CN106056867A - Monitoring method and apparatus - Google Patents

Monitoring method and apparatus Download PDF

Info

Publication number
CN106056867A
CN106056867A CN201610505929.9A CN201610505929A CN106056867A CN 106056867 A CN106056867 A CN 106056867A CN 201610505929 A CN201610505929 A CN 201610505929A CN 106056867 A CN106056867 A CN 106056867A
Authority
CN
China
Prior art keywords
information
user
mobile terminal
action trail
trail information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610505929.9A
Other languages
Chinese (zh)
Inventor
李涓
宋丽思
钱军
陈虞付
刘前进
梁敬彪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610505929.9A priority Critical patent/CN106056867A/en
Publication of CN106056867A publication Critical patent/CN106056867A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/22Status alarms responsive to presence or absence of persons

Abstract

The invention, which relates to the technical field of information, discloses a monitoring method and apparatus, so that the searching efficiency for the particular group is improved and the security monitoring efficiency is enhanced. The method comprises: position information of all network connecting devices detecting identifier information of a mobile terminal is obtained and behavior track information corresponding to the mobile terminal is obtained based on the position information; whether the behavior track information meets a preset rule is detected; and if so, warning information is outputted. The method and apparatus are suitable for searching a particular group.

Description

Monitoring method and device
Technical field
The present invention relates to a kind of areas of information technology, particularly relate to a kind of monitoring method and device.
Background technology
Along with developing rapidly of science and technology, monitoring technology is more and more ripe, and monitoring means are more and more abundanter, such as, Video monitoring, network monitoring, long-range monitoring etc..User can be helped to supervise for some personnel by these monitoring means Control.
The search of the specific crowd (such as terrorist, drug addict, smuggling personnel etc.) monitored is needed currently for some Mode is to be searched by manual type.But, carrying out search by manual type can take a substantial amount of time, and influences whether The searching efficiency of specific crowd, and then security monitoring efficiency can be affected.
Summary of the invention
In view of this, the invention provides a kind of monitoring method and device, main purpose is to improve specific crowd Searching efficiency, security monitoring efficiency can be improved.
According to one aspect of the invention, it is provided that a kind of monitoring method, the method includes:
Obtain the positional information of each network access device of identification information mobile terminal being detected, and according to institute's rheme Put the action trail information of the acquisition of information user corresponding with described mobile terminal;
Detect whether described action trail information meets preset rules;
The most then outputting alarm information.
According to another aspect of the invention, it is provided that a kind of supervising device, this device includes:
Acquiring unit, for obtaining the position letter of each network access device of identification information mobile terminal being detected Breath, and the action trail information of the user corresponding with described mobile terminal is obtained according to described positional information;
Detector unit, whether the action trail information obtained for detecting described acquiring unit meets preset rules;
Output unit, if detecting that described action trail information meets preset rules for described detector unit, then exports Warning information.
By technique scheme, the technical scheme that the embodiment of the present invention provides at least has the advantage that
A kind of monitoring method and device that the present invention provides, first acquisition detect each of the identification information of mobile terminal The positional information of network access device, and the behavior rail of the user corresponding with described mobile terminal is obtained according to described positional information Mark information;Then detect whether described action trail information meets preset rules;The most then outputting alarm information.With the most logical Crossing manual type search needs the specific crowd of monitoring to compare, and the present invention by detecting the action trail information corresponding with user is No meet preset rules, it is determined that whether this user is the targeted customer needing monitoring, the most then outputting alarm information, in order to right This user is monitored, it is possible to achieve automatic searching needs the specific crowd of monitoring, can improve the searching efficiency of specific crowd, And then security monitoring efficiency can be improved.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of description, and in order to allow above and other objects of the present invention, the feature and advantage can Become apparent, below especially exemplified by the detailed description of the invention of the present invention.
Accompanying drawing explanation
By reading the detailed description of hereafter preferred implementation, various other advantage and benefit common for this area Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, and is not considered as the present invention Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical parts.In the accompanying drawings:
Fig. 1 shows a kind of monitoring method flow schematic diagram that the embodiment of the present invention provides;
Fig. 2 shows the another kind of monitoring method flow schematic diagram that the embodiment of the present invention provides;
Fig. 3 shows a kind of supervising device structural representation that the embodiment of the present invention provides;
Fig. 4 shows the another kind of supervising device structural representation that the embodiment of the present invention provides.
Detailed description of the invention
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although accompanying drawing shows the disclosure Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should be by embodiments set forth here Limited.On the contrary, it is provided that these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Embodiments provide a kind of monitoring method, as it is shown in figure 1, described method includes:
101, the positional information of each network access device of identification information mobile terminal being detected is obtained, and according to position Put the action trail information of the acquisition of information user corresponding with mobile terminal.
Wherein, described action trail information can comprise the route track of User Activity, such as, by way during User Activity The path locus of the composition such as the place of warp, retention place.Described identification information can be the unique device identity of mobile terminal, It is specifically as follows MAC (Media Access Control, the hardware address) address of mobile terminal, IMEI (International Mobile Equipment Identity, mobile device international identity code) number etc..Described network access device can be in advance If for providing the equipment with unlimited high frequency electrical signal of network connection for mobile terminal in distance range, being specifically as follows Wifi (Wireless-Fidelity, Wireless Fidelity) equipment harvester.
It should be noted that the use now with mobile terminal is universal, increasing mobile terminal, such as intelligence hands Machine, intelligent watch, panel computer, electronic reader etc. occupy the highest use frequency in user lives.Generally user At least one mobile terminal can be had, for the embodiment of the present invention, user can be obtained corresponding by the mobile terminal of user Action trail information.Specifically, obtain the positional information of each network access device of identification information mobile terminal being detected, And the action trail information of the user corresponding with mobile terminal is obtained according to positional information.
Such as, user a carries smart mobile phone and on the way walks, and network access device 1, network access device 2 and network are even Connect the MAC Address that equipment 3 detects that this smart mobile phone is corresponding respectively, obtain the position of these three network access device and carry out even Line, obtains the motion track of this smart mobile phone, owing to user a carries this smart mobile phone, can be defined as this motion track using The route track that family a is movable.
102, whether detection action trail information meets preset rules.
Wherein, described preset rules can configure according to the actual requirements.
Such as, preset rules can be that the event trace of user is in outside the default range of activity corresponding with this user, After getting the action trail information comprising user's a active ways line tracking corresponding to user a, according to this active ways line tracking, can To determine whether the event trace of user a is in outside the default range of activity corresponding with user a.At the event trace of user a When the default range of activity corresponding with user a is outer, determine that the action trail information of user a meets preset rules;When user a's When event trace is in the default range of activity corresponding with user a, determines that the action trail information of user a does not meets and preset rule Then.
