BACKGROUND OF THE INVENTION
Field of the invention
-
The present invention relates to a method and system for identifying mobile communication devices used together with vehicles, or vehicles used together with mobile communication devices.
Description of Prior Art
-
Automatic number plate recognition, ANPR, also known as Automatic License Plate recognition, ALPR, allows to gather information on vehicles in road traffic, using optical character recognition on images of the vehicles' license plates. The images of license plates can be captured by cameras specifically designed for ANPR. ANPR cameras are mounted on top of a road or next to a road and capture images of vehicles passing through. The images are then analyzed resulting in a set of data called meta-data extracted from each captured license plate.
-
It is known that data comprising the information gathered with ANPR can be stored, e.g. in a database hosted by a computer server, for further use by authorized entities, e.g. for law enforcement and security.
-
Another domain of research and technology is radio frequency and mobile communication. A mobile communication device, e.g. a user equipment, UE, is identified by a unique identification, the International Mobile Equipment Identity. Further, a user of a UE is identified by another unique identification, the International Mobile Subscriber Identity, or IMSI, which identifies the user in a mobile communication network of a mobile communication provider. It is further known that one or both identifications can be captured by a cellular identification (CID) device, which implements functionality of a base transceiver station, BTS. That is, a CID device can identify the above mentioned unique identification of a nearby UE and/or its user. The data captured by a CID device can also be stored, e.g. in a database hosted by a computer server.
-
Currently, there is however no system that identifies an individual using both, a vehicle and a mobile communication device. Thus, methods and systems for identifying mobile communication devices used together with vehicles, or vehicles used together with mobile communication devices in an efficient manner are highly desirable. It is also desirable that such methods and systems handle the sensitive data about identification of UE in a secure manner, preferably such that even the service provider operating the data base where the data is stored cannot access the data, but only an authorized agency, e.g. law enforcement agency.
SUMMARY OF THE INVENTION
-
Some or all of these objects are achieved by the subject matter of the independent claims. Preferred embodiments are subject of the dependent claims.
-
A 1st embodiment of the invention is a method for identifying mobile communication devices used together with vehicles, or vehicles used together with mobile communication devices, the method comprising the steps of:
- obtaining, for each of one or more vehicles, one or more vehicle identification data sets, each comprising a vehicle identifier and a vehicle identifier acquisition site, the vehicle identifier acquisition site comprising a time and a location at which the vehicle identifier has been acquired;
- obtaining, for each of one or more mobile communication devices, one or more mobile communication device identification data sets, each comprising a mobile communication device identifier and a mobile communication device identifier acquisition site, the mobile communication device identifier acquisition site comprising a time and a location at which the mobile communication device identifier has been acquired;
- generating a vehicle and mobile communication device association set, wherein each entry of the association set associates a vehicle identification data set and a mobile communication device identification data set and the vehicle identifier acquisition site comprised in the vehicle identification data set corresponds to the mobile communication device identifier acquisition site comprised in the associated mobile communication device identification data set; and
- based on the generated association set, identifying at least one mobile communication device used together with a specified vehicle, or at least one vehicle used together with a specified mobile communication device.
-
According to a 2nd embodiment, in the 1st embodiment, a vehicle identifier acquisition site corresponds to a mobile communication device identifier acquisition site if:
- the location comprised in the vehicle identifier acquisition site corresponds to the location comprised in the mobile communication device identifier acquisition site; and
- the time comprised in the vehicle identifier acquisition site corresponds to the time comprised in the mobile communication device identifier acquisition site.
-
According to a 3rd embodiment, in the 2nd embodiment, the time comprised in a vehicle identifier acquisition site corresponds to the time comprised in a mobile communication device identifier acquisition site if the time comprised in the vehicle identifier acquisition site and the time comprised in the mobile communication device identifier acquisition site are within the same predefined time interval.
-
According to a 4th embodiment, in any one of the preceding embodiments, the method comprises further:
- acquiring a user input specifying a vehicle identifier;
- determining a vehicle identifier associated set of preferably all mobile communication device identifiers comprised in the mobile communication device identification data sets associated in the associated set with vehicle identification data sets comprising the specified vehicle identifier; and
- for each of the mobile communication device identifiers comprised in the vehicle identifier associated set, calculating a confidence score for an association of the specified vehicle identifier with the mobile communication device identifier indicating a likelihood that the vehicle identified by the specified vehicle identifier has correctly been associated with a mobile communication device identified by the mobile communication device identifier.
-
According to a 5th embodiment, in the 4th embodiment, calculating the confidence score for the association of the specified vehicle identifier with a mobile communication device identifier comprises:
- determining, in the association set, a first number A, specifying a number of entries associating a vehicle identification data set comprising the specified vehicle identifier with a mobile communication device identification data set comprising the mobile communication device identifier;
- determining a first ratio of the first number A and a second number |Tp|, specifying a number of vehicle identification data sets comprising the specified vehicle identifier;
- determining a second ratio of the first number A and a third numbers |Dcid|, specifying a number of mobile communication device identification data sets comprising the mobile communication device identifier; and
- determining the sum of the first ratio and the second ratio.
-
According to a 6th embodiment, in any one of the 1st to 3rd embodiments, the method comprises further:
- acquiring a user input specifying a mobile communication device identifier;
- determining a mobile communication device identifier associated set of preferably all vehicle identifiers comprised in the vehicle identification data sets associated in the associated set with mobile communication device identification data sets comprising the specified mobile communication device identifier; and
- for each of the vehicle identifiers comprised in the mobile communication device identifier associated set, calculating a confidence score for an association of the specified mobile communication device identifier with the vehicle identifier indicating a likelihood that the mobile communication device identified by the specified mobile communication device identifier has correctly been associated with a vehicle identified by the vehicle identifier.
-
According to a 7th embodiment, in the 6th embodiment, calculating the confidence score for the association of the specified mobile communication device identifier with a vehicle identifier comprises:
- determining, in the association set, a first number A, specifying a number of entries associating a vehicle identification data set comprising the vehicle identifier with a mobile communication device identification data set comprising the specified mobile communication device identifier;
- determining a first ratio of the first number A and a second number |Tp|, specifying a number of vehicle identification data sets comprising the vehicle identifier;
- determining a second ratio of the first number A and a third number |Dcid| specifying a number of mobile communication device identification data sets comprising the specified mobile communication device identifier; and
- determining the sum of the first ratio and the second ratio.
-
According to an 8th embodiment, in the 5th or 7th embodiment, respectively, calculating the confidence score comprises multiplying the sum with a factor, preferably 0.5.
-
According to a 9th embodiment, in any one of the preceding embodiments, the method comprises further the steps of
- acquiring, for each of the one or more vehicles, the one or more vehicle identification data sets, and/or
- acquiring, for each of one or more mobile communication devices, one or more mobile communication device identification data sets.
-
A 10th embodiment of the invention is a method for acquiring, in a secured manner, a mobile communication device identification data set, the method comprising the steps of:
- acquiring, for each of one or more mobile communication devices, a mobile communication device identifier;
- generating a first encrypted mobile communication device identifier by encrypting the mobile communication device identifier with a first encryption method, wherein the first encryption method uses a public key for encryption and requires a paired private key for decryption; and
- transmitting, to a server, a mobile communication device identification data set comprising the first encrypted mobile communication device identifier.
-
According to an 11th embodiment, in the 10th embodiment,
- the step of generating the first encrypted mobile communication device identifier further comprises generating a second encrypted mobile communication device identifier by encrypting the mobile communication device identifier with a second encryption method, wherein the second encryption method uses a one-way mapping function such that a second encrypted mobile communication device identifier cannot be decrypted; and
- the mobile communication device identification data set transmitted in the transmitting step comprises the first and second encrypted mobile communication device identifiers.
-
A 12th embodiment of the invention is a method for handling, in a secured manner, information regarding mobile communication devices used together with vehicles, and/or regarding vehicles used together with mobile communication devices, the method comprising the steps of:
- storing, for each of one or more vehicles, one or more vehicle identification data sets, each comprising a vehicle identifier;
- storing, for each of one or more mobile communication devices, one or more mobile communication device identification data sets, each comprising a first and a second encrypted mobile communication device identifier generated with a first and a second encryption method, wherein the first encryption method uses a public key for encryption and requires a paired private key for decryption, and wherein the second encryption method uses a one-way mapping function such that the second encrypted mobile communication device identifier cannot be decrypted.
-
According to a 13th embodiment, in the 12th embodiment, the method further comprises the steps of
- acquiring a user input specifying a vehicle identifier;
- identifying at least one mobile communication device used together with a vehicle identified by the specified vehicle identifier by means of the mobile communication device identification data sets and the vehicle identification data sets; and
- outputting, for the identified at least one mobile communication device, the first and/or second encrypted mobile communication device identifier comprised in the mobile communication device identification data set of the identified at least one mobile communication device.
-
According to a 14th embodiment, in the 13th embodiment, the at least one mobile communication device used together with the vehicle identified by the specified vehicle identifier is identified in accordance with the method of any one of the 1st to 5th embodiment, or the 8th embodiment.
-
According to a 15th embodiment, in any one of the 10th to 14th embodiment, the method comprises further the steps of
- acquiring a user input specifying a mobile communication device identifier;
- if the mobile communication device identifier is not encrypted with the second encryption method, encrypting the specified mobile communication device identifier using the second encryption method;
- identifying at least one vehicle used together with the mobile communication device identified by the specified mobile communication device identifier by means of the second encrypted mobile communication device identifiers comprised in the mobile communication device identification data sets and the vehicle identification data sets; and
- outputting the vehicle identifier of the identified at least one vehicle.
-
According to a 16th embodiment, in the 15th embodiment, the at least one vehicle used together with the mobile communication device identified by the specified mobile communication device identifier is identified in accordance with the method of any one of claim 1 to 3, or any one of claims 6 to 8.
-
According to a 17th embodiment, in any one of the 12th to 16th embodiments, the
- method comprises further the step of
- receiving the one or more vehicle identification data sets from an apparatus for providing, in a secured manner, information regarding mobile communication devices.
-
According to an 18th embodiment, in any one of the 12th to 17th embodiments, the method comprises further the steps of the 9th embodiment.
-
According to a 19th embodiment, in any one of the 12th to 18th embodiments, the method comprises further the steps of acquiring, for each of the one or more vehicles, the one or more vehicle identification data sets.
-
According to a 20th embodiment, in any one of the 10th to 19th embodiments, a mobile communication device identification data set does not comprise an unencrypted mobile communication device identifier of the respective mobile communication device.
-
According to a 21st embodiment, in any one of the 10th to 20th embodiments, the second encryption method is a hash encryption.
-
According to a 22nd embodiment, in any one of the 9th or 19th embodiments, or the 20th and 21st embodiments, when depending from the 19th embodiment, acquiring a vehicle identification data set for a vehicle comprises:
- capturing an image of the vehicle with a camera; and
- processing the captured image with image processing to extract license plate data associated with a license plate of the vehicle.
-
According to a 23rd embodiment, in the 22nd embodiment, the camera is configured for Automatic Number Plate recognition, ANPR, or for Automatic License Plate recognition, ALPR.
-
According to a 24th embodiment, in any one of the 22nd or 23rd embodiments, acquiring a vehicle identification data set for one of the plurality of vehicles further comprises:
- querying a vehicle identification server with the extracted license plate data; and
- in response, receiving, from the vehicle identification server, the vehicle identifier identifying the vehicle.
-
According to a 25th embodiment, in any one of the 9th, 10th, or any one of the 18th to 24th embodiments, when depending from the 9th embodiment, acquiring a mobile communication device identification data set for a mobile communication device comprises capturing at least one identification of the mobile communication device by a capturing device, preferably one of a base station operating according to a standard for wireless communication.
-
According to a 26th embodiment, in the 25th embodiment, an identification of the mobile communication device captured by the capturing device is:
- an identifier associated with a subscriber module comprised by the mobile communication device; or
- an identifier associated with the mobile communication device.
-
According to a 27th embodiment, in any of the 25th or 26th embodiments, acquiring a mobile communication device identification data set for a mobile communication device further comprises:
- querying a mobile communication device identification server with at least one of the captured identifications; and
- in response, receiving, from the mobile communication device identification server, the mobile communication device identifier identifying the mobile communication device.
-
A 28th embodiment of the invention is a system for identifying mobile communication devices used together with vehicles, or vehicles used together with mobile communication devices, the system comprising means configured for carrying out the steps of the method of any one of the 1st to 9th embodiments, or any one of the 22nd to 27th embodiments, when depending from the 1st embodiment.
-
A 29th embodiment of the invention is an apparatus for acquiring, in a secured manner, a mobile communication device identification data set, the apparatus comprising means configured for carrying out the steps of the method according to the 10the embodiment, or any one of the 20th or 21st embodiments, when dependent from the 10th embodiment, or any one of the 25th to 27th embodiments when depending from the 10th embodiment.
-
A 30th embodiment of the invention is a server for handling, in a secured manner, information regarding mobile communication devices which are used together with vehicles, or regarding vehicles used together with mobile communication devices, the server comprising means configured for carrying out the steps of the method of any one of the 12th to 19th embodiments, or any one of the 20th or 21st embodiments, when dependent from the 11th embodiment.
-
A 31st embodiment of the invention is a system for identifying, in a secured manner, mobile communication devices used together with vehicles, or vehicles used together with mobile communication devices, the system comprising one or more apparatus according to the 29th embodiment and one or more servers according to the 30th embodiment, and optionally one or more apparatus comprising means configured for carrying out the steps of the method mentioned in any one of the 22nd to 24th embodiments, or a combination thereof.
-
It is to be understood that both the foregoing general description and the following detailed description are exemplary, and are intended to provide further explanation of the invention as claimed. Other advantages and features of the invention will be apparent from the following description, drawings and claims.
BRIEF DESCRIPTION OF THE DRAWINGS
-
The features of the invention are set forth with particularity in the appended claims. The invention may be best understood by reference to the following detailed description of the invention, which describes an exemplary embodiment of the invention, taken in conjunction with the accompanying drawings, in which:
- Fig. 1 is a flowchart showing the steps of a method according to an embodiment of the present invention;
- Fig. 2 is a flowchart showing further steps of the method of Fig. 1 according to some embodiments of the present invention;
- Fig. 3 is a flowchart showing further steps of the method of Fig. 2 according to some embodiments of the present invention;
- Fig. 4 is a flowchart showing further steps of the method of Fig. 1 according to some preferable embodiments of the present invention;
- Fig. 5 is a flowchart showing further steps of the method of Fig. 4 according to some embodiments of the present invention;
- Fig. 6 is a flowchart showing steps of a method according to some further embodiments of the present invention;
- Fig. 7 is a flowchart showing steps of a method according to some further embodiments of the present invention;
- Fig. 8 is a schematic view of a system for carrying out the methods according to some further embodiments of the present invention; and
- Fig. 9 is an alternative view of the system of Fig. 8.
- Fig. 10 is another alternative view of the system of Fig. 8.
DETAILED DESCRIPTION OF THE INVENTION
-
In cooperation with the attached drawings, the technical contents and detailed description of the present invention are described thereinafter according to preferred embodiments.
-
Reference is made to Fig. 1 which is a flowchart showing the steps of a method according to an embodiment of the present invention. The method shown in Fig. 1 is for identifying mobile communication devices used together with vehicles, or vehicles used together with mobile communication devices.
-
In a step 110, for each of one or more vehicles, one or more vehicle identification data sets are obtained, e.g. acquired by a camera which is configured for Automatic Number Plate recognition, ANPR (also referred to as Automatic License Plate recognition, ALPR). The ANPR camera captures an image of the vehicle. The captured image is processed with image processing to extract license plate data associated with a license plate of the vehicle, e.g. the plate number. The extracted license plate data can then be used to query a vehicle identification server, to receive a vehicle identifier which identifies the vehicle.
-
A vehicle identification data set obtained for a vehicle comprises the vehicle identifier, and further a vehicle identifier acquisition site. The vehicle identifier acquisition site is used to store time and location at which the vehicle identifier has been acquired, e.g. captured by the respective ANPR camera. A vehicle identification data set is also referred to as a transit. There is usually more than one transit per plate number. This corresponds to a vehicle being recorded at different locations in a city.
-
In another step 120, for each of one or more mobile communication devices, one or more mobile communication device identification data sets are obtained, e.g. acquired by capturing at least one identification of the mobile communication device by a capturing device. The capturing device is preferably a base station operating according to a standard for wireless communication, also referred to as a CID device as discussed above. In this context, an identification of the mobile communication device captured by the capturing device is e.g. an identifier associated with a subscriber module comprised by the mobile communication device (preferably an International Mobile Subscriber Identity, or IMSI), or an identifier associated with the mobile communication device (preferably an International Mobile Station Equipment Identity, or IMEI). The captured identifications can be used to query a mobile communication device identification server, to receive information about the user of the identified device.
-
A mobile communication device identification data set obtained for a mobile communication device comprises the mobile communication device identifier and further a mobile communication device identifier acquisition site. The mobile communication device identifier acquisition site is used to store time and location at which the mobile communication device identifier has been acquired, e.g. captured by the respective base station.
-
Subsequent to these obtaining steps 110, 120, a vehicle and mobile communication device association set is generated in step 130. Each entry of the association set associates a vehicle identification data set and a mobile communication device identification data set. The vehicle identifier acquisition site comprised in the vehicle identification data set corresponds to the mobile communication device identifier acquisition site comprised in the associated mobile communication device identification data set.
-
In other words, the obtained data sets for vehicles and mobile communication devices are combined, based on their acquisition time and location. In particular, a vehicle identifier acquisition site is determined to correspond to a mobile communication device identifier acquisition site if the location comprised in the vehicle identifier acquisition site corresponds to the location comprised in the mobile communication device identifier acquisition site, and the time comprised in the vehicle identifier acquisition site corresponds to the time comprised in the mobile communication device identifier acquisition site.
-
Preferably, the time comprised in a vehicle identifier acquisition site is determined to correspond to the time comprised in a mobile communication device identifier acquisition site if the time comprised in the vehicle identifier acquisition site and the time comprised in the mobile communication device identifier acquisition site are within the same predefined time interval. A preferably time interval is a time interval of five seconds, however other time intervals are also possible.
-
Fig. 9 shows an example of an acquisition site. An acquisition site preferably comprises one CID device 810 and one or more ANPR cameras 830, preferably one ANPR camera per road lane. While the CID device and the ANPR cameras deployed at a specific acquisition site can have slightly different GPS coordinates, each acquisition site is identified by a unique site identifier, e.g. a name or descriptor, represented by the location comprised in the vehicle identifier acquisition site and the mobile communication device identifier acquisition site. Accordingly, the CID device and the ANPR cameras deployed at a specific acquisition site are associated with the respective unique site identifier, stored as location. Consequently, the location comprised in a vehicle identifier acquisition site is determined to correspond to the location comprised in a mobile communication device identifier acquisition site if they are similar. As another option, the location of an acquisition site can be stored as GPS coordinates, and a range can be defined for slightly different GPS coordinates to be similar, thus defining the location of a specific acquisition site.
-
Based on the generated association set, at least one mobile communication device which is used together with a specified vehicle is identified in step 140. Alternatively, at least one vehicle which is used together with a specified mobile communication device is identified in step 140.
-
Fig. 2 is a flowchart showing further steps of the method of Fig. 1, according to a preferred embodiment of the present invention. In particular, a vehicle can be specified by a user of a system implementing the method. Thus, in step 210, a user input specifying a vehicle identifier is acquired. Then, in step 220, a vehicle identifier associated set is determined. The vehicle identifier associated set preferably comprises all mobile communication device identifiers which are comprised in the mobile communication device identification data sets, which have been associated previously, in the associated set, with vehicle identification data sets comprising the specified vehicle identifier.
-
In step 230, confidence scores are calculated for the determined associations between the specified vehicle and previously captured mobile communication devices. In particular, for each of the mobile communication device identifiers comprised in the vehicle identifier associated set, a confidence score for an association of the specified vehicle identifier with the mobile communication device identifier is calculated. The confidence score indicates a likelihood that the vehicle identified by the specified vehicle identifier has correctly been associated with the mobile communication device identified by the mobile communication device identifier.
-
Fig. 3 is a flowchart showing the sub-steps of step 230 of the method of Fig. 2 according to a preferred embodiment of the present invention.
-
In particular, as shown in Fig. 3, the step 230 of calculating the confidence score for an association of a specified vehicle identifier with a mobile communication device identifier comprises a step 230-1 of determining, in the association set, a first number A (p, cid), which specifies a number of entries associating a vehicle identification data set comprising the specified vehicle identifier p with a mobile communication device identification data set comprising the mobile communication device identifier cid. In step 230-2, a first ratio of the first number A (p, cid) and a second number |Tp| is determined. |Tp| specifies a number of vehicle identification data sets comprising the specified vehicle identifier p. In step 230-3, a second ratio of the first number A (p, cid) and a third number |Dcid| is determined. Here, |Dcid| specifies a number of mobile communication device identification data sets comprising the mobile communication device identifier cid. Then, in step 230-4, the sum of the first ratio and the second ratio is determined, and the sum is preferably multiplied with a factor of 0.5.
-
In other words, let
- p be a vehicle identifier, e.g. a plate number,
- Tp be a set of associations, or transits, determined for a plate p and the number |Tp| of vehicle identification data sets comprising the specified vehicle identifier p,
- cid be a mobile communication device identifier, and
- |Dcid| specify a number of mobile communication device identification data sets comprising the mobile communication device identifier cid.
-
Let us consider a (p, cid) representing the number of associations between a plate number p and a mobile communication device identifier cid. It is noted that a (p, cid) is determined as discussed above, by combining two obtained data sets regarding vehicles and mobile communication devices, based on the respective acquisition time and location. As discussed above, a plate p is associated to a cid if they were captured in the same time interval at the same site, with a site being a single location where road traffic and mobile phones presence are monitored. A plate p and a cid should be seen together many times for the associations to be likely.
-
Let further
A (p, cid) be the set of associations between
p and
cid, and |
A (p, cid) the number of entries in the set. The confidence score for an association of a specified vehicle identifier, or plate,
p and a mobile communication device identifier, or
cid, is then computed as follows:
-
The resulting confidence score is always in between 0 and 1. A score of 0 indicates that a mobile communication device identifier cid was never associated with the plate p. On the other hand, a score of 1 indicates that the cid was always associated with the plate p.
-
The search will return a score of 1 in the case that there are for example five transits with the plate number p, and every one of these transits is associated with the same cid. At the same time this specific cid will also appear exactly five times in the specified search parameters and every time will be associated with the specified plate number p. As discussed above, "associated" means that they were captured at the same site at about the same time. It should be noted that this does not mean that the transit will not be associated with other cid, and that the cid will not be associated with other plate numbers outside the search parameters.
-
Accordingly, the steps of the method as shown in Figs. 1 to 3 allow a user to search for mobile communication devices that are associated with a vehicle specified by the user. The method can however also be used for searching vehicles that are associated with a mobile communication device identified by the user.
-
Fig. 4 is a flowchart showing further steps of the method of Fig. 1 according to a preferred embodiment of the present invention. In particular, a mobile communication device can be specified by the user. Thus, in step 410, a user input specifying a mobile communication device identifier is acquired. Then, in step 420, a mobile communication device identifier associated set is determined. The mobile communication device identifier associated set preferably comprises all vehicle identifiers which are comprised in the vehicle identification data sets, which previously have been associated, in the associated set, with mobile communication device identification data sets comprising the specified mobile communication device identifier.
-
In step 430, similar to the method shown in Fig. 2 and discussed above, confidence scores are calculated, this time for the determined associations between the specified mobile communication device and previously captured vehicles. In particular, for each of the vehicle identifiers comprised in the mobile communication device identifier associated set, a confidence score for an association of the specified mobile communication device identifier with the vehicle identifier is calculated. The confidence score again indicates a likelihood that the mobile communication device identified by the specified mobile communication device identifier has correctly been associated with a vehicle identified by the vehicle identifier.
-
Fig. 5 is a flowchart showing the sub-steps of step 430 of the method of Fig. 4 according to a preferred embodiment of the present invention.
-
As shown in Fig. 5, the step 430 of calculating the confidence score for an association of a specified mobile communication device identifier with a vehicle identifier comprises a step 430-1 of determining, in the association set, a first number A (p, cid), which again specifies a number of entries associating a vehicle identification data set comprising the vehicle identifier p with a mobile communication device identification data set comprising the specified mobile communication device identifier cid. In step 430-2, again a first ratio of the first number A (p, cid) and a second number |Tp| is determined, and |Tp| again specifies a number of vehicle identification data sets comprising the vehicle identifier p. In step 430-3, again a second ratio of the first number A (p, cid) and a third number |Dcid| is determined, wherein |Dcid| specifies a number of mobile communication device identification data sets comprising the specified mobile communication device identifier cid. As above, finally in step 430-4, the sum of the first ratio and the second ratio is determined, and the sum is preferably multiplied with a factor of 0.5.
-
Thus, it is possible that a user searches for vehicle identifiers, e.g. plate numbers, that are associated with a mobile communication device specified by the user. The search is similar to the above as shown in
Figs. 2 and
3. The confidence score is calculated in the same way as for the search with a plate number
p, using the same formula as above:
-
It should be noted that the calculated score is the same for both searches, but because the search is done differently (looking for all cids captured together with a given plate p versus looking for all plates p captured together with a given cid), the result may be slightly different, e.g. due to point where the time intervals used for capturing are centered.
-
As a result of the above described methods, the present invention allows to combine the advances in the field of video surveillance and license plate recognition with new trends in mobile communications to associate traffic data to mobile data. The present invention thus leverages both technologies to collect information about traffic, namely license plates meta-data, time, and location information with mobile phone meta-data such as cellular and hardware identification, frequency, operator information, time, and location. The proposed methods use the data collected independently from both systems, namely ANPR cameras and CID devices, and merge them based on common information such as location and time. The invention involves making a statistical analysis on the merged data to provide statistically significant associations of traffic and mobile phones. This results in the possibility to track mobile communication devices, e.g. mobile phones, used with or in vehicles, e.g. cars, in an advantageous and efficient way.
-
Due to the sensitive nature of the data handled by the present invention, some embodiments relate to security measures to protect the data and the results of the proposed algorithms from unauthorized use. In particular, the above discussed IMSI and IMEI numbers can be used to track individuals, and therefore this information should be accessible only by authorized persons, e.g. authorized agencies.
-
Fig. 6 is a flowchart showing steps of a method according to a further embodiment of the present invention. The method of Fig. 6 is for acquiring a mobile communication device identification data set in a secured manner. In step 610, a mobile communication device identifier is acquired for each of one or more mobile communication devices. This is preferably done by a capturing device as discussed above, i.e. by a base station operating according to a standard for wireless communication, also referred to as a CID device.
-
In step 620, a first encrypted mobile communication device identifier is generated by encrypting the mobile communication device identifier with a first encryption method. The first encryption method uses a public key for encryption and further requires a paired private key for decryption. An example for the first encryption method is RSA (for Rivest-Shamir-Adleman), which is an asymmetric encryption method that can be used for secure data transmission. "Asymmetric" here means that the key used for encryption is public and differs from the decryption key which is kept secret. Preferably, RSA is used with a 1024-bit encryption key.
-
In step 630, a mobile communication device identification data set comprising the first encrypted mobile communication device identifier is transmitted to a server.
-
The method of Fig. 6 is preferably executed by a CID device as discussed above.
-
In some embodiments, step 620 of generating the first encrypted mobile communication device identifier further comprises generating a second encrypted mobile communication device identifier by encrypting the mobile communication device identifier with a second encryption method. The second encryption method uses a one-way mapping function such that a second encrypted mobile communication device identifier cannot be decrypted. Accordingly, in these embodiments the mobile communication device identification data set transmitted in the transmitting step 630 comprises the first and second encrypted mobile communication device identifiers.
-
In further embodiments, the steps of the method of Fig. 6 are performed batch-wise. That is, the CID device performs the steps of the method in certain time intervals, e.g. every five seconds. The time interval is a parameter, and other time intervals are possible. In each time interval, a plurality of mobile communication device identifiers are acquired in step 610. Then, each of the acquired plurality of mobile communication device identifiers are encrypted (either only using RSA, or using both, RSA and SHA) in step 620. Finally, a corresponding plurality of mobile communication device identification data sets is transmitted to the centralized server in step 630.
-
The advantage of the batch-wise performing of the method of Fig. 6 is that the CID device only needs to set up a connection to the centralized server once, to transmit a plurality of mobile communication device identification data sets in a single transmission step 630, in contrast to setting up one connection to the centralized server for each acquired and encrypted mobile communication device identifier.
-
Fig. 7 is a flowchart showing steps of a method according to a further embodiment of the present invention. The method of Fig. 7 is for handling information regarding mobile communication devices used together with vehicles, and/or regarding vehicles used together with mobile communication devices, in a secured manner. In particular, the method is for handling the data acquired, encrypted and transmitted from a CID device according to the method of Fig. 6, e.g. on a centralized server.
-
As shown in Fig. 7, in step 710 one or more vehicle identification data sets are stored for each of one or more vehicles. Each vehicle identification data set comprises a vehicle identifier. The vehicle identification data sets are for instance the vehicle identification data sets acquired by an ANPR camera as used in the method of Fig. 1.
-
In step 720, one or more mobile communication device identification data sets are stored for each of one or more mobile communication devices. Each mobile communication device identification data set comprises a first and a second encrypted mobile communication device identifier generated with a first and a second encryption method, wherein the first encryption method uses a public key for encryption and requires a paired private key for decryption, and wherein the second encryption method uses a one-way mapping function such that the second encrypted mobile communication device identifier cannot be decrypted. The mobile communication device identification data sets are for instance the mobile communication device identification data sets acquired by a CID device as used in the methods of Fig. 1 or Fig. 6.
-
An example for the first encryption method is the above discussed RSA method. An example of the second encryption method is SHA (for Secure Hash Algorithm), which is based on cryptographic hash functions. A cryptographic hash function is a mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size. It is designed to be a one-way function, that is, a function which cannot be inverted. Preferably, SHA is used with a 256-bit encryption key.
-
Similar to the methods of Figs. 2 and 3, the method of Fig. 7 allows identifying mobile communication devices used together with a vehicle. In particular, in step 730, a user input is acquired which specifies a vehicle identifier. In other words, the user can enter e.g. a plate number p. In step 740, at least one mobile communication device used together with a vehicle identified by the specified vehicle identifier is identified. This is done by means of the mobile communication device identification data sets and the vehicle identification data sets. Preferably, the identification is done using any of the methods as shown in Figs. 1 to 3 and discussed above, which allow a user to search for mobile communication devices that are associated with a vehicle specified by the user, and which further allow to determine a confidence score for each determined association.
-
In step 750, information regarding the identified at least one mobile communication device is outputted, e.g. provided to the user. The information can e.g. be the first and/or second encrypted mobile communication device identifier comprised in the mobile communication device identification data set of the identified at least one mobile communication device.
-
Further, similar to the methods of Figs. 4 and 5, the method of Fig. 7 allows identifying vehicles used together with a mobile communication device. In particular, in step 760 a user input is acquired which specifies a mobile communication device identifier, e.g. a CID as discussed above. If the mobile communication device identifier as provided by the user is not encrypted with the second encryption method, it is then encrypted in step 770, using the second encryption method, e.g. the above discussed SHA encryption method. Otherwise, i.e. if the mobile communication device identifier as provided by the user is already encrypted, the method continues with step 780. It should be noted that step 770 is necessary, because the mobile communication device identification data sets only comprise mobile communication device identifiers in RSA and SHA encrypted form, but not in unencrypted form. Further, an RSA-encrypted CID is not suitable for querying, while a hashed CID allows for an efficient, yet secure way of querying, as discussed above.
-
In step 780, at least one vehicle used together with the mobile communication device identified by the specified mobile communication device identifier is identified. This is done by means of the second encrypted mobile communication device identifiers comprised in the mobile communication device identification data sets and the vehicle identification data sets.
-
Finally, the vehicle identifier of the identified at least one vehicle is outputted in step 790, e.g. provided to the user.
-
Accordingly, the method as shown in Fig. 7 and as discussed above also allows identifying mobile communication devices used together with a vehicle, or vice versa, however in a secured manner. In particular, storing both, SHA and RSA encrypted data, allows providing two levels of authorization: Non-authorized users can access the CID data through the hash version, meaning that they can get information on the associations between CID and plates, but will not see the real IMSI and IMEI. Thus, non-authorized users can search for a known mobile communication identifier, e.g. an IMSI, if they know it, by using the hashed data. It is noted that this kind of search works in a similar same way as password matching, and thus is very efficient. On the other hand, authorized users, like security authorities, will have access to the unencrypted data, e.g. through a security dongle providing the private key necessary to decrypt the data.
-
It should again be noted that hashed data cannot be decrypted, and thus for the purpose of providing encrypted data that can be decrypted by authorized users, RSA-encrypted data and hashed data are stored in parallel.
-
It should further be noted that preferably a mobile communication device identification data set does not comprise an unencrypted mobile communication device identifier of the respective mobile communication device, to ensure that the CID data is acquired and handled in a secured manner, to prevent unauthorized use thereof, even by the provider of the system or the server on which the data is stored.
-
In a practical example of the provided methods for identifying mobile communication devices used together with a vehicle, or vice versa, in a secured manner, assume that user "policeman A" wants to find information about an individual. Policeman A knows the corresponding IMSI, i.e. the mobile communication device identifier, of a mobile communication device used by that individual. Thus, Policeman A can use the unencrypted form of the IMSI as input for the in the search form, i.e. as user input specifying a vehicle identifier. The unencrypted IMSI as input by Policeman A will be hashed and compared to the hashed entries in the database as stored in the centralized server 810, to fulfill the search. As policeman A is not authorized to access decrypted data, he cannot access e.g. the IMSIs of all individuals that where at a location at a certain time.
-
In contrast, another user "detective B" is authorized to access decrypted data. Accordingly, if detective B wants to know the IMSIs in an area, he can provide the required private key for decrypting the data to the system, e.g. using a dongle with the private key. Alternatively, detective B may enter a password to get access to decrypted data. In case detective B performs a search by starting a query, all mobile communication device identifiers involved in that query are decrypted using the RSA private key.
-
In summary, the method of Fig. 6 is executed by a CID device, e.g. CID device 810 in Fig. 8. The CID device 810 starts by encrypting captured CID numbers with an asymmetric encryption algorithm, namely RSA with a key of 1024 bits, before transmitting the CID numbers to a centralized server, e.g. centralized server 820 in Fig. 9. At the centralized server 820, which preferably executes the method of Fig. 7, the transmitted RSA-encrypted CID numbers are decrypted with the respective private key (e.g. provided to the centralized server 820 by means of a dongle) corresponding to the device, and are immediately encrypted again, using RSA and SHA encryption.
-
The RSA encrypted CID numbers are used in case of a query wherein a user asks for decryption, providing that he is authorized. The hash (SHA) encrypted CID numbers are used for any query of a user (without special authorization) wherein the real HW ID is provided as query.
-
It is noted that the hash encrypted version of a CID number cannot be decrypted as SHA is a one-way function, as discussed above. A has value can however be used for querying the stored data. In contrast, the RSA encrypted version of a CID number cannot be used for querying the stored data, because the RSA encryption method, applied to a specific CID number as input, returns a different value each time it is applied. The reason is to prevent a brute force attack to RSA encrypted data. Accordingly, it is advantageous to store two encrypted versions of the CID numbers in the database stored in the centralized server 810, and thus the CID numbers are securely stored in the two different formats: the first being the RSA-encrypted format, the other is a hashed version of the data.
-
The table below shows what data is transmitted from the CID device(s), and what data is stored at the centralized server.
Captured | Sent | Stored in centralized server | Stored in centralized server |
IMEI | RSA1024(IMEI) | RSA1024(IMEI) | SHA256(IMEI) |
IMSI | RSA1024(IMSI) | RSA1024(IMSI) | SHA256(IMSI) |
-
The advantage of the embodiments in which the CID device 810 provides only the RSA encrypted CID numbers is that the CID device 810 only needs to perform one encryption method, namely RSA, while the second encryption of the CID numbers, namely the hashed version using SHA, is performed by the centralized server 810. Accordingly, the CID device 810 needs less hardware resources and computing effort. This also allows to reduce the complexity and size of the CID device 810, leading to further effects, e.g. reduced power consumption and space requirements.
-
Alternatively, the captured CID numbers could be transmitted by the CID device in unencrypted form and then be encrypted on the centralized server, using both encryption methods. However, if the centralized server only receives encrypted CID numbers, it can be ensured that not even the operator or provider of the server can access the CID numbers.
-
In a further alternative, according to further embodiments, the CID device 810 encrypts and transmits the acquired mobile communication device identifier using both, the first and second encryption methods, e.g. the RSA and SHA. Accordingly, in these embodiments the centralized server 810 is relieved of the burden to decrypt and encrypt the CID numbers. This is advantageous if the complexity of the centralized server 810 is limited, and further allows to use the resources of the centralized server 810 for other tasks.
-
As shown in Fig. 8, system 800 comprises a CID device 810 comprising means to carry out the steps as shown in Fig. 6. That is, CID device 810 is configured to capture CID numbers of nearby mobile communication devices. As discussed above, the captured CID data is preferably encrypted by the CID device 810, before being transmitted to a centralized server 820.
-
The centralized server 820 comprises means for carrying out the steps as shown in Fig. 7. That is, the centralized server 820 is configured to store the CID data as provided by CID device 810, wherein the CID data is stored in two encrypted forms, RSA and SHA, as shown in the table above.
-
Furthermore, system 800 comprises an ANPR camera 830 comprising means to carry out the steps of Fig. 1 relating to the acquiring of plate numbers.
-
In order to ensure that CID device 810 and ANPR camera 830 can capture data that can meaningfully be combined by the methods as discussed above, both devices are deployed next to a road. The ANPR camera 830 can preferably be mounted above the lanes of a road, to be able to capture images of passing vehicles.
-
Fig. 9 shows an alternative view of system 800. A scenario as shown in Fig. 9 is also referred to as an acquisition site. An acquisition site preferably comprises one CID device 810 and one or more ANPR cameras 830, preferably one ANPR camera per road lane. A CID device 810 preferably comprises a directional antenna which allows targeting the capture of the mobile communication devices to the road in line of sight. Both, the ANPR cameras 830 and the CID device 810 are connected to a network, e.g. the Internet, via a respective network interface. The data obtained by the ANPR cameras 830 and the CID device 810 are securely transmitted over the Internet to centralized server 820 and stored therein as discussed above. In case of several acquisition sites, the centralized server 820 gathers data from all these acquisition sites. The methods as discussed above and as shown in Figs. 1 to 5 and 7 are executed by the centralized server 820, i.e. obtaining and storing the vehicle and mobile communication device identification data sets and combining these data to identify mobile communication devices used together with a vehicle, and vice versa vehicles used together with mobile communication devices. In preferred embodiments, the entities of system 800 perform the above discussed methods in a secured manner.
-
It should be noted that the present invention is more efficient if used with more than one acquisition site. However, the present invention is not limited to a specific number of acquisition sites. In particular, the present invention is also efficient if used with one acquisition site used for an extended period of time, e.g. on several days.
-
Fig. 10 shows another alternative view of system 800. As shown in Fig. 10, CID device 810 comprises a device manager and a database DB for storing data acquired by the acquisition sites. According to the communication protocol used for communication with the interceptor, i.e. the centralized server 820, the CID device connects to the interceptor and creates a secure channel for transmitting data. At predetermined intervals, e.g. every five seconds, the CID device retrieves all new entries from the database, i.e. all new entries acquired in the meantime by the acquisition sites, encrypts the HW/SIM IDs, i.e. the mobile communication device identifiers using RSA and a public key of e.g. 1024 bits, and puts the entries in a list which is then sent together with their metadata, e.g. time and acquisition site, over the secured channel to the interceptor 820.
-
The interceptor 820 receives the data transmitted by the CID device 810 in a list. For each entry, the HW ID and SIM ID, i.e. the mobile communication device identifiers, are decrypted using the private key. Then the interceptor 810 generates RSA and SHA values for HW ID and SIM ID, which are then both stored in the local database maintained at the interceptor 820.
-
Although the invention has been explained in relation to its preferred embodiment(s) as mentioned above, it is to be understood that many other possible modifications and variations can be made without departing from the scope of the present invention. It is, therefore, contemplated that the appended claim or claims will cover such modifications and variations that fall within the true scope of the invention.