CN115115493A - Risk personnel investigation, prevention and control method and system - Google Patents

Risk personnel investigation, prevention and control method and system Download PDF

Info

Publication number
CN115115493A
CN115115493A CN202211050211.7A CN202211050211A CN115115493A CN 115115493 A CN115115493 A CN 115115493A CN 202211050211 A CN202211050211 A CN 202211050211A CN 115115493 A CN115115493 A CN 115115493A
Authority
CN
China
Prior art keywords
number data
mobile number
base station
health state
certificate information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211050211.7A
Other languages
Chinese (zh)
Inventor
李慧
韩伟
李以斌
张体中
刘孟鑫
李桂林
杜威
王涛
邵海金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taiji Computer Corp Ltd
Original Assignee
Taiji Computer Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taiji Computer Corp Ltd filed Critical Taiji Computer Corp Ltd
Priority to CN202211050211.7A priority Critical patent/CN115115493A/en
Publication of CN115115493A publication Critical patent/CN115115493A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H50/00ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
    • G16H50/80ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for detecting, monitoring or modelling epidemics or pandemics, e.g. flu
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes

Landscapes

  • Health & Medical Sciences (AREA)
  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Public Health (AREA)
  • Primary Health Care (AREA)
  • Medical Informatics (AREA)
  • Tourism & Hospitality (AREA)
  • General Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Biomedical Technology (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Educational Administration (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Development Economics (AREA)
  • Pathology (AREA)
  • Epidemiology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to a method and a system for troubleshooting, prevention and control of risk personnel, wherein the method comprises the following steps: and receiving mobile number data transmitted by the base station, matching certificate information corresponding to the mobile number data, determining health state information corresponding to the certificate information, and feeding back the health state information to the base station. The mobile number data received in the application is acquired by the base station on the mobile terminal within the range, namely when the mobile terminal carried by the person to be inspected enters the scanning range of the base station, the base station automatically acquires the mobile number data on the mobile terminal carried by the person to be inspected.

Description

Risk personnel investigation, prevention and control method and system
Technical Field
The application relates to the technical field of risk prevention and control, in particular to a method and a system for troubleshooting, prevention and control of risk personnel.
Background
Health codes gradually become the most widely used means for proving health state information of people, health code check points are set in various large places such as shopping malls, hotels, schools, hospitals and the like, people entering and exiting are checked and controlled in a mode of manually checking the health codes, however, careless mistakes easily occur in the manual checking mode, for example, risk people cheat the auditors to enter and exit the large places in a mode of historical health code screenshots or crowd mixing and the like, and further risk conditions are caused.
Disclosure of Invention
In order to overcome the problem that careless mistakes are easy to occur in manual health code checking in the related art at least to a certain extent, the application provides a risk personnel troubleshooting prevention and control method and system.
The scheme of the application is as follows:
according to a first aspect of the embodiments of the present application, there is provided a method for troubleshooting, prevention and control of a risk person, including:
receiving mobile number data transmitted by a base station; the mobile number data is obtained by the base station on the mobile terminal within the range;
matching certificate information corresponding to the mobile number data;
determining health state information corresponding to the certificate information;
and feeding back the health state information to the base station.
Preferably, the method further comprises the following steps:
acquiring mobile number data and all certificate information of a user;
and binding the mobile number data of the user with all certificate information and storing the mobile number data and all certificate information.
Preferably, the method further comprises the following steps:
and if the mobile number data is encrypted, decrypting the mobile number data when receiving the mobile number data.
Preferably, before feeding back the health status information to the base station, the method further includes:
and encrypting the health status information.
Preferably, the determining the health status information corresponding to the certificate information includes:
and if the certificate information is multiple, determining the health state information corresponding to each certificate information, and integrating the health state information corresponding to each certificate information.
Preferably, the mobile number data is transmitted by the base station which has been authenticated.
Preferably, the receiving the mobile number data transmitted by the base station includes: receiving mobile number data in a simple value form transmitted by a base station;
before encrypting the health status information, the method further includes:
and packaging the health state information into a simple value form.
According to a second aspect of the embodiments of the present application, there is provided a risk personnel troubleshooting prevention and control system, including:
the system comprises a base station, a gateway, a server cluster and a database cluster;
the base station is used for acquiring mobile number data of a mobile terminal within a range and transmitting the mobile number data to the gateway;
the gateway is used for transmitting the mobile number data to the server cluster;
the server cluster is used for matching certificate information corresponding to the mobile number data through the database cluster, determining health state information corresponding to the certificate information, and feeding back the health state information to the base station.
Preferably, the gateway is further configured to perform authentication verification on the base station; if the authentication is passed, receiving mobile number data transmitted by the base station; if the authentication is not passed, intercepting the mobile number data transmitted by the base station;
the gateway is also used for encrypting the mobile number data and packaging the encrypted mobile number data into a simple value form;
the server cluster is further used for encrypting the health state information and packaging the encrypted health state information into a simple value form.
Preferably, the server cluster includes: a balancing load and a plurality of application servers;
the database clusters comprise a first database cluster and a second database cluster, and the first database cluster and the second database cluster respectively comprise a plurality of groups of master-slave databases;
each application server is mounted on the balanced load and connected with the first database cluster and the second database cluster;
the balance load is used for distributing the mobile number data transmitted by the gateway to each application server;
the application server is used for matching certificate information corresponding to the mobile number data in the first database cluster, and determining health state information corresponding to the certificate information in the second database cluster.
The technical scheme provided by the application can comprise the following beneficial effects: the method for troubleshooting, prevention and control of the risk personnel comprises the following steps: and receiving mobile number data transmitted by the base station, matching certificate information corresponding to the mobile number data, determining health state information corresponding to the certificate information, and feeding back the health state information to the base station. The mobile number data received in the application is acquired by the base station on the mobile terminal within the range, namely when the mobile terminal carried by the person to be inspected enters the scanning range of the base station, the base station automatically acquires the mobile number data on the mobile terminal carried by the person to be inspected.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic flowchart of a method for troubleshooting, prevention and control of risk personnel according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a method for troubleshooting, prevention and control of a risk person according to another embodiment of the present application;
FIG. 3 is a schematic block diagram of an exemplary embodiment of an at risk personnel troubleshooting prevention and control system provided in the present application;
fig. 4 is a schematic block diagram of a system for troubleshooting, prevention and control of risk personnel according to another embodiment of the application.
Reference numerals are as follows: a base station-21; a gateway-22; server cluster-23; database cluster-24.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
Example one
Fig. 1 is a schematic flow chart of a method for troubleshooting, prevention and control of a risk person according to an embodiment of the present application, and referring to fig. 1, the method for troubleshooting, prevention and control of a risk person includes:
s11: receiving mobile number data transmitted by a base station; the mobile number data is obtained by the base station on the mobile terminal within the range;
s12: matching certificate information corresponding to the mobile number data;
s13: determining health state information corresponding to certificate information;
s14: and feeding back the health state information to the base station.
It should be noted that the method for troubleshooting, prevention and control of risk personnel in this embodiment may be applied to troubleshooting, prevention and control of risk personnel in epidemic prevention.
It should be noted that, in modern society, a mobile phone has become an indispensable electronic device in people's life, and especially in the peak period of risk investigation prevention and control, no mobile phone is often "difficult to walk" in a small amount. Therefore, the health state information of the personnel to be checked is determined by acquiring the mobile number data of the personnel to be checked, and the method and the device are more convenient and quicker.
The base station can acquire the subscriber identity card information of the digital cellular phone under the corresponding operator flag, thereby acquiring the mobile number data of the subscriber. In a specific practice, the base station may be a joint base station formed by three operators (i.e., mobile, telecommunication and Unicom), and such a joint base station may acquire mobile number data on any mobile terminal. Preferably, the base station is set up in large places such as shopping malls, hotels, schools, hospitals, etc., the effective acquisition range of the base station is generally 10m in diameter, and the base station can basically cover the entrances and exits of the large places such as shopping malls, hotels, schools, hospitals, etc.
It should be noted that, before implementation, the technical solution in this embodiment needs to acquire mobile number data and all certificate information of the user; and binding the mobile number data of the user with all certificate information and storing the mobile number data and all certificate information.
All credential information typically includes the user's identification card information, military officer credential information, and the like. If the user only has the identity card information, only the mobile number data of the user and the identity card information of the user are bound.
Generally, the corresponding certificate information matched with the mobile number data is the identity card information bound in advance by the personnel to be checked. And if only the identity card information of the personnel to be checked is matched, determining the corresponding health state information according to the identity card information of the personnel to be checked. And if the certificate information is multiple, determining the health state information corresponding to each certificate information, and integrating the health state information corresponding to each certificate information.
It should be noted that the health status information may be health code information, such as green code, yellow code, and red code status information.
S14: and feeding back the health state information to the base station.
It can be understood that the method for troubleshooting, prevention and control of risk personnel in this embodiment includes: and receiving mobile number data transmitted by the base station, matching certificate information corresponding to the mobile number data, determining health state information corresponding to the certificate information, and feeding back the health state information to the base station. In this embodiment, the received mobile number data is obtained by the base station on the mobile terminal within the range, that is, when the mobile terminal carried by the person to be inspected enters the scanning range of the base station, the base station automatically obtains the mobile number data on the mobile terminal carried by the person to be inspected, because the basic information of each person in the current society is mutually bound, the health status information of the person to be inspected can be determined according to the mobile number data of the person to be inspected, and the health status information of the person to be inspected is fed back to the base station, so that the base station automatically completes the health audit of the person to be inspected, and the problem of easy occurrence of careless mistakes in manual audit is avoided.
Example two
The method for troubleshooting, preventing and controlling risk personnel in this embodiment further includes:
if the mobile number data is encrypted, the mobile number data is decrypted when the mobile number data is received.
Referring to fig. 2, before the health status information is fed back to the base station, the method further includes:
the health status information is encrypted.
It can be understood that, in this embodiment, in order to ensure the security of the data, the transmitted data is encrypted during the bidirectional transmission of the data (i.e. receiving the mobile number data transmitted by the base station and feeding back the health status information to the base station). In particular practice, encryption may be performed by sm2 cryptographic symmetric encryption. It is necessary to decrypt the encrypted mobile number data when the mobile number data is received. Similarly, the base station also needs to decrypt the encrypted health status information when receiving the feedback health status information.
It should be noted that the mobile number data is transmitted by the base station with authentication verification.
In the embodiment, the base station is also authenticated, and in specific practice, the authentication can be used for judging the login state of the base station, and when the base station logs in, the authentication of the base station passes and the mobile number data transmitted by the base station is received; if the base station is not logged in, the authentication check of the base station is not passed, and the mobile number data transmitted by the base station is intercepted.
It should be noted that, the receiving of the mobile number data transmitted by the base station includes: receiving mobile number data in a simple value form transmitted by a base station;
before encrypting the health status information, the method further comprises:
the health status information is packaged into a simple value form.
It can be understood that, in order to ensure the transmission efficiency of data in this embodiment, the transmitted data is encapsulated during the bidirectional transmission of data (i.e., receiving the mobile number data transmitted by the base station and feeding back the health status information to the base station). In particular practice, the transmitted data may be encapsulated in json format (simple value form) to facilitate transmission of the data.
EXAMPLE III
Fig. 3 is a schematic block diagram of an at risk person troubleshooting prevention and control system according to an embodiment of the present application, and referring to fig. 3, the at risk person troubleshooting prevention and control system includes:
a base station 21, a gateway 22, a server cluster 23 and a database cluster 24;
the base station 21 is configured to obtain mobile number data of a mobile terminal within a range, and transmit the mobile number data to the gateway 22;
the gateway 22 is used for transmitting the mobile number data to the server cluster 23;
the server cluster 23 is configured to match certificate information corresponding to the mobile number data through the database cluster 24, determine health status information corresponding to the certificate information, and feed back the health status information to the base station 21.
It can be understood that the system for troubleshooting, prevention and control of risk personnel in the embodiment includes: a base station 21, a gateway 22, a server cluster 23 and a database cluster 24; the base station 21 is configured to obtain mobile number data of a mobile terminal within a range, and transmit the mobile number data to the gateway 22; the gateway 22 is used for transmitting the mobile number data to the server cluster 23; the server cluster 23 is configured to match certificate information corresponding to the mobile number data through the database cluster 24, determine health status information corresponding to the certificate information, and feed back the health status information to the base station 21. In this embodiment, the mobile number data is obtained by the base station 21 on a mobile terminal within a range, that is, when the mobile terminal carried by the person to be inspected enters a scanning range of the base station 21, the base station 21 automatically obtains the mobile number data on the mobile terminal carried by the person to be inspected, because the basic information of each person in the current society is mutually bound, in this embodiment, the health status information of the person to be inspected can be determined by the mobile number data of the person to be inspected, and the health status information of the person to be inspected is fed back to the base station 21, so that the base station 21 automatically completes the health audit of the person to be inspected, thereby avoiding the problem that manual audit is easy to occur careless and overlook.
It should be noted that the gateway 22 is also used for performing authentication verification on the base station 21; if the authentication is passed, receiving the mobile number data transmitted by the base station 21; if the authentication is not passed, intercepting the mobile number data transmitted by the base station 21;
the gateway 22 is further configured to encrypt the mobile number data and encapsulate the encrypted mobile number data into a simple value form;
the server cluster 23 is further configured to encrypt the health status information and encapsulate the encrypted health status information into a simple value form.
It is understood that, in the present embodiment, in order to ensure the security of the data, the transmitted data is encrypted during the bidirectional transmission of the data (i.e. receiving the mobile number data transmitted by the base station 21 and feeding back the health status information to the base station 21). In particular practice, encryption may be performed by sm2 cryptographic symmetric encryption. It is necessary to decrypt the encrypted mobile number data when the mobile number data is received. Similarly, the base station 21 also needs to decrypt the encrypted health status information when receiving the feedback health status information.
It can be understood that, in order to guarantee the transmission efficiency of the data in the present embodiment, the transmitted data is encapsulated during the bidirectional transmission of the data (i.e. receiving the mobile number data transmitted by the base station 21 and feeding back the health status information to the base station 21). In particular practice, the transmitted data may be encapsulated in json format (simple value form) to facilitate the transmission of the data.
Referring to fig. 4, in the risk personnel troubleshooting prevention and control system in this embodiment, the server cluster 23 includes: a balancing load and a plurality of application servers;
the database cluster 24 comprises a first database cluster 24 and a second database cluster 24, and the first database cluster 24 and the second database cluster 24 both comprise a plurality of groups of master-slave databases;
each application server is mounted on the balanced load, and each application server is connected with the first database cluster 24 and the second database cluster 24;
the balanced load is used for distributing the mobile number data transmitted by the gateway 22 to each application server;
the application server is used for matching certificate information corresponding to the mobile number data in the first database cluster 24, and determining health status information corresponding to the certificate information in the second database cluster 24.
It is understood that the server cluster 23 in this embodiment includes: a balancing load and a plurality of application servers. The application servers adopt a cluster mode, are distributed by balanced load, and can still ensure that other application servers still provide services when a certain application server fails. In a specific practice, the F5 load is selected for balanced load, and 15 application servers are selected for application servers.
It is to be understood that the database cluster 24 includes a first database cluster 24 and a second database cluster 24, each of the first database cluster 24 and the second database cluster 24 including multiple sets of master-slave databases therein. Preferably, the database cluster 24 is deployed by using a distributed database redis cluster, which has the advantages of large data interface, high concurrent throughput, and millisecond-level response request each time, so that the application server can be ensured to match certificate information corresponding to the mobile number data in the first database cluster 24, and the request can be quickly responded when the second database cluster 24 determines health state information corresponding to the certificate information, thereby ensuring timeliness and stability of the data. A database in the form of a cluster may also ensure high availability of data when stored. And, the two database clusters 24 are used to perform different tasks, and the processing speed is faster. In particular practice, the first database cluster 24 and the second database cluster 24 each include 3 sets of master-slave databases.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried out in the method of implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and the program, when executed, includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (10)

1. A method for troubleshooting, prevention and control of risk personnel is characterized by comprising the following steps:
receiving mobile number data transmitted by a base station; the mobile number data is obtained by a base station on a mobile terminal within the range;
matching certificate information corresponding to the mobile number data;
determining health state information corresponding to the certificate information;
and feeding back the health state information to the base station.
2. The method of claim 1, further comprising:
acquiring mobile number data and all certificate information of a user;
and binding the mobile number data of the user with all certificate information and storing the mobile number data and all certificate information.
3. The method of claim 1, further comprising:
and if the mobile number data is encrypted, decrypting the mobile number data when receiving the mobile number data.
4. The method according to any of claims 1-3, wherein before feeding back the health status information to the base station, the method further comprises:
and encrypting the health status information.
5. The method of claim 1, wherein the determining the health status information corresponding to the credential information comprises:
and if the certificate information is multiple, determining the health state information corresponding to each certificate information, and integrating the health state information corresponding to each certificate information.
6. The method of claim 1, wherein the mobile number data is transmitted by an authentication-verified base station.
7. The method of claim 4, wherein the receiving the mobile number data transmitted by the base station comprises: receiving mobile number data in a simple value form transmitted by a base station;
before encrypting the health status information, the method further includes:
and packaging the health state information into a simple value form.
8. An investigation prevention and control system for risk personnel, comprising:
the system comprises a base station, a gateway, a server cluster and a database cluster;
the base station is used for acquiring mobile number data of a mobile terminal within a range and transmitting the mobile number data to the gateway;
the gateway is used for transmitting the mobile number data to the server cluster;
the server cluster is used for matching certificate information corresponding to the mobile number data through the database cluster, determining health state information corresponding to the certificate information, and feeding back the health state information to the base station.
9. The system of claim 8, wherein the gateway is further configured to perform an authentication check on the base station; if the authentication is passed, receiving mobile number data transmitted by the base station; if the authentication is not passed, intercepting the mobile number data transmitted by the base station;
the gateway is also used for encrypting the mobile number data and packaging the encrypted mobile number data into a simple value form;
the server cluster is also used for encrypting the health state information and packaging the encrypted health state information into a simple value form.
10. The system of claim 8, wherein the cluster of servers comprises: a balancing load and a plurality of application servers;
the database clusters comprise a first database cluster and a second database cluster, and the first database cluster and the second database cluster respectively comprise a plurality of groups of master-slave databases;
each application server is mounted on the balanced load and connected with the first database cluster and the second database cluster;
the balance load is used for distributing the mobile number data transmitted by the gateway to each application server;
the application server is used for matching certificate information corresponding to the mobile number data in the first database cluster, and determining health state information corresponding to the certificate information in the second database cluster.
CN202211050211.7A 2022-08-31 2022-08-31 Risk personnel investigation, prevention and control method and system Pending CN115115493A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211050211.7A CN115115493A (en) 2022-08-31 2022-08-31 Risk personnel investigation, prevention and control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211050211.7A CN115115493A (en) 2022-08-31 2022-08-31 Risk personnel investigation, prevention and control method and system

Publications (1)

Publication Number Publication Date
CN115115493A true CN115115493A (en) 2022-09-27

Family

ID=83335496

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211050211.7A Pending CN115115493A (en) 2022-08-31 2022-08-31 Risk personnel investigation, prevention and control method and system

Country Status (1)

Country Link
CN (1) CN115115493A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1763759A (en) * 2004-10-22 2006-04-26 乐金电子(中国)研究开发中心有限公司 Personal health management service method and system
CN105893775A (en) * 2016-04-26 2016-08-24 深圳市柯林健康医疗有限公司 Device and method for configuring mobile monitoring big data
CN106686529A (en) * 2016-12-20 2017-05-17 杭州碧海银帆科技有限公司 Children's health data acquiring and analyzing system and method based on Bluetooth positioning
CN107230348A (en) * 2017-07-21 2017-10-03 李映辉 A kind of pedestrians disobeying traffic rule monitoring system, method and apparatus
US20200008029A1 (en) * 2018-06-29 2020-01-02 Citrix Systems, Inc. Use of Identity Data Associated with a Device for Directing Communications to Another Device
CN112651867A (en) * 2021-01-05 2021-04-13 安徽方正北斗电子科技有限公司 Big data-based smart campus management method and system
CN114403822A (en) * 2022-01-19 2022-04-29 中国人民解放军海军特色医学中心 Ship navigation personnel information interaction system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1763759A (en) * 2004-10-22 2006-04-26 乐金电子(中国)研究开发中心有限公司 Personal health management service method and system
CN105893775A (en) * 2016-04-26 2016-08-24 深圳市柯林健康医疗有限公司 Device and method for configuring mobile monitoring big data
CN106686529A (en) * 2016-12-20 2017-05-17 杭州碧海银帆科技有限公司 Children's health data acquiring and analyzing system and method based on Bluetooth positioning
CN107230348A (en) * 2017-07-21 2017-10-03 李映辉 A kind of pedestrians disobeying traffic rule monitoring system, method and apparatus
US20200008029A1 (en) * 2018-06-29 2020-01-02 Citrix Systems, Inc. Use of Identity Data Associated with a Device for Directing Communications to Another Device
CN112651867A (en) * 2021-01-05 2021-04-13 安徽方正北斗电子科技有限公司 Big data-based smart campus management method and system
CN114403822A (en) * 2022-01-19 2022-04-29 中国人民解放军海军特色医学中心 Ship navigation personnel information interaction system

Similar Documents

Publication Publication Date Title
CN106789841B (en) Service processing method, terminal, server and system
CN104378342B (en) Many accounts verification method, Apparatus and system
CN106209726B (en) Mobile application single sign-on method and device
CN110730153A (en) Account configuration method, device and system of cloud equipment and data processing method
CN105191208B (en) Method for activating the application program on user apparatus
CN112948802B (en) Single sign-on method, device, equipment and storage medium
CN110493184A (en) The processing method of login page, device, electronic device in the client
CN102143492B (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN104247485A (en) Network application function authorisation in a generic bootstrapping architecture
CN108418679B (en) Method and device for processing secret key under multiple data centers and electronic equipment
CN111737681A (en) Resource acquisition method and device, storage medium and electronic device
CN111865897A (en) Cloud service management method and device
CN111639369A (en) Data sharing method, device, storage medium and data sharing system
US20220408252A1 (en) Method for authenticating a user on a network slice
US8995992B1 (en) Method and system for secure mobile device number lookup and modification
CN106911659A (en) One seed account information processing system, method and device
CN105187417A (en) Authority obtaining method and device
CN115115493A (en) Risk personnel investigation, prevention and control method and system
CN113922952B (en) Access request response method, device, computer equipment and storage medium
EP2677791B1 (en) Method and device for transferring a test request to an identification module
CN104753927A (en) Unified verification method and device
CN115174645A (en) Automobile OTA (over the air) vehicle cloud interaction method and system
CN114928834B (en) Method for downloading user identification card profile of communication module, device, equipment and medium thereof
CN110049457A (en) The complaining method and system of short multimedia message, terminal
CN117349822B (en) Data processing method, device, computer equipment, storage medium and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220927

RJ01 Rejection of invention patent application after publication