CN112241829A - Important population comparison method based on railway traffic information - Google Patents

Important population comparison method based on railway traffic information Download PDF

Info

Publication number
CN112241829A
CN112241829A CN202010973404.4A CN202010973404A CN112241829A CN 112241829 A CN112241829 A CN 112241829A CN 202010973404 A CN202010973404 A CN 202010973404A CN 112241829 A CN112241829 A CN 112241829A
Authority
CN
China
Prior art keywords
control
key
information
personnel
population
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010973404.4A
Other languages
Chinese (zh)
Inventor
李洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Tianyi Network Service Co ltd
Original Assignee
Sichuan Tianyi Network Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Tianyi Network Service Co ltd filed Critical Sichuan Tianyi Network Service Co ltd
Priority to CN202010973404.4A priority Critical patent/CN112241829A/en
Publication of CN112241829A publication Critical patent/CN112241829A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Abstract

The invention discloses a method for comparing key population based on railway traffic information, which utilizes a key population control platform to track and monitor and comprises the following steps: the method comprises the steps of inputting important population personnel information, auditor review information, distributing managers, monitoring the activity track, controlling on-site personnel and displaying the information of controlling on-site personnel. According to the invention, the travel track model is constructed by analyzing the travel track of key personnel, the key personnel are controlled by using the informationized data, so that the manpower, financial resources and material resources are greatly saved, the control efficiency is improved, and the risk assessment and the police force distribution and control can be carried out in advance through the model construction.

Description

Important population comparison method based on railway traffic information
Technical Field
The invention relates to a method for comparing key population, in particular to a method for comparing key population based on railway traffic information.
Background
At present, China is in the stage of innovation, along with the development of economy and society, the adjustment of economic structure and interest pattern, the continuous acceleration of urbanization process, the complex interweaving of various social conflicts, the high and poor social interview events caused by enterprise bankruptcy, reform, land acquisition and removal, industrial and financial delinquent, and the aggressive pursuit, illegal gathering tour demonstration, nuisance duty, crowd disturbance of social order, crowd impacting state organ, knock extortion, 35820and the serious harm to social management caused by extreme interview, tangling, illegal crowd gathering, and illegal crowd gathering.
For safety, the trace of some key personnel must be held in the hands. In the traditional process of stably controlling the key personnel in a trip, a staring mode of 'staring at one' is mostly adopted, so that not only is a great amount of money and energy consumed, but also the phenomenon of losing control of the person with a single clue is frequent, so that the public security personnel only defend passively but not actively in the process of stably controlling the public security personnel. In addition, in the mode of 'people staring at people', the consumption of manpower and financial resources is large; single clue and difficult searching of people; the phenomenon of personnel out of control often occurs; passive defensive action is also inconvenient.
Disclosure of Invention
The invention aims to provide an efficient key population comparison and monitoring method, which solves the problems of high manpower and financial consumption, lag information analysis and untimely staring in the traditional staring mode.
In order to solve the problems, the invention provides a key population comparison method based on railway traffic information.
A key population comparison method based on railway traffic information utilizes a key population control platform to track and monitor, and is characterized by comprising the following steps:
s1: the police officer uploads the identification information of the key population to the key population control platform and initiates an audit request to an auditor;
s2: the method comprises the steps that an auditor calls original identity information stored in a key population control platform to be compared with uploaded key personnel identity information, whether a contact way is false information or not is verified, key personnel are divided into corresponding police stations according to jurisdictions after verification is passed, and key personnel information passing verification is stored in the key population control platform;
s3: allocating exclusive managers to issued key personnel in the district, uploading confirmation official letters to a key population control platform by the managers within preset time according to the regulations, and converting the key personnel into on-control personnel;
s4: the method comprises the following steps that a manager receives travel information of a person under control through a short message, summarizes the travel information of the person under control and uploads the summarized travel information to a key population control platform for storage and backup;
s5: the method comprises the following steps that a manager models the travel track of a person under control in a fixed time, a comparison model of the person under control is built, and the dangerous or suspicious instant track is reflected to the upper level in time according to the authority; if there is no risk track, go to step S6;
s6: in the control time of the control personnel, no risk track appears, and the administrator can lift the solution control application to the key population control platform according to the regulation;
s7: the examiner logs in the key population control platform, inspects key personnel according to the analysis and control application mentioned by the administrator, after the inspection is passed, discloses an analysis and control list in the key population control platform, if no person proposes objections to the analysis and control in the public period, executes step S9, and if objections exist, executes step S8;
s8: continuously receiving travel track information of the on-control personnel;
s9: and when the control personnel perform control analysis to be key personnel, the administrator uploads control analysis applications to the key population control platform and changes the task details.
Preferably, the identity information uploaded in step 1 includes: name, great name, certificate number, gender, cell phone number, date of birth, other contact, nationality, religion, marital status, name of responsible person, telephone of responsible person, address of residence, type of person, call for receipt.
Preferably, the mode of uploading the identity information by the policeman in the step 1 is to manually input the identity information of key personnel, and the input identity information is stored in the data storage submodule after being input; and the data distribution submodule distributes the key population identity information of the data storage submodule to a corresponding administrator for auditing.
Preferably, the short message service in step S4 processes and receives the activity track of the key person through a specific receiving, storing and distributing module.
Preferably, the data is imported, pushed and stored, and a unidirectional security boundary and a data center built by the platform use a specific public security intranet to import, push and store the data to a public security data storage platform.
Preferably, the key personnel include: drug addicts, presidential persons, persons associated with major cases, persons in the relationship of escaping suspects.
Preferably, before the police officer, the auditor and the administrator upload the identity information, perform the audit operation and perform the task processing, the identity authentication is performed, and the identity authentication can be completed by using the account number and the password or can be performed by using the PKI digital certificate.
Preferably, the manner of summarizing the trip information of the key personnel in S4 is as follows: and the control recording submodule stores the key personnel control information and uploads the control data to the control task module for backup.
Preferably, the administrator stores the key personnel management and control information by using the management and control recording submodule, and uploads the management and control data to the management and control task module, and after the task is completed, the state modification is completed in the management and control task module.
Preferably, the administrator can lift the same key personnel for monitoring and managing for multiple times.
The invention has the beneficial effects that: the travel track model is constructed by using the key personnel management and control platform and analyzing the travel track of the key personnel, the key personnel are managed and controlled by using the informationized data, the manpower, financial resources and material resources are greatly saved, the management and control efficiency is improved, and risk assessment and police force arrangement and control can be performed in advance through model construction.
Drawings
FIG. 1 illustrates the steps of the present invention.
Figure 2 is a carrier system platform of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
As shown in fig. 1, a method for comparing a key population based on railway traffic information utilizes a key population control platform to perform tracking monitoring, and is characterized by comprising the following steps:
s1: the police officer uploads the identification information of the key population to the key population control platform and initiates an audit request to an auditor;
s2: the method comprises the steps that an auditor calls original identity information stored in a key population control platform to be compared with uploaded key personnel identity information, whether a contact way is false information or not is verified, key personnel are divided into corresponding police stations according to jurisdictions after verification is passed, and key personnel information passing verification is stored in the key population control platform;
s3: allocating exclusive managers to issued key personnel in the district, uploading confirmation official letters to a key population control platform by the managers within preset time according to the regulations, and converting the key personnel into on-control personnel;
s4: the method comprises the following steps that a manager receives travel information of a person under control through a short message, summarizes the travel information of the person under control and uploads the summarized travel information to a key population control platform for storage and backup;
s5: the method comprises the following steps that a manager models the travel track of a person under control in a fixed time, a comparison model of the person under control is built, and the dangerous or suspicious instant track is reflected to the upper level in time according to the authority; if there is no risk track, go to step S6;
s6: in the control time of the control personnel, no risk track appears, and the administrator can lift the solution control application to the key population control platform according to the regulation;
s7: the examiner logs in the key population control platform, inspects key personnel according to the analysis and control application mentioned by the administrator, after the inspection is passed, discloses an analysis and control list in the key population control platform, if no person proposes objections to the analysis and control in the public period, executes step S9, and if objections exist, executes step S8;
s8: continuously receiving travel track information of the on-control personnel;
s9: and when the control personnel perform control analysis to be key personnel, the administrator uploads control analysis applications to the key population control platform and changes the task details.
It should be understood that the identity information uploaded in step 1 includes: name, great name, certificate number, gender, cell phone number, date of birth, other contact, nationality, religion, marital status, name of responsible person, telephone of responsible person, address of residence, type of person, call for receipt.
It is to be understood that, in the step 1, the mode of uploading the identity information by the policeman is to manually enter the identity information of key personnel, and the identity information is stored in the data storage sub-module after the entry is completed; and the data distribution submodule distributes the key population identity information of the data storage submodule to a corresponding administrator for auditing.
It should be understood that, in the step S4, the short message service processes and receives the activity track of the key person through a specific receiving, storing and distributing module.
It should be understood that the importing, pushing and storing of the data, the unidirectional security boundary established by the platform and the data center use a specific public security intranet to import, push and store the data to the public security data storage platform.
It is to be understood that the key personnel include: drug addicts, presidential persons, persons associated with major cases, persons in the relationship of escaping suspects.
It should be understood that identity authentication is required before the police officer, the auditor and the administrator upload and audit identity information and process tasks, and the identity authentication can be completed by using an account password or by using a PKI digital certificate.
It should be understood that the manner of summarizing the trip information of the key personnel in S4 is as follows: and the control recording submodule stores the key personnel control information and uploads the control data to the control task module for backup.
It is to be understood that the administrator stores the key personnel management and control information by using the management and control recording submodule, and uploads the management and control data to the management and control task module, and after the task is completed, the state modification is completed in the management and control task module.
It should be understood that the administrator may refer to the same key personnel for multiple monitoring administrations.
As shown in fig. 2, the carrying system platform of the present invention comprises: the system comprises a key personnel input module, a key personnel report module, a key personnel control module, a control-in personnel analysis module, a short message report recording module and a control history module; wherein:
the key personnel entry module comprises a data entry submodule, a data storage submodule and a data distribution submodule, and provides a key personnel database provided by a public security department to access a key population control platform, and key personnel identity information to be controlled is entered, stored and distributed;
the key personnel reporting module comprises a data receiving sub-module, a data uploading sub-module and a data auditing sub-module; receiving, uploading and auditing data of the important personnel through manual entry and automatic reading of data entry equipment or data reading equipment accessed to the important population management and control platform;
the key personnel management and control module comprises an information receiving submodule, an information comparison submodule and an information feedback submodule; acquiring the trip personnel identity information, comparing, matching and marking the identity information with the key personnel identity information, and tracking and monitoring the trip information of the key personnel;
the short message report recording module comprises a short message storage submodule and a short message distribution submodule and is used for reporting the control information of key personnel.
It needs to be understood that the login module comprises an account password login submodule and a PKI digital certificate login submodule; the account password login sub-module is matched with a user account, a password and a password dog to log in; and the PKI digital certificate module performs identity authentication by using the PKI digital certificate.
It is to be understood that the data entry sub-module uploads key personnel identity information by a user, and the key personnel identity information is stored in the data storage sub-module after entry is completed; and the data distribution submodule distributes the key population identity information of the data storage submodule to a corresponding administrator for auditing.
It needs to be understood that the data receiving sub-module receives the key personnel information from the key personnel entering sub-module and transmits the information to the data uploading sub-module; and the data uploading sub-module analyzes and processes the received key personnel information and sends the key personnel information to the corresponding data auditing sub-module for auditing by an auditor.
It should be understood that the information receiving submodule receives the trip information of the key personnel, sends the information classification processing to the information feedback submodule, and the information feedback submodule sends the information to the receipt telephone.
It should be understood that the short message receiving sub-module stores the trip information of each key person and integrates the trip information into a table, the key words can be used for inquiring, meanwhile, the trip information of the same key person is integrated and sent to the short message distribution sub-module, and the short message distribution sub-module sends the trip information of the key person to the corresponding manager.
It should be understood that the administrator monitoring sub-module stores the work history of each user.
It should be understood that the management and control recording sub-module stores the management and control information of key personnel, uploads the management and control data to the management and control task module for recording the management and control records of the personnel under control, and the management and control task sub-module receives the information from the management and control recording sub-module to update and modify the tasks.
It is to be understood that the key population management and control platform further comprises a user creation module and a log query module; the log query module comprises an administrator monitoring submodule and a task processing submodule and is used for querying an operator behavior log; the control history module comprises a control recording submodule and a control task submodule and is used for inquiring task information.

Claims (10)

1. A key population comparison method based on railway traffic information utilizes a key population control platform to track and monitor, and is characterized by comprising the following steps:
s1: the police officer uploads the identification information of the key population to the key population control platform and initiates an audit request to an auditor;
s2: the method comprises the steps that an auditor calls original identity information stored in a key population control platform to be compared with uploaded key personnel identity information, whether a contact way is false information or not is verified, key personnel are divided into corresponding police stations according to jurisdictions after verification is passed, and key personnel information passing verification is stored in the key population control platform;
s3: allocating exclusive managers to issued key personnel in the district, uploading confirmation official letters to a key population control platform by the managers within preset time according to the regulations, and converting the key personnel into on-control personnel;
s4: the method comprises the following steps that a manager receives travel information of a person under control through a short message, summarizes the travel information of the person under control and uploads the summarized travel information to a key population control platform for storage and backup;
s5: the method comprises the following steps that a manager models the travel track of a person under control in a fixed time, a comparison model of the person under control is built, and the dangerous or suspicious instant track is reflected to the upper level in time according to the authority; if there is no risk track, go to step S6;
s6: in the control time of the control personnel, no risk track appears, and the administrator can lift the solution control application to the key population control platform according to the regulation;
s7: the examiner logs in the key population control platform, inspects key personnel according to the analysis and control application mentioned by the administrator, after the inspection is passed, discloses an analysis and control list in the key population control platform, if no person proposes objections to the analysis and control in the public period, executes step S9, and if objections exist, executes step S8;
s8: continuously receiving travel track information of the on-control personnel;
s9: and when the control personnel perform control solving to be key personnel, the administrator uploads control solving applications to the key personnel control platform and changes the task details.
2. The method for comparing the emphasis population based on the railway traffic information as claimed in claim 1, wherein the identity information uploaded in the step 1 comprises: name, great name, certificate number, gender, cell phone number, date of birth, other contact, nationality, religion, marital status, name of responsible person, telephone of responsible person, address of residence, type of person, call for receipt.
3. The method for comparing the key population based on the railway traffic information as claimed in claim 1, wherein the mode of uploading the identity information by the policeman in the step 1 is to manually input the identity information of the key personnel, and the identity information is stored in the data storage submodule after the input is completed; and the data distribution submodule distributes the key population identity information of the data storage submodule to a corresponding administrator for auditing.
4. The method for comparing the emphasis population based on the railway traffic information as claimed in claim 1, wherein the short message service in step S4 processes and receives the activity track of the emphasis person through a specific receiving, storing and distributing module.
5. The method for comparing the key population based on the railway traffic information as claimed in claim 1, wherein the data is imported, pushed and stored to a public security data storage platform by using a specific public security intranet through a one-way security boundary and a data center built by the platform.
6. The method for comparing the important population based on the railway traffic information as claimed in claim 1, wherein the important persons comprise: drug addicts, presidential persons, persons associated with major cases, persons in the relationship of escaping suspects.
7. The method for comparing the key population based on the railway traffic information as claimed in claim 1, wherein the police officer, the auditor and the administrator need to perform the identity verification before uploading the identity information, the audit operation and the task processing, and the identity verification can be performed by using an account password or a PKI digital certificate.
8. The method for comparing the important population based on the railway traffic information as claimed in claim 1, wherein the gathering manner of the trip information of the important personnel in S4 is as follows: and the control recording submodule stores the key personnel control information and uploads the control data to the control task module for backup.
9. The method as claimed in claim 1, wherein the administrator stores the management and control information of the key personnel by using the management and control recording sub-module, uploads the management and control data to the management and control task module, and completes the state modification in the management and control task module after the task is completed.
10. The method as claimed in claim 1, wherein the administrator can perform monitoring management on the same key person for a plurality of times.
CN202010973404.4A 2020-09-16 2020-09-16 Important population comparison method based on railway traffic information Pending CN112241829A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010973404.4A CN112241829A (en) 2020-09-16 2020-09-16 Important population comparison method based on railway traffic information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010973404.4A CN112241829A (en) 2020-09-16 2020-09-16 Important population comparison method based on railway traffic information

Publications (1)

Publication Number Publication Date
CN112241829A true CN112241829A (en) 2021-01-19

Family

ID=74170933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010973404.4A Pending CN112241829A (en) 2020-09-16 2020-09-16 Important population comparison method based on railway traffic information

Country Status (1)

Country Link
CN (1) CN112241829A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104820905A (en) * 2015-05-19 2015-08-05 威海北洋电气集团股份有限公司 Space trajectory big data analysis-based person management and control method and system
CN105225039A (en) * 2015-09-24 2016-01-06 北京云海寰宇信息技术有限责任公司 Based on independently reporting the floating population's management method with Community Watch
CN108090440A (en) * 2017-12-14 2018-05-29 中国铁道科学研究院电子计算技术研究所 A kind of authentication system towards railway transport of passengers
CN110647561A (en) * 2019-09-26 2020-01-03 四川科瑞软件有限责任公司 Communication track analysis method for drug-involved personnel
CN110727688A (en) * 2019-10-24 2020-01-24 甘肃华科信息技术有限责任公司 Key personnel gridding service management system
CN111385274A (en) * 2018-12-29 2020-07-07 航天信息股份有限公司 Cross-network service calling method and device, feature gateway and identity verification system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104820905A (en) * 2015-05-19 2015-08-05 威海北洋电气集团股份有限公司 Space trajectory big data analysis-based person management and control method and system
CN105225039A (en) * 2015-09-24 2016-01-06 北京云海寰宇信息技术有限责任公司 Based on independently reporting the floating population's management method with Community Watch
CN108090440A (en) * 2017-12-14 2018-05-29 中国铁道科学研究院电子计算技术研究所 A kind of authentication system towards railway transport of passengers
CN111385274A (en) * 2018-12-29 2020-07-07 航天信息股份有限公司 Cross-network service calling method and device, feature gateway and identity verification system
CN110647561A (en) * 2019-09-26 2020-01-03 四川科瑞软件有限责任公司 Communication track analysis method for drug-involved personnel
CN110727688A (en) * 2019-10-24 2020-01-24 甘肃华科信息技术有限责任公司 Key personnel gridding service management system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
沈晓磊: "基于"大数据"的重点人员管控系统的设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Similar Documents

Publication Publication Date Title
CN110852601B (en) Big data application method and system for environmental monitoring law enforcement decision
CN106778253A (en) Threat context aware information security Initiative Defense model based on big data
US20180197145A1 (en) Multi-stage service record collection and access
CN101587576A (en) Public inquiring and supervising system of public security cases
CN105574657A (en) Intelligent police actual combat comprehensive application platform
US20180003513A1 (en) Incident response analytic maps
CN111046415A (en) Intelligent grading early warning system and method for confidential files
CN109784786A (en) A kind of staple product quality safety electronics is traced to the source data service system
CN111488999A (en) Be applied to wind-powered electricity generation field safety production information-based management system
CN104778562B (en) A kind of safe eye supervising platform system in job site
CN109829841A (en) A kind of design method of government procurement evaluation expert management system
CN112465480A (en) A real name system management system of labor affairs for building trade
CN112241829A (en) Important population comparison method based on railway traffic information
WO2018232887A1 (en) Mobile person information acquisition feedback method, server, and system
CN116257190A (en) Data supervision system based on block chain
CN112241444B (en) Important population management and control platform based on railway traffic information
Mollah et al. Proposed e-police system for enhancement of e-government services of Bangladesh
CN110060437A (en) Regional Management System
CN113723694B (en) Police officer control method, device, equipment and storage medium
CN115422421A (en) Intelligent campus data management platform system for internet-based data
CN114240349A (en) Ecological environment supervision method and system based on block chain
CN111461947A (en) Community correction self-service system based on Internet of things
CN112085341A (en) Master station system suitable for risk management and control of overall process of power production operation
CN111523758A (en) Prison big data analysis system
CN117221435B (en) Mobile phone safety performance detection method and system based on mobile phone cabinet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210119

RJ01 Rejection of invention patent application after publication