CN106102001A - The screening technique of suspected crime mobile terminal and system - Google Patents
The screening technique of suspected crime mobile terminal and system Download PDFInfo
- Publication number
- CN106102001A CN106102001A CN201610389207.1A CN201610389207A CN106102001A CN 106102001 A CN106102001 A CN 106102001A CN 201610389207 A CN201610389207 A CN 201610389207A CN 106102001 A CN106102001 A CN 106102001A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- crime
- suspected
- information
- core network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention provides screening technique and the system of a kind of suspected crime mobile terminal, belongs to core network signalling areas of information technology, and it can at least partly solve can not assist, by the signaling data of mobile terminal, the problem determining suspect in prior art.The screening technique of the suspected crime mobile terminal of the present invention includes: obtain core network signalling information and the Crime Information of multiple crime of mobile terminal;Wherein, described core network signalling information includes that time, mobile terminal identification, mobile terminal locations, described Crime Information include guilty place and time of crime;According to described core network signalling information and Crime Information, setting up corresponding mobile terminal set for each crime, described mobile terminal collection is combined near the time of crime of this crime the set of the mobile terminal once occurred in around guilty place;The mobile terminal of scheduled volume is reached for suspected crime mobile terminal with occurrence number in multiple mobile terminal set.
Description
Technical field
The invention belongs to core network signalling areas of information technology, be specifically related to the screening side of a kind of suspected crime mobile terminal
Method and system.
Background technology
In modern society, mobile terminal (mobile phone) is the most universal, almost staff one.As long as and mobile terminal is started shooting,
Constantly will carry out the mutual of data by signaling and core net (communication core net), thus produce many signaling informations, at present
These information be there is no effective Land use systems.
Obviously, fighting crime is one of important process of maintaining social stability.But in prior art, but lack to utilize and move
Terminal carries out the effective means of cracking of cases, often after determining suspect by other means, it can only be moved end
End is tracked, examination etc., and can not determine crime suspicion by the signaling data of mobile terminal itself is analyzed to auxiliary
Doubt people.
Summary of the invention
The present invention at least partly solves to assist, by the signaling data of mobile terminal, the criminal of determination in existing technology
The problem of crime suspect, it is provided that a kind of method finding out the bigger mobile terminal that may belong to suspect and be
System.
Solve the technology of the present invention problem and be employed technical scheme comprise that the screening technique of a kind of suspected crime mobile terminal, its
Including:
Obtain core network signalling information and the Crime Information of multiple crime of mobile terminal;Wherein, described core network signalling
Information includes that time, mobile terminal identification, mobile terminal locations, described Crime Information include guilty place and time of crime;
According to described core network signalling information and Crime Information, set up corresponding mobile terminal set, institute for each crime
State mobile terminal collection and be combined near the time of crime of this crime the set of the mobile terminal once occurred in around guilty place;
The mobile terminal of scheduled volume is reached for suspected crime mobile terminal with occurrence number in multiple mobile terminal set.
Preferably, any one or many during described mobile terminal identification includes IMSI, IMEI, mobile terminal number
?.
It is preferably, described that to reach the mobile terminal of scheduled volume with occurrence number in multiple mobile terminal set be suspicious
Crime mobile terminal includes: in multiple mobile terminal set every both take common factor, and record whole nonempty sets of gained;
The occurrence number of mobile terminal in statistics nonempty set, the mobile terminal reaching scheduled volume with occurrence number moves for suspected crime
Terminal.
Preferably, described Crime Information also includes criminal type;Described to go out occurrence in multiple mobile terminal set
It is that suspected crime mobile terminal includes that number reaches the mobile terminal of scheduled volume: with the mobile end corresponding in the crime of multiple and same type
In end set, occurrence number reaches the mobile terminal of scheduled volume is suspected crime mobile terminal.
Preferably, described core network signalling information also includes the contact object of mobile terminal.
Solve the technology of the present invention problem and be employed technical scheme comprise that the screening system of a kind of suspected crime mobile terminal, its
Including:
Acquiring unit, for obtaining core network signalling information and the Crime Information of multiple crime of mobile terminal;Wherein, institute
State core network signalling information include time, mobile terminal identification, mobile terminal locations, described Crime Information include guilty place and
Time of crime;
Set signal generating unit, for according to described core network signalling information and Crime Information, setting up correspondence for each crime
Mobile terminal set, described mobile terminal collection is combined into and once occurred in around guilty place near the time of crime of this crime
The set of mobile terminal;
Terminal judges unit, for reaching the mobile terminal of scheduled volume with occurrence number in multiple mobile terminal set be
Suspected crime mobile terminal.
