056867A (en) | 2016-06-30 | 2016-06-30 | Monitoring method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106056867A true CN106056867A (en) | 2016-10-26 |
Family
ID=57201350
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610505929.9A Pending CN106056867A (en) | 2016-06-30 | 2016-06-30 | Monitoring method and apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106056867A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107158685A (en) * | 2017-04-28 | 2017-09-15 | 北京小米移动软件有限公司 | Locomotion assay method and apparatus |
CN107580019A (en) * | 2017-07-31 | 2018-01-12 | 上海与德科技有限公司 | The method, apparatus and server that a kind of missing target is given for change |
CN109241809A (en) * | 2017-07-10 | 2019-01-18 | 中兴通讯股份有限公司 | A kind of data analysing method, relevant device and computer readable storage medium |
CN110164087A (en) * | 2019-05-11 | 2019-08-23 | 任明和 | Realize the method for real-time monitoring to monitored people's safety |
CN111159719A (en) * | 2019-12-31 | 2020-05-15 | 奇安信科技集团股份有限公司 | Determination method and device of conflict authority, computer equipment and storage medium |
CN111372197A (en) * | 2020-03-12 | 2020-07-03 | 深圳市天彦通信股份有限公司 | Early warning method and related device |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6470319B1 (en) * | 1999-06-25 | 2002-10-22 | Community Corrections Improvement Association | Data processing system for determining case management plan for criminal offender |
CN1777281A (en) * | 2004-11-17 | 2006-05-24 | 株式会社日立制作所 | Monitoring system using multiple pick-up cameras |
CN103716777A (en) * | 2013-12-18 | 2014-04-09 | 厦门市美亚柏科信息股份有限公司 | Wireless terminal MAC address acquisition method and device |
CN103747464A (en) * | 2014-01-17 | 2014-04-23 | 北京赢销通软件技术有限公司 | Mobile terminal motion trail analyzing system |
CN103889056A (en) * | 2014-04-16 | 2014-06-25 | 北京极科极客科技有限公司 | Method and system for tracking wireless terminal moving track |
CN105049814A (en) * | 2015-08-12 | 2015-11-11 | 山东合天智汇信息技术有限公司 | Method and system for monitoring motion track of analyst |
CN105163278A (en) * | 2015-08-12 | 2015-12-16 | 山东合天智汇信息技术有限公司 | Wireless client position track monitoring system and method based on mobile terminal |
CN105208206A (en) * | 2015-08-31 | 2015-12-30 | 北京奇虎科技有限公司 | Mobile terminal anti-tracking method and mobile terminal |
CN105323713A (en) * | 2014-06-20 | 2016-02-10 | 中兴通讯股份有限公司 | Technical investigation method and system based on passive positioning |
CN105554744A (en) * | 2015-12-16 | 2016-05-04 | 苏州寻息电子科技有限公司 | Safety protection method for positioning node |
CN105916116A (en) * | 2016-06-30 | 2016-08-31 | 北京奇虎科技有限公司 | Monitoring method and device based on movement locus information |
-
2016
- 2016-06-30 CN CN201610505929.9A patent/CN106056867A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6470319B1 (en) * | 1999-06-25 | 2002-10-22 | Community Corrections Improvement Association | Data processing system for determining case management plan for criminal offender |
CN1777281A (en) * | 2004-11-17 | 2006-05-24 | 株式会社日立制作所 | Monitoring system using multiple pick-up cameras |
CN103716777A (en) * | 2013-12-18 | 2014-04-09 | 厦门市美亚柏科信息股份有限公司 | Wireless terminal MAC address acquisition method and device |
CN103747464A (en) * | 2014-01-17 | 2014-04-23 | 北京赢销通软件技术有限公司 | Mobile terminal motion trail analyzing system |
CN103889056A (en) * | 2014-04-16 | 2014-06-25 | 北京极科极客科技有限公司 | Method and system for tracking wireless terminal moving track |
CN105323713A (en) * | 2014-06-20 | 2016-02-10 | 中兴通讯股份有限公司 | Technical investigation method and system based on passive positioning |
CN105049814A (en) * | 2015-08-12 | 2015-11-11 | 山东合天智汇信息技术有限公司 | Method and system for monitoring motion track of analyst |
CN105163278A (en) * | 2015-08-12 | 2015-12-16 | 山东合天智汇信息技术有限公司 | Wireless client position track monitoring system and method based on mobile terminal |
CN105208206A (en) * | 2015-08-31 | 2015-12-30 | 北京奇虎科技有限公司 | Mobile terminal anti-tracking method and mobile terminal |
CN105554744A (en) * | 2015-12-16 | 2016-05-04 | 苏州寻息电子科技有限公司 | Safety protection method for positioning node |
CN105916116A (en) * | 2016-06-30 | 2016-08-31 | 北京奇虎科技有限公司 | Monitoring method and device based on movement locus information |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107158685A (en) * | 2017-04-28 | 2017-09-15 | 北京小米移动软件有限公司 | Locomotion assay method and apparatus |
CN109241809A (en) * | 2017-07-10 | 2019-01-18 | 中兴通讯股份有限公司 | A kind of data analysing method, relevant device and computer readable storage medium |
CN107580019A (en) * | 2017-07-31 | 2018-01-12 | 上海与德科技有限公司 | The method, apparatus and server that a kind of missing target is given for change |
CN110164087A (en) * | 2019-05-11 | 2019-08-23 | 任明和 | Realize the method for real-time monitoring to monitored people's safety |
CN111159719A (en) * | 2019-12-31 | 2020-05-15 | 奇安信科技集团股份有限公司 | Determination method and device of conflict authority, computer equipment and storage medium |
CN111159719B (en) * | 2019-12-31 | 2022-02-08 | 奇安信科技集团股份有限公司 | Determination method and device of conflict authority, computer equipment and storage medium |
CN111372197A (en) * | 2020-03-12 | 2020-07-03 | 深圳市天彦通信股份有限公司 | Early warning method and related device |
CN111372197B (en) * | 2020-03-12 | 2021-03-19 | 深圳市天彦通信股份有限公司 | Early warning method and related device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106056867A (en) | Monitoring method and apparatus | |
US10187411B2 (en) | Method for intrusion detection in industrial automation and control system | |
CN106506556B (en) | A kind of network flow abnormal detecting method and device | |
CA2562358C (en) | Method and system for distinguishing relevant network security threats using comparison of refined intrusion detection audits and intelligent security analysis | |
CA2954552C (en) | Method for detecting an attack in a computer network | |
CN111193728B (en) | Network security evaluation method, device, equipment and storage medium | |
CN107566163A (en) | A kind of alarm method and device of user behavior analysis association | |
CN106056690A (en) | Line-protecting intelligent inspection method and system based on big data, cloud platform and internet of things | |
KR20120068611A (en) | Apparatus and method for security situation awareness and situation information generation based on spatial linkage of physical and it security | |
CN105549508B (en) | A kind of alarm method and device merged based on information | |
WO2020080047A1 (en) | Incursion location identification device and incursion location identification method | |
CN108574839B (en) | Bayonet equipment abnormity detection method and device | |
CN109413071A (en) | A kind of anomalous traffic detection method and device | |
CN106060778A (en) | Target location determination method and device | |
CN110619738B (en) | Joint defense warning method and device | |
CN104716740A (en) | Fixed value calibration method, device and system for relay protection device | |
CN112817814A (en) | Abnormity monitoring method, system, storage medium and electronic device | |
CN110286300A (en) | A kind of multi branch electric power lines road Fault Locating Method, device, equipment and system | |
US11774627B2 (en) | Method for characterizing a radiation source by a radiation portal monitoring system | |
CN106211065A (en) | The monitoring method and device of personnel's data on flows | |
KR101444250B1 (en) | System for monitoring access to personal information and method therefor | |
CN107507400B (en) | A kind of circumference monitoring protection system and method based on fusion array | |
CN106332016A (en) | Association method and device for WIFI devices | |
Schauer et al. | Conceptual framework for hybrid situational awareness in critical port infrastructures | |
CN104333489B (en) | Detection method, apparatus and system to blank pipe supervision equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161026 |
|
RJ01 | Rejection of invention patent application after publication |