CN109151733B - Criminal suspect positioning method and device - Google Patents

Criminal suspect positioning method and device Download PDF

Info

Publication number
CN109151733B
CN109151733B CN201810879030.2A CN201810879030A CN109151733B CN 109151733 B CN109151733 B CN 109151733B CN 201810879030 A CN201810879030 A CN 201810879030A CN 109151733 B CN109151733 B CN 109151733B
Authority
CN
China
Prior art keywords
information
mobile terminal
criminal suspect
terminal identification
clue
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810879030.2A
Other languages
Chinese (zh)
Other versions
CN109151733A (en
Inventor
李希金
双程
张伦泳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810879030.2A priority Critical patent/CN109151733B/en
Publication of CN109151733A publication Critical patent/CN109151733A/en
Application granted granted Critical
Publication of CN109151733B publication Critical patent/CN109151733B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • H04W64/006Locating users or terminals or network equipment for network management purposes, e.g. mobility management with additional information processing, e.g. for direction or speed determination

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a method for positioning a criminal suspect, which comprises the following steps: the method comprises the steps of obtaining a plurality of clue information of a criminal suspect, obtaining a mobile terminal identification list of the criminal suspect according to the clue information, wherein the mobile terminal identification list comprises at least one mobile terminal identification. The technical scheme provided by the invention enables the detection personnel to obtain the mobile terminal identification list of the criminal suspect based on the clue information about the criminal suspect obtained from the monitoring video, thereby greatly reducing the range of the criminal suspect, further timely finding and tracking the trail of the criminal suspect, reducing the time cost for solving a case, accelerating the detection process of the case and having important significance for establishing a good social security environment.

Description

Criminal suspect positioning method and device
Technical Field
The invention relates to the technical field of communication, in particular to a method and a device for positioning a criminal suspect.
Background
In modern society, criminal behaviors occur occasionally, and when tracking a criminal suspect, a public security department usually locates the criminal suspect according to related video information of cameras distributed throughout streets, namely, the criminal suspect is located in a manual investigation mode. However, due to the large population density and the strong mobility of cities, some past criminal crime-solving means are hidden and are not easy to perceive, and the positioning is carried out in a manual investigation mode, so that the public security department can usually find useful clues after continuously tracking for a long time or cannot find the trail of a criminal suspect at all, the time cost for detecting the case is greatly increased, and the case cannot be detected in time.
Disclosure of Invention
The invention aims to solve at least one of the technical problems in the prior art, and provides a method and a device for positioning a criminal suspect, which are used for solving the problems of poor timeliness and poor effect of the conventional method for positioning the criminal suspect.
In order to solve the technical problem, the invention provides a method for positioning a criminal suspect, which comprises the following steps:
acquiring a plurality of clue information of a criminal suspect;
and acquiring a mobile terminal identification list of the criminal suspect according to the plurality of pieces of clue information, wherein the mobile terminal identification list comprises at least one mobile terminal identification.
Optionally, each piece of thread information includes position information of a criminal suspect, time information of the criminal suspect corresponding to the position information, and camera information corresponding to the position information.
Optionally, the obtaining the list of the identifiers of the mobile terminals of the criminal suspect according to the multiple pieces of clue information includes:
inquiring the mobile phone signal intensity corresponding to the camera information in each clue information from a pre-generated fingerprint library;
inquiring a mobile terminal identifier in at least one piece of specific signaling data corresponding to each clue information from a signaling database, wherein each piece of specific signaling data is the signaling data of which the position information in the signaling database is the same as the camera information in the corresponding clue information, the service time is the same as the time information of the criminal suspect in the corresponding clue information, and the mobile phone signal strength is the same as the mobile phone signal strength in the corresponding clue information;
forming a mobile terminal identification set corresponding to the cue information according to at least one mobile terminal identification corresponding to each piece of inquired cue information, wherein the mobile terminal identification set corresponding to each cue information comprises at least one mobile terminal identification corresponding to the cue information;
and taking intersection sets of the mobile terminal identification sets corresponding to all the clue information to generate a mobile terminal identification list.
Optionally, before querying the mobile phone signal strength corresponding to each piece of location information from the pre-generated fingerprint library, the method further includes:
collecting the mobile phone signal intensity around all cameras;
and generating a fingerprint database according to the camera information of each camera and the mobile phone signal intensity around each camera, wherein the fingerprint database comprises the camera information and the mobile phone signal intensity corresponding to the camera information.
Optionally, before the querying the mobile terminal identifier in the at least one specific signaling data from the signaling database, the method further includes:
acquiring signaling data of all users of a core network, wherein each signaling data comprises a mobile terminal identifier, service time, position information and mobile phone signal strength;
and generating a signaling database according to the signaling data of all users, wherein the signaling database stores a plurality of signaling data.
Optionally, the obtaining of the multiple pieces of clue information of the criminal suspect includes:
acquiring camera information and monitoring videos of a criminal suspect on a crime scene and an escape route from a server;
and acquiring the position information of the criminal suspect in the clue information and the time information of the criminal suspect corresponding to the position information from the monitoring video.
The present invention also provides a criminal suspect positioning apparatus, comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring a plurality of clue information of a criminal suspect;
the second obtaining module is used for obtaining a mobile terminal identification list of the criminal suspect according to the plurality of clue information; wherein the list of mobile terminal identities comprises at least one mobile terminal identity.
Optionally, each piece of thread information includes position information of a criminal suspect, time information of the criminal suspect corresponding to the position information, and camera information corresponding to the position information.
Optionally, the second obtaining module further includes:
a first sub-query module: the mobile phone signal intensity corresponding to the camera information in each clue information is inquired from a pre-generated fingerprint library;
a second sub-query module: the mobile terminal identifier is used for inquiring at least one piece of specific signaling data corresponding to each piece of clue information from a signaling database, wherein each piece of specific signaling data is the signaling data of which the position information in the signaling database is the same as the camera information in the corresponding clue information, the service time is the same as the time information of the criminal suspect in the corresponding clue information, and the mobile phone signal strength is the same as the mobile phone signal strength in the corresponding clue information;
a first sub-generation module: forming a mobile terminal identification set corresponding to each piece of clue information according to at least one mobile terminal identification corresponding to each piece of inquired clue information, and taking intersection of the mobile terminal identification sets corresponding to all the clue information to generate a mobile terminal identification list; and the mobile terminal identification set corresponding to each piece of thread information comprises at least one mobile terminal identification corresponding to the thread information.
Optionally, the positioning device for the criminal suspect further includes:
the first generation module is used for acquiring the mobile phone signal intensity around all the cameras; generating a fingerprint database according to the camera information of each camera and the mobile phone signal intensity around each camera; the fingerprint database comprises camera information and mobile phone signal intensity corresponding to the camera information.
Optionally, the positioning device for the criminal suspect further includes:
the second generation module is used for acquiring signaling data of all users of the core network and generating a signaling database according to the signaling data of all the users, wherein the signaling database stores a plurality of signaling data; each signaling data comprises a mobile terminal identification, service time, position information and mobile phone signal strength.
Optionally, the first obtaining module further includes:
the first sub-acquisition module is used for acquiring camera information and monitoring videos of a criminal suspect on a crime scene and an escape route from the server;
and the second sub-acquisition module is used for acquiring the position information of the criminal suspect in the clue information and the time information of the criminal suspect corresponding to the position information from the monitoring video.
The invention has the technical effects that: compared with the prior art, the criminal suspect positioning method provided by the invention does not need to perform complex manual analysis, and the method can enable the inspector to quickly acquire the mobile terminal identification information of the criminal suspect based on the clue information about the criminal suspect acquired from the monitoring video through big data analysis, thereby greatly reducing the range of the criminal suspect, further timely discovering and tracking the trail of the criminal suspect, reducing the time cost of case solving, accelerating the case solving process, and having important significance for establishing a good social security environment.
Drawings
Fig. 1 is a flowchart of a method for locating a criminal suspect according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for locating a criminal suspect according to a second embodiment of the present invention;
fig. 3 is a schematic view of a device structure corresponding to the method for locating a criminal suspect according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a device corresponding to the method for locating a criminal suspect according to the second embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the following describes in detail the method and apparatus for locating a criminal suspect according to the present invention with reference to the accompanying drawings.
Example one
Fig. 1 is a flowchart of a method for locating a criminal suspect according to an embodiment of the present invention. As shown in fig. 1, the method for locating a criminal suspect includes:
step 101, obtaining a plurality of clue information of a criminal suspect;
and step 102, obtaining a mobile terminal identification list of the criminal suspect according to the plurality of pieces of clue information, wherein the mobile terminal identification list comprises at least one mobile terminal identification.
In the method for locating a criminal suspect provided in this embodiment, the method for locating a criminal suspect includes: the method comprises the steps of obtaining a plurality of clue information of a criminal suspect, and obtaining a mobile terminal identification list of the criminal suspect according to the clue information. Compared with the prior art, the technical scheme provided by the embodiment does not need to perform complex manual analysis, the mobile terminal identification information of the criminal suspect can be quickly acquired by the investigation personnel through big data analysis based on the clue information about the criminal suspect acquired from the monitoring video, so that the range of the criminal suspect is greatly reduced, the trail of the criminal suspect can be timely found and tracked, the time cost for solving a case is reduced, the investigation progress of the case is accelerated, and the method has important significance for establishing a good social security environment.
Example two
Fig. 2 is a flowchart of a method for locating a criminal suspect according to a second embodiment of the present invention. As shown in fig. 2, the method for locating a criminal suspect includes:
step 201, obtaining a plurality of clue information of a criminal suspect;
specifically, the criminal suspect is shot by monitoring cameras in the crime scene and the escape route very possibly, monitoring videos shot by the monitoring cameras record the places where the criminal suspect appears at the moment, cameras in different places have different numbers, the camera numbers correspond to the corresponding places, and the camera numbers and the corresponding places jointly form camera information, so that the clue information of the criminal suspect can be obtained by obtaining the camera information and the monitoring videos of the criminal suspect on the crime scene and the escape route; preferably, the camera information and the monitoring video can be acquired from a server; the server may be an piconet server.
Preferably, the cue information may include: the system comprises position information of the occurrence of a criminal suspect, time information of the occurrence of the criminal suspect corresponding to the position information and camera information corresponding to the position information; the camera information comprises a camera number and a position corresponding to the camera number; and acquiring the position information of the criminal suspect in the clue information and the time information of the criminal suspect corresponding to the position information from the acquired monitoring video.
Specifically, the plurality of pieces of cue information may be a cue set Ui=(Ci,Li,Ti) And i is 1,2, … …, wherein C isiIndicating camera information corresponding to said position information, LiInformation on the position of the criminal suspect, TiI represents the number of the cue information, for example: when i is 1, the 1 st line information may be represented as U1=(C1,L1,T1) And so on.
Step 202, collecting the mobile phone signal intensity around all the cameras, and generating a fingerprint database according to the camera information of each camera and the mobile phone signal intensity around each camera.
Step 203, collecting signaling data of all users of the core network, and generating a signaling database according to the signaling data of all users, wherein the signaling database stores a plurality of signaling data.
The mobile communication system collectively refers to data other than voice data as "signaling data". Signaling data is transmitted among a mobile terminal MS, a base station BS, a base station control center BSC, and a mobile switching center MSC of a mobile communication network to represent state information of a mobile communication system, which is also an effective method for implementing a control function of the mobile communication system.
When the mobile terminal is in the powered on networking state, no matter whether a call is in progress, a measurement report, that is, a measurement report, is periodically sent to the base station, so as to report the network condition of the current location of the terminal, for example, the measurement report may include a speech quality value, a level value, and the like. And when the criminal suspect escapes from the scene, relevant video data can be left along the way with great probability, and the suspect clues can be quickly found by searching the measurement report which appears synchronously with the relevant video data.
Therefore, the fingerprint database and the signaling database are respectively formed by collecting the signaling data around all the cameras and the signaling data of all the users of the operator core network, so that reliable positioning basis can be provided for the positioning of the criminal suspect.
The fingerprint database is formed by collecting signaling data around the camera; specifically, signaling data can be acquired according to a measurement report by collecting the measurement report around the camera; preferably, the signaling data includes mobile phone signal strength information at a location point where each known camera is located, where the mobile phone signal strength information refers to mobile phone signal strength information from the periphery of the location point to an adjacent base station, and the mobile phone signal strength information specifically includes a speech quality value and a level value, and can be represented by Q; in addition, the fingerprint database also comprises camera information of each camera, the camera information comprises the number of the camera and the position of the camera corresponding to the camera number, the camera information can be represented by C, and the mobile phone signal strength information Q and the camera information C are stored in the fingerprint database in a corresponding relationship.
The signaling database is formed by collecting signaling data of all users in a core network of an operator, and information in the signaling database comprises mobile terminal identification, service time, position information, mobile phone signal strength information and the like of the users.
Preferably, the mobile terminal identifier includes: international mobile subscriber identity Number (IMSI).
And step 204, inquiring the mobile phone signal strength corresponding to the position information in each clue information from a pre-generated fingerprint library.
Specifically, for each clue information Ui=(Ci,Li,Ti) Extracting Camera information CiSearching the fingerprint database for the stored camera position C which is the same as Ci in the clue informationThe signal intensity of the mobile phone is obtained, thereby obtaining the information U of the cablei=(Ci,Li,Ti) Corresponding mobile phone signal intensity Qi
Step 205, querying a mobile terminal identifier in at least one specific signaling data corresponding to each piece of thread information from a signaling database, where each specific signaling data is the signaling data whose location information in the signaling database is the same as the location information corresponding to the camera information in the corresponding thread information, whose service time is the same as the occurrence time in the corresponding thread information, and whose mobile phone signal strength is the same as the mobile phone signal strength in the corresponding thread information.
Specifically, each thread information U is obtained in step 204i=(Ci,Li,Ti) Corresponding mobile phone signal intensity QiThen, further searching signaling data with the same position as Ci, the same service time as Ti, and the same mobile phone signal strength as Qi in the signaling database, wherein the number of people who appear at the same place at the same time may be multiple, and therefore, the signaling data queried in the step may be multiple.
The method comprises the steps of searching and screening the fingerprint database and the signaling database according to clue information of the criminal suspect, so that the signaling data range containing the criminal suspect is limited in a smaller range, and the detection difficulty is greatly reduced.
And step 206, forming a mobile terminal identification set corresponding to each piece of clue information according to at least one mobile terminal identification corresponding to each piece of inquired clue information, and taking intersection of the mobile terminal identification sets corresponding to all the clue information to generate a mobile terminal identification list.
Specifically, each clue information may correspondingly query a plurality of pieces of signaling data, and extract a mobile terminal identifier in each piece of signaling data, so that each clue information correspondingly generates a mobile terminal identifier set, where the mobile terminal identifier set at least includes one mobile terminal identifier; preferably, the mobile terminal identifier includes IMSI, and the mobile terminal identifier corresponds to a mobile terminal identifier of each threadThe set of mobile terminals may be denoted as IMSIi(ii) a Intersection (IMSI) of the sets of mobile terminal identifications corresponding to all threads is obtained1∩IMSI2∩…∩IMSIn) That is, the list of mobile terminal identifiers appearing in all the obtained clues may be obtained, and the mobile terminals included in the list are mobile terminals that are most likely to be held by the criminal suspect.
Through obtaining suspect's mobile terminal sign list, can dwindle suspect's scope greatly, through further carrying out the location tracking to a plurality of mobile terminals in the mobile terminal list, can realize the location to suspect fast to reduce the time cost of detecting the case.
It should be noted that, as long as two or more positions of the criminal suspect can be obtained, the mobile phone number used by the criminal suspect can be obtained through matching of the fingerprint database, and the more the determined position data is, the more accurate the target capture is, thereby providing a high-value clue for the police to track the suspect.
In the method for locating a criminal suspect provided in this embodiment, the method for locating a criminal suspect includes: the method comprises the steps of obtaining a plurality of clue information of a criminal suspect, inquiring mobile phone signal strength corresponding to position information in each clue information in a fingerprint database according to the clue information, inquiring mobile terminal identification in at least one specific signaling data corresponding to each clue information from a signaling database, forming a mobile terminal identification set corresponding to the clue information according to at least one mobile terminal identification corresponding to each inquired clue information, taking intersection of the mobile terminal identification sets corresponding to all the clue information, and generating a mobile terminal identification list. Compared with the prior art, the method provided by the embodiment does not need to perform complex manual analysis, and can enable the investigation personnel to quickly acquire the mobile terminal identification information list of the criminal suspect based on the clue information about the criminal suspect acquired from the monitoring video through big data analysis, so that the range of the criminal suspect is greatly reduced, the trail of the criminal suspect can be timely found and tracked, the time cost for solving a case is reduced, the investigation progress of the case is accelerated, and the method has important significance for creating a good social security environment.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a device corresponding to the method for locating a criminal suspect according to an embodiment of the present invention. As shown in fig. 3, the locating apparatus for a criminal suspect includes a first obtaining module 11 and a second obtaining module 12, where the first obtaining module 11 is configured to obtain a plurality of pieces of clue information of a criminal suspect; the second obtaining module 12 is configured to obtain a list of mobile terminal identifiers of the criminal suspect according to the plurality of pieces of clue information.
In the locating device for a criminal suspect provided in this embodiment, the locating device for the criminal suspect includes: the system comprises a first obtaining module and a second obtaining module, wherein the first obtaining module is used for obtaining a plurality of pieces of clue information of a criminal suspect, and the second obtaining module is used for obtaining a mobile terminal identification list of the criminal suspect according to the plurality of pieces of clue information. Compared with the prior art, the technical scheme provided by the embodiment does not need to perform complex manual analysis, the mobile terminal identification information of the criminal suspect can be rapidly acquired by the investigation personnel through big data analysis based on the clue information about the criminal suspect acquired from the monitoring video, so that the range of the criminal suspect is greatly reduced, the trail of the criminal suspect can be timely found and tracked, the time cost for solving a case is reduced, the investigation progress of the case is accelerated, and the method has important significance for creating a good social security environment.
Example four
Fig. 4 is a schematic structural diagram of a device for a method for locating a criminal suspect according to a second embodiment of the present invention. As shown in fig. 4, the positioning apparatus for a criminal suspect includes a first obtaining module 11 and a second obtaining module 12, where the first obtaining module 11 is configured to obtain a plurality of pieces of clue information of a criminal suspect; the second obtaining module 12 is configured to obtain a list of mobile terminal identifiers of the criminal suspect according to the plurality of pieces of clue information.
In this embodiment, specifically, the first obtaining module 11 includes a first sub obtaining module 1101 and a second sub obtaining module 1102; the first sub-obtaining module 1101 is configured to obtain camera information and a surveillance video from a server, where the camera information and the surveillance video are used for a criminal suspect at a crime scene and on an escape route, and the second sub-obtaining module 1102 is configured to obtain, from the surveillance video, position information of the criminal suspect in the clue information and time information of the criminal suspect corresponding to the position information.
The second obtaining module 12 includes a first sub-query module 1201, a second sub-query module 1202, and a first sub-generating module 1203; the first sub-query module 1201 is configured to query, from a pre-generated fingerprint library, a mobile phone signal strength corresponding to location information in each piece of hint information; the second sub-query module 1202 is configured to query, from a signaling database, a mobile terminal identifier in at least one specific signaling data corresponding to each piece of thread information; the first sub-generation module 1203 is configured to form a mobile terminal identifier set corresponding to each piece of queried clue information according to at least one mobile terminal identifier corresponding to each piece of clue information, and generate a mobile terminal identifier list by taking an intersection of the mobile terminal identifier sets corresponding to all clue information.
In this embodiment, the positioning apparatus for the criminal suspect further includes a first generating module 13 and a second generating module 14; the first generation module 13 is configured to collect the mobile phone signal intensities around all the cameras, and generate a fingerprint database according to the camera information of each camera and the mobile phone signal intensity around each camera; the second generating module 14 is configured to collect signaling data of all users in the core network, and generate a signaling database according to the signaling data of all users; the second obtaining module assists in generating the list of mobile terminal identifications of the criminal suspect by calling the first generating module 13 and the second generating module 14.
In the locating device for a criminal suspect provided in this embodiment, the locating device for the criminal suspect includes: the first acquisition module is used for acquiring a plurality of clue information of a criminal suspect; the second obtaining module specifically includes: the system comprises a first sub-query module, a second sub-query module and a first sub-generation module, wherein the first sub-query module, the second sub-query module and the first sub-generation module are used for acquiring a mobile terminal identification list of a criminal suspect according to the plurality of clue information, and the first generation module and the second generation module are used for respectively generating a fingerprint database and a signaling database. Compared with the prior art, the technical scheme provided by the embodiment does not need to perform complex manual analysis, the mobile terminal identification information of the criminal suspect can be rapidly acquired by the investigation personnel through big data analysis based on the clue information about the criminal suspect acquired from the monitoring video, so that the range of the criminal suspect is greatly reduced, the trail of the criminal suspect can be timely found and tracked, the time cost for solving a case is reduced, the investigation progress of the case is accelerated, and the method has important significance for creating a good social security environment.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.

Claims (8)

1. A method for locating a criminal suspect, comprising:
acquiring a plurality of clue information of a criminal suspect, wherein each clue information comprises position information of the criminal suspect, time information of the criminal suspect corresponding to the position information and camera information corresponding to the position information;
obtaining a mobile terminal identification list of the criminal suspect according to the plurality of pieces of clue information, wherein the mobile terminal identification list comprises at least one mobile terminal identification;
the obtaining the mobile terminal identification list of the criminal suspect according to the plurality of clue information comprises:
inquiring the mobile phone signal intensity corresponding to the camera information in each clue information from a pre-generated fingerprint library;
inquiring a mobile terminal identifier in at least one piece of specific signaling data corresponding to each clue information from a signaling database, wherein each piece of specific signaling data is the signaling data of which the position information in the signaling database is the same as the camera information in the corresponding clue information, the service time is the same as the time information of the criminal suspect in the corresponding clue information, and the mobile phone signal strength is the same as the mobile phone signal strength in the corresponding clue information;
forming a mobile terminal identification set corresponding to the cue information according to at least one mobile terminal identification corresponding to each piece of inquired cue information, wherein the mobile terminal identification set corresponding to each cue information comprises at least one mobile terminal identification corresponding to the cue information;
and taking intersection sets of the mobile terminal identification sets corresponding to all the clue information to generate a mobile terminal identification list.
2. The method of claim 1, wherein the step of querying the mobile phone signal strength corresponding to each location information from the pre-generated fingerprint database further comprises:
collecting the mobile phone signal intensity around all cameras;
and generating a fingerprint database according to the camera information of each camera and the mobile phone signal intensity around each camera, wherein the fingerprint database comprises the camera information and the mobile phone signal intensity corresponding to the camera information.
3. The method of claim 1, wherein the querying the signaling database for the mobile terminal identifier in the at least one specific signaling datum further comprises:
acquiring signaling data of all users of a core network, wherein each signaling data comprises a mobile terminal identifier, service time, position information and mobile phone signal strength;
and generating a signaling database according to the signaling data of all users, wherein the signaling database stores a plurality of signaling data.
4. The method of claim 1, wherein the obtaining of the plurality of clue information of the criminal suspect comprises:
acquiring camera information and monitoring videos of a criminal suspect on a crime scene and an escape route from a server;
and acquiring the position information of the criminal suspect in the clue information and the time information of the criminal suspect corresponding to the position information from the monitoring video.
5. A criminal suspect's positioner, comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring a plurality of clue information of a criminal suspect, and each clue information comprises position information of the criminal suspect, time information of the criminal suspect corresponding to the position information and camera information corresponding to the position information;
the second obtaining module is used for obtaining a mobile terminal identification list of the criminal suspect according to the plurality of clue information; wherein the mobile terminal identification list comprises at least one mobile terminal identification;
the second obtaining module further comprises:
a first sub-query module: the mobile phone signal intensity corresponding to the camera information in each clue information is inquired from a pre-generated fingerprint library;
a second sub-query module: the mobile terminal identifier is used for inquiring at least one piece of specific signaling data corresponding to each piece of clue information from a signaling database, wherein each piece of specific signaling data is the signaling data of which the position information in the signaling database is the same as the camera information in the corresponding clue information, the service time is the same as the time information of the criminal suspect in the corresponding clue information, and the mobile phone signal strength is the same as the mobile phone signal strength in the corresponding clue information;
a first sub-generation module: forming a mobile terminal identification set corresponding to each piece of clue information according to at least one mobile terminal identification corresponding to each piece of inquired clue information, and taking intersection of the mobile terminal identification sets corresponding to all the clue information to generate a mobile terminal identification list; and the mobile terminal identification set corresponding to each piece of thread information comprises at least one mobile terminal identification corresponding to the thread information.
6. The apparatus of claim 5, further comprising:
the first generation module is used for acquiring the mobile phone signal intensity around all the cameras; generating a fingerprint database according to the camera information of each camera and the mobile phone signal intensity around each camera; the fingerprint database comprises camera information and mobile phone signal intensity corresponding to the camera information.
7. The apparatus of claim 5, further comprising:
the second generation module is used for acquiring signaling data of all users of the core network and generating a signaling database according to the signaling data of all the users, wherein the signaling database stores a plurality of signaling data; each signaling data comprises a mobile terminal identification, service time, position information and mobile phone signal strength.
8. The criminal suspect location apparatus of claim 5, wherein the first obtaining module comprises:
the first sub-acquisition module is used for acquiring camera information and monitoring videos of a criminal suspect on a crime scene and an escape route from the server;
and the second sub-acquisition module is used for acquiring the position information of the criminal suspect in the clue information and the time information of the criminal suspect corresponding to the position information from the monitoring video.
CN201810879030.2A 2018-08-03 2018-08-03 Criminal suspect positioning method and device Active CN109151733B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810879030.2A CN109151733B (en) 2018-08-03 2018-08-03 Criminal suspect positioning method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810879030.2A CN109151733B (en) 2018-08-03 2018-08-03 Criminal suspect positioning method and device

Publications (2)

Publication Number Publication Date
CN109151733A CN109151733A (en) 2019-01-04
CN109151733B true CN109151733B (en) 2020-10-23

Family

ID=64791762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810879030.2A Active CN109151733B (en) 2018-08-03 2018-08-03 Criminal suspect positioning method and device

Country Status (1)

Country Link
CN (1) CN109151733B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109699009B (en) * 2019-01-10 2020-11-10 珠海格力电器股份有限公司 Signal tracking method, device and system
CN110555964B (en) * 2019-07-25 2021-11-09 武汉烽火众智数字技术有限责任公司 Multi-data fusion key area early warning system and method
CN111324825B (en) * 2020-01-20 2024-04-30 北京百度网讯科技有限公司 Method and device for searching target personnel

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101437255A (en) * 2007-11-16 2009-05-20 中国移动通信集团福建有限公司 Method for filtering and dogging theft suspect mobile phone number of mobile communication base station
CN103716878A (en) * 2013-12-12 2014-04-09 深圳先进技术研究院 Method for locating with the use of mobile phone and video monitoring equipment
CN104869630A (en) * 2015-04-29 2015-08-26 厦门大学 Pseudo base station rapid positioning method and system based on offline fingerprint database
CN106102001A (en) * 2016-06-02 2016-11-09 中国联合网络通信集团有限公司 The screening technique of suspected crime mobile terminal and system
CN106131784A (en) * 2016-06-28 2016-11-16 中国联合网络通信集团有限公司 A kind of suspicion number determines methods, devices and systems

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SG157355A1 (en) * 2004-10-29 2009-12-29 Skyhook Wireless Inc Location beacon database and server, method of building location beacon database, and location based service using same

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101437255A (en) * 2007-11-16 2009-05-20 中国移动通信集团福建有限公司 Method for filtering and dogging theft suspect mobile phone number of mobile communication base station
CN103716878A (en) * 2013-12-12 2014-04-09 深圳先进技术研究院 Method for locating with the use of mobile phone and video monitoring equipment
CN104869630A (en) * 2015-04-29 2015-08-26 厦门大学 Pseudo base station rapid positioning method and system based on offline fingerprint database
CN106102001A (en) * 2016-06-02 2016-11-09 中国联合网络通信集团有限公司 The screening technique of suspected crime mobile terminal and system
CN106131784A (en) * 2016-06-28 2016-11-16 中国联合网络通信集团有限公司 A kind of suspicion number determines methods, devices and systems

Also Published As

Publication number Publication date
CN109151733A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
CN109151733B (en) Criminal suspect positioning method and device
US9165288B2 (en) Inferring relationships based on geo-temporal data other than telecommunications
CN105205155B (en) A kind of screening system and method for big data crime partner
CN108540751A (en) Monitoring method, apparatus and system based on video and electronic device identification
CN106131784B (en) A kind of suspicion number determines methods, devices and systems
EP2280382B1 (en) Method for video- and position-based identification
CN104301431B (en) A kind of key population real-time monitoring system based on multi-source big data GIS
CN108540750A (en) Based on monitor video and the associated method, apparatus of electronic device identification and system
CN108540752B (en) Method, device and system for identifying target object in video monitoring
CN108540756A (en) Recognition methods, apparatus and system based on video and electronic device identification
US9179259B2 (en) Recognizing unknown actors based on wireless behavior
CN108271157B (en) Pseudo base station identification method and device
CN106899948B (en) Pseudo base station discovery method, system, terminal and server
CN111277788B (en) Monitoring method and monitoring system based on MAC address
CN108540757B (en) Monitoring system and monitoring method
CN106102001A (en) The screening technique of suspected crime mobile terminal and system
CN110557722B (en) Target group partner identification method and related device
CN106331060B (en) WIFI-based deployment and control method and system
CN111026909A (en) Method for supplementing public security investigation data set based on self-timer tremble view
CN110324589A (en) A kind of monitoring system and method for tourist attraction
CN108540748A (en) Monitor video and the associated method, apparatus of electronic device identification and system
US20200042798A1 (en) System and method for associating an identifier of a mobile communication terminal with a person-of-interest, using video tracking
CN112383751A (en) Monitoring video data processing method and device, terminal equipment and storage medium
US8344878B2 (en) Method and apparatus for the creation of an event-associated electronic device directory
CN111079524A (en) Target identity recognition method and system based on operator base station

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant