CN117354724A - Electronic virtual fence generation method and device and electronic equipment - Google Patents

Electronic virtual fence generation method and device and electronic equipment Download PDF

Info

Publication number
CN117354724A
CN117354724A CN202311331660.3A CN202311331660A CN117354724A CN 117354724 A CN117354724 A CN 117354724A CN 202311331660 A CN202311331660 A CN 202311331660A CN 117354724 A CN117354724 A CN 117354724A
Authority
CN
China
Prior art keywords
virtual fence
base station
electronic virtual
entity base
mobile equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311331660.3A
Other languages
Chinese (zh)
Inventor
黄斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202311331660.3A priority Critical patent/CN117354724A/en
Publication of CN117354724A publication Critical patent/CN117354724A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a method and a device for generating an electronic virtual fence and electronic equipment, which are applied to a cloud server, wherein the cloud server is in communication connection with an entity base station, and the method comprises the following steps: selecting a range of a secret area; acquiring longitude and latitude coordinate information of a position point corresponding to the privacy zone range; determining a target entity base station matched with the longitude and latitude coordinate information from the entity base stations; sending an electronic virtual fence generation instruction to the target entity base station so that the target entity base station generates an electronic virtual fence according to the electronic virtual fence generation instruction; and monitoring the mobile equipment in the electronic virtual fence through the target entity base station. According to the embodiment of the invention, the range of the secret area needing to generate the electronic virtual fence can be flexibly selected according to the requirement, and when the electronic virtual fence is generated, the cloud server can monitor the mobile equipment in the electronic virtual fence in real time through the target entity base station.

Description

Electronic virtual fence generation method and device and electronic equipment
Technical Field
The embodiment of the invention relates to the technical field of Internet, in particular to a method for generating an electronic virtual fence, a device for generating the electronic virtual fence, electronic equipment and a computer readable storage medium.
Background
Along with the continuous increase of enterprise safety investment and the popularization of safety concepts by people, people pay more and more attention to information safety. Generally, each enterprise has security areas such as key areas of research and development, confidential areas and the like, and the security areas need to be enhanced with security protection measures, for example, electronic virtual fences can be set. However, sometimes the security area of the enterprise may change, so that the enterprise cannot set a corresponding electronic virtual fence for the security area, and a risk of leakage of important information in the security area may occur.
Disclosure of Invention
The embodiment of the invention provides a method and a device for generating an electronic virtual fence, electronic equipment and a computer readable storage medium, which are used for solving the problem that the corresponding electronic virtual fence cannot be quickly set for a secret area range.
The embodiment of the invention discloses a method for generating an electronic virtual fence, which is applied to a cloud server, wherein the cloud server is in communication connection with an entity base station, and the method comprises the following steps:
selecting a range of a secret area;
acquiring longitude and latitude coordinate information of a position point corresponding to the privacy zone range;
Determining a target entity base station matched with the longitude and latitude coordinate information from the entity base stations;
sending an electronic virtual fence generation instruction to the target entity base station so that the target entity base station generates an electronic virtual fence according to the electronic virtual fence generation instruction;
and monitoring the mobile equipment in the electronic virtual fence through the target entity base station.
Optionally, the monitoring, by the target entity base station, the mobile device in the electronic virtual fence includes:
receiving the identity and the position information of the mobile equipment sent by the target entity base station;
and if the mobile equipment enters the electronic virtual fence according to the position information of the mobile equipment, and the identity of the mobile equipment is not in a preset white list, sending alarm information entering the range of the security zone to the mobile equipment.
Optionally, if the mobile device is determined to enter the electronic virtual fence according to the location information of the mobile device, sending alarm information entering the security area to the mobile device, including:
and if the mobile equipment enters the electronic virtual fence according to the position information of the mobile equipment, sending alarm information entering the range of the security zone to the mobile equipment when the identity of the mobile equipment is not in a preset white list and the residence time of the mobile equipment in the electronic virtual fence exceeds the preset residence time.
Optionally, the alarm information is displayed in a screen of the mobile device through an alarm popup window.
Optionally, after the sending, to the mobile device, the alert information that enters the privacy zone range, the method further includes:
and sending the identity and the position information of the mobile equipment to a specified object so that the specified object carries out corresponding control processing on the mobile equipment.
Optionally, after the sending, to the mobile device, the alert information that enters the privacy zone range, the method further includes:
when the sending time of the alarm information exceeds a preset time threshold, sending a wireless shielding function opening instruction to the target entity base station; and the target entity base station is used for starting the wireless shielding function in the range of the security zone after receiving the wireless shielding function starting instruction.
Optionally, the identity comprises at least an international mobile subscriber identity and an international mobile equipment identity.
The embodiment of the invention also discloses a device for generating the electronic virtual fence, which is applied to a cloud server, wherein the cloud server is in communication connection with the entity base station, and the device comprises:
the selecting module is used for selecting the range of the security area;
The acquisition module is used for acquiring longitude and latitude coordinate information of the position point corresponding to the privacy zone range;
the matching module is used for determining a target entity base station matched with the longitude and latitude coordinate information from the entity base stations;
the generation module is used for sending an electronic virtual fence generation instruction to the target entity base station so that the target entity base station generates an electronic virtual fence according to the electronic virtual fence generation instruction;
and the monitoring module is used for monitoring the mobile equipment in the electronic virtual fence through the target entity base station.
Optionally, the monitoring module is configured to:
receiving the identity and the position information of the mobile equipment sent by the target entity base station;
and if the mobile equipment enters the electronic virtual fence according to the position information of the mobile equipment, and the identity of the mobile equipment is not in a preset white list, sending alarm information entering the range of the security zone to the mobile equipment.
Optionally, the monitoring module is configured to:
and if the mobile equipment enters the electronic virtual fence according to the position information of the mobile equipment, sending alarm information entering the range of the security zone to the mobile equipment when the identity of the mobile equipment is not in a preset white list and the residence time of the mobile equipment in the electronic virtual fence exceeds the preset residence time.
Optionally, the alarm information is displayed in a screen of the mobile device through an alarm popup window.
Optionally, the apparatus further comprises: the first management and control module is used for:
and sending the identity and the position information of the mobile equipment to a specified object so that the specified object carries out corresponding control processing on the mobile equipment.
Optionally, the apparatus further comprises: the second management and control module is used for:
when the sending time of the alarm information exceeds a preset time threshold, sending a wireless shielding function opening instruction to the target entity base station; and the target entity base station is used for starting the wireless shielding function in the range of the security zone after receiving the wireless shielding function starting instruction.
Optionally, the identity comprises at least an international mobile subscriber identity and an international mobile equipment identity.
The embodiment of the invention also discloses electronic equipment, which comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
the memory is used for storing a computer program;
the processor is configured to implement the method according to the embodiment of the present invention when executing the program stored in the memory.
The embodiment of the invention also discloses a computer program product which is stored in a storage medium and is executed by at least one processor to realize the method according to the embodiment of the invention.
Embodiments of the present invention also disclose a computer-readable storage medium having instructions stored thereon, which when executed by one or more processors, cause the processors to perform the method according to the embodiments of the present invention.
The embodiment of the invention has the following advantages:
in the embodiment of the invention, the method is applied to a cloud server, the cloud server is in communication connection with an entity base station, a privacy zone range is selected, longitude and latitude coordinate information of a position point corresponding to the privacy zone range is obtained, a target entity base station matched with the longitude and latitude coordinate information is determined from the entity base station, an electronic virtual fence generation instruction is sent to the target entity base station, so that the target entity base station generates an electronic virtual fence according to the electronic virtual fence generation instruction, and mobile equipment in the electronic virtual fence is monitored through the target entity base station. According to the embodiment of the invention, the range of the secret area needing to generate the electronic virtual fence can be flexibly selected according to the requirement, when the electronic virtual fence is generated, the cloud server can monitor the mobile equipment in the electronic virtual fence in real time through the target entity base station, and if the mobile equipment is monitored to enter or leave the electronic virtual fence, the corresponding alarm information can be immediately triggered, so that the important information in the electronic virtual fence is ensured not to be leaked.
Drawings
FIG. 1 is a schematic illustration of an application environment provided in an embodiment of the present invention;
FIG. 2 is a flowchart of steps in a method for generating an electronic virtual fence according to an embodiment of the present invention;
FIG. 3 is a schematic view of setting a region of an electronic virtual fence according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a warning pop-up window pattern in a mobile device according to an embodiment of the present invention;
FIG. 5 is a flowchart of steps for setting an electronic virtual fence for a core privacy zone range in accordance with an embodiment of the present invention;
FIG. 6 is a flowchart of the steps for monitoring a core privacy zone wide electronic network fence provided in an embodiment of the present invention;
fig. 7 is a block diagram of a device for generating an electronic virtual fence according to an embodiment of the present invention
Fig. 8 is a schematic diagram of a hardware structure of an electronic device implementing various embodiments of the invention.
Detailed Description
In order that the above-recited objects, features and advantages of the present invention will become more readily apparent, a more particular description of the invention will be rendered by reference to the appended drawings and appended detailed description.
The method for generating the electronic virtual fence provided by the embodiment of the invention can be applied to an application environment shown in fig. 1. The embodiment of the invention is applied to the cloud server 101, the cloud server 101 is in communication connection with the entity base station 102, and the cloud server 101 selects a security area range; acquiring longitude and latitude coordinate information of a position point corresponding to the range of the security zone; determining a target entity base station matched with the longitude and latitude coordinate information from the entity base stations 102; sending an electronic virtual fence generation instruction to a target entity base station so that the target entity base station generates an electronic virtual fence according to the electronic virtual fence generation instruction; the mobile devices 103 in the electronic virtual fence are monitored by the target entity base station.
In practical applications, the mobile device 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, robots, vehicle terminals and portable wearable devices, and the cloud server 101 may be implemented by a stand-alone server or a server cluster composed of a plurality of servers.
Referring to fig. 2, a step flowchart of a method for generating an electronic virtual fence provided in an embodiment of the present invention is applied to a cloud server, where the cloud server is communicatively connected to an entity base station, and the method specifically may include the following steps:
step 201, selecting a security area range.
In a specific implementation, the cloud server and the plurality of entity base stations may form an electronic virtual fence system, where the electronic virtual fence system may be applied to information security protection, child monitoring, and other scenarios of an enterprise, and for convenience of explanation, the electronic virtual fence system is mainly described by taking an application to an enterprise as an example. Specifically, the cloud server may be in communication connection with an entity base station, and the entity base station may be deployed in a designated location of an enterprise in advance, where the entity base station has a wireless shielding function, and may implement communication regulation by using wireless shielding power. Of course, the entity base stations deployed in the enterprise may be lightweight base stations, and thus may also be moved as desired, which is not limited in this regard by the embodiments of the present invention.
In the embodiment of the present invention, mapping staff of an electronic virtual fence needs to be combined with a site map, and referring to fig. 3, for example, is a schematic diagram of setting a region of the electronic virtual fence provided in the embodiment of the present invention, where the mapping staff can select a security region range needing security protection on the map, for example, a security region range such as a research and development core key region, a security region of an enterprise, and the like. Usually, the graphics selected by the mapping staff are the best regular rectangle, circle, square, of course, in practice, the graphics may be selected as irregular polygons, etc., which is not limited in this embodiment of the present invention.
Step 202, acquiring longitude and latitude coordinate information of a position point corresponding to the privacy zone range.
In the embodiment of the invention, the longitude and latitude coordinate information of a plurality of position points in the range of the secret area can also be extracted by surveying staff to the field of an enterprise. Illustratively, referring to fig. 3, assuming that the area B is selected as the privacy zone range, the electronic virtual fence sets longitude and latitude coordinate information of four position points B1/B2/B3/B4 in the area B of the schematic diagram. And then, uploading longitude and latitude coordinate information of the secret area range of the field environment map to a background database of the cloud server.
And 203, determining a target entity base station matched with the longitude and latitude coordinate information from the entity base stations.
As an alternative example of the invention, the entity base station may have been pre-deployed in a designated location of the enterprise. In the embodiment of the invention, after the cloud server obtains the longitude and latitude coordinate information of the privacy zone range, the target entity base station matched with the longitude and latitude coordinate information can be obtained from a plurality of entity base stations. In an exemplary embodiment, when the range of the security area selected by the enterprise is the area B and the latitude and longitude coordinate information of four location points B1/B2/B3/B4 corresponding to the area B is obtained, an entity base station close to the location of the latitude and longitude coordinate information of B1/B2/B3/B4 can be searched in a plurality of entity base stations as a target entity base station, so that the entity base station is already deployed in the enterprise in advance, and thus, the deployment can be performed again without the need of the related personnel to go to the site, and unnecessary cost consumption is reduced.
And 204, sending an electronic virtual fence generation instruction to the target entity base station, so that the target entity base station generates an electronic virtual fence according to the electronic virtual fence generation instruction.
Step 205, monitoring the mobile equipment in the electronic virtual fence through the target entity base station.
In the embodiment of the invention, after the target entity base station is determined according to the longitude and latitude coordinate information of the privacy zone range, an electronic virtual fence generation instruction can be sent to the target entity base station, the target entity base station can establish a virtual boundary, namely an electronic virtual fence by utilizing the signal coverage range of the target entity base station after receiving the electronic virtual fence generation instruction, the target entity base station can monitor whether a mobile device (such as a mobile phone) in the electronic virtual fence enters or leaves the electronic virtual fence or not through the target entity base station, and perform corresponding actions, such as sending alarm information, when the mobile device is monitored to enter or leave the electronic virtual fence.
In the embodiment of the invention, the range of the security area of the electronic virtual fence is required to be set, the boundary distribution corresponding to the range of the security area is obtained based on the longitude and latitude coordinate information of the site survey, 1 entity base station is arranged on the boundary of the longitude and latitude coordinate information, the entity base stations corresponding to the four position points can form the electronic fence area with square or rectangular and irregular shapes, for example, and then the electronic virtual fence can be monitored through the entity base stations. When the entity base station monitors that the mobile device enters the coordinate area monitored by the electronic virtual fence, the mobile device starts to communicate with the cloud server, the server matches the mobile device and executes corresponding actions, for example, if the mobile device is found to be matched in a blacklist, alarm prompt is carried out on the mobile device.
The method for generating the electronic virtual fence is applied to a cloud server, the cloud server is in communication connection with an entity base station, a privacy zone range is selected, longitude and latitude coordinate information of a position point corresponding to the privacy zone range is obtained, a target entity base station matched with the longitude and latitude coordinate information is determined from the entity base station, an electronic virtual fence generation instruction is sent to the target entity base station, so that the target entity base station generates the electronic virtual fence according to the electronic virtual fence generation instruction, and mobile equipment in the electronic virtual fence is monitored through the target entity base station. According to the embodiment of the invention, the range of the secret area needing to generate the electronic virtual fence can be flexibly selected according to the requirement, when the electronic virtual fence is generated, the cloud server can monitor the mobile equipment in the electronic virtual fence in real time through the target entity base station, and if the mobile equipment is monitored to enter or leave the electronic virtual fence, the corresponding alarm information can be immediately triggered, so that the important information in the electronic virtual fence is ensured not to be leaked.
In one embodiment of the present invention, the step 205 of monitoring, by the target entity base station, the mobile device in the electronic virtual fence includes:
Receiving the identity and the position information of the mobile equipment sent by the target entity base station;
and if the mobile equipment enters the electronic virtual fence according to the position information of the mobile equipment, and the identity of the mobile equipment is not in a preset white list, sending alarm information entering the range of the security zone to the mobile equipment.
The identity of the mobile device may include at least an international mobile subscriber identity (IMSI, international Mobile Subscriber Identity) and an international mobile equipment identity (IMEI, international Mobile Equipment Identity), where the IMSI and IMEI are commonly referred to as a mobile phone serial number and a mobile phone "serial number" for identifying each mobile device such as an independent mobile phone in a mobile phone network, and are equivalent to an identity card of the mobile device. Of course, the identity may be any other identity that can be uniquely located to the mobile device, which is not limited in this embodiment of the present invention.
In the embodiment of the invention, a blacklist and a whitelist are preset in a database of the cloud server, wherein the identity of the mobile device in the blacklist is the identity of the mobile terminal which is not allowed to enter the electronic virtual fence, and the identity of the mobile device in the whitelist is the identity of the mobile terminal which is allowed to enter the electronic virtual fence.
In the embodiment of the invention, the target entity base station can monitor whether the mobile equipment enters the electronic virtual fence in real time, if so, the identity and the position information of the mobile equipment can be sent to the cloud server, after the cloud server receives the information, if the mobile equipment is determined to enter the electronic virtual fence according to the position information of the mobile equipment, and if the identity of the mobile equipment is not in a preset white list or in a preset black list, the alarm information entering the security area range can be sent to the mobile equipment so as to remind a user of the mobile terminal to leave the security area range in time.
In the embodiment of the invention, when acquiring the information of the mobile equipment, such as the positioning information of the mobile equipment, the user is required to allow the positioning authority, and the precondition is that the positioning authority is in an open state when the user uses the mobile equipment such as a mobile phone, and the acquisition module of an unauthorized entity base station cannot acquire the IMEI code and the position information of the mobile equipment, which is required to be authorized by the user (equipment information and positioning information). There are two cases that 1, the user is authorized to open (device information, positioning information) rights when using the mobile phone for the first time; 2. the user is not authorized or the rights are closed (device information, location information), which is any information that is not available to the user. Therefore, in practical application, in order to further ensure that important information is not revealed, it may be set that if the mobile device of the user does not open the authorized entity base station to obtain the rights such as device information and positioning information, the user is not allowed to carry the mobile device into the enterprise or into the security area.
It should be noted that, in the embodiments of the present application, the use of user data may be involved, and in practical applications, user specific personal data may be used in the schemes described herein within the scope allowed by applicable legal regulations in the country where the applicable legal regulations are met (for example, the user explicitly agrees to the user to actually notify the user, etc.).
In one embodiment of the invention, the alert information may be displayed through an alert popup in the screen of the mobile device. Specifically, referring to fig. 4, after the cloud server sends the alarm information to the mobile device, the mobile device pops up an alarm pop-up window of "you have entered the core security area", where the pop-up window content may be an icon for prohibiting the use of the communication and photographing device, a prompt document for "do not use the communication and photographing device to perform wireless shielding and to implement communication control", and a "know" button.
In one embodiment of the present invention, if it is determined that the mobile device enters the electronic virtual fence according to the location information of the mobile device, sending, to the mobile device, alarm information for entering the security area range, including:
And if the mobile equipment enters the electronic virtual fence according to the position information of the mobile equipment, sending alarm information entering the range of the security zone to the mobile equipment when the identity of the mobile equipment is not in a preset white list and the residence time of the mobile equipment in the electronic virtual fence exceeds the preset residence time.
In a specific implementation, staff or personnel of a part of enterprises may flow more, and sometimes users may simply go into the electronic virtual fence by mistake, so in order to avoid sending alarm information to all users of mobile terminals entering the electronic virtual fence, in the embodiment of the invention, when the residence time of the mobile device in the electronic virtual fence exceeds a preset residence time, for example 60S (seconds), and the mobile device is not in a white list of a cloud server or in a black list of the cloud server, the alarm information entering the privacy zone range is sent to the mobile device.
In one embodiment of the present invention, after the sending of the alert information to the mobile device that enters the privacy zone range, the method further comprises:
and sending the identity and the position information of the mobile equipment to a specified object so that the specified object carries out corresponding control processing on the mobile equipment.
Wherein the specified object may be a corporate security personnel.
In the embodiment of the invention, after the cloud server sends the alarm information entering the security area range to the mobile equipment, the identity and the position information of the mobile equipment are sent to the company security personnel, so that the company security personnel can position, track and grasp the mobile terminal in real time through the identity and the position information to accurately control the mobile equipment, better assist the company security personnel to find valuable clues and information data, accurately control the mobile equipment within the security area range and ensure the information security of the enterprise.
In one embodiment of the present invention, after the sending of the alert information to the mobile device that enters the privacy zone range, the method further comprises:
when the sending time of the alarm information exceeds a preset time threshold, sending a wireless shielding function opening instruction to the target entity base station; and the target entity base station is used for starting the wireless shielding function in the range of the security zone after receiving the wireless shielding function starting instruction.
Wherein the preset time threshold may be 10s (seconds).
In the embodiment of the invention, the entity base station has a wireless shielding function, and can realize communication control through wireless shielding power. After the sending time of the alarm information to the mobile equipment exceeds 10s, a wireless shielding function opening instruction can be sent to the target entity base station, and the target entity base station can start the wireless shielding function in the range of the security area after receiving the wireless shielding function opening instruction, so that the illegal user can be prevented from sending out the security information in the range of the company security area through the network.
In order to provide a better understanding of embodiments of the present invention to those skilled in the art, specific examples are described below.
Referring to fig. 5, a flowchart of steps for setting an electronic virtual fence of a core privacy zone range according to an embodiment of the present invention includes the following steps:
s501, mapping staff of the electronic network fence system needs to be combined with a site map, and a privacy zone is defined on the map in a circling mode. The regular rectangle, circle and square are the best of the usual circled patterns.
S502, surveying staff needs to survey to the field to extract longitude and latitude coordinate information of four position points of the range of the secret area. For example, longitude and latitude coordinate information of four position points B1/B2/B3/B4 in the area B in fig. 3 is acquired;
s503, uploading longitude and latitude coordinate information obtained by mapping and manufacturing of the field environment to a background database of the cloud server;
s504, the cloud server rear end verifies that positioning points deployed by the entity base stations are matched, an electronic fence area is drawn on a map, and the electronic fence area is set to be a secret area range;
s505, according to longitude and latitude coordinate information of four position points obtained by the cloud server and the on-site survey entity base stations of the matching map, the estimation of the number of the entity base stations and the regional layout is completed, and the debugging and activating electronic virtual fence opening monitoring is carried out.
In a specific embodiment of the present invention, as shown in fig. 3, after the mobile device enters the area B, that is, after the mobile device enters the range of the electronic virtual fence, the acquisition module acquires IMSI/IMEI codes and position information of all the mobile devices entering the area B in real time. The acquisition module is used for acquiring IMSI/IMEI code information of the mobile device and position information sent by the mobile device, and the position information is acquired by adopting an existing mature technology GPS (global positioning system ) preferentially in the actual detection process. And a judging module: according to the acquisition module, IMSI/IMEI information of the mobile equipment in the electronic virtual fence is acquired and matched with a white list and a black list of the cloud server, positioning information and residence time of the mobile equipment in the black list in the electronic virtual fence are judged, the residence time exceeds a preset time threshold, an automatic alarm signal is triggered, alarm character string information is generated, and position information and identity (such as IMSI/IMEI) of the mobile equipment in the black list are transmitted to the cloud server and are simultaneously transmitted to security personnel of a company.
Referring to fig. 6, a flowchart of a monitoring step of an electronic network fence within a core security area according to an embodiment of the present invention is provided, where an acquisition module acquires IMSI/IMEI codes (identity) and location information of all mobile devices entering an area B in real time, and the specific steps of the flowchart are as follows:
S601, firstly, ensuring that an electronic virtual fence is activated and a real-time monitoring state is started;
s602, firstly inputting the IMSI/IMEI code information of the mobile equipment corresponding to the acquired white list and the black list to a security area range at the rear end of a cloud server to set the white list and the black list;
s603, IMSI/IMEI information of the mobile equipment in the area covered by the secret area range and real-time position information of the certain equipment are acquired by an acquisition module and are pushed to a background server;
s604, the cloud server receives information of the acquired mobile equipment of the entity base station in real time and matches the information with the blacklist and the whitelist;
s605, triggering an alarm signal after the mobile device of the blacklist enters a preset privacy zone for more than 30 seconds, and popping up an alarm popup window of ' you have entered a core privacy zone ', wherein the popup window can be an icon for prohibiting the use of communication and photographing equipment, a prompt document for realizing wireless shielding and communication control in the area of ' do not use the communication and photographing equipment ' and a button ' know;
and S606, triggering the popup window of the 'you have entered the range of the security area' for 10 seconds, automatically effecting the wireless shielding function, and sending an automatic alarm signal to security personnel of a company by the synchronous cloud server to position, track and master the mobile equipment of the blacklist in real time for precise control.
According to the embodiment of the invention, the electronic virtual fence is arranged in the range of security areas such as a specific department or a core research and development area through the original electronic virtual fence system and the large database of the mobile equipment, and the portable mobile equipment is identified to manage and monitor communication and photographing equipment in the electronic virtual fence area, so that wireless shielding is performed in the specific range, communication control is realized, and the important information technology leakage risk of the core security area is prevented.
It should be noted that, for simplicity of description, the method embodiments are shown as a series of acts, but it should be understood by those skilled in the art that the embodiments are not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred embodiments, and that the acts are not necessarily required by the embodiments of the invention.
Referring to fig. 7, a block diagram of a generating device of an electronic virtual fence provided in an embodiment of the present invention is applied to a cloud server, where the cloud server is communicatively connected to an entity base station, and the device may specifically include the following modules:
A selection module 701 for selecting a privacy zone range;
the acquiring module 702 is configured to acquire latitude and longitude coordinate information of a location point corresponding to the privacy zone range;
a matching module 703, configured to determine a target entity base station that matches the longitude and latitude coordinate information from the entity base stations;
a generating module 704, configured to send an electronic virtual fence generating instruction to the target entity base station, so that the target entity base station generates an electronic virtual fence according to the electronic virtual fence generating instruction;
and the monitoring module 705 is configured to monitor, by the target entity base station, the mobile device in the electronic virtual fence.
In one embodiment of the present invention, the monitoring module 705 is configured to:
receiving the identity and the position information of the mobile equipment sent by the target entity base station;
and if the mobile equipment enters the electronic virtual fence according to the position information of the mobile equipment, and the identity of the mobile equipment is not in a preset white list, sending alarm information entering the range of the security zone to the mobile equipment.
In one embodiment of the present invention, the monitoring module 705 is configured to:
and if the mobile equipment enters the electronic virtual fence according to the position information of the mobile equipment, sending alarm information entering the range of the security zone to the mobile equipment when the identity of the mobile equipment is not in a preset white list and the residence time of the mobile equipment in the electronic virtual fence exceeds the preset residence time.
In one embodiment of the present invention, the alarm information is displayed through an alarm popup window in a screen of the mobile device.
In one embodiment of the invention, the apparatus further comprises: the first management and control module is used for:
and sending the identity and the position information of the mobile equipment to a specified object so that the specified object carries out corresponding control processing on the mobile equipment.
In one embodiment of the invention, the apparatus further comprises: the second management and control module is used for:
when the sending time of the alarm information exceeds a preset time threshold, sending a wireless shielding function opening instruction to the target entity base station; and the target entity base station is used for starting the wireless shielding function in the range of the security zone after receiving the wireless shielding function starting instruction.
In one embodiment of the present invention, the identity comprises at least an international mobile subscriber identity and an international mobile equipment identity.
The method comprises the steps that the cloud server is applied to the cloud server, the cloud server is in communication connection with an entity base station, a privacy zone range is selected, longitude and latitude coordinate information of a position point corresponding to the privacy zone range is obtained, a target entity base station matched with the longitude and latitude coordinate information is determined from the entity base station, an electronic virtual fence generation instruction is sent to the target entity base station, so that the target entity base station generates an electronic virtual fence according to the electronic virtual fence generation instruction, and mobile equipment in the electronic virtual fence is monitored through the target entity base station. According to the embodiment of the invention, the range of the secret area needing to generate the electronic virtual fence can be flexibly selected according to the requirement, when the electronic virtual fence is generated, the cloud server can monitor the mobile equipment in the electronic virtual fence in real time through the target entity base station, and if the mobile equipment is monitored to enter or leave the electronic virtual fence, the corresponding alarm information can be immediately triggered, so that the important information in the electronic virtual fence is ensured not to be leaked.
For the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments for relevant points.
In addition, the embodiment of the invention also provides electronic equipment, which comprises: the processor, the memory, store on the memory and can be on the computer program of the operation of processor, this computer program realizes the above-mentioned electronic virtual fence's the each process of generating method embodiment when being carried out by the processor, and can reach the same technical result, in order to avoid repetition, will not be repeated here.
The embodiment of the invention also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, realizes the processes of the above-mentioned electronic virtual fence generating method embodiment, and can achieve the same technical effects, and in order to avoid repetition, the description is omitted here. Wherein the computer readable storage medium is selected from Read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), magnetic disk or optical disk.
The embodiment of the present invention further provides a computer program product, where the program product is stored in a storage medium, and the program product is executed by at least one processor to implement each process of the above-mentioned embodiment of the method for generating an electronic virtual fence, and the same technical effects can be achieved, so that repetition is avoided, and details are not repeated here.
Fig. 8 is a schematic diagram of a hardware structure of an electronic device implementing various embodiments of the present invention.
The electronic device 800 includes, but is not limited to: radio frequency unit 801, network module 802, audio output unit 803, input unit 804, sensor 805, display unit 806, user input unit 807, interface unit 808, memory 809, processor 810, and power supply 811. It will be appreciated by those skilled in the art that the electronic device structure shown in fig. 8 is not limiting of the electronic device and that the electronic device may include more or fewer components than shown, or may combine certain components, or a different arrangement of components. In the embodiment of the invention, the electronic equipment comprises, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer and the like.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 801 may be used for receiving and transmitting signals during the process of receiving and transmitting information or communication, specifically, receiving downlink data from a base station, and then processing the received downlink data by the processor 810; and, the uplink data is transmitted to the base station. In general, the radio frequency unit 801 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 801 may also communicate with networks and other devices through a wireless communication system.
The electronic device provides wireless broadband internet access to the user through the network module 802, such as helping the user to send and receive e-mail, browse web pages, access streaming media, and the like.
The audio output unit 803 may convert audio data received by the radio frequency unit 801 or the network module 802 or stored in the memory 809 into an audio signal and output as sound. Also, the audio output unit 803 may also provide audio output (e.g., a call signal reception sound, a message reception sound, etc.) related to a specific function performed by the electronic device 800. The audio output unit 803 includes a speaker, a buzzer, a receiver, and the like.
The input unit 804 is used for receiving an audio or video signal. The input unit 804 may include a graphics processor (Graphics Processing Unit, GPU) 8041 and a microphone 8042, the graphics processor 8041 processing image data of still pictures or video obtained by an image capturing apparatus (such as a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 806. The image frames processed by the graphics processor 8041 may be stored in the memory 809 (or other storage medium) or transmitted via the radio frequency unit 801 or the network module 802. The microphone 8042 can receive sound, and can process such sound into audio data. The processed audio data may be converted into a format output that can be transmitted to the mobile communication base station via the radio frequency unit 801 in case of a telephone call mode.
The electronic device 800 also includes at least one sensor 805 such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display panel 8061 according to the brightness of ambient light, and the proximity sensor can turn off the display panel 8061 and/or the backlight when the electronic device 800 moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the acceleration in all directions (generally three axes), and can detect the gravity and direction when stationary, and can be used for recognizing the gesture of the electronic equipment (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration recognition related functions (such as pedometer and knocking), and the like; the sensor 805 may also include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., which are not described herein.
The display unit 806 is used to display information input by a user or information provided to the user. The display unit 806 may include a display panel 8061, and the display panel 8061 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 807 is operable to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the electronic device. In particular, the user input unit 807 includes a touch panel 8071 and other input devices 8072. Touch panel 8071, also referred to as a touch screen, may collect touch operations thereon or thereabout by a user (e.g., operations of the user on touch panel 8071 or thereabout using any suitable object or accessory such as a finger, stylus, etc.). The touch panel 8071 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch azimuth of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts it into touch point coordinates, sends the touch point coordinates to the processor 810, and receives and executes commands sent from the processor 810. In addition, the touch panel 8071 may be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. In addition to the touch panel 8071, the user input unit 807 can include other input devices 8072. In particular, other input devices 8072 may include, but are not limited to, physical keyboards, function keys (e.g., volume control keys, switch keys, etc.), trackballs, mice, joysticks, and so forth, which are not described in detail herein.
Further, the touch panel 8071 may be overlaid on the display panel 8061, and when the touch panel 8071 detects a touch operation thereon or thereabout, the touch operation is transmitted to the processor 810 to determine a type of touch event, and then the processor 810 provides a corresponding visual output on the display panel 8061 according to the type of touch event. Although in fig. 8, the touch panel 8071 and the display panel 8061 are two independent components for implementing the input and output functions of the electronic device, in some embodiments, the touch panel 8071 and the display panel 8061 may be integrated to implement the input and output functions of the electronic device, which is not limited herein.
The interface unit 808 is an interface to which an external device is connected to the electronic apparatus 800. For example, the external devices may include a wired or wireless headset port, an external power (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 808 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the electronic apparatus 800 or may be used to transmit data between the electronic apparatus 800 and an external device.
The memory 809 can be used to store software programs as well as various data. The memory 809 may mainly include a storage program area that may store an operating system, application programs required for at least one function (such as a sound playing function, an image playing function, etc.), and a storage data area; the storage data area may store data (such as audio data, phonebook, etc.) created according to the use of the handset, etc. In addition, the memory 809 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 810 is a control center of the electronic device, connects various parts of the entire electronic device using various interfaces and lines, and performs various functions of the electronic device and processes data by running or executing software programs and/or modules stored in the memory 809, and invoking data stored in the memory 809, thereby performing overall monitoring of the electronic device. The processor 810 may include one or more processing units; preferably, the processor 810 may integrate an application processor that primarily handles operating systems, user interfaces, applications, etc., with a modem processor that primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 810.
The electronic device 800 may also include a power supply 811 (e.g., a battery) for powering the various components, and the power supply 811 may preferably be logically coupled to the processor 810 through a power management system that provides for managing charge, discharge, and power consumption.
In addition, the electronic device 800 includes some functional modules, which are not shown, and will not be described herein.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The embodiments of the present invention have been described above with reference to the accompanying drawings, but the present invention is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present invention and the scope of the claims, which are to be protected by the present invention.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, etc.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (10)

1. The method for generating the electronic virtual fence is characterized by being applied to a cloud server, wherein the cloud server is in communication connection with an entity base station, and the method comprises the following steps:
selecting a range of a secret area;
acquiring longitude and latitude coordinate information of a position point corresponding to the privacy zone range;
determining a target entity base station matched with the longitude and latitude coordinate information from the entity base stations;
sending an electronic virtual fence generation instruction to the target entity base station so that the target entity base station generates an electronic virtual fence according to the electronic virtual fence generation instruction;
and monitoring the mobile equipment in the electronic virtual fence through the target entity base station.
2. The method of claim 1, wherein the monitoring, by the target entity base station, of the mobile device in the electronic virtual fence comprises:
receiving the identity and the position information of the mobile equipment sent by the target entity base station;
and if the mobile equipment enters the electronic virtual fence according to the position information of the mobile equipment, and the identity of the mobile equipment is not in a preset white list, sending alarm information entering the range of the security zone to the mobile equipment.
3. The method according to claim 2, wherein the sending the alert information to the mobile device to enter the privacy zone if the mobile device is determined to enter the electronic virtual fence according to the location information of the mobile device comprises:
and if the mobile equipment enters the electronic virtual fence according to the position information of the mobile equipment, sending alarm information entering the range of the security zone to the mobile equipment when the identity of the mobile equipment is not in a preset white list and the residence time of the mobile equipment in the electronic virtual fence exceeds the preset residence time.
4. A method according to claim 3, wherein the alert information is displayed in a screen of the mobile device through an alert window.
5. The method of claim 2, wherein after said sending alert information to the mobile device that is within the privacy zone, the method further comprises:
and sending the identity and the position information of the mobile equipment to a specified object so that the specified object carries out corresponding control processing on the mobile equipment.
6. A method according to claim 3, wherein after said sending alert information to the mobile device that comes into range of the privacy zone, the method further comprises:
When the sending time of the alarm information exceeds a preset time threshold, sending a wireless shielding function opening instruction to the target entity base station; and the target entity base station is used for starting the wireless shielding function in the range of the security zone after receiving the wireless shielding function starting instruction.
7. The method of claim 2, wherein the identity comprises at least an international mobile subscriber identity and an international mobile equipment identity.
8. An electronic virtual fence generation device, which is applied to a cloud server, wherein the cloud server is in communication connection with an entity base station, and the device comprises:
the selecting module is used for selecting the range of the security area;
the acquisition module is used for acquiring longitude and latitude coordinate information of the position point corresponding to the privacy zone range;
the matching module is used for determining a target entity base station matched with the longitude and latitude coordinate information from the entity base stations;
the generation module is used for sending an electronic virtual fence generation instruction to the target entity base station so that the target entity base station generates an electronic virtual fence according to the electronic virtual fence generation instruction;
and the monitoring module is used for monitoring the mobile equipment in the electronic virtual fence through the target entity base station.
9. An electronic device comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory communicate with each other via the communication bus;
the memory is used for storing a computer program;
the processor is configured to implement the method according to any one of claims 1-7 when executing a program stored on a memory.
10. A computer-readable storage medium having instructions stored thereon, which when executed by one or more processors, cause the processors to perform the method of any of claims 1-7.
CN202311331660.3A 2023-10-13 2023-10-13 Electronic virtual fence generation method and device and electronic equipment Pending CN117354724A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311331660.3A CN117354724A (en) 2023-10-13 2023-10-13 Electronic virtual fence generation method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311331660.3A CN117354724A (en) 2023-10-13 2023-10-13 Electronic virtual fence generation method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN117354724A true CN117354724A (en) 2024-01-05

Family

ID=89364549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311331660.3A Pending CN117354724A (en) 2023-10-13 2023-10-13 Electronic virtual fence generation method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN117354724A (en)

Similar Documents

Publication Publication Date Title
CN108595946B (en) Privacy protection method and terminal
CN108280349A (en) Protect method, mobile terminal and the computer readable storage medium of system kernel layer
WO2021136138A1 (en) Information prompting method and electronic device
CN109446834A (en) A kind of right management method and mobile terminal of application program
CN108710806B (en) Terminal unlocking method and mobile terminal
CN110708495A (en) Video conference monitoring method, terminal and readable storage medium
CN109918944B (en) Information protection method and device, mobile terminal and storage medium
CN111125680A (en) Permission setting method and terminal equipment
CN109815679B (en) Authority management method and mobile terminal
US20210385323A1 (en) Alert task processing method, terminal, and computer-readable storage medium
CN107895108B (en) Operation management method and mobile terminal
CN111159738B (en) Authority configuration method, application login method and device
CN111427644B (en) Target behavior identification method and electronic equipment
CN109815678B (en) Permission configuration method and mobile terminal
CN109343900B (en) Permission configuration method and terminal
CN107491685B (en) Face recognition method and mobile terminal
CN110647727A (en) Terminal control method and terminal
CN107889112B (en) A kind of recognition methods of pseudo-base station and mobile terminal
CN109992939A (en) A kind of login method and terminal device
CN110096863B (en) Alarm method and mobile terminal
CN109446794A (en) A kind of cipher-code input method and its mobile terminal
CN111223269B (en) Safety protection method and electronic equipment
CN117354724A (en) Electronic virtual fence generation method and device and electronic equipment
CN110826044B (en) Unlocking method and electronic equipment
CN110276209B (en) Alarm method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination