CN111582709B - Information processing method and device for park management - Google Patents

Information processing method and device for park management Download PDF

Info

Publication number
CN111582709B
CN111582709B CN202010369792.5A CN202010369792A CN111582709B CN 111582709 B CN111582709 B CN 111582709B CN 202010369792 A CN202010369792 A CN 202010369792A CN 111582709 B CN111582709 B CN 111582709B
Authority
CN
China
Prior art keywords
campus
target person
information
behavior
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010369792.5A
Other languages
Chinese (zh)
Other versions
CN111582709A (en
Inventor
张涛
曲兰鹏
孙浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202010369792.5A priority Critical patent/CN111582709B/en
Publication of CN111582709A publication Critical patent/CN111582709A/en
Application granted granted Critical
Publication of CN111582709B publication Critical patent/CN111582709B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present disclosure provides an information processing method for campus management, the method comprising: acquiring position information, wherein the position information is used for representing the position of a target person appearing in a park at a specific time; acquiring behavior information, wherein the behavior information is used for representing behaviors of a target person at a specific time; and determining whether a security risk exists in the campus based on the acquired location information and/or behavior information. The present disclosure also provides an information processing apparatus for campus management, an electronic device, and a computer-readable storage medium.

Description

Information processing method and device for park management
Technical Field
The present disclosure relates to the field of information processing, and in particular, to an information processing method for campus management, an information processing apparatus for campus management, an electronic device, and a computer-readable storage medium.
Background
With the continuous development of the functions and scale of the enterprise campus, it becomes more important how to identify the identities, judge the behaviors and predict the safety of the personnel in the campus. In the existing mode, the personnel management of the traditional park mostly depends on a simple combination mode of a work card and security personnel, and the personnel management of the emerging park is verified by simply adding a face or fingerprint identification. Therefore, the park management scheme in the existing mode stays at a relatively basic level, and the management level cannot be matched with the intelligent management idea of the modern enterprise park. For example, the personnel management in traditional gardens only carries out the management of physical layer to the garden personnel, leads to unable in time or even can't discover the security risk of hiding in the garden.
Disclosure of Invention
An aspect of the embodiments of the present disclosure provides an information processing method for campus management, including: acquiring position information, wherein the position information is used for representing the position of a target person appearing in a park at a specific time; acquiring behavior information, wherein the behavior information is used for representing behaviors of the target person at the specific time; and determining whether a security risk exists in the campus based on the acquired location information and/or the behavior information.
Optionally, the determining whether a security risk exists in the campus based on the acquired location information and/or the behavior information includes: in response to the location information characterizing that the target person is not present on the campus at the particular time, determining whether system login logs associated with the target person are included in the behavioral information; and prompting that a first-level risk exists in the park in response to determining that the behavior information comprises a system login log associated with the target person.
Optionally, the method further comprises: in response to determining that only the network connection log associated with the target person is included in the behavioral information, prompting a presence of a secondary risk on the campus, wherein the primary risk is higher than the secondary risk.
Optionally, the determining whether a security risk exists in the campus based on the acquired location information and/or the behavior information includes: in response to the behavior information characterizing that the target person did not take a particular behavior at the particular time, determining whether the target person occurred at a plurality of locations within the campus at the particular time based on the location information; and in response to determining that the target person is present at a plurality of locations on the campus at the particular time, alerting the campus that a first level of risk is present.
Optionally, the method further comprises: in response to determining that the target person is present at only one location on the campus at the particular time, determining whether the location is an authorized location for the target person; and in response to determining that the location is not an authorized location for the target person, alerting the campus that a first level of risk exists.
Optionally, the determining whether the target person appears at a plurality of locations within the campus at the specific time based on the location information comprises: determining whether the target person is present in a first area within the campus at the particular time based on first location information; determining whether the target person is present in a second area within the campus at the specific time based on second location information, wherein the second location information is different from the first location information; in response to determining that the target person is concurrently present in the first area and the second area at the particular time, determining whether an intersection exists between the first area and the second area; and in response to determining that there is no intersection between the first area and the second area, determining that the target person is present at two locations within the campus at the particular time.
Optionally, the determining whether a security risk exists in the campus based on the acquired location information and/or the behavior information includes: if the position information represents that the target person is normal in the position appearing in the campus at the specific time, determining whether the behavior information only contains a system login log; and prompting that secondary risks exist in the campus in response to determining that the behavior information only contains a system login log.
Optionally, the determining whether a security risk exists in the campus based on the acquired location information and/or the behavior information includes: if the time of the target person, except the designated time, represented by the position information appears at the position authorized for the target person in the park, prompting that a secondary risk exists in the park; and/or if the specific time represented by the location information of the target person appears in a location in the campus where the target person is not authorized, prompting that a first-level risk exists in the campus.
An aspect of the embodiments of the present disclosure provides an information processing apparatus for campus management, including: the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring position information, and the position information is used for representing the position of a target person appearing in a park at a specific time; the second acquisition module is used for acquiring behavior information, wherein the behavior information is used for representing behaviors of the target person at the specific time; and the determining module is used for determining whether the safety risk exists in the park area or not based on the acquired position information and/or the acquired behavior information.
Optionally, the determining module includes: a first determining unit, configured to determine whether a system login log associated with the target person is included in the behavior information in response to the location information indicating that the target person does not appear in the campus at the specific time; and the first prompting unit is used for responding to the fact that the behavior information contains a system login log associated with the target person, and prompting that the primary risk exists in the park.
Optionally, the determining module includes: a second determination unit, configured to determine whether the target person appears at a plurality of locations within the campus at the specific time based on the location information in response to the behavior information indicating that the target person does not have a specific behavior at the specific time; and a second prompting unit for prompting the presence of a first level of risk in the campus in response to determining that the target person is present at a plurality of locations in the campus at the particular time.
Optionally, the determining module includes: a third determining unit, configured to determine whether only a system login log is included in the behavior information, in a case where the location information indicates that the location of the target person appearing in the campus at the specific time is normal; and the third prompting unit is used for responding to the fact that the behavior information only contains a system login log and prompting that the secondary risk exists in the park.
Optionally, the determining module includes: the fourth prompting unit is used for prompting that a secondary risk exists in the park under the condition that the time of the target person, except the designated time, represented by the position information appears in a position authorized for the target person in the park; and/or a fifth prompting unit, configured to prompt that a first-level risk exists in the campus when the location information indicates that the target person appears at a location in the campus where the target person is not authorized at the specific time.
Another aspect of the present disclosure provides an electronic device including: one or more processors; memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the methods of embodiments of the present disclosure.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions for implementing the method of the embodiments of the present disclosure when executed.
Another aspect of the present disclosure provides a computer program comprising computer executable instructions for implementing the method of embodiments of the present disclosure when executed.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
FIG. 1 schematically illustrates a schematic diagram of an enterprise campus suitable for use in accordance with an embodiment of the present disclosure;
fig. 2 schematically shows a system architecture suitable for the information processing method and apparatus for campus management according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow chart of an information processing method for campus management according to an embodiment of the present disclosure;
4A-4C schematically illustrate determining a location of a campus person according to an embodiment of the present disclosure;
figure 5 schematically shows a block diagram of an information processing apparatus for campus management according to an embodiment of the present disclosure; and
fig. 6 schematically shows a block diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B, and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B, and C" would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.). Where a convention analogous to "at least one of A, B, or C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B, or C" would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.).
Some block diagrams and/or flow diagrams are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks. The techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). In addition, the techniques of this disclosure may take the form of a computer program product on a computer-readable storage medium having instructions stored thereon for use by or in connection with an instruction execution system.
Embodiments of the present disclosure provide an information processing method for campus management and an information processing apparatus for campus management to which the method can be applied. The method includes obtaining location information and behavior information, and determining whether a security risk exists in the campus based on the obtained location information and/or behavior information. Wherein the location information is used to characterize the location of the target person's presence on the campus at a particular time. The behavior information is used to characterize the behavior of the target person that occurs at a particular time.
Figure 1 schematically illustrates a schematic diagram of an enterprise campus suitable for use in accordance with an embodiment of the present disclosure. Fig. 2 schematically shows a system architecture suitable for the information processing method and apparatus for campus management according to an embodiment of the present disclosure.
It should be noted that fig. 1 and 2 are only examples of the campus and campus system architectures of the enterprise to which the embodiments of the present disclosure can be applied to help those skilled in the art understand the technical content of the present disclosure, but do not mean that the embodiments of the present disclosure cannot be applied to other campus and campus system architectures.
As shown in fig. 1, the enterprise campus may include: one or more entrances/exits (a, B, C), one or more offices W, one or more leisure/entertainment/dining etc. service areas S, one or more parking areas P etc. For the convenience of management, can prescribe that personnel's discrepancy garden all need to be swiped the card, the vehicle discrepancy garden all needs to register, can also set up biological information collection equipment in the preset position, can also gather and save its static information to every garden personnel.
For example, the static information of the campus crew (i.e., the crew working and living within the campus) may include, but is not limited to, the campus crew's: codes, basic information, biological information (including but not limited to fingerprints, facial images and vein information), MAC information and Bluetooth information of mobile communication equipment (such as a mobile phone), and MAC information of wired and wireless network cards of a computer. This static information can be registered when the campus crew first enters the campus. The campus personnel code is a unique identifier assigned by a campus to each campus personnel, and can be used as an index for establishing an association relationship of related data among different systems for the same personnel. The park personnel basic information is the basic information collected when the enterprise gives the right to the park personnel, and comprises name, gender, affiliated units (departments), passing RFID card information, communication information (such as mobile phone numbers, micro signals, mailboxes and the like) and the like. The biological information of the park personnel is information collected when registering information aiming at the park biological identification equipment, and comprises face information, fingerprint information and vein information. The mobile communication equipment information and the MAC information of the computer equipment also have the characteristic of unique identification, and can be obtained by registering and summarizing when the park personnel enter the park for the first time.
As shown in fig. 2, the campus system architecture includes: the system comprises a wireless radio frequency card reader, a fingerprint identification device, a face identification device, a vehicle management system, a security system (including but not limited to a security camera), a consumption system, a business system, a wired/wireless switch and an information processing system.
The information collected by the radio frequency card reader, the fingerprint identification device, the face identification device, the vehicle management system, the security system and the consumption system can be used for determining the position of the personnel in the garden.
For example, the use information of the radio frequency card reader can represent the card reader information correspondingly generated when a park person uses an RFID access card to swipe a card, and different position information recorded for the card holder at a corresponding time point can be marked through different card reader position attributes. The personnel picture information that security protection camera gathered can be used for carrying out the region that the correlation appears to personnel to the photo that personnel gathered in different regions and corresponding positional information and collecting. Because the current image acquisition technology is relatively safe and complete and is not easy to copy and embezzle, the data has higher reliability. The position information of the communication equipment used by the personnel can be related to the physical area where the personnel are located through the position information calculated by the mobile communication base station or the Bluetooth positioning service provided by the park. The information of the driving vehicles can represent the license plate information of the vehicles registered when the personnel enter the park of the enterprise, and the license plate information is judged by a license plate recognition system at a fixed entrance and exit of the park for distinguishing whether the personnel corresponding to the vehicles enter and exit the park. The park consumption information is information recorded when the personnel take dining, business over-consumption and other behaviors in the range of the enterprise park, and can also be used for determining the position of the personnel in the park.
The information gathered by the business system and wired/wireless switches can be used to determine the behavior of the campus crew. For example, a wired/wireless switch may collect information about a person's connection to a wired network and a wireless network within the confines of an enterprise campus. The service system can collect the login information of the user and the information of the system to be logged in.
It should be understood that in the practice of the present disclosure, the location information and the behavioral information of the campus personnel may be correlated by their static information. Thus, campus management may be performed in relation to the location and behavior of campus personnel to improve the ability to predict/discover campus security risks.
The present disclosure will be described in detail below with reference to specific examples.
Fig. 3 schematically shows a flowchart of an information processing method for campus management according to an embodiment of the present disclosure.
As shown in fig. 3, the method may include operations S301 to S303, for example.
In operation S301, location information is acquired, wherein the location information is used to characterize a location where a target person appears on a campus at a specific time.
In operation S302, behavior information is obtained, wherein the behavior information is used to characterize a behavior of a target person occurring at a specific time.
In operation S303, it is determined whether a security risk exists in the campus based on the acquired location information and/or behavior information.
In one embodiment, operations S301 and S302 may be performed for a specific person with reference to time to acquire location information and behavior information of the specific person at a specific time. The location information obtained when operation S301 is performed may be in both an empty set and a non-empty set. When the location information is an empty set, it indicates that the particular person is not present on the campus at the particular time. When the location information is a non-empty set, it indicates either that the particular person is present on the campus at the particular time or that the particular person is not present on the campus at the particular time, but that the identity of the particular person is compromised. This can also be determined by means of the behavior information of the particular person. Similarly, the behavior information obtained when the operation S302 is performed may be in both an empty set and a non-empty set. When the behavior information is an empty set, it indicates that the particular person is not connected to the campus network at the particular time and is not logged into the enterprise system. When the behavior information is a non-empty set, indicating that the specific person may be connected to the campus network at a specific time; or may log into an enterprise system; or both the campus network and possibly the enterprise system. The content of the behavior information can be analyzed and determined at this time.
In other embodiments, a specific person may be used as an index, and if the specific person is found to generate a piece of location information at a specific time, operations S301 and S302 may be performed to determine whether the specific person also generates other location information and behavior information at the specific time. Alternatively, if it is found that the specific person generates one piece of behavior information at a specific time, operations S302 and S301 may be performed to determine whether the specific person also generates other behavior information and location information at the specific time.
On the basis of performing operations S301 and S302, it may be determined whether there is a security risk in the campus based on one or both of the acquired location information and behavior information.
In one embodiment, if it is determined that the person associated with the location information is present at a preset sensitive location (such as a financial department, a vault, etc.) at an abnormal time (such as an unauthorized time of the enterprise) based on the location information, the behavior information can be not further verified, but the security risk in the campus is directly prompted, and important information (such as location information, basic information of the person, etc.) related to the risk event is pushed to the campus manager and the corresponding responsible person of the enterprise.
In one embodiment, if it is determined based on the behavior information only that the person associated with the behavior information is connected to the campus network and/or logged into the enterprise-sensitive system at an abnormal time (e.g., unauthorized time of the enterprise), the location information may not be further verified, but the security risk may be directly prompted in the campus, and important information related to the risk event (e.g., location information, basic information of the person, etc.) may be pushed to the campus manager and the corresponding responsible person of the enterprise.
In other embodiments, the location information and the behavioral information of the same person may be correlated to determine whether a security risk exists within the campus.
By adopting the campus personnel monitoring strategy with different dimensions and multiple factors, namely, the position and the behavior of the same personnel are correlated to predict/discover whether the enterprise campus has a safety risk or not, the problem that the data is inaccurate due to the adoption of a single-factor monitoring strategy in the prior art and the security of the enterprise campus is low can be solved, and the technical effects of optimizing a campus management mode and improving the security of the campus are achieved.
As an alternative embodiment, operation S303 may include, for example, the following operations:
in response to the position information indicating that the target person does not appear in the campus at the specific time, determining whether the behavior information includes a system login log associated with the target person;
and prompting that a first-level risk exists in the campus in response to the fact that the behavior information contains a system login log associated with the target person.
In embodiments of the present disclosure, the behavior information may include, but is not limited to, system log and network connection log.
Specifically, if it is determined from the location information that a person is not present at the campus at a certain time, but it is determined from analyzing the behavior information of the person that there is a system log associated with the person at that time. This indicates that the identity of the person may be misappropriated and thus may indicate that there is a first level of risk in the campus. However, there is also a special case where the person has VPN privileges, and can log in to the enterprise system remotely even if he/she is not present on the campus. At this point, while prompting that there is a level of risk in the campus, the relevant personnel may be notified to verify whether the personnel has remote permission and whether they have remotely logged into the enterprise system at that time. If the person is verified to have remote permission and is remotely logged into the enterprise system at that time, the non-present risk tips may be dismissed. Otherwise, the risk prompt is reserved until the release.
Through the embodiment of the disclosure, the risk of the user embezzlement can be found in time, the safety risk prompt is carried out, and the information leakage of enterprises is avoided. Further, the false prompting of security risks caused by the VPN authority problem can be avoided.
Alternatively, operation S303 may further include, for example, the following operations:
and prompting that a secondary risk exists in the park in response to determining that the behavior information only contains a network connection log associated with the target person, wherein the risk of the primary risk is higher than the risk of the secondary risk.
Specifically, if it is determined from the location information that a person is not present at the campus at a certain time, but it is determined from analyzing the behavior information of the person that there is a network connection log associated with the person at that time. This situation indicates that there may be other people who have activated the person's dedicated device or used the person's dedicated address. At this point, the campus may be prompted for the presence of a secondary risk. Because the risk of the secondary risk is low, under certain conditions, the park managers only need to pay attention to the risk events.
In one embodiment, after the secondary risk is presented in the prompting park, if it is further detected that a system login log associated with the target person appears at a subsequent time point, the previously presented secondary risk may be modified into a primary risk for prompting.
Through the embodiment of the disclosure, different levels of security risks can be prompted for different behaviors so as to optimize campus management. Meanwhile, the personnel behavior trend analysis and the campus situation prediction can be achieved, the scientificity and the accuracy of the campus management are improved, the preparation or the timely stopping of a campus management party can be shown in advance before problems occur under some conditions, and the campus management is evolved from a passive mode to an active mode.
It should be noted that, in the embodiment of the present disclosure, if the enterprise system software is illegally logged in for use (including stealing accounts of other users to log in the system, operating devices of other people without authorization, not using the enterprise system software at an authorized time, and the like), enterprise information may be leaked. The use of software systems on an enterprise campus typically results in network connection information and system login information. Based on the method, wired network connection information and wireless network connection information in the park and login information of enterprise system software can be collected so as to monitor whether safety risks exist in the park or not.
As another alternative, operation S303 may include, for example, the following operations:
in response to the behavior information characterizing that the target person has not experienced the particular behavior at the particular time, determining whether the target person is present at a plurality of locations within the campus at the particular time based on the location information;
in response to determining that the target person is present at a plurality of locations within the campus at a particular time, a presence of a first level of risk within the campus is alerted.
In the embodiment of the present disclosure, if it is determined through the behavior information that a certain person does not have a record of connecting to the campus network at a certain time, there is no record of logging in the enterprise system. However, if it is determined that the person is present in a plurality of different locations at the same time through the location information, this situation indicates that the user identity of the person is stolen, which is easy to bring risks to the safety of the park, and at this time, it can be prompted that a first-level risk exists in the park.
Alternatively, operation S303 may further include, for example, the following operations:
in response to determining that the target person is present at only one location on the campus at the particular time, determining whether the location is an authorized location for the target person;
in response to determining that the location is not an authorized location for the target person, a first level of risk is indicated to exist on the campus.
In the embodiment of the disclosure, if it is determined through the behavior information that a certain person does not have a record of connecting to the campus network at a certain time, there is no record of logging in the enterprise system. Also, if it is determined by the location information that the person is present at only one location at that time, this situation may not determine that there is no security risk on the campus. For example, if the person appears on the campus at that time at a location that is pre-authorized for that person, this indicates that there is no campus security risk associated with that person, and there is no need to prompt for a security risk. If the location at which the person is present at the campus at that time is a location for which it is not authorized (especially a sensitive location), this indicates that there is a campus security risk associated with the person, and this may be a prompt to indicate that there is a first risk in the campus.
As an alternative embodiment, determining whether the target person is present at multiple locations within the campus at a particular time based on the location information may include, for example, the following operations:
determining whether the target person is present in a first area within the campus at a particular time based on the first location information;
determining whether the target person is present in a second area within the campus at the specific time based on second location information, wherein the second location information is different from the first location information;
in response to determining that the target person is present in both the first area and the second area at the particular time, determining whether an intersection exists between the first area and the second area;
in response to determining that there is no intersection between the first area and the second area, it is determined that the target person is present at two different locations within the campus at a particular time.
Through the above-described operations of embodiments of the present disclosure, it may be determined whether campus personnel are simultaneously present at two different locations at the same time.
As another example, it may also be determined whether the target person is present at a third location within the campus at a particular time based on third location information, the third location being different from the first location and the second location, by intersecting the first, second, and third locations, and so on, to determine whether the campus person is simultaneously present at three or even more different locations at the same time.
In the embodiment of the present disclosure, the location information acquired for a certain person may be classified, and an area range may be determined by each type of location information. If all the determined area ranges overlap each other in one area section, the person is assumed to be present at only one location of the park, i.e. all the area ranges are actually pointing to the same location. Otherwise, if any two determined area ranges do not have a portion that overlaps with each other, the person is considered to be present in at least two different locations of the campus.
Taking the example that a person swipes a card in a park, when corresponding operation occurs, the system establishes a position confidence area A of the person according to the position and the effective range of the acquisition point, and if no position information acquisition result of other persons exists at the moment, the system considers that the person exists in the park and the position range is A. If the system also collects video acquisition information of the same person at the moment, the system calculates a confidence area B according to the position of the acquisition camera and a preset acquisition area, and calculates the coincidence relation between the area A and the area B, and if the result is C (not zero), the system considers that the person exists in the park and the position range is C. If the result is 0, the matching of the position of the person in the park is not passed through the preset strategy, and the condition indicates that the certificate of other people is possibly faked by the person, and prompt or alarm needs to be triggered to apply for the intervention of monitoring personnel for judgment.
Figures 4A-4C schematically illustrate determining a location of a campus person according to an embodiment of the disclosure.
The person is determined to appear in the area 1 at the time T through the card swiping information of the person, the person is determined to still appear in the area 2 at the time T through the face recognition information of the person, and the person is determined to still appear in the area 3 at the time T through the Bluetooth information of the person. As shown in fig. 4A, if the intersection of the region 1, the region 2 and the region 3 is the region marked by oblique lines, this indicates that the region 1, the region 2 and the region 3 point to the same position, i.e. the region range marked by oblique lines. As shown in FIG. 4B, if the intersection of region 1, region 2, and region 3 is empty, this indicates that region 1, region 2, and region 3 point to three different locations. As shown in fig. 4C, if only the region 2 and the region 3 of the region 1, the region 2 and the region 3 intersect (the intersection is the region marked by oblique lines in the figure), it indicates that the region 1, the region 2 and the region 3 point to two different positions, namely, the region corresponding to the region 1 and the region marked by oblique lines in the figure.
Or, as another alternative embodiment, operation S303 may include, for example, the following operations:
if the position information represents that the position of the target person appearing in the park at a specific time is normal, determining whether the behavior information only contains a system login log;
and prompting that the secondary risk exists in the park in response to determining that the behavior information only contains the system login log.
In the embodiment of the present disclosure, if it is determined that the location where the target person appears in the campus at a specific time is normal through the location information, there may be a security risk and there may be no security risk. In this case, the determination may be further made based on information on the behavior of the target person at the specific time. For example, if the person is not connected to the campus network through his behavioral information, but has an associated system log, which may be caused by someone else stealing his username, and thus may be alerted to a secondary risk in the campus.
Or, as another alternative embodiment, operation S303 may include, for example, the following operations:
if the position information represents that the time of the target person except the specified time is in the authorized position of the target person in the park, prompting that secondary risk exists in the park; and/or
And if the position information represents that the target person appears at a position in the park, which is not authorized for the target person, in the specific time, indicating that a first-level risk exists in the park.
For example, if the target person appears heavily in the vault during off hours (who is only authorized to go to the vault during off hours), it may be suggested that there is a secondary risk in the campus.
For example, if the target person is merely a general person, not a financial person, but is present heavily in the vault during normal work hours, a first level of risk may be indicated in the campus.
Table 1 illustrates processing results obtained after the associated location information and the behavior information are processed based on the information processing scheme for campus management provided in the embodiment of the present disclosure.
TABLE 1
Figure BDA0002475658860000141
Figure BDA0002475658860000151
Fig. 5 schematically shows a block diagram of an information processing apparatus for campus management according to an embodiment of the present disclosure.
As shown in fig. 5, the apparatus 500 includes a first obtaining module 501, a second obtaining module 502, and a determining module 503. The apparatus 500 may perform the related information processing method described above with reference to the method embodiment, and is not described herein again.
Specifically, the first obtaining module 501 is configured to obtain location information, where the location information is used to represent a location where a target person appears on a campus at a specific time.
A second obtaining module 502, configured to obtain behavior information, where the behavior information is used to characterize a behavior of the target person occurring at a specific time.
A determining module 503, configured to determine whether a security risk exists in the campus based on the obtained location information and/or behavior information.
As an optional embodiment, the determining module comprises: the first determining unit is used for responding to the fact that the position information represents that the target person does not appear in the park at a specific time, and determining whether the system login log related to the target person is contained in the behavior information or not; and the first prompting unit is used for responding to the fact that the system login log related to the target person is contained in the behavior information and prompting that the primary risk exists in the park.
Or, as another optional embodiment, the determining module includes: a second determination unit for determining whether the target person appears at a plurality of locations within the campus at a specific time based on the location information in response to the behavior information indicating that the target person does not have a specific behavior at the specific time; and a second prompting unit for prompting the presence of a first level of risk in the campus in response to determining that the target person is present at a plurality of locations in the campus at the particular time.
Or, as another optional embodiment, the determining module includes: the third determining unit is used for determining whether the behavior information only contains a system login log or not under the condition that the position information represents that the position of the target person appearing in the park is normal at a specific time; and the third prompting unit is used for responding to the fact that the behavior information only contains the system login log and prompting that the secondary risk exists in the park.
Or, as another optional embodiment, the determining module includes: the fourth prompting unit is used for prompting that the secondary risk exists in the park under the condition that the time of the position information representing the target person except the designated time appears in the authorized position of the target person in the park; and/or the fifth prompting unit is used for prompting that the primary risk exists in the park under the condition that the position information represents that the target person appears in the position, which is not authorized by the target person, in the park at the specific time.
It should be noted that the embodiment of the apparatus portion is similar to the embodiment of the method portion, and the achieved technical effects are also similar, which are not described herein again.
Fig. 6 schematically shows a block diagram of an electronic device according to an embodiment of the disclosure. The electronic device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 6, the electronic device 600 includes a processor 610, a computer-readable storage medium 620. The electronic device 600 may perform a method according to an embodiment of the present disclosure.
In particular, the processor 610 may comprise, for example, a general purpose microprocessor, an instruction set processor and/or related chip set and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 610 may also include onboard memory for caching purposes. The processor 610 may be a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
Computer-readable storage medium 620, for example, may be a non-volatile computer-readable storage medium, specific examples including, but not limited to: magnetic storage devices such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and so on.
The computer-readable storage medium 620 may include a computer program 621, which computer program 621 may include code/computer-executable instructions that, when executed by the processor 610, cause the processor 610 to perform a method according to an embodiment of the disclosure, or any variation thereof.
The computer program 621 may be configured with, for example, computer program code comprising computer program modules. For example, in an example embodiment, code in computer program 621 may include one or more program modules, including 621A, modules 621B, \8230;, for example. It should be noted that the division and number of modules are not fixed, and those skilled in the art may use suitable program modules or program module combinations according to actual situations, and when the program modules are executed by the processor 610, the processor 610 may execute the method according to the embodiment of the present disclosure or any variation thereof.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
It will be understood by those skilled in the art that while the present disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (11)

1. An information processing method for campus management, comprising:
acquiring position information, wherein the position information is used for representing the position of a target person appearing in a park at a specific time;
acquiring behavior information, wherein the behavior information is used for representing behaviors of the target person at the specific time, and the behavior information comprises but is not limited to a system login log and a network connection log; and
determining whether a security risk exists in the campus based on the acquired location information and/or the acquired behavior information;
wherein determining whether a security risk exists in the campus based on the obtained location information and/or the behavior information comprises:
in response to the location information characterizing that the target person is not present on the campus at the particular time, determining whether a system login log associated with the target person is included in the behavioral information;
in response to determining that the behavior information comprises a system login log associated with the target person, prompting that a first-level risk exists in the campus, and informing related persons to verify whether the target person has remote authority and whether the enterprise system is remotely logged in at the time while prompting that the first-level risk exists in the campus; and
in response to the behavior information characterizing that the target person did not take a particular behavior at the particular time, determining whether the target person occurred at a plurality of locations within the campus at the particular time based on the location information, the particular behavior comprising: a behavior of generating a system log and a behavior of generating a network connection log; and
prompting the presence of a first level of risk within the campus in response to determining that the target person is present at a plurality of locations within the campus at the particular time.
2. The method of claim 1, further comprising:
prompting the presence of a secondary risk in the campus in response to determining that only a network connection log associated with the target person is included in the behavioral information, wherein the primary risk is higher than the secondary risk.
3. The method of claim 1, further comprising:
in response to determining that the target person is present at only one location within the campus at the particular time, determining whether the location is an authorized location for the target person; and
in response to determining that the location is not an authorized location for the target person, alerting the campus that a first level of risk exists.
4. The method of claim 1, wherein the determining whether the target person is present at a plurality of locations within the campus at the particular time based on the location information comprises:
determining whether the target person is present in a first area within the campus at the particular time based on first location information;
determining whether the target person is present in a second area within the campus at the particular time based on second location information, wherein the second location information is different from the first location information;
in response to determining that the target person is simultaneously present in the first area and the second area at the particular time, determining whether an intersection exists between the first area and the second area; and
in response to determining that there is no intersection between the first area and the second area, determining that the target person appears at two locations within the campus at the particular time.
5. The method of claim 1, wherein the determining whether a security risk exists within the campus based on the obtained location information and/or the behavior information comprises:
if the position information indicates that the position of the target person appearing in the campus at the specific time is normal, determining whether the behavior information only contains a system login log;
and prompting that secondary risks exist in the campus in response to determining that the behavior information only contains a system login log.
6. The method of claim 1, wherein the determining whether a security risk exists within the campus based on the obtained location information and/or the behavior information comprises:
if the time of the target person, except the designated time, represented by the position information appears at the position authorized for the target person in the park, prompting that a secondary risk exists in the park; and/or
And if the position information represents that the target person appears at a position which is not authorized for the target person in the park at the specific time, prompting that a first-level risk exists in the park.
7. An information processing apparatus for campus management, comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring position information, and the position information is used for representing the position of a target person appearing in a park at a specific time;
a second obtaining module, configured to obtain behavior information, where the behavior information is used to characterize a behavior of the target person occurring at the specific time, and the behavior information includes, but is not limited to, a system login log and a network connection log; and
the determining module is used for determining whether a safety risk exists in the park based on the acquired position information and/or the acquired behavior information;
wherein the determining module comprises:
a first determining unit, configured to determine whether a system login log associated with the target person is included in the behavior information in response to the location information indicating that the target person does not appear in the campus at the specific time;
a first prompting unit, configured to prompt that a first-level risk exists in the campus in response to determining that the behavior information includes a system login log associated with the target person, and notify relevant persons to verify whether the target person has a remote permission and whether the target person remotely logs in the enterprise system at the time while prompting that the first-level risk exists in the campus; and
a second determining unit, configured to determine whether the target person appears at a plurality of locations within the campus at the specific time based on the location information in response to the behavior information indicating that the target person does not have a specific behavior at the specific time, wherein the specific behavior includes: a behavior of generating a system log and a behavior of generating a network connection log; and
a second prompting unit for prompting the existence of a first level of risk in the campus in response to determining that the target person appears at a plurality of locations in the campus at the specific time.
8. The apparatus of claim 7, wherein the means for determining comprises:
a third determining unit, configured to determine whether only a system login log is included in the behavior information, in a case where the location information indicates that the location of the target person appearing in the campus at the specific time is normal;
and the third prompting unit is used for prompting that the secondary risk exists in the park in response to the fact that the behavior information only contains a system login log.
9. The apparatus of claim 7, wherein the means for determining comprises:
the fourth prompting unit is used for prompting that a secondary risk exists in the park under the condition that the time of the target person, except the designated time, represented by the position information appears in a position authorized for the target person in the park; and/or
And the fifth prompting unit is used for prompting that a first-level risk exists in the park under the condition that the position information represents that the target person appears at a position which is not authorized by the target person in the park at the specific time.
10. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-6.
11. A computer-readable storage medium storing computer-executable instructions for implementing the method of any one of claims 1 to 6 when executed.
CN202010369792.5A 2020-04-30 2020-04-30 Information processing method and device for park management Active CN111582709B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010369792.5A CN111582709B (en) 2020-04-30 2020-04-30 Information processing method and device for park management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010369792.5A CN111582709B (en) 2020-04-30 2020-04-30 Information processing method and device for park management

Publications (2)

Publication Number Publication Date
CN111582709A CN111582709A (en) 2020-08-25
CN111582709B true CN111582709B (en) 2022-12-09

Family

ID=72127671

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010369792.5A Active CN111582709B (en) 2020-04-30 2020-04-30 Information processing method and device for park management

Country Status (1)

Country Link
CN (1) CN111582709B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112866919B (en) * 2021-01-05 2022-02-11 西安交通大学 Non-invasive security method and system based on indoor personnel positioning and behavior perception

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109687991A (en) * 2018-09-07 2019-04-26 平安科技(深圳)有限公司 User behavior recognition method, apparatus, equipment and storage medium
CN110807888A (en) * 2019-09-24 2020-02-18 北京畅景立达软件技术有限公司 Intelligent security method, system and storage medium for park

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010205081A (en) * 2009-03-04 2010-09-16 Sogo Keibi Hosho Co Ltd Device, method, and program for managing integrated log
CN206132978U (en) * 2016-09-29 2017-04-26 浙江东冠信息技术有限公司 Office building personnel positioning system based on bluetooth
CN108111348A (en) * 2017-12-20 2018-06-01 杭州云屏科技有限公司 A kind of security policy manager method and system for enterprise's cloud application
CN109541530A (en) * 2018-10-23 2019-03-29 北京凯乐比兴科技有限公司 A kind of key area nonnative personnel's positioning system and method based on UWB
CN109615256A (en) * 2018-12-17 2019-04-12 武汉烽火信息集成技术有限公司 Wisdom garden security protection risk control method, storage medium, electronic equipment and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109687991A (en) * 2018-09-07 2019-04-26 平安科技(深圳)有限公司 User behavior recognition method, apparatus, equipment and storage medium
CN110807888A (en) * 2019-09-24 2020-02-18 北京畅景立达软件技术有限公司 Intelligent security method, system and storage medium for park

Also Published As

Publication number Publication date
CN111582709A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
US11039314B2 (en) Method for passive authentication of an individual using an individual's geo-location via a communication network and blockchain associated recording of individual's authentication data
CN101753563B (en) Authentication apparatus and authentication method
CN101641671B (en) Information processing apparatus and information processing method
CN106453874B (en) Mobile phone control method and system
US10708778B2 (en) Method and system for authenticating an individual's geo-location via a communication network and applications using the same
JP2011048547A (en) Abnormal-behavior detecting device, monitoring system, and abnormal-behavior detecting method
CN105631988A (en) User management method and user management device
WO2021257909A1 (en) Systems and methods for virtual traffic stops
KR102188775B1 (en) Method and system for remotely controlling client terminals using face recognition and face recognition terminal
CN111582709B (en) Information processing method and device for park management
CN208705952U (en) A kind of rights management unit
CN111462417A (en) Multi-information verification system and multi-information verification method for unmanned bank
US20220262184A1 (en) Property management systems
JP6393483B2 (en) Security area management system and security area management method
JP5353147B2 (en) Face matching system
CN110942540A (en) Nuclear security monitoring alarm method and device
WO2018179723A1 (en) Facial authentication processing apparatus, facial authentication processing method, and facial authentication processing system
CN1996397A (en) Intelligent fingerprint security system for use in cell
EP3937038A1 (en) Device and method for user authentication using security card
JP4703880B2 (en) Access control system
TWM591182U (en) Intelligent watch
JP2012141989A (en) Abnormal behavior detection device, monitoring system, abnormal behavior detection method, and program
WO2018006336A1 (en) Identity card-based response method and system
ES2946446T3 (en) A system and method for managing user identity data
CN115273276B (en) Method and device for authenticating a user

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant