CN110839201B - Pipeline data processing method, transmitting device, receiving device and storage medium - Google Patents

Pipeline data processing method, transmitting device, receiving device and storage medium Download PDF

Info

Publication number
CN110839201B
CN110839201B CN201911030051.8A CN201911030051A CN110839201B CN 110839201 B CN110839201 B CN 110839201B CN 201911030051 A CN201911030051 A CN 201911030051A CN 110839201 B CN110839201 B CN 110839201B
Authority
CN
China
Prior art keywords
position information
information
access information
pipeline data
distance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911030051.8A
Other languages
Chinese (zh)
Other versions
CN110839201A (en
Inventor
黄桂泉
严俏艳
邬闻
李妙杏
傅宇
黄滔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eastone Century Technology Co ltd
Original Assignee
Eastone Century Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eastone Century Technology Co ltd filed Critical Eastone Century Technology Co ltd
Priority to CN201911030051.8A priority Critical patent/CN110839201B/en
Publication of CN110839201A publication Critical patent/CN110839201A/en
Application granted granted Critical
Publication of CN110839201B publication Critical patent/CN110839201B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/023Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a pipeline data processing method, a transmitting device, a receiving device and a storage medium, wherein the method comprises the steps of extracting a plurality of groups of position information and access information, calculating confidence, acquiring the position and the orientation of network equipment described by the access information under the condition that the confidence is higher than a preset first threshold, further calculating the distance between the position and the position information, outputting corresponding position information under the condition that the distance is smaller than a preset second threshold, and the like. According to the pipeline data processing method, the confidence coefficient is calculated according to the access information, the position information is screened according to the confidence coefficient, the influence of interference factors such as a destination or a simulated position can be eliminated, the current or historical geographic position of the user terminal can be accurately reflected by the position information obtained after screening, and therefore the requirement for positioning the real geographic position of the user terminal is met. The invention is widely applied to the technical field of wireless communication.

Description

Pipeline data processing method, transmitting device, receiving device and storage medium
Technical Field
The present invention relates to the field of wireless communication technologies, and in particular, to a method for processing pipeline data, a transmitting device, a receiving device, and a storage medium.
Background
The pipeline data such as the S1 interface data and the GN interface data of the mobile operator generally include position information, the position information generally comes from terminals such as mobile phones used by users of the mobile operator, and the position information in the pipeline data is acquired and analyzed, so that the geographical position of the user terminal is obtained, and the method has important value for work such as server load adjustment, large-data commercial promotion and criminal investigation. However, due to the presence of interference factors, the location information contained in the pipe data often does not reflect the current or historical true location of the terminal and its user. For example, a user using taxi-calling software to summon a vehicle typically needs to enter a travel destination, at which point the location information extracted from the pipe data may reflect the user's destination rather than its location. Since a terminal used by a user may use spoofing software having a function of simulating a location or an individualization, etc., a method of confirming a current location of the user by analyzing a uniform resource locator may also fail. The existence of these interference factors makes it difficult for the prior art to distinguish whether the position information obtained from the pipe data reflects the true position of the user terminal.
Disclosure of Invention
In order to solve at least one of the above technical problems, an object of the present invention is to provide a pipe data processing method, a transmitting apparatus, a receiving apparatus, and a storage medium.
In one aspect, an embodiment includes a method for processing pipeline data, including the following steps:
extracting a plurality of groups of position information and access information contained in the pipeline data;
calculating confidence degrees according to the position information and the access information of each group;
under the condition that the confidence is higher than a preset first threshold, acquiring a position and orientation of the network equipment described by the access information, and further calculating the distance between the position and orientation and the position information;
and outputting corresponding position information under the condition that the distance is smaller than a preset second threshold value.
Further, the step of calculating the confidence degrees according to the position information and the access information of each group specifically includes:
when the distance between the position information and the position and the direction of the network equipment described by the access information in the same group is smaller than a preset second threshold value, accumulating 1 for the credibility times of the position information until all the position information is traversed;
counting the total number of the position information;
and calculating the quotient of the credibility times and the total number as the confidence degree.
Further, the second threshold is set according to the type of the network device described by the access information.
In another aspect, an embodiment further includes a method for processing pipeline data, including the following steps:
extracting a plurality of groups of position information, access information and access information contained in the pipeline data;
calculating confidence degrees according to the position information and the access information of each group;
under the condition that the confidence coefficient is higher than a preset first threshold value, judging the legality of the position information according to the access information;
under the condition that the position information is judged to be legal, the position and the direction of the network equipment described by the access information are obtained, and the distance between the position and the position information is further calculated;
and outputting corresponding position information under the condition that the distance is smaller than a preset second threshold value.
Further, the step of calculating the confidence degrees according to the position information and the access information of each group specifically includes:
when the distance between the position information and the position and the direction of the network equipment described by the same group of access information is smaller than a preset second threshold value, accumulating 1 for the credibility times of the position information until all the position information is traversed;
counting the total number of the position information;
and calculating the quotient of the credibility times and the total number as the confidence degree.
Further, the step of determining the validity of the location information according to the access information specifically includes:
detecting a target to which the access information points;
calculating the distance between the location of the target and the position information;
and if the distance is within a preset interval, judging that the position information is legal, otherwise, judging that the position information is illegal.
Further, the second threshold is set according to the type of the network device described by the access information.
In another aspect, the embodiment further includes a pipeline data sending apparatus, including a memory and a processor, where the memory is used to store at least one program, and the processor is used to load the at least one program to execute the pipeline data processing method.
In another aspect, an embodiment further includes a pipeline data receiving apparatus, including a memory and a processor, where the memory is used to store at least one program, and the processor is used to load the at least one program to execute the pipeline data processing method.
In another aspect, embodiments further include a storage medium having stored therein processor-executable instructions, which when executed by a processor, are configured to perform the pipeline data processing method.
The invention has the beneficial effects that: in the pipeline data processing method in the embodiment, the confidence degree is calculated according to the access information, and the position information is screened according to the confidence degree, so that the influence of interference factors such as a destination or a simulated position can be eliminated, and the current or historical geographic position of the user terminal can be accurately reflected by the screened position information, so that the requirement of positioning the real geographic position of the user terminal is met. Further, in the embodiment, the pipeline data processing method further screens the location information by accessing the information, so as to further improve the authenticity of the location information acquired from the pipeline data.
Drawings
FIG. 1 is a flowchart of a pipeline data processing method according to a first embodiment;
FIG. 2 is a diagram illustrating the pipeline data and its contents acquired in the first embodiment;
FIG. 3 is a flowchart of a pipeline data processing method according to a second embodiment;
fig. 4 is a schematic diagram of the pipe data acquired in the second embodiment and its contents.
Detailed Description
Example 1
As shown in fig. 1, a pipeline data processing method used in this embodiment includes the following steps:
s1, extracting a plurality of groups of position information and access information contained in pipeline data; the access information is used for describing network equipment for the terminal to access;
s2, calculating confidence degrees according to the position information and the access information of each group;
s3, under the condition that the confidence coefficient is higher than a preset first threshold value, acquiring the position and the orientation of the network equipment described by the access information, and further calculating the distance between the position and the position information;
s4, outputting corresponding position information under the condition that the distance is smaller than a preset second threshold value; the second threshold is set according to the type of the network equipment described by the access information.
The pipe data for a certain period of time is acquired from the mobile operator before performing the steps S1-S4. The pipe data includes a plurality of sets of position information and access information arranged in time sequence, as shown in fig. 2, the obtained sets of position information and access information are respectively at time periods T1-T5, etc. The location information is derived from location-related data generated in an APP, such as a take-away or taxi-taking APP, used by the user, and may reflect the real location of the user at the time of sending or receiving the location information, or may be only non-real information such as a destination or a false address filled by the user. The steps S1-S4 are performed with the goal of determining whether the location information contained in the pipe data reflects the actual location of the user currently or historically. The access information is used for describing network equipment for a terminal to access, for wireless users such as mobile phones and the like, the access information comprises a base station, a wireless cell, a WIFI hotspot name and a WIFI identifier which are wirelessly accessed, and for fixed users such as network cables and the like, the access information comprises a cable port name, an optical cable port name or identifier of a fixed access line, a port name at the tail end of the fixed line, position information, a line name passing in the middle, a forwarding equipment name passing in the middle and the like. Since these parameters are generally determined during the communication facility engineering, when a user uses the terminal to exchange data with the mobile operator, the mobile operator identifies the network device accessed by the terminal and adds information such as an identifier of the accessed network device to the pipe information to form access information. In turn, based on the access information, it is possible to identify network devices such as a base station, a wireless cell, a cable port, or a repeater device, which are accessed by a terminal used by a user, and further to find out the location and direction of the network devices from registration information such as construction records.
In step S2, calculating confidence degrees according to each group of the location information and the access information, specifically including the following steps:
s201, first setting an initial value of the confidence times epsilon of the location information to be 0, and then analyzing the location information and the access information group by group, for example, according to the time sequence shown in fig. 2, first analyzing the location information 1 and the access information 1 in a time period T1, if it is detected that a distance between a location position where the network device described by the access information 1 is located and the location information 1 is less than a second threshold, then regarding the location information in the group as "trusted", and adding up the confidence times epsilon of the location information by 1, otherwise, keeping epsilon unchanged. Then, the access information 2 and the location information 2 are analyzed similarly until all the location information and the access information are analyzed, specifically, in the example of fig. 2, until the access information 3 and the location information 3, the access information 4 and the location information 4, and the access information 5 and the location information 5 are analyzed in sequence, and a final accumulated value of epsilon is obtained.
The second threshold is set according to the type of the network device described by the access information, for example, if the network device indicated by the access information 2 is an 2/3G macro station, the second threshold used in analyzing the access information 2 and the location information 2 is 800 meters; if the network device indicated by the access information 3 is an 4/5G macro station, the second threshold used in analyzing the access information 3 and the location information 3 is 500 meters; if the network device indicated by the access information 4 is a wireless indoor coverage device, the second threshold used when analyzing the access information 4 and the location information 4 is 100 meters; if the network device indicated by the access information 5 is a WIFI hotspot, the second threshold used in analyzing the access information 5 and the location information 5 is 50 meters.
And S202, counting the total number n of the position information. n is the number of sets of location information and access information extracted from the pipe data, and n is 5 in the example of fig. 2.
S203, calculating the quotient of the credibility times epsilon and the total number n
Figure BDA0002249858470000041
As the confidence level.
By executing step S201, the "credibility" of the location information contained in the pipe data can be identified, which is based on the principle that when the location orientation of the network device accessed by the user terminal identified by the access information is smaller than the second threshold value, and the second threshold value is designed to match the accessed network device, then the location orientation of the network device accessed by the user terminal can be considered to be the same as the location information of the user terminal, that is, the location information reflects the real location of the terminal rather than the non-real location such as the destination or the false address, which is defined as "credible" in this embodiment.
The calculated confidence level by performing steps S202 and S203
Figure BDA0002249858470000042
The "credibility" of the plurality of pieces of position information is comprehensively considered, and the influence of individual errors is excluded, thereby making the determination result obtained by executing step S201 more reliable.
Confidence level
Figure BDA0002249858470000051
The larger the size, the more "the position information in the pipe data is at the user terminalThe greater the reliability of the event "true position", i.e. if confidence
Figure BDA0002249858470000052
It is large enough to consider "the position information in the pipe data is the real position where the user terminal is located". In step S3, a first threshold is set as the judgment confidence
Figure BDA0002249858470000053
Criteria large enough to be considered at confidence
Figure BDA0002249858470000054
If the value is greater than the first threshold, it may be considered that "the location information in the pipe data is the real location where the user terminal is located".
In steps S3 and S4, the location information with sufficiently high reliability is further determined by comparing the error between the location information and the location and orientation of the network device described by the access information. The second threshold is set according to the type of the network device described by the access information, and is set to 800 meters if the network device is an 2/3G macro station, to 500 meters if the network device is a 4/5G macro station, to 100 meters if the network device is a wireless indoor coverage device, and to 50 meters if the network device is a WIFI hotspot. The value of the second threshold is matched with the type of the network equipment accessed by the terminal, so that when the error is smaller than the second threshold, the position information can be judged to be consistent with the position and the direction of the network equipment described by the access information, so that the position information in the pipeline data can be judged to be the real position of the user terminal more reliably, and then the position information is output in the forms of displaying, playing or generating a file and the like.
Example 2
As shown in fig. 3, a pipeline data processing method used in this embodiment includes the following steps:
s1, extracting a plurality of groups of position information, access information and access information contained in pipeline data; the access information is used for describing network equipment for the terminal to access; the access information is used for recording the operation behavior of the terminal;
s2, calculating confidence degrees according to the position information and the access information of each group;
s3, under the condition that the confidence coefficient is higher than a preset first threshold value, judging the validity of the position information according to the access information;
s4, under the condition that the position information is judged to be legal, acquiring the position and orientation of the network equipment described by the access information, and further calculating the distance between the position and orientation and the position information;
and S5, outputting corresponding position information under the condition that the distance is smaller than a preset second threshold value.
In this embodiment, access information is further extracted from the pipe data based on the method described in embodiment 1, and as shown in fig. 4, the obtained sets of location information, access information, and access information are respectively at time periods T1-T5. In this embodiment, the access information mainly exists in the form of a uniform resource locator or the like, and may also be in the form of a host address, a host port, and the like to which the operation behavior is directed, and when the specific operation behavior of the user terminal is to access a web page, the access information may also be a source page address of a current request page.
In this embodiment, on the basis that the method described in embodiment 1 screens the location information by using the confidence level and the access information, the location information is also screened according to the access information, that is, the validity of the location information is determined according to the access information. The step of determining the validity of the location information according to the access information specifically includes:
s301, detecting a target pointed by the access information;
s302, calculating the distance between the location of the target and the position information;
s303, if the distance is within a preset interval, judging that the position information is legal, otherwise, judging that the position information is illegal.
In step S301, if the access information is a host address or a host port, the target of the access information is a host; if the access information is a uniform resource locator or a page address, the access information is targeted at a server providing network resources pointed by the uniform resource locator or the page address, or an object to be controlled by a program such as an APP (application) of the terminal.
For example, in a usage scenario where the shared bicycle is unlocked, etc., the shared bicycle may be regarded as a target for accessing information. Under the actual use condition, the actual distance between the user terminal and the bicycle to which the operation behavior is directed is between 0 and 50m, so the preset interval in step S303 may be set to be 0 to 50m, if the distance between the location information identified from the pipe data and the destination of the access information is greater than 50m, it indicates that the location information does not correspond to the use scene corresponding to the access information, and indicates that the location information included in the pipe data is not the real geographical location of the user terminal, in this case, the location information is determined to be illegal, and is filtered out and no longer executed in steps S4 and S5.
It should be noted that the legitimacy or non-legitimacy defined for the location information in step S3 is only a judgment result obtained by performing steps S301 to S303, which is used as a trigger for performing the subsequent steps S4 and S5, and does not indicate that the location information is legally legitimate or illegal.
By extracting the access information and filtering the position information by using the access information, the position information which cannot reflect the real geographical position of the user terminal can be further eliminated, so that the finally output position information can reflect the real geographical position of the user terminal more possibly.
A person skilled in the art can also write a computer program for implementing the above-described embodiments and write the computer program into a memory of an existing pipe data transmitting apparatus or pipe data receiving apparatus so that the pipe data transmitting apparatus or pipe data receiving apparatus can execute the pipe data processing method.
The present embodiment also includes a storage medium in which processor-executable instructions are stored, which when executed by a processor, are used to perform the management data processing methods described in embodiments 1 and 2.
The pipeline data sending device, the pipeline data receiving device and the storage medium can respectively execute the pipeline data processing method, can execute any combination implementation steps of the method embodiments, and have corresponding functions and beneficial effects of the method.
It should be noted that, unless otherwise specified, when a feature is referred to as being "fixed" or "connected" to another feature, it may be directly fixed or connected to the other feature or indirectly fixed or connected to the other feature. Furthermore, the descriptions of upper, lower, left, right, etc. used in the present disclosure are only relative to the mutual positional relationship of the constituent parts of the present disclosure in the drawings. As used in this disclosure, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. In addition, unless defined otherwise, all technical and scientific terms used in this example have the same meaning as commonly understood by one of ordinary skill in the art. The terminology used in the description of the embodiments herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this embodiment, the term "and/or" includes any combination of one or more of the associated listed items.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element of the same type from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of the present disclosure. The use of any and all examples, or exemplary language ("e.g.," such as "or the like") provided with this embodiment is intended merely to better illuminate embodiments of the invention and does not pose a limitation on the scope of the invention unless otherwise claimed.
It should be recognized that embodiments of the present invention can be realized and implemented by computer hardware, a combination of hardware and software, or by computer instructions stored in a non-transitory computer readable memory. The methods may be implemented in a computer program using standard programming techniques, including a non-transitory computer-readable storage medium configured with the computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner, according to the methods and figures described in the detailed description. Each program may be implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language. Furthermore, the program can be run on a programmed application specific integrated circuit for this purpose.
Further, operations of processes described in this embodiment can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The processes described in this embodiment (or variations and/or combinations thereof) may be performed under the control of one or more computer systems configured with executable instructions, and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) collectively executed on one or more processors, by hardware, or combinations thereof. The computer program includes a plurality of instructions executable by one or more processors.
Further, the method may be implemented in any type of computing platform operatively connected to a suitable interface, including but not limited to a personal computer, mini computer, mainframe, workstation, networked or distributed computing environment, separate or integrated computer platform, or in communication with a charged particle tool or other imaging device, and the like. Aspects of the invention may be embodied in machine-readable code stored on a non-transitory storage medium or device, whether removable or integrated into a computing platform, such as a hard disk, optically read and/or write storage medium, RAM, ROM, or the like, such that it may be read by a programmable computer, which when read by the storage medium or device, is operative to configure and operate the computer to perform the procedures described herein. Further, the machine-readable code, or portions thereof, may be transmitted over a wired or wireless network. The invention described in this embodiment includes these and other different types of non-transitory computer-readable storage media when such media include instructions or programs that implement the steps described above in conjunction with a microprocessor or other data processor. The invention also includes the computer itself when programmed according to the methods and techniques described herein.
A computer program can be applied to input data to perform the functions described in the present embodiment to convert the input data to generate output data that is stored to a non-volatile memory. The output information may also be applied to one or more output devices, such as a display. In a preferred embodiment of the invention, the transformed data represents physical and tangible objects, including particular visual depictions of physical and tangible objects produced on a display.
The above description is only a preferred embodiment of the present invention, and the present invention is not limited to the above embodiment, and any modifications, equivalent substitutions, improvements, etc. within the spirit and principle of the present invention should be included in the protection scope of the present invention as long as the technical effects of the present invention are achieved by the same means. The invention is capable of other modifications and variations in its technical solution and/or its implementation, within the scope of protection of the invention.

Claims (8)

1. A pipeline data processing method is characterized by comprising the following steps:
extracting a plurality of groups of position information and access information contained in the pipeline data;
calculating confidence degrees according to the position information and the access information of each group;
under the condition that the confidence is higher than a preset first threshold, acquiring a position and orientation of the network equipment described by the access information, and further calculating the distance between the position and orientation and the position information;
outputting corresponding position information under the condition that the distance is smaller than a preset second threshold value;
the step of calculating the confidence degrees according to the position information and the access information of each group specifically includes:
when the distance between the position information and the position and the direction of the network equipment described by the access information in the same group is smaller than a preset second threshold value, accumulating 1 for the credibility times of the position information until all the position information is traversed;
counting the total number of the position information;
and calculating the quotient of the credibility times and the total number as the confidence degree.
2. The method of claim 1, wherein the second threshold is set according to a type of the network device described by the access information.
3. A pipeline data processing method is characterized by comprising the following steps:
extracting a plurality of groups of position information, access information and access information contained in the pipeline data;
calculating confidence degrees according to the position information and the access information of each group;
under the condition that the confidence coefficient is higher than a preset first threshold value, judging the legality of the position information according to the access information;
under the condition that the position information is judged to be legal, the position and the direction of the network equipment described by the access information are obtained, and the distance between the position and the position information is further calculated;
outputting corresponding position information under the condition that the distance is smaller than a preset second threshold value;
the step of calculating the confidence degrees according to the position information and the access information of each group specifically includes:
when the distance between the position information and the position and the direction of the network equipment described by the same group of access information is smaller than a preset second threshold value, accumulating 1 for the credibility times of the position information until all the position information is traversed;
counting the total number of the position information;
and calculating the quotient of the credibility times and the total number as the confidence degree.
4. The method of claim 3, wherein the step of determining the validity of the location information according to the access information specifically comprises:
detecting a target to which the access information points;
calculating the distance between the location of the target and the position information;
and if the distance is within a preset interval, judging that the position information is legal, otherwise, judging that the position information is illegal.
5. The method as claimed in any one of claims 3 or 4, wherein the second threshold is set according to a type of the network device described by the access information.
6. A pipeline data transmitting apparatus for transmitting pipeline data, comprising a memory for storing at least one program and a processor for loading the at least one program to perform the method of any one of claims 1 to 5.
7. A pipeline data receiving apparatus for receiving pipeline data, comprising a memory for storing at least one program and a processor for loading the at least one program to perform the method of any one of claims 1 to 5.
8. A storage medium having stored therein processor-executable instructions, which when executed by a processor, are configured to perform the method of any one of claims 1-5.
CN201911030051.8A 2019-10-28 2019-10-28 Pipeline data processing method, transmitting device, receiving device and storage medium Active CN110839201B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911030051.8A CN110839201B (en) 2019-10-28 2019-10-28 Pipeline data processing method, transmitting device, receiving device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911030051.8A CN110839201B (en) 2019-10-28 2019-10-28 Pipeline data processing method, transmitting device, receiving device and storage medium

Publications (2)

Publication Number Publication Date
CN110839201A CN110839201A (en) 2020-02-25
CN110839201B true CN110839201B (en) 2021-01-15

Family

ID=69575626

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911030051.8A Active CN110839201B (en) 2019-10-28 2019-10-28 Pipeline data processing method, transmitting device, receiving device and storage medium

Country Status (1)

Country Link
CN (1) CN110839201B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111328025B (en) * 2020-02-26 2021-07-13 中国联合网络通信集团有限公司 Trajectory tracking method, terminal equipment, base station and server

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102595323A (en) * 2012-03-20 2012-07-18 北京交通发展研究中心 Method for obtaining resident travel characteristic parameter based on mobile phone positioning data
CN109121081A (en) * 2018-09-11 2019-01-01 电子科技大学 A kind of indoor orientation method based on position Candidate Set Yu EM algorithm
CN110035384A (en) * 2019-05-09 2019-07-19 桂林电子科技大学 A kind of indoor orientation method merging multiple sensor signals filtering optimization

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9843890B2 (en) * 2016-03-18 2017-12-12 Qualcomm Incorporated Reliability in mobile device positioning in a crowdsourcing system
CN107333232B (en) * 2016-04-29 2020-02-21 华为技术有限公司 Terminal positioning method and network equipment
CN106067880B (en) * 2016-06-13 2019-05-31 国家计算机网络与信息安全管理中心 A kind of source tracing method of the IP address based on 4G network
CN107665428B (en) * 2016-07-27 2021-03-05 中国电信股份有限公司 Mobile payment identity authentication method, server and system
CN108260204B (en) * 2016-12-29 2021-05-04 华为技术有限公司 Method and device based on telecommunication positioning
CN107040603B (en) * 2017-05-02 2020-04-14 华为机器有限公司 Method and device for determining active scene of application program App

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102595323A (en) * 2012-03-20 2012-07-18 北京交通发展研究中心 Method for obtaining resident travel characteristic parameter based on mobile phone positioning data
CN109121081A (en) * 2018-09-11 2019-01-01 电子科技大学 A kind of indoor orientation method based on position Candidate Set Yu EM algorithm
CN110035384A (en) * 2019-05-09 2019-07-19 桂林电子科技大学 A kind of indoor orientation method merging multiple sensor signals filtering optimization

Also Published As

Publication number Publication date
CN110839201A (en) 2020-02-25

Similar Documents

Publication Publication Date Title
ES2808954T3 (en) Procedure and device for use in risk management of application information
EP3262552B1 (en) Methods, apparatus, and systems for identity authentication
CN110933103B (en) Anti-crawler method, device, equipment and medium
US10612940B2 (en) Flow meter reading with image recognition secured with mask and software connected by mobile device
CN111294730B (en) Method and device for processing network problem complaint information
CN113114680B (en) Detection method and detection device for file uploading vulnerability
CN104579830A (en) Service monitoring method and device
EP2950248A1 (en) KPI specification apparatus and KPI specification method
CN110839201B (en) Pipeline data processing method, transmitting device, receiving device and storage medium
CN109818972B (en) Information security management method and device for industrial control system and electronic equipment
US10049113B2 (en) File scanning method and apparatus
CN114743132A (en) Target algorithm selection method and device, electronic equipment and storage medium
CN108280024B (en) Flow distribution strategy testing method and device and electronic equipment
US20240005008A1 (en) Monitoring information-security coverage to identify an exploitable weakness in the information-securing coverage
CN112637888A (en) Coverage hole area identification method, device, equipment and readable storage medium
CN109672984B (en) User position portrait evaluation method and device for financial business and storage medium
CN109120594B (en) Traffic hijacking detection method and device
CN110972071A (en) Multi-mode positioning method, positioning server, terminal and storage medium
CN113765850A (en) Internet of things anomaly detection method and device, computing equipment and computer storage medium
CN106454884A (en) Method for distinguishing homonymous wireless access points and equipment thereof
KR101862617B1 (en) System of testing iot sensor for power facility management
CN115051824A (en) Vertical override detection method, system, equipment and storage medium
CN113807697A (en) Alarm association-based order dispatching method and device
CN112307475A (en) System detection method and device
CN113704749A (en) Malicious excavation detection processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant