CN108718440B - Security method and platform for sensitive area - Google Patents
Security method and platform for sensitive area Download PDFInfo
- Publication number
- CN108718440B CN108718440B CN201810225508.XA CN201810225508A CN108718440B CN 108718440 B CN108718440 B CN 108718440B CN 201810225508 A CN201810225508 A CN 201810225508A CN 108718440 B CN108718440 B CN 108718440B
- Authority
- CN
- China
- Prior art keywords
- sensitive area
- mobile user
- base station
- mobile
- cell information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 230000011664 signaling Effects 0.000 claims description 32
- 230000002159 abnormal effect Effects 0.000 claims description 14
- 238000012545 processing Methods 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 description 4
- 238000007418 data mining Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005065 mining Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/04—Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
Abstract
The invention discloses a security method and a security platform for a sensitive area, wherein the method comprises the following steps: the method comprises the steps of obtaining a mobile user identification for visiting a sensitive area, judging whether a pre-generated trusted user database comprises the mobile user identification, if the mobile user identification is judged not to be included in the pre-generated trusted user database, generating the number of the visited sensitive areas corresponding to the mobile user identification according to the mobile user identification and a pre-obtained sensitive area database, and giving an early warning according to the number of the visited sensitive areas. The invention mines the track of the mobile user based on the core network data of the operator, can find the mobile user frequently approaching the sensitive area in time, and effectively maintains the national security and benefits.
Description
Technical Field
The invention relates to the technical field of communication, in particular to a security method and a security platform for a sensitive area.
Background
At present, big data technology has become a new driving force for social and economic development, and with the improvement of data collection means and capacity, big data technology revolution taking high-performance large-scale data processing capacity as a core technology is brought, the core of the existing big data technology relates to a data mining algorithm, specifically, characteristics are mined from big data, new data are generated through scientific modeling, and finally, a predictive analysis result is obtained. Meanwhile, in the telecommunication industry, mobile phones have been popularized greatly, the popularization of mobile phones drives the traffic application of operators, and mining the basic data of mobile phones collected by the operators brings more additional values, specifically, the basic data comprises detailed information such as user numbers, startup and shutdown, position updating and the like.
With the enhancement of comprehensive national strength of China, effective maintenance of national security and benefits is necessary to be realized by utilizing various social resources. In the prior art, an operator only performs mobile phone basic data mining aiming at service development of the operator, and application of the data mining in the aspect of national security is not considered.
Disclosure of Invention
The invention provides a security method and a security platform for a sensitive area, which are used for mining the track of a mobile user based on core network data of an operator, so that the mobile user frequently approaching the sensitive area can be found in time, and the national security and benefits are effectively maintained.
In order to achieve the purpose, the invention provides a security method of a sensitive area, which comprises the following steps:
acquiring a mobile user identifier for accessing a sensitive area;
judging whether a pre-generated trusted user database comprises the mobile user identification;
if the mobile user identification is not included in the pre-generated credible user database, generating the access number of the sensitive areas corresponding to the mobile user identification according to the mobile user identification and a pre-acquired sensitive area database;
and carrying out early warning according to the access number of the sensitive areas.
Optionally, before the obtaining the mobile user identifier for accessing the sensitive area, the method further includes:
storing base station information of a sensitive area, wherein the base station information comprises base station cell information;
the acquiring the mobile user identification of the access sensitive area comprises:
acquiring signaling data of a mobile user, wherein the signaling data comprises a mobile user identifier and user cell information corresponding to the mobile user identifier;
judging whether the user cell information is the same as the base station cell information of the sensitive area;
and if the user cell information is judged to be the same as the base station cell information of the sensitive area, acquiring a mobile user identifier corresponding to the user cell information from the signaling data.
Optionally, before the obtaining the mobile user identifier for accessing the sensitive area, the method further includes:
storing base station information of a sensitive area, wherein the base station information comprises base station cell information and historical access data corresponding to the base station cell information;
before the generating of the number of the sensitive area accesses corresponding to the mobile user identifier according to the mobile user identifier and a sensitive area database acquired in advance, the method further comprises:
generating a sensitive area database according to the base station information of the sensitive area, wherein the sensitive area database comprises the base station cell information of the sensitive area and historical access data corresponding to the base station cell information of the sensitive area;
the generating of the number of the sensitive area accesses corresponding to the mobile user identifier according to the mobile user identifier and a pre-acquired sensitive area database comprises:
generating base station cell information corresponding to the mobile user identification according to the mobile user identification and historical access data corresponding to the base station cell information of the sensitive area;
and generating the number of the sensitive area accesses corresponding to the mobile user identification according to the base station cell information corresponding to the mobile user identification.
Optionally, the performing early warning according to the number of the accessed sensitive areas includes:
judging whether the access number of the sensitive areas is larger than a first threshold value or not;
and if the number of the accessed sensitive areas is judged to be larger than a first threshold value, sending a first early warning signal according to the number of the accessed sensitive areas.
Optionally, the obtaining the mobile user identifier for accessing the sensitive area includes:
acquiring signaling data of a mobile user, wherein the signaling data comprises a mobile user identifier and access time information corresponding to the mobile user identifier;
after the determining whether the number of the accessed sensitive areas is greater than a first threshold value, the method further includes:
if the access number of the sensitive areas is judged to be less than or equal to a first threshold value, acquiring the number of IMSI codes of the mobile users corresponding to the mobile user identification;
judging whether the number of the IMSI codes of the mobile subscriber is larger than a second threshold value and whether the access time information corresponding to the mobile subscriber identification is abnormal;
and if the number of the IMSI codes of the mobile subscriber is judged to be larger than a second threshold value and the access time information corresponding to the mobile subscriber identification is abnormal, sending a second early warning signal according to the number of the IMSI codes of the mobile subscriber and the access time information corresponding to the mobile subscriber identification.
Optionally, the mobile subscriber identity is a mobile subscriber IMEI code.
Optionally, before the determining whether the mobile subscriber identity is included in the pre-generated trusted subscriber database, the method further includes:
collecting a credible number in a sensitive area;
acquiring a credible IMSI code corresponding to the credible number;
acquiring a credible mobile subscriber IMEI code corresponding to the credible mobile subscriber IMSI code;
and generating a trusted user database according to the IMEI code of the trusted mobile user and the IMSI code of the trusted mobile user corresponding to the IMEI code of the trusted mobile user.
In order to achieve the above object, the present invention provides a security platform for a sensitive area, comprising:
the acquisition module is used for acquiring the mobile user identification for accessing the sensitive area;
the judging module is used for judging whether a pre-generated trusted user database comprises the mobile user identification;
the generating module is used for generating the access number of the sensitive areas corresponding to the mobile user identification according to the mobile user identification and a pre-acquired sensitive area database if the judging module judges that the pre-generated trusted user database does not comprise the mobile user identification;
and the early warning module is used for early warning according to the access number of the sensitive areas.
Optionally, the method further comprises:
the storage module is used for storing base station information of a sensitive area, wherein the base station information comprises base station cell information;
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring signaling data of a mobile user, and the signaling data comprises a mobile user identifier and user cell information corresponding to the mobile user identifier;
the judging module is also used for judging whether the user cell information is the same as the base station cell information of the sensitive area;
the obtaining module is specifically configured to obtain a mobile user identifier corresponding to the user cell information from the signaling data if the determining module determines that the user cell information is the same as the base station cell information of the sensitive area.
Optionally, the storage module is specifically configured to store base station information of a sensitive area, where the base station information includes base station cell information and historical access data corresponding to the base station cell information;
the generation module is specifically configured to generate a sensitive area database according to base station information of a sensitive area, where the sensitive area database includes base station cell information of the sensitive area and historical access data corresponding to the base station cell information of the sensitive area, generate base station cell information corresponding to a mobile user identifier according to the mobile user identifier and the historical access data corresponding to the base station cell information of the sensitive area, and generate the number of sensitive area accesses corresponding to the mobile user identifier according to the base station cell information corresponding to the mobile user identifier.
Optionally, the acquisition module is further configured to acquire signaling data of the mobile user, where the signaling data includes a mobile user identifier and access time information corresponding to the mobile user identifier;
the judging module is also used for judging whether the access number of the sensitive area is greater than a first threshold value or not, and judging whether the IMSI code number of the mobile subscriber is greater than a second threshold value or not and whether the access time information corresponding to the mobile subscriber identity is abnormal or not;
the obtaining module is further used for obtaining the number of IMSI codes of the mobile users corresponding to the mobile user identification if the judging module judges that the access number of the sensitive areas is smaller than or equal to a first threshold value;
the early warning module is specifically configured to send a first early warning signal according to the number of the access to the sensitive area if the judgment module judges that the number of the IMSI number of the mobile subscriber is greater than the first threshold, and send a second early warning signal according to the number of the IMSI number of the mobile subscriber and the access time information corresponding to the mobile subscriber identity if the judgment module judges that the number of the IMSI number of the mobile subscriber is greater than the second threshold and the access time information corresponding to the mobile subscriber identity is abnormal.
The invention has the following beneficial effects:
the security method of the sensitive area obtains the mobile user identification for visiting the sensitive area, judges whether the mobile user identification is included in the pre-generated credible user database, if the mobile user identification is not included in the pre-generated credible user database, generates the visit number of the sensitive area corresponding to the mobile user identification according to the mobile user identification and the pre-obtained sensitive area database, and carries out early warning according to the visit number of the sensitive area. The method mines the track of the mobile user based on the core network data of the operator, can timely discover the mobile user frequently approaching the sensitive area, and effectively maintains the national security and benefits.
Drawings
Fig. 1 is a schematic flowchart of a security method for a sensitive area according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a security method for a sensitive area according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a security platform of a sensitive area according to a third embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the following clear and complete description of the technical solution of the present invention is made with reference to the accompanying drawings, and it is obvious that the described embodiments are a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
Example one
Fig. 1 is a schematic flowchart of a security method for a sensitive area according to a first embodiment of the present invention, and as shown in fig. 1, the method includes:
103, generating the number of access to the sensitive area corresponding to the mobile user identifier according to the mobile user identifier and a pre-acquired sensitive area database.
And 104, early warning is carried out according to the access number of the sensitive areas.
The security method for the sensitive area, provided by this embodiment, includes obtaining a mobile user identifier for accessing the sensitive area, determining whether a pre-generated trusted user database includes the mobile user identifier, if it is determined that the pre-generated trusted user database does not include the mobile user identifier, generating an access number of the sensitive area corresponding to the mobile user identifier according to the mobile user identifier and a pre-obtained sensitive area database, and performing early warning according to the access number of the sensitive area. The method mines the track of the mobile user based on the core network data of the operator, can timely discover the mobile user frequently approaching the sensitive area, and effectively maintains the national security and benefits.
Example two
Fig. 2 is a schematic flow chart of a method provided in the second embodiment, and as shown in fig. 2, the method includes:
Preferably, each step in this embodiment is executed by a security platform of the sensitive area.
The sensitive area can be a plurality of peripheral areas of key security units which are distributed all over the country and relate to national security.
Specifically, both the staff in the sensitive area and the mobile users who live in the sensitive area or around the sensitive area are trusted users, and the mobile phone number corresponding to the trusted user is the trusted number.
The IMSI Number (International Mobile Subscriber identity) of the trusted Mobile Subscriber corresponding to the trusted Number is specifically logged into the network through the base station covering the sensitive area 90% of the time during the period of 00:01-07:00 in a day.
In this embodiment, the security platform in the sensitive area may obtain, based on the operator, an International Mobile Equipment Identity (IMEI) code of the trusted Mobile subscriber corresponding to the IMSI code of the trusted Mobile subscriber.
Specifically, there may be a plurality of IMEI codes corresponding to one IMSI code, and there may also be a plurality of IMSI codes corresponding to one IMEI code.
And 204, generating a trusted user database according to the IMEI code of the trusted mobile user and the IMSI code of the trusted mobile user corresponding to the IMEI code of the trusted mobile user.
And generating a sensitive area credible user database according to the credible mobile user IMEI code and one or more credible mobile user IMSI codes corresponding to the credible mobile user IMEI code.
Preferably, the trusted user database is maintained regularly according to the changing condition of the trusted users, because the trusted users are a changing group.
And step 205, storing the base station information of the sensitive area.
In this embodiment, there are multiple sensitive areas, each sensitive area corresponds to multiple base stations, and the base station information of all the base stations corresponding to the multiple sensitive areas is stored. The base station information includes base station cell information and historical access data corresponding to the base station cell information.
The Cell information of the base station is Cell information corresponding to the base station, and the Cell information includes LAC (location area code) and CI (Cell Identity). LAC is a 2-byte 16-ary BCD code (Binary-Coded decimal) and CI is a decimal code with a value ranging from 0 to 65536.
And step 206, generating a sensitive area database according to the base station information of the sensitive area, wherein the sensitive area database comprises the base station cell information of the sensitive area and historical access data corresponding to the base station cell information of the sensitive area.
In particular, the historical access data includes the mobile subscriber IMEI code that accessed the network through the base station of the sensitive area.
Optionally, the historical access data further includes historical access time points, historical access time periods and access base station codes corresponding to IMEI codes of mobile users accessing the network through the base stations of the sensitive area.
Specifically, step 207 includes the steps of:
step 207a, collecting signaling data of the mobile subscriber, where the signaling data includes an IMEI code of the mobile subscriber and user cell information corresponding to the IMEI code of the mobile subscriber.
Acquiring signaling Data through an LTE (Long Term Evolution) core network in real time, analyzing the signaling Data into XDR (External Data Representation) signaling Data, analyzing and extracting IMEI (international mobile equipment identity), LAC (local area network) and CI (common interface) of a mobile user, wherein the LAC and the CI are user cell information.
Furthermore, the signaling data further includes time information, and the time information is an access time point corresponding to the IMEI code of the mobile subscriber.
Step 207b, determining whether the user cell information is the same as the base station cell information of the sensitive area, if so, executing step 207c, and if not, ending the process.
And judging whether the LAC and the CI in the base station cell information and the user cell information are the same, if so, indicating that the IMEI code of the mobile user corresponding to the user cell information is accessed through a base station access network in a sensitive area corresponding to the base station cell information.
Step 207c, obtaining the IMEI code of the mobile subscriber corresponding to the user cell information from the signaling data.
If the mobile user IMEI code is judged to be included in the pre-generated credible user database, the mobile user corresponding to the mobile user IMEI code is represented as a credible user, and subsequent tracking of the mobile user is not needed.
If the mobile user IMEI code is judged not to be included in the pre-generated credible user database, the mobile user corresponding to the mobile user IMEI code is represented as an incredible user.
And 209, generating the number of the sensitive areas corresponding to the IMEI code of the mobile user according to the IMEI code of the mobile user and a pre-acquired sensitive area database.
Specifically, step 209 comprises the steps of:
step 209a, generating the base station cell information corresponding to the IMEI code of the mobile user according to the IMEI code of the mobile user and the historical access data corresponding to the base station cell information of the sensitive area.
The cell information of the base station corresponding to the IMEI code of the mobile user comprises the base station visited by the IMEI code of the mobile user and the sensitive areas respectively corresponding to the base stations.
Step 209b, generating the number of the sensitive area access corresponding to the IMEI code of the mobile user according to the base station cell information corresponding to the IMEI code of the mobile user.
Specifically, the number of sensitive areas that the IMEI code of the mobile subscriber has visited is counted. Preferably, the number of access times of the sensitive areas corresponding to the IMEI code of the mobile subscriber and the access times of each sensitive area in descending order are generated.
And 210, early warning is carried out according to the access number of the sensitive areas.
Specifically, step 210 includes the steps of:
step 210a, determining whether the number of the sensitive area accesses is greater than a first threshold, if so, executing step 210b, and if not, executing step 210 c.
And step 210b, sending a first early warning signal according to the access number of the sensitive areas.
Preferably, the first threshold is two. If the number of the sensitive areas of the IMEI code of the mobile user is more than two, the terminal corresponding to the IMEI code of the mobile user is identified and appears in the sensitive area for many times, the IMEI code of the mobile user is suspicious, and a first early warning signal comprising the number of the sensitive areas is sent out.
Step 210c, obtaining the number of the IMSI codes of the mobile users corresponding to the IMEI codes of the mobile users.
And if the number of the sensitive areas of the IMEI code of the mobile subscriber is less than or equal to two, acquiring the number of the IMSI code of the mobile subscriber corresponding to the IMEI code of the mobile subscriber. In this embodiment, if the number of the IMSI codes of a certain mobile subscriber corresponding to the IMEI code is multiple, it indicates that the terminal corresponding to the IMEI code of the mobile subscriber has used multiple IMSI codes of the mobile subscriber.
Step 210d, determining whether the number of the IMSI codes of the mobile subscriber is greater than a second threshold and the access time information corresponding to the IMEI code of the mobile subscriber is abnormal, and if it is determined that the number of the IMSI codes of the mobile subscriber is greater than the second threshold and the access time information corresponding to the IMEI code of the mobile subscriber is abnormal, executing step 210 e; otherwise, the flow ends.
Preferably, the second threshold is two.
And step 210e, sending a second early warning signal according to the number of the IMSI codes of the mobile users and the access time information corresponding to the IMEI codes of the mobile users.
If the number of the IMSI codes of the mobile subscriber is judged to be more than twice and the access time information corresponding to the IMEI code of the mobile subscriber is abnormal, the fact that the user corresponding to the IMEI code of the mobile subscriber uses the same terminal for replacing different telephone numbers for multiple times to access a sensitive area is shown, the IMEI code of the mobile subscriber is suspicious, and a second early warning signal is sent out.
Preferably, whether the access time point in the access time information corresponding to the IMEI code of the mobile subscriber is between 22:00 and 5:00 is determined, and if the access time point in the access time information corresponding to the IMEI code of the mobile subscriber is determined to be between 22:00 and 5:00, it is determined that the access time information corresponding to the IMEI code of the mobile subscriber is abnormal.
And subsequently, if the number of the IMSI codes of the mobile users is judged to be less than or equal to a second threshold value or the access time information corresponding to the IMEI codes of the mobile users is normal, storing the access data corresponding to the IMEI codes of the mobile users into a sensitive area database so as to update the sensitive area database.
The security method for the sensitive area, provided by this embodiment, includes obtaining a mobile user identifier for accessing the sensitive area, determining whether a pre-generated trusted user database includes the mobile user identifier, if it is determined that the pre-generated trusted user database does not include the mobile user identifier, generating an access number of the sensitive area corresponding to the mobile user identifier according to the mobile user identifier and a pre-obtained sensitive area database, and performing early warning according to the access number of the sensitive area. The method mines the track of the mobile user based on the core network data of the operator, can timely discover the mobile user frequently approaching the sensitive area, and effectively maintains the national security and benefits.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a security platform of a sensitive area provided in this embodiment three, as shown in fig. 3, the platform includes: the device comprises an acquisition module 11, a judgment module 12, a generation module 13 and an early warning module 14.
The obtaining module 11 is configured to obtain a mobile subscriber identity for accessing a sensitive area.
The judging module 12 is configured to judge whether the pre-generated trusted subscriber database includes the mobile subscriber identity.
The generating module 13 is configured to generate the number of access to the sensitive area corresponding to the mobile user identifier according to the mobile user identifier and a pre-acquired sensitive area database if the judging module judges that the pre-generated trusted user database does not include the mobile user identifier.
The early warning module 14 is used for early warning according to the number of the access to the sensitive areas.
Further, the platform further comprises: a storage module 15 and an acquisition module 16.
The storage module 15 is configured to store base station information of the sensitive area, where the base station information includes base station cell information.
The collecting module 16 is configured to collect signaling data of a mobile user, where the signaling data includes a mobile user identifier and user cell information corresponding to the mobile user identifier.
The judging module 12 is further configured to judge whether the user cell information is the same as the base station cell information of the sensitive area.
The obtaining module 11 is specifically configured to, if the determining module determines that the user cell information is the same as the base station cell information of the sensitive area, obtain a mobile user identifier corresponding to the user cell information from the signaling data.
Further, the storage module 15 is specifically configured to store base station information of the sensitive area, where the base station information includes base station cell information and historical access data corresponding to the base station cell information.
The generating module 13 is specifically configured to generate a sensitive area database according to base station information of a sensitive area, where the sensitive area database includes base station cell information of the sensitive area and historical access data corresponding to the base station cell information of the sensitive area, generate base station cell information corresponding to a mobile user identifier according to the mobile user identifier and historical access data corresponding to the base station cell information of the sensitive area, and generate a number of sensitive area accesses corresponding to the mobile user identifier according to the base station cell information corresponding to the mobile user identifier.
Further, the determining module 12 is further configured to determine whether the number of the accessed sensitive areas is greater than a first threshold.
The early warning module 14 is specifically configured to send a first early warning signal according to the number of the accessed sensitive areas if the judging module 12 judges that the number of the accessed sensitive areas is greater than the first threshold.
Further, the collecting module 16 is further configured to collect signaling data of the mobile user, where the signaling data includes a mobile user identifier and access time information corresponding to the mobile user identifier.
The obtaining module 11 is further configured to obtain the number of IMSI codes of the mobile subscriber corresponding to the mobile subscriber identity if the determining module 12 determines that the number of access to the sensitive area is smaller than or equal to the first threshold.
The judging module 12 is further configured to judge whether the number of the IMSI number of the mobile subscriber is greater than a second threshold and whether the access time information corresponding to the mobile subscriber identity is abnormal.
The early warning module 14 is specifically configured to send a second early warning signal according to the number of the IMSI number of the mobile subscriber and the access time information corresponding to the mobile subscriber identity if the determining module 12 determines that the number of the IMSI number of the mobile subscriber is greater than the second threshold and the access time information corresponding to the mobile subscriber identity is abnormal.
Further, the acquisition module 16 is also used to acquire trusted numbers in the sensitive area.
The obtaining module 11 is further configured to obtain an IMSI number of the trusted mobile subscriber corresponding to the trusted number, and obtain an IMEI code of the trusted mobile subscriber corresponding to the IMSI number of the trusted mobile subscriber.
The generating module 13 is further configured to generate a trusted subscriber database according to the trusted IMEI code and the trusted IMSI code corresponding to the trusted IMEI code.
In the security platform for the sensitive area provided by this embodiment, the obtaining module obtains a mobile user identifier for accessing the sensitive area, the judging module judges whether the pre-generated trusted user database includes the mobile user identifier, if the judging module judges that the pre-generated trusted user database does not include the mobile user identifier, the generating module generates the number of sensitive area accesses corresponding to the mobile user identifier according to the mobile user identifier and the pre-obtained sensitive area database, and the early warning module performs early warning according to the number of sensitive area accesses. The platform excavates the track of the mobile user based on the core network data of an operator, can timely discover the mobile user frequently approaching a sensitive area, and effectively maintains the national security and benefits.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.
Claims (11)
1. A security protection method for a sensitive area is characterized by comprising the following steps:
acquiring a mobile user identifier for accessing a sensitive area;
judging whether a pre-generated trusted user database comprises the mobile user identification;
if the mobile user identification is not included in a pre-generated credible user database, generating a sensitive area access number corresponding to the mobile user identification according to the mobile user identification and a pre-acquired sensitive area database, wherein the sensitive area database comprises base station cell information of a sensitive area and historical access data corresponding to the base station cell information of the sensitive area;
the step of generating the number of access to the sensitive area corresponding to the mobile user identifier according to the mobile user identifier and a pre-acquired sensitive area database specifically includes:
generating base station cell information corresponding to the mobile user identification according to the mobile user identification and historical access data corresponding to the base station cell information of the sensitive area;
generating the number of sensitive area accesses corresponding to the mobile user identification according to the base station cell information corresponding to the mobile user identification;
and carrying out early warning according to the access number of the sensitive areas.
2. The security method for the sensitive area according to claim 1, further comprising, before the obtaining the mobile user identifier for accessing the sensitive area:
storing base station information of a sensitive area, wherein the base station information comprises base station cell information;
the acquiring the mobile user identification of the access sensitive area comprises:
acquiring signaling data of a mobile user, wherein the signaling data comprises a mobile user identifier and user cell information corresponding to the mobile user identifier;
judging whether the user cell information is the same as the base station cell information of the sensitive area;
and if the user cell information is judged to be the same as the base station cell information of the sensitive area, acquiring a mobile user identifier corresponding to the user cell information from the signaling data.
3. The security method for the sensitive area according to claim 1, further comprising, before the obtaining the mobile user identifier for accessing the sensitive area:
storing base station information of a sensitive area, wherein the base station information comprises base station cell information and historical access data corresponding to the base station cell information;
before the generating of the number of the sensitive area accesses corresponding to the mobile user identifier according to the mobile user identifier and a sensitive area database acquired in advance, the method further comprises:
and generating a sensitive area database according to the base station information of the sensitive area, wherein the sensitive area database comprises the base station cell information of the sensitive area and historical access data corresponding to the base station cell information of the sensitive area.
4. The security method for the sensitive area according to claim 1, wherein the early warning according to the number of the access to the sensitive area comprises:
judging whether the access number of the sensitive areas is larger than a first threshold value or not;
and if the number of the accessed sensitive areas is judged to be larger than a first threshold value, sending a first early warning signal according to the number of the accessed sensitive areas.
5. The security method for the sensitive area according to claim 4, wherein the obtaining the mobile user identifier for accessing the sensitive area comprises:
acquiring signaling data of a mobile user, wherein the signaling data comprises a mobile user identifier and access time information corresponding to the mobile user identifier;
after the determining whether the number of the accessed sensitive areas is greater than a first threshold value, the method further includes:
if the access number of the sensitive areas is judged to be less than or equal to a first threshold value, acquiring the number of IMSI codes of the mobile users corresponding to the mobile user identification;
judging whether the number of the IMSI codes of the mobile subscriber is larger than a second threshold value and whether the access time information corresponding to the mobile subscriber identification is abnormal;
and if the number of the IMSI codes of the mobile subscriber is judged to be larger than a second threshold value and the access time information corresponding to the mobile subscriber identification is abnormal, sending a second early warning signal according to the number of the IMSI codes of the mobile subscriber and the access time information corresponding to the mobile subscriber identification.
6. The security method for the sensitive area according to any one of claims 1 to 5, wherein the mobile user identifier is a mobile user IMEI code.
7. The method for security protection of the sensitive area according to claim 1, further comprising, before the determining whether the mobile user identifier is included in the pre-generated trusted user database:
collecting a credible number in a sensitive area;
acquiring a credible IMSI code corresponding to the credible number;
acquiring a credible mobile subscriber IMEI code corresponding to the credible mobile subscriber IMSI code;
and generating a trusted user database according to the IMEI code of the trusted mobile user and the IMSI code of the trusted mobile user corresponding to the IMEI code of the trusted mobile user.
8. The utility model provides a security protection platform of sensitive area which characterized in that includes:
the acquisition module is used for acquiring the mobile user identification for accessing the sensitive area;
the judging module is used for judging whether a pre-generated trusted user database comprises the mobile user identification;
the generating module is used for generating the sensitive area access number corresponding to the mobile user identifier according to the mobile user identifier and a pre-acquired sensitive area database if the judging module judges that the pre-generated trusted user database does not comprise the mobile user identifier, wherein the sensitive area database comprises base station cell information of a sensitive area and historical access data corresponding to the base station cell information of the sensitive area; the generating module is specifically used for generating base station cell information corresponding to a mobile user identifier according to the mobile user identifier and historical access data corresponding to the base station cell information of the sensitive area, and generating the access number of the sensitive area corresponding to the mobile user identifier according to the base station cell information corresponding to the mobile user identifier;
and the early warning module is used for early warning according to the access number of the sensitive areas.
9. The security platform for the sensitive area according to claim 8, further comprising:
the storage module is used for storing base station information of a sensitive area, wherein the base station information comprises base station cell information;
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring signaling data of a mobile user, and the signaling data comprises a mobile user identifier and user cell information corresponding to the mobile user identifier;
the judging module is also used for judging whether the user cell information is the same as the base station cell information of the sensitive area;
the obtaining module is specifically configured to obtain a mobile user identifier corresponding to the user cell information from the signaling data if the determining module determines that the user cell information is the same as the base station cell information of the sensitive area.
10. The security platform for the sensitive area according to claim 8,
the storage module is specifically used for storing base station information of a sensitive area, wherein the base station information comprises base station cell information and historical access data corresponding to the base station cell information;
the generation module is further specifically configured to generate a sensitive area database according to the base station information of the sensitive area, where the sensitive area database includes the base station cell information of the sensitive area and historical access data corresponding to the base station cell information of the sensitive area.
11. The security platform for the sensitive area according to claim 8,
the acquisition module is also used for acquiring signaling data of the mobile user, wherein the signaling data comprises a mobile user identifier and access time information corresponding to the mobile user identifier;
the judging module is also used for judging whether the access number of the sensitive area is greater than a first threshold value or not, and judging whether the IMSI code number of the mobile subscriber is greater than a second threshold value or not and whether the access time information corresponding to the mobile subscriber identity is abnormal or not;
the obtaining module is further used for obtaining the number of IMSI codes of the mobile users corresponding to the mobile user identification if the judging module judges that the access number of the sensitive areas is smaller than or equal to a first threshold value;
the early warning module is specifically configured to send a first early warning signal according to the number of the access to the sensitive area if the judgment module judges that the number of the IMSI number of the mobile subscriber is greater than the first threshold, and send a second early warning signal according to the number of the IMSI number of the mobile subscriber and the access time information corresponding to the mobile subscriber identity if the judgment module judges that the number of the IMSI number of the mobile subscriber is greater than the second threshold and the access time information corresponding to the mobile subscriber identity is abnormal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810225508.XA CN108718440B (en) | 2018-03-19 | 2018-03-19 | Security method and platform for sensitive area |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810225508.XA CN108718440B (en) | 2018-03-19 | 2018-03-19 | Security method and platform for sensitive area |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108718440A CN108718440A (en) | 2018-10-30 |
CN108718440B true CN108718440B (en) | 2021-02-02 |
Family
ID=63898809
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810225508.XA Active CN108718440B (en) | 2018-03-19 | 2018-03-19 | Security method and platform for sensitive area |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108718440B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109348495B (en) * | 2018-12-24 | 2021-11-26 | 奇点新源国际技术开发(北京)有限公司 | Microwave protection wall system optimization method, system and base station management system |
CN109362100B (en) * | 2018-12-26 | 2021-08-03 | 中国联合网络通信集团有限公司 | Base station evaluation method and system based on communication signaling |
CN109840695A (en) * | 2019-01-10 | 2019-06-04 | 中国联合网络通信集团有限公司 | A kind of management method and server of contaminating enterprises |
CN111263351B (en) * | 2020-01-09 | 2022-07-22 | 支付宝(杭州)信息技术有限公司 | Service processing method, service processing device, electronic device and storage medium |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103021044A (en) * | 2011-09-23 | 2013-04-03 | 北京天一众合科技股份有限公司 | Method, device and system for area monitoring |
US9148754B2 (en) * | 2012-08-03 | 2015-09-29 | Google Inc. | Calculating and broadcasting an area's population density based on cell signal |
CN106033635A (en) * | 2015-03-19 | 2016-10-19 | 中国移动通信集团贵州有限公司 | Monitoring method and system |
CN106658400A (en) * | 2016-08-31 | 2017-05-10 | 江苏鸿信系统集成有限公司 | Community public security monitoring method based on cell phone signaling data |
CN107563932A (en) * | 2017-08-24 | 2018-01-09 | 上海与德科技有限公司 | A kind of cell monitoring and managing method and device |
-
2018
- 2018-03-19 CN CN201810225508.XA patent/CN108718440B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN108718440A (en) | 2018-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108718440B (en) | Security method and platform for sensitive area | |
CN109698934B (en) | Region monitoring method and device | |
CN109996284A (en) | Mobile communication Trouble call worksheet method, apparatus, equipment and medium | |
CN103796241A (en) | Method for judging and positioning pseudo base station based on reported information of terminal | |
CN108632746A (en) | A kind of method of determining region flow of the people | |
CN106973165B (en) | vehicle excess member monitoring method, vehicle excess member monitoring system, operator system and mobile terminal | |
CN101620785B (en) | Method for recognizing motor vehicle and non-motor vehicle based on mobile phone signal data | |
CN106921507B (en) | Method and apparatus for predicting user complaints in a wireless communication network | |
CN105307119A (en) | Pseudo base station positioning method based on RSSI base station signal estimation | |
EP3132592A1 (en) | Method and system for identifying significant locations through data obtainable from a telecommunication network | |
CN108271157B (en) | Pseudo base station identification method and device | |
CN109885636B (en) | User portrait drawing method and server | |
CN104244253A (en) | Method and device for recognizing false base station | |
CN107872767A (en) | A kind of net about car brush single act recognition methods and identifying system | |
CN108574934B (en) | Pseudo base station positioning method and device | |
CN106604224A (en) | XDR-based method and system for obtaining 4G resident ratio index | |
CN106504524B (en) | A method of express highway section is divided based on mobile signaling protocol dynamic | |
CN110856188B (en) | Communication method, apparatus, system, and computer-readable storage medium | |
CN102568209A (en) | Commercial vehicle gathering event early warning method based on floating vehicle technology | |
CN106792710A (en) | The method and device of pseudo-base station is recognized based on user terminal location | |
CN109377739A (en) | A kind of traffic accident alarm is sought help the middle method for obtaining location information | |
CN103945433A (en) | Method and device for determining area with weak network coverage | |
CN102045182B (en) | Service fault localization method, device and system | |
CN104219622A (en) | People number measuring method based on LAC and crowd situation monitoring method and system | |
CN102186187A (en) | Paging black hole cell locating method based on signaling of interface A |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |