CN109308335A - It is a kind of that system and method are searched based on the suspect virtually positioned - Google Patents

It is a kind of that system and method are searched based on the suspect virtually positioned Download PDF

Info

Publication number
CN109308335A
CN109308335A CN201810961989.0A CN201810961989A CN109308335A CN 109308335 A CN109308335 A CN 109308335A CN 201810961989 A CN201810961989 A CN 201810961989A CN 109308335 A CN109308335 A CN 109308335A
Authority
CN
China
Prior art keywords
suspect
server
virtual robot
virtual
party software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810961989.0A
Other languages
Chinese (zh)
Inventor
王学军
周峰
陈志超
温春林
张海明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XINGHUO ELECTRONICS ENGINEERING Co SHENZHEN CITY
Original Assignee
XINGHUO ELECTRONICS ENGINEERING Co SHENZHEN CITY
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XINGHUO ELECTRONICS ENGINEERING Co SHENZHEN CITY filed Critical XINGHUO ELECTRONICS ENGINEERING Co SHENZHEN CITY
Priority to CN201810961989.0A priority Critical patent/CN109308335A/en
Publication of CN109308335A publication Critical patent/CN109308335A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety

Landscapes

  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Resources & Organizations (AREA)
  • Educational Administration (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Alarm Systems (AREA)
  • Manipulator (AREA)

Abstract

System and method are searched based on the suspect virtually positioned the invention discloses a kind of.The suspect searches at least virtual robot that system includes server and is electrically connected respectively with the server, wherein, the virtual robot, for under the control of the server, the people of attachment is searched on third party software in a manner of virtually positioning, personal information nearby is obtained, and personal information is back to the server near will acquire;The server is compared with the suspect's information prestored for controlling the virtual robot, and by personal information near virtual robot passback, obtains the position range of suspect.The suspect, which searches system, can help public security officer to position suspect quickly by third party software to implement to arrest, whole process be fully automated and it is uninterrupted for 24 hours, be not necessarily to manual operation, a large amount of manpower and material resources can be saved.

Description

It is a kind of that system and method are searched based on the suspect virtually positioned
Technical field
Field is investigated the present invention relates to public security more particularly to a kind of based on the suspect virtually positioned lookup system and side Method.
Background technique
On the one hand the development of communications industry makes people's lives become more convenient like a double-edged sword, promote through The development of Ji, the output value of telecommunication service is in 2016 just more than 1.1 trillion, and on the other hand, one of social software creation is another A Virtual Space also becomes the temperature for breeding crime due to having the characteristics such as spread speed fast, wide coverage, concealment height Bed, and crime radianting capacity is strong, and social danger is big, and case-solving rate is low.
Mainly have several types using the crime that social software carries out: 1, disturb the public order class, 2, assault sexually class, 3, swindleness It deceives, plunder class, 4, class of blackmailing.Just because of the virtual and concealment of social software, navigates to suspect and is difficult, current Conventional approach is to know the social software account of suspect first, and then public security officer is artificial with the identity addition suspicion of stranger Good friend, and exchanged with suspect, by positioning the position of suspect after a series of investigation, finally implement to arrest. Although this method can track down a part of case, manpower, financial resources investment compared with daily crime quantity, cup waterwheel Firewood is socially also difficult to generate suspect fright effect.There is a statistical data to show, the case-solving rate of social software crime Only about 3%.
Summary of the invention
In order to solve above-mentioned the deficiencies in the prior art, the present invention provides a kind of based on the suspect virtually positioned lookup system And method.The suspect, which searches system, can help public security officer to position suspect quickly by third party software to implement to grab Catch, whole process be fully automated and it is uninterrupted for 24 hours, be not necessarily to manual operation, a large amount of human and material resources can be saved.
The technical problems to be solved by the invention are achieved by the following technical programs:
It is a kind of that system is searched based on the suspect virtually positioned, it is electrically connected extremely including server and respectively with the server A few virtual robot, wherein
The virtual robot, for being searched on third party software in a manner of virtually positioning under the control of the server The people of rope attachment, to obtain personal information nearby, and personal information is back to the server near will acquire;
The server, for controlling the virtual robot, and by people near virtual robot passback Member's information is compared with the suspect's information prestored, to obtain the position range for comparing successful suspect.
It further, further include distribution transmission module, connecting port is electrically connected to the data-interface of the server thereon, Second line of a couplet interface is electrically connected to the data-interface of the virtual robot, for the server and the virtual robot it Between carry out instruction distribution and information transmission.
Further, the distribution transmission module includes an at least usb hub.
It further, further include electronic control module, input terminal is electrically connected to the control output end of the server, output End is electrically connected to the power input of the virtual robot, under the control of the server to the virtual machine People carries out for power-off.
Further, the electronic control module includes MCU unit and an at least Switching Power Supply MOS circuit, the MCU unit Input terminal is electrically connected to the control output end of the server, and output end is electrically connected to the Switching Power Supply MOS circuit The output end of input terminal, the Switching Power Supply MOS circuit is electrically connected to the power input of the virtual robot.
Further, Java framework layer is pre-filled in the virtual robot, the Java framework layer is after actuation Take over the system process of the virtual robot, then start on the virtual robot preassembled third party software with People near search, and after the instruction for intercepting and capturing third party software calling location information, virtually positioning is supplied to third for generation one Square software, with obtain third party software with it is virtual positioning search near personal information.
It is a kind of based on the suspect's lookup method virtually positioned, comprising:
Step 1: search instruction is sent to an at least virtual robot using server;
Step 2: the virtual robot is searched on third party software in a manner of virtually positioning after receiving search instruction The people of attachment, to obtain personal information nearby;
Step 3: the virtual robot will acquire near personal information be back to the server;
Step 4: personal information near passback is compared the server with the suspect's information prestored, is compared with obtaining The position range of successful suspect.
Further, step 2 includes:
Step 2.1: the virtual robot starts the Java framework layer being previously implanted in it after receiving search instruction, described Java framework layer takes over the system process of the virtual robot after actuation;
Step 2.2: it is attached to search for that the Java framework layer starts preassembled third party software on the virtual robot Close people;
Step 2.3: the Java framework layer generates a virtually positioning after the instruction for intercepting and capturing third party software calling location information It is supplied to third party software;
Step 2.4: the Java framework layer get third party software with it is virtual positioning search near personal information.
Further, in step 2.2, it is soft first to log in third party before the people near search for the Java framework layer Part.
Further, the Java framework layer first registers the virtual account of third party software before logging in third party software Number, alternatively, calling the real account numbers prestored for logging in third party software.
The invention has the following beneficial effects: the suspects to search system by the virtual robot the of its installation When using " neighbouring people " this function on software of the third party, it is virtual fixed for one of the people near searching for provide to third party software Position, then stores personal information near acquisition by the server, is compared, to determine whether that suspect appears in Near some virtual positioning, whole process be fully automated and it is uninterrupted for 24 hours, be not necessarily to manual operation, can save a large amount of Human and material resources can help public security officer to position suspect quickly by third party software to implement to arrest.
Detailed description of the invention
Fig. 1 is the functional block diagram that suspect provided by the invention searches system;
Fig. 2 is the circuit diagram of MCU unit in suspect's lookup system shown in FIG. 1;
Fig. 3 is the circuit diagram of Switching Power Supply MOS circuit in suspect's lookup system shown in FIG. 1;
Fig. 4 is the step block diagram of suspect's lookup method provided by the invention;
Fig. 5 is the functional block diagram of the step 2 of suspect's lookup method provided by the invention;
Fig. 6 is the schematic illustration of multipoint positioning method provided by the invention.
Specific embodiment
The present invention will be described in detail with reference to the accompanying drawings and examples.
Embodiment one
As shown in Figure 1, a kind of search system based on the suspect that virtually positions, including server and electric with the server respectively Property connection an at least virtual robot, wherein
The virtual robot, for being searched on third party software in a manner of virtually positioning under the control of the server The people of rope attachment, to obtain personal information nearby, and personal information is back to the server near will acquire;
The server, for controlling the virtual robot, and by people near virtual robot passback Member's information is compared with the suspect's information prestored, to obtain the position range for comparing successful suspect.
The suspect search system used on the third party software of its installation by the virtual robot it is " neighbouring When this function of people ", the virtual positioning for the people near searching for is provided to third party software, then by the server pair Personal information is stored, is compared near acquisition, whole to determine whether that suspect appears near some virtual positioning A process be fully automated and it is uninterrupted for 24 hours, be not necessarily to manual operation, a large amount of human and material resources can be saved, public security can be helped Personnel position suspect quickly by third party software to implement to arrest.
It illustrates, third party software is preferably but not limited to as social softwares such as QQ, wechat, microblogging, footpath between fields footpaths between fields, any The third party software of people near capable of searching for, such as some browser softwares with " people of attachment " function, news Software etc..
In the present embodiment, the quantity of the virtual robot has 14, is respectively and electrically connected to the server.
The virtual robot include processor and respectively with the processor be electrically connected memory, power interface, Antenna module (2G/3G/4G/5G etc.), GPS component and data-interface (USB etc.) etc., and further include difference according to different demands Touch display screen, WiFi component and the bluetooth module etc. being electrically connected with the processor.The virtual robot can with but not It is limited to use the terminal device of android system for bottoms such as mobile phone, plate or PCs.
In the present embodiment, the processor of the virtual robot uses the micro- four core Cortex-A9 arm processor of auspicious core.
It further includes distribution transmission module that the suspect, which searches system, and connecting port is electrically connected to the number of the server thereon According to interface, second line of a couplet interface is electrically connected to the data-interface of the virtual robot, in the server and described virtual Instruction distribution and information transmission are carried out between robot.The control instruction of the server is distributed to by the distribution transmission module Each virtual robot, and personal information near the acquisition of each virtual robot is back to the server.
Specifically, the distribution transmission module includes an at least usb hub, connecting port passes through USB data line electricity thereon Property is connected to the USB interface of the server, and each second line of a couplet interface is electrically connected to corresponding virtual machine by USB data line The USB interface of people.
In the present embodiment, the quantity of the usb hub is 2, and each usb hub has 1 upper connecting port and 7 Second line of a couplet interface, 1 USB interface on the server are electrically connected 7 virtual robots.
It further includes electronic control module that the suspect, which searches system, and input terminal is electrically connected to the control output of the server End, output end is electrically connected to the power input (power interface) of the virtual robot, for the control in the server The virtual robot is carried out for power-off under system.The electronic control module obtains electric energy from the server and is supplied to described Then virtual robot carries out for power-off the virtual robot under the control of the server.
Specifically, the electronic control module includes MCU unit and an at least Switching Power Supply MOS circuit, the MCU unit it is defeated Enter the output end that end is electrically connected to the server by UART bus, to obtain electric energy supply and control instruction, output end Being electrically connected to the input terminal of the Switching Power Supply MOS circuit, (power output end of the MCU unit is electrically connected to described open The power input of powered-down source MOS circuit, the control output end of the MCU unit are electrically connected to the Switching Power Supply MOS electricity The control signal on road), (power supply) output end of the Switching Power Supply MOS circuit is electrically connected to the electricity of the virtual robot Source input terminal (power interface).
In the present embodiment, as shown in Figures 2 and 3, there are 14 control output end (UP_ in the MCU chip of the MCU unit EN), the quantity of the Switching Power Supply MOS circuit has 14, the control signal (UP_ of 14 Switching Power Supply MOS circuits POWERSWITCH corresponding control output end (UP_EN), 14 Switching Power Supplies in the MCU chip) are respectively electrically connected to The power input (VDD) of MOS circuit is electrically connected on the same power output end (VCC) of the MCU chip.
Preferably, the distribution transmission module and electronic control module are mounted on same pcb board, form control panel.
Java framework layer is pre-filled in the virtual robot, the Java framework layer takes over the void after actuation Then the system process of quasi- robot starts preassembled third party software on the virtual robot to search for neighbouring People, and after the instruction for intercepting and capturing third party software calling location information, it generates a virtual positioning and is supplied to third party software, to obtain Take third party software with it is virtual positioning search near personal information.
Embodiment two
As shown in figure 4, it is a kind of based on the suspect's lookup method virtually positioned, it is not limited to be applied to suspicion described in embodiment one It doubts people and searches system, comprising:
Step 1: search instruction is sent to an at least virtual robot using server;
In the step 1, the server is by the usb hub in the distribution transmission module to the virtual machine human hair Send search instruction.
Before the step 1, further includes: the virtual robot boots up under the control of the server.
Specifically, MCU unit of the server into the electronic control module issues power supply instruction, the MUC unit exists After receiving power supply instruction, controls the Switching Power Supply MOS circuit and connect to provide electric energy to the virtual robot;Then institute It states server and power-on instruction, the void is sent to the virtual robot by the usb hub in the distribution transmission module Quasi- robot executes boot program after receiving power-on instruction.
Step 2: the virtual robot is after receiving search instruction, in a manner of virtually positioning on third party software The people of attachment is searched for, to obtain personal information nearby;
In the step 2, the virtual robot is obtained in virtual positioning according to third party software using rule or agreement Neighbouring personal information, most importantly user's head portrait and user distance this two in neighbouring personal information, if user's head portrait uses Be my real pictures, then the server can by face detection come with the face in suspect's information for prestoring Portion's information is compared, and whether there is suspect near certain virtual positioning to determine, and user distance then can be public security people Member provides the position range for comparing successful suspect, such as within the scope of certain 500m for virtually positioning or within the scope of 1km.
According to the different using rule or agreement of third party software, the virtual robot get near personal information Also different, such as: the degree of opening of wechat is lower, if wechat user shields stranger and checks its circle of friends, Even if wechat user used " neighbouring people " this function, the virtual robot is only able to get user's head portrait and use Family is apart from this two information, described and at this time if what user's head portrait of wechat user used is not my real pictures Server is difficult to recognize suspect;The degree of opening on microblogging or footpath between fields footpath between fields is higher, and microblogging or footpath between fields footpath between fields can be wanted in registration Its user is asked to fill in personal information more as far as possible, these personal information are substantially all disclosed, microblogging or footpath between fields footpath between fields to anyone As long as user used " neighbouring people " this function (the real-time positioning on footpath between fields footpath between fields is essentially equivalent to " neighbouring people ") or Positioning is opened when issuing dynamic, the virtual robot can not only get user's head portrait and user distance, moreover it is possible to obtain To the personal information such as user's dynamic, user's photograph album, age of user, graduated school, even publication user's dynamic when it is specific calmly Position.
As shown in figure 5, the step 2 specifically includes:
Step 2.1: the virtual robot starts the Java framework layer being previously implanted in it after receiving search instruction, described Java framework layer takes over the system process of the virtual robot after actuation;
In the step 2.1, the virtual robot receives the service from the usb hub in the distribution transmission module The search instruction that device issues.
Step 2.2: the Java framework layer starts preassembled third party software on the virtual robot to search People near rope;
In the step 2.2, the Java framework layer first registers the virtual account of third party software before the people near search Number, third party software is then logged in the virtual account, alternatively, the Java framework layer can also call the third party prestored soft The real account numbers (real account numbers of public security officer or other staff) of part or virtual account (registration when logging in for the first time), then with this Real account numbers or virtual account log in third party software.
Step 2.3: it is virtual to generate one after the instruction for intercepting and capturing third party software calling location information for the Java framework layer Positioning is supplied to third party software;
In the step 2.3, after the Java framework layer on the virtual robot has taken over system process, the virtual machine All third party softwares on device people are in calling positioning unit (mainly including antenna module and GPS component) to obtain location information When (mainly including mobile base station position and longitude and latitude position), it can all be intercepted and captured by the Java framework layer, then by the Java Ccf layer generates a virtual positioning and is supplied to third party software use.
Step 2.4: the Java framework layer get third party software with it is virtual positioning search near personal information.
In the step 2.4, third party software, will after getting the virtual positioning that the Java framework layer provides Request instruction is sent from the background to software with itself rule or agreement, obtains lists of persons near virtual positioning above, it is then described Java framework layer can get the disclosures such as the homepage, circle of friends, photograph album of neighbouring personnel from neighbouring lists of persons, obtain To neighbouring personal information.
Step 3: the virtual robot will acquire near personal information be back to the server;
In the step 3, the virtual robot is returned by the usb hub in the distribution transmission module to the server Pass personal information near obtaining.
Step 4: personal information near passback is compared the server with the suspect's information prestored, to obtain Compare the position range of successful suspect.
In the step 4, for the reason of privacy and safety, as described above, the position range that third party software provides is all It is, in order to further reduce the position range of suspect, to be compared successfully within the scope of certain 500m for virtually positioning or within the scope of 1km Later, the server will compare the corresponding USB set being virtually located through in the distribution transmission module of successful suspect Line device is sent to the virtual robot, and then the virtual robot will compare successfully virtual positioning and position range conduct Original virtual positioning and home position range, outside the range of home position near the multiple secondary virtual positioning of Area generation, then Search obtains the attachment personal information in secondary virtual positioning on third party software, then in the virtual positioning of secondary that will acquire Neighbouring personal information is back to the server and is compared, and obtains the multiple secondary location ranges for comparing successful suspect, As shown in fig. 6, reducing the position range of suspect by way of multipoint positioning.
Embodiments of the present invention above described embodiment only expresses, the description thereof is more specific and detailed, but can not Therefore limitations on the scope of the patent of the present invention are interpreted as, as long as skill obtained in the form of equivalent substitutions or equivalent transformations Art scheme should all be fallen within the scope and spirit of the invention.

Claims (10)

1. a kind of search system based on the suspect that virtually positions, which is characterized in that including server and respectively with the service At least virtual robot that device is electrically connected, wherein
The virtual robot, for being searched on third party software in a manner of virtually positioning under the control of the server The people of rope attachment, to obtain personal information nearby, and personal information is back to the server near will acquire;
The server, for controlling the virtual robot, and by people near virtual robot passback Member's information is compared with the suspect's information prestored, to obtain the position range for comparing successful suspect.
2. according to claim 1 search system based on the suspect virtually positioned, which is characterized in that further include that distribution passes Defeated module, connecting port is electrically connected to the data-interface of the server thereon, and second line of a couplet interface is electrically connected to the virtual machine The data-interface of device people, for carrying out instruction distribution and information transmission between the server and the virtual robot.
3. the suspect according to claim 2 based on virtual robot searches system, which is characterized in that the distribution passes Defeated module includes an at least usb hub.
4. according to claim 1 to 3 search system based on the suspect virtually positioned, which is characterized in that also wrap Electronic control module is included, input terminal is electrically connected to the control output end of the server, and output end is electrically connected to described virtual The power input of robot, for carrying out the virtual robot for power-off under the control of the server.
5. according to claim 4 search system based on the suspect virtually positioned, which is characterized in that the electronic control module Including MCU unit and at least a Switching Power Supply MOS circuit, the input terminal of the MCU unit are electrically connected to the server Control output end, output end are electrically connected to the input terminal of the Switching Power Supply MOS circuit, the Switching Power Supply MOS circuit Output end is electrically connected to the power input of the virtual robot.
6. any in -5 according to claim 1 described search system based on the suspect virtually positioned, which is characterized in that described Java framework layer is pre-filled in virtual robot, what the Java framework layer took over the virtual robot after actuation is Then system process starts preassembled third party software on the virtual robot to search for neighbouring people, and is intercepting and capturing After third party software calls the instruction of location information, generates a virtual positioning and be supplied to third party software, it is soft to obtain third party Part with it is virtual positioning search near personal information.
7. a kind of based on the suspect's lookup method virtually positioned characterized by comprising
Step 1: search instruction is sent to an at least virtual robot using server;
Step 2: the virtual robot is searched on third party software in a manner of virtually positioning after receiving search instruction The people of attachment, to obtain personal information nearby;
Step 3: the virtual robot will acquire near personal information be back to the server;
Step 4: personal information near passback is compared the server with the suspect's information prestored, is compared with obtaining The position range of successful suspect.
8. according to claim 7 based on the suspect's lookup method virtually positioned, which is characterized in that step 2 includes:
Step 2.1: the virtual robot starts the Java framework layer being previously implanted in it after receiving search instruction, described Java framework layer takes over the system process of the virtual robot after actuation;
Step 2.2: it is attached to search for that the Java framework layer starts preassembled third party software on the virtual robot Close people;
Step 2.3: the Java framework layer generates a virtually positioning after the instruction for intercepting and capturing third party software calling location information It is supplied to third party software;
Step 2.4: the Java framework layer get third party software with it is virtual positioning search near personal information.
9. according to claim 8 based on the suspect's lookup method virtually positioned, which is characterized in that in step 2.2, The Java framework layer first logs in third party software before the people near search.
10. according to claim 9 based on the suspect's lookup method virtually positioned, which is characterized in that the Java frame Rack-layer first registers the virtual account of third party software before logging in third party software, alternatively, calling the third party software prestored Real account numbers or virtual account.
CN201810961989.0A 2018-08-22 2018-08-22 It is a kind of that system and method are searched based on the suspect virtually positioned Pending CN109308335A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810961989.0A CN109308335A (en) 2018-08-22 2018-08-22 It is a kind of that system and method are searched based on the suspect virtually positioned

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810961989.0A CN109308335A (en) 2018-08-22 2018-08-22 It is a kind of that system and method are searched based on the suspect virtually positioned

Publications (1)

Publication Number Publication Date
CN109308335A true CN109308335A (en) 2019-02-05

Family

ID=65223831

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810961989.0A Pending CN109308335A (en) 2018-08-22 2018-08-22 It is a kind of that system and method are searched based on the suspect virtually positioned

Country Status (1)

Country Link
CN (1) CN109308335A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104867217A (en) * 2015-06-03 2015-08-26 深圳市星火电子工程公司 Community monitoring and management system
CN105203924A (en) * 2015-10-10 2015-12-30 上海博英信息科技有限公司 Electricity usage trend abnormity suspicion analysis method and anti-electric-larceny monitoring system
CN106303903A (en) * 2015-05-19 2017-01-04 腾讯科技(深圳)有限公司 A kind of user's lookup method, device and server
CN106339973A (en) * 2016-08-31 2017-01-18 安徽四创电子股份有限公司 Guard security system based on data platform and and guard security method thereof
CN106780056A (en) * 2016-11-29 2017-05-31 安徽云未科技有限公司 A kind of mobile terminal location system and its localization method based on the virtual location technology of social software
CN108115691A (en) * 2018-01-31 2018-06-05 塔米智能科技(北京)有限公司 A kind of robot interactive system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106303903A (en) * 2015-05-19 2017-01-04 腾讯科技(深圳)有限公司 A kind of user's lookup method, device and server
CN104867217A (en) * 2015-06-03 2015-08-26 深圳市星火电子工程公司 Community monitoring and management system
CN105203924A (en) * 2015-10-10 2015-12-30 上海博英信息科技有限公司 Electricity usage trend abnormity suspicion analysis method and anti-electric-larceny monitoring system
CN106339973A (en) * 2016-08-31 2017-01-18 安徽四创电子股份有限公司 Guard security system based on data platform and and guard security method thereof
CN106780056A (en) * 2016-11-29 2017-05-31 安徽云未科技有限公司 A kind of mobile terminal location system and its localization method based on the virtual location technology of social software
CN108115691A (en) * 2018-01-31 2018-06-05 塔米智能科技(北京)有限公司 A kind of robot interactive system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
叶珍燕: "微信网络安全监管问题研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Similar Documents

Publication Publication Date Title
CN105228093B (en) Intelligent mobile terminal managing and control system based on low-power consumption bluetooth
US20200051046A1 (en) Smart broadcasting method and apparatus
CN104143078B (en) Living body faces recognition methods, device and equipment
CN106686544B (en) A kind of location-based information early warning method, terminal and system
CN104980455B (en) A kind of multiple terminals method of data synchronization based on cloud storage, device and system
CN108541002B (en) A kind of monitor method of paging message, mobile terminal and server
CN108471376A (en) Data processing method, apparatus and system
CN103024664B (en) The method and apparatus reminded according to event
CN109857297A (en) Information processing method and terminal device
CN107592615A (en) Localization method and device
CN106453589A (en) Method and apparatus for synchronizing backup data
CN110336805A (en) Network access management method and mobile terminal
KR20190009375A (en) Method and apparatus for notifying terminal loss
CN109639569A (en) A kind of social communication method and terminal
CN109495839A (en) A kind of network service providing method and mobile terminal
CN103475997B (en) The verification method of terminal and device in a kind of LTE enterprise network
CN108170559A (en) A kind of data back up method and terminal
CN108123999A (en) A kind of information push method and mobile terminal
CN109308335A (en) It is a kind of that system and method are searched based on the suspect virtually positioned
CN205902086U (en) Emergent notice device and system
CN204733268U (en) Based on the all-digital visible talkback system of cloud service
CN106603650A (en) Position information sharing method and terminal devices
CN106506844B (en) A kind of monitoring of wechat remote mobile and return system, method based on agreement short message
CN107889112B (en) A kind of recognition methods of pseudo-base station and mobile terminal
CN107295520B (en) The method of infrared assisted lookup pseudo-base station

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190205