Preferably, any one or many during described mobile terminal identification includes IMSI, IMEI, mobile terminal number
?.
Preferably, described terminal judges unit includes: common factor module, for every two in multiple mobile terminal set
Person takes common factor, and records whole nonempty sets of gained;Statistical module, goes out occurrence for add up mobile terminal in nonempty set
Number, reaches the mobile terminal of scheduled volume for suspected crime mobile terminal with occurrence number.
Preferably, described Crime Information also includes criminal type;Described terminal judges unit is specifically for multiple
In the mobile terminal set corresponding with the crime of same type, occurrence number reaches the mobile terminal of scheduled volume is that suspected crime moves end
End.
Preferably, described core network signalling information also includes the contact object of mobile terminal.
The screening technique of the suspected crime mobile terminal of the present invention, can find out according to the core network signalling information of mobile terminal
It is positioned at the mobile terminal (being positioned at the mobile terminal of scene of a crime) near guilty place when crime occurs;Due to many criminals
For habitual offender, the most repeatedly crime, therefore often occur in scene of a crime, and the mobile terminal that it carries also can often show in crime
Field occurs;Accordingly, the mobile terminal (suspected crime mobile terminal) repeatedly repeated in scene of a crime the most just has more greatly may be used
It can be the mobile terminal of suspect;Therefore, present invention may determine that out suspicious mobile terminal, the detection for case provides just
Profit.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the screening technique of a kind of suspected crime mobile terminal of embodiments of the invention;
Fig. 2 is the schematic flow sheet of the screening technique of the another kind of suspected crime mobile terminal of embodiments of the invention;
Fig. 3 is the composition schematic block diagram of the screening system of a kind of suspected crime mobile terminal of embodiments of the invention;
Fig. 4 is the composition schematic block diagram of the screening system of the another kind of suspected crime mobile terminal of embodiments of the invention.
Detailed description of the invention
For making those skilled in the art be more fully understood that technical scheme, below in conjunction with the accompanying drawings and specific embodiment party
The present invention is described in further detail by formula.
Embodiment 1:
As it is shown in figure 1, the present embodiment provides the screening technique of a kind of suspected crime mobile terminal, comprising:
S101, the core network signalling information obtaining mobile terminal and the Crime Information of multiple crime;Wherein, described core net
Signaling information includes time, mobile terminal identification, mobile terminal locations, when described Crime Information includes guilty place and crime
Between.
S102, according to described core network signalling information and Crime Information, set up corresponding mobile terminal collection for each crime
Closing, described mobile terminal collection is combined near the time of crime of this crime the mobile terminal that once occurred in around guilty place
Set.
S103, the mobile terminal reaching scheduled volume with occurrence number in multiple mobile terminal set move for suspected crime
Terminal.
According to the screening technique of the suspected crime mobile terminal of the present embodiment, can believe according to the core network signalling of mobile terminal
Breath is found out and is positioned at the mobile terminal (being positioned at the mobile terminal of scene of a crime) near guilty place when crime occurs;Owing to being permitted
Many criminals are habitual offender, the most repeatedly crime, therefore often occur in scene of a crime, and the mobile terminal that it carries also can often exist
Scene of a crime occurs;Accordingly, the mobile terminal (suspected crime mobile terminal) repeatedly repeated in scene of a crime the most just has
It is probably more greatly the mobile terminal of suspect;Therefore, this enforcement can determine that suspicious mobile terminal, for the detection of case
There is provided convenient.
Embodiment 2:
As in figure 2 it is shown, the present embodiment provides the screening technique of a kind of suspected crime mobile terminal, comprising:
S201, the core network signalling information obtaining mobile terminal and the Crime Information of multiple crime.Wherein, core network signalling
Information includes time, mobile terminal identification, mobile terminal locations, and Crime Information includes guilty place and time of crime.
Wherein, " core network signalling " is information mutual between mobile terminal and core net (communication core net), as long as moving
Dynamic terminal is opened, even if not surfing the Net, call etc., it also can be constantly be generated core network signalling.
According to the present embodiment, the core network signalling information of each mobile terminal to be gathered from core net and stored down
Come.This core network signalling information includes time, mobile terminal identification, mobile terminal locations, thus according to core network signalling information
I.e. would know that each mobile terminal position at each time place.
Wherein, above mobile terminal identification is the mark for distinguishing different mobile terminal