WO2020114131A1 - 同行分析方法及装置 - Google Patents

同行分析方法及装置 Download PDF

Info

Publication number
WO2020114131A1
WO2020114131A1 PCT/CN2019/112666 CN2019112666W WO2020114131A1 WO 2020114131 A1 WO2020114131 A1 WO 2020114131A1 CN 2019112666 W CN2019112666 W CN 2019112666W WO 2020114131 A1 WO2020114131 A1 WO 2020114131A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
terminal
mobile terminal
time
matching result
Prior art date
Application number
PCT/CN2019/112666
Other languages
English (en)
French (fr)
Inventor
刘若鹏
栾琳
季春霖
张莎莎
Original Assignee
西安光启未来技术研究院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 西安光启未来技术研究院 filed Critical 西安光启未来技术研究院
Publication of WO2020114131A1 publication Critical patent/WO2020114131A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Definitions

  • the present invention relates to the field of communications, and in particular, to a peer analysis method and device.
  • Embodiments of the present invention provide a peer analysis method and device to at least solve the technical problem of time-consuming, laborious, and inefficient efficiency in conducting investigation work by manually browsing and finding suspect targets in related technologies.
  • a peer analysis method which includes: acquiring, by a detection device, a terminal identification of a mobile terminal located in a target area covered by the detection device; the terminal identification includes the target terminal’s
  • alarm information is issued in the monitoring device, wherein the alarm information is used to prompt the target object associated with the target terminal identification to appear in the target area; obtain the mobile terminal at the target time Location information within a segment, wherein the target time period includes multiple time slices; analyzing the acquired location information to obtain a peer analysis result of the target terminal, wherein the peer analysis result includes the movement Among the terminals, within one time slice of the plurality of time slices, a terminal with a distance less than a target distance threshold from the target terminal.
  • a peer analysis device including: a collection unit for collecting, by a detection device, a terminal identification of a mobile terminal located in a target area covered by the detection device; an alarm unit, used In the case that the terminal identification includes the target terminal identification of the target terminal, an alarm message is issued in the monitoring device, wherein the alarm information is used to prompt the target object associated with the target terminal identification to appear on the target Within the area; an acquisition unit for acquiring the location information of the mobile terminal within a target time period, wherein the target time period includes multiple time slices; an analysis unit for analyzing the acquired location information, Obtaining a peer analysis result of the target terminal, where the peer analysis result includes the mobile terminal, within one time slice of the plurality of time slices, a terminal with a distance less than a target distance threshold within a time slice of the plurality of time slices .
  • a storage medium in which a computer program is stored, wherein the computer program is configured to execute the steps in any one of the above method embodiments at runtime.
  • an electronic device including a memory and a processor, the memory stores a computer program, the processor is configured to run the computer program to perform any of the above The steps in the method embodiment.
  • the terminal identification of the mobile terminal located in the target area covered by the detection device is collected by the detection device; when the terminal identification includes the target terminal identification of the target terminal, alarm information is issued in the monitoring device, wherein the alarm The information is used to prompt the target object associated with the target terminal identification to appear in the target area, obtain the location information of the mobile terminal within the target time period, where the target time period includes multiple time slices, and analyze the obtained location information, Obtain the peer analysis results of the target terminal, where the peer analysis results include the mobile terminal, in a time slice of multiple time slices, the distance between the target terminal and the target terminal is less than the target distance threshold, due to the target terminal passing the target terminal Mark to characterize the target object (for example, a suspect target), you can use a detection device to detect the terminal identification of the mobile terminal within its coverage, and alarm if it is determined that the detected terminal identification contains the target terminal identification.
  • the peer analysis results include the mobile terminal, in a time slice of multiple time slices, the distance between the target terminal and the target terminal is less than the target distance threshold
  • Peer analysis of the target terminal enables early detection of target objects without the need for criminal investigators to manually browse and search, and peer analysis of the target objects. Therefore, it can solve the related technology to conduct investigations by manually browsing and finding suspect targets.
  • FIG. 1 is a hardware block diagram of a monitoring device of a peer analysis method according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of an optional peer analysis method according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of an optional data server storage according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of an optional positioning server storage according to an embodiment of the present invention.
  • FIG. 5 is a structural diagram of an optional Wi-Fi positioning system according to an embodiment of the present invention.
  • FIG. 6 is a schematic flowchart of an optional peer analysis according to an embodiment of the present invention.
  • FIG. 7 is a schematic flowchart of another optional peer analysis according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of an optional DTW matching according to an embodiment of the present invention.
  • FIG. 9 is a schematic diagram of an optional hash matching according to an embodiment of the present invention.
  • FIG. 10 is a structural block diagram of a peer analysis device according to an embodiment of the present invention.
  • FIG. 1 is a hardware block diagram of a monitoring device of a peer analysis method according to an embodiment of the present invention.
  • the monitoring terminal 10 may include one or more (only one is shown in FIG. 1) processor 102 (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc. ) And one or more memories 104 (only one is shown in FIG.
  • the above-mentioned monitoring device may further include a transmission device 106 for communication functions and an input-output device 108.
  • a transmission device 106 for communication functions for communication functions
  • an input-output device 108 for input-output device 108.
  • FIG. 1 is merely an illustration, which does not limit the structure of the foregoing monitoring device.
  • the monitoring device 10 may also include more or fewer components than those shown in FIG. 1, or have a different configuration from that shown in FIG.
  • the memory 104 may be used to store computer programs, for example, software programs and modules of application software, such as the computer program corresponding to the peer analysis method in the embodiment of the present invention, and the processor 102 executes each program by running the computer program stored in the memory 104 Various functional applications and data processing, that is, to achieve the above method.
  • the memory 104 may include a high-speed random access memory, and may also include a non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory.
  • the memory 104 may further include memories remotely provided with respect to the processor 102, and these remote memories may be connected to the monitoring device 10 through a network. Examples of the above network include but are not limited to the Internet, intranet, local area network, mobile communication network, and combinations thereof.
  • the transmission device 106 is used to receive or send data via a network.
  • the specific example of the network described above may include a wireless network provided by a communication provider of the monitoring device 10.
  • the transmission device 106 includes a network adapter (Network Interface Controller, referred to as NIC for short), which can be connected to other network devices through the base station to communicate with the Internet.
  • the transmission device 106 may be a radio frequency (Radio Frequency, RF for short) module, which is used to communicate with the Internet in a wireless manner.
  • RF Radio Frequency
  • the network architecture applying the above peer analysis method may include: a detection device, a mobile terminal, and a monitoring device.
  • the mobile terminal may be located in the coverage area of the detection device and used to send the terminal identification of the mobile terminal to the detection device.
  • the detection device is used to collect the terminal identification of the mobile terminal located in the target area covered by the detection device, and send the terminal identification to the monitoring device.
  • the monitoring device is used to control the operation of the detection device and receive the terminal identification sent by the terminal device.
  • FIG. 2 is a flowchart of the peer analysis method according to an embodiment of the present invention. As shown in FIG. 2, the process includes the following steps:
  • Step S202 the terminal identification of the mobile terminal located in the target area covered by the detection device is collected by the detection device;
  • Step S204 when the terminal identification includes the target terminal identification of the target terminal, an alarm message is issued in the monitoring device, wherein the alarm information is used to prompt the target object associated with the target terminal identification to appear in the target area;
  • Step S206 Acquire location information of the mobile terminal within a target time period, where the target time period includes multiple time slices;
  • Step S208 Analyze the acquired location information to obtain a peer analysis result of the target terminal, where the peer analysis result includes the mobile terminal, and within one time slice of multiple time slices, the distance from the target terminal is less than the target distance Threshold terminal.
  • the terminal identification of the mobile terminal located in the target area covered by the detection device is collected by the detection device; when the terminal identification includes the target terminal identification of the target terminal, an alarm message is issued in the monitoring device, wherein the alarm
  • the information is used to prompt the target object associated with the target terminal ID to appear in the target area; obtain the position information of the mobile terminal within the target time period, where the target time period includes multiple time slices; analyze the obtained position information to obtain Peer analysis results of the target terminal, where the peer analysis results include the mobile terminal, in a time slice of multiple time slices, the distance between the target terminal and the target terminal is less than the target distance threshold, which solves the related technology by manually browsing 1.
  • the method of finding the suspected target to carry out the investigation has time-consuming, laborious, and inefficient technical problems, which reduces labor consumption and improves the efficiency of investigation.
  • the execution body of the above steps may be a monitoring device, etc.
  • the monitoring device may include one or more sub-devices (for example, a database server, a positioning server, etc.), but it is not limited thereto.
  • step S202 the terminal identification of the mobile terminal located in the target area covered by the detection device is collected by the detection device.
  • Collecting the terminal identification of the mobile terminal in the target area covered by the detection device through the detection device may include: sending the target information for acquiring the terminal identification of the mobile terminal to the mobile terminal in the target area covered by the detection device through the detection device; The terminal identification of the mobile terminal sent by the mobile terminal is received through the detection device.
  • the above terminal identifier is used to uniquely identify the mobile terminal, and one terminal identifier belongs to only one mobile terminal.
  • the terminal identification may be a MAC (Media Access Control) address of the terminal.
  • the detection device may be a Wi-Fi (Wireless Fidelity, wireless fidelity) probe device, and its coverage area may include multiple mobile terminals (for example, smart phones), and the collected terminal identifiers of the mobile terminals may be multiple.
  • the above coverage area may be a specific area with a relatively dense population, for example, a railway station, a square, a bund, etc. In a specific area, one or more detection devices may be arranged so that the specific area is completely covered by the detection device as much as possible.
  • the use of the Wi-Fi probe device may include but not limited to at least one of the following:
  • the built-in induction module transmits a high connection frequency SSID (Service Set Identifier) to induce the device (such as a mobile phone) to connect and increase the probability of capturing MAC;
  • SSID Service Set Identifier
  • the Wi-Fi probe device can collect the MAC address of the mobile phone in its coverage area by searching or inducing the mobile phone in its coverage area to send a Wi-Fi request packet (carrying the MAC address of the mobile phone).
  • Wi-Fi probe equipment can have a wider coverage to collect MAC addresses within its range. Since the data is not restricted, MAC addresses can be collected in large quantities and the monitoring data can be returned in real time.
  • the MAC address can be combined with other data to achieve identity matching. Therefore, the MAC address data collected by the Wi-Fi probe device can be correlated with the data of related enterprises or departments to establish a multi-dimensional security monitoring system.
  • the monitoring device may include one or more devices, which may include but are not limited to: POE (Power Over Ethernet, Ethernet) module, database server, positioning server, and alarm device.
  • POE Power Over Ethernet, Ethernet
  • the POE module can be used to supply power to the Wi-Fi probe device and return the data collected by the Wi-Fi probe device to the database server.
  • the database server can be used as a database to store MAC addresses, run the MAC address comparison program, quickly compare the MACs captured by the Wi-Fi probe device, and transmit the successful data to the positioning server, and the device with the MAC marked
  • the connection time, connection time, location and other information are updated and stored, and the movement path of the marked MAC device is simulated.
  • the schematic diagram of data server storage is shown in Figure 3.
  • the positioning server runs the positioning algorithm, calculates the location of the marked MAC, and transmits it to the database server to update the database of the marked MAC.
  • the schematic diagram of the data storage of the positioning server is shown in Figure 4.
  • the alarm device is connected to at least one of the positioning server and the database server, and is used for issuing alarm information.
  • the detection device or the monitoring device can determine whether the terminal identification is within the terminal identification segment corresponding to the manufacturer of the mobile terminal; If the judgment result is that the terminal identifier corresponds to the mobile terminal manufacturer, the terminal identifier is retained.
  • some mobile phones for example, Apple phones and some high-configuration Android phones
  • pseudo MAC location information When running the positioning algorithm, there will be a lot of pseudo MAC location information, which interferes with the real MAC. If it is not filtered out, the results of the peer analysis may contain many "non-existent people" (corresponding to the pseudo MAC).
  • Each mobile phone manufacturer has its own fixed MAC field. According to this field library, when searching for a MAC, the field is judged first. If the searched MAC is not in the field library of the mobile phone manufacturer, it is considered to be a pseudo MAC and filtered. Drop the MAC.
  • filtering out invalid terminal identifiers can reduce the amount of processed data while improving the accuracy of target object recognition.
  • step S204 when the terminal identification includes the target terminal identification of the target terminal, alarm information is issued in the monitoring device, wherein the alarm information is used to prompt the target object associated with the target terminal identification to appear in the target area.
  • the collected terminal identification Before issuing alarm information in the monitoring device, you can first compare the collected terminal identification with the target terminal identification list stored in the database server. If the collected terminal identification contains one or more terminal identifications in the target terminal identification list, Then, it is determined that the target object associated with the target terminal identifier appears in the target area, and an alarm message is issued in the monitoring device.
  • the alarm information may be issued in the form of text, pictures, and sound.
  • you can display a prompt message such as "A target object appears” on the display of the monitoring device.
  • the device's speaker emits a prompt sound such as "Target Object Appears”.
  • the operation of issuing alarm information may be issued by an alarm device in the monitoring device.
  • step S204 location information of the mobile terminal within a target time period is obtained, where the target time period includes multiple time slices.
  • the monitoring device While collecting the terminal identification of the mobile terminal within the coverage of the detection device, the monitoring device (such as the positioning server in the monitoring device) can obtain the target attribute information of the mobile terminal in the target time period through the detection device, and according to the acquired The target attribute information determines the location information of the mobile terminal.
  • the above location information may include: a coordinate location of the mobile terminal and a time point corresponding to the coordinate location.
  • the above target attribute information may include, but is not limited to: the connection duration of the mobile terminal and the detection device, the connection time, the connection signal strength RSSI (Received Signal Strength Indicator), and so on.
  • Wi-Fi probe equipment may be able to scan all handheld devices in the area, integrate the RSSI of the signal strength of the captured MAC, run the positioning algorithm, and perform real-time positioning analysis on the marked MAC to obtain the marked MAC 'S real-time location information (x, y, t), where x and y represent coordinate positions and t represents time corresponding to the current position.
  • the positioning server can run a positioning algorithm, perform position positioning (position calculation) on the searched MAC, obtain position coordinate information (x, y, t) of different MACs at various times, and transmit it to the database server to update the marked MAC.
  • the alarm information issued in the monitoring device may also include the location information of the target terminal in the target area.
  • the target attribute information of the mobile terminal at a certain moment is obtained through the detection device, thereby locating the position of the mobile terminal at that moment, the mobile terminal can be accurately located, and provides a basis for monitoring the target object.
  • the monitoring device eg, a positioning server in the monitoring device acquires (eg, from a database server in the monitoring device) a plurality of target terminals within a target time period Multiple target position information at the target time point; in accordance with the time sequence of the multiple target time points, based on the multiple target position information, determine the movement trajectory of the target terminal within the target time period.
  • step S208 the obtained location information is analyzed to obtain a peer analysis result of the target terminal, where the peer analysis result includes the mobile terminal, and within one time slice of multiple time slices, the distance from the target terminal is less than The target distance threshold terminal.
  • the basis for determining the peer object may be: within a time slice of the target time period, the distance to the target terminal is less than the target distance threshold (the basis for determining the distance is: position information within the time slice).
  • the target time period may be divided into multiple time slices; one time slice is selected from the multiple time slices As the current time slice; determine whether the first mobile terminal exists in the mobile terminal in the current time slice, where the first mobile terminal is a mobile terminal whose distance from the target terminal is less than the target distance threshold; the judgment result is that the first mobile terminal exists
  • save the first matching result corresponding to the current time slice where the first matching result includes the terminal identification of the first mobile terminal; determine whether there are unselected time slices among multiple time slices;
  • select a time slice from the unselected time slice as the current time slice continue to perform the step of determining whether the first mobile terminal exists in the mobile terminal in the current time slice ;
  • M terminal identifiers are selected from the first matching result to obtain a target matching result corresponding to the target terminal identifier, where M is
  • the method for determining whether the first mobile terminal exists in the mobile terminal may be: acquiring multiple location information of the mobile terminal located in the current time slice, the multiple location information including one or more target terminals Location information of one or more non-target terminals; determine whether the distance between the location information of one or more non-target terminals and the location information of one or more target terminals is less than the target distance threshold.
  • the position coordinate information of each time slice is matched, the possible matching results in each time slice are recorded, and the matching results of all time slices are summarized to select a predetermined number
  • the terminal identification can be used for peer analysis of the target object, ensuring that the event can be resolved in a timely and effective manner when the event occurs.
  • M terminal identifiers may be selected from the first matching result in various ways, sorted according to the number of occurrences, similarity, and/or probability, and output the optimal first M results.
  • the terminal identifiers in the first matching result may be sorted according to the number of occurrences in the first matching result to obtain the first ranking result; according to the first ranking result, M terminal identifiers are selected from the first matching result to obtain Target matching result.
  • a terminal identifier may be selected from the first matching result as the current terminal identifier, where the current terminal identifier is used to identify the current terminal; through the target dynamic time warping algorithm, it is determined between the current terminal and the target terminal within the target time period Trajectory similarity, where the trajectory similarity is the similarity between the current terminal's movement trajectory and the target terminal's movement trajectory within the target time period; determine whether the first matching result contains the terminal identifier that has not been selected; If the result of the judgment is that the terminal ID has not been selected, select a terminal ID from the terminal IDs that have not been selected as the current terminal ID, and continue to execute the target dynamic time warping algorithm to determine the current terminal within the target time period The step of trajectory similarity with the target terminal; when the judgment result is that the terminal identifiers that have not been selected are not included, sort the terminal identifiers in the first matching result according to the trajectory similarity from high to low To obtain the second ranking result; according to the second ranking result, select M terminal identifiers
  • Target probability for example,
  • the terminal identifiers in the aggregated matching results can be sorted by one of multiple sorting methods or collectively, thereby selecting M terminal identifiers to ensure the accuracy of the matching result .
  • a terminal identification may be selected from the target matching results as the reference terminal identification; selected from multiple time slices One time slice is used as the current time slice; determine whether there is a second mobile terminal in the mobile terminal in the current time slice, where the second mobile terminal is a mobile terminal whose distance from the reference terminal is less than the target distance threshold, and the reference terminal identification is used to identify Reference terminal; in the case where the judgment result is that there is a second mobile terminal, save the second matching result corresponding to the current time slice, where the second matching result includes the terminal identifier of the second mobile terminal; determine whether multiple time slices There is an unselected time slice; if the judgment result is that there is an unselected time slice, select a time slice from the unselected time slices as the current time slice; continue to judge at the current time slice The step of whether there is a second mobile terminal in the internal mobile terminal; when the judgment result is that there is no unselected time slice, select M terminal identifiers
  • the target terminal identifier is in the matching result of the terminal identifier in the matching result with the target terminal, and if the judgment result is present, the The terminal logo is output, and the simultaneous object of the target object is determined by the reverse matching method (associated with the terminal logo), which improves the accuracy of peer analysis.
  • the above-mentioned peer analysis method will be described below in conjunction with the following optional examples.
  • the above peer analysis method can be applied to the Wi-Fi positioning system.
  • the above-mentioned Wi-Fi positioning system can apply Wi-Fi positioning technology to the scenes of real-time tracking and identification of personnel, and through real-time positioning technology, find and track on-site target personnel (eg, suspects, missing persons, etc.) in time.
  • target personnel eg, suspects, missing persons, etc.
  • the Wi-Fi positioning system may further include: a Wi-Fi probe device (probing device), a POE module, a database server, a positioning server, and so on.
  • the Wi-Fi probe device is connected to the POE module through a network cable
  • the POE module is connected to the database server and the positioning server in the computer room through the optical fiber
  • the database server and the positioning server are also connected.
  • the population database is an important data resource held by relevant departments, but it has not been fully utilized for some reasons.
  • the relevant personnel will go to the library to query information for comparison, analysis, and pre-judgment.
  • the arrest task will only be triggered afterwards.
  • the lack of a real-time tracking system will also make the case handlers often encounter difficulties in counter-detection during the process. Eventually, during the best arrest period, the criminals fled, and the effectiveness of handling cases was not high, causing undue waste of manpower, financial resources, and material resources to varying degrees.
  • the above peer analysis method may include: peer analysis.
  • Peer analysis is to perform distance/similarity matching on these position coordinate information to find one or more groups of MAC information with similar trajectories as the result of peer analysis, thus implementing mobile phone MAC peer analysis, which can locate key people in real time Tracking, long-term behavior analysis, and behavior trajectory of key management figures, effectively preventing/solving potential public safety incidents.
  • Peer analysis includes analysis of the designated key person in the historical time period, and the matching result is the MAC with a higher probability of peer.
  • peer analysis can perform full pattern matching on all the MACs that have occurred in a historical period of time, and the analysis results include multiple groups of possible peer MACs. Because the MAC address is used as the unique identification code of the smart phone and can be used as identification information, if the network security and technical investigation data are opened, the mobile phone number/name/ID corresponding to the mobile phone MAC can be obtained through the mobile phone MAC No. / household registration address, etc., is undoubtedly a very valuable information for the case handlers.
  • Peer analysis can analyze the data of a period of time to achieve the following functions:
  • the Wi-Fi positioning server stores the corresponding location information (x, y, t) for each MAC searched every time. Assuming that the database contains N pieces of location information, perform peer analysis based on the key person MAC (criminal investigation data) to be analyzed, and specify the MAC mode peer analysis flowchart as shown in FIG. 6. The process of peer analysis includes the following steps:
  • Step S602 Acquire the key person MAC.
  • the MAC information of the key persons to be monitored is clearly defined.
  • Step S604 acquiring historical time position coordinate information of the key person MAC.
  • Step S606 Acquire position coordinate information of all MACs in the historical time period.
  • Step S608 time slicing.
  • the historical time period [t1, t2] is gap-sliced into multiple time segments at certain time intervals.
  • Gap is the empirical value, which ranges from 1 to 60, and the unit is s (second).
  • the time interval gap 20s, that is, the historical time is divided into 15 time slices, each time slice is 20s long .
  • Step S610 Perform position coordinate information matching on the time slice, and record possible matching results in the time slice.
  • the position coordinate information corresponding to all the MAC information contained in the time slice is compared with the key person MAC in the time slice.
  • Set the distance threshold target distance threshold.
  • distance is an empirical value, which is related to the complexity of the environmental scene.
  • the value ranges from 0 to 20, and the unit is m (meter). If there are multiple MACs within the time slice that are smaller than the distance threshold, then sort them according to the distance from small to large, and only retain the first M MAC information with a small distance.
  • the value of M is related to the complexity of the environmental scene, and the value ranges from 1 to 30.
  • step S612 it is judged whether the matching result is empty. If the judgment result is yes, step S614 is executed. If the judgment result is no, step S610 is executed.
  • step S614 If there is a matching result in the current time slice, proceed to step S614, otherwise, return to step S610 to perform the next time slice processing.
  • Step S614 storing the result information of the current time slice matching.
  • Step S616 Summarize the matching results of all time slices, sort them according to the number of occurrences/similarity/probability, and output the best first n results, such as mac: [mac 1 , mac 2 ,...mac n ], that is It is the result of matching with the designated key person MAC.
  • all MACs can be traversed in a historical time period, and peer analysis is performed for each MAC.
  • the process is the same as steps S602 to S616 described above.
  • step S616 outputs a peer analysis result. If their matching results are verified by matching each other, the results of all peers in the time period can be obtained.
  • Step S702 judging whether the full-mode peer matching result list contains the specified MAC, and if so, repeating step 9 for the next MAC judgment; otherwise, proceeding to step S704.
  • the initial state of the full-mode peer matching result list is empty.
  • Step S704 Obtain the peer analysis matching result of the specified MAC.
  • the peer analysis matching result of the MAC obtained in step S616 is mac: [mac 1 , mac 2 , mac 3 ].
  • the matching result means that the addresses of the devices judged to be peers with the device whose address is mac are mac 1 , mac 2 , and mac 3 .
  • Step S706 Obtain the reverse matching result.
  • step S704 Use the peer analysis matching result in step S704 as the specified MAC, reverse matching, traverse each result, and obtain the corresponding matching result. Assumptions are as follows:
  • mac 1 matching result is, mac 1: [mac, mac 2, mac 3].
  • mac matching result is 3, mac 3: [mac 1, mac 3, mac 4].
  • step S708 mutual matching verification is performed, and the matching result is stored.
  • the matching result of the specified MAC and the reverse matching result are mutually verified. If the reverse matching result includes the specified MAC, the reverse MAC is considered to be peer with the specified MAC.
  • Step S710 the above steps are repeated until all MAC traversal is completed, and the full-mode peer matching result list is the final full-mode peer matching result.
  • Wi-Fi peer analysis can also be simplified as similarity matching for multiple trajectories with different position information lengths.
  • the algorithm used for similar trajectory analysis is the DTW algorithm.
  • the DTW algorithm was originally mainly used in the field of speech recognition. It was based on the idea of Dynamic Programming (DP), which solved the problem of template matching with different pronunciation lengths. It was an earlier and more classic one in speech recognition. The algorithm is used for isolated word recognition.
  • the matching idea of DTW is shown in Figure 8. For people traveling at the same time, due to the unequal length of the position information, there are also multiple track similarity matching problems. Combining with the idea of DTW, this patent can also apply DTW to wifi peer analysis scenarios to achieve similarity matching of multiple trajectories. If they are peers, the matching track has a high similarity; otherwise, the track similarity is low.
  • DTW is a basic algorithm, and its optimization algorithms may include: fast-DTW, SparseDTW, LB_Keogh, LB_Improved, etc.
  • the above optimization algorithms can also be applied to peer analysis.
  • Hash algorithm analysis (a method of similarity analysis by transforming data points from one data space to another data space through mapping or projection)
  • the MAC information searched by the Wi-Fi probe device will be many. If you want to find a MAC information similar to the track of the designated key person, the calculation is huge, and it will inevitably affect the operating efficiency. If the operational efficiency of peer analysis exceeds the endurance time range, then even if the results are analyzed, the practical significance is not significant.
  • the hash algorithm can be applied to Wi-Fi peer analysis scenarios to achieve the rapid comparison of one or more trajectories most similar to the specified MAC trajectory in the massive location information.
  • hashing after two adjacent data points in the original data space are transformed by the same mapping or projection, the probability that these two data points are still adjacent in the new data space is very large, but not related The probability of neighboring data points being mapped to the same bucket is very small. That is to say, if some hash mapping is performed on the original data, the two adjacent data can be hashed into the same bucket with the same bucket number.
  • FIG. 9 The schematic diagram of the hash matching idea is shown in FIG. 9.
  • the advantage of the hash algorithm is that it can quickly find the data or data that is most similar (closest) to a certain data from the massive high-dimensional data set.
  • the length of the set historical time span can be appropriately increased to facilitate long-term analysis and management data and improve the accuracy of matching.
  • the peer analysis method in this example is not limited to peer analysis between wifi, but can also be used for peer analysis between various electronic devices, such as Bluetooth and Bluetooth, Bluetooth and wifi, wifi and video, video and video, video and Bluetooth, etc. .
  • the application scenarios include various indoor and outdoor wireless scenarios, and the application fields can be extended to speech recognition, face recognition, and big data analysis.
  • Wi -Fi probe device searches/induces the mobile phone to send a wifi request packet, and runs a positioning algorithm to locate the searched MAC to obtain position coordinate information of different MACs at various times; and performs distance/similarity matching on these position coordinate information to find
  • One or more sets of MAC information with similar trajectories are used as the result of peer analysis, thereby realizing the use of mobile phone MAC peer analysis, real-time positioning and tracking of key people, long-term behavior analysis, and management of key people’s behavior trajectory, effectively Prevent/solve the occurrence of potential public safety incidents.
  • the method according to the above embodiments can be implemented by means of software plus a necessary general hardware platform, and of course, it can also be implemented by hardware, but in many cases the former is Better implementation.
  • the technical solutions of the present invention can be embodied in the form of software products in essence or part of contributions to the existing technology, and the computer software products are stored in a storage medium (such as ROM/RAM, magnetic disk,
  • the CD-ROM includes several instructions to enable a terminal device (which may be a mobile phone, computer, server, or network device, etc.) to execute the methods described in the embodiments of the present invention.
  • a peer analysis device is also provided.
  • the device is used to implement the above-mentioned embodiments and preferred implementation modes, and those that have already been described will not be repeated.
  • the term "module” may implement a combination of software and/or hardware for a predetermined function.
  • the devices described in the following embodiments are preferably implemented in software, implementation of hardware or a combination of software and hardware is also possible and conceived.
  • FIG. 10 is a structural block diagram of a peer analysis device according to an embodiment of the present invention. As shown in FIG. 10, the device includes:
  • the collection unit 1002 is configured to collect the terminal identification of the mobile terminal located in the target area covered by the detection device through the detection device;
  • the alarm unit 1004 is connected to the collection unit 1002, and is used for issuing alarm information in the monitoring device when the terminal identification includes the target terminal identification of the target terminal, wherein the alarm information is used to prompt the target object associated with the target terminal identification Appears in the target area;
  • the obtaining unit 1006 is connected to the collecting unit 1002 and used to obtain the location information of the mobile terminal within the target time period, where the target time period includes multiple time slices;
  • the analysis unit 1008 is connected to the acquisition unit 1006, and is used to analyze the acquired location information to obtain a peer analysis result of the target terminal, where the peer analysis result includes the mobile terminal, in one time slice of multiple time slices, and Terminals whose distance between target terminals is less than the target distance threshold.
  • the acquiring unit 1006 includes an acquiring module, and the foregoing device further includes a determining unit, where,
  • An acquisition module for acquiring multiple target position information at multiple target time points of the target terminal within the target time period when the mobile terminal is the target terminal;
  • the determining unit is used to determine the movement trajectory of the target terminal within the target time period according to the multiple target position information in the time sequence of multiple target time points.
  • the obtaining module includes:
  • Acquisition submodule used to acquire target attribute information of the target terminal at multiple target time points through the detection device
  • the first determination submodule is connected to the acquisition module, and is used for determining a plurality of target position information of the target terminal at a plurality of target time points within a target time period according to target attribute information.
  • the above analysis unit 1006 further includes:
  • a dividing module which is used to divide the target time period into multiple time slices after acquiring multiple target position information on multiple target time points of the target terminal within the target time period;
  • the first selection module is connected to the dividing module, and is used for acquiring multiple target positions on multiple target time points of the target terminal within the target time period for selecting one time slice from multiple time slices as the current Time slice
  • the first judgment module connected to the first selection module, is used to judge whether the first mobile terminal exists in the mobile terminal in the current time slice, where the distance between the first mobile terminal and the target terminal is less than the target distance threshold Mobile terminal
  • the first saving module is connected to the first judging module, and is used for saving the first matching result corresponding to the current time slice when the judging result is that the first mobile terminal exists, wherein the first matching result includes the first A terminal identification of the mobile terminal;
  • the second judgment module is connected to the first storage module and is used to judge whether there are unselected time slices among the multiple time slices;
  • the execution module connected to the second judgment module, is used to select a time slice from the unselected time slices as the current time slice if the judgment result is that there are unselected time slices; continue Performing a step of determining whether the first mobile terminal exists in the mobile terminal in the current time slice;
  • the second selection module connected to the second judgment module, is used to select M terminal identifiers from the first matching result in the case where the judgment result is that there is no unselected time slice, to obtain the target terminal Identify the corresponding target matching result, where M is an integer greater than or equal to 1, and the peer analysis result is determined according to the target matching result.
  • the second selection module may include:
  • the first sorting submodule is used to sort the terminal identifiers in the first matching result according to the number of occurrences in the first matching result to obtain the first sorting result;
  • the first selection submodule is connected to the first sorting submodule, and is used for selecting M terminal identifiers from the first matching result according to the first sorting result to obtain the target matching result.
  • the second selection module may include:
  • the second selection submodule is used to select a terminal identifier from the first matching result as the current terminal identifier, where the current terminal identifier is used to identify the current terminal;
  • the second determination submodule is connected to the second selection submodule and used to determine the trajectory similarity between the current terminal and the target terminal within the target time period through the target dynamic time warping algorithm, where the trajectory similarity is During the target time period, the similarity between the movement trajectory of the current terminal and the movement trajectory of the target terminal;
  • the first determination sub-module is connected to the second determination sub-module, and is used to determine whether the first matching result includes an unselected terminal identifier
  • the third selection sub-module is connected to the first determination sub-module, and is used for selecting a terminal identifier as the current terminal identifier from the terminal identifiers that have not been selected when the judgment result includes the terminal identifier that has not been selected.
  • Terminal identification
  • the first execution sub-module is connected to the third selection sub-module to continue to perform the step of determining the trajectory similarity between the current terminal and the target terminal within the target time period through the target dynamic time warping algorithm;
  • the second sorting sub-module is connected to the first judging sub-module, and is used to match the first in the order of trajectory similarity from high to low when the judgment result does not include the terminal identifier that has not been selected. Sort the terminal identifiers in the results to obtain the second sorting result;
  • the fourth selection submodule is connected to the second sorting submodule, and is used for selecting M terminal identifiers from the first matching result according to the second sorting result to obtain the target matching result.
  • the second selection module may include:
  • the fifth selection submodule is used to sequentially select time slices from multiple time slices as the current time slice;
  • the third determination sub-module is connected to the fifth selection sub-module and is used to determine that the position information of the first mobile terminal and the position information of the target terminal are located in the same space after the same mapping or projection transformation in the current time slice The target probability of the unit;
  • the second judgment sub-module is connected to the third determination sub-module and used to judge whether the multiple time slices include unselected time slices;
  • the sixth selection sub-module is connected to the second determination sub-module and is used to select a time slice from the unselected time slices as the current when the judgment result includes time slices that have not been selected. Time slice
  • the second execution sub-module connected to the sixth selection sub-module, is used to continue to use the hash algorithm to determine that the location information of the first mobile terminal and the location information of the target terminal pass the same mapping in the current time slice Or the step of target probability in the same spatial unit after projection transformation;
  • the third sorting sub-module is connected to the second judgment sub-module, and is used to perform the terminal identification in the first matching result according to the target probability when the judgment result does not include an unselected time slice Sorting; get the third sorting result;
  • the seventh selection sub-module is connected to the third sorting sub-module and used to select M terminal identifiers from the first matching result according to the third sorting result to obtain the target matching result.
  • the above device further includes:
  • the first selection unit is used to select a terminal identifier from the target matching result as the reference terminal identifier after acquiring the location information of the target terminal at multiple time points in the target time period from the positioning server;
  • the second selection unit connected to the first selection unit, is used to select a time slice from multiple time slices as the current time slice;
  • the first judgment unit connected to the second selection unit, is used to judge whether the second mobile terminal exists in the mobile terminal in the current time slice, wherein the second mobile terminal is a distance from the reference terminal less than the target distance threshold
  • the reference terminal identifier is used to identify the reference terminal
  • a saving unit connected to the first judging unit, is used to save a second matching result corresponding to the current time slice when the judging result is that the second mobile terminal exists, wherein the second matching result includes the second mobile Terminal identification of the terminal;
  • the second judging unit connected to the saving unit, is used to judge whether there are unselected time slices among multiple time slices;
  • the third selection unit connected to the second judgment unit, is used to select a time slice from the unselected time slices as the current time slice when the judgment result is that there are unselected time slices ;
  • the first execution unit connected to the third selection unit, is used to continue to perform the step of determining whether the second mobile terminal exists in the mobile terminal in the current time slice;
  • the fourth selection unit connected to the second judgment unit, is used to select M terminal identifiers from the second matching result to obtain a reference matching result when the judgment result is that there are no unselected time slices ;
  • An output unit connected to the fourth selection unit, is used to output the reference terminal identifier when the reference matching result includes the target terminal identifier;
  • a third judgment unit connected to the output unit, is used to judge whether the target matching result has an unselected terminal identifier
  • the fifth selection unit connected to the third judgment unit, is used to select a terminal identifier from the terminal identifiers that have never been selected as the reference terminal when the judgment result is that there is a terminal identifier that has not been selected.
  • the second execution unit connected to the fifth selection unit, is used to continue the step of selecting a time slice from multiple time slices as the current time slice.
  • the above device further includes:
  • the fourth judgment unit is used to judge whether the terminal identifier is in the terminal identifier segment corresponding to the manufacturer of the mobile terminal after receiving the terminal identifier returned by the mobile terminal through the detection device;
  • the reservation unit is connected to the fourth judgment unit, and is used for retaining the terminal identifier when the judgment result is in the terminal identifier section corresponding to the manufacturer of the mobile terminal.
  • the above modules can be implemented by software or hardware. For the latter, they can be implemented by the following methods, but not limited to this: the above modules are all located in the same processor; or, the above modules can be combined in any combination The forms are located in different processors.
  • An embodiment of the present invention further provides a storage medium in which a computer program is stored, wherein the computer program is set to execute any of the steps in the above method embodiments during runtime.
  • the above storage medium may be set to store a computer program for performing the following steps:
  • the storage medium is also configured to store a computer program for performing the following steps:
  • S2 Determine the movement trajectory of the target terminal in the target time period according to the multiple target position information in the time sequence of multiple target time points.
  • the storage medium is also configured to store a computer program for performing the following steps:
  • the target attribute information determine multiple target position information of the target terminal at multiple target time points within the target time period.
  • the storage medium is further configured to store a computer program for performing the following steps:
  • the above storage medium may include, but is not limited to: a USB flash drive, a read-only memory (Read-Only Memory, ROM for short), a random access memory (Random Access Memory, RAM for short), Various media that can store computer programs, such as removable hard drives, magnetic disks, or optical disks
  • An embodiment of the present invention further provides an electronic device, including a memory and a processor, where the computer program is stored in the memory, and the processor is configured to run the computer program to perform any of the steps in the above method embodiments.
  • the electronic device may further include a transmission device and an input-output device, wherein the transmission device is connected to the processor, and the input-output device is connected to the processor.
  • the foregoing processor may be configured to perform the following steps through a computer program:
  • the foregoing processor may be configured to perform the following steps through a computer program:
  • S2 Determine the movement trajectory of the target terminal in the target time period according to the multiple target position information in the time sequence of multiple target time points.
  • the foregoing processor may be configured to perform the following steps through a computer program:
  • the target attribute information determine multiple target position information of the target terminal at multiple target time points within the target time period.
  • the foregoing processor may be configured to perform the following steps through a computer program:
  • modules or steps of the present invention can be implemented by a universal computing device, they can be concentrated on a single computing device, or distributed in a network composed of multiple computing devices Above, optionally, they can be implemented with program code executable by the computing device, so that they can be stored in the storage device to be executed by the computing device, and in some cases, can be in a different order than here
  • the steps shown or described are performed, or they are made into individual integrated circuit modules respectively, or multiple modules or steps among them are made into a single integrated circuit module to achieve. In this way, the present invention is not limited to any specific combination of hardware and software.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供了一种同行分析方法及装置,其中,方法包括:通过探测设备采集位于探测设备所覆盖的目标区域内的移动终端的终端标识;在终端标识中包含目标终端的目标终端标识的情况下,在监控设备中发出告警信息,其中,告警信息用于提示与目标终端标识关联的目标对象出现在目标区域内;获取移动终端在目标时间段内的位置信息,其中,目标时间段包括多个时间片;对获取到的位置信息分析,得到目标终端的同行分析结果,其中,同行分析结果包含移动终端中,在多个时间片的一个时间片内,与目标终端之间的距离小于目标距离阈值的终端。通过本发明,解决了解决相关技术中通过人工浏览、查找嫌疑目标的方式开展侦查工作存在费时、费力,效率低下的问题。

Description

同行分析方法及装置 技术领域
本发明涉及通信领域,具体而言,涉及一种同行分析方法及装置。
背景技术
目前,侦查工作通常是由刑侦人员通过人工浏览、查找嫌疑目标的方式开展的:刑侦人员眼睛“盯着”播放器,手拿笔记本和笔,边观看、边记录,即使是夜间或偏僻地段的监控录像中很少有活动目标出现时,也只能“完整”地浏览,而不能出现任何遗漏。
然而,长时间浏览视频录像,非常容易造成刑侦人员视觉疲劳,不仅影响视频浏览工作质量,还造成侦查人员的视力损伤。
因此,相关技术中通过人工浏览、查找嫌疑目标的方式开展侦查工作存在费时、费力,效率低下的技术问题。
发明内容
本发明实施例提供了一种同行分析方法及装置,以至少解决相关技术中通过人工浏览、查找嫌疑目标的方式开展侦查工作存在费时、费力,效率低下的技术问题。
根据本发明的一个实施例,提供了一种同行分析方法,包括:通过探测设备采集位于所述探测设备所覆盖的目标区域内的移动终端的终端标识;在所述终端标识中包含目标终端的目标终端标识的情况下,在监控设备中发出告警信息,其中,所述告警信息用于提示与所述目标终端标识关联的目标对象出现在所述目标区域内;获取所述移动终端在目标时间段内的位置信息,其中,所述目标时间段包括多个时间片;对获取到的所述位置信息分析,得到所述目标终端的同行分析结果,其中,所述同行分析结果包含所述移动终端中,在所述多个时间片的一个时间片内,与目标终端之间的距离小于目标距离阈值的终端。
根据本发明的另一个实施例,提供了一种同行分析装置,包括:采集单元,用于通过探测设备采集位于所述探测设备所覆盖的目标区域内的移动终端的终端标识;告警单元,用于在所述终端标识中包含目标终端的目标终端标识的情况下,在监控设备中发出告警信息,其中,所述告警信息用于提示与所述目标终端标识关联的目标对象出现在所述目标区域内;获取单元,用于获取所述移动终端在目标时间段内的位置信息,其中,所述目标时间段包括多个时间片;分析单元,用于对获取到的所述位置信息分析,得到所述目标终端的同行分析结果,其中,所述同行分析结果包含所述移动终端中,在所述多个时间片的一个时间片内,与目标终端之间的距离小于目标距离阈值的终端。
根据本发明的又一个实施例,还提供了一种存储介质,所述存储介质中存储有计算机程序,其中,所述计算机程序被设置为运行时执行上述任一项方法实施例中的步骤。
根据本发明的又一个实施例,还提供了一种电子装置,包括存储器和处理器,所述存储器中存储有计算机程序,所述处理器被设置为运行所述计算机程序以执行上述任一项方法实施例中的步骤。
通过本发明,通过探测设备采集位于探测设备所覆盖的目标区域内的移动终端的终端标识;在终端标识中包含目标终端的目标终端标识的情况下,在监控设备中发出告警信息,其中,告警信息用于提示与目标终端标识关联的目标对象出现在目标区域内,获取移动终端在目标时间段内的位置信息,其中,目标时间段包括多个时间片,并对获取到的位置信息分析,得到目标终端的同行分析结果,其中,同行分析结果包含移动终端中,在多个时间片的一个时间片内,与目标终端之间的距离小于目标距离阈值的终端,由于通过目标终端的目标终端标识来表征目标对象(例如,嫌疑目标),可以通过探测设备对其覆盖范围内的移动终端的终端标识进行探测,并在判断探测到的终端标识包含目标终端标识的情况下进行告警,并对目标终端进行同行分析,实现了无需刑侦人员进行人工浏览查找,即可对目标对象进行预警,并对目标对象进行同行分析,因此,可以解决相关技术 中通过人工浏览、查找嫌疑目标的方式开展侦查工作存在费时、费力,效率低下的技术问题,达到减少人工消耗、提高侦查效率的技术效果。
附图说明
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是本发明实施例的一种同行分析方法的监控设备的硬件结构框图;
图2是根据本发明实施例的一种可选的同行分析方法的流程示意图;
图3是根据本发明实施例的一种可选的数据服务器存储示意图;
图4是根据本发明实施例的一种可选的定位服务器存储示意图;
图5是根据本发明实施例的一种可选的Wi-Fi定位系统结构图;
图6是根据本发明实施例的一种可选的同行分析的流程示意图;
图7是根据本发明实施例的另一种可选的同行分析的流程示意图;
图8是根据本发明实施例的一种可选的DTW匹配的示意图;
图9是根据本发明实施例的一种可选的哈希匹配的示意图;
图10是根据本发明实施例的同行分析装置的结构框图。
具体实施方式
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。
实施例1
本申请实施例一所提供的方法实施例可以在监控设备、计算机设备或 者类似的运算装置中执行。以运行在移动终端上为例,图1是本发明实施例的一种同行分析方法的监控设备的硬件结构框图。如图1所示,监控终端10可以包括一个或多个(图1中仅示出一个)处理器102(处理器102可以包括但不限于微处理器MCU或可编程逻辑器件FPGA等的处理装置)和用于存储数据的一个或多个存储器104(图1中仅示出一个),可选地,上述监控设备还可以包括用于通信功能的传输设备106以及输入输出设备108。本领域普通技术人员可以理解,图1所示的结构仅为示意,其并不对上述监控设备的结构造成限定。例如,监控设备10还可包括比图1中所示更多或者更少的组件,或者具有与图1所示不同的配置。
存储器104可用于存储计算机程序,例如,应用软件的软件程序以及模块,如本发明实施例中的同行分析方法对应的计算机程序,处理器102通过运行存储在存储器104内的计算机程序,从而执行各种功能应用以及数据处理,即实现上述的方法。存储器104可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器104可进一步包括相对于处理器102远程设置的存储器,这些远程存储器可以通过网络连接至监控设备10。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
传输装置106用于经由一个网络接收或者发送数据。上述的网络具体实例可包括监控设备10的通信供应商提供的无线网络。在一个实例中,传输装置106包括一个网络适配器(Network Interface Controller,简称为NIC),其可通过基站与其他网络设备相连从而可与互联网进行通讯。在一个实例中,传输装置106可以为射频(Radio Frequency,简称为RF)模块,其用于通过无线方式与互联网进行通讯。
可选地,应用上述同行分析方法的网络架构可以包括:探测设备、移动终端、监控设备。移动终端可以位于探测设备的覆盖区域内,用于向探测设备发送该移动终端的终端标识。探测设备用于采集位于探测设备所覆盖的目标区域内的移动终端的终端标识,并向监控设备发送终端标识。监 控设备用于控制探测设备的操作,并接收终端设备发送的终端标识。
在本实施例中提供了一种运行于上述同行分析的同行分析方法,图2是根据本发明实施例的同行分析方法的流程图,如图2所示,该流程包括如下步骤:
步骤S202,通过探测设备采集位于探测设备所覆盖的目标区域内的移动终端的终端标识;
步骤S204,在终端标识中包含目标终端的目标终端标识的情况下,在监控设备中发出告警信息,其中,告警信息用于提示与目标终端标识关联的目标对象出现在目标区域内;
步骤S206,获取移动终端在目标时间段内的位置信息,其中,目标时间段包括多个时间片;
步骤S208,对获取到的位置信息分析,得到目标终端的同行分析结果,其中,同行分析结果包含移动终端中,在多个时间片的一个时间片内,与目标终端之间的距离小于目标距离阈值的终端。
通过上述步骤,通过探测设备采集位于探测设备所覆盖的目标区域内的移动终端的终端标识;在终端标识中包含目标终端的目标终端标识的情况下,在监控设备中发出告警信息,其中,告警信息用于提示与目标终端标识关联的目标对象出现在目标区域内;获取移动终端在目标时间段内的位置信息,其中,目标时间段包括多个时间片;对获取到的位置信息分析,得到目标终端的同行分析结果,其中,同行分析结果包含移动终端中,在多个时间片的一个时间片内,与目标终端之间的距离小于目标距离阈值的终端,解决了相关技术中通过人工浏览、查找嫌疑目标的方式开展侦查工作存在费时、费力,效率低下的技术问题,减少了人工消耗、提高了侦查效率。
可选地,上述步骤的执行主体可以为监控设备等,上述监控设备可以包括一个或多个子设备(例如,数据库服务器、定位服务器等),但不限于此。
在步骤S202中,通过探测设备采集位于探测设备所覆盖的目标区域内的移动终端的终端标识。
通过探测设备采集位于探测设备所覆盖的目标区域内的移动终端的终端标识可以包括:通过探测设备向探测设备所覆盖的目标区域内的移动终端发送用于获取移动终端的终端标识的目标信息;通过探测设备接收移动终端发送的移动终端的终端标识。
上述终端标识用于唯一标识移动终端,一个终端标识仅属于一个移动终端。例如,上述终端标识可以是终端的MAC(Media Access Control,媒体接入控制)地址。
上述探测设备可以是Wi-Fi(Wireless Fidelity,无线保真)探针设备,其覆盖区域可以包括多个移动终端(例如,智能手机),采集的移动终端的终端标识可以为多个。上述覆盖区域可以是人口相对密集的特定区域,例如,火车站、广场、外滩等。在特定区域内,可以布设一个或多个探测设备,以尽可能的使得该特定区域被探测设备完全覆盖。
Wi-Fi探针设备的用途可以包括但不限于以下至少之一:
(1)内置诱导模块发射高连接频率SSID(Service Set Identifier,服务集标识),诱导设备(如,手机)连接,增大捕获MAC概率;
(2)全频道扫描,抓取设备MAC不漏包;
(3)加密回传被标记MAC信号强弱,连接时差等信息(目标属性信息)给监控设备(例如,监控设备的定位服务器),以便进行位置的精确计算。
在采集设备MAC时,Wi-Fi探针设备可以通过搜索或诱导其覆盖范围内的手机发出Wi-Fi请求包(携带有手机的MAC地址)的方式采集其覆盖区域内手机的MAC地址。结合视频感知部署位置建设,Wi-Fi探针设备可具有较广的覆盖范围,以采集其范围内的MAC地址。由于数据不受限制,MAC地址可以海量采集,并实时回传监控数据。
MAC地址作为手机的唯一识别码,可以结合其他数据实现身份匹配。 因而,Wi-Fi探针设备采集的MAC地址数据可以与相关企业或部门的数据相关联,建立多维度的安全监控系统。
监控设备可以包括一个或多个设备,可以包括但不限于:POE(Power Over Ethernet,以太网)模块、数据库服务器、定位服务器和告警设备。
可选地,POE模块可用于给Wi-Fi探针设备供电,并将Wi-Fi探针设备采集的数据回传至数据库服务器。
数据库服务器,可以作为存储MAC地址的数据库,运行MAC地址比对程序,快速比对Wi-Fi探针设备所抓取的MAC,将比成功数据传输给定位服务器,并对已标记MAC的设备的连接时长,连接时间,位置等信息进行更新入库,模拟出被标记MAC设备的运动路径。数据服务器存储示意图如附图3所示。
定位服务器,运行定位算法,对标记的MAC进行位置计算,并传输给数据库服务器对已标记MAC进行数据库更新。定位服务器数据存储示意图如图4所示。
告警设备,连接至定位服务器和数据库服务器中的至少一个,用于发出告警信息。
可选地,在本实施例中,可以由探测设备或监控设备(如,监控设备中的数据库服务器或者定位服务器)判断终端标识是否处于与移动终端的厂商所所对应的终端标识段内;在判断结果为处于与移动终端的厂商所对应的终端标识段内的情况下,保留终端标识。
出于保证用户的隐私/安全性的考虑,在不确定的环境中,部分手机(例如,苹果手机和部分高配置的安卓手机)会先上报很多伪MAC请求包,而不用真实的MAC。运行定位算法时,就会出现大量的伪MAC位置信息,对真实MAC造成了干扰,如果不加以滤除,同行分析的结果可能会包含很多″不存在的人″(与伪MAC对应)。
每个手机厂商都有自己的固定MAC字段,可以根据这个字段库,在搜索MAC时,先进行字段判断,如果搜索到的MAC不在该手机厂商的 字段库内,则认为它是伪MAC,过滤掉该MAC。
通过本发明实施例的上述技术方案,过滤掉无效的终端标识,可以减少处理的数据量,同时提高目标对象识别的准确性。
在步骤S204中,在终端标识中包含目标终端的目标终端标识的情况下,在监控设备中发出告警信息,其中,告警信息用于提示与目标终端标识关联的目标对象出现在目标区域内。
在监控设备中发出告警信息之前,可以首先将采集的终端标识与数据库服务器中存储的目标终端标识列表进行比对,如果采集到的终端标识包含目标终端标识列表中的一个或多个终端标识,则确定与目标终端标识关联的目标对象出现在目标区域内,在监控设备中发出告警信息。
可选地,告警信息可以是以文字、图片、声音的方式发出。例如,可以在监控设备的显示器上显示如“出现目标对象”的提示信息,又例如,可以在地图中目标区域对应的位置上显示用于标示目标对象的信息(红点),还可以通过监控设备的扬声器发出如“出现目标对象”的提示声音。
发出告警信息的操作可以是由监控设备中的告警设备发出的。
在步骤S204中,获取移动终端在目标时间段内的位置信息,其中,目标时间段包括多个时间片。
在采集位于探测设备覆盖范围内的移动终端的终端标识的同时,监控设备(如监控设备中的定位服务器)可以通过探测设备获取移动终端在目标时间段内的目标属性信息,并根据获取到的目标属性信息确定移动终端的位置信息,上述位置信息可以包括:移动终端的坐标位置和与该坐标位置对应的时间点。
上述目标属性信息可以包括但不限于:移动终端与探测设备的连接时长,连接时间,连接信号强度RSSI(Received Signal Strength Indicator,接收信号强度)等。
Wi-Fi探针设备或可实现对区域范围内的所有手持设备进行扫描,将 抓取到的MAC的信号强度RSSI整合汇总,运行定位算法,对标记的MAC进行实时定位分析,可以得到标记MAC的实时位置信息(x,y,t),其中x,y表示坐标位置,t表示当前位置对应的时间。
定位服务器可以运行定位算法,对搜索到的MAC进行位置定位(位置计算),得到不同MAC各个时刻的位置坐标信息(x,y,t),并传输给数据库服务器对已标记MAC进行数据库更新。
在监控设备中发出的告警信息还可以包括目标终端在目标区域中的位置信息。
通过本发明实施例的上述技术方案,通过探测设备获取移动终端在某一时刻的目标属性信息,从而定位移动终端在该时刻的位置,可以准确定位出移动终端,为目标对象的监控提供依据。
可选地,在移动终端为目标终端的情况下,监控设备(如,监控设备中的定位服务器)获取(如,从监控设备中的数据库服务器中获取)目标终端在目标时间段内的多个目标时间点上的多个目标位置信息;按照多个目标时间点的时间顺序,根据多个目标位置信息,确定目标终端在目标时间段内的移动轨迹。
通过本发明实施例的上述技术方案,通过对目标终端在目标时间段内的多个目标时刻上的位置信息分析,重绘目标对象的历史轨迹,明确重点人物经常活动的区域范围,实现对目标对象的准确监测。
在步骤S208中,对获取到的位置信息分析,得到目标终端的同行分析结果,其中,同行分析结果包含移动终端中,在多个时间片的一个时间片内,与目标终端之间的距离小于目标距离阈值的终端。
在获取目标终端在目标时间段内的多个目标时间点上的多个目标位置信息之后,还可以确定目标终端的同行终端,也就是目标对象的同行对象。确定同行对象的依据可以是:在目标时间段的一个时间片内,与目标终端之间的距离小于目标距离阈值(确定距离的依据是:在该时间片内的位置信息)。
可选地,在获取目标终端在目标时间段内的多个目标时间点上的多个目标位置信息之后,可以将目标时间段划分为多个时间片;从多个时间片中选取一个时间片作为当前时间片;判断在当前时间片内移动终端中是否存在第一移动终端,其中,第一移动终端为与目标终端的距离小于目标距离阈值的移动终端;在判断结果为存在第一移动终端的情况下,保存与当前时间片对应的第一匹配结果,其中,第一匹配结果包括第一移动终端的终端标识;判断多个时间片中是否存在未被选取过的时间片;在判断结果为存在未被选取过的时间片的情况下,从未被选取过的时间片中选取一个时间片作为当前时间片;继续执行判断在当前时间片内移动终端中是否存在第一移动终端的步骤;在判断结果为不存在未被选取过的时间片的情况下,从第一匹配结果中选取M个终端标识,得到与目标终端标识对应的目标匹配结果,其中,M为大于或等于1的整数,同行分析结果根据目标匹配结果进行确定。
在当前时间片内,判断移动终端中是否存在第一移动终端的方式可以是:获取在当前时间片内定位到的移动终端的多个位置信息,多个位置信息包括了一个或多个目标终端的位置信息,以及一个或多个非目标终端的位置信息;判断一个或多个非目标终端的位置信息与一个或多个目标终端的位置信息之间的距离,是否小于目标距离阈值。
通过本发明实施例的上述技术方案,通过进行时间切片,对各时间片进行位置坐标信息匹配,记录各时间片内的可能匹配结果,对所有时间片匹配结果进行汇总,从而选择出预定个数的终端标识,可以对目标对象进行同行分析,保证了当事件发生时可以及时有效的解决。
可选地,可以采用多种方式从第一匹配结果中选取M个终端标识,按照出现次数、相似度和/或概率进行排序,输出最优的前M个结果。
例如,可以将第一匹配结果中的终端标识按照在第一匹配结果中出现的次数进行排序,得到第一排序结果;按照第一排序结果,从第一匹配结果中选取M个终端标识,得到目标匹配结果。
又例如,可以从第一匹配结果中选取一个终端标识作为当前终端标识,其中,当前终端标识用于标识当前终端;通过目标动态时间规整算法,确定在目标时间段内当前终端与目标终端之间的轨迹相似度,其中,轨迹相似度为在目标时间段内,当前终端的移动轨迹和目标终端的移动轨迹之间的相似度;判断第一匹配结果是否包含未被选取过的终端标识;在判断结果为包含未被选取过的终端标识的情况下,从未被选取过的终端标识中选取一个终端标识作为当前终端标识,继续执行通过目标动态时间规整算法,确定在目标时间段内当前终端与目标终端之间的轨迹相似度的步骤;在判断结果为不包含未被选取过的终端标识的情况下,按照轨迹相似度从高到低的顺序对第一匹配结果中的终端标识进行排序,得到第二排序结果;按照第二排序结果,从第一匹配结果中选取M个终端标识,得到目标匹配结果;或者,
还可以从多个时间片中依次选取时间片作为当前时间片;确定在当前时间片内,第一移动终端的位置信息与目标终端的位置信息通过相同的映射或投影变换之后位于相同空间单元的目标概率(例如,使用哈希算法,确定的是映射到同一个桶的目标概率);判断多个时间片是否包含未被选取过的时间片;在判断结果为包含未被选取过的时间片的情况下,从未被选取过的时间片中选取一个时间片作为当前时间片;继续执行使用哈希算法,确定在当前时间片内,第一移动终端的位置信息与目标终端的位置信息通过相同的映射或投影变换之后位于相同空间单元的目标概率的步骤;在判断结果为不包含未被选取过的时间片的情况下,根据目标概率,对第一匹配结果中的终端标识进行排序;得到第三排序结果;按照第三排序结果,从第一匹配结果中选取M个终端标识,得到目标匹配结果。
通过本发明实施例的上述技术方案,可以通过多种排序方式中的一种或集中对汇总的匹配结果中的终端标识进行排序,从而选择出选取M个终端标识,保证了匹配结果的准确性。
可选地,在从定位服务器获取目标终端在目标时间段内的多个时间点上的位置信息之后,可以从目标匹配结果中选择一个终端标识,作为参考 终端标识;从多个时间片中选取一个时间片作为当前时间片;判断在当前时间片内移动终端中是否存在第二移动终端,其中,第二移动终端为与参考终端的距离小于目标距离阈值的移动终端,参考终端标识用于标识参考终端;在判断结果为存在第二移动终端的情况下,保存与当前时间片对应的第二匹配结果,其中,第二匹配结果包括第二移动终端的终端标识;判断多个时间片中是否存在未被选取过的时间片;在判断结果为存在未被选取过的时间片的情况下,从未被选取过的时间片中选取一个时间片作为当前时间片;继续执行判断在当前时间片内移动终端中是否存在第二移动终端的步骤;在判断结果为不存在未被选取过的时间片的情况下,从第二匹配结果中选取M个终端标识,得到参考匹配结果;在参考匹配结果中包含目标终端标识的情况下,将参考终端标识输出;判断目标匹配结果是否存在未被选取过的终端标识;在判断结果为存在未被选取过的终端标识的情况下,从未被选取过的终端标识中选择一个终端标识,作为参考终端标识;继续执行从多个时间片中选取一个时间片作为当前时间片的步骤。
通过本发明实施例的上述技术方案,通过反向匹配的方式,判断目标终端标识是否在与目标终端的匹配结果中的终端标识的匹配结果中,并在判断结果为在的情况下,将该终端标识输出,通过反向匹配的方式确定目标对象的同时对象(与终端标识关联),提高了同行分析的准确性。
下面结合以下可选示例对上述同行分析方法进行说明。上述同行分析方法可以应用于Wi-Fi定位系统。上述Wi-Fi定位系统可以将Wi-Fi定位技术应用在人员实时追踪、识别的场景,通过实时定位技术,及时发现并追踪现场目标人员(例如,嫌疑人员,失踪人员等)。
如图5所示,该Wi-Fi定位系统还可以包括:Wi-Fi探针设备(探测设备)、POE模块、数据库服务器、定位服务器等。其中,Wi-Fi探针设备通过网线与POE模块相连,POE模块通过光纤与位于机房中的数据库服务器和定位服务器相连,并且,数据库服务器和定位服务器也相连。
人口数据库是有关部门掌握的重要数据信息资源,但由于某些原因其 并未得到充分利用。人口数据库里的重点人物,只有在犯案时,相关人员才会到库里查询信息,进行比对、分析、预判,缺乏对重点人物在特定区域的实时监测,从而导致重点人物总是在犯案之后才会触发抓捕任务,缺乏实时追踪的系统,也会让办案人员在办案过程中,常常遇到反侦查的重重困难。最终导致在最佳抓捕期内,案犯却逃之夭夭,办案有效性不高,在不同程度上造成人力、财力、物力的不当浪费。
在本示例中,通过在Wi-Fi探针设备或定位服务器运行定位算法对搜索到的MAC进行位置定位,得到不同MAC各个时刻的位置坐标信息。上述同行分析方法可以包括:同行分析。同行分析就是对这些位置坐标信息进行距离/相似度匹配,找出轨迹相近的一组或多组MAC信息,作为同行分析的结果,从而实现了采用手机MAC同行分析,可以对重点人物进行实时定位跟踪、长时间行为分析,经营管理重点人物的行为轨迹,有效预防/解决潜在的危害公共安全事件的发生。
同行分析包括在历史时间段内对指定重点人物进行分析,分析匹配结果为与其同行概率较高的MAC。可选地,同行分析可以对一段历史时间内,所有出现的MAC进行全模式匹配,分析结果包含多组可能同行的MAC。由于MAC地址作为智能手机的唯一识别码,可以作为身份信息的识别,因此如果打通网安、技侦数据,那么通过手机MAC,即可获取到该手机MAC对应的的手机号/姓名/身份证号/户籍地址等,对于办案人员来说,无疑是一个非常有价值的信息。
同行分析通过对一段历史时间的数据进行分析,可实现以下功能:
(1)重绘历史轨迹,明确重点人物经常活动的区域范围。
(2)同伙跟踪,对重点人物进行同行分析,可知经常与他一起从事犯罪活动的同伙。
(3)实时预警,对重点人物进行实时轨迹跟踪,如果重点人物出现在了监控区域,那么相应部门需要马上做出反应,加强安全防范/出动警力对其进行捕获。
同行分析常用的方法包括但不限于以下三种:
1.位置信息分析
Wi-Fi定位服务器会对搜索到的每个MAC,每个时刻存储对应的位置信息(x,y,t)。假设数据库中包含N条位置信息,根据要分析的重点人物MAC(刑侦提供数据),对其进行同行分析,指定MAC模式同行分析流程图如附图6所示。同行分析的流程包括如下步骤:
步骤S602,获取重点人物MAC。
根据相关部门提供的数据,根据场景需要,明确需要监测的重点人物MAC信息。
步骤S604,获取重点人物MAC历史时间位置坐标信息。
从定位服务器中读取重点人物MAC在历史时间段[t1,t2]内的位置坐标信息Target:(x,y,t)。
步骤S606,获取历史时间段内所有MAC的位置坐标信息。
从定位服务器中读取在历史时间段[t1,t2]内的所有MAC的位置坐标信息All:(x′,y′,t′)。
步骤S608,时间切片。
将历史时间段[t1,t2]按照一定的时间间隔gap切片,分成多个时间片段。gap为经验值,取值范围为1~60,单位为s(秒)。
假设历史时间段为2018-06-01 13:00:00~2018-06-01 13:05:00,取时间间隔gap=20s,即将历史时间分为15个时间片,每个时间片时长20s。
步骤S610,对时间片进行位置坐标信息匹配,记录时间片内的可能匹配结果。
对该时间片内包含的所有MAC信息对应的位置坐标信息,与重点人物MAC在该时间片内进行距离比较。设定距离阀值distance(目标距离阈值),当某个MAC与重点人物MAC的距离小于distance时,则认为该MAC在该时间片内与重点MAC距离相近,并记录此MAC。
其中,distance是经验值,与环境场景复杂度有关,取值范围在0~20,单位:m(米)。如果在该时间片内小于距离阀值distance的MAC有多个,那么按照距离从小到大排序,只保留距离较小的前M个MAC信息。M的取值与环境场景复杂度有关,取值范围在1~30。
步骤S612,判断匹配结果是否为空,如果判断结果为是,执行步骤S614,如果判断结果为否,执行步骤S610。
如果当前时间片有匹配结果,进行步骤S614,否则,返回至步骤S610,进行下一时间片处理。
步骤S614,存储当前时间片匹配的结果信息。
步骤S616,对所有时间片匹配结果进行汇总,按照出现次数/相似度/概率进行排序,输出最优的前n个结果,如mac:[mac 1,mac 2,...mac n],即为与指定重点人物MAC匹配的结果。
可选地,对于全模式匹配方案,可在历史时间段内遍历所有MAC,对每个MAC进行同行分析,过程同上述步骤S602~步骤S616。当所有MAC全部遍历完后,对于存在同行现象的MAC,步骤S616会输出一个同行分析的结果,如果对它们的匹配结果进行相互匹配验证,就可得到该时间段内所有同行的结果。
基于指定MAC模式同行分析的前提,全模式同行分析的流程如图7所示,该流程包括以下步骤:
步骤S702,判断全模式同行匹配结果list中是否包含指定MAC,如果是,则重复步骤9进行下一个MAC判断;否则进行步骤S704。
全模式同行匹配结果list的初始状态为空。
步骤S704,获取指定MAC的同行分析匹配结果。
假设从步骤S616中获取到的MAC的同行分析匹配结果为mac:[mac 1,mac 2,mac 3]。该匹配结果所表达的意思是,与地址为mac的设备判断为同行的设备的地址为mac 1、mac 2、mac 3
步骤S706,获取反向匹配结果。
将步骤S704中的同行分析匹配结果作为指定MAC,反向匹配,遍历每个结果,获取对应的匹配结果。假设如下:
mac 1的匹配结果为,mac 1:[mac,mac 2,mac 3]。
mac 2的匹配结果为,mac 2:[mac 1,mac,mac 4]。
mac 3的匹配结果为,mac 3:[mac 1,mac 3,mac 4]。
步骤S708,相互匹配验证,并存储匹配结果。
将指定MAC的匹配结果和反向匹配结果进行相互验证,如果反向匹配结果中包含指定MAC,即认为该反向MAC与指定MAC同行。
以上述反向匹配结果为例,只有mac 1和mac 2的反向匹配结果中包含指定信息mac。那么即认为mac、mac 1,和mac 2是在指定的是时间段[t1,t2]内是同行的。同时将同行分析匹配结果[mac,mac 1,mac 2]存储在全模式同行匹配结果list(列表)中。
步骤S710,重复上述步骤,直到完成所有MAC的遍历,全模式同行匹配结果list即为最终的全模式同行匹配结果。
2.相似轨迹分析
在Wi-Fi定位过程中,即使一个人随身携带多部手机行走,而由于每部手机的发包频率有差异,因此,Wi-Fi探针设备检测到的各个手机的位置信息长度都不一样。有的手机发包频率高,对应的定位服务器中存储的位置信息多,而有的手机发包频率低,对应的定位服务器中存储的位置信息就少。因此Wi-Fi同行分析也可以简化为对多条位置信息长度不同的轨迹进行相似度匹配。
进行相似轨迹分析所使用的算法为DTW算法。DTW算法最初主要是应用在语音识别领域,是基于动态规划(Dynamic Programming,简称为DP)的思想,解决了发音长短不一的模板匹配问题,是语音识别中出现较早、较为经典的一种算法,用于孤立词识别,DTW的匹配思想如图8 所示。对于同时行进的人,由于位置信息长度不对等,也存在多条轨迹相似度匹配问题。结合DTW的思想,本专利也可将DTW应用于wifi同行分析场景中,以实现多条轨迹的相似度匹配。如果同行,则匹配的轨迹相似度高;反之,则轨迹相似度低。
可选地,DTW是一个基础算法,对其优化算法可以包括:fast-DTW,SparseDTW,LB_Keogh,LB_Improved等,上述优化算法也可应用于同行分析中。
3.哈希算法分析(通过将数据点由一个数据空间通过映射或投影变换到另一个数据空间来进行相似分析的一种方法)
在环境比较复杂的场景中,Wi-Fi探针设备搜索到的MAC信息会很多很多。如果要从中找出一条和指定重点人物轨迹相似的MAC信息,其计算量巨大,势必会影响运行效率。如果同行分析运行效率超出忍受时间范围,那么即使分析出结果,实际意义也不大。
对此,可以将哈希(hash)算法应用于Wi-Fi同行分析场景中,以实现在海量的位置信息中,能够快速的比对出与指定MAC轨迹最相似的一条或多条轨迹。
哈希的基本思想是:将原始数据空间中的两个相邻数据点通过相同的映射或投影变换后,这两个数据点在新的数据空间中仍然相邻的概率很大,而不相邻的数据点被映射到同一个桶的概率很小。也就是说,如果对原始数据进行一些hash映射后,原先相邻的两个数据能够被hash到相同的桶内,具有相同的桶号,哈希的匹配思想示意图如附图9。
哈希算法的优势在于:可以快速的从海量的高维数据集合中找到与某个数据最相似(距离最近)的一个数据或多个数据。
对于复杂场景(例如,电磁信号干扰大、人员密集、环境恶劣等场景)的情况,会影响定位算法运行的结果,从而影响同行分析的结果。可以将适当增加设置的历史时间跨度的长度,以便长时间的分析和经营管理数据,提高匹配的准确度。
本示例中的同行分析方法不局限于wifi之间的同行分析,还可用于各个电子设备之间的同行分析,如蓝牙与蓝牙,蓝牙与wifi,wifi与视频,视频与视频,视频与蓝牙等。应用场景包含室内室外各种无线场景,应用领域可扩展至语音识别、人脸识别、大数据分析等。
通过本示例中,可以把未知变成可知、把难测变成可测、把失控变成可控的业务形态的改变,实现“从事后被动处置转变为主动预防、预警、预测”,通过Wi-Fi探针设备搜索/诱导手机发出wifi请求包,运行定位算法对搜索到的MAC进行位置定位,得到不同MAC各个时刻的位置坐标信息;并对这些位置坐标信息进行距离/相似度匹配,找出轨迹相近的一组或多组MAC信息,作为同行分析的结果,从而实现了采用手机MAC同行分析,对重点人物进行实时定位跟踪、长时间行为分析,经营管理重点人物的行为轨迹,有效的预防/解决潜在的危害公共安全事件的发生。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。
实施例2
在本实施例中还提供了一种同行分析装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图10是根据本发明实施例的同行分析装置的结构框图,如图10所示,该装置包括:
采集单元1002,用于通过探测设备采集位于探测设备所覆盖的目标区域内的移动终端的终端标识;
告警单元1004,与采集单元1002相连,用于在终端标识中包含目标终端的目标终端标识的情况下,在监控设备中发出告警信息,其中,告警信息用于提示与目标终端标识关联的目标对象出现在目标区域内;
获取单元1006,与采集单元1002相连,用于获取移动终端在目标时间段内的位置信息,其中,目标时间段包括多个时间片;
分析单元1008,与获取单元1006相连,用于对获取到的位置信息分析,得到目标终端的同行分析结果,其中,同行分析结果包含移动终端中,在多个时间片的一个时间片内,与目标终端之间的距离小于目标距离阈值的终端。
可选地,获取单元1006包括获取模块,上述装置还包括确定单元,其中,
获取模块,用于在移动终端为目标终端的情况下,获取目标终端在目标时间段内的多个目标时间点上的多个目标位置信息;
确定单元,用于按照多个目标时间点的时间顺序,根据多个目标位置信息,确定目标终端在目标时间段内的移动轨迹。
可选地,获取模块包括:
(1)获取子模块,用于通过探测设备获取目标终端在多个目标时间点上的目标属性信息;
(2)第一确定子模块,与获取模块相连,用于根据目标属性信息,确定目标终端在目标时间段内的多个目标时间点上的多个目标位置信息。
可选地,上述分析单元1006还包括:
(1)划分模块,用于在获取目标终端在目标时间段内的多个目标时间 点上的多个目标位置信息之后,将目标时间段划分为多个时间片;
(2)第一选取模块,与划分模块相连,用于在获取目标终端在目标时间段内的多个目标时间点上的多个目标位置用于从多个时间片中选取一个时间片作为当前时间片;
(3)第一判断模块,与第一选取模块相连,用于判断在当前时间片内移动终端中是否存在第一移动终端,其中,第一移动终端为与目标终端的距离小于目标距离阈值的移动终端;
(4)第一保存模块,与第一判断模块相连,用于在判断结果为存在第一移动终端的情况下,保存与当前时间片对应的第一匹配结果,其中,第一匹配结果包括第一移动终端的终端标识;
(5)第二判断模块,与第一保存模块相连,用于判断多个时间片中是否存在未被选取过的时间片;
(6)执行模块,与第二判断模块相连,用于在判断结果为存在未被选取过的时间片的情况下,从未被选取过的时间片中选取一个时间片作为当前时间片;继续执行判断在当前时间片内移动终端中是否存在第一移动终端的步骤;
(7)第二选取模块,与第二判断模块相连,用于在判断结果为不存在未被选取过的时间片的情况下,从第一匹配结果中选取M个终端标识,得到与目标终端标识对应的目标匹配结果,其中,M为大于或等于1的整数,同行分析结果根据目标匹配结果进行确定。
作为一种可选的实施方式,第二选取模块可以包括:
(1)第一排序子模块,用于将第一匹配结果中的终端标识按照在第一匹配结果中出现的次数进行排序,得到第一排序结果;
(2)第一选取子模块,与第一排序子模块相连,用于按照第一排序结果,从第一匹配结果中选取M个终端标识,得到目标匹配结果。
作为另一种可选的实施方式,第二选取模块可以包括:
(1)第二选取子模块,用于从第一匹配结果中选取一个终端标识作为当前终端标识,其中,当前终端标识用于标识当前终端;
(2)第二确定子模块,与第二选取子模块相连,用于通过目标动态时间规整算法,确定在目标时间段内当前终端与目标终端之间的轨迹相似度,其中,轨迹相似度为在目标时间段内,当前终端的移动轨迹和目标终端的移动轨迹之间的相似度;
(3)第一判断子模块,与第二确定子模块相连,用于判断第一匹配结果是否包含未被选取过的终端标识;
(4)第三选取子模块,与第一判断子模块相连,用于在判断结果为包含未被选取过的终端标识的情况下,从未被选取过的终端标识中选取一个终端标识作为当前终端标识;
(5)第一执行子模块,与第三选取子模块相连,用于继续执行通过目标动态时间规整算法,确定在目标时间段内当前终端与目标终端之间的轨迹相似度的步骤;
(6)第二排序子模块,与第一判断子模块相连,用于在判断结果为不包含未被选取过的终端标识的情况下,按照轨迹相似度从高到低的顺序对第一匹配结果中的终端标识进行排序,得到第二排序结果;
(7)第四选取子模块,与第二排序子模块相连,用于按照第二排序结果,从第一匹配结果中选取M个终端标识,得到目标匹配结果。
作为又一种可选的实施方式,第二选取模块可以包括:
(1)第五选取子模块,用于从多个时间片中依次选取时间片作为当前时间片;
(2)第三确定子模块,与第五选取子模块相连,用于确定在当前时间片内,第一移动终端的位置信息与目标终端的位置信息通过相同的映射或投影变换之后位于相同空间单元的目标概率;
(3)第二判断子模块,与第三确定子模块相连,用于判断多个时间片 是否包含未被选取过的时间片;
(4)第六选取子模块,与第二判断子模块相连,用于在判断结果为包含未被选取过的时间片的情况下,从未被选取过的时间片中选取一个时间片作为当前时间片;
(5)第二执行子模块,与第六选取子模块相连,用于继续执行使用哈希算法,确定在当前时间片内,第一移动终端的位置信息与目标终端的位置信息通过相同的映射或投影变换之后位于相同空间单元的目标概率的步骤;
(6)第三排序子模块,与第二判断子模块相连,用于在判断结果为不包含未被选取过的时间片的情况下,根据目标概率,对第一匹配结果中的终端标识进行排序;得到第三排序结果;
(7)第七选取子模块,与第三排序子模块相连,用于按照第三排序结果,从第一匹配结果中选取M个终端标识,得到目标匹配结果。
可选地,上述装置还包括:
(1)第一选取单元,用于在从定位服务器获取目标终端在目标时间段内的多个时间点上的位置信息之后,从目标匹配结果中选择一个终端标识,作为参考终端标识;
(2)第二选取单元,与第一选取单元相连,用于从多个时间片中选取一个时间片作为当前时间片;
(3)第一判断单元,与第二选取单元相连,用于判断在当前时间片内移动终端中是否存在第二移动终端,其中,第二移动终端为与参考终端的距离小于目标距离阈值的移动终端,参考终端标识用于标识参考终端;
(4)保存单元,与第一判断单元相连,用于在判断结果为存在第二移动终端的情况下,保存与当前时间片对应的第二匹配结果,其中,第二匹配结果包括第二移动终端的终端标识;
(5)第二判断单元,与保存单元相连,用于判断多个时间片中是否存 在未被选取过的时间片;
(6)第三选取单元,与第二判断单元相连,用于在判断结果为存在未被选取过的时间片的情况下,从未被选取过的时间片中选取一个时间片作为当前时间片;
(7)第一执行单元,与第三选取单元相连,用于继续执行判断在当前时间片内移动终端中是否存在第二移动终端的步骤;
(8)第四选取单元,与第二判断单元相连,用于在判断结果为不存在未被选取过的时间片的情况下,从第二匹配结果中选取M个终端标识,得到参考匹配结果;
(9)输出单元,与第四选取单元相连,用于在参考匹配结果中包含目标终端标识的情况下,将参考终端标识输出;
(10)第三判断单元,与输出单元相连,用于判断目标匹配结果是否存在未被选取过的终端标识;
(11)第五选取单元,与第三判断单元相连,用于在判断结果为存在未被选取过的终端标识的情况下,从未被选取过的终端标识中选择一个终端标识,作为参考终端标识;第二执行单元,与第五选取单元相连,用于继续执行从多个时间片中选取一个时间片作为当前时间片的步骤。
可选地,上述装置还包括:
(1)第四判断单元,用于在通过探测设备接收移动终端返回的终端标识之后,判断终端标识是否处于与移动终端的厂商所所对应的终端标识段内;
(2)保留单元,与第四判断单元相连,用于在判断结果为处于与移动终端的厂商所对应的终端标识段内的情况下,保留终端标识。
需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述模块均位于同一处理器中;或者,上述各个模块以任意组合的形式分别位于不同的处理器中。
实施例3
本发明的实施例还提供了一种存储介质,该存储介质中存储有计算机程序,其中,该计算机程序被设置为运行时执行上述任一项方法实施例中的步骤。
可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的计算机程序:
S1,通过探测设备采集位于探测设备所覆盖的目标区域内的移动终端的终端标识;
S2,在终端标识中包含目标终端的目标终端标识的情况下,在监控设备中发出告警信息,其中,告警信息用于提示与目标终端标识关联的目标对象出现在目标区域内;
S3,获取移动终端在目标时间段内的位置信息,其中,目标时间段包括多个时间片;
S4,对获取到的位置信息分析,得到目标终端的同行分析结果,其中,同行分析结果包含移动终端中,在多个时间片的一个时间片内,与目标终端之间的距离小于目标距离阈值的终端。
可选地,存储介质还被设置为存储用于执行以下步骤的计算机程序:
S1,获取目标终端在目标时间段内的多个目标时间点上的多个目标位置信息;
S2,按照多个目标时间点的时间顺序,根据多个目标位置信息,确定目标终端在目标时间段内的移动轨迹。
可选地,存储介质还被设置为存储用于执行以下步骤的计算机程序:
S1,通过探测设备获取目标终端在多个目标时间点上的目标属性信息;
S2,根据目标属性信息,确定目标终端在目标时间段内的多个目标时间点上的多个目标位置信息。
可选地,存储介质还被设置为存储用于执行以下步骤的计算机程序::
S1,在通过探测设备采集位于探测设备所覆盖的目标区域内的移动终端的终端标识之后,判断终端标识是否处于与移动终端的厂商所所对应的终端标识段内;
S2,在判断结果为处于与移动终端的厂商所对应的终端标识段内的情况下,保留终端标识。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(Read-Only Memory,简称为ROM)、随机存取存储器(Random Access Memory,简称为RAM)、移动硬盘、磁碟或者光盘等各种可以存储计算机程序的介质。
实施例4
本发明的实施例还提供了一种电子装置,包括存储器和处理器,该存储器中存储有计算机程序,该处理器被设置为运行计算机程序以执行上述任一项方法实施例中的步骤。
可选地,上述电子装置还可以包括传输设备以及输入输出设备,其中,该传输设备和上述处理器连接,该输入输出设备和上述处理器连接。
可选地,在本实施例中,上述处理器可以被设置为通过计算机程序执行以下步骤:
S1,通过探测设备采集位于探测设备所覆盖的目标区域内的移动终端的终端标识;
S2,在终端标识中包含目标终端的目标终端标识的情况下,在监控设备中发出告警信息,其中,告警信息用于提示与目标终端标识关联的目标对象出现在目标区域内;
S3,获取移动终端在目标时间段内的位置信息,其中,目标时间段包括多个时间片;
S4,对获取到的位置信息分析,得到目标终端的同行分析结果,其中,同行分析结果包含移动终端中,在多个时间片的一个时间片内,与目标终端之间的距离小于目标距离阈值的终端。
可选地,在本实施例中,上述处理器可以被设置为通过计算机程序执行以下步骤:
S1,获取目标终端在目标时间段内的多个目标时间点上的多个目标位置信息;
S2,按照多个目标时间点的时间顺序,根据多个目标位置信息,确定目标终端在目标时间段内的移动轨迹。
可选地,在本实施例中,上述处理器可以被设置为通过计算机程序执行以下步骤:
S1,通过探测设备获取目标终端在多个目标时间点上的目标属性信息;
S2,根据目标属性信息,确定目标终端在目标时间段内的多个目标时间点上的多个目标位置信息。
可选地,在本实施例中,上述处理器可以被设置为通过计算机程序执行以下步骤:
S1,在通过探测设备采集位于探测设备所覆盖的目标区域内的移动终端的终端标识之后,判断终端标识是否处于与移动终端的厂商所所对应的终端标识段内;
S2,在判断结果为处于与移动终端的厂商所对应的终端标识段内的情况下,保留终端标识。
显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来 执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (14)

  1. 一种同行分析方法,其特征在于,包括:
    通过探测设备采集位于所述探测设备所覆盖的目标区域内的移动终端的终端标识;
    在所述终端标识中包含目标终端的目标终端标识的情况下,在监控设备中发出告警信息,其中,所述告警信息用于提示与所述目标终端标识关联的目标对象出现在所述目标区域内;
    获取所述移动终端在目标时间段内的位置信息,其中,所述目标时间段包括多个时间片;
    对获取到的所述位置信息分析,得到所述目标终端的同行分析结果,其中,所述同行分析结果包含所述移动终端中,在所述多个时间片的一个时间片内,与目标终端之间的距离小于目标距离阈值的终端。
  2. 根据权利要求1所述的方法,其特征在于,
    获取所述移动终端在目标时间段内的位置信息包括:在所述移动终端为目标终端的情况下,获取所述目标终端在所述目标时间段内的多个目标时间点上的多个目标位置信息;
    在获取所述目标终端在所述目标时间段内的多个目标时间点上的多个目标位置信息之后,所述方法还包括:按照所述多个目标时间点的时间顺序,根据所述多个目标位置信息,确定所述目标终端在所述目标时间段内的移动轨迹。
  3. 根据权利要求2所述的方法,其特征在于,获取所述目标终端在所述目标时间段内的所述多个目标时间点上的所述多个目标位置信息包括:
    通过所述探测设备获取所述目标终端在所述多个目标时间点上的目标属性信息;
    根据所述目标属性信息,确定所述目标终端在所述目标时间段内 的所述多个目标时间点上的所述多个目标位置信息。
  4. 根据权利要求2所述的方法,其特征在于,对获取到的所述位置信息分析,得到所述目标终端的所述同行分析结果包括:
    将所述目标时间段划分为所述多个时间片;
    从所述多个时间片中选取一个时间片作为当前时间片;
    判断在所述当前时间片内所述移动终端中是否存在第一移动终端,其中,所述第一移动终端为与所述目标终端的距离小于所述目标距离阈值的移动终端;
    在判断结果为存在所述第一移动终端的情况下,保存与所述当前时间片对应的第一匹配结果,其中,所述第一匹配结果包括所述第一移动终端的终端标识;
    判断所述多个时间片中是否存在未被选取过的时间片;
    在判断结果为存在未被选取过的时间片的情况下,从所述未被选取过的时间片中选取一个时间片作为当前时间片;继续执行判断在所述当前时间片内所述移动终端中是否存在所述第一移动终端的步骤;
    在判断结果为不存在未被选取过的时间片的情况下,从所述第一匹配结果中选取M个终端标识,得到与所述目标终端标识对应的目标匹配结果,其中,M为大于或等于1的整数,所述同行分析结果根据所述目标匹配结果进行确定。
  5. 根据权利要求4所述的方法,其特征在于,从所述第一匹配结果中选取M个终端标识,得到与所述目标终端标识对应的所述目标匹配结果包括:
    将所述第一匹配结果中的终端标识按照在所述第一匹配结果中出现的次数进行排序,得到第一排序结果;按照所述第一排序结果,从所述第一匹配结果中选取M个终端标识,得到所述目标匹配结果;或者,
    从所述第一匹配结果中选取一个终端标识作为当前终端标识,其中,所述当前终端标识用于标识当前终端;确定在所述目标时间段内所述当前终端与所述目标终端之间的轨迹相似度,其中,所述轨迹相似度为在所述目标时间段内,所述当前终端的移动轨迹和所述目标终端的移动轨迹之间的相似度;判断所述第一匹配结果是否包含未被选取过的终端标识;在判断结果为包含未被选取过的终端标识的情况下,从所述未被选取过的终端标识中选取一个终端标识作为当前终端标识,继续执行确定所述目标时间段内所述当前终端与所述目标终端之间的轨迹相似度的步骤;在判断结果为不包含未被选取过的终端标识的情况下,按照所述轨迹相似度从高到低的顺序对所述第一匹配结果中的终端标识进行排序,得到第二排序结果;按照所述第二排序结果,从所述第一匹配结果中选取M个终端标识,得到所述目标匹配结果;或者,
    从所述多个时间片中依次选取时间片作为当前时间片;确定在所述当前时间片内,所述第一移动终端的位置信息与所述目标终端的位置信息通过相同的映射或投影变换之后位于相同空间单元的目标概率;判断所述多个时间片是否包含未被选取过的时间片;在判断结果为包含未被选取过的时间片的情况下,从所述未被选取过的时间片中选取一个时间片作为当前时间片;确定在所述当前时间片内,所述第一移动终端的位置信息与所述目标终端的位置信息通过相同的映射或投影变换之后位于相同空间单元的目标概率的目标概率的步骤;在判断结果为不包含未被选取过的时间片的情况下,根据所述目标概率,对所述第一匹配结果中的终端标识进行排序;得到第三排序结果;按照所述第三排序结果,从所述第一匹配结果中选取M个终端标识,得到所述目标匹配结果。
  6. 根据权利要求4所述的方法,其特征在于,在从所述定位服务器获取所述目标终端在所述目标时间段内的多个时间点上的位置 信息之后,所述方法还包括:
    从所述目标匹配结果中选择一个终端标识,作为参考终端标识;
    从所述多个时间片中选取一个时间片作为当前时间片;
    判断在所述当前时间片内所述移动终端中是否存在第二移动终端,其中,所述第二移动终端为与所述参考终端的距离小于所述目标距离阈值的移动终端,所述参考终端标识用于标识所述参考终端;
    在判断结果为存在所述第二移动终端的情况下,保存与所述当前时间片对应的第二匹配结果,其中,所述第二匹配结果包括所述第二移动终端的终端标识;
    判断所述多个时间片中是否存在未被选取过的时间片;
    在判断结果为存在未被选取过的时间片的情况下,从所述未被选取过的时间片中选取一个时间片作为当前时间片;继续执行判断在所述当前时间片内所述移动终端中是否存在所述第二移动终端的步骤;
    在判断结果为不存在未被选取过的时间片的情况下,从所述第二匹配结果中选取M个终端标识,得到参考匹配结果;
    在所述参考匹配结果中包含所述目标终端标识的情况下,将所述参考终端标识输出;
    判断所述目标匹配结果是否存在未被选取过的终端标识;
    在判断结果为存在未被选取过的终端标识的情况下,从所述未被选取过的终端标识中选择一个终端标识,作为参考终端标识;继续执行从所述多个时间片中选取一个时间片作为当前时间片的步骤。
  7. 根据权利要求1至6中任一项所述的方法,其特征在于,在通过所述探测设备采集位于所述探测设备所覆盖的所述目标区域内的所述移动终端的所述终端标识之后,所述方法还包括:
    判断所述终端标识是否处于与所述移动终端的厂商所对应的终端标识段内;
    在判断结果为处于与所述移动终端的厂商所对应的所述终端标识段内的情况下,保留所述终端标识。
  8. 一种同行分析装置,其特征在于,包括:
    采集单元,用于通过探测设备采集位于所述探测设备所覆盖的目标区域内的移动终端的终端标识;
    告警单元,用于在所述终端标识中包含目标终端的目标终端标识的情况下,在监控设备中发出告警信息,其中,所述告警信息用于提示与所述目标终端标识关联的目标对象出现在所述目标区域内;
    获取单元,用于获取所述移动终端在目标时间段内的位置信息,其中,所述目标时间段包括多个时间片;
    分析单元,用于对获取到的所述位置信息分析,得到所述目标终端的同行分析结果,其中,所述同行分析结果包含所述移动终端中,在所述多个时间片的一个时间片内,与目标终端之间的距离小于目标距离阈值的终端。
  9. 根据权利要求8所述的装置,其特征在于,所述装置还包括确定单元,所述获取单元包括获取模块,其中,
    所述获取模块,用于在所述移动终端为目标终端的情况下,获取所述目标终端在所述目标时间段内的多个目标时间点上的多个目标位置信息;
    所述确定单元,用于按照所述多个目标时间点的时间顺序,根据所述多个目标位置信息,确定所述目标终端在所述目标时间段内的移动轨迹。
  10. 根据权利要求9所述的装置,其特征在于,所述获取模块包括:
    获取子模块,用于通过所述探测设备获取所述目标终端在所述多 个目标时间点上的目标属性信息;
    第一确定子模块,用于根据所述目标属性信息,确定所述目标终端在所述目标时间段内的所述多个目标时间点上的所述多个目标位置信息。
  11. 根据权利要求9所述的装置,其特征在于,所述分析单元包括:
    划分模块,用于将所述目标时间段划分为多个时间片;
    第一选取模块,用于从所述多个时间片中选取一个时间片作为当前时间片;
    第一判断模块,用于判断在所述当前时间片内所述移动终端中是否存在第一移动终端,其中,所述第一移动终端为与所述目标终端的距离小于所述目标距离阈值的移动终端;
    第一保存模块,用于在判断结果为存在所述第一移动终端的情况下,保存与所述当前时间片对应的第一匹配结果,其中,所述第一匹配结果包括所述第一移动终端的终端标识;
    第二判断模块,用于判断所述多个时间片中是否存在未被选取过的时间片;
    执行模块,用于在判断结果为存在未被选取过的时间片的情况下,从所述未被选取过的时间片中选取一个时间片作为当前时间片;继续执行判断在所述当前时间片内所述移动终端中是否存在所述第一移动终端的步骤;
    第二选取模块,用于在判断结果为不存在未被选取过的时间片的情况下,从所述第一匹配结果中选取M个终端标识,得到与所述目标终端标识对应的目标匹配结果,其中,M为大于或等于1的整数,所述同行分析结果根据所述目标匹配结果进行确定。
  12. 根据权利要求11所述的装置,其特征在于,第二选取模块包括:
    第一排序子模块,用于将所述第一匹配结果中的终端标识按照在所述第一匹配结果中出现的次数进行排序,得到第一排序结果;第一选取子模块,用于按照所述第一排序结果,从所述第一匹配结果中选取M个终端标识,得到所述目标匹配结果;或者,
    第二选取子模块,用于从所述第一匹配结果中选取一个终端标识作为当前终端标识,其中,所述当前终端标识用于标识当前终端;第二确定子模块,用于确定所述目标时间段内所述当前终端与所述目标终端之间的轨迹相似度,其中,所述轨迹相似度为在所述目标时间段内,所述当前终端的移动轨迹和所述目标终端的移动轨迹之间的相似度;第一判断子模块,用于判断所述第一匹配结果是否包含未被选取过的终端标识;第三选取子模块,用于在判断结果为包含未被选取过的终端标识的情况下,从所述未被选取过的终端标识中选取一个终端标识作为当前终端标识;第一执行子模块,用于继续执行确定在所述目标时间段内所述当前终端与所述目标终端之间的轨迹相似度的步骤;第二排序子模块,用于在判断结果为不包含未被选取过的终端标识的情况下,按照所述轨迹相似度从高到低的顺序对所述第一匹配结果中的终端标识进行排序,得到第二排序结果;第四选取子模块,用于按照所述第二排序结果,从所述第一匹配结果中选取M个终端标识,得到所述目标匹配结果;或者,
    第五选取子模块,用于从所述多个时间片中依次选取时间片作为当前时间片;第三确定子模块,用于确定在所述当前时间片内,所述第一移动终端的位置信息与所述目标终端的位置信息通过相同的映射或投影变换之后位于相同空间单元的目标概率;第二判断子模块,用于判断所述多个时间片是否包含未被选取过的时间片;第六选取子模块,用于在判断结果为包含未被选取过的时间片的情况下,从所述未被选取过的时间片中选取一个时间片作为当前时间片;第二执行子模 块,用于继续确定在所述当前时间片内,所述第一移动终端的位置信息与所述目标终端的位置信息通过相同的映射或投影变换之后位于相同空间单元的目标概率的步骤;第三排序子模块,用于在判断结果为不包含未被选取过的时间片的情况下,根据所述目标概率,对所述第一匹配结果中的终端标识进行排序;得到第三排序结果;第七选取子模块,用于按照所述第三排序结果,从所述第一匹配结果中选取M个终端标识,得到所述目标匹配结果。
  13. 根据权利要求11所述的装置,其特征在于,所述装置还包括:
    第一选取单元,用于在从所述定位服务器获取所述目标终端在所述目标时间段内的多个时间点上的位置信息之后,从所述目标匹配结果中选择一个终端标识,作为参考终端标识;
    第二选取单元,用于从所述多个时间片中选取一个时间片作为当前时间片;
    第一判断单元,用于判断在所述当前时间片内所述移动终端中是否存在第二移动终端,其中,所述第二移动终端为与所述参考终端的距离小于目标距离阈值的移动终端,所述参考终端标识用于标识所述参考终端;
    保存单元,用于在判断结果为存在所述第二移动终端的情况下,保存与所述当前时间片对应的第二匹配结果,其中,所述第二匹配结果包括所述第二移动终端的终端标识;
    第二判断单元,用于判断所述多个时间片中是否存在未被选取过的时间片;
    第三选取单元,用于在判断结果为存在未被选取过的时间片的情况下,从所述未被选取过的时间片中选取一个时间片作为当前时间片;第一执行单元,用于继续执行判断在所述当前时间片内所述移动终端 中是否存在所述第二移动终端的步骤;
    第四选取单元,用于在判断结果为不存在未被选取过的时间片的情况下,从所述第二匹配结果中选取M个终端标识,得到参考匹配结果;
    输出单元,用于在所述参考匹配结果中包含所述目标终端标识的情况下,将所述参考终端标识输出;
    第三判断单元,用于判断所述目标匹配结果是否存在未被选取过的终端标识;
    第五选取单元,用于在判断结果为存在未被选取过的终端标识的情况下,从所述未被选取过的终端标识中选择一个终端标识,作为参考终端标识;第二执行单元,用于继续执行从所述多个时间片中选取一个时间片作为当前时间片的步骤。
  14. 根据权利要求8至13中任一项所述的装置,其特征在于,所述装置还包括:
    第四判断单元,用于在通过所述探测设备接收所述移动终端返回的所述终端标识之后,判断所述终端标识是否处于与所述移动终端的厂商所所对应的终端标识段内;
    保留单元,用于在判断结果为处于与所述移动终端的厂商所对应的所述终端标识段内的情况下,保留所述终端标识。
PCT/CN2019/112666 2018-12-06 2019-10-23 同行分析方法及装置 WO2020114131A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811493495.0 2018-12-06
CN201811493495.0A CN111294728A (zh) 2018-12-06 2018-12-06 同行分析方法及装置

Publications (1)

Publication Number Publication Date
WO2020114131A1 true WO2020114131A1 (zh) 2020-06-11

Family

ID=70974978

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/112666 WO2020114131A1 (zh) 2018-12-06 2019-10-23 同行分析方法及装置

Country Status (2)

Country Link
CN (1) CN111294728A (zh)
WO (1) WO2020114131A1 (zh)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112037927A (zh) * 2020-08-24 2020-12-04 北京金山云网络技术有限公司 与被追踪人关联的同行人确定方法、装置及电子设备
CN112256982B (zh) * 2020-09-15 2022-08-16 中国科学院信息工程研究所 基于稀疏采样时空数据的目标同行关系分析方法及电子装置
CN112131278B (zh) * 2020-09-28 2024-09-06 浙江大华技术股份有限公司 轨迹数据的处理方法及装置、存储介质、电子装置
CN112489396B (zh) * 2020-11-16 2022-12-16 中移雄安信息通信科技有限公司 一种行人尾随行为检测方法、装置、电子设备和存储介质
CN112329691A (zh) * 2020-11-17 2021-02-05 珠海大横琴科技发展有限公司 一种监控视频的分析方法及装置、电子设备、存储介质
CN113704533B (zh) * 2021-01-25 2024-08-16 浙江大华技术股份有限公司 对象关系的确定方法及装置、存储介质、电子装置
CN113014633B (zh) * 2021-02-20 2022-07-01 杭州云深科技有限公司 预置设备的定位方法、装置、计算机设备及存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1578130A1 (en) * 2004-03-19 2005-09-21 Eximia S.r.l. Automated video editing system and method
EP2280382A1 (en) * 2009-07-26 2011-02-02 Verint Systems Ltd. Systems and methods for video- and position-based identification
CN104933201A (zh) * 2015-07-15 2015-09-23 蔡宏铭 基于同行信息的内容推荐方法及系统
WO2017024045A1 (en) * 2015-08-04 2017-02-09 James Carey Video identification and analytical recognition system
US20170054902A1 (en) * 2015-08-17 2017-02-23 Itx-M2M Co., Ltd. Video surveillance system for preventing exposure of uninteresting object
CN106534798A (zh) * 2016-12-06 2017-03-22 武汉烽火众智数字技术有限责任公司 一种用于安防监控的多维数据综合应用系统及其方法
CN108540756A (zh) * 2017-03-01 2018-09-14 中国电信股份有限公司 基于视频与电子设备标识的识别方法、装置及系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104035949B (zh) * 2013-12-10 2017-05-10 南京信息工程大学 一种基于局部敏感哈希改进算法的相似性数据检索方法
CN204046693U (zh) * 2014-06-17 2014-12-24 王传琪 一种公安用电子围栏
CN105208528B (zh) * 2015-09-24 2018-05-22 山东合天智汇信息技术有限公司 一种用于识别同行人员的系统及方法

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1578130A1 (en) * 2004-03-19 2005-09-21 Eximia S.r.l. Automated video editing system and method
EP2280382A1 (en) * 2009-07-26 2011-02-02 Verint Systems Ltd. Systems and methods for video- and position-based identification
CN104933201A (zh) * 2015-07-15 2015-09-23 蔡宏铭 基于同行信息的内容推荐方法及系统
WO2017024045A1 (en) * 2015-08-04 2017-02-09 James Carey Video identification and analytical recognition system
US20170054902A1 (en) * 2015-08-17 2017-02-23 Itx-M2M Co., Ltd. Video surveillance system for preventing exposure of uninteresting object
CN106534798A (zh) * 2016-12-06 2017-03-22 武汉烽火众智数字技术有限责任公司 一种用于安防监控的多维数据综合应用系统及其方法
CN108540756A (zh) * 2017-03-01 2018-09-14 中国电信股份有限公司 基于视频与电子设备标识的识别方法、装置及系统

Also Published As

Publication number Publication date
CN111294728A (zh) 2020-06-16

Similar Documents

Publication Publication Date Title
WO2020114131A1 (zh) 同行分析方法及装置
US10812761B2 (en) Complex hardware-based system for video surveillance tracking
US8107740B2 (en) Apparatus and method for efficient indexing and querying of images in security systems and other systems
CN109543312B (zh) 一种时空侦查分析方法及系统
US9854208B2 (en) System and method for detecting an object of interest
WO2020114138A1 (zh) 信息的关联分析方法及装置、储存介质、电子装置
CN104317918A (zh) 基于复合大数据gis的异常行为分析及报警系统
CN108271157B (zh) 一种伪基站识别方法及装置
CN112770265B (zh) 一种行人身份信息获取方法、系统、服务器和存储介质
US11240136B2 (en) Determining attributes using captured network probe data in a wireless communications system
CN108924759A (zh) 识别移动发生器的方法、装置及系统
CN109559336A (zh) 对象追踪方法、装置及存储介质
CN112687022A (zh) 一种基于视频的智能楼宇巡检方法及系统
CN111767432B (zh) 共现对象的查找方法和装置
CN103984716A (zh) 基于地理信息空间地址精确定位的方法及系统
Torkamandi et al. An online method for estimating the wireless device count via privacy-preserving wi-fi fingerprinting
CN111949699A (zh) 一种基于多重验证的轨迹碰撞方法及系统
WO2020114132A1 (zh) 一种信息关联性处理方法、装置及系统
Rusca et al. Privacy‐preserving WiFi‐based crowd monitoring
Teng et al. EV: Efficient visual surveillance with electronic footprints
CN111291595A (zh) 一种信息关联性处理方法、装置及系统
CN111935637A (zh) 一种人流量分析方法、存储介质及处理器
Ma et al. Detecting pedestrians behavior in building based on Wi-Fi signals
Zeng et al. Effectively linking persons on cameras and mobile devices on networks
CN107623917A (zh) 一种基于bs标签的定位欺骗攻击防御方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19893243

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19893243

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 19893243

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 19893243

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 28/04/2022)