The most such as, preset rules can be user active ways line tracking in there is preset critical place, and presetting Time period in this active ways line tracking occurs the number of times in this place more than or equal to the frequency threshold value preset.Getting use After the action trail information of what family a was corresponding comprise user's a active ways line tracking, pre-when the active ways line tracking of user a exists If crucial place, and this active ways line tracking occurred within the default time period number of times in this place more than or equal to presetting Frequency threshold value time, determine that the action trail information of user a meets preset rules;When the active ways line tracking of user a is not deposited In preset critical place, or this active ways line tracking occurring within the default time period, the number of times in this place is secondary less than preset During number threshold value, determine that the action trail information of user a does not meets preset rules.
If 103 detect that action trail information meets preset rules, outputting alarm information.
Wherein, described warning information can be text alert information, picture warning information, audible alarm information, video announcement Alarming information etc..
For the embodiment of the present invention, when the action trail information of user meets preset rules, determine that the user is target User, outputting alarm information, further, in order to this targeted customer is monitored.
Such as, after getting the movable action trail information of user a, it may be determined that user a is from place 1 comes Carrying out population, whether there is place 2 in detection behavior trace information, wherein, place 1 is the place of a dangerous molecule, ground Point 2 is a place needing key monitoring.If existing, then from behavior trace information, obtain user in nearest one month Route track N that a is movable, in detection route track N, whether the occurrence number in place 2 is more than or equal to the number of times threshold being pre-configured with Value, if occurrence number is more than or equal to frequency threshold value, determines that action trail information movable for user a meets preset rules, explanation User a often comes place 2 in nearest one month, and this is local, may cause security threat to local 2, and then really Determining user a is the targeted customer needing to be monitored it, and output carries the warning information of user a mark.
A kind of monitoring method that the present invention provides, first obtains each network of identification information mobile terminal being detected even Connect the positional information of equipment, and obtain the action trail letter of the user corresponding with described mobile terminal according to described positional information Breath;Then detect whether described action trail information meets preset rules;The most then outputting alarm information.With pass through people at present Work mode is searched needs the specific crowd of monitoring to compare, and the present invention is by detecting whether the action trail information corresponding with user accords with Close preset rules, it is determined that whether this user is the targeted customer needing monitoring, the most then outputting alarm information, in order to this use Family is monitored, it is possible to achieve automatic searching needs the specific crowd of monitoring, can improve the searching efficiency of specific crowd, and then Security monitoring efficiency can be improved.
Specifically, another kind of monitoring method is embodiments provided, as in figure 2 it is shown, described method includes:
201, the positional information of each network access device of identification information mobile terminal being detected is obtained, and according to position Put the action trail information of the acquisition of information user corresponding with mobile terminal.
Wherein, described action trail information comprises the route track information of User Activity, such as, by way during User Activity The path locus of the composition such as the place of warp, retention place.The concept explanation of described identification information and network access device can To describe accordingly with reference in step 101, do not repeat them here.
Such as, in gateway, airport, gateway, railway station, the place such as high speed crossing charge station can pre-set network even Connect equipment, when user takes train to A area, and outlet is come out of from railway station, A area, and the smart mobile phone that this user carries with When being in network connection open mode, the network access device configured by exit position, railway station, this user can be detected MAC Address corresponding to smart mobile phone.
It should be noted that the embodiment for detection or collection mobile terminal corresponding device identification information is not limited to This, it is also possible to collect, in the HTTP request that user is sent by the client of mobile terminal, the equipment mark that this mobile terminal is corresponding Knowledge information;Can also be when user connect focus wifi by mobile terminal, by the journey being pre-configured with on wifi login page Sequence collects the equipment identification information that this mobile terminal is corresponding.
Specifically, the described action trail information obtaining the user corresponding with mobile terminal according to positional information can be wrapped Include: according to described positional information, obtain the motion track information of described mobile terminal;Described motion track information is defined as The action trail information of the user corresponding with described mobile terminal.
Such as, after the MAC Address that intelligent watch that user b carries is corresponding being detected, obtain from network monitoring server Take the motion track information of the intelligent watch corresponding with this MAC Address, specifically by the network access device this MAC Address being detected Position line, the motion track information obtained.Owing to user b can carry with this intelligent watch, can be by this motion track Information is defined as the route track information that user b is movable.
For the embodiment of the present invention, described acquisition detects each network access device of the identification information of mobile terminal Before positional information, also include: when there is the corresponding multiple identification information of a mobile terminal, from described mobile terminal being detected Identification information heterogeneous networks connection equipment in obtain multiple identification informations that described mobile terminal is corresponding respectively;By described shifting The identification information that in whole identification informations that dynamic terminal is corresponding, repetitive rate is the highest, is defined as the mark corresponding with described mobile terminal Information.
Such as, for some, there is the mobile terminal of equipment identification information function of safety protection, connected to the network set at it During a standby wifi connects, multiple MAC Address may be provided to network access device, in the plurality of MAC Address only There is a MAC Address is the real MAC address of this mobile terminal, and remaining is the MAC Address of stochastic generation, and then can cause nothing Method identifies the situation of the real MAC address which MAC Address concrete is this mobile terminal.In order to solve the problems referred to above, from inspection The heterogeneous networks connection equipment of the MAC Address measuring this mobile terminal obtains multiple MAC ground that this mobile terminal is corresponding respectively Location;By identification information the highest for repetitive rate in whole MAC Address corresponding for this mobile terminal, it is defined as the true of this mobile terminal MAC Address.When equipment 1 as connected to the network in mobile device carries out wifi connection, this mobile terminal provides MAC Address 1, MAC Address 2, MAC Address 3, when this mobile device equipment connected to the network 2 carries out wifi connection, this mobile terminal provides MAC ground Location 4, MAC Address 2, MAC Address 6, MAC Address 2 is the MAC Address that repetitive rate is the highest, MAC Address 2 is defined as this and moves end The real MAC address of end.
It should be noted that when there is the corresponding multiple identification information of a mobile terminal, by from detecting that this moves The heterogeneous networks connection equipment of the identification information of terminal obtains multiple identification informations that this mobile terminal is corresponding respectively;And should The identification information that in whole identification informations that mobile terminal is corresponding, repetitive rate is the highest, is defined as the mark corresponding with this mobile terminal Information, can improve the acquisition accuracy of the action trail information of user corresponding with this mobile terminal.
Whether 202a, detection action trail information exist preset critical place.
Wherein, described preset critical place can configure according to the actual requirements, and such as, preset critical place can be joined It is set to some places needing key monitoring.
If 203a action trail information exists preset critical place, then detect action trail letter in preset time period Breath occurs the number of times in preset critical place whether more than or equal to predetermined times threshold value.
Wherein, described preset time period and described predetermined times threshold value can configure according to the actual requirements, such as, Predetermined times threshold value be configurable to 5 times, 8 inferior.
If 204a detect in preset time period, behavior trace information occurs the number of times in preset critical place more than or Equal to predetermined times threshold value, it is determined that action trail information meets preset rules.
Such as, after getting the movable action trail information of user b, it may be determined that user b is from place m comes Province personnel, this place a is a place that there is terrorist, whether there is preset critical ground in detection behavior trace information Point, this preset critical place can be that some need the place of key monitoring, if there is the pre-of place n in behavior trace information If crucial place, then from behavior trace information, obtain route track x movable for user b in nearest two weeks, detection In this route track x, whether the occurrence number of place n more than or equal to the frequency threshold value being pre-configured with, if occurrence number more than or Equal to this frequency threshold value, determine that the action trail information of user b meets preset rules, illustrate that user b is in nearest two weeks This is local often to come place n, local n may be caused security threat, need to be monitored user b.
Step 202b arranged side by side with step 202a, according to action trail information, whether the event trace of detection user is in Outside the default range of activity corresponding with user.
Wherein, described default range of activity can be set according to the practical situation of user.
If 203b detects that the event trace of user is in outside the default range of activity corresponding with user, it is determined that behavior Trace information meets preset rules.
Such as, it is smuggler before user c, is released after taking punishment, because there will be the possibility that user c takes up one's old trade again Property, set the range of activity of correspondence for user c, after getting the movable route track information of user c, according to this route rail Mark information, whether the event trace of detection user c is in outside the range of activity corresponding with user c, when the activity detecting user c Track is in outside the range of activity corresponding with user c, as user c has gone to port area, determines the action trail information of user c Meet preset rules, illustrate that user c has to take up one's old trade again and continue the possibility of smuggling, need user c is monitored.
If 205 action trail information meet preset rules, then outputting alarm information.
Wherein, described warning information can be text alert information, picture warning information, audible alarm information, video announcement Alarming information etc..
Specifically, described step 205 specifically includes: obtain the ID corresponding with the identification information of described mobile terminal Information;Output carries the warning information of described user totem information, and wherein user totem information can be the title letter of user Breath, further, in order to this user is monitored.
Further, described method also includes: by the network access device of configuration in the range of scheduled event, determine pre- The identification information of the mobile terminal collected in the section of fixing time, wherein, described predetermined amount of time and described default range of activity can It is set with actual demand, such as, is engraved in a position, place during A an explosion occurred case, in conjunction with the timing length of time bomb, Predetermined amount of time was configurable in the half an hour before the A moment or 1 hour, and scheduled event scope is configurable to place Centered by a, radius be 20 meters or the scope of 40 meters;Obtain the position of each network access device described identification information being detected Information, and the action trail information of the user corresponding with described mobile terminal is obtained according to described positional information;According to described row For trace information, detect whether described user exists exception;If existing, then outputting alarm information.
Such as, b position, place it is engraved in during B an explosion occurred case, by the half an hour before the B moment, with place b Centered by, radius be the equipment identification information that the mobile terminal collected in the range of 30 meters is corresponding, determined before the B moment In half an hour, centered by the b of place, radius be user a movable in the range of 30 meters.By the mobile end that user a is corresponding The equipment identification information of end, acquires the movable route track information of user a, because user a carried out place b, so this road Line tracking information exists place b, this route track information occurring in detection two weeks before the B moment, place b's is secondary Whether number more than or equal to 8 times, if number of times is more than or equal to 8 times, determine that user a exists abnormal, illustrate user a the B moment it Place b is repeatedly come, it may be possible to the work of setting foot-point carried out to manufacture case of explosion, so user a may in front two weeks For the suspect of this case of explosion, need user a is monitored, and then outputting alarm information.
The another kind of monitoring method that the present invention provides, first obtains each network of identification information mobile terminal being detected The positional information of connection equipment, and the action trail letter of the user corresponding with described mobile terminal is obtained according to described positional information Breath;Then detect whether described action trail information meets preset rules;The most then outputting alarm information.With pass through people at present Work mode is searched needs the specific crowd of monitoring to compare, and whether the present invention is by detecting the action trail information corresponding with user Meet preset rules, it is determined that whether this user is the targeted customer needing monitoring, the most then outputting alarm information, in order to this User is monitored, it is possible to achieve automatic searching needs the specific crowd of monitoring, can improve the searching efficiency of specific crowd, enter And security monitoring efficiency can be improved.
Further, as implementing of method described in Fig. 1, embodiments provide a kind of supervising device, as Shown in Fig. 3, described device includes: acquiring unit 31, detector unit 32, output unit 33.
Described acquiring unit 31, may be used for obtaining each network access device of identification information mobile terminal being detected Positional information, and obtain the action trail information of the user corresponding with described mobile terminal according to described positional information.
Described detector unit 32, whether the action trail information that may be used for detecting the acquisition of described acquiring unit 31 meets pre- If it is regular.
Described output unit 33, if may be used for described detector unit 32 to detect that described action trail information meets default Rule, then outputting alarm information.
It should be noted that other of each functional unit involved by a kind of supervising device of embodiment of the present invention offer are corresponding Describe, the corresponding description being referred in Fig. 1, do not repeat them here.
A kind of supervising device that the present invention provides, first obtains each network of identification information mobile terminal being detected even Connect the positional information of equipment, and obtain the action trail letter of the user corresponding with described mobile terminal according to described positional information Breath;Then detect whether described action trail information meets preset rules;The most then outputting alarm information.With pass through people at present Work mode is searched needs the specific crowd of monitoring to compare, and the present invention is by detecting whether the action trail information corresponding with user accords with Close preset rules, it is determined that whether this user is the targeted customer needing monitoring, the most then outputting alarm information, in order to this use Family is monitored, it is possible to achieve automatic searching needs the specific crowd of monitoring, can improve the searching efficiency of specific crowd, and then Security monitoring efficiency can be improved.
Further, as implementing of method described in Fig. 2, embodiments provide another kind of supervising device, As shown in Figure 4, described device includes: acquiring unit 41, detector unit 42, output unit 43.
