CN117251491A - Big data security analysis management method and platform - Google Patents

Big data security analysis management method and platform Download PDF

Info

Publication number
CN117251491A
CN117251491A CN202311500702.1A CN202311500702A CN117251491A CN 117251491 A CN117251491 A CN 117251491A CN 202311500702 A CN202311500702 A CN 202311500702A CN 117251491 A CN117251491 A CN 117251491A
Authority
CN
China
Prior art keywords
information
user
target
terminal
management platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311500702.1A
Other languages
Chinese (zh)
Other versions
CN117251491B (en
Inventor
洪智
葛飞飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Dake Digital Intelligence Technology Co ltd
Original Assignee
Jiangsu Dake Digital Intelligence Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Dake Digital Intelligence Technology Co ltd filed Critical Jiangsu Dake Digital Intelligence Technology Co ltd
Priority to CN202311500702.1A priority Critical patent/CN117251491B/en
Publication of CN117251491A publication Critical patent/CN117251491A/en
Application granted granted Critical
Publication of CN117251491B publication Critical patent/CN117251491B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/26Visual data mining; Browsing structured data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/14Travel agencies
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a big data security analysis management method and a platform. According to the method, after first authority information in a verification terminal cluster is verified, first information to be verified is sent to a management platform, a historical tour information sequence corresponding to each user identity information is obtained according to a first user identity information set in the first information to be verified, a preset tour safety evaluation model is utilized, the safety grade of the first user set is determined according to the first scenic spot information and the historical tour information sequence corresponding to each user identity information in the first user identity information set, and when the safety grade is lower than the preset first safety grade, safety prompt information is sent to a target supervision terminal in the supervision terminal cluster, so that the safety grade of the first user set relative to the first scenic spot is determined by utilizing the historical tour information of each user recorded by the management platform, and targeted supervision of tourists and early warning protection of scenic spots are achieved.

Description

Big data security analysis management method and platform
Technical Field
The application relates to a data processing technology, in particular to a big data security analysis management method and platform.
Background
The security analysis of the big data of the scenic spot monitoring refers to the collection, arrangement, analysis and mining of the relevant data of the scenic spot by utilizing big data technology and method to obtain a security management strategy which is beneficial to the operation and management of the scenic spot.
In the prior art, when tourists visit, improper tour behaviors occur, are easily recorded by scenic spots and uploaded to related management platforms. And then when the tourist plays other scenic spots, the tourist is identified as a non-civilized tourist and is refused to enter all scenic spots. It can be seen that the management platform allows for simplified, tagged management of only a single guest, but does not allow for comprehensive behavioral analysis of clustered guests relative to a particular attraction.
Therefore, a big data security analysis management method is needed to perform comprehensive behavior analysis on clustered guests relative to a specific scenic spot, so as to realize behavior supervision on clustered guests.
Disclosure of Invention
The application provides a big data security analysis management method and a platform, which are used for comprehensively analyzing behaviors of clustered tourists relative to a specific scenic spot, so that behavior supervision of the clustered tourists is realized.
In a first aspect, the present application provides a big data security analysis management method applied to a guest data management system, where the guest data management system includes: the system comprises a management platform, a check terminal cluster and a supervision terminal cluster, wherein the management platform is in communication connection with each check terminal in the check terminal cluster and each supervision terminal in the supervision terminal cluster; the method comprises the following steps:
after a first verification terminal in the verification terminal cluster passes the verification of first authority information, first information to be verified is sent to the management platform, wherein the first authority information comprises authority ranges of all users in a first user set, the first information to be verified comprises a first user identity information set and first scenic spot information corresponding to a first scenic spot, the first user identity information set comprises identity information of all users in the first user set, and the first scenic spot comprises a plurality of authority ranges;
the management platform acquires a history visit information sequence corresponding to each user identity information according to the first user identity information set, wherein each history visit information in the history visit information sequence comprises visit zone information and a visit record, and the visit record is used for recording the visit behavior information of a user in a visit zone corresponding to the visit zone information;
The management platform utilizes a preset tour safety evaluation model, and determines the safety level of the first user set according to the first scenic spot information and the historical tour information sequences corresponding to the user identity information in the first user identity information set;
if the security level is lower than a preset first security level, the management platform sends security prompt information to a target supervision terminal in the supervision terminal cluster, wherein the target supervision terminal comprises a first supervision terminal and/or a second supervision terminal, the first supervision terminal is a terminal which is in information binding with the first user set on the management platform, and the second supervision terminal is a terminal which is in information binding with the first scenic spot on the management platform.
Optionally, after the management platform sends the security prompt information to the target monitor terminal in the monitor terminal cluster, the method further includes:
the management platform sends a first supervision image corresponding to the first scenic spot to the target supervision terminal, wherein the first supervision image comprises a first scenic spot map corresponding to the first scenic spot and area security grade identifiers on all area range blocks of the first scenic spot map, and all area range blocks of the first scenic spot map correspond to all authority ranges of the first scenic spot respectively;
And displaying the first supervision image on the target supervision terminal.
Optionally, the management platform determines the security level of the first user set according to the first scenic spot information and the historical tour information sequences corresponding to the user identity information in the first user identity information set by using a preset tour security evaluation model, including:
the management platform is used for managing the first user setMiddle->User->Is>And equation 1 determines the ++>User->Corresponding behavioral characteristic parameters->The historical tour information sequence +.>The%>Personal history tour information->The value of (2) is a preset tour behavior type set +.>The corresponding characteristic value of the tour behavior in (2), the formula 1 is:
wherein,for the->User->Is>The number of midstream information;
the management platform is used for managing the first user setCharacteristic parameters corresponding to the respective users of said first set of users are determined by equation 2 +.>The formula 2 is:
wherein,for the->User->Corresponding behavioral characteristic weight value, +.>And->Is positively correlated;
If the group behavior characteristic parametersAnd if the security level is greater than the preset group behavior characteristic parameter, the management platform determines that the security level is lower than the preset first security level.
Optionally, after displaying the first supervision image on the target supervision terminal, the method further includes:
the target supervision terminal responds to a first trigger instruction acting on a target area range block of the first supervision image, and sends a target user information acquisition request to the management platform, wherein the area security level identification on the target area range block indicates that the area security level of the target area range block is lower than a preset area security level;
the management platform responds to the target user information acquisition request to acquire target user set information, wherein the target user set information comprises user information of each user in a target user set, and target historical tour information corresponding to the target user in the target user set and preset behavior restriction conditions corresponding to the target area range block meet a preset behavior matching relationship;
the management platform sends the target user set information to the target supervision terminal and a second check terminal in the check terminal cluster, wherein the second check terminal is used for checking authority information of a target authority range corresponding to the target area range block.
Optionally, before the management platform responds to the target user information obtaining request to obtain target user set information, the method further includes:
the management platform is used for managing the first user setMiddle->User->Is>And said->User->Set of rights ranges in said first scenic spot +.>Rights state information set composed of rights states of the respective rights ranges +.>Determining the set of target users->The method comprises the steps of carrying out a first treatment on the surface of the Wherein if the right status information set +_>Middle->The authority status of the authority range is provided with the authority, and the authority status is +.>If the right status information set +.>Middle->The authority status of the authority range is not provided with the authority, and the authority status is +.>The method comprises the steps of carrying out a first treatment on the surface of the The target user set->Belongs to the first user set +.>The target user setFor the first set of users +.>A user set formed by characteristic users meeting the following two conditions, wherein the first condition is: the characteristic user is +.>Corresponding rights status information +.>1, the second of the two conditions is: the history visit information sequence corresponding to the characteristic user>A preset tour behavior characteristic value exists in the target authority range, and the preset tour behavior characteristic value and the target authority range are +. >Corresponding to the scenic spot type.
Optionally, after the management platform sends the target user set information to the target supervision terminal and a second verification terminal in the verification terminal cluster, the method further includes:
the management platform sends a user permission modification request to the first supervision terminal, wherein the user permission modification request comprises the target user set information;
if the management platform receives the user permission modification instruction fed back by the first supervision terminal, the target user is gatheredIn said target authority range +.>Corresponding rights status information +.>Modified to 0.
Optionally, in said aggregating said target usersIn said target authority range +.>Corresponding rights status information +.>After being modified to 0, the method further comprises the following steps:
the management platform sends user authority modification success information to the first supervision terminal so that the first supervision terminal can collect the target usersThe user terminal of each target user sends permission modification prompt information which comprises link information for accessing the management platform;
the target user set Triggering the link information through a first user terminal by a first target user in the system to access the management platform and sending a right resetting request to the management platform;
and the management platform responds to the permission resetting request, sends first commitment information to the first user terminal, and resets the permission state information corresponding to the first target user in the target permission range to 1 after receiving the commitment confirmation information of the first user terminal for the first commitment information.
In a second aspect, the present application provides a big data security analysis management platform, where the big data security analysis management platform is configured to be in communication connection with each verification terminal in a verification terminal cluster and each supervision terminal in a supervision terminal cluster;
after a first verification terminal in the verification terminal cluster verifies first authority information, sending first information to be verified to the big data security analysis management platform, wherein the first authority information comprises authority ranges of all users in a first user set, the first information to be verified comprises a first user identity information set and first scenic spot information corresponding to a first scenic spot, the first user identity information set comprises identity information of all users in the first user set, and the first scenic spot comprises a plurality of authority ranges;
The big data security analysis management platform acquires a history visit information sequence corresponding to each user identity information according to the first user identity information set, wherein each history visit information in the history visit information sequence comprises visit zone information and a visit record, and the visit record is used for recording the visit behavior information of a user in the visit zone corresponding to the visit zone information;
the big data safety analysis management platform utilizes a preset tour safety evaluation model, and determines the safety level of the first user set according to the first scenic spot information and the historical tour information sequences corresponding to the user identity information in the first user identity information set;
if the security level is lower than a preset first security level, the big data security analysis management platform sends security prompt information to a target supervision terminal in the supervision terminal cluster, wherein the target supervision terminal comprises a first supervision terminal and/or a second supervision terminal, the first supervision terminal is a terminal which is in information binding with the first user set on the big data security analysis management platform, and the second supervision terminal is a terminal which is in information binding with the first scenic spot on the big data security analysis management platform.
Optionally, the big data security analysis management platform sends a first supervision image corresponding to the first scenic spot to the target supervision terminal, where the first supervision image includes a first scenic spot map corresponding to the first scenic spot and area security level identifiers on each area range block of the first scenic spot map, where each area range block of the first scenic spot map corresponds to each authority range of the first scenic spot;
and displaying the first supervision image on the target supervision terminal.
Optionally, the big data security analysis management platform is used for analyzing the big data according to the first user setMiddle->User->Is>And equation 1 determines the ++>User->Corresponding behavioral characteristic parameters->The historical tour information sequence +.>The%>Personal history tour information->The value of (2) is a preset tour behavior type set +.>The corresponding characteristic value of the tour behavior in (2), the formula 1 is:
wherein,for the->User->Is>The number of midstream information;
the big data security analysis management platform is used for analyzing the big data according to the first user setCharacteristic parameters corresponding to the respective users of said first set of users are determined by equation 2 +. >The formula 2 is:
wherein,for the->User->Corresponding behavioral characteristic weight value, +.>And->Is positively correlated;
if the group behavior characteristic parametersIf the security level is larger than the preset group behavior characteristic parameters, the big data security analysis management platform determines the security levelLower than the preset first security level.
Optionally, the target supervision terminal responds to a first trigger instruction acting on a target area range block of the first supervision image, and sends a target user information acquisition request to the big data security analysis management platform, wherein the area security level identification on the target area range block indicates that the area security level of the target area range block is lower than a preset area security level;
the big data security analysis management platform responds to the target user information acquisition request to acquire target user set information, wherein the target user set information comprises user information of each user in a target user set, and target historical tour information corresponding to the target user in the target user set and preset behavior restriction conditions corresponding to the target region range image block meet a preset behavior matching relationship;
The big data security analysis management platform sends the target user set information to the target supervision terminal and a second check terminal in the check terminal cluster, wherein the second check terminal is used for checking authority information of a target authority range corresponding to the target area range image block.
Optionally, the big data security analysis management platform is used for analyzing the big data according to the first user setMiddle->User->Is>And said->User->Set of rights ranges in said first scenic spot +.>Rights state information set composed of rights states of the respective rights ranges +.>Determining the set of target users->The method comprises the steps of carrying out a first treatment on the surface of the Wherein if the right status information set +_>Middle->The authority status of the authority range is provided with the authority, and the authority status is +.>If the right status information set +.>Middle->The authority status of the authority range is not provided with the authority, and the authority status is +.>The method comprises the steps of carrying out a first treatment on the surface of the The target user set->Belongs to the first user set +.>The target user setFor the first set of users +.>Is a feature user satisfying the following two conditionsA composed set of users, a first condition of the two conditions being: the characteristic user is +. >Corresponding rights status information +.>1, the second of the two conditions is: the history visit information sequence corresponding to the characteristic user>A preset tour behavior characteristic value exists in the target authority range, and the preset tour behavior characteristic value and the target authority range are +.>Corresponding to the scenic spot type.
Optionally, the big data security analysis management platform sends a user permission modification request to the first supervision terminal, where the user permission modification request includes the target user set information;
if the big data security analysis management platform receives the user permission modification instruction fed back by the first supervision terminal, the target user is gatheredIn said target authority range +.>Corresponding rights status information +.>Modified to 0.
Optionally, the big data security analysis management platform sends user authority modification success information to the first supervision terminal, so that the first supervision terminal sends the user authority modification success information to the target user setUse of individual target users in a systemThe user terminal sends permission modification prompt information which comprises link information for accessing the big data security analysis management platform;
The target user setThe first target user in the database triggers the link information through a first user terminal to access the big data security analysis management platform and sends a permission resetting request to the big data security analysis management platform;
and the big data security analysis management platform responds to the permission resetting request, sends first promise information to the first user terminal, and resets the permission state information corresponding to the first target user in the target permission range to 1 after receiving promise confirmation information of the first user terminal for the first promise information.
In a third aspect, the present application provides an electronic device, comprising:
a processor; the method comprises the steps of,
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform any one of the possible methods described in the first aspect via execution of the executable instructions.
In a fourth aspect, the present application provides a computer-readable storage medium having stored therein computer-executable instructions which, when executed by a processor, are adapted to carry out any one of the possible methods described in the first aspect.
According to the big data security analysis management method and platform, after the first verification terminal in the verification terminal cluster verifies the first authority information, first information to be verified is sent to the management platform, then the management platform obtains a historical tour information sequence corresponding to each user identity information according to the first user identity information set in the first information to be verified, a preset tour security evaluation model is utilized, the security level of the first user set is determined according to the first scenic spot information and the historical tour information sequence corresponding to each user identity information in the first user identity information set, and when the security level is lower than the preset first security level, the management platform sends security prompt information to a target supervision terminal in the supervision terminal cluster, so that the security level of the first user set relative to the first scenic spot is determined by utilizing the historical tour information of each user recorded by the management platform, and targeted supervision of tourists and early warning protection of scenic spots are achieved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
FIG. 1 is a flow diagram of a big data security analysis management method according to an example embodiment of the present application;
FIG. 2 is a flow diagram of a big data security analysis management method according to another example embodiment of the present application;
FIG. 3 is a schematic diagram of a connection architecture of a big data security analysis management platform according to an example embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an example embodiment of the present application.
Specific embodiments thereof have been shown by way of example in the drawings and will herein be described in more detail. These drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but to illustrate the concepts of the present application to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
Fig. 1 is a flow chart of a big data security analysis management method according to an example embodiment of the present application. As shown in fig. 1, the method provided in this embodiment includes:
s101, after a first verification terminal in a verification terminal cluster verifies the first authority information, sending first information to be verified to a management platform
The big data security analysis management method provided by the embodiment can be applied to a tourist data management system. Wherein, the guest data management system may include: the system comprises a management platform, a verification terminal cluster and a supervision terminal cluster, wherein the management platform is in communication connection with each verification terminal in the verification terminal cluster and each supervision terminal in the supervision terminal cluster. It should be noted that the above-mentioned management platform may be a scenic spot management platform in each area, a management platform of a tourist office, or a management platform of a tourist website. The checking terminal can be a ticket checker at the gate of the scenic spot, a ticket checker for each scenic spot in the scenic spot, and ticket checking equipment for facilities in each scenic spot. In addition, the supervision terminal can be a tour guide supervision device or a scenic spot security supervision device.
In this step, after the first verification terminal in the verification terminal cluster verifies the first authority information, first information to be verified may be sent to the management platform, where the first authority information includes an authority range of each user in the first user set, the first information to be verified includes a first user identity information set and first scenic spot information corresponding to the first scenic spot, the first user identity information set includes identity information of each user in the first user set, and the first scenic spot includes a plurality of authority ranges. It should be noted that the first set of users may be a travel group user, and the plurality of authority ranges included in the first scenic spot may be the visiting authority of each scenic spot in a large scenic spot.
S102, the management platform acquires the historical tour information sequences corresponding to the user identity information according to the first user identity information set.
In this step, the management platform may obtain, according to the first user identity information set, a history tour information sequence corresponding to each user identity information, where each history tour information in the history tour information sequence includes tour sight area information and tour records, where the tour records are used to record tour behavior information of a user in a tour sight area corresponding to the tour sight area information. It should be noted that, the browsing records may be records of the civilized behavior, the ordinary behavior, the bad behavior, and the like of the tourist.
S103, the management platform utilizes a preset tour safety evaluation model, and determines the safety level of the first user set according to the first scenic spot information and the historical tour information sequences corresponding to the user identity information in the first user identity information set.
In this step, the management platform may use a preset tour security evaluation model, and determine a security level of the first user set according to the first scenic spot information and the historical tour information sequences corresponding to the user identity information in the first user identity information set.
And S104, the management platform sends safety prompt information to a target supervision terminal in the supervision terminal cluster.
If the security level is lower than a preset first security level, the management platform sends security prompt information to a target supervision terminal in the supervision terminal cluster, wherein the target supervision terminal comprises a first supervision terminal and/or a second supervision terminal, the first supervision terminal is a terminal which is in information binding with the first user set on the management platform, and the second supervision terminal is a terminal which is in information binding with the first scenic spot on the management platform. The first supervision terminal may be a tour guide terminal bound with the travel group on the management platform, and the second supervision terminal may be a management terminal of a first scenic spot manager responsible for the scenic spot.
In this embodiment, after the first verification terminal in the verification terminal cluster verifies the first authority information, the first information to be verified is sent to the management platform, then the management platform obtains a historical tour information sequence corresponding to each user identity information according to a first user identity information set in the first information to be verified, and then a preset tour safety evaluation model is utilized, and determines the safety level of the first user set according to the first scenic spot information and the historical tour information sequence corresponding to each user identity information in the first user identity information set, when the safety level is lower than the preset first safety level, the management platform sends safety prompt information to a target supervision terminal in the supervision terminal cluster, so that the safety level of the first user set relative to the first scenic spot is determined by utilizing the historical tour information of each user recorded by the management platform, and targeted supervision of tourists and early warning protection of the scenic spot are realized.
It should be appreciated that the targeted supervision may be understood that only a guest with improper behavior exists in the first user set, and the improper behavior of the guest easily causes damage to the scenic spot, for example, there is improper behavior of taking shoes off and playing water multiple times in the history of the guest, and when there is a pool in the scenic spot, the targeted supervision may be performed for the guest, especially when there are multiple such guests in the first user set. When no pool exists in the scenic spot and no other improper behavior exists in the tourist, the historical improper behavior of taking off shoes and playing water is not used for preventing the tourist from playing other irrelevant scenic spots, for example, the tourist plays in the exhibition hall in the anhydrous room.
Fig. 2 is a flow chart of a big data security analysis management method according to another example embodiment of the present application. As shown in fig. 2, the method provided in this embodiment includes:
s201, after the first verification terminal in the verification terminal cluster verifies the first authority information, sending first information to be verified to the management platform
In this step, after the first verification terminal in the verification terminal cluster verifies the first authority information, first information to be verified may be sent to the management platform, where the first authority information includes an authority range of each user in the first user set, the first information to be verified includes a first user identity information set and first scenic spot information corresponding to the first scenic spot, the first user identity information set includes identity information of each user in the first user set, and the first scenic spot includes a plurality of authority ranges. It should be noted that the first set of users may be a travel group user, and the plurality of authority ranges included in the first scenic spot may be the visiting authority of each scenic spot in a large scenic spot.
S202, the management platform acquires the historical tour information sequences corresponding to the user identity information according to the first user identity information set.
In this step, the management platform may obtain, according to the first user identity information set, a history tour information sequence corresponding to each user identity information, where each history tour information in the history tour information sequence includes tour sight area information and tour records, where the tour records are used to record tour behavior information of a user in a tour sight area corresponding to the tour sight area information. It should be noted that, the browsing records may be records of the civilized behavior, the ordinary behavior, the bad behavior, and the like of the tourist.
S203, the management platform utilizes a preset tour safety evaluation model, and determines the safety level of the first user set according to the first scenic spot information and the historical tour information sequences corresponding to the user identity information in the first user identity information set.
In this step, the management platform performs a first user groupMiddle->User->Is>Equation 1 determines +.>User->Corresponding behavioral characteristic parameters->Historical tour information sequence->The%>Personal history tour information->The value of (2) is a preset tour behavior type set +.>The corresponding characteristic value of the tour behavior in (a), the formula 1 is:
wherein,is->User- >Is>The number of midstream information;
the management platform is based on the first user setCharacteristic parameters corresponding to the respective users of the first set of users are determined by equation 2 +.>Equation 2 is:
wherein,is->User->Corresponding behavioral characteristic weight value, +.>And->Is positively correlated;
if the group behavior characteristic parametersIf the security level is larger than the preset group behavior characteristic parameter, the management platform determines that the security level is lower than the preset first security level.
S204, the management platform sends safety prompt information to the target supervision terminals in the supervision terminal cluster.
If the security level is lower than a preset first security level, the management platform sends security prompt information to a target supervision terminal in the supervision terminal cluster, wherein the target supervision terminal comprises a first supervision terminal and/or a second supervision terminal, the first supervision terminal is a terminal which is in information binding with the first user set on the management platform, and the second supervision terminal is a terminal which is in information binding with the first scenic spot on the management platform. The first supervision terminal may be a tour guide terminal bound with the travel group on the management platform, and the second supervision terminal may be a management terminal of a first scenic spot manager responsible for the scenic spot.
S205, the management platform sends a first supervision image corresponding to the first scenic spot to the target supervision terminal.
In this step, the management platform sends a first surveillance image corresponding to the first scenic spot to the target surveillance terminal, where the first surveillance image includes a first scenic spot map corresponding to the first scenic spot and area security level identifiers on each area range block of the first scenic spot map, where each area range block of the first scenic spot map corresponds to each authority range of the first scenic spot.
S206, displaying the first supervision image on the target supervision terminal.
After the first surveillance image is displayed on the target surveillance terminal, the target surveillance terminal may further send a target user information acquisition request to the management platform in response to a first trigger instruction acting on a target area range tile of the first surveillance image, and the area security level identifier on the target area range tile indicates that the area security level of the target area range tile is lower than the preset area security level.
The management platform responds to the target user information acquisition request to acquire target user set information, wherein the target user set information comprises user information of each user in a target user set, and preset behavior limiting conditions corresponding to target historical tour information and target area range image blocks in the target user set meet preset behavior matching relations.
The management platform sends target user set information to a target supervision terminal and a second check terminal in the check terminal cluster, wherein the second check terminal is used for checking authority information of a target authority range corresponding to the target region range block.
In addition, the management platform can also obtain the target user set information according to the first user set before responding to the target user information obtaining requestMiddle->User->Is>First->User->Set of rights ranges in the first scenic spot +.>Rights state information set composed of rights states of the respective rights ranges +.>Determining the target user set +.>The method comprises the steps of carrying out a first treatment on the surface of the Wherein, if the rights state information set +.>Middle->The authority status of the authority range is provided with the authority, and the authority status is +.>If the rights state information set +.>Middle->The authority status of the authority range is not provided with the authority, and the authority status is +.>The method comprises the steps of carrying out a first treatment on the surface of the Target user set +.>Belongs to the first user set->Target user set->For the first user set->The first condition of the two conditions is that: feature user is within the target authority range->Corresponding rights status information +. >1, the second of the two conditions is: historical tour information sequence corresponding to characteristic user +.>The preset tour behavior feature value and the target authority range are reserved in the tour behavior feature value>Corresponding to the scenic spot type.
In another embodiment, after the management platform sends the target user set information to the target monitor terminal and the second check terminal in the check terminal cluster, the management platform may further send a user permission modification request to the first monitor terminal, where the user permission modification request includes the target user set information; if the management platform receives the user permission modification instruction fed back by the first supervision terminal, the target users are gatheredIn the target authority range +.>Corresponding rights status information +.>Modified to 0.
In the above embodimentOn the basis of the method, the target users are assembledEach target user in the network is in the target authority rangeCorresponding rights status information +.>After modifying to 0, the management platform can also send user authority modification success information to the first supervision terminal so that the first supervision terminal can send user authority modification success information to the target user set +.>The user terminal of each target user sends permission modification prompt information which comprises link information of the access management platform; target user set +. >The first target user triggers the link information through the first user terminal to access the management platform and sends a right resetting request to the management platform; the management platform responds to the permission resetting request, sends first commitment information to the first user terminal, and resets the permission state information corresponding to the first target user in the target permission range to 1 after receiving the commitment confirmation information of the first user terminal for the first commitment information.
Fig. 3 is a schematic diagram of a connection architecture of a big data security analysis management platform according to an example embodiment of the present application. As shown in fig. 3, the big data security analysis management platform 310 provided in this embodiment is configured to be in communication connection with each verification terminal in the verification terminal cluster 320 and each supervision terminal in the supervision terminal cluster 330;
after the first verification terminal in the verification terminal cluster 320 verifies the first authority information, sending first information to be verified to the big data security analysis management platform 310, wherein the first authority information comprises authority ranges of all users in a first user set, the first information to be verified comprises a first user identity information set and first scenic spot information corresponding to a first scenic spot, the first user identity information set comprises identity information of all users in the first user set, and the first scenic spot comprises a plurality of authority ranges;
The big data security analysis management platform 310 obtains a history visit information sequence corresponding to each user identity information according to the first user identity information set, wherein each history visit information in the history visit information sequence comprises visit zone information and a visit record, and the visit record is used for recording visit behavior information of a user in a visit zone corresponding to the visit zone information;
the big data security analysis management platform 310 uses a preset tour security evaluation model, and determines a security level of the first user set according to the first scenic spot information and the historical tour information sequences corresponding to the user identity information in the first user identity information set;
if the security level is lower than a preset first security level, the big data security analysis management platform 310 sends security prompt information to a target monitor terminal in the monitor terminal cluster 330, where the target monitor terminal includes a first monitor terminal and/or a second monitor terminal, the first monitor terminal is a terminal that binds information with the first user set on the big data security analysis management platform 310, and the second monitor terminal is a terminal that binds information with the first scenic spot on the big data security analysis management platform 310.
Optionally, the big data security analysis management platform 310 sends a first surveillance image corresponding to the first scenic spot to the target surveillance terminal, where the first surveillance image includes a first scenic spot map corresponding to the first scenic spot and area security level identifiers on each area range block of the first scenic spot map, where each area range block of the first scenic spot map corresponds to each authority range of the first scenic spot;
and displaying the first supervision image on the target supervision terminal.
Optionally, the big data security analysis management platform 310 is configured to perform a security analysis according to the first user setMiddle->User->Is>And equation 1 determines the ++>User->Corresponding behavioral characteristic parameters->The historical tour information sequence +.>The%>Personal history tour information->The value of (2) is a preset tour behavior type set +.>The corresponding characteristic value of the tour behavior in (2), the formula 1 is:
wherein,for the->User->Is>The number of midstream information;
the big data security analysis management platform 310 is based on the first user setCharacteristic parameters corresponding to the respective users of said first set of users are determined by equation 2 +. >The formula 2 is:
/>
wherein,for the->User->Corresponding behavioral characteristic weight value, +.>And->Is positively correlated;
if the group behavior characteristic parametersIf the security analysis management platform 310 is greater than the preset group behavior characteristic parameter, the security and the like are determined by the big data security analysis management platform 310The level is lower than the preset first security level.
Optionally, the target supervision terminal sends a target user information acquisition request to the big data security analysis management platform 310 in response to a first trigger instruction acting on a target area range block of the first supervision image, where the area security level identifier on the target area range block indicates that the area security level of the target area range block is lower than a preset area security level;
the big data security analysis management platform 310 responds to the target user information acquisition request to acquire target user set information, wherein the target user set information comprises user information of each user in a target user set, and a preset behavior limiting condition corresponding to a target historical tour information corresponding to a target user in the target user set and a target region range block meets a preset behavior matching relation;
The big data security analysis management platform 310 sends the target user set information to the target supervision terminal and a second check terminal in the check terminal cluster 320, where the second check terminal is used to check the authority information of the target authority range corresponding to the target area range block.
Optionally, the big data security analysis management platform 310 is configured to perform a security analysis according to the first user setMiddle->User->Is>And said->User->Set of authority ranges at the first scenic spotAuthority state information set composed of authority states of all authority rangesDetermining the set of target users->The method comprises the steps of carrying out a first treatment on the surface of the Wherein if the right status information set +_>Middle->The authority status of the authority range is provided with the authority, and the authority status is +.>If the right status information set +.>Middle->The authority status of the authority range is not provided with the authority, and the authority status is +.>The method comprises the steps of carrying out a first treatment on the surface of the The target user set->Belongs to the first user set +.>Said set of target users->For the first set of users +.>To meet the following requirementsAnd a user set consisting of characteristic users of the following two conditions, wherein the first condition is: the characteristic user is +. >Corresponding rights status information +.>1, the second of the two conditions is: the history visit information sequence corresponding to the characteristic user>A preset tour behavior characteristic value exists in the target authority range, and the preset tour behavior characteristic value and the target authority range are +.>Corresponding to the scenic spot type.
Optionally, the big data security analysis management platform 310 sends a user permission modification request to the first supervision terminal, where the user permission modification request includes the target user set information;
if the big data security analysis management platform 310 receives the user permission modification instruction fed back by the first supervision terminal, the target user is collectedIn said target authority range +.>Corresponding rights status information +.>Modified to 0./>
Optionally, the big data security analysis management platform 310 sends user rights modification success information to the first monitor terminal, so that the first monitor terminal sends the user rights modification success information to the target user setThe user terminal of each target user sends permission modification prompt information, wherein the permission modification prompt information comprises link information for accessing the big data security analysis management platform 310;
The target user setThe first target user in (a) triggers the link information through a first user terminal to access the big data security analysis management platform 310 and sends a permission resetting request to the big data security analysis management platform 310;
the big data security analysis management platform 310 responds to the permission resetting request, sends first promise information to the first user terminal, and resets the permission status information corresponding to the first target user in the target permission range to 1 after receiving promise confirmation information of the first user terminal for the first promise information.
Fig. 4 is a schematic structural diagram of an electronic device according to an example embodiment of the present application. As shown in fig. 4, an electronic device 400 provided in this embodiment includes: a processor 401 and a memory 402; wherein:
a memory 402 for storing a computer program, which memory may also be a flash memory.
A processor 401 for executing the execution instructions stored in the memory to implement the steps in the above method. Reference may be made in particular to the description of the embodiments of the method described above.
Alternatively, the memory 402 may be separate or integrated with the processor 401.
When the memory 402 is a device separate from the processor 401, the electronic apparatus 400 may further include:
a bus 403 for connecting the memory 402 and the processor 401.
The present embodiment also provides a readable storage medium having a computer program stored therein, which when executed by at least one processor of an electronic device, performs the methods provided by the various embodiments described above.
The present embodiment also provides a program product comprising a computer program stored in a readable storage medium. The computer program may be read from a readable storage medium by at least one processor of an electronic device, and executed by the at least one processor, causes the electronic device to implement the methods provided by the various embodiments described above.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the present application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. The big data security analysis management method is characterized by being applied to a tourist data management system, wherein the tourist data management system comprises the following steps: the system comprises a management platform, a check terminal cluster and a supervision terminal cluster, wherein the management platform is in communication connection with each check terminal in the check terminal cluster and each supervision terminal in the supervision terminal cluster; the method comprises the following steps:
after a first verification terminal in the verification terminal cluster passes the verification of first authority information, first information to be verified is sent to the management platform, wherein the first authority information comprises authority ranges of all users in a first user set, the first information to be verified comprises a first user identity information set and first scenic spot information corresponding to a first scenic spot, the first user identity information set comprises identity information of all users in the first user set, and the first scenic spot comprises a plurality of authority ranges;
The management platform acquires a history visit information sequence corresponding to each user identity information according to the first user identity information set, wherein each history visit information in the history visit information sequence comprises visit zone information and a visit record, and the visit record is used for recording the visit behavior information of a user in a visit zone corresponding to the visit zone information;
the management platform utilizes a preset tour safety evaluation model, and determines the safety level of the first user set according to the first scenic spot information and the historical tour information sequences corresponding to the user identity information in the first user identity information set;
if the security level is lower than a preset first security level, the management platform sends security prompt information to a target supervision terminal in the supervision terminal cluster, wherein the target supervision terminal comprises a first supervision terminal and/or a second supervision terminal, the first supervision terminal is a terminal which is in information binding with the first user set on the management platform, and the second supervision terminal is a terminal which is in information binding with the first scenic spot on the management platform.
2. The big data security analysis management method according to claim 1, wherein after the management platform sends the security prompt information to the target monitor terminal in the monitor terminal cluster, the method further comprises:
the management platform sends a first supervision image corresponding to the first scenic spot to the target supervision terminal, wherein the first supervision image comprises a first scenic spot map corresponding to the first scenic spot and area security grade identifiers on all area range blocks of the first scenic spot map, and all area range blocks of the first scenic spot map correspond to all authority ranges of the first scenic spot respectively;
and displaying the first supervision image on the target supervision terminal.
3. The big data security analysis management method according to claim 2, wherein the management platform determines the security level of the first user set according to the first scenic spot information and the historical visit information sequences corresponding to the user identity information in the first user identity information set by using a preset visit security evaluation model, and includes:
the management platform is used for managing the first user set Middle->User->Is>And equation 1 determines the ++>User->Corresponding behavioral characteristic parameters->The historical tour information sequence +.>The%>Personal history tour information->The value of (2) is a preset tour behavior type set +.>The corresponding characteristic value of the tour behavior in (2), the formula 1 is:
wherein,for the->User->Is>The number of midstream information;
the management platform is used for managing the first user setCharacteristic parameters corresponding to the respective users of said first set of users are determined by equation 2 +.>The formula 2 is:
wherein,for the->User->Corresponding behavioral characteristic weight value, +.>And->Is positively correlated;
if the group behavior characteristic parametersAnd if the security level is greater than the preset group behavior characteristic parameter, the management platform determines that the security level is lower than the preset first security level.
4. The big data security analysis management method of claim 3, further comprising, after displaying the first supervisory image on the target supervisory terminal:
the target supervision terminal responds to a first trigger instruction acting on a target area range block of the first supervision image, and sends a target user information acquisition request to the management platform, wherein the area security level identification on the target area range block indicates that the area security level of the target area range block is lower than a preset area security level;
The management platform responds to the target user information acquisition request to acquire target user set information, wherein the target user set information comprises user information of each user in a target user set, and target historical tour information corresponding to the target user in the target user set and preset behavior restriction conditions corresponding to the target area range block meet a preset behavior matching relationship;
the management platform sends the target user set information to the target supervision terminal and a second check terminal in the check terminal cluster, wherein the second check terminal is used for checking authority information of a target authority range corresponding to the target area range block.
5. The big data security analysis management method according to claim 4, further comprising, before the management platform acquires the target user set information in response to the target user information acquisition request:
the management platform is used for managing the first user setMiddle->User->Is>And said->User->Set of rights ranges in said first scenic spot +.>Rights state information set composed of rights states of the respective rights ranges +. >Determining the set of target usersThe method comprises the steps of carrying out a first treatment on the surface of the Wherein if the right status information set +_>Middle->The authority status of the authority range is provided with the authority, and the authority status is +.>If the right status information set +.>Middle->The authority status of the authority range is not provided with the authority, and the authority status is +.>The method comprises the steps of carrying out a first treatment on the surface of the The target user set->Belongs to the first user set +.>The target user setFor the first set of users +.>A user set formed by characteristic users meeting the following two conditions, wherein the first condition is: the characteristic user is +.>Corresponding rights status information +.>1, the second of the two conditions is: the history visit information sequence corresponding to the characteristic user>A preset tour behavior characteristic value exists in the target authority range, and the preset tour behavior characteristic value and the target authority range are +.>Corresponding to the scenic spot type.
6. The big data security analysis management method according to claim 5, further comprising, after the management platform sends the target user set information to the target monitor terminal and a second check terminal in the check terminal cluster:
The management platform sends a user permission modification request to the first supervision terminal, wherein the user permission modification request comprises the target user set information;
if the management platform receives the user permission modification instruction fed back by the first supervision terminal, the target user is gatheredIn said target authority range +.>Corresponding rights status information +.>Modified to 0.
7. The big data security analysis management method according to claim 6, wherein, in the step of aggregating the target usersIn said target authority range +.>Corresponding rights status information +.>After being modified to 0, the method further comprises the following steps:
the management platform sends user authority modification success information to the first supervision terminal so that the first supervision terminal can collect the target usersThe user terminal of each target user sends permission modification prompt information which comprises link information for accessing the management platform;
the target user setTriggering the link information through a first user terminal by a first target user in the system to access the management platform and sending a right resetting request to the management platform;
And the management platform responds to the permission resetting request, sends first commitment information to the first user terminal, and resets the permission state information corresponding to the first target user in the target permission range to 1 after receiving the commitment confirmation information of the first user terminal for the first commitment information.
8. The big data safety analysis management platform is characterized by being used for being in communication connection with each check terminal in the check terminal cluster and each supervision terminal in the supervision terminal cluster;
after a first verification terminal in the verification terminal cluster verifies first authority information, sending first information to be verified to the big data security analysis management platform, wherein the first authority information comprises authority ranges of all users in a first user set, the first information to be verified comprises a first user identity information set and first scenic spot information corresponding to a first scenic spot, the first user identity information set comprises identity information of all users in the first user set, and the first scenic spot comprises a plurality of authority ranges;
the big data security analysis management platform acquires a history visit information sequence corresponding to each user identity information according to the first user identity information set, wherein each history visit information in the history visit information sequence comprises visit zone information and a visit record, and the visit record is used for recording the visit behavior information of a user in the visit zone corresponding to the visit zone information;
The big data safety analysis management platform utilizes a preset tour safety evaluation model, and determines the safety level of the first user set according to the first scenic spot information and the historical tour information sequences corresponding to the user identity information in the first user identity information set;
if the security level is lower than a preset first security level, the big data security analysis management platform sends security prompt information to a target supervision terminal in the supervision terminal cluster, wherein the target supervision terminal comprises a first supervision terminal and/or a second supervision terminal, the first supervision terminal is a terminal which is in information binding with the first user set on the big data security analysis management platform, and the second supervision terminal is a terminal which is in information binding with the first scenic spot on the big data security analysis management platform.
9. An electronic device, comprising:
a processor; the method comprises the steps of,
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of any one of claims 1 to 7 via execution of the executable instructions.
10. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are adapted to carry out the method of any one of claims 1 to 7.
CN202311500702.1A 2023-11-13 2023-11-13 Big data security analysis management method and platform Active CN117251491B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311500702.1A CN117251491B (en) 2023-11-13 2023-11-13 Big data security analysis management method and platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311500702.1A CN117251491B (en) 2023-11-13 2023-11-13 Big data security analysis management method and platform

Publications (2)

Publication Number Publication Date
CN117251491A true CN117251491A (en) 2023-12-19
CN117251491B CN117251491B (en) 2024-01-26

Family

ID=89126645

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311500702.1A Active CN117251491B (en) 2023-11-13 2023-11-13 Big data security analysis management method and platform

Country Status (1)

Country Link
CN (1) CN117251491B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104463480A (en) * 2014-12-17 2015-03-25 常熟市虞城国际旅行社有限公司 Multifunctional passenger information management system
US20160283050A1 (en) * 2015-03-26 2016-09-29 Ca, Inc. Adaptive tour interface engine
CN107742340A (en) * 2017-10-12 2018-02-27 湖州华科信息咨询有限公司 A kind of automatic management method and apparatus of scenic spot guide equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104463480A (en) * 2014-12-17 2015-03-25 常熟市虞城国际旅行社有限公司 Multifunctional passenger information management system
US20160283050A1 (en) * 2015-03-26 2016-09-29 Ca, Inc. Adaptive tour interface engine
CN107742340A (en) * 2017-10-12 2018-02-27 湖州华科信息咨询有限公司 A kind of automatic management method and apparatus of scenic spot guide equipment

Also Published As

Publication number Publication date
CN117251491B (en) 2024-01-26

Similar Documents

Publication Publication Date Title
CN106971552B (en) Fake plate phenomenon detection method and system
CN109045702B (en) Plug-in detection method, system, device, computing equipment and medium
CN108537916A (en) A kind of driving recording information processing method and device based on block chain
CN111583469A (en) Parking management method and device
CN104809046B (en) A kind of application program networking control method and application program networking control device
CN105989280A (en) Application program authority management system, device and method
CN110809248A (en) Community fence Internet of things system with intrusion sensing function
CN112738172A (en) Block chain node management method and device, computer equipment and storage medium
CN114415908B (en) Display method, display device, electronic equipment and storage medium
CN112233428A (en) Traffic flow prediction method, traffic flow prediction device, storage medium and equipment
CN115965913A (en) Security monitoring method, device and system and computer readable storage medium
CN117251491B (en) Big data security analysis management method and platform
KR102213460B1 (en) System and method for generating software whistlist using machine run
CN114049658A (en) Floating population management method and device based on face recognition, computer equipment and storage medium
JP2011086007A (en) Device and method for predicting occurrence of insured cause based on disaster
CN110753305B (en) Indoor inspection method and related device
CN106559385A (en) A kind of data authentication method and apparatus
CN113542191A (en) Block chain based data access and verification method and device
CN111104669A (en) Cracking detection method, device, system, server, terminal and storage medium
CN112949442B (en) Abnormal event pre-recognition method and device, electronic equipment and monitoring system
US20130254172A1 (en) Information provision server, information provision system, information provision method and program
CN109686101B (en) Parking control method and related device
CN114513703A (en) Block chain-based trusted reward service processing method, device and equipment
CN113525151A (en) Electric vehicle charging method and related equipment
CN107111939A (en) Circulate a notice of receiving system and circular acceptance method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant