CN109308335A - It is a kind of that system and method are searched based on the suspect virtually positioned - Google Patents
It is a kind of that system and method are searched based on the suspect virtually positioned Download PDFInfo
- Publication number
- CN109308335A CN109308335A CN201810961989.0A CN201810961989A CN109308335A CN 109308335 A CN109308335 A CN 109308335A CN 201810961989 A CN201810961989 A CN 201810961989A CN 109308335 A CN109308335 A CN 109308335A
- Authority
- CN
- China
- Prior art keywords
- suspect
- server
- virtual robot
- virtual
- party software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
Landscapes
- Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- Computer Security & Cryptography (AREA)
- Human Resources & Organizations (AREA)
- Educational Administration (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Alarm Systems (AREA)
- Manipulator (AREA)
Abstract
System and method are searched based on the suspect virtually positioned the invention discloses a kind of.The suspect searches at least virtual robot that system includes server and is electrically connected respectively with the server, wherein, the virtual robot, for under the control of the server, the people of attachment is searched on third party software in a manner of virtually positioning, personal information nearby is obtained, and personal information is back to the server near will acquire;The server is compared with the suspect's information prestored for controlling the virtual robot, and by personal information near virtual robot passback, obtains the position range of suspect.The suspect, which searches system, can help public security officer to position suspect quickly by third party software to implement to arrest, whole process be fully automated and it is uninterrupted for 24 hours, be not necessarily to manual operation, a large amount of manpower and material resources can be saved.
Description
Technical field
Field is investigated the present invention relates to public security more particularly to a kind of based on the suspect virtually positioned lookup system and side
Method.
Background technique
On the one hand the development of communications industry makes people's lives become more convenient like a double-edged sword, promote through
The development of Ji, the output value of telecommunication service is in 2016 just more than 1.1 trillion, and on the other hand, one of social software creation is another
A Virtual Space also becomes the temperature for breeding crime due to having the characteristics such as spread speed fast, wide coverage, concealment height
Bed, and crime radianting capacity is strong, and social danger is big, and case-solving rate is low.
Mainly have several types using the crime that social software carries out: 1, disturb the public order class, 2, assault sexually class, 3, swindleness
It deceives, plunder class, 4, class of blackmailing.Just because of the virtual and concealment of social software, navigates to suspect and is difficult, current
Conventional approach is to know the social software account of suspect first, and then public security officer is artificial with the identity addition suspicion of stranger
Good friend, and exchanged with suspect, by positioning the position of suspect after a series of investigation, finally implement to arrest.
Although this method can track down a part of case, manpower, financial resources investment compared with daily crime quantity, cup waterwheel
Firewood is socially also difficult to generate suspect fright effect.There is a statistical data to show, the case-solving rate of social software crime
Only about 3%.
Summary of the invention
In order to solve above-mentioned the deficiencies in the prior art, the present invention provides a kind of based on the suspect virtually positioned lookup system
And method.The suspect, which searches system, can help public security officer to position suspect quickly by third party software to implement to grab
Catch, whole process be fully automated and it is uninterrupted for 24 hours, be not necessarily to manual operation, a large amount of human and material resources can be saved.
The technical problems to be solved by the invention are achieved by the following technical programs:
It is a kind of that system is searched based on the suspect virtually positioned, it is electrically connected extremely including server and respectively with the server
A few virtual robot, wherein
The virtual robot, for being searched on third party software in a manner of virtually positioning under the control of the server
The people of rope attachment, to obtain personal information nearby, and personal information is back to the server near will acquire;
The server, for controlling the virtual robot, and by people near virtual robot passback
Member's information is compared with the suspect's information prestored, to obtain the position range for comparing successful suspect.
It further, further include distribution transmission module, connecting port is electrically connected to the data-interface of the server thereon,
Second line of a couplet interface is electrically connected to the data-interface of the virtual robot, for the server and the virtual robot it
Between carry out instruction distribution and information transmission.
Further, the distribution transmission module includes an at least usb hub.
It further, further include electronic control module, input terminal is electrically connected to the control output end of the server, output
End is electrically connected to the power input of the virtual robot, under the control of the server to the virtual machine
People carries out for power-off.
