CN115243246B - Safety alarm system based on big data informatization - Google Patents

Safety alarm system based on big data informatization Download PDF

Info

Publication number
CN115243246B
CN115243246B CN202210896412.2A CN202210896412A CN115243246B CN 115243246 B CN115243246 B CN 115243246B CN 202210896412 A CN202210896412 A CN 202210896412A CN 115243246 B CN115243246 B CN 115243246B
Authority
CN
China
Prior art keywords
module
alarm
information
unit
transmission unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210896412.2A
Other languages
Chinese (zh)
Other versions
CN115243246A (en
Inventor
梁后健
刘大方
张课
李孝天
李一鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaibei Power Supply Co of State Grid Anhui Electric Power Co Ltd
Original Assignee
Huaibei Power Supply Co of State Grid Anhui Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaibei Power Supply Co of State Grid Anhui Electric Power Co Ltd filed Critical Huaibei Power Supply Co of State Grid Anhui Electric Power Co Ltd
Priority to CN202210896412.2A priority Critical patent/CN115243246B/en
Publication of CN115243246A publication Critical patent/CN115243246A/en
Application granted granted Critical
Publication of CN115243246B publication Critical patent/CN115243246B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Signal Processing (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Environmental & Geological Engineering (AREA)
  • Emergency Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Public Health (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of big data information security, in particular to a security alarm system based on big data informatization, which comprises: an analog end; the analog terminal takes electronic equipment as a carrier, such as a mobile phone; can connect with public WiFi; an alarm terminal; the alarm terminal takes electronic equipment as a carrier, such as a computer; the alarm terminal is connected with the analog terminal and can transmit data; the alarm terminal comprises: an alarm module; the alarm module is arranged on the security system; a first transmission unit; the first transmission unit can acquire data information from the analog end; the first transmission unit is capable of transmitting data information to the alarm module: according to the invention, the simulation end serves as a bait for lawbreakers and is matched with the alarm end for anti-pursuit, so that the information safety of people is greatly ensured, and unnecessary property loss of people due to information leakage is reduced.

Description

Safety alarm system based on big data informatization
Technical Field
The invention relates to the technical field of big data information security, in particular to a security alarm system based on big data informatization.
Background
Big data, which means that the data quantity is huge and can not be retrieved, managed, processed and arranged into more positive information for helping business operation decision in a reasonable time through a main stream software tool; the method is widely applied to the fields of BI, industry 4.0, cloud computing, internet of things, internet+ and the like; personal information includes family, education and medical treatment, and each item is particularly important for us, and we are in a big data informatization age, and information leakage can be caused by slight carelessness, and the information leakage can cause personal information to be utilized by lawbreakers, so that some irrecoverable losses are caused.
The most common activities in life that are prone to reveal personal privacy are: various payment documents, identity card copies, filling in questionnaires, photographing friends around, connecting public networks, installing virus APP and the like, a plurality of people are used to connect public WiFi when going out, some lawbreakers realize information extraction through mobile phones connected with WiFi, the lawbreakers then carry out buying and selling transactions on the extracted information or carry out fraud and the like through the information, for example, carrying out fraud through photograph halving, carrying out theft funds through payment passwords and the like, and the problems are fully solved.
In view of the above, the present invention accordingly provides a security alarm system based on big data informatization, which solves the above technical problems.
Disclosure of Invention
In order to make up the defects of the prior art, the invention provides the informationized safety alarm system based on big data, which takes an illegal molecule as a bait through an analog terminal and then is matched with an alarm terminal to implement anti-pursuit, thereby greatly guaranteeing the information safety of people and further reducing unnecessary property loss of people caused by information leakage.
The invention relates to a safety alarm system based on big data informatization, which comprises:
an analog end; the analog terminal takes electronic equipment as a carrier, such as a mobile phone; can connect with public WiFi;
an alarm terminal; the alarm terminal takes electronic equipment as a carrier, such as a computer; the alarm terminal is connected with the analog terminal and can transmit data;
the alarm terminal comprises:
an alarm module; the alarm module is arranged on the security system;
a first transmission unit; the first transmission unit can acquire data information from the analog end; the first transmission unit can transmit data information to the alarm module.
Preferably, the analog end includes:
a second transmission unit; the second transmission unit is connected with the first transmission unit through a network and is used for carrying out data transmission; the second transmission unit can be connected with other electronic equipment through WiFi;
a virtual module; the virtual module takes the electronic equipment as a carrier, and the triggering priority is higher than that of the original system of the electronic equipment; the virtual module has a basic configuration function of the electronic equipment; such as telephone, short message, network, storage album, etc.; the virtual module can transmit the data information to the second transmission unit;
a message editing module; the compiling module can automatically generate codes and automatically compile data information according to the needs; the compiling module can cover the compiled data to the virtual module.
Preferably, the analog end further comprises an identification module; the identification module comprises a storage unit, an extraction unit and a comparison file; the virtual module backs up data to a storage unit in the identification module; the extraction unit is used for extracting character keyword information in voices, characters and pictures of illegal molecule power-back; the comparison unit is used for comparing the information extracted by the extraction unit with the information stored by the storage unit to obtain a similar value; the comparison unit packages data information with the similarity value larger than a threshold value and sends the data information to the alarm terminal through the second transmission unit; the threshold value of the similarity value is 80%.
Preferably, the virtual module automatically downloads audio data after the analog end is connected with the public WiFi; the downloaded audio data comprises high definition or blue light video and the like; during operation, through the big file of simulation end to make the simulation end on the inspector's hand occupy great net speed, thereby make other cell-phones net speed under the same public wiFi reduce, thereby make lawless persons pass through public wiFi and connect the channel of the simulation end on the inspector's hand wider.
Preferably, the virtual module sets a periodic automatic deleting program for the downloaded audio data; the automatic deleting program is triggered by address change of the public WiFi.
Preferably, a positioning unit is attached to the virtual module; the positioning unit sends the position information to the first transmission unit through the second transmission unit, and the alarm module realizes distance control.
Preferably, the data information compiled or encoded by the compiling module is random.
Preferably, the alarm module comprises an alarm unit, a tracking unit and a deployment unit; the alarm unit is used for acquiring the data information of the first transmission unit and implementing alarm prompt; the tracking unit is used for acquiring the position information of the lawless persons; the allocation unit is used for embellishing the position information of the lawless persons on the display screen in the form of an electronic map.
The beneficial effects of the invention are as follows:
according to the invention, the simulation end serves as a bait for lawbreakers and is matched with the alarm end for anti-pursuit, so that the information safety of people is greatly ensured, and unnecessary property loss of people due to information leakage is reduced.
According to the invention, the extraction unit is used for extracting data information such as characters, pictures and sounds, the extraction mode is keyword extraction, the comparison unit is used for comparing the data information extracted by the extraction unit with the data information in the storage unit, when the similarity of the comparison result is more than eighty percent, the second transmission unit is triggered to automatically transmit the comparison result of the comparison unit to the first transmission unit, so that the alarm module can timely acquire fraud data information, further work is facilitated, the alarm time can be greatly saved, and the efficiency of information security maintenance personnel in countering lawbreakers is greatly improved.
According to the invention, the simulation end on the inspector hand occupies larger network speed through the large file of the simulation end, so that the network speed of other mobile phones under the same public WiFi is reduced, the channel of lawless persons connected with the simulation end on the inspector hand through the public WiFi is wider, and the behavior of illegal information security is better subjected to sanctions.
Drawings
The invention will be further described with reference to the drawings and embodiments.
FIG. 1 is a block flow diagram of a system of the present invention;
Detailed Description
The invention is further described in connection with the following detailed description in order to make the technical means, the creation characteristics, the achievement of the purpose and the effect of the invention easy to understand.
As shown in fig. 1, the big data based informationized security alarm system of the present invention comprises:
an analog end; the analog terminal takes electronic equipment as a carrier, such as a mobile phone; can connect with public WiFi;
an alarm terminal; the alarm terminal takes electronic equipment as a carrier, such as a computer; the alarm terminal is connected with the analog terminal and can transmit data;
the alarm terminal comprises:
an alarm module; the alarm module is arranged on the security system;
a first transmission unit; the first transmission unit can acquire data information from the analog end; the first transmission unit can transmit data information to the alarm module;
during work, a plurality of people are used to connect public WiFi when going out, and some lawbreakers realize information extraction through the mobile phone connected with WiFi, and the lawbreakers then carry out buying and selling transactions on the extracted information or carry out fraud through the information, such as carrying out fraud through photo luxury, and then carry out theft funds through payment passwords, so that the method is full of danger and can seriously cause some irrecoverable losses;
therefore, for convenience of description, we refer to these people as "inspectors" by first downloading the simulation end in the system on the mobile phone of the inspector, after downloading the simulation end, starting the simulation end, the simulation end will cover the original system and simulate the virtual system, the virtual system is equivalent to the "virtual machine" in the prior art, the virtual machine under the simulation end is also equipped with matched software and local basic configuration facilities, and after the simulation end is installed on the mobile phone of the inspector, the simulation end will simulate the academic information, family information, telephone number, bank card number, photo, etc. in one piece of personal information; a WiFi option card of the simulation end is opened immediately, an inspector can stay and observe the simulation end in a street, a mall, and the like, and stay in a certain place through the inspector, so that public WiFi in the place captures signals on the simulation end of a mobile phone of the inspector, the simulation end is connected with the public WiFi, if an illegal molecule benefits from the simulation end, information on the simulation end is stolen through the connected WiFi, the simulation end imitates the information by itself, the illegal molecule is assumed to implement telephone fraud or photo halving through the acquired information, the illegal molecule is connected with the simulation end on the inspector in a telephone, weChat and short message mode, verification information can be stolen at the moment, the situation can be reflected to a first transmission unit on the alarm end through the simulation end, the first transmission unit transmits data information to an alarm module, and relevant personnel responsible for information fraud or information security can cut the illegal molecule;
according to the invention, the simulation end serves as a bait for lawbreakers and is matched with the alarm end for anti-pursuit, so that the information safety of people is greatly ensured, and unnecessary property loss of people due to information leakage is reduced.
As an embodiment of the present invention, the analog terminal includes:
a second transmission unit; the second transmission unit is connected with the first transmission unit through a network and is used for carrying out data transmission; the second transmission unit can be connected with other electronic equipment through WiFi;
a virtual module; the virtual module takes the electronic equipment as a carrier, and the triggering priority is higher than that of the original system of the electronic equipment; the virtual module has a basic configuration function of the electronic equipment; such as telephone, short message, network, storage album, etc.; the virtual module can transmit the data information to the second transmission unit;
a message editing module; the compiling module can automatically generate codes and automatically compile data information according to the needs; the compiling module can cover the compiled data to the virtual module;
when the system is used, after an inspector downloads the analog end of the system, the compiling module starts compiling and encoding, the encoded content comprises personal information, family information and the like (described above), then the compiling module transmits the personal information and family information to the virtual module in a data mode, the virtual module can decompose the data information into a corresponding storage space after receiving the data information, the virtual module covers the content of the original system, when the inspector holds the analog end to stay randomly in a place with public WiFi, the second transmission unit is connected with the public WiFi, lawless persons can take channels through the public WiFi, then the personal information on the virtual module is stolen along the second transmission unit, the system also has a step of releasing 'bait', when the lawless persons take money from banks through telephones and short messages, the analog end of the inspector can know at first time and transmit the information to the first transmission unit through the second transmission unit, and finally the alarm module acquires the content of the first transmission unit, and the alarm end is installed on a working personnel with public information safety management, so that the position of the personal information on the virtual module can not be hit by a computer, and the position of the personal information on the personal can not be accurately obtained by a mobile phone, and the position of the personal information on the personal can not be hit by a mobile phone or a mobile phone can not be accurately located by a method.
As an embodiment of the present invention, the analog end further includes an identification module; the identification module comprises a storage unit, an extraction unit and a comparison file; the virtual module backs up data to a storage unit in the identification module; the extraction unit is used for extracting character keyword information in voices, characters and pictures of illegal molecule power-back; the comparison unit is used for comparing the information extracted by the extraction unit with the information stored by the storage unit to obtain a similar value; the comparison unit packages data information with the similarity value larger than a threshold value and sends the data information to the alarm terminal through the second transmission unit; the threshold value of the similarity value is 80%; when the intelligent information processing system works, after information input of the message editing module is carried out, the virtual module can back up the information to the storage module in the identification module, on one hand, the information on the virtual module is prevented from being damaged by lawless persons, on the other hand, data loss is prevented from being unable to be recovered, judgment of later lawless persons for returning electricity is affected, the storage unit can provide data recovery for data damage in the virtual module, the extraction unit is triggered under the condition that lawless persons return electricity or return information, the extraction unit extracts data information such as characters, pictures and sounds, the extraction mode is keyword extraction, the comparison unit compares the data information extracted by the extraction unit with the data information in the storage unit, when the similarity of the comparison result is more than eighty percent, the second transmission unit is triggered to automatically send the comparison result of the comparison unit to the first transmission unit, so that the data information of fraud is timely obtained by the alarm module, further work is facilitated, the alarm time can be greatly saved, and the efficiency of countering the lawless persons by the information security maintainer is greatly improved.
As an implementation mode of the invention, the virtual module automatically downloads audio data after the analog end is connected with the public WiFi; the downloaded audio data comprises high definition or blue light video and the like; during operation, through the big file of simulation end to make the simulation end on the inspector's hand occupy great net speed, thereby make other cell-phones net speeds under the same public wiFi reduce, thereby make lawless persons pass through public wiFi and connect the channel of the simulation end on the inspector's hand wider, make better act implementation sanction to illegal information security.
As one embodiment of the present invention, the virtual module sets a periodic automatic deletion program for downloaded audio data; the automatic deleting program is triggered by address change of the public WiFi; during operation, along with the downloading of audio data, the virtual module must make a larger memory for audio data storage, and the virtual module can be caused to operate in a clamping condition, and through an automatic deleting program, after the audio data is tested, namely after leaving the original public WiFi, the automatic deleting program can be triggered through address change or disconnection of the public WiFi, so that the deleted audio data does not occupy too much space of the virtual module, the virtual module operates more smoothly, and the stability of an inspector at a using simulation end is ensured.
As one embodiment of the present invention, the virtual module is attached with a positioning unit; the positioning unit sends the position information to the first transmission unit through the second transmission unit, and the alarm module realizes distance control; during operation, through the position information of the simulation end on each inspector hand, the position information is transmitted to the first transmission unit through the second transmission unit, and the alarm module can set a part for the movable range of each inspector to be crossed, or not crossed, or in a full-crossing mode, the investigation efficiency of the inspector can be improved, the investigation accuracy of the inspector to public WiFi safety can be improved through the crossed movable range, and the accuracy can be controlled.
As one embodiment of the present invention, the data information compiled or encoded by the compiling module is random; during operation, the personal information on the virtual module is randomly encoded and compiled, so that the probability of the same personal information of each inspector is reduced, the same personal information is prevented from setting up anti-reconnaissance consciousness for lawbreakers, and the field of vision of the lawbreakers is blurred.
As one embodiment of the present invention, the alarm module includes an alarm unit, a tracking unit, and a deployment unit; the alarm unit is used for acquiring the data information of the first transmission unit and implementing alarm prompt; the tracking unit is used for acquiring the position information of the lawless persons; the allocation unit is used for embellishing the position information of the lawless persons on the display screen in the form of an electronic map; when the system works, the alarm unit is used for acquiring the data information of the first transmission unit to implement alarm prompt, providing support for relevant information security workers, the tracking unit is connected with the world wide web system and is also connected with the mobile phone SIM positioning and identifying system, so that the position of an illegal molecule is captured through cellular signals transmitted by the base station, and meanwhile, the relevant information security workers can quickly capture the position information of the illegal molecule through the world wide web cooperation, and finally, the position information is transmitted to the allocation unit; the allocation unit takes the display screen as a carrier, and the position information of the lawbreaker is interspersed on the display screen in the form of an electronic map, so that the corresponding number of inspectors are selected and allocated according to the density value of the position points, the reasonable utilization of the resources of the inspectors is realized, and the information security is more favorably maintained.
The specific working procedure is as follows:
therefore, for convenience of description, we refer to these people as "inspectors" by first downloading the simulation end in the system on the mobile phone of the inspector, after downloading the simulation end, starting the simulation end, the simulation end will cover the original system and simulate the virtual system, the virtual system is equivalent to the "virtual machine" in the prior art, the virtual machine under the simulation end is also equipped with matched software and local basic configuration facilities, and after the simulation end is installed on the mobile phone of the inspector, the simulation end will simulate the academic information, family information, telephone number, bank card number, photo, etc. in one piece of personal information; a WiFi option card of the simulation end is opened immediately, an inspector can stay and observe the simulation end in a street, a mall, and the like, and stay in a certain place through the inspector, so that public WiFi in the place captures signals on the simulation end of a mobile phone of the inspector, the simulation end is connected with the public WiFi, if an illegal molecule benefits from the simulation end, information on the simulation end is stolen through the connected WiFi, the simulation end imitates the information by itself, the illegal molecule is assumed to implement telephone fraud or photo halving through the acquired information, the illegal molecule is connected with the simulation end on the inspector in a telephone, weChat and short message mode, verification information can be stolen at the moment, the situation can be reflected to a first transmission unit on the alarm end through the simulation end, the first transmission unit transmits data information to an alarm module, and relevant personnel responsible for information fraud or information security can cut the illegal molecule;
after the inspector downloads the analog end of the system, the compiling module starts compiling and encoding, the encoded content comprises personal information, family information and the like (described above), then the compiling module transmits the personal information and family information to the virtual module in a data form, the virtual module receives the data information and then decomposes the data information into corresponding storage spaces, the virtual module covers the content of the original system, when the inspector holds the analog end to randomly stay in a place with public WiFi, the second transmission unit is connected with the public WiFi, lawless persons can take the channel through the public WiFi, then the personal information on the virtual module is stolen along the second transmission unit, the system also has a step of paying out 'bait', when the lawless persons take money from banks through telephones, short messages or directly, the analog end on the inspector can know the first time, the information is transmitted to the first transmission unit through the second transmission unit, finally the alarm module acquires the content of the first transmission unit, and the alarm end is a computer installed on a worker for public information security management, so that the position of the workers can not obtain the position of the personal information on the mobile phone can be located by a specific method;
the virtual module is used for backing up information to a storage module in the identification module after the information of the message editing module is input, so that on one hand, the information on the virtual module is prevented from being damaged by lawless persons, on the other hand, the data loss is prevented from being unable to be recovered, the judgment of the later lawless persons on the return of electricity is influenced, the storage unit can provide data recovery for the data damage in the virtual module, the extraction unit is triggered under the condition of the return of the lawless persons or the return of the information, the extraction unit extracts data information such as characters, pictures and sounds, the extraction mode is keyword extraction, the comparison unit compares the data information extracted by the extraction unit with the data information in the storage unit, and when the similarity of the comparison result is more than eighty percent, the second transmission unit is triggered to automatically send the comparison result of the comparison unit to the first transmission unit, and thus the alarm module timely acquires fraud data information; the simulation end on the hand of the inspector occupies larger network speed through the large file of the simulation end, so that the network speed of other mobile phones under the same public WiFi is reduced, and the channel of connecting lawless persons with the simulation end on the hand of the inspector through the public WiFi is wider; with the downloading of the audio data, the virtual module inevitably needs to make a larger memory for audio data storage, and thus the virtual module can cause the condition of operation blocking, and through an automatic deleting program, after the audio data is tested, namely after the audio data leaves the original public WiFi, the automatic deleting program can be triggered through the address change or disconnection of the public WiFi, so that the deleted audio data does not occupy too much space of the virtual module, the virtual module can operate more smoothly, and the stability of an inspector at the use simulation end is ensured;
the position information of the simulation end on each inspector hand is transmitted to the first transmission unit through the second transmission unit, the alarm module can set a partial intersection mode or a non-intersection mode or a full intersection mode for the movable range of each inspector, the non-intersection can improve the inspection efficiency of the inspector, the intersection movable range can improve the inspection accuracy of the inspector on public WiFi safety, and the accuracy can be controlled; the personal information on the virtual module is randomly encoded and compiled, so that the probability of the same personal information of each inspector is reduced, the same personal information is prevented from setting up anti-reconnaissance consciousness for lawbreakers, and the field of vision of the lawbreakers is blurred; the alarm unit is used for acquiring the data information of the first transmission unit to implement alarm prompt, providing support for relevant information security staff, the tracking unit is connected with the world wide web system and is also connected with the mobile phone SIM positioning and identifying system, thereby capturing the position of an illegal molecule when communicating by telephone through the cellular signal transmitted by the base station, simultaneously enabling the relevant information security staff to rapidly capture the position information of the illegal molecule through the world wide web cooperation, and finally transmitting the position information to the allocation unit; the allocation unit takes the display screen as a carrier, and the position information of the lawbreaker is interspersed on the display screen in the form of an electronic map, so that the corresponding number of inspectors are selected and allocated according to the density value of the position points, the reasonable utilization of the resources of the inspectors is realized, and the information security is more favorably maintained.
The foregoing has shown and described the basic principles, principal features and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and that the above embodiments and descriptions are merely illustrative of the principles of the present invention, and various changes and modifications may be made without departing from the spirit and scope of the invention, which is defined in the appended claims. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (7)

1. A big data based informative security alarm system, comprising:
an analog end; the analog terminal takes electronic equipment as a carrier and can be connected with public WiFi;
an alarm terminal; the alarm terminal takes electronic equipment as a carrier, is connected with the analog terminal and can perform data transmission;
the alarm terminal comprises:
an alarm module; the alarm module is arranged on the security system;
a first transmission unit; the first transmission unit can acquire data information from the analog end; the first transmission unit can transmit data information to the alarm module;
the analog end comprises:
a second transmission unit; the second transmission unit is connected with the first transmission unit through a network and is used for carrying out data transmission; the second transmission unit can be connected with other electronic equipment through WiFi;
a virtual module; the virtual module takes the electronic equipment as a carrier, and the triggering priority is higher than that of the original system of the electronic equipment; the virtual module has a basic configuration function of the electronic equipment; the virtual module can transmit the data information to the second transmission unit;
a message editing module; the compiling module can automatically generate codes and automatically compile data information according to the needs; the compiling module can cover the compiled data to the virtual module.
2. A big data based informative security alarm system according to claim 1, wherein: the simulation end also comprises an identification module; the identification module comprises a storage unit, an extraction unit and a comparison unit; the virtual module backs up data to a storage unit in the identification module; the extraction unit is used for extracting character keyword information in voices, characters and pictures of illegal molecule power-back; the comparison unit is used for comparing the information extracted by the extraction unit with the information stored by the storage unit to obtain a similar value; the comparison unit packages data information with the similarity value larger than the threshold value and sends the data information to the alarm terminal through the second transmission unit.
3. A big data based informative security alarm system according to claim 1, wherein: and the virtual module automatically downloads the audio data after the analog end is connected with the public WiFi.
4. A big data based informative security alarm system according to claim 3, wherein: the virtual module sets a periodical automatic deleting program for the downloaded audio data; the automatic deleting program is triggered by address change of the public WiFi.
5. A big data based informative security alarm system according to claim 1, wherein: the virtual module is attached with a positioning unit; the positioning unit sends the position information to the first transmission unit through the second transmission unit, and the alarm module realizes distance control.
6. A big data based informative security alarm system according to claim 1, wherein: the data information compiled or encoded by the compiling module is random.
7. A big data based informative security alarm system according to claim 1, wherein: the alarm module comprises an alarm unit, a tracking unit and a deployment unit; the alarm unit is used for acquiring the data information of the first transmission unit and implementing alarm prompt; the tracking unit is used for acquiring the position information of the lawless persons; the allocation unit is used for embellishing the position information of the lawless persons on the display screen in the form of an electronic map.
CN202210896412.2A 2022-07-28 2022-07-28 Safety alarm system based on big data informatization Active CN115243246B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210896412.2A CN115243246B (en) 2022-07-28 2022-07-28 Safety alarm system based on big data informatization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210896412.2A CN115243246B (en) 2022-07-28 2022-07-28 Safety alarm system based on big data informatization

Publications (2)

Publication Number Publication Date
CN115243246A CN115243246A (en) 2022-10-25
CN115243246B true CN115243246B (en) 2024-02-06

Family

ID=83677228

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210896412.2A Active CN115243246B (en) 2022-07-28 2022-07-28 Safety alarm system based on big data informatization

Country Status (1)

Country Link
CN (1) CN115243246B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110035578A (en) * 2009-09-30 2011-04-06 성신여자대학교 산학협력단 Personal information leakage alarm system based on mobile programing
KR20160098088A (en) * 2015-02-09 2016-08-18 (주)티아이스퀘어 System and method for providing voice phishing warning service during call
KR20160100833A (en) * 2015-02-16 2016-08-24 (주)티아이스퀘어 System and method for providing voice phishing warning service according to dangerrousness level
KR20170090934A (en) * 2016-01-29 2017-08-08 계명대학교 산학협력단 Detecting and tracing method and system for leaked private information
CN107547539A (en) * 2017-08-30 2018-01-05 北京易联通达科技有限公司 A kind of hawkeye early warning system
CN113162823A (en) * 2021-04-06 2021-07-23 广州鲁邦通物联网科技有限公司 APP test simulation system and Internet of things simulation test method
WO2022025349A1 (en) * 2020-07-31 2022-02-03 (주)라바웨이브 Apparatus and method for protecting personal information leaked by means of phishing application

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110035578A (en) * 2009-09-30 2011-04-06 성신여자대학교 산학협력단 Personal information leakage alarm system based on mobile programing
KR20160098088A (en) * 2015-02-09 2016-08-18 (주)티아이스퀘어 System and method for providing voice phishing warning service during call
KR20160100833A (en) * 2015-02-16 2016-08-24 (주)티아이스퀘어 System and method for providing voice phishing warning service according to dangerrousness level
KR20170090934A (en) * 2016-01-29 2017-08-08 계명대학교 산학협력단 Detecting and tracing method and system for leaked private information
CN107547539A (en) * 2017-08-30 2018-01-05 北京易联通达科技有限公司 A kind of hawkeye early warning system
WO2022025349A1 (en) * 2020-07-31 2022-02-03 (주)라바웨이브 Apparatus and method for protecting personal information leaked by means of phishing application
CN113162823A (en) * 2021-04-06 2021-07-23 广州鲁邦通物联网科技有限公司 APP test simulation system and Internet of things simulation test method

Also Published As

Publication number Publication date
CN115243246A (en) 2022-10-25

Similar Documents

Publication Publication Date Title
CN103309808B (en) Based on privacy disclosure of Android user black box detection method and the system of label
CN106713579B (en) Telephone number identification method and device
CN101252748A (en) System and method for realizing privacy SMS on mobile terminal
CN109214914A (en) A kind of loan information checking method and device based on communication open platform
WO2014194825A1 (en) Method and apparatus for processing visible graphic code by mobile terminal
WO2014194827A1 (en) Method and device for mobile terminal to process visualization graphics code
CN108924759B (en) Method, device and system for identifying mobile generator
CN103327183A (en) Black box protecting method and system for private data of Android user based on tag
CN108540755A (en) Personal identification method and device
CN112416730A (en) User internet behavior analysis method and device, electronic equipment and storage medium
CN106899948B (en) Pseudo base station discovery method, system, terminal and server
Mumba et al. Mobile forensics using the harmonised digital forensic investigation process
CN112445870B (en) Knowledge graph string parallel case analysis method based on mobile phone evidence obtaining electronic data
CN105654065A (en) Digitization system for identity authentication and method thereof
CN103973550A (en) Method, system and device for rapidly and intelligently identifying instant messaging application ID (identity) number and carrying out instant messaging
CN109858250A (en) A kind of Android Malicious Code Detection model method based on cascade classifier
CN113923669A (en) Anti-fraud early warning method, device, equipment and medium for multi-source cross-platform fusion
US9025833B2 (en) System and method for video-assisted identification of mobile phone users
CN115243246B (en) Safety alarm system based on big data informatization
CN112925971A (en) Multi-source analysis-based fraud topic detection method and device
CN113065482A (en) Behavior detection method, system, computer device and medium based on image recognition
CN111368738A (en) Deception loan risk identification method, system and equipment
CN115659217A (en) Fraud recognition model training method and device, electronic equipment and storage medium
CN111489276B (en) Personnel management method and related device
CN105302473A (en) System and method for carrying out physical mirroring extraction on phone body data of Android mobile phone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant