CN108718440B - Security method and platform for sensitive area - Google Patents

Security method and platform for sensitive area Download PDF

Info

Publication number
CN108718440B
CN108718440B CN201810225508.XA CN201810225508A CN108718440B CN 108718440 B CN108718440 B CN 108718440B CN 201810225508 A CN201810225508 A CN 201810225508A CN 108718440 B CN108718440 B CN 108718440B
Authority
CN
China
Prior art keywords
sensitive area
mobile user
base station
mobile
cell information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810225508.XA
Other languages
Chinese (zh)
Other versions
CN108718440A (en
Inventor
李希金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810225508.XA priority Critical patent/CN108718440B/en
Publication of CN108718440A publication Critical patent/CN108718440A/en
Application granted granted Critical
Publication of CN108718440B publication Critical patent/CN108718440B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed

Abstract

The invention discloses a security method and a security platform for a sensitive area, wherein the method comprises the following steps: the method comprises the steps of obtaining a mobile user identification for visiting a sensitive area, judging whether a pre-generated trusted user database comprises the mobile user identification, if the mobile user identification is judged not to be included in the pre-generated trusted user database, generating the number of the visited sensitive areas corresponding to the mobile user identification according to the mobile user identification and a pre-obtained sensitive area database, and giving an early warning according to the number of the visited sensitive areas. The invention mines the track of the mobile user based on the core network data of the operator, can find the mobile user frequently approaching the sensitive area in time, and effectively maintains the national security and benefits.

Description

Security method and platform for sensitive area
Technical Field
The invention relates to the technical field of communication, in particular to a security method and a security platform for a sensitive area.
Background
At present, big data technology has become a new driving force for social and economic development, and with the improvement of data collection means and capacity, big data technology revolution taking high-performance large-scale data processing capacity as a core technology is brought, the core of the existing big data technology relates to a data mining algorithm, specifically, characteristics are mined from big data, new data are generated through scientific modeling, and finally, a predictive analysis result is obtained. Meanwhile, in the telecommunication industry, mobile phones have been popularized greatly, the popularization of mobile phones drives the traffic application of operators, and mining the basic data of mobile phones collected by the operators brings more additional values, specifically, the basic data comprises detailed information such as user numbers, startup and shutdown, position updating and the like.
With the enhancement of comprehensive national strength of China, effective maintenance of national security and benefits is necessary to be realized by utilizing various social resources. In the prior art, an operator only performs mobile phone basic data mining aiming at service development of the operator, and application of the data mining in the aspect of national security is not considered.
Disclosure of Invention
The invention provides a security method and a security platform for a sensitive area, which are used for mining the track of a mobile user based on core network data of an operator, so that the mobile user frequently approaching the sensitive area can be found in time, and the national security and benefits are effectively maintained.
In order to achieve the purpose, the invention provides a security method of a sensitive area, which comprises the following steps:
acquiring a mobile user identifier for accessing a sensitive area;
judging whether a pre-generated trusted user database comprises the mobile user identification;
if the mobile user identification is not included in the pre-generated credible user database, generating the access number of the sensitive areas corresponding to the mobile user identification according to the mobile user identification and a pre-acquired sensitive area database;
and carrying out early warning according to the access number of the sensitive areas.
Optionally, before the obtaining the mobile user identifier for accessing the sensitive area, the method further includes:
storing base station information of a sensitive area, wherein the base station information comprises base station cell information;
the acquiring the mobile user identification of the access sensitive area comprises:
acquiring signaling data of a mobile user, wherein the signaling data comprises a mobile user identifier and user cell information corresponding to the mobile user identifier;
judging whether the user cell information is the same as the base station cell information of the sensitive area;
and if the user cell information is judged to be the same as the base station cell information of the sensitive area, acquiring a mobile user identifier corresponding to the user cell information from the signaling data.
Optionally, before the obtaining the mobile user identifier for accessing the sensitive area, the method further includes:
storing base station information of a sensitive area, wherein the base station information comprises base station cell information and historical access data corresponding to the base station cell information;
before the generating of the number of the sensitive area accesses corresponding to the mobile user identifier according to the mobile user identifier and a sensitive area database acquired in advance, the method further comprises:
generating a sensitive area database according to the base station information of the sensitive area, wherein the sensitive area database comprises the base station cell information of the sensitive area and historical access data corresponding to the base station cell information of the sensitive area;
the generating of the number of the sensitive area accesses corresponding to the mobile user identifier according to the mobile user identifier and a pre-acquired sensitive area database comprises:
generating base station cell information corresponding to the mobile user identification according to the mobile user identification and historical access data corresponding to the base station cell information of the sensitive area;
and generating the number of the sensitive area accesses corresponding to the mobile user identification according to the base station cell information corresponding to the mobile user identification.
Optionally, the performing early warning according to the number of the accessed sensitive areas includes:
judging whether the access number of the sensitive areas is larger than a first threshold value or not;
and if the number of the accessed sensitive areas is judged to be larger than a first threshold value, sending a first early warning signal according to the number of the accessed sensitive areas.
Optionally, the obtaining the mobile user identifier for accessing the sensitive area includes:
acquiring signaling data of a mobile user, wherein the signaling data comprises a mobile user identifier and access time information corresponding to the mobile user identifier;
after the determining whether the number of the accessed sensitive areas is greater than a first threshold value, the method further includes:
if the access number of the sensitive areas is judged to be less than or equal to a first threshold value, acquiring the number of IMSI codes of the mobile users corresponding to the mobile user identification;
judging whether the number of the IMSI codes of the mobile subscriber is larger than a second threshold value and whether the access time information corresponding to the mobile subscriber identification is abnormal;
and if the number of the IMSI codes of the mobile subscriber is judged to be larger than a second threshold value and the access time information corresponding to the mobile subscriber identification is abnormal, sending a second early warning signal according to the number of the IMSI codes of the mobile subscriber and the access time information corresponding to the mobile subscriber identification.
Optionally, the mobile subscriber identity is a mobile subscriber IMEI code.
Optionally, before the determining whether the mobile subscriber identity is included in the pre-generated trusted subscriber database, the method further includes:
collecting a credible number in a sensitive area;
acquiring a credible IMSI code corresponding to the credible number;
acquiring a credible mobile subscriber IMEI code corresponding to the credible mobile subscriber IMSI code;
and generating a trusted user database according to the IMEI code of the trusted mobile user and the IMSI code of the trusted mobile user corresponding to the IMEI code of the trusted mobile user.
In order to achieve the above object, the present invention provides a security platform for a sensitive area, comprising:
the acquisition module is used for acquiring the mobile user identification for accessing the sensitive area;
the judging module is used for judging whether a pre-generated trusted user database comprises the mobile user identification;
the generating module is used for generating the access number of the sensitive areas corresponding to the mobile user identification according to the mobile user identification and a pre-acquired sensitive area database if the judging module judges that the pre-generated trusted user database does not comprise the mobile user identification;
and the early warning module is used for early warning according to the access number of the sensitive areas.
Optionally, the method further comprises:
the storage module is used for storing base station information of a sensitive area, wherein the base station information comprises base station cell information;
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring signaling data of a mobile user, and the signaling data comprises a mobile user identifier and user cell information corresponding to the mobile user identifier;
the judging module is also used for judging whether the user cell information is the same as the base station cell information of the sensitive area;
the obtaining module is specifically configured to obtain a mobile user identifier corresponding to the user cell information from the signaling data if the determining module determines that the user cell information is the same as the base station cell information of the sensitive area.
Optionally, the storage module is specifically configured to store base station information of a sensitive area, where the base station information includes base station cell information and historical access data corresponding to the base station cell information;
the generation module is specifically configured to generate a sensitive area database according to base station information of a sensitive area, where the sensitive area database includes base station cell information of the sensitive area and historical access data corresponding to the base station cell information of the sensitive area, generate base station cell information corresponding to a mobile user identifier according to the mobile user identifier and the historical access data corresponding to the base station cell information of the sensitive area, and generate the number of sensitive area accesses corresponding to the mobile user identifier according to the base station cell information corresponding to the mobile user identifier.
Optionally, the acquisition module is further configured to acquire signaling data of the mobile user, where the signaling data includes a mobile user identifier and access time information corresponding to the mobile user identifier;
the judging module is also used for judging whether the access number of the sensitive area is greater than a first threshold value or not, and judging whether the IMSI code number of the mobile subscriber is greater than a second threshold value or not and whether the access time information corresponding to the mobile subscriber identity is abnormal or not;
the obtaining module is further used for obtaining the number of IMSI codes of the mobile users corresponding to the mobile user identification if the judging module judges that the access number of the sensitive areas is smaller than or equal to a first threshold value;
the early warning module is specifically configured to send a first early warning signal according to the number of the access to the sensitive area if the judgment module judges that the number of the IMSI number of the mobile subscriber is greater than the first threshold, and send a second early warning signal according to the number of the IMSI number of the mobile subscriber and the access time information corresponding to the mobile subscriber identity if the judgment module judges that the number of the IMSI number of the mobile subscriber is greater than the second threshold and the access time information corresponding to the mobile subscriber identity is abnormal.
The invention has the following beneficial effects:
the security method of the sensitive area obtains the mobile user identification for visiting the sensitive area, judges whether the mobile user identification is included in the pre-generated credible user database, if the mobile user identification is not included in the pre-generated credible user database, generates the visit number of the sensitive area corresponding to the mobile user identification according to the mobile user identification and the pre-obtained sensitive area database, and carries out early warning according to the visit number of the sensitive area. The method mines the track of the mobile user based on the core network data of the operator, can timely discover the mobile user frequently approaching the sensitive area, and effectively maintains the national security and benefits.
Drawings
Fig. 1 is a schematic flowchart of a security method for a sensitive area according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a security method for a sensitive area according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a security platform of a sensitive area according to a third embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the following clear and complete description of the technical solution of the present invention is made with reference to the accompanying drawings, and it is obvious that the described embodiments are a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
Example one
Fig. 1 is a schematic flowchart of a security method for a sensitive area according to a first embodiment of the present invention, and as shown in fig. 1, the method includes:
step 101, obtaining a mobile user identifier for accessing a sensitive area.
Step 102, judging whether the pre-generated trusted user database includes the mobile user identifier, if so, executing step 103, and if so, ending the process.
103, generating the number of access to the sensitive area corresponding to the mobile user identifier according to the mobile user identifier and a pre-acquired sensitive area database.
And 104, early warning is carried out according to the access number of the sensitive areas.
The security method for the sensitive area, provided by this embodiment, includes obtaining a mobile user identifier for accessing the sensitive area, determining whether a pre-generated trusted user database includes the mobile user identifier, if it is determined that the pre-generated trusted user database does not include the mobile user identifier, generating an access number of the sensitive area corresponding to the mobile user identifier according to the mobile user identifier and a pre-obtained sensitive area database, and performing early warning according to the access number of the sensitive area. The method mines the track of the mobile user based on the core network data of the operator, can timely discover the mobile user frequently approaching the sensitive area, and effectively maintains the national security and benefits.
Example two
Fig. 2 is a schematic flow chart of a method provided in the second embodiment, and as shown in fig. 2, the method includes:
step 201, collecting a credible number in a sensitive area.
Preferably, each step in this embodiment is executed by a security platform of the sensitive area.
The sensitive area can be a plurality of peripheral areas of key security units which are distributed all over the country and relate to national security.
Specifically, both the staff in the sensitive area and the mobile users who live in the sensitive area or around the sensitive area are trusted users, and the mobile phone number corresponding to the trusted user is the trusted number.
Step 202, obtaining the IMSI number of the trusted mobile subscriber corresponding to the trusted number.
The IMSI Number (International Mobile Subscriber identity) of the trusted Mobile Subscriber corresponding to the trusted Number is specifically logged into the network through the base station covering the sensitive area 90% of the time during the period of 00:01-07:00 in a day.
Step 203, obtaining the trusted IMEI code corresponding to the trusted IMSI code of the mobile subscriber.
In this embodiment, the security platform in the sensitive area may obtain, based on the operator, an International Mobile Equipment Identity (IMEI) code of the trusted Mobile subscriber corresponding to the IMSI code of the trusted Mobile subscriber.
Specifically, there may be a plurality of IMEI codes corresponding to one IMSI code, and there may also be a plurality of IMSI codes corresponding to one IMEI code.
And 204, generating a trusted user database according to the IMEI code of the trusted mobile user and the IMSI code of the trusted mobile user corresponding to the IMEI code of the trusted mobile user.
And generating a sensitive area credible user database according to the credible mobile user IMEI code and one or more credible mobile user IMSI codes corresponding to the credible mobile user IMEI code.
Preferably, the trusted user database is maintained regularly according to the changing condition of the trusted users, because the trusted users are a changing group.
And step 205, storing the base station information of the sensitive area.
In this embodiment, there are multiple sensitive areas, each sensitive area corresponds to multiple base stations, and the base station information of all the base stations corresponding to the multiple sensitive areas is stored. The base station information includes base station cell information and historical access data corresponding to the base station cell information.
The Cell information of the base station is Cell information corresponding to the base station, and the Cell information includes LAC (location area code) and CI (Cell Identity). LAC is a 2-byte 16-ary BCD code (Binary-Coded decimal) and CI is a decimal code with a value ranging from 0 to 65536.
And step 206, generating a sensitive area database according to the base station information of the sensitive area, wherein the sensitive area database comprises the base station cell information of the sensitive area and historical access data corresponding to the base station cell information of the sensitive area.
In particular, the historical access data includes the mobile subscriber IMEI code that accessed the network through the base station of the sensitive area.
Optionally, the historical access data further includes historical access time points, historical access time periods and access base station codes corresponding to IMEI codes of mobile users accessing the network through the base stations of the sensitive area.
Step 207, obtaining the IMEI code of the mobile subscriber visiting the sensitive area.
Specifically, step 207 includes the steps of:
step 207a, collecting signaling data of the mobile subscriber, where the signaling data includes an IMEI code of the mobile subscriber and user cell information corresponding to the IMEI code of the mobile subscriber.
Acquiring signaling Data through an LTE (Long Term Evolution) core network in real time, analyzing the signaling Data into XDR (External Data Representation) signaling Data, analyzing and extracting IMEI (international mobile equipment identity), LAC (local area network) and CI (common interface) of a mobile user, wherein the LAC and the CI are user cell information.
Furthermore, the signaling data further includes time information, and the time information is an access time point corresponding to the IMEI code of the mobile subscriber.
Step 207b, determining whether the user cell information is the same as the base station cell information of the sensitive area, if so, executing step 207c, and if not, ending the process.
And judging whether the LAC and the CI in the base station cell information and the user cell information are the same, if so, indicating that the IMEI code of the mobile user corresponding to the user cell information is accessed through a base station access network in a sensitive area corresponding to the base station cell information.
Step 207c, obtaining the IMEI code of the mobile subscriber corresponding to the user cell information from the signaling data.
Step 208, judging whether the pre-generated trusted subscriber database includes the mobile subscriber IMEI code, if so, executing step 209, and if so, ending the process.
If the mobile user IMEI code is judged to be included in the pre-generated credible user database, the mobile user corresponding to the mobile user IMEI code is represented as a credible user, and subsequent tracking of the mobile user is not needed.
If the mobile user IMEI code is judged not to be included in the pre-generated credible user database, the mobile user corresponding to the mobile user IMEI code is represented as an incredible user.
And 209, generating the number of the sensitive areas corresponding to the IMEI code of the mobile user according to the IMEI code of the mobile user and a pre-acquired sensitive area database.
Specifically, step 209 comprises the steps of:
step 209a, generating the base station cell information corresponding to the IMEI code of the mobile user according to the IMEI code of the mobile user and the historical access data corresponding to the base station cell information of the sensitive area.
The cell information of the base station corresponding to the IMEI code of the mobile user comprises the base station visited by the IMEI code of the mobile user and the sensitive areas respectively corresponding to the base stations.
Step 209b, generating the number of the sensitive area access corresponding to the IMEI code of the mobile user according to the base station cell information corresponding to the IMEI code of the mobile user.
Specifically, the number of sensitive areas that the IMEI code of the mobile subscriber has visited is counted. Preferably, the number of access times of the sensitive areas corresponding to the IMEI code of the mobile subscriber and the access times of each sensitive area in descending order are generated.
And 210, early warning is carried out according to the access number of the sensitive areas.
Specifically, step 210 includes the steps of:
step 210a, determining whether the number of the sensitive area accesses is greater than a first threshold, if so, executing step 210b, and if not, executing step 210 c.
And step 210b, sending a first early warning signal according to the access number of the sensitive areas.
Preferably, the first threshold is two. If the number of the sensitive areas of the IMEI code of the mobile user is more than two, the terminal corresponding to the IMEI code of the mobile user is identified and appears in the sensitive area for many times, the IMEI code of the mobile user is suspicious, and a first early warning signal comprising the number of the sensitive areas is sent out.
Step 210c, obtaining the number of the IMSI codes of the mobile users corresponding to the IMEI codes of the mobile users.
And if the number of the sensitive areas of the IMEI code of the mobile subscriber is less than or equal to two, acquiring the number of the IMSI code of the mobile subscriber corresponding to the IMEI code of the mobile subscriber. In this embodiment, if the number of the IMSI codes of a certain mobile subscriber corresponding to the IMEI code is multiple, it indicates that the terminal corresponding to the IMEI code of the mobile subscriber has used multiple IMSI codes of the mobile subscriber.
Step 210d, determining whether the number of the IMSI codes of the mobile subscriber is greater than a second threshold and the access time information corresponding to the IMEI code of the mobile subscriber is abnormal, and if it is determined that the number of the IMSI codes of the mobile subscriber is greater than the second threshold and the access time information corresponding to the IMEI code of the mobile subscriber is abnormal, executing step 210 e; otherwise, the flow ends.
Preferably, the second threshold is two.
And step 210e, sending a second early warning signal according to the number of the IMSI codes of the mobile users and the access time information corresponding to the IMEI codes of the mobile users.
If the number of the IMSI codes of the mobile subscriber is judged to be more than twice and the access time information corresponding to the IMEI code of the mobile subscriber is abnormal, the fact that the user corresponding to the IMEI code of the mobile subscriber uses the same terminal for replacing different telephone numbers for multiple times to access a sensitive area is shown, the IMEI code of the mobile subscriber is suspicious, and a second early warning signal is sent out.
Preferably, whether the access time point in the access time information corresponding to the IMEI code of the mobile subscriber is between 22:00 and 5:00 is determined, and if the access time point in the access time information corresponding to the IMEI code of the mobile subscriber is determined to be between 22:00 and 5:00, it is determined that the access time information corresponding to the IMEI code of the mobile subscriber is abnormal.
And subsequently, if the number of the IMSI codes of the mobile users is judged to be less than or equal to a second threshold value or the access time information corresponding to the IMEI codes of the mobile users is normal, storing the access data corresponding to the IMEI codes of the mobile users into a sensitive area database so as to update the sensitive area database.
The security method for the sensitive area, provided by this embodiment, includes obtaining a mobile user identifier for accessing the sensitive area, determining whether a pre-generated trusted user database includes the mobile user identifier, if it is determined that the pre-generated trusted user database does not include the mobile user identifier, generating an access number of the sensitive area corresponding to the mobile user identifier according to the mobile user identifier and a pre-obtained sensitive area database, and performing early warning according to the access number of the sensitive area. The method mines the track of the mobile user based on the core network data of the operator, can timely discover the mobile user frequently approaching the sensitive area, and effectively maintains the national security and benefits.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a security platform of a sensitive area provided in this embodiment three, as shown in fig. 3, the platform includes: the device comprises an acquisition module 11, a judgment module 12, a generation module 13 and an early warning module 14.
The obtaining module 11 is configured to obtain a mobile subscriber identity for accessing a sensitive area.
The judging module 12 is configured to judge whether the pre-generated trusted subscriber database includes the mobile subscriber identity.
The generating module 13 is configured to generate the number of access to the sensitive area corresponding to the mobile user identifier according to the mobile user identifier and a pre-acquired sensitive area database if the judging module judges that the pre-generated trusted user database does not include the mobile user identifier.
The early warning module 14 is used for early warning according to the number of the access to the sensitive areas.
Further, the platform further comprises: a storage module 15 and an acquisition module 16.
The storage module 15 is configured to store base station information of the sensitive area, where the base station information includes base station cell information.
The collecting module 16 is configured to collect signaling data of a mobile user, where the signaling data includes a mobile user identifier and user cell information corresponding to the mobile user identifier.
The judging module 12 is further configured to judge whether the user cell information is the same as the base station cell information of the sensitive area.
The obtaining module 11 is specifically configured to, if the determining module determines that the user cell information is the same as the base station cell information of the sensitive area, obtain a mobile user identifier corresponding to the user cell information from the signaling data.
Further, the storage module 15 is specifically configured to store base station information of the sensitive area, where the base station information includes base station cell information and historical access data corresponding to the base station cell information.
The generating module 13 is specifically configured to generate a sensitive area database according to base station information of a sensitive area, where the sensitive area database includes base station cell information of the sensitive area and historical access data corresponding to the base station cell information of the sensitive area, generate base station cell information corresponding to a mobile user identifier according to the mobile user identifier and historical access data corresponding to the base station cell information of the sensitive area, and generate a number of sensitive area accesses corresponding to the mobile user identifier according to the base station cell information corresponding to the mobile user identifier.
Further, the determining module 12 is further configured to determine whether the number of the accessed sensitive areas is greater than a first threshold.
The early warning module 14 is specifically configured to send a first early warning signal according to the number of the accessed sensitive areas if the judging module 12 judges that the number of the accessed sensitive areas is greater than the first threshold.
Further, the collecting module 16 is further configured to collect signaling data of the mobile user, where the signaling data includes a mobile user identifier and access time information corresponding to the mobile user identifier.
The obtaining module 11 is further configured to obtain the number of IMSI codes of the mobile subscriber corresponding to the mobile subscriber identity if the determining module 12 determines that the number of access to the sensitive area is smaller than or equal to the first threshold.
The judging module 12 is further configured to judge whether the number of the IMSI number of the mobile subscriber is greater than a second threshold and whether the access time information corresponding to the mobile subscriber identity is abnormal.
The early warning module 14 is specifically configured to send a second early warning signal according to the number of the IMSI number of the mobile subscriber and the access time information corresponding to the mobile subscriber identity if the determining module 12 determines that the number of the IMSI number of the mobile subscriber is greater than the second threshold and the access time information corresponding to the mobile subscriber identity is abnormal.
Further, the acquisition module 16 is also used to acquire trusted numbers in the sensitive area.
The obtaining module 11 is further configured to obtain an IMSI number of the trusted mobile subscriber corresponding to the trusted number, and obtain an IMEI code of the trusted mobile subscriber corresponding to the IMSI number of the trusted mobile subscriber.
The generating module 13 is further configured to generate a trusted subscriber database according to the trusted IMEI code and the trusted IMSI code corresponding to the trusted IMEI code.
In the security platform for the sensitive area provided by this embodiment, the obtaining module obtains a mobile user identifier for accessing the sensitive area, the judging module judges whether the pre-generated trusted user database includes the mobile user identifier, if the judging module judges that the pre-generated trusted user database does not include the mobile user identifier, the generating module generates the number of sensitive area accesses corresponding to the mobile user identifier according to the mobile user identifier and the pre-obtained sensitive area database, and the early warning module performs early warning according to the number of sensitive area accesses. The platform excavates the track of the mobile user based on the core network data of an operator, can timely discover the mobile user frequently approaching a sensitive area, and effectively maintains the national security and benefits.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.

Claims (11)

1. A security protection method for a sensitive area is characterized by comprising the following steps:
acquiring a mobile user identifier for accessing a sensitive area;
judging whether a pre-generated trusted user database comprises the mobile user identification;
if the mobile user identification is not included in a pre-generated credible user database, generating a sensitive area access number corresponding to the mobile user identification according to the mobile user identification and a pre-acquired sensitive area database, wherein the sensitive area database comprises base station cell information of a sensitive area and historical access data corresponding to the base station cell information of the sensitive area;
the step of generating the number of access to the sensitive area corresponding to the mobile user identifier according to the mobile user identifier and a pre-acquired sensitive area database specifically includes:
generating base station cell information corresponding to the mobile user identification according to the mobile user identification and historical access data corresponding to the base station cell information of the sensitive area;
generating the number of sensitive area accesses corresponding to the mobile user identification according to the base station cell information corresponding to the mobile user identification;
and carrying out early warning according to the access number of the sensitive areas.
2. The security method for the sensitive area according to claim 1, further comprising, before the obtaining the mobile user identifier for accessing the sensitive area:
storing base station information of a sensitive area, wherein the base station information comprises base station cell information;
the acquiring the mobile user identification of the access sensitive area comprises:
acquiring signaling data of a mobile user, wherein the signaling data comprises a mobile user identifier and user cell information corresponding to the mobile user identifier;
judging whether the user cell information is the same as the base station cell information of the sensitive area;
and if the user cell information is judged to be the same as the base station cell information of the sensitive area, acquiring a mobile user identifier corresponding to the user cell information from the signaling data.
3. The security method for the sensitive area according to claim 1, further comprising, before the obtaining the mobile user identifier for accessing the sensitive area:
storing base station information of a sensitive area, wherein the base station information comprises base station cell information and historical access data corresponding to the base station cell information;
before the generating of the number of the sensitive area accesses corresponding to the mobile user identifier according to the mobile user identifier and a sensitive area database acquired in advance, the method further comprises:
and generating a sensitive area database according to the base station information of the sensitive area, wherein the sensitive area database comprises the base station cell information of the sensitive area and historical access data corresponding to the base station cell information of the sensitive area.
4. The security method for the sensitive area according to claim 1, wherein the early warning according to the number of the access to the sensitive area comprises:
judging whether the access number of the sensitive areas is larger than a first threshold value or not;
and if the number of the accessed sensitive areas is judged to be larger than a first threshold value, sending a first early warning signal according to the number of the accessed sensitive areas.
5. The security method for the sensitive area according to claim 4, wherein the obtaining the mobile user identifier for accessing the sensitive area comprises:
acquiring signaling data of a mobile user, wherein the signaling data comprises a mobile user identifier and access time information corresponding to the mobile user identifier;
after the determining whether the number of the accessed sensitive areas is greater than a first threshold value, the method further includes:
if the access number of the sensitive areas is judged to be less than or equal to a first threshold value, acquiring the number of IMSI codes of the mobile users corresponding to the mobile user identification;
judging whether the number of the IMSI codes of the mobile subscriber is larger than a second threshold value and whether the access time information corresponding to the mobile subscriber identification is abnormal;
and if the number of the IMSI codes of the mobile subscriber is judged to be larger than a second threshold value and the access time information corresponding to the mobile subscriber identification is abnormal, sending a second early warning signal according to the number of the IMSI codes of the mobile subscriber and the access time information corresponding to the mobile subscriber identification.
6. The security method for the sensitive area according to any one of claims 1 to 5, wherein the mobile user identifier is a mobile user IMEI code.
7. The method for security protection of the sensitive area according to claim 1, further comprising, before the determining whether the mobile user identifier is included in the pre-generated trusted user database:
collecting a credible number in a sensitive area;
acquiring a credible IMSI code corresponding to the credible number;
acquiring a credible mobile subscriber IMEI code corresponding to the credible mobile subscriber IMSI code;
and generating a trusted user database according to the IMEI code of the trusted mobile user and the IMSI code of the trusted mobile user corresponding to the IMEI code of the trusted mobile user.
8. The utility model provides a security protection platform of sensitive area which characterized in that includes:
the acquisition module is used for acquiring the mobile user identification for accessing the sensitive area;
the judging module is used for judging whether a pre-generated trusted user database comprises the mobile user identification;
the generating module is used for generating the sensitive area access number corresponding to the mobile user identifier according to the mobile user identifier and a pre-acquired sensitive area database if the judging module judges that the pre-generated trusted user database does not comprise the mobile user identifier, wherein the sensitive area database comprises base station cell information of a sensitive area and historical access data corresponding to the base station cell information of the sensitive area; the generating module is specifically used for generating base station cell information corresponding to a mobile user identifier according to the mobile user identifier and historical access data corresponding to the base station cell information of the sensitive area, and generating the access number of the sensitive area corresponding to the mobile user identifier according to the base station cell information corresponding to the mobile user identifier;
and the early warning module is used for early warning according to the access number of the sensitive areas.
9. The security platform for the sensitive area according to claim 8, further comprising:
the storage module is used for storing base station information of a sensitive area, wherein the base station information comprises base station cell information;
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring signaling data of a mobile user, and the signaling data comprises a mobile user identifier and user cell information corresponding to the mobile user identifier;
the judging module is also used for judging whether the user cell information is the same as the base station cell information of the sensitive area;
the obtaining module is specifically configured to obtain a mobile user identifier corresponding to the user cell information from the signaling data if the determining module determines that the user cell information is the same as the base station cell information of the sensitive area.
10. The security platform for the sensitive area according to claim 8,
the storage module is specifically used for storing base station information of a sensitive area, wherein the base station information comprises base station cell information and historical access data corresponding to the base station cell information;
the generation module is further specifically configured to generate a sensitive area database according to the base station information of the sensitive area, where the sensitive area database includes the base station cell information of the sensitive area and historical access data corresponding to the base station cell information of the sensitive area.
11. The security platform for the sensitive area according to claim 8,
the acquisition module is also used for acquiring signaling data of the mobile user, wherein the signaling data comprises a mobile user identifier and access time information corresponding to the mobile user identifier;
the judging module is also used for judging whether the access number of the sensitive area is greater than a first threshold value or not, and judging whether the IMSI code number of the mobile subscriber is greater than a second threshold value or not and whether the access time information corresponding to the mobile subscriber identity is abnormal or not;
the obtaining module is further used for obtaining the number of IMSI codes of the mobile users corresponding to the mobile user identification if the judging module judges that the access number of the sensitive areas is smaller than or equal to a first threshold value;
the early warning module is specifically configured to send a first early warning signal according to the number of the access to the sensitive area if the judgment module judges that the number of the IMSI number of the mobile subscriber is greater than the first threshold, and send a second early warning signal according to the number of the IMSI number of the mobile subscriber and the access time information corresponding to the mobile subscriber identity if the judgment module judges that the number of the IMSI number of the mobile subscriber is greater than the second threshold and the access time information corresponding to the mobile subscriber identity is abnormal.
CN201810225508.XA 2018-03-19 2018-03-19 Security method and platform for sensitive area Active CN108718440B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810225508.XA CN108718440B (en) 2018-03-19 2018-03-19 Security method and platform for sensitive area

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810225508.XA CN108718440B (en) 2018-03-19 2018-03-19 Security method and platform for sensitive area

Publications (2)

Publication Number Publication Date
CN108718440A CN108718440A (en) 2018-10-30
CN108718440B true CN108718440B (en) 2021-02-02

Family

ID=63898809

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810225508.XA Active CN108718440B (en) 2018-03-19 2018-03-19 Security method and platform for sensitive area

Country Status (1)

Country Link
CN (1) CN108718440B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109348495B (en) * 2018-12-24 2021-11-26 奇点新源国际技术开发(北京)有限公司 Microwave protection wall system optimization method, system and base station management system
CN109362100B (en) * 2018-12-26 2021-08-03 中国联合网络通信集团有限公司 Base station evaluation method and system based on communication signaling
CN109840695A (en) * 2019-01-10 2019-06-04 中国联合网络通信集团有限公司 A kind of management method and server of contaminating enterprises
CN111263351B (en) * 2020-01-09 2022-07-22 支付宝(杭州)信息技术有限公司 Service processing method, service processing device, electronic device and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103021044A (en) * 2011-09-23 2013-04-03 北京天一众合科技股份有限公司 Method, device and system for area monitoring
US9148754B2 (en) * 2012-08-03 2015-09-29 Google Inc. Calculating and broadcasting an area's population density based on cell signal
CN106033635A (en) * 2015-03-19 2016-10-19 中国移动通信集团贵州有限公司 Monitoring method and system
CN106658400A (en) * 2016-08-31 2017-05-10 江苏鸿信系统集成有限公司 Community public security monitoring method based on cell phone signaling data
CN107563932A (en) * 2017-08-24 2018-01-09 上海与德科技有限公司 A kind of cell monitoring and managing method and device

Also Published As

Publication number Publication date
CN108718440A (en) 2018-10-30

Similar Documents

Publication Publication Date Title
CN108718440B (en) Security method and platform for sensitive area
CN109698934B (en) Region monitoring method and device
CN109996284A (en) Mobile communication Trouble call worksheet method, apparatus, equipment and medium
CN103796241A (en) Method for judging and positioning pseudo base station based on reported information of terminal
CN108632746A (en) A kind of method of determining region flow of the people
CN106973165B (en) vehicle excess member monitoring method, vehicle excess member monitoring system, operator system and mobile terminal
CN101620785B (en) Method for recognizing motor vehicle and non-motor vehicle based on mobile phone signal data
CN106921507B (en) Method and apparatus for predicting user complaints in a wireless communication network
CN105307119A (en) Pseudo base station positioning method based on RSSI base station signal estimation
EP3132592A1 (en) Method and system for identifying significant locations through data obtainable from a telecommunication network
CN108271157B (en) Pseudo base station identification method and device
CN109885636B (en) User portrait drawing method and server
CN104244253A (en) Method and device for recognizing false base station
CN107872767A (en) A kind of net about car brush single act recognition methods and identifying system
CN108574934B (en) Pseudo base station positioning method and device
CN106604224A (en) XDR-based method and system for obtaining 4G resident ratio index
CN106504524B (en) A method of express highway section is divided based on mobile signaling protocol dynamic
CN110856188B (en) Communication method, apparatus, system, and computer-readable storage medium
CN102568209A (en) Commercial vehicle gathering event early warning method based on floating vehicle technology
CN106792710A (en) The method and device of pseudo-base station is recognized based on user terminal location
CN109377739A (en) A kind of traffic accident alarm is sought help the middle method for obtaining location information
CN103945433A (en) Method and device for determining area with weak network coverage
CN102045182B (en) Service fault localization method, device and system
CN104219622A (en) People number measuring method based on LAC and crowd situation monitoring method and system
CN102186187A (en) Paging black hole cell locating method based on signaling of interface A

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant