CN112804647A - Target user tracking method, system, server and storage medium based on communication - Google Patents
Target user tracking method, system, server and storage medium based on communication Download PDFInfo
- Publication number
- CN112804647A CN112804647A CN202110006959.6A CN202110006959A CN112804647A CN 112804647 A CN112804647 A CN 112804647A CN 202110006959 A CN202110006959 A CN 202110006959A CN 112804647 A CN112804647 A CN 112804647A
- Authority
- CN
- China
- Prior art keywords
- keywords
- user
- target
- matching
- query result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/903—Querying
- G06F16/9038—Presentation of query results
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/907—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/909—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computational Linguistics (AREA)
- Library & Information Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention provides a target user tracking method based on communication, which is executed by a server and comprises the following steps: acquiring keywords input by a supervisor, wherein the keywords comprise the time of occurrence of a target user to be queried and/or position information corresponding to the time; matching a query result meeting a rule from a preset database based on the keyword, wherein the query result comprises target identity information of the target user; generating an analysis result based on the target identity information; and sending the query result and the analysis result to the supervisor. According to the method and the device, the preset database is matched with the keywords to obtain the identity information of the target user to be inquired, so that the efficiency of tracking the target user is improved.
Description
Technical Field
The embodiment of the invention relates to the technical field of mobile communication, in particular to a target user tracking method, a target user tracking system, a target user tracking server and a storage medium based on communication.
Background
In the existing environment, when the conditions of tracking inquiry of missing people, pursuit of criminal suspects, tracking of new crown pneumonia epidemic situation and the like occur, related departments need to track or position target users, and user information (such as name, mobile phone number, sim card number IMSI, equipment identification code IMEI, number-adding location, number-adding time, source location area information and the like) is determined according to the track of the users, or the track of the users and more comprehensive identity information are determined according to a small part of information such as the mobile phone numbers of the users.
The prior art adopts a method of off-line and on-site inquiry of personnel for tracking a target user, which causes low efficiency and waste of manpower.
Disclosure of Invention
The invention aims to solve the problems and provides a target user tracking method, a target user tracking system, a target user tracking server and a storage medium based on communication.
In a first aspect, the present invention provides a target user tracking method based on communication, executed by a server, including the following steps:
acquiring keywords input by a supervisor, wherein the keywords comprise the time of occurrence of a target user to be queried and/or position information corresponding to the time;
matching a query result meeting a rule from a preset database based on the keyword, wherein the query result comprises target identity information of the target user;
generating an analysis result based on the target identity information;
and sending the query result and the analysis result to the supervisor.
Further, the creating process of the preset database comprises:
acquiring communication information of one or more user terminals from a base station at preset time intervals;
determining a user ID of the user, the time when the user appears and/or position information corresponding to the time based on the communication information;
and storing the user ID of the user, the time when the user appears and/or the position information corresponding to the time into a database.
Further, the acquiring, from the base station, communication information of terminals of one or more users at preset time intervals further includes:
judging whether the base station is in a preset range or not;
if so, acquiring communication information of the terminals of one or more users from the base station;
and if the communication information is not in the preset range, not acquiring the communication information of the terminal of the user.
Further, matching a query result meeting a rule from a preset database based on the keyword, where the query result includes target identity information of the target user, and further including:
when the number of the keywords is one, matching a query result meeting a rule from a preset database based on the keywords;
when the keywords are at least two or more, generating a first query algorithm based on the at least two or more keywords;
and matching the query result meeting the rule from a preset database based on the first query algorithm.
Further, the matching of the query result meeting the rule from the preset database based on the keyword further includes:
acquiring one or more time periods input by a supervisor and/or one or more position information in the time periods;
performing data collision analysis based on one or more location information within the one or more time periods to generate keywords;
when the number of the keywords is one, matching a query result meeting a rule from a preset database based on the keywords;
when the keywords are at least two or more, generating a second query algorithm based on the at least two or more keywords;
and matching the query result meeting the rule from a preset database based on the second query algorithm.
Further, the target identity information further includes a mobile user identification code and a mobile device identification code of the target user, and the generating an analysis result based on the target identity information includes:
if the target identity information comprises a mobile user identification code and at least two mobile equipment identification codes, the generated analysis result comprises that the target user replaces the same SIM card to at least two mobile equipment;
if the target identity information comprises at least two mobile subscriber identification codes and one mobile equipment identification code, the generated analysis result comprises that the target subscriber uses at least two SIM cards on one mobile equipment.
In a second aspect, the present invention provides a target user tracking system based on communication, including:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring keywords input by a supervisor, and the keywords comprise the time of occurrence of a target user to be queried and/or position information corresponding to the time;
the matching module is used for matching a query result meeting the rules from a preset database based on the keywords, and the query result comprises the target identity information of the target user;
the analysis result generation module is used for generating an analysis result based on the target identity information;
and the sending module is used for sending the query result and the analysis result to the supervisor.
Further, the matching module is further configured to:
when the number of the keywords is one, matching a query result meeting a rule from a preset database based on the keywords;
when the keywords are at least two or more, generating a first query algorithm based on the at least two or more keywords;
and matching the query result meeting the rule from a preset database based on the first query algorithm.
In a third aspect, the present invention provides a server, including a memory, a processor and a program stored on the memory and executable on the processor, wherein the processor executes the program to implement the target user tracking method based on communication according to any one of the above.
In a fourth aspect, the present invention provides a terminal-readable storage medium, on which a program is stored, which, when executed by a processor, is capable of implementing a communication-based target user tracking method as described in any one of the above.
According to the method and the device, the preset database is matched with the keywords to obtain the identity information of the target user to be inquired, so that the efficiency of tracking the target user is improved.
Drawings
Fig. 1 is a flowchart of a method according to a first embodiment.
Fig. 2 is a flowchart of a second embodiment of the method.
Fig. 3 is a flowchart of an alternative embodiment of the second embodiment.
Fig. 4 is a flowchart of an alternative embodiment of the second embodiment.
Fig. 5 is a system block diagram of the third embodiment.
Fig. 6 is a block diagram of an alternative embodiment of the third embodiment.
Fig. 7 is a server diagram according to a fourth embodiment.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the steps as a sequential process, many of the steps can be performed in parallel, concurrently or simultaneously. In addition, the order of the steps may be rearranged. A process may be terminated when its operations are completed, but may have additional steps not included in the figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc.
Furthermore, the terms "first," "second," and the like may be used herein to describe various orientations, actions, steps, elements, or the like, but the orientations, actions, steps, or elements are not limited by these terms. These terms are only used to distinguish one direction, action, step or element from another direction, action, step or element. For example, the first feature information may be the second feature information or the third feature information, and similarly, the second feature information and the third feature information may be the first feature information without departing from the scope of the present application. The first characteristic information, the second characteristic information and the third characteristic information are characteristic information of the distributed file system, but are not the same characteristic information. The terms "first", "second", etc. are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present invention, "plurality", "batch" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
The abbreviations and proper nouns used in the following examples have the following meanings:
XDR call ticket: the conversation-level detailed records of the signaling process and the service transmission process generated after the internet full data is processed contain all internet access information of the user, so that the telephone bill contains abundant data analysis and mining values.
IMSI: an international mobile telecommunication subscriber identity.
IMEI: the International Mobile Equipment Identity is an abbreviation of an International Mobile Equipment Identity and is commonly called as a Mobile phone serial number, a Mobile phone serial code and the like.
MME: the Mobility Management Entity (MME) is a key control node of the LTE access network of the 3GPP protocol, and is responsible for positioning of the idle mode ue (user equipment) and paging process, including relaying, and simply for signaling processing. It involves the bearer activation/deactivation process and selects an sgw (serving gateway) for a UE when the UE initializes and connects. A user is authenticated by interacting with the HSS and is assigned a temporary ID. And the MME simultaneously supports interception and monitoring within the legal permission range. The MME provides a control function interface for the 2G/3G access network, and the interface is S3. The HSS-facing also provides an S6a interface for roaming UEs.
HDFS distributed file system: the Hadoop Distributed File System is a high fault-tolerant System, is used for providing high-throughput data access, is generally suitable for application on large-scale data sets, and can support access and storage of oversized files.
Hbase database: the open-source column-based non-relational distributed database has the advantages of high reliability, high performance, column storage and scalability, and realizes real-time and random read-write access to large data.
Example one
The invention provides a target user tracking method based on communication, which is executed by a server, optionally, the server is a cluster server, as shown in fig. 1, and the method comprises the following steps:
s110, obtaining keywords input by a supervisor, wherein the keywords comprise the time of occurrence of a target user to be queried and/or position information corresponding to the time;
in this step, the keyword may be one or more. Correspondingly, the matching process may be a simple search and a fuzzy search.
And S120, matching a query result meeting the rule from a preset database based on the keyword, wherein the query result comprises the target identity information of the target user.
In this step, the process of creating the preset database includes: acquiring communication information of one or more user terminals from a base station at preset time intervals; determining a user ID of the user, the time when the user appears and/or position information corresponding to the time based on the communication information; and storing the user ID of the user, the time when the user appears and/or the position information corresponding to the time into a database.
Wherein the communication information may include: performing clock synchronization on a first signal source and a second signal source; acquiring an S1-MME XDR ticket and an XDR ticket of an S1 interface from the first signal source; and determining MRO data from the S1-MME XDR ticket. The first signal source is signaling acquisition equipment, and the second signal source is eNB equipment. The XDR ticket data is used for analyzing user/service location distribution, user activity track, etc., and is limited to a cell level, while the MR data acquired through the LTE network is divided into MRO, MRs, MRE, and MRO, which are information reported by a single user.
In one embodiment, the acquisition and data backfill process comprises: clock synchronization is carried out on the signaling acquisition equipment and the wireless side acquisition eNB equipment; acquiring a data source by using signaling acquisition equipment and wireless side acquisition eNB equipment, and analyzing to obtain an S1-MME XDR ticket, an S1 interface XDR ticket and MRO data; taking time as a key word and ECI and MMEUES1apiD as numerical values, and associating MRO in the MR with S1-MME XDR; and associating the MRO with the XDR data of the S1 interface by taking the time as a key word and the IMSI as a numerical value to obtain the MR associated with each S1-U XDR. And storing the data into a database by taking the user ID as a main key. The keyword input by the inspector in step S110 may be any one or more of user spatio-temporal data in which each user ID is a primary key.
In another alternative embodiment, the obtaining communication information of the terminals of one or more users from the base station further comprises: judging whether the base station is in a preset range or not; if so, acquiring communication information of the terminals of one or more users from the base station; and if the communication information is not in the preset range, not acquiring the communication information of the terminal of the user.
And S130, generating an analysis result based on the target identity information.
In this step, the target identity information may be one or more, and the analysis result may refer to an analysis result that the queried target identity information conforms to a target user that the supervisor needs to track, or an association relationship between two or more target users through two or more target identity information.
And S140, sending the query result and the analysis result to the supervisor.
In this step, the sent query result and analysis result may be displayed through a visual interface. Optionally, the method further comprises sending the query result and the analysis result to a database for storage. The database is a relational database.
In the embodiment, the input keywords are matched with the time-space dimension information database from the pre-established user ID, so that the identity of the target user is inquired, obtained and prompted, and the monitoring, screening and tracking efficiency of the target user is higher.
Example two
In this embodiment, on the basis of the above embodiment, multiple cases of a database matching process are added to support cases such as single condition search, combined condition search, fuzzy search, and the like, and as shown in fig. 2, the method specifically includes the following steps:
s210, obtaining keywords input by a supervisor, wherein the keywords comprise the time of the target user to be inquired and/or position information corresponding to the time.
In an alternative embodiment, the step of matching a query result meeting a rule from a preset database based on the keyword, where the query result includes target identity information of the target user, further includes:
s221, matching a query result meeting the rule from a preset database based on the keyword when the keyword is one.
S222, when the number of the keywords is at least two or more, generating a first query algorithm based on the at least two or more keywords.
And S223, matching a query result meeting the rule from a preset database based on the first query algorithm.
S230, generating an analysis result based on the target identity information;
since this step can simultaneously track one or more target users, the generated target identity information is also one or more, and each task analyzes one target user. Due to the fact that different analysis tasks need a large amount of time, waiting time of supervision personnel is too long, and efficiency is affected. In this step, a supervisor can input a custom analysis flow in advance by performing custom analysis on each target identity information, where the analysis flow is used to perform task sequence allocation on different target users according to weights and analysis difficulties, so that a more important analysis task of a target user can be preferentially processed, or an analysis task with a high analysis difficulty is allocated to a system idle time (such as at night), so as to ensure a response speed of the system for performing task analysis normally.
Optionally, in this step, the supervisor can also terminate the execution of some analysis persona according to the process parameters.
S240, sending the query result and the analysis result to the supervisor.
In an alternative embodiment, as shown in fig. 3, step S210 is followed by:
s224, acquiring one or more time periods input by a supervisor and/or one or more position information in the time periods.
And S225, performing data collision analysis based on one or more pieces of position information in one or more time periods to generate keywords.
In this step, a plurality of limiting conditions are combined, and the intersection of the limiting conditions is taken, so that the data range is gradually reduced. The processing mode is consistent with the combined query mode. And generating an algorithm through the condition selected by the user on the interface, submitting the algorithm to the cluster in a task mode for calculation, and importing the calculation result into the relational database for page display.
S226, matching a query result meeting the rule from a preset database based on the keyword, wherein the query result comprises the target identity information of the target user.
In this step, when the number of the keyword is one, a query result meeting the rule is matched from a preset database based on the keyword. And when the keywords are at least two or more, generating a second query algorithm based on the at least two or more keywords. And matching the query result meeting the rule from a preset database based on the second query algorithm.
Illustratively, the supervisor learns from other channels that the target user to be tracked is likely to appear at places C, D and E from time a to time B, but does not know the IMSI, IMEI and other information of the target user. At this time, A-B is held for a period T1, C position information C1. And D position information D1 and E position information E1 are used as input values to perform data collision analysis, and the analysis result is that the IMSI and the IMEI of the same user appear at three positions of C1, D1 and E1 in a T1 time period. The queried ID is the target ID of the target user.
In another alternative embodiment, as shown in fig. 4, the target identity information further includes a mobile subscriber identity code and a mobile device identity code of the target subscriber, and then step S223 is followed by further including:
s231, if the target identity information comprises a mobile user identification code and at least two mobile equipment identification codes, the generated analysis result comprises that the target user replaces the same SIM card with at least two mobile equipment;
s232, if the target identity information includes at least two mobile subscriber identities and a mobile device identity, the generated analysis result includes that the target subscriber uses at least two SIM cards on a mobile device.
According to the method and the device, the preset database is matched with the keywords to obtain the identity information of the target user to be inquired, so that the efficiency of tracking the target user is improved.
EXAMPLE III
The present embodiment provides a target user tracking system 3 based on communication, as shown in fig. 5, including:
a first obtaining module 301, configured to obtain a keyword input by a supervisor, where the keyword includes time when a target user to be queried appears and/or location information corresponding to the time;
a matching module 302, configured to match a query result meeting a rule from a preset database based on the keyword, where the query result includes target identity information of the target user.
Wherein the creation process of the preset database comprises: acquiring communication information of one or more user terminals from a base station at preset time intervals; determining a user ID of the user, the time when the user appears and/or position information corresponding to the time based on the communication information; and storing the user ID of the user, the time when the user appears and/or the position information corresponding to the time into a database. The acquiring, from the base station, communication information of the terminal of one or more users at every preset time interval further includes: judging whether the base station is in a preset range or not; if so, acquiring communication information of the terminals of one or more users from the base station; and if the communication information is not in the preset range, not acquiring the communication information of the terminal of the user.
An analysis result generation module 303, configured to generate an analysis result based on the target identity information;
a sending module 304, configured to send the query result and the analysis result to the supervisor.
In an alternative embodiment, as shown in fig. 6, the matching module 302 further comprises:
the first query submodule 3021 is configured to, when the number of the keyword is one, match a query result that meets a rule from a preset database based on the keyword; when the keywords are at least two or more, generating a first query algorithm based on the at least two or more keywords; and matching the query result meeting the rule from a preset database based on the first query algorithm.
The second query submodule 3022 is configured to obtain one or more time periods input by a supervisor and/or one or more pieces of location information within the time periods; performing data collision analysis based on one or more location information within the one or more time periods to generate keywords; when the number of the keywords is one, matching a query result meeting a rule from a preset database based on the keywords; when the keywords are at least two or more, generating a second query algorithm based on the at least two or more keywords; and matching the query result meeting the rule from a preset database based on the second query algorithm.
In an alternative embodiment, the target identity information further includes a mobile user identification code and a mobile device identification code of the target user, and the analysis result generating module 303 is further configured to: if the target identity information comprises a mobile user identification code and at least two mobile equipment identification codes, the generated analysis result comprises that the target user replaces the same SIM card to at least two mobile equipment; if the target identity information comprises at least two mobile subscriber identification codes and one mobile equipment identification code, the generated analysis result comprises that the target subscriber uses at least two SIM cards on one mobile equipment.
The communication-based target user tracking system provided by the embodiment of the invention can execute the communication-based target user tracking method provided by any embodiment of the invention, and has corresponding execution methods and beneficial effects of the functional modules.
Example four
The present embodiment provides a schematic structural diagram of a communication-based target user tracking device, as shown in fig. 7, the communication-based target user tracking device includes a processor 401, a memory 402, an input device 403, and an output device 404; the number of the processors 401 in the communication-based target user tracking device may be one or more, and one processor 401 is taken as an example in the figure; the processor 401, memory 402, input means 403 and output means 404 in the device/terminal/communication based target user tracking device may be linked by a bus or other means, in fig. 7 for example by a bus link.
The memory 402, which is a computer-readable storage medium for the communication-based target user tracking method, may be used to store software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the methods in the embodiments of the present invention. The processor 401 executes various functional applications and data processing of the device/terminal/communication-based target user tracking device by running software programs, instructions and modules stored in the memory 402, that is, the method for communication-based target user tracking described above is realized.
The memory 402 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal, and the like. Further, the memory 402 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory 402 may further include memory located remotely from the processor 401, which may be linked to the device/terminal/communication-based target user tracking device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input means 403 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the device/terminal/communication-based target user tracking device. The output device 404 may include a display device such as a display screen.
The embodiment of the invention provides a target user tracking system based on communication, can execute the target user tracking method based on communication provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
EXAMPLE five
An embodiment of the present invention further provides a computer-readable storage medium for a target user tracking method based on communication, where the computer-readable storage medium stores a computer program, and the computer program, when executed by a processor, implements the method for tracking a target user based on communication according to any embodiment of the present invention:
acquiring keywords input by a supervisor, wherein the keywords comprise the time of occurrence of a target user to be queried and/or position information corresponding to the time;
matching a query result meeting a rule from a preset database based on the keyword, wherein the query result comprises target identity information of the target user;
generating an analysis result based on the target identity information;
and sending the query result and the analysis result to the supervisor.
The computer-readable storage media of embodiments of the invention may take any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical link having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a storage medium may be transmitted over any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in a communication-based target user tracking method or in any combination of programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or terminal. In the case of a remote computer, the remote computer may be linked to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the link may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.
Claims (10)
1. A target user tracking method based on communication is characterized by being executed by a server and comprising the following steps:
acquiring keywords input by a supervisor, wherein the keywords comprise the time of occurrence of a target user to be queried and/or position information corresponding to the time;
matching a query result meeting a rule from a preset database based on the keyword, wherein the query result comprises target identity information of the target user;
generating an analysis result based on the target identity information;
and sending the query result and the analysis result to the supervisor.
2. The method of claim 1, wherein the creation of the predetermined database comprises:
acquiring communication information of one or more user terminals from a base station at preset time intervals;
determining a user ID of the user, the time when the user appears and/or position information corresponding to the time based on the communication information;
and storing the user ID of the user, the time when the user appears and/or the position information corresponding to the time into a database.
3. The method of claim 2, wherein the obtaining communication information of the terminals of one or more users from the base station at preset time intervals further comprises:
judging whether the base station is in a preset range or not;
if so, acquiring communication information of the terminals of one or more users from the base station;
and if the communication information is not in the preset range, not acquiring the communication information of the terminal of the user.
4. The method according to claim 1, wherein matching the query result meeting the rule from the preset database based on the keyword further comprises:
when the number of the keywords is one, matching a query result meeting a rule from a preset database based on the keywords;
when the keywords are at least two or more, generating a first query algorithm based on the at least two or more keywords;
and matching the query result meeting the rule from a preset database based on the first query algorithm.
5. The method according to claim 1, wherein matching the query result meeting the rule from the preset database based on the keyword further comprises:
acquiring one or more time periods input by a supervisor and/or one or more position information in the time periods;
performing data collision analysis based on one or more location information within the one or more time periods to generate keywords;
when the number of the keywords is one, matching a query result meeting a rule from a preset database based on the keywords;
when the keywords are at least two or more, generating a second query algorithm based on the at least two or more keywords;
and matching the query result meeting the rule from a preset database based on the second query algorithm.
6. The method of claim 1, wherein the target identity information further includes a mobile subscriber identity and a mobile device identity of the target subscriber, and wherein generating the analysis result based on the target identity information comprises:
if the target identity information comprises a mobile user identification code and at least two mobile equipment identification codes, the generated analysis result comprises that the target user replaces the same SIM card to at least two mobile equipment;
if the target identity information comprises at least two mobile subscriber identification codes and one mobile equipment identification code, the generated analysis result comprises that the target subscriber uses at least two SIM cards on one mobile equipment.
7. A communication-based target user tracking system, comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring keywords input by a supervisor, and the keywords comprise the time of occurrence of a target user to be queried and/or position information corresponding to the time;
the matching module is used for matching a query result meeting the rules from a preset database based on the keywords, and the query result comprises the target identity information of the target user;
the analysis result generation module is used for generating an analysis result based on the target identity information;
and the sending module is used for sending the query result and the analysis result to the supervisor.
8. The system of claim 7, wherein the matching module is further configured to:
when the number of the keywords is one, matching a query result meeting a rule from a preset database based on the keywords;
when the keywords are at least two or more, generating a first query algorithm based on the at least two or more keywords;
and matching the query result meeting the rule from a preset database based on the first query algorithm.
9. A server comprising a memory, a processor, and a program stored on the memory and executable on the processor, wherein the processor when executing the program implements a communication-based target user tracking method according to any one of claims 1 to 6.
10. A terminal readable storage medium, having a program stored thereon, wherein the program, when executed by a processor, is capable of implementing a communication-based target user tracking method according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110006959.6A CN112804647A (en) | 2021-01-05 | 2021-01-05 | Target user tracking method, system, server and storage medium based on communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110006959.6A CN112804647A (en) | 2021-01-05 | 2021-01-05 | Target user tracking method, system, server and storage medium based on communication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112804647A true CN112804647A (en) | 2021-05-14 |
Family
ID=75808193
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110006959.6A Pending CN112804647A (en) | 2021-01-05 | 2021-01-05 | Target user tracking method, system, server and storage medium based on communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112804647A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115662650A (en) * | 2022-09-02 | 2023-01-31 | 深圳市名通科技股份有限公司 | Tight-lock user fishing method based on big data accurate positioning |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006210985A (en) * | 2005-01-25 | 2006-08-10 | Mitsubishi Electric Corp | Wireless communication system and method |
CN101656913A (en) * | 2009-09-23 | 2010-02-24 | 中兴通讯股份有限公司 | Method and system for monitoring analysis based on mobile network |
CN102033918A (en) * | 2010-12-07 | 2011-04-27 | 武汉若鱼网络科技有限公司 | Method and system for searching target user on basis of information of time and position |
CN102521335A (en) * | 2010-11-29 | 2012-06-27 | 微软公司 | Mobile query suggestions with time-location awareness |
CN103841550A (en) * | 2012-11-21 | 2014-06-04 | 中国移动通信集团吉林有限公司 | Method and device for identifying multi-card user |
-
2021
- 2021-01-05 CN CN202110006959.6A patent/CN112804647A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006210985A (en) * | 2005-01-25 | 2006-08-10 | Mitsubishi Electric Corp | Wireless communication system and method |
CN101656913A (en) * | 2009-09-23 | 2010-02-24 | 中兴通讯股份有限公司 | Method and system for monitoring analysis based on mobile network |
CN102521335A (en) * | 2010-11-29 | 2012-06-27 | 微软公司 | Mobile query suggestions with time-location awareness |
CN102033918A (en) * | 2010-12-07 | 2011-04-27 | 武汉若鱼网络科技有限公司 | Method and system for searching target user on basis of information of time and position |
CN103841550A (en) * | 2012-11-21 | 2014-06-04 | 中国移动通信集团吉林有限公司 | Method and device for identifying multi-card user |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115662650A (en) * | 2022-09-02 | 2023-01-31 | 深圳市名通科技股份有限公司 | Tight-lock user fishing method based on big data accurate positioning |
CN115662650B (en) * | 2022-09-02 | 2024-04-26 | 深圳市名通科技股份有限公司 | Close-contact user salvaging method based on big data accurate positioning |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10419458B2 (en) | Distributed techniques for detecting atypical or malicious wireless communications activity | |
CN110312279B (en) | Network data monitoring method and device | |
CN106778253A (en) | Threat context aware information security Initiative Defense model based on big data | |
US9305110B2 (en) | Method and arrangement for supporting analysis of social networks in a communication network | |
US10638270B2 (en) | Location-based wireless tracking | |
US12082074B2 (en) | Alerting users of mobile device using anonymized location and time dataset | |
EP3132592A1 (en) | Method and system for identifying significant locations through data obtainable from a telecommunication network | |
US11394601B1 (en) | Assessing completion of events | |
CN107147521B (en) | Early warning and monitoring method for complaint service | |
CN114726631B (en) | Safety protection method of identification analysis system architecture and related equipment | |
CN109145225B (en) | Data processing method and device | |
CN112711710A (en) | Tracking method, system, server and storage medium for multi-number terminal | |
CN113645287B (en) | Automobile message storage method and device and automobile message storage system | |
CN112804647A (en) | Target user tracking method, system, server and storage medium based on communication | |
CN117271177B (en) | Root cause positioning method and device based on link data, electronic equipment and storage medium | |
Rusca et al. | Privacy‐preserving WiFi‐based crowd monitoring | |
US10111037B1 (en) | System and method for collocation detection | |
CN105205605B (en) | Interactive service system of city intelligent portal terminal and electric power marketing terminal | |
CN111624635A (en) | Positioning method, system, server and storage medium of mobile terminal | |
WO2017020748A1 (en) | Method and device for processing signalling tracking task | |
Corral De Witt | Analysis, Representation and Visualization of Emergencies Attended by Integrated Security Services | |
CN114171172A (en) | System and method for matching and distributing medical information | |
CN104601361B (en) | Power secondary system security event analysis method for non-policy-compliant access | |
CN112817945A (en) | Medical heterogeneous system data warehouse construction method based on ESB | |
Rey et al. | E-Ligtas: a life-saving application using fingerprint biometrics with analysis for the people who are in an emergency |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210514 |