Described acquiring unit 41, may be used for obtaining each network access device of identification information mobile terminal being detected Positional information, and obtain the action trail information of the user corresponding with described mobile terminal according to described positional information.
Described detector unit 42, whether the action trail information that may be used for detecting the acquisition of described acquiring unit 41 meets pre- If it is regular.
Described output unit 43, if may be used for described detector unit 42 to detect that described action trail information meets default Rule, then outputting alarm information.
Specifically, described detector unit 42 includes: detection module 421, determine module 422.
Described detection module 421, may be used for detecting in described action trail information whether there is preset critical place.
Described detection module 421, it is also possible to if there is preset critical place for detecting in described action trail information, Then detect in preset time period, described action trail information occurs the number of times in described preset critical place whether more than or etc. In predetermined times threshold value.
Described determine module 422, if may be used for described detection module 421 to detect that described number of times is more than or equal to described Predetermined times threshold value, it is determined that described action trail information meets described preset rules.
Described detection module 421, it is also possible to for according to described action trail information, detect the event trace of described user Whether it is in outside the default range of activity corresponding with described user.
Described determine module 422, it is also possible to if detecting at the event trace of described user for described detection module 421 Outside the default range of activity corresponding with described user, it is determined that described action trail information meets described preset rules.
Specifically, described device also comprises determining that unit 44.
Described determine unit 44, may be used for, by the network access device of configuration in the range of scheduled event, determining pre- The identification information of the mobile terminal collected in the section of fixing time.
Described acquiring unit 41, it is also possible to for obtaining the position of each network access device described identification information being detected Confidence ceases, and obtains the action trail information of the user corresponding with described mobile terminal according to described positional information.
Described detector unit 42, it is also possible to for the action trail information obtained according to described acquiring unit 41, detects institute State whether user exists exception.
Described output unit 43, it is also possible to if detecting that described user exists exception for described detector unit 42, the most defeated Go out warning information.
Described acquiring unit 41, it is also possible to for when there is the corresponding multiple identification information of a mobile terminal, from detection Obtain, in the heterogeneous networks connection equipment of the identification information of described mobile terminal, multiple marks that described mobile terminal is corresponding respectively Knowledge information.
Described determine unit 44, may be used for the highest for repetitive rate in whole identification informations corresponding for described mobile terminal Identification information, is defined as the identification information corresponding with described mobile terminal.
Specifically, described acquiring unit 41 includes: acquisition module 411, determine module 412.
Described acquisition module 411, may be used for, according to described positional information, obtaining the motion track letter of described mobile terminal Breath.
Described determine module 412, may be used for being defined as corresponding with described mobile terminal by described motion track information The action trail information of user.
Specifically, described output unit 43 includes: acquisition module 431, output module 432.
Described acquisition module 431, may be used for obtaining the ID letter corresponding with the identification information of described mobile terminal Breath.
Described output module 432, may be used for exporting the warning information carrying described user totem information.
It should be noted that other phases of each functional unit involved by the another kind of supervising device of embodiment of the present invention offer Should describe, the corresponding description being referred in Fig. 2, not repeat them here.
The another kind of supervising device that the present invention provides, first obtains each network of identification information mobile terminal being detected The positional information of connection equipment, and the action trail letter of the user corresponding with described mobile terminal is obtained according to described positional information Breath;Then detect whether described action trail information meets preset rules;The most then outputting alarm information.With pass through people at present Work mode is searched needs the specific crowd of monitoring to compare, and the present invention is by detecting whether the action trail information corresponding with user accords with Close preset rules, it is determined that whether this user is the targeted customer needing monitoring, the most then outputting alarm information, in order to this use Family is monitored, it is possible to achieve automatic searching needs the specific crowd of monitoring, can improve the searching efficiency of specific crowd, and then Security monitoring efficiency can be improved.
Embodiment of the invention discloses that:
A1, a kind of monitoring method, including:
Obtain the positional information of each network access device of identification information mobile terminal being detected, and according to institute's rheme Put the action trail information of the acquisition of information user corresponding with described mobile terminal;
Detect whether described action trail information meets preset rules;
The most then outputting alarm information.
A2, monitoring method as described in A1, whether described detection described action trail information meets preset rules includes:
Detect in described action trail information and whether there is preset critical place;
If existing, then detect and described action trail information occurs in preset time period the secondary of described preset critical place Whether number is more than or equal to predetermined times threshold value;
If, it is determined that described action trail information meets described preset rules.
A3, monitoring method as described in A1, whether described detection described action trail information meets preset rules includes:
According to described action trail information, detect whether the event trace of described user is in corresponding with described user pre- If outside range of activity;
If, it is determined that described action trail information meets described preset rules.
A4, monitoring method as described in A1, described method also includes:
By the network access device of configuration in the range of scheduled event, determine the mobile end collected in predetermined amount of time The identification information of end;
Obtain the positional information of each network access device described identification information being detected, and according to described positional information Obtain the action trail information of the user corresponding with described mobile terminal;
According to described action trail information, detect whether described user exists exception;
If existing, then outputting alarm information.
A5, monitoring method as described in A1, described acquisition detects that each network of the identification information of mobile terminal connects Before the positional information of equipment, described method also includes:
When there is the corresponding multiple identification information of mobile terminal, from the identification information described mobile terminal being detected Heterogeneous networks connection equipment obtains multiple identification informations that described mobile terminal is corresponding respectively;
By identification information the highest for repetitive rate in whole identification informations corresponding for described mobile terminal, it is defined as and described shifting The identification information that dynamic terminal is corresponding.
A6, monitoring method as described in A1, described obtain the use corresponding with described mobile terminal according to described positional information The action trail information at family includes:
According to described positional information, obtain the motion track information of described mobile terminal;
Described motion track information is defined as the action trail information of the user corresponding with described mobile terminal.
A7, monitoring method as described in A1, described outputting alarm information includes:
Obtain the user totem information corresponding with the identification information of described mobile terminal;
Output carries the warning information of described user totem information.
B8, a kind of supervising device, including:
Acquiring unit, for obtaining the position letter of each network access device of identification information mobile terminal being detected Breath, and the action trail information of the user corresponding with described mobile terminal is obtained according to described positional information;
Detector unit, whether the action trail information obtained for detecting described acquiring unit meets preset rules;
Output unit, if detecting that described action trail information meets preset rules for described detector unit, then exports Warning information.
B9, supervising device as described in B8, described detector unit includes:
Detection module, is used for detecting in described action trail information whether there is preset critical place;
, there is preset critical place if being additionally operable to detect in described action trail information, then detect in described detection module Described action trail information occurs in preset time period the number of times in described preset critical place whether more than or equal to preset Frequency threshold value;
Determine module, if detecting that described number of times is more than or equal to described predetermined times threshold value for described detection module, Then determine that described action trail information meets described preset rules.
B10, supervising device as described in B8, described detector unit includes:
Detection module, for according to described action trail information, whether the event trace detecting described user is in and institute State outside the default range of activity that user is corresponding;
Determine module, if it is corresponding with described user to detect that the event trace of described user is in for described detection module Default range of activity outside, it is determined that described action trail information meets described preset rules.
B11, supervising device as described in B8, described device also comprises determining that unit;
Described determine unit, for by the network access device of configuration in the range of scheduled event, determining the scheduled time The identification information of the mobile terminal collected in Duan;
Described acquiring unit, is additionally operable to obtain the position letter of each network access device described identification information being detected Breath, and the action trail information of the user corresponding with described mobile terminal is obtained according to described positional information;
Described detector unit, is additionally operable to the action trail information obtained according to described acquiring unit, and detecting described user is No existence is abnormal;
Described output unit, if being additionally operable to described detector unit to detect that described user exists exception, then outputting alarm letter Breath.
B12, supervising device as described in B8, described device also comprises determining that unit;
Described acquiring unit, is additionally operable to when there is the corresponding multiple identification information of a mobile terminal, described from detecting The heterogeneous networks connection equipment of the identification information of mobile terminal obtains multiple identification informations that described mobile terminal is corresponding respectively;
Described determine unit, for by mark letter the highest for repetitive rate in whole identification informations corresponding for described mobile terminal Breath, is defined as the identification information corresponding with described mobile terminal.
B13, supervising device as described in B8, described acquiring unit includes:
Acquisition module, for according to described positional information, obtains the motion track information of described mobile terminal;
Determine module, for described motion track information being defined as the behavior rail of the user corresponding with described mobile terminal Mark information.
B14, supervising device as described in B8, described output unit includes:
Acquisition module, for obtaining the user totem information corresponding with the identification information of described mobile terminal;
Output module, carries the warning information of described user totem information for output.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has the portion described in detail in certain embodiment Point, may refer to the associated description of other embodiments.
It is understood that the correlated characteristic in said method and device can mutually reference.It addition, in above-described embodiment " first ", " second " etc. be for distinguishing each embodiment, and do not represent the quality of each embodiment.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, and the system of foregoing description, The specific works process of device and unit, is referred to the corresponding process in preceding method embodiment, does not repeats them here.
Algorithm and display are not intrinsic to any certain computer, virtual system or miscellaneous equipment relevant provided herein. Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system Structure be apparent from.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to use various Programming language realizes the content of invention described herein, and the description done language-specific above is to disclose this Bright preferred forms.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that the enforcement of the present invention Example can be put into practice in the case of not having these details.In some instances, it is not shown specifically known method, structure And technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that one or more in order to simplify that the disclosure helping understands in each inventive aspect, exist Above in the description of the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes In example, figure or descriptions thereof.But, the method for the disclosure should not be construed to reflect an intention that i.e. required guarantor The application claims feature more more than the feature being expressly recited in each claim protected.More precisely, as following Claims reflected as, inventive aspect is all features less than single embodiment disclosed above.Therefore, The claims following detailed description of the invention are thus expressly incorporated in this detailed description of the invention, the most each claim itself All as the independent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out the module in the equipment in embodiment adaptively Change and they are arranged in one or more equipment different from this embodiment.Can be the module in embodiment or list Unit or assembly are combined into a module or unit or assembly, and can put them in addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit excludes each other, can use any Combine all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed appoint Where method or all processes of equipment or unit are combined.Unless expressly stated otherwise, this specification (includes adjoint power Profit requires, summary and accompanying drawing) disclosed in each feature can be carried out generation by providing identical, equivalent or the alternative features of similar purpose Replace.
Although additionally, it will be appreciated by those of skill in the art that embodiments more described herein include other embodiments Some feature included by rather than further feature, but the combination of the feature of different embodiment means to be in the present invention's Within the scope of and form different embodiments.Such as, in the following claims, embodiment required for protection appoint One of meaning can mode use in any combination.
The all parts embodiment of the present invention can realize with hardware, or to run on one or more processor Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that and can use in practice What microprocessor or digital signal processor (DSP) realized according to embodiments of the present invention a kind of monitors in method and device The some or all functions of some or all parts.The present invention is also implemented as performing method as described herein Part or all equipment or device program (such as, computer program and computer program).Such reality The program of the existing present invention can store on a computer-readable medium, or can be to have the form of one or more signal. Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or with any other form There is provided.
The present invention will be described rather than limits the invention to it should be noted above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference marks that should not will be located between bracket is configured to limitations on claims.Word " comprises " and does not excludes the presence of not Arrange element in the claims or step.Word "a" or "an" before being positioned at element does not excludes the presence of multiple such Element.The present invention and can come real by means of including the hardware of some different elements by means of properly programmed computer Existing.If in the unit claim listing equipment for drying, several in these devices can be by same hardware branch Specifically embody.Word first, second and third use do not indicate that any order.These word explanations can be run after fame Claim.

Claims (10)

1. a monitoring method, it is characterised in that including:
Obtain the positional information of each network access device of identification information mobile terminal being detected, and believe according to described position Breath obtains the action trail information of the user corresponding with described mobile terminal;
Detect whether described action trail information meets preset rules;
The most then outputting alarm information.
Monitoring method the most according to claim 1, it is characterised in that whether described detection described action trail information meets Preset rules includes:
Detect in described action trail information and whether there is preset critical place;
If existing, then detect and described action trail information occurring in preset time period, the number of times in described preset critical place is No more than or equal to predetermined times threshold value;
If, it is determined that described action trail information meets described preset rules.
Monitoring method the most according to claim 1, it is characterised in that whether described detection described action trail information meets Preset rules includes:
According to described action trail information, whether the event trace detecting described user is in the default work corresponding with described user Outside dynamic scope;
If, it is determined that described action trail information meets described preset rules.
Monitoring method the most according to claim 1, it is characterised in that described method also includes:
By the network access device of configuration in the range of scheduled event, determine the mobile terminal collected in predetermined amount of time Identification information;
Obtain the positional information of each network access device described identification information being detected, and obtain according to described positional information The action trail information of the user corresponding with described mobile terminal;
According to described action trail information, detect whether described user exists exception;
If existing, then outputting alarm information.
Monitoring method the most according to claim 1, it is characterised in that described acquisition detects the identification information of mobile terminal Each network access device positional information before, described method also includes:
When there is the corresponding multiple identification information of a mobile terminal, from the difference of the identification information described mobile terminal being detected Network access device obtains multiple identification informations that described mobile terminal is corresponding respectively;
By identification information the highest for repetitive rate in whole identification informations corresponding for described mobile terminal, it is defined as mobile whole with described The identification information that end is corresponding.
Monitoring method the most according to claim 1, it is characterised in that described according to the acquisition of described positional information and described shifting The action trail information of the user that dynamic terminal is corresponding includes:
According to described positional information, obtain the motion track information of described mobile terminal;
Described motion track information is defined as the action trail information of the user corresponding with described mobile terminal.
Monitoring method the most according to claim 1, it is characterised in that described outputting alarm information includes:
Obtain the user totem information corresponding with the identification information of described mobile terminal;
Output carries the warning information of described user totem information.
8. a supervising device, it is characterised in that including:
Acquiring unit, for obtaining the positional information of each network access device of identification information mobile terminal being detected, and The action trail information of the user corresponding with described mobile terminal is obtained according to described positional information;
Detector unit, whether the action trail information obtained for detecting described acquiring unit meets preset rules;
Output unit, if detecting that described action trail information meets preset rules for described detector unit, then outputting alarm Information.
Supervising device the most according to claim 8, it is characterised in that described detector unit includes:
Detection module, is used for detecting in described action trail information whether there is preset critical place;
, there is preset critical place if being additionally operable to detect in described action trail information, then detect in advance in described detection module If described action trail information occurring the number of times in described preset critical place whether more than or equal to predetermined times in the time period Threshold value;
Determine module, if detecting that described number of times is more than or equal to described predetermined times threshold value, the most really for described detection module Fixed described action trail information meets described preset rules.
Supervising device the most according to claim 8, it is characterised in that described detector unit includes:
Detection module, for according to described action trail information, whether the event trace detecting described user is in and described use Outside the default range of activity that family is corresponding;
Determine module, if it is corresponding with described user pre-to detect that the event trace of described user is in for described detection module If outside range of activity, it is determined that described action trail information meets described preset rules.
CN201610505929.9A 2016-06-30 2016-06-30 Monitoring method and apparatus Pending CN106056867A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610505929.9A CN106056867A (en) 2016-06-30 2016-06-30 Monitoring method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610505929.9A CN106056867A (en) 2016-06-30 2016-06-30 Monitoring method and apparatus

Publications (1)

Publication Number Publication Date
CN106056867A true CN106056867A (en) 2016-10-26

Family

ID=57201350

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610505929.9A Pending CN106056867A (en) 2016-06-30 2016-06-30 Monitoring method and apparatus

Country Status (1)

Country Link
CN (1) CN106056867A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107158685A (en) * 2017-04-28 2017-09-15 北京小米移动软件有限公司 Locomotion assay method and apparatus
CN107580019A (en) * 2017-07-31 2018-01-12 上海与德科技有限公司 The method, apparatus and server that a kind of missing target is given for change
CN109241809A (en) * 2017-07-10 2019-01-18 中兴通讯股份有限公司 A kind of data analysing method, relevant device and computer readable storage medium
CN110164087A (en) * 2019-05-11 2019-08-23 任明和 Realize the method for real-time monitoring to monitored people's safety
CN111159719A (en) * 2019-12-31 2020-05-15 奇安信科技集团股份有限公司 Determination method and device of conflict authority, computer equipment and storage medium
CN111372197A (en) * 2020-03-12 2020-07-03 深圳市天彦通信股份有限公司 Early warning method and related device

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6470319B1 (en) * 1999-06-25 2002-10-22 Community Corrections Improvement Association Data processing system for determining case management plan for criminal offender
CN1777281A (en) * 2004-11-17 2006-05-24 株式会社日立制作所 Monitoring system using multiple pick-up cameras
CN103716777A (en) * 2013-12-18 2014-04-09 厦门市美亚柏科信息股份有限公司 Wireless terminal MAC address acquisition method and device
CN103747464A (en) * 2014-01-17 2014-04-23 北京赢销通软件技术有限公司 Mobile terminal motion trail analyzing system
CN103889056A (en) * 2014-04-16 2014-06-25 北京极科极客科技有限公司 Method and system for tracking wireless terminal moving track
CN105049814A (en) * 2015-08-12 2015-11-11 山东合天智汇信息技术有限公司 Method and system for monitoring motion track of analyst
CN105163278A (en) * 2015-08-12 2015-12-16 山东合天智汇信息技术有限公司 Wireless client position track monitoring system and method based on mobile terminal
CN105208206A (en) * 2015-08-31 2015-12-30 北京奇虎科技有限公司 Mobile terminal anti-tracking method and mobile terminal
CN105323713A (en) * 2014-06-20 2016-02-10 中兴通讯股份有限公司 Technical investigation method and system based on passive positioning
CN105554744A (en) * 2015-12-16 2016-05-04 苏州寻息电子科技有限公司 Safety protection method for positioning node
CN105916116A (en) * 2016-06-30 2016-08-31 北京奇虎科技有限公司 Monitoring method and device based on movement locus information

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6470319B1 (en) * 1999-06-25 2002-10-22 Community Corrections Improvement Association Data processing system for determining case management plan for criminal offender
CN1777281A (en) * 2004-11-17 2006-05-24 株式会社日立制作所 Monitoring system using multiple pick-up cameras
CN103716777A (en) * 2013-12-18 2014-04-09 厦门市美亚柏科信息股份有限公司 Wireless terminal MAC address acquisition method and device
CN103747464A (en) * 2014-01-17 2014-04-23 北京赢销通软件技术有限公司 Mobile terminal motion trail analyzing system
CN103889056A (en) * 2014-04-16 2014-06-25 北京极科极客科技有限公司 Method and system for tracking wireless terminal moving track
CN105323713A (en) * 2014-06-20 2016-02-10 中兴通讯股份有限公司 Technical investigation method and system based on passive positioning
CN105049814A (en) * 2015-08-12 2015-11-11 山东合天智汇信息技术有限公司 Method and system for monitoring motion track of analyst
CN105163278A (en) * 2015-08-12 2015-12-16 山东合天智汇信息技术有限公司 Wireless client position track monitoring system and method based on mobile terminal
CN105208206A (en) * 2015-08-31 2015-12-30 北京奇虎科技有限公司 Mobile terminal anti-tracking method and mobile terminal
CN105554744A (en) * 2015-12-16 2016-05-04 苏州寻息电子科技有限公司 Safety protection method for positioning node
CN105916116A (en) * 2016-06-30 2016-08-31 北京奇虎科技有限公司 Monitoring method and device based on movement locus information

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107158685A (en) * 2017-04-28 2017-09-15 北京小米移动软件有限公司 Locomotion assay method and apparatus
CN109241809A (en) * 2017-07-10 2019-01-18 中兴通讯股份有限公司 A kind of data analysing method, relevant device and computer readable storage medium
CN107580019A (en) * 2017-07-31 2018-01-12 上海与德科技有限公司 The method, apparatus and server that a kind of missing target is given for change
CN110164087A (en) * 2019-05-11 2019-08-23 任明和 Realize the method for real-time monitoring to monitored people's safety
CN111159719A (en) * 2019-12-31 2020-05-15 奇安信科技集团股份有限公司 Determination method and device of conflict authority, computer equipment and storage medium
CN111159719B (en) * 2019-12-31 2022-02-08 奇安信科技集团股份有限公司 Determination method and device of conflict authority, computer equipment and storage medium
CN111372197A (en) * 2020-03-12 2020-07-03 深圳市天彦通信股份有限公司 Early warning method and related device
CN111372197B (en) * 2020-03-12 2021-03-19 深圳市天彦通信股份有限公司 Early warning method and related device

Similar Documents

Publication Publication Date Title
CN106056867A (en) Monitoring method and apparatus
US10187411B2 (en) Method for intrusion detection in industrial automation and control system
CN106506556B (en) A kind of network flow abnormal detecting method and device
CA2562358C (en) Method and system for distinguishing relevant network security threats using comparison of refined intrusion detection audits and intelligent security analysis
CA2954552C (en) Method for detecting an attack in a computer network
CN111193728B (en) Network security evaluation method, device, equipment and storage medium
CN107566163A (en) A kind of alarm method and device of user behavior analysis association
CN106056690A (en) Line-protecting intelligent inspection method and system based on big data, cloud platform and internet of things
KR20120068611A (en) Apparatus and method for security situation awareness and situation information generation based on spatial linkage of physical and it security
CN105549508B (en) A kind of alarm method and device merged based on information
WO2020080047A1 (en) Incursion location identification device and incursion location identification method
CN108574839B (en) Bayonet equipment abnormity detection method and device
CN109413071A (en) A kind of anomalous traffic detection method and device
CN106060778A (en) Target location determination method and device
CN110619738B (en) Joint defense warning method and device
CN104716740A (en) Fixed value calibration method, device and system for relay protection device
CN112817814A (en) Abnormity monitoring method, system, storage medium and electronic device
CN110286300A (en) A kind of multi branch electric power lines road Fault Locating Method, device, equipment and system
US11774627B2 (en) Method for characterizing a radiation source by a radiation portal monitoring system
CN106211065A (en) The monitoring method and device of personnel's data on flows
KR101444250B1 (en) System for monitoring access to personal information and method therefor
CN107507400B (en) A kind of circumference monitoring protection system and method based on fusion array
CN106332016A (en) Association method and device for WIFI devices
Schauer et al. Conceptual framework for hybrid situational awareness in critical port infrastructures
CN104333489B (en) Detection method, apparatus and system to blank pipe supervision equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161026

RJ01 Rejection of invention patent application after publication