WO2019241915A1 - 警情挖掘方法、装置、系统及存储介质 - Google Patents

警情挖掘方法、装置、系统及存储介质 Download PDF

Info

Publication number
WO2019241915A1
WO2019241915A1 PCT/CN2018/091897 CN2018091897W WO2019241915A1 WO 2019241915 A1 WO2019241915 A1 WO 2019241915A1 CN 2018091897 W CN2018091897 W CN 2018091897W WO 2019241915 A1 WO2019241915 A1 WO 2019241915A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
mining
police
information
mobile phone
Prior art date
Application number
PCT/CN2018/091897
Other languages
English (en)
French (fr)
Inventor
姚开方
裴卫斌
林大镰
谭喆
Original Assignee
深圳中兴力维技术有限公司
南京中兴力维软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳中兴力维技术有限公司, 南京中兴力维软件有限公司 filed Critical 深圳中兴力维技术有限公司
Priority to PCT/CN2018/091897 priority Critical patent/WO2019241915A1/zh
Publication of WO2019241915A1 publication Critical patent/WO2019241915A1/zh

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/16Mobility data transfer selectively restricting mobility data tracking

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method, a device, a system, and a computer-readable storage medium for alert mining.
  • the main purpose of the present invention is to provide a method, a device, a system and a computer-readable storage medium for mining the police situation, which aims to solve the technical problem of how to efficiently screen the police situation in a large public place.
  • the present invention provides a method for mining police information, which includes the following steps:
  • the original police information includes: electronic fence information and mobile phone information captured by the electronic fence;
  • the mobile phone information includes: a mobile phone SIM card number, a mobile phone body code, and a time when the mobile phone enters or leaves a covered area of the electronic fence;
  • the electronic fence information includes: an electronic fence ID.
  • the method before the step of reading the original police information stored in the database, the method further includes:
  • Set parameters for alarm mining the parameters include: time span of alarm mining, triggering time for performing alarm mining, and parameters related to filtering of alarm data.
  • the parameters related to the screening of the alarm data include: the number of times that the same mobile phone information is captured by the same electronic fence within a preset time span.
  • the reading the original police information stored in the database includes:
  • the original police information is grouped according to the mobile phone SIM card number and the electronic fence ID, or according to the mobile phone body code and the electronic fence ID.
  • One of the groups is a police record, and one police record corresponds to an electronic fence.
  • the method before the step of reading the original police information stored in the database, the method further includes:
  • the mobile phone whitelist includes: a number of mobile phone SIM card numbers and / or a number of mobile phone body codes;
  • the method further includes:
  • the method before the step of reading the original police information stored in the database, the method further includes:
  • the mobile phone information subjected to data format conversion is stored in the database.
  • the method further includes: writing the filtered alarm data into the database and presetting Alarm table to form an alarm record;
  • the method further includes: reading the alarm record from the alarm table as the alarm data to be pushed.
  • the alarm table includes several alarm records, and each alarm record is provided with a push status;
  • the reading the alarm record from the alarm table includes: periodically polling the alarm table, and reading the alarm record in a non-pushing state as the alarm data to be pushed.
  • the alarm record includes the following fields: a mobile phone field, an electronic fence field, a number of captures field, an entry fence time field, an exit fence time field, and an alarm time field.
  • the present invention also provides a warning information mining device, the warning information mining device includes: a memory, a processor, and a warning information stored on the memory and operable on the processor.
  • a mining program which when executed by the processor, implements the steps of the method for mining an intelligence situation according to any one of the above.
  • the present invention also provides a police situation mining system
  • the police situation mining system includes: an electronic fence device, a police platform and a police situation mining device as described above; the police situation mining device Wired or wirelessly connected with the electronic fence equipment and the police platform respectively.
  • the electronic fence device is deployed in a large public place and is used to capture information of all mobile phones entering the coverage area of the electronic fence.
  • the present invention also provides a computer-readable storage medium, wherein the computer-readable storage medium stores an alarm mining program, and when the alarm mining program is executed by a processor, it implements any of the foregoing tasks. Steps of an alert mining method as described in one item.
  • the invention uses electronic fence technology to collect mobile phone information of people in the area in public places with frequent police situations, such as train stations and bus stations, and uses the collected mobile phone information as the original police information to perform data mining.
  • the big data analysis thus screens out the alarm data with the characteristics of the police situation, which can effectively identify the criminal suspects from a large number of people, and finally lock the criminal suspects based on the mobile phone information, realizing the automatic screening of the police information and saving the police force At the same time, it can also automatically alert the police platform.
  • FIG. 1 is a schematic structural diagram of a hardware operating environment of a device involved in a solution of an embodiment of an alarming mining device according to the present invention
  • FIG. 2 is a functional architecture diagram of an embodiment of an alarm situation mining system according to the present invention.
  • FIG. 3 is a schematic flowchart of a first embodiment of a method for mining alarm information according to the present invention
  • FIG. 4 is a schematic flowchart of a second embodiment of a method for mining alarm information according to the present invention.
  • FIG. 5 is a schematic flowchart of a third embodiment of a method for mining alarm information according to the present invention.
  • the invention provides a police intelligence digging device.
  • FIG. 1 is a schematic structural diagram of a hardware operating environment of a device involved in a solution of an embodiment of an alarm mining device according to the present invention.
  • the alarm situation mining device may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005.
  • the communication bus 1002 is used to implement connection and communication between these components.
  • the user interface 1003 may include a display, an input unit such as a keyboard, and the optional user interface 1003 may further include a standard wired interface and a wireless interface.
  • the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface).
  • the memory 1005 may be a high-speed RAM memory or a non-volatile memory. memory), such as disk storage.
  • the memory 1005 may optionally be a storage device independent of the foregoing processor 1001. It should be noted that the processor 1001 is installed in the police intelligence digging device in an embedded chip manner.
  • the hardware structure of the alert mining device shown in FIG. 1 does not constitute a limitation on the alert mining device, and may include more or fewer components than shown, or a combination of some components. Or different component arrangements.
  • the memory 1005 as a computer-readable storage medium may include an operating system, a network communication module, a user interface module, and a police intelligence mining program.
  • the operating system is a program that manages and controls the alarm mining device and software resources, and supports the operation of the network communication module, the user interface module, the alarm mining program, and other programs or software;
  • the network communication module is used to manage and control the network interface 1004 ;
  • the user interface module is used to manage and control the user interface 1003.
  • the network interface 1004 is mainly used to connect to the system background and perform data communication with the system background;
  • the user interface 1003 is mainly used to connect to the client (user) and perform data with the client Communication;
  • the alert mining device calls the alert mining program stored in the memory 1005 through the processor 1001, and performs the following operations:
  • the original police information includes: electronic fence information and mobile phone information captured by the electronic fence;
  • the alert mining device calls the alert mining program stored in the memory 1005 through the processor 1001 to perform the following operations:
  • Set parameters for alarm mining the parameters include: time span of alarm mining, triggering time for performing alarm mining, and parameters related to filtering of alarm data.
  • the alert mining device calls the alert mining program stored in the memory 1005 through the processor 1001 to perform the following operations:
  • the original police information is grouped according to the mobile phone SIM card number and the electronic fence ID, or according to the mobile phone body code and the electronic fence ID.
  • One of the groups is a police record, and one police record corresponds to an electronic fence.
  • the alert mining device calls the alert mining program stored in the memory 1005 through the processor 1001 to perform the following operations:
  • a mobile phone whitelist is set, and the mobile phone whitelist includes: a number of mobile phone SIM card numbers and / or a number of mobile phone body codes.
  • the alert mining device calls the alert mining program stored in the memory 1005 through the processor 1001 to perform the following operations:
  • the alert mining device calls the alert mining program stored in the memory 1005 through the processor 1001 to perform the following operations:
  • the mobile phone information subjected to data format conversion is stored in the database.
  • the alert mining device calls the alert mining program stored in the memory 1005 through the processor 1001 to perform the following operations:
  • the filtered alarm data is written into a preset alarm table in the database to form an alarm record; the alarm record is read from the alarm table as alarm data to be pushed.
  • the invention also provides a police intelligence mining system.
  • FIG. 2 is a schematic diagram of a functional architecture of an embodiment of a police situation mining system according to the present invention.
  • the police intelligence mining system includes:
  • the electronic fence device is deployed in large public places, such as installed at a high altitude position in the square of the railway station, and is used to capture all mobile phone information entering the area covered by the electronic fence.
  • the mobile phone in the present invention may be replaced with another terminal device that can be inserted into a SIM card, such as a tablet computer.
  • a terminal device with a SIM card enters the coverage area of the electronic fence
  • the terminal device information captured by the electronic fence device may include information such as the body code of the terminal device in addition to the SIM card number.
  • the police platform is a service platform for handling police affairs. Through the police platform, public security organs can collect various police information provided by the outside world.
  • the police intelligence mining device which is wired or wirelessly connected to the electronic fence equipment and the police platform respectively, is used to receive the police intelligence information collected by the electronic fence equipment and perform data mining to obtain the warning information with the characteristics of the police intelligence.
  • the alarm information is pushed to the police platform for processing.
  • the police information mining device pushes alarm information.
  • the police information mining device can push the alarm information to the police platform through the WeChat public account.
  • FIG. 3 is a schematic flowchart of a first embodiment of a method for mining alarm information according to the present invention.
  • the alarm mining method includes the following steps:
  • Step S10 Read the original police information stored in the database.
  • the original police information includes: electronic fence information and mobile phone information captured by the electronic fence;
  • the mobile phone information collected by the electronic fence device is stored in the database as the original police information in advance for the police information mining device to read and perform police information mining.
  • the data format is converted first, and then the mobile phone after the data format conversion is performed.
  • Information is stored in a database.
  • the specific data conversion format is not limited, such as decoding the mobile phone information based on the information encoding format of the mobile phone, and then storing the decoded mobile phone data according to the storage format requirements, such as storing the mobile phone information in JSON format.
  • the mobile phone information includes: the mobile phone SIM card number, the mobile phone body code, and the time when the mobile phone enters or leaves the area covered by the electronic fence;
  • the electronic fence information includes: the electronic fence ID, which is preset before the electronic fence is installed.
  • step S20 data mining is performed on the original alarm information to filter out alarm data with alarm characteristics
  • the specific implementation manner of the data mining in this embodiment is not limited. Data mining of the original police information needs to be based on the characteristics of the police. For example, theft usually occurs at night, and pickpocketing is reflected in the frequency of occurrence. For example, if a suspect appears multiple times in a public place, it is suspected of pickpocketing. .
  • the police intelligence mining device performs data mining on the original police intelligence information, thereby filtering out the mobile phone information with the characteristics of police intelligence and using it as the alarm data.
  • Step S30 Push the alarm data to a police platform.
  • the alarm mining device pushes the alarm data to the police platform, so as to provide police personnel with criminal clues and information, so that the police personnel can be timely Solve the case.
  • FIG. 4 is a schematic flowchart of a second embodiment of a method for mining alarm conditions according to the present invention. Based on the above embodiment, in this embodiment, before the step of reading the original alarm information stored in the database, the method further includes:
  • Step S40 Set parameters for alarm mining, the parameters include: time span of alarm mining, trigger time for performing alarm mining, and parameters related to alarm data screening.
  • this embodiment needs to set parameters for police information mining in advance.
  • a trigger time for performing alarm mining is set so as to respond to daily addition of mobile phone information. For example, an alarm mining task is triggered every day at 00:00:00.
  • the time span specifically refers to the amount of data that needs to be processed for an alert situation mining task. For example, each time an alert situation mining is performed on the mobile phone information collected in the last 7 days, the last 7 days is the time span of alert situation mining.
  • the alarm data needs to be filtered out from the mass data through the screening conditions, so the parameters corresponding to the screening conditions need to be set.
  • the parameter related to the filtering of the alarm data is preferably the number of times that the same electronic fence has captured the same mobile phone information within a preset time span. For example, if the same mobile phone information appears within the coverage area of the same electronic fence for 7 consecutive days, the information has a police feature (such as pickpocketing).
  • the implementation process of the alarm situation mining method is as follows:
  • an alarm mining task is triggered every day at 00:00:00 every morning, and the original alarm information collected within the last 7 days is read from the database.
  • the trigger time interval is set to 1 day, which can ensure the timeliness of the alarm data, and the data time span is 7 days (or other days). It can retain the characteristics of data continuity to a certain extent, so that it can dig out more For in-depth alert.
  • the original police information is grouped according to the mobile phone SIM card number and the electronic fence ID, or according to the mobile phone body code and the electronic fence ID.
  • One of the groups is a police record and one police record corresponds to an electronic fence A piece of mobile phone information captured;
  • the “number of occurrences of the same mobile phone information within the coverage area of the same electronic fence within a specified time span” is used as the filter condition of the alarm data, and the mobile phone SIM card number and the electronic fence ID or the mobile phone body code and the electronic fence ID is the basis of grouping, which groups all the original police information mined by this police situation.
  • the number of occurrences of the same mobile phone information in the same electronic fence within the specified time span is N
  • the data corresponding to the total number of alarm records of the same alarm record exceeding N from all the groups is filtered out Is the alarm data.
  • a mobile phone whitelist is provided in the embodiment, and the mobile phone whitelist includes: a number of mobile phone SIM card numbers and / or a number of mobile phone body codes.
  • the alarm data After filtering the alarm data that meets the characteristics of the alarm condition, the alarm data is filtered based on the set mobile phone whitelist to filter out the alarm data corresponding to the invalid alarm condition, and finally the filtered alarm data is pushed to police platform.
  • FIG. 5 is a schematic flowchart of a third embodiment of an alarm mining method according to the present invention. Based on the above embodiment, in this embodiment, before the step of pushing the alarm data to the police platform, the method further includes:
  • Step S50 Write the filtered alarm data into a preset alarm table in the database to form an alarm record
  • Step S60 Read the alarm record from the alarm table as the alarm data to be pushed.
  • the alarm table includes several alarm records, and each alarm record is provided with a push status.
  • the push status of the alarm record is defaulted to the non-push status.
  • the alarm records in a non-pushing state are read by periodically polling the alarm table, and the pushing status of the currently pushed alarm records is changed to a pushed state.
  • an alarm record will be formed according to a preset format.
  • the alarm record includes the following fields:
  • Mobile phone field the field value is the mobile phone SIM card number and / or mobile phone body code
  • E-fence field the field value is the ID of the electronic fence or the location where the electronic fence equipment is deployed
  • the number of captures field is an integer indicating the number of times the suspect appeared. Each occurrence corresponds to a time to enter the fence and a time to leave the fence.
  • the field value is time, which indicates the time when the suspect appeared
  • Departure fence time field the field value is time, indicating the time when the suspect left
  • Alarm time field the field value is time, which indicates the time of this push alarm
  • Push status field A field value of 0 indicates not pushed, and a field value of 1 indicates pushed.
  • the invention also provides a computer-readable storage medium.
  • a computer-readable storage medium stores a police-mining program, and when the police-mining program is executed by a processor, the steps of the police-mining method described in any one of the foregoing embodiments are implemented.
  • the methods in the above embodiments can be implemented by means of software plus a necessary universal hardware platform, and of course, also by hardware, but in many cases the former is better.
  • Implementation Based on such an understanding, the technical solution of the present invention in essence or part that contributes to the existing technology can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium (such as ROM / RAM), including Several instructions are used to cause a terminal (which may be a mobile phone, a computer, a server, or a network device, etc.) to execute the methods described in the embodiments of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明公开了一种警情挖掘方法,包括以下步骤:读取数据库中存储的原始警情信息,所述原始警情信息包括:电子围栏信息及电子围栏捕获的手机信息;对所述原始警情信息进行数据挖掘,以筛选出具有警情特点的告警数据;将所述告警数据推送至警务平台。本发明还公开了一种警情挖掘装置、系统及计算机可读存储介质。本发明通过数据挖掘,实现了警情信息的自动甄别,节省了警力,同时还可以自动向警务平台进行告警。

Description

警情挖掘方法、装置、系统及存储介质
技术领域
本发明涉及通信技术领域,尤其涉及一种警情挖掘方法、装置、系统及计算机可读存储介质。
背景技术
当前,在一些人流量较大的公共场所,比如火车站、汽车站等场所,经常会存在一些犯罪行为,比如偷盗、扒窃等,对于这类隐蔽性强、随机性大的犯罪行为,目前尚没有一种有效的技术手段进行针对性侦查破案,目前的解决方案基本上是便衣警察现场驻点侦查,守株待兔,而这种方式不仅浪费警力且效率低下。
发明内容
本发明的主要目的在于提供一种警情挖掘方法、装置、系统及计算机可读存储介质,旨在解决如何高效甄别大型公开场所内警情的技术问题。
为实现上述目的,本发明提供一种警情挖掘方法,所述警情挖掘方法包括以下步骤:
读取数据库中存储的原始警情信息,所述原始警情信息包括:电子围栏信息及电子围栏捕获的手机信息;
对所述原始警情信息进行数据挖掘,以筛选出具有警情特点的告警数据;
将所述告警数据推送至警务平台。
可选地,所述手机信息包括:手机SIM卡号、手机机身码、手机进入或离开电子围栏覆盖区域的时间;所述电子围栏信息包括:电子围栏ID。
可选地,在所述读取数据库中存储的原始警情信息的步骤之前还包括:
设置用于警情挖掘的参数,所述参数包括:警情挖掘的时间跨度、执行警情挖掘的触发时间、与告警数据筛选相关的参数。
可选地,所述与告警数据筛选相关的参数包括:预设时间跨度内同一电子围栏捕获到同一手机信息的次数。
可选地,所述读取数据库中存储的原始警情信息包括:
在当前时间为所述执行警情挖掘的触发时间时,从数据库中读取最新的所述警情挖掘的时间跨度内的原始警情信息;
所述对所述原始警情信息进行数据挖掘,以筛选出具有警情特点的告警数据包括:
根据手机SIM卡号与电子围栏ID、或者根据手机机身码与电子围栏ID,对所述原始警情信息进行分组,其中,一个分组为一条警情记录,一条警情记录对应一个电子围栏捕获到的一条手机信息;
从所有分组中筛选出相同警情记录的总条数超过预设条数的警情记录,并将该警情记录对应数据作为告警数据。
可选地,在所述读取数据库中存储的原始警情信息的步骤之前还包括:
设置手机白名单,所述手机白名单包括:若干手机SIM卡号和/或若干手机机身码;
在所述对所述原始警情信息进行数据挖掘,以筛选出具有警情特点的告警数据的步骤之后还包括:
基于所述手机白名单,对所述告警数据进行过滤,以筛除无效警情对应的告警数据。
可选地,在所述读取数据库中存储的原始警情信息的步骤之前还包括:
接收电子围栏捕获的原始手机信息,并进行数据格式转换;
将进行数据格式转换的手机信息存储至所述数据库中。
可选地,在所述对所述原始警情信息进行数据挖掘,以筛选出具有警情特点的告警数据的步骤之后还包括:将筛选出的所述告警数据写入所述数据库内预设的告警表中,以形成告警记录;
在所述将所述告警数据推送至警务平台的步骤之前还包括:从所述告警表中读取所述告警记录作为待推送的告警数据。
可选地,所述告警表中包括若干告警记录,每一条告警记录设有一个推送状态;
所述从所述告警表中读取所述告警记录包括:定时轮询所述告警表,读取处于未推送状态的告警记录作为待推送的告警数据。
可选地,所述告警记录包括以下字段:手机字段、电子围栏字段、捕获次数字段、进入围栏时间字段、离开围栏时间字段、告警时间字段。
进一步地,为实现上述目的,本发明还提供一种警情挖掘装置,所述警情挖掘装置包括:存储器、处理器以及存储在所述存储器上并可在所述处理器上运行的警情挖掘程序,所述警情挖掘程序被所述处理器执行时实现上述任一项所述的警情挖掘方法的步骤。
进一步地,为实现上述目的,本发明还提供一种警情挖掘系统,所述警情挖掘系统包括:电子围栏设备、警务平台以及如上所述的警情挖掘装置;所述警情挖掘装置分别与所述电子围栏设备、所述警务平台有线或无线连接。
可选地,所述电子围栏设备部署在大型公共场所,用于捕获进入电子围栏覆盖区域内的所有手机信息。
进一步地,为实现上述目的,本发明还提供一种计算机可读存储介质,所述计算机可读存储介质上存储有警情挖掘程序,所述警情挖掘程序被处理器执行时实现如上述任一项所述的警情挖掘方法的步骤。
本发明在警情比较频繁的公共场所,如火车站、汽车站等,采用电子围栏技术采集该区域范围内人群的手机信息,并以采集的手机信息作为原始的警情信息进行数据挖掘,通过大数据分析从而筛选出具有警情特点的告警数据,进而可从海量人群中有效甄别出犯罪嫌疑人,并基于手机信息而最终锁定犯罪嫌疑人,实现了警情信息的自动甄别,节省了警力,同时还可以自动向警务平台进行告警。
附图说明
图1为本发明警情挖掘装置实施例方案涉及的设备硬件运行环境的结构示意图;
图2为本发明警情挖掘系统一实施例的功能架构示意图;
图3为本发明警情挖掘方法第一实施例的流程示意图;
图4为本发明警情挖掘方法第二实施例的流程示意图;
图5为本发明警情挖掘方法第三实施例的流程示意图。
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
应当理解,此处所描述的具体实施例仅用以解释本发明,并不用于限定本发明。
本发明提供一种警情挖掘装置。
参照图1,图1为本发明警情挖掘装置实施例方案涉及的设备硬件运行环境的结构示意图。
如图1所示,警情挖掘装置可以包括:处理器1001,例如CPU,通信总线1002、用户接口1003,网络接口1004,存储器1005。其中,通信总线1002用于实现这些组件之间的连接通信。用户接口1003可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口1003还可以包括标准的有线接口、无线接口。网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器。存储器1005可选的还可以是独立于前述处理器1001的存储设备。需要说明的是,处理器1001采用嵌入式芯片方式安装在警情挖掘装置内。
本领域技术人员可以理解,图1中示出的警情挖掘装置的硬件结构并不构成对警情挖掘装置的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
如图1所示,作为一种计算机可读存储介质的存储器1005中可以包括操作系统、网络通信模块、用户接口模块以及警情挖掘程序。其中,操作系统是管理和控制警情挖掘装置与软件资源的程序,支持网络通信模块、用户接口模块、警情挖掘程序以及其他程序或软件的运行;网络通信模块用于管理和控制网络接口1004;用户接口模块用于管理和控制用户接口1003。
在图1所示的警情挖掘装置硬件结构中,网络接口1004主要用于连接系统后台,与系统后台进行数据通信;用户接口1003主要用于连接客户端(用户端),与客户端进行数据通信;警情挖掘装置通过处理器1001调用存储器1005中存储的警情挖掘程序,并执行以下操作:
读取数据库中存储的原始警情信息,所述原始警情信息包括:电子围栏信息及电子围栏捕获的手机信息;
对所述原始警情信息进行数据挖掘,以筛选出具有警情特点的告警数据;
将所述告警数据推送至警务平台。
进一步地,警情挖掘装置通过处理器1001调用存储器1005中存储的警情挖掘程序还执行以下操作:
设置用于警情挖掘的参数,所述参数包括:警情挖掘的时间跨度、执行警情挖掘的触发时间、与告警数据筛选相关的参数。
进一步地,警情挖掘装置通过处理器1001调用存储器1005中存储的警情挖掘程序还执行以下操作:
在当前时间为所述执行警情挖掘的触发时间时,从数据库中读取最新的所述警情挖掘的时间跨度内的原始警情信息;
所述对所述原始警情信息进行数据挖掘,以筛选出具有警情特点的告警数据包括:
根据手机SIM卡号与电子围栏ID、或者根据手机机身码与电子围栏ID,对所述原始警情信息进行分组,其中,一个分组为一条警情记录,一条警情记录对应一个电子围栏捕获到的一条手机信息;
从所有分组中筛选出相同警情记录的总条数超过预设条数的警情记录,并将该警情记录对应数据作为告警数据。
进一步地,警情挖掘装置通过处理器1001调用存储器1005中存储的警情挖掘程序还执行以下操作:
设置手机白名单,所述手机白名单包括:若干手机SIM卡号和/或若干手机机身码。
进一步地,警情挖掘装置通过处理器1001调用存储器1005中存储的警情挖掘程序还执行以下操作:
基于所述手机白名单,对所述告警数据进行过滤,以筛除无效警情对应的告警数据。
进一步地,警情挖掘装置通过处理器1001调用存储器1005中存储的警情挖掘程序还执行以下操作:
接收电子围栏捕获的原始手机信息,并进行数据格式转换;
将进行数据格式转换的手机信息存储至所述数据库中。
进一步地,警情挖掘装置通过处理器1001调用存储器1005中存储的警情挖掘程序还执行以下操作:
将筛选出的所述告警数据写入所述数据库内预设的告警表中,以形成告警记录;从所述告警表中读取所述告警记录作为待推送的告警数据。
本发明还提供一种警情挖掘系统。
参照图2,图2为本发明警情挖掘系统一实施例的功能架构示意图。
本实施例中,警情挖掘系统包括:
(1)电子围栏设备,部署在大型公共场所,比如安装在火车站广场的高空位置,用于捕获进入电子围栏覆盖区域内的所有手机信息。
本发明中的手机可替换为其它可插入SIM卡的终端设备,比如平板电脑。相应的,当带有SIM卡的终端设备进入电子围栏覆盖区域时,电子围栏设备捕获的终端设备信息除SIM卡号外,还可以包括终端设备的机身码等信息。
(2)警务平台,用于处理警务的服务平台,公安机关通过警务平台可以收集外界提供的各种警情信息。
(3)警情挖掘装置,分别与电子围栏设备、警务平台有线或无线连接,用于接收电子围栏设备采集的警情信息并进行数据挖掘,以获得具有警情特点的告警信息,并将告警信息推送给警务平台进行处理。
其中,对于警情挖掘装置推送告警信息的方式不限,比如,警务平台有进行微信公众号部署,则警情挖掘装置可将告警信息通过微信公众号推送给警务平台。
基于上述警情挖掘装置及系统,提出本发明警情挖掘方法的以下各实施例。
基于通信的便利性,现今人们通常人手一部手机并且由用户随身携带,因此,基于这一现象,通过采集用户的手机信息来进行警情挖掘是可行的。此外,由于当前实行手机实名制,因而可通过定位手机信息而锁定嫌疑人,从而实现了从海量数据中警情信息的自动甄别,提升了警情信息的收集效率,节省了警力。
参照图3,图3为本发明警情挖掘方法第一实施例的流程示意图。本实施例中,所述警情挖掘方法包括以下步骤:
步骤S10,读取数据库中存储的原始警情信息,所述原始警情信息包括:电子围栏信息及电子围栏捕获的手机信息;
本实施例中,预先将电子围栏设备采集的手机信息作为原始警情信息保存在数据库中,以供警情挖掘装置读取进行警情挖掘。
可选的,在一实施例中,为便于警情挖掘装置进行数据挖掘,因此,当接收到电子围栏捕获的原始手机信息时,先进行数据格式转换,然后再将进行数据格式转换后的手机信息存储至数据库中。具体的数据转换格式不限,比如基于手机的信息编码格式解码手机信息,然后按照存储格式要求存储解码得到的手机数据,比如采用JSON格式保存手机信息。
可选的,手机信息包括:手机SIM卡号、手机机身码、手机进入或离开电子围栏覆盖区域的时间;电子围栏信息包括:电子围栏ID,该ID在电子围栏安装前预先设定。
步骤S20,对所述原始警情信息进行数据挖掘,以筛选出具有警情特点的告警数据;
本实施例对于数据挖掘的具体实现方式不限。对原始警情信息进行数据挖掘需要基于警情自身的特点,比如偷盗通常发生在夜里,而扒窃则体现在出现频率上,比如嫌疑人在某一公共场所连续出现多次,则其具有扒窃嫌疑。
警情挖掘装置通过对原始警情信息进行数据挖掘,从而筛选出具有警情特点的手机信息并将其作为告警数据。
步骤S30,将所述告警数据推送至警务平台。
当从原始警情信息中筛选出具有警情特点的告警数据后,警情挖掘装置将该告警数据推送至警务平台,从而为警务人员提供犯罪线索和资料信息,以便于警务人员及时破案。
本实施例在警情比较频繁的公共场所,如火车站、汽车站等,采用电子围栏技术采集该区域范围内人群的手机信息,并以采集的手机信息作为原始的警情信息进行数据挖掘,通过大数据分析从而筛选出具有警情特点的告警数据,进而可从海量人群中有效甄别出犯罪嫌疑人,并基于手机信息而最终锁定犯罪嫌疑人,实现了警情信息的自动甄别,节省了警力,同时还可以自动向警务平台进行告警。
参照图4,图4为本发明警情挖掘方法第二实施例的流程示意图。基于上述实施例,本实施例中,在读取数据库中存储的原始警情信息的步骤之前还包括:
步骤S40,设置用于警情挖掘的参数,所述参数包括:警情挖掘的时间跨度、执行警情挖掘的触发时间、与告警数据筛选相关的参数。
由于电子围栏设备每天都会采集海量的手机信息,因此,为便于进行警情挖掘,本实施例需要预先设置用于警情挖掘的参数。
(1)执行警情挖掘的触发时间
本实施例设置执行警情挖掘的触发时间,以便应对每日新增的手机信息。例如,在每日的凌晨零点零分零秒触发一个警情挖掘任务。
(2)警情挖掘的时间跨度
本实施例中,时间跨度具体指一个警情挖掘任务所需处理的数据量,比如每次对最近7天内采集的手机信息进行警情挖掘,则最近7天为警情挖掘的时间跨度。
(3)与告警数据筛选相关的参数
本实施例中,告警数据需要通过筛选条件才能从海量数据中筛选出来,因而需要设定筛选条件对应的参数。
可选的,与告警数据筛选相关的参数优选为:预设时间跨度内同一电子围栏捕获到同一手机信息的次数。比如连续7天内同一手机信息在同一电子围栏覆盖范围内出现,则该信息具有警情特点(比如扒窃警情)。
进一步地,基于上述参数要求,在本发明警情挖掘方法一较佳实施例中,警情挖掘方法的实现流程如下:
1、在当前时间为所述执行警情挖掘的触发时间时,从数据库中读取最新的所述警情挖掘的时间跨度内的原始警情信息;
例如,在每天凌晨零点零分零秒触发一个警情挖掘任务,从数据库中读取最近7内采集的原始警情信息。其中,触发时间的间隔设为1天,可以保证告警数据的时效性,而数据时间跨度为7天(也可以是其他天数)可以在一定程度上保留数据连续性的特点,从而可以挖掘出更为深入的警情。
2、根据手机SIM卡号与电子围栏ID、或者根据手机机身码与电子围栏ID,对所述原始警情信息进行分组,其中,一个分组为一条警情记录,一条警情记录对应一个电子围栏捕获到的一条手机信息;
本实施例中具体以“在指定的时间跨度内同一手机信息在同一电子围栏覆盖范围内出现的次数”作为告警数据的筛选条件,以手机SIM卡号与电子围栏ID或者手机机身码与电子围栏ID为分组依据,对本次警情挖掘的所有原始警情信息进行分组。
3、从所有分组中筛选出相同警情记录的总条数超过预设条数的警情记录,并将该警情记录对应数据作为告警数据。
假设“在指定的时间跨度内同一手机信息在同一电子围栏覆盖范围内出现的次数为N”,则从所有分组中筛选出相同警情记录的总条数超过N的警情记录对应的数据即为告警数据。
4、将所述告警数据推送至警务平台。
将上述通过数据挖掘而筛选得到的告警数据推送给警务平台,以便警务人员基于告警数据侦破案件。
进一步可选的,鉴于公共场所中可能存在某些符合警情特点的无效警情,比如火车站工作人员上下班,对于这类无效警情,需要在推送警务平台之前剔除掉,因此,本实施例中设有手机白名单,该手机白名单包括:若干手机SIM卡号和/或若干手机机身码。
当筛选出符合警情特点的告警数据后,再基于设定的手机白名单,对所述告警数据进行过滤,以筛除无效警情对应的告警数据,最后再将过滤后的告警数据推送给警务平台。
参照图5,图5为本发明警情挖掘方法第三实施例的流程示意图。基于上述实施例,本实施例中,在将所述告警数据推送至警务平台的步骤之前还包括:
步骤S50,将筛选出的所述告警数据写入所述数据库内预设的告警表中,以形成告警记录;
步骤S60,从所述告警表中读取所述告警记录作为待推送的告警数据。
可选的,告警表中包括若干告警记录,每一条告警记录设有一个推送状态,其中,在生成一条新的告警记录时,默认该条告警记录的推送状态为未推送状态。
可选的,采用定时轮询告警表的方式读取处于未推送状态的告警记录,并更改当前推送的告警记录的推送状态为已推送状态。
可选的,为便于警务人员了解警情挖掘所推送的内容,因此,在筛选出告警数据后,将按照预设的格式形成告警记录,告警记录包括以下字段:
(1)手机字段,字段值为手机SIM卡号和/或手机机身码;
(2)电子围栏字段,字段值为电子围栏ID或电子围栏设备部署的位置;
(3)捕获次数字段,字段值为整数,表示嫌疑人出现的次数,每一次出现对应一个进入围栏时间和一个离开围栏时间;
(4)进入围栏时间字段,字段值为时间,表示嫌疑人出现的时间;
(5)离开围栏时间字段,字段值为时间,表示嫌疑人离开的时间;
(6)告警时间字段,字段值为时间,表示本次推送告警的时间;
(7)推送状态字段,字段值为0表示未推送、字段值为1表示已推送。
本发明还提供一种计算机可读存储介质。
本实施例中,计算机可读存储介质上存储有警情挖掘程序,所述警情挖掘程序被处理器执行时实现上述任一项实施例中所述的警情挖掘方法的步骤。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器或者网络设备等)执行本发明各个实施例所述的方法。
上面结合附图对本发明的实施例进行了描述,但是本发明并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本发明的启示下,在不脱离本发明宗旨和权利要求所保护的范围情况下,还可做出很多形式,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,这些均属于本发明的保护之内。

Claims (14)

  1. 一种警情挖掘方法,其特征在于,所述警情挖掘方法包括以下步骤:
    读取数据库中存储的原始警情信息,所述原始警情信息包括:电子围栏信息及电子围栏捕获的手机信息;
    对所述原始警情信息进行数据挖掘,以筛选出具有警情特点的告警数据;
    将所述告警数据推送至警务平台。
  2. 如权利要求1所述的警情挖掘方法,其特征在于,所述手机信息包括:手机SIM卡号、手机机身码、手机进入或离开电子围栏覆盖区域的时间;所述电子围栏信息包括:电子围栏ID。
  3. 如权利要求2所述的警情挖掘方法,其特征在于,在所述读取数据库中存储的原始警情信息的步骤之前还包括:
    设置用于警情挖掘的参数,所述参数包括:警情挖掘的时间跨度、执行警情挖掘的触发时间、与告警数据筛选相关的参数。
  4. 如权利要求3所述的警情挖掘方法,其特征在于,所述与告警数据筛选相关的参数包括:预设时间跨度内同一电子围栏捕获到同一手机信息的次数。
  5. 如权利要求4所述的警情挖掘方法,其特征在于,所述读取数据库中存储的原始警情信息包括:
    在当前时间为所述执行警情挖掘的触发时间时,从数据库中读取最新的所述警情挖掘的时间跨度内的原始警情信息;
    所述对所述原始警情信息进行数据挖掘,以筛选出具有警情特点的告警数据包括:
    根据手机SIM卡号与电子围栏ID、或者根据手机机身码与电子围栏ID,对所述原始警情信息进行分组,其中,一个分组为一条警情记录,一条警情记录对应一个电子围栏捕获到的一条手机信息;
    从所有分组中筛选出相同警情记录的总条数超过预设条数的警情记录,并将该警情记录对应数据作为告警数据。
  6. 如权利要求2-5任一项所述的警情挖掘方法,其特征在于,在所述读取数据库中存储的原始警情信息的步骤之前还包括:
    设置手机白名单,所述手机白名单包括:若干手机SIM卡号和/或若干手机机身码;
    在所述对所述原始警情信息进行数据挖掘,以筛选出具有警情特点的告警数据的步骤之后还包括:
    基于所述手机白名单,对所述告警数据进行过滤,以筛除无效警情对应的告警数据。
  7. 如权利要求1所述的警情挖掘方法,其特征在于,在所述读取数据库中存储的原始警情信息的步骤之前还包括:
    接收电子围栏捕获的原始手机信息,并进行数据格式转换;
    将进行数据格式转换的手机信息存储至所述数据库中。
  8. 如权利要求2-5任一项所述的警情挖掘方法,其特征在于,在所述对所述原始警情信息进行数据挖掘,以筛选出具有警情特点的告警数据的步骤之后还包括:将筛选出的所述告警数据写入所述数据库内预设的告警表中,以形成告警记录;
    在所述将所述告警数据推送至警务平台的步骤之前还包括:从所述告警表中读取所述告警记录作为待推送的告警数据。
  9. 如权利要求8所述的警情挖掘方法,其特征在于,所述告警表中包括若干告警记录,每一条告警记录设有一个推送状态;
    所述从所述告警表中读取所述告警记录作为待推送的告警数据包括:定时轮询所述告警表,读取处于未推送状态的告警记录作为待推送的告警数据。
  10. 如权利要求8所述的警情挖掘方法,其特征在于,所述告警记录包括以下字段:手机字段、电子围栏字段、捕获次数字段、进入围栏时间字段、离开围栏时间字段、告警时间字段。
  11. 一种警情挖掘装置,其特征在于,所述警情挖掘装置包括:存储器、处理器以及存储在所述存储器上并可在所述处理器上运行的警情挖掘程序,所述警情挖掘程序被所述处理器执行时实现如权利要求1-10任一项所述的警情挖掘方法的步骤。
  12. 一种警情挖掘系统,其特征在于,所述警情挖掘系统包括:电子围栏设备、警务平台以及如权利要求11所述的警情挖掘装置;所述警情挖掘装置分别与所述电子围栏设备、所述警务平台有线或无线连接。
  13. 如权利要求12所述的警情挖掘系统,其特征在于,所述电子围栏设备部署在大型公共场所,用于捕获进入电子围栏覆盖区域内的所有手机信息。
  14. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有警情挖掘程序,所述警情挖掘程序被处理器执行时实现如权利要求1-10任一项所述的警情挖掘方法的步骤。
PCT/CN2018/091897 2018-06-20 2018-06-20 警情挖掘方法、装置、系统及存储介质 WO2019241915A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/091897 WO2019241915A1 (zh) 2018-06-20 2018-06-20 警情挖掘方法、装置、系统及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/091897 WO2019241915A1 (zh) 2018-06-20 2018-06-20 警情挖掘方法、装置、系统及存储介质

Publications (1)

Publication Number Publication Date
WO2019241915A1 true WO2019241915A1 (zh) 2019-12-26

Family

ID=68983147

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/091897 WO2019241915A1 (zh) 2018-06-20 2018-06-20 警情挖掘方法、装置、系统及存储介质

Country Status (1)

Country Link
WO (1) WO2019241915A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113610451A (zh) * 2021-06-22 2021-11-05 陕西同力重工股份有限公司 利用电子围栏对露天矿山车辆管理的方法、装置及系统

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005267525A (ja) * 2004-03-22 2005-09-29 Toko Electric Corp 入退場受付システムおよび行先管理システム
CN103491520A (zh) * 2012-06-11 2014-01-01 江苏擎天信息科技有限公司 监控移动通信终端持有者行踪的设备及其监控方法
CN204046693U (zh) * 2014-06-17 2014-12-24 王传琪 一种公安用电子围栏
CN205356692U (zh) * 2016-01-21 2016-06-29 深圳市斯普瑞特通信技术有限公司 Td-scdma电子围栏系统
CN106205143A (zh) * 2016-08-29 2016-12-07 苏州金螳螂怡和科技有限公司 智能卡口联网系统
CN106781151A (zh) * 2016-12-28 2017-05-31 重庆金鑫科技产业发展有限公司 一种电子围栏控制系统以及电子围栏
CN107358158A (zh) * 2017-06-07 2017-11-17 浙江大华技术股份有限公司 一种团伙作案预警方法及装置

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005267525A (ja) * 2004-03-22 2005-09-29 Toko Electric Corp 入退場受付システムおよび行先管理システム
CN103491520A (zh) * 2012-06-11 2014-01-01 江苏擎天信息科技有限公司 监控移动通信终端持有者行踪的设备及其监控方法
CN204046693U (zh) * 2014-06-17 2014-12-24 王传琪 一种公安用电子围栏
CN205356692U (zh) * 2016-01-21 2016-06-29 深圳市斯普瑞特通信技术有限公司 Td-scdma电子围栏系统
CN106205143A (zh) * 2016-08-29 2016-12-07 苏州金螳螂怡和科技有限公司 智能卡口联网系统
CN106781151A (zh) * 2016-12-28 2017-05-31 重庆金鑫科技产业发展有限公司 一种电子围栏控制系统以及电子围栏
CN107358158A (zh) * 2017-06-07 2017-11-17 浙江大华技术股份有限公司 一种团伙作案预警方法及装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113610451A (zh) * 2021-06-22 2021-11-05 陕西同力重工股份有限公司 利用电子围栏对露天矿山车辆管理的方法、装置及系统
CN113610451B (zh) * 2021-06-22 2023-10-20 陕西同力重工股份有限公司 利用电子围栏对露天矿山车辆管理的方法、装置及系统

Similar Documents

Publication Publication Date Title
WO2019061613A1 (zh) 贷款资质筛选方法、装置及计算机可读存储介质
WO2018159971A1 (en) Operating method of electronic device for function execution based on voice command in locked state and electronic device supporting the same
WO2017146437A1 (en) Electronic device and method for operating the same
WO2018107610A1 (zh) 业务数据处理方法、系统、设备及计算机可读存储介质
WO2015163741A1 (ko) 사용자 단말 장치 및 그의 잠금 화면 표시 방법
WO2011008033A2 (en) Terminal calculating carbon emission, carbon emission management server and carbon monitoring method
WO2017026659A1 (en) Antenna structure and electronic device including the same
WO2019140804A1 (zh) 一种可疑交易监测方法、装置、设备及存储介质
WO2016006977A1 (en) Apparatus, server, system and method for energy measuring
WO2015122590A1 (en) Electronic device and method for controlling the same
WO2015139594A1 (en) Security verification method, apparatus, and system
WO2017054592A1 (zh) 一种界面显示的方法及终端
WO2019024219A1 (zh) 文档自动生成方法、装置、文档自动生成器及介质
WO2019104876A1 (zh) 保险产品的推送方法、系统、终端、客户终端及存储介质
WO2019019351A1 (zh) 用户行为数据处理方法、装置及计算机可读存储介质
WO2016182127A1 (en) Mobile terminal and controlling method thereof
WO2018076864A1 (zh) 一种数据同步方法、装置、存储介质及电子设备
WO2019161597A1 (zh) 基于即时通讯的信息发送方法、装置、设备和存储介质
WO2018097505A1 (ko) 안테나를 포함하는 전자 장치
WO2014142412A1 (en) Mobile device and control method for the same
WO2015190755A1 (ko) 네비게이션 장치의 지도 데이터 제공 방법 및 시스템
WO2021215787A1 (ko) 무선 ip 카메라 탐지 시스템 및 방법
WO2018174513A1 (ko) 스마트폰을 이용한 통화중 어플리케이션 연계 시스템 및 방법
WO2019241915A1 (zh) 警情挖掘方法、装置、系统及存储介质
WO2015169177A1 (en) Web page display method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18923501

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18923501

Country of ref document: EP

Kind code of ref document: A1