Further, the electronic control module includes MCU unit and an at least Switching Power Supply MOS circuit, the MCU unit
Input terminal is electrically connected to the control output end of the server, and output end is electrically connected to the Switching Power Supply MOS circuit
The output end of input terminal, the Switching Power Supply MOS circuit is electrically connected to the power input of the virtual robot.
Further, Java framework layer is pre-filled in the virtual robot, the Java framework layer is after actuation
Take over the system process of the virtual robot, then start on the virtual robot preassembled third party software with
People near search, and after the instruction for intercepting and capturing third party software calling location information, virtually positioning is supplied to third for generation one
Square software, with obtain third party software with it is virtual positioning search near personal information.
It is a kind of based on the suspect's lookup method virtually positioned, comprising:
Step 1: search instruction is sent to an at least virtual robot using server;
Step 2: the virtual robot is searched on third party software in a manner of virtually positioning after receiving search instruction
The people of attachment, to obtain personal information nearby;
Step 3: the virtual robot will acquire near personal information be back to the server;
Step 4: personal information near passback is compared the server with the suspect's information prestored, is compared with obtaining
The position range of successful suspect.
Further, step 2 includes:
Step 2.1: the virtual robot starts the Java framework layer being previously implanted in it after receiving search instruction, described
Java framework layer takes over the system process of the virtual robot after actuation;
Step 2.2: it is attached to search for that the Java framework layer starts preassembled third party software on the virtual robot
Close people;
Step 2.3: the Java framework layer generates a virtually positioning after the instruction for intercepting and capturing third party software calling location information
It is supplied to third party software;
Step 2.4: the Java framework layer get third party software with it is virtual positioning search near personal information.
Further, in step 2.2, it is soft first to log in third party before the people near search for the Java framework layer
Part.
Further, the Java framework layer first registers the virtual account of third party software before logging in third party software
Number, alternatively, calling the real account numbers prestored for logging in third party software.
The invention has the following beneficial effects: the suspects to search system by the virtual robot the of its installation
When using " neighbouring people " this function on software of the third party, it is virtual fixed for one of the people near searching for provide to third party software
Position, then stores personal information near acquisition by the server, is compared, to determine whether that suspect appears in
Near some virtual positioning, whole process be fully automated and it is uninterrupted for 24 hours, be not necessarily to manual operation, can save a large amount of
Human and material resources can help public security officer to position suspect quickly by third party software to implement to arrest.
Detailed description of the invention
Fig. 1 is the functional block diagram that suspect provided by the invention searches system;
Fig. 2 is the circuit diagram of MCU unit in suspect's lookup system shown in FIG. 1;
Fig. 3 is the circuit diagram of Switching Power Supply MOS circuit in suspect's lookup system shown in FIG. 1;
Fig. 4 is the step block diagram of suspect's lookup method provided by the invention;
Fig. 5 is the functional block diagram of the step 2 of suspect's lookup method provided by the invention;
Fig. 6 is the schematic illustration of multipoint positioning method provided by the invention.
Specific embodiment
The present invention will be described in detail with reference to the accompanying drawings and examples.
Embodiment one
As shown in Figure 1, a kind of search system based on the suspect that virtually positions, including server and electric with the server respectively
Property connection an at least virtual robot, wherein
The virtual robot, for being searched on third party software in a manner of virtually positioning under the control of the server
The people of rope attachment, to obtain personal information nearby, and personal information is back to the server near will acquire;
The server, for controlling the virtual robot, and by people near virtual robot passback
Member's information is compared with the suspect's information prestored, to obtain the position range for comparing successful suspect.
The suspect search system used on the third party software of its installation by the virtual robot it is " neighbouring
When this function of people ", the virtual positioning for the people near searching for is provided to third party software, then by the server pair
Personal information is stored, is compared near acquisition, whole to determine whether that suspect appears near some virtual positioning
A process be fully automated and it is uninterrupted for 24 hours, be not necessarily to manual operation, a large amount of human and material resources can be saved, public security can be helped
Personnel position suspect quickly by third party software to implement to arrest.
It illustrates, third party software is preferably but not limited to as social softwares such as QQ, wechat, microblogging, footpath between fields footpaths between fields, any
The third party software of people near capable of searching for, such as some browser softwares with " people of attachment " function, news
Software etc..
In the present embodiment, the quantity of the virtual robot has 14, is respectively and electrically connected to the server.
The virtual robot include processor and respectively with the processor be electrically connected memory, power interface,
Antenna module (2G/3G/4G/5G etc.), GPS component and data-interface (USB etc.) etc., and further include difference according to different demands
Touch display screen, WiFi component and the bluetooth module etc. being electrically connected with the processor.The virtual robot can with but not
It is limited to use the terminal device of android system for bottoms such as mobile phone, plate or PCs.
In the present embodiment, the processor of the virtual robot uses the micro- four core Cortex-A9 arm processor of auspicious core.
It further includes distribution transmission module that the suspect, which searches system, and connecting port is electrically connected to the number of the server thereon
According to interface, second line of a couplet interface is electrically connected to the data-interface of the virtual robot, in the server and described virtual
Instruction distribution and information transmission are carried out between robot.The control instruction of the server is distributed to by the distribution transmission module
Each virtual robot, and personal information near the acquisition of each virtual robot is back to the server.
Specifically, the distribution transmission module includes an at least usb hub, connecting port passes through USB data line electricity thereon
Property is connected to the USB interface of the server, and each second line of a couplet interface is electrically connected to corresponding virtual machine by USB data line
The USB interface of people.
In the present embodiment, the quantity of the usb hub is 2, and each usb hub has 1 upper connecting port and 7
Second line of a couplet interface, 1 USB interface on the server are electrically connected 7 virtual robots.
It further includes electronic control module that the suspect, which searches system, and input terminal is electrically connected to the control output of the server
End, output end is electrically connected to the power input (power interface) of the virtual robot, for the control in the server
The virtual robot is carried out for power-off under system.The electronic control module obtains electric energy from the server and is supplied to described
Then virtual robot carries out for power-off the virtual robot under the control of the server.
Specifically, the electronic control module includes MCU unit and an at least Switching Power Supply MOS circuit, the MCU unit it is defeated
Enter the output end that end is electrically connected to the server by UART bus, to obtain electric energy supply and control instruction, output end
Being electrically connected to the input terminal of the Switching Power Supply MOS circuit, (power output end of the MCU unit is electrically connected to described open
The power input of powered-down source MOS circuit, the control output end of the MCU unit are electrically connected to the Switching Power Supply MOS electricity
The control signal on road), (power supply) output end of the Switching Power Supply MOS circuit is electrically connected to the electricity of the virtual robot
Source input terminal (power interface).
In the present embodiment, as shown in Figures 2 and 3, there are 14 control output end (UP_ in the MCU chip of the MCU unit
EN), the quantity of the Switching Power Supply MOS circuit has 14, the control signal (UP_ of 14 Switching Power Supply MOS circuits
POWERSWITCH corresponding control output end (UP_EN), 14 Switching Power Supplies in the MCU chip) are respectively electrically connected to
The power input (VDD) of MOS circuit is electrically connected on the same power output end (VCC) of the MCU chip.
Preferably, the distribution transmission module and electronic control module are mounted on same pcb board, form control panel.
Java framework layer is pre-filled in the virtual robot, the Java framework layer takes over the void after actuation
Then the system process of quasi- robot starts preassembled third party software on the virtual robot to search for neighbouring
People, and after the instruction for intercepting and capturing third party software calling location information, it generates a virtual positioning and is supplied to third party software, to obtain
Take third party software with it is virtual positioning search near personal information.
Embodiment two
As shown in figure 4, it is a kind of based on the suspect's lookup method virtually positioned, it is not limited to be applied to suspicion described in embodiment one
It doubts people and searches system, comprising:
Step 1: search instruction is sent to an at least virtual robot using server;
In the step 1, the server is by the usb hub in the distribution transmission module to the virtual machine human hair
Send search instruction.
Before the step 1, further includes: the virtual robot boots up under the control of the server.
Specifically, MCU unit of the server into the electronic control module issues power supply instruction, the MUC unit exists
After receiving power supply instruction, controls the Switching Power Supply MOS circuit and connect to provide electric energy to the virtual robot;Then institute
It states server and power-on instruction, the void is sent to the virtual robot by the usb hub in the distribution transmission module
Quasi- robot executes boot program after receiving power-on instruction.
Step 2: the virtual robot is after receiving search instruction, in a manner of virtually positioning on third party software
The people of attachment is searched for, to obtain personal information nearby;
In the step 2, the virtual robot is obtained in virtual positioning according to third party software using rule or agreement
Neighbouring personal information, most importantly user's head portrait and user distance this two in neighbouring personal information, if user's head portrait uses
Be my real pictures, then the server can by face detection come with the face in suspect's information for prestoring
Portion's information is compared, and whether there is suspect near certain virtual positioning to determine, and user distance then can be public security people
Member provides the position range for comparing successful suspect, such as within the scope of certain 500m for virtually positioning or within the scope of 1km.
According to the different using rule or agreement of third party software, the virtual robot get near personal information
Also different, such as: the degree of opening of wechat is lower, if wechat user shields stranger and checks its circle of friends,
Even if wechat user used " neighbouring people " this function, the virtual robot is only able to get user's head portrait and use
Family is apart from this two information, described and at this time if what user's head portrait of wechat user used is not my real pictures
Server is difficult to recognize suspect;The degree of opening on microblogging or footpath between fields footpath between fields is higher, and microblogging or footpath between fields footpath between fields can be wanted in registration
Its user is asked to fill in personal information more as far as possible, these personal information are substantially all disclosed, microblogging or footpath between fields footpath between fields to anyone
As long as user used " neighbouring people " this function (the real-time positioning on footpath between fields footpath between fields is essentially equivalent to " neighbouring people ") or
Positioning is opened when issuing dynamic, the virtual robot can not only get user's head portrait and user distance, moreover it is possible to obtain
To the personal information such as user's dynamic, user's photograph album, age of user, graduated school, even publication user's dynamic when it is specific calmly
Position.
As shown in figure 5, the step 2 specifically includes:
Step 2.1: the virtual robot starts the Java framework layer being previously implanted in it after receiving search instruction, described
Java framework layer takes over the system process of the virtual robot after actuation;
In the step 2.1, the virtual robot receives the service from the usb hub in the distribution transmission module
The search instruction that device issues.
Step 2.2: the Java framework layer starts preassembled third party software on the virtual robot to search
People near rope;
In the step 2.2, the Java framework layer first registers the virtual account of third party software before the people near search
Number, third party software is then logged in the virtual account, alternatively, the Java framework layer can also call the third party prestored soft
The real account numbers (real account numbers of public security officer or other staff) of part or virtual account (registration when logging in for the first time), then with this
Real account numbers or virtual account log in third party software.
Step 2.3: it is virtual to generate one after the instruction for intercepting and capturing third party software calling location information for the Java framework layer
Positioning is supplied to third party software;
In the step 2.3, after the Java framework layer on the virtual robot has taken over system process, the virtual machine
All third party softwares on device people are in calling positioning unit (mainly including antenna module and GPS component) to obtain location information
When (mainly including mobile base station position and longitude and latitude position), it can all be intercepted and captured by the Java framework layer, then by the Java
Ccf layer generates a virtual positioning and is supplied to third party software use.
Step 2.4: the Java framework layer get third party software with it is virtual positioning search near personal information.
In the step 2.4, third party software, will after getting the virtual positioning that the Java framework layer provides
Request instruction is sent from the background to software with itself rule or agreement, obtains lists of persons near virtual positioning above, it is then described
Java framework layer can get the disclosures such as the homepage, circle of friends, photograph album of neighbouring personnel from neighbouring lists of persons, obtain
To neighbouring personal information.
Step 3: the virtual robot will acquire near personal information be back to the server;
In the step 3, the virtual robot is returned by the usb hub in the distribution transmission module to the server
Pass personal information near obtaining.
Step 4: personal information near passback is compared the server with the suspect's information prestored, to obtain
Compare the position range of successful suspect.
In the step 4, for the reason of privacy and safety, as described above, the position range that third party software provides is all
It is, in order to further reduce the position range of suspect, to be compared successfully within the scope of certain 500m for virtually positioning or within the scope of 1km
Later, the server will compare the corresponding USB set being virtually located through in the distribution transmission module of successful suspect
Line device is sent to the virtual robot, and then the virtual robot will compare successfully virtual positioning and position range conduct
Original virtual positioning and home position range, outside the range of home position near the multiple secondary virtual positioning of Area generation, then
Search obtains the attachment personal information in secondary virtual positioning on third party software, then in the virtual positioning of secondary that will acquire
Neighbouring personal information is back to the server and is compared, and obtains the multiple secondary location ranges for comparing successful suspect,
As shown in fig. 6, reducing the position range of suspect by way of multipoint positioning.
Embodiments of the present invention above described embodiment only expresses, the description thereof is more specific and detailed, but can not
Therefore limitations on the scope of the patent of the present invention are interpreted as, as long as skill obtained in the form of equivalent substitutions or equivalent transformations
Art scheme should all be fallen within the scope and spirit of the invention.
Claims (10)
1. a kind of search system based on the suspect that virtually positions, which is characterized in that including server and respectively with the service
At least virtual robot that device is electrically connected, wherein
The virtual robot, for being searched on third party software in a manner of virtually positioning under the control of the server
The people of rope attachment, to obtain personal information nearby, and personal information is back to the server near will acquire;
The server, for controlling the virtual robot, and by people near virtual robot passback
Member's information is compared with the suspect's information prestored, to obtain the position range for comparing successful suspect.
2. according to claim 1 search system based on the suspect virtually positioned, which is characterized in that further include that distribution passes
Defeated module, connecting port is electrically connected to the data-interface of the server thereon, and second line of a couplet interface is electrically connected to the virtual machine
The data-interface of device people, for carrying out instruction distribution and information transmission between the server and the virtual robot.
3. the suspect according to claim 2 based on virtual robot searches system, which is characterized in that the distribution passes
Defeated module includes an at least usb hub.
4. according to claim 1 to 3 search system based on the suspect virtually positioned, which is characterized in that also wrap
Electronic control module is included, input terminal is electrically connected to the control output end of the server, and output end is electrically connected to described virtual
The power input of robot, for carrying out the virtual robot for power-off under the control of the server.
5. according to claim 4 search system based on the suspect virtually positioned, which is characterized in that the electronic control module
Including MCU unit and at least a Switching Power Supply MOS circuit, the input terminal of the MCU unit are electrically connected to the server
Control output end, output end are electrically connected to the input terminal of the Switching Power Supply MOS circuit, the Switching Power Supply MOS circuit
Output end is electrically connected to the power input of the virtual robot.
6. any in -5 according to claim 1 described search system based on the suspect virtually positioned, which is characterized in that described
Java framework layer is pre-filled in virtual robot, what the Java framework layer took over the virtual robot after actuation is
Then system process starts preassembled third party software on the virtual robot to search for neighbouring people, and is intercepting and capturing
After third party software calls the instruction of location information, generates a virtual positioning and be supplied to third party software, it is soft to obtain third party
Part with it is virtual positioning search near personal information.
7. a kind of based on the suspect's lookup method virtually positioned characterized by comprising
Step 1: search instruction is sent to an at least virtual robot using server;
Step 2: the virtual robot is searched on third party software in a manner of virtually positioning after receiving search instruction
The people of attachment, to obtain personal information nearby;
Step 3: the virtual robot will acquire near personal information be back to the server;
Step 4: personal information near passback is compared the server with the suspect's information prestored, is compared with obtaining
The position range of successful suspect.
8. according to claim 7 based on the suspect's lookup method virtually positioned, which is characterized in that step 2 includes:
Step 2.1: the virtual robot starts the Java framework layer being previously implanted in it after receiving search instruction, described
Java framework layer takes over the system process of the virtual robot after actuation;
Step 2.2: it is attached to search for that the Java framework layer starts preassembled third party software on the virtual robot
Close people;
Step 2.3: the Java framework layer generates a virtually positioning after the instruction for intercepting and capturing third party software calling location information
It is supplied to third party software;
Step 2.4: the Java framework layer get third party software with it is virtual positioning search near personal information.
9. according to claim 8 based on the suspect's lookup method virtually positioned, which is characterized in that in step 2.2,
The Java framework layer first logs in third party software before the people near search.
10. according to claim 9 based on the suspect's lookup method virtually positioned, which is characterized in that the Java frame
Rack-layer first registers the virtual account of third party software before logging in third party software, alternatively, calling the third party software prestored
Real account numbers or virtual account.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810961989.0A CN109308335A (en) | 2018-08-22 | 2018-08-22 | It is a kind of that system and method are searched based on the suspect virtually positioned |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810961989.0A CN109308335A (en) | 2018-08-22 | 2018-08-22 | It is a kind of that system and method are searched based on the suspect virtually positioned |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109308335A true CN109308335A (en) | 2019-02-05 |
Family
ID=65223831
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810961989.0A Pending CN109308335A (en) | 2018-08-22 | 2018-08-22 | It is a kind of that system and method are searched based on the suspect virtually positioned |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109308335A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104867217A (en) * | 2015-06-03 | 2015-08-26 | 深圳市星火电子工程公司 | Community monitoring and management system |
CN105203924A (en) * | 2015-10-10 | 2015-12-30 | 上海博英信息科技有限公司 | Electricity usage trend abnormity suspicion analysis method and anti-electric-larceny monitoring system |
CN106303903A (en) * | 2015-05-19 | 2017-01-04 | 腾讯科技(深圳)有限公司 | A kind of user's lookup method, device and server |
CN106339973A (en) * | 2016-08-31 | 2017-01-18 | 安徽四创电子股份有限公司 | Guard security system based on data platform and and guard security method thereof |
CN106780056A (en) * | 2016-11-29 | 2017-05-31 | 安徽云未科技有限公司 | A kind of mobile terminal location system and its localization method based on the virtual location technology of social software |
CN108115691A (en) * | 2018-01-31 | 2018-06-05 | 塔米智能科技(北京)有限公司 | A kind of robot interactive system and method |
-
2018
- 2018-08-22 CN CN201810961989.0A patent/CN109308335A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106303903A (en) * | 2015-05-19 | 2017-01-04 | 腾讯科技(深圳)有限公司 | A kind of user's lookup method, device and server |
CN104867217A (en) * | 2015-06-03 | 2015-08-26 | 深圳市星火电子工程公司 | Community monitoring and management system |
CN105203924A (en) * | 2015-10-10 | 2015-12-30 | 上海博英信息科技有限公司 | Electricity usage trend abnormity suspicion analysis method and anti-electric-larceny monitoring system |
CN106339973A (en) * | 2016-08-31 | 2017-01-18 | 安徽四创电子股份有限公司 | Guard security system based on data platform and and guard security method thereof |
CN106780056A (en) * | 2016-11-29 | 2017-05-31 | 安徽云未科技有限公司 | A kind of mobile terminal location system and its localization method based on the virtual location technology of social software |
CN108115691A (en) * | 2018-01-31 | 2018-06-05 | 塔米智能科技(北京)有限公司 | A kind of robot interactive system and method |
Non-Patent Citations (1)
Title |
---|
叶珍燕: "微信网络安全监管问题研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105228093B (en) | Intelligent mobile terminal managing and control system based on low-power consumption bluetooth | |
US20200051046A1 (en) | Smart broadcasting method and apparatus | |
CN104143078B (en) | Living body faces recognition methods, device and equipment | |
CN106686544B (en) | A kind of location-based information early warning method, terminal and system | |
CN104980455B (en) | A kind of multiple terminals method of data synchronization based on cloud storage, device and system | |
CN108541002B (en) | A kind of monitor method of paging message, mobile terminal and server | |
CN108471376A (en) | Data processing method, apparatus and system | |
CN103024664B (en) | The method and apparatus reminded according to event | |
CN109857297A (en) | Information processing method and terminal device | |
CN107592615A (en) | Localization method and device | |
CN106453589A (en) | Method and apparatus for synchronizing backup data | |
CN110336805A (en) | Network access management method and mobile terminal | |
KR20190009375A (en) | Method and apparatus for notifying terminal loss | |
CN109639569A (en) | A kind of social communication method and terminal | |
CN109495839A (en) | A kind of network service providing method and mobile terminal | |
CN103475997B (en) | The verification method of terminal and device in a kind of LTE enterprise network | |
CN108170559A (en) | A kind of data back up method and terminal | |
CN108123999A (en) | A kind of information push method and mobile terminal | |
CN109308335A (en) | It is a kind of that system and method are searched based on the suspect virtually positioned | |
CN205902086U (en) | Emergent notice device and system | |
CN204733268U (en) | Based on the all-digital visible talkback system of cloud service | |
CN106603650A (en) | Position information sharing method and terminal devices | |
CN106506844B (en) | A kind of monitoring of wechat remote mobile and return system, method based on agreement short message | |
CN107889112B (en) | A kind of recognition methods of pseudo-base station and mobile terminal | |
CN107295520B (en) | The method of infrared assisted lookup pseudo-base station |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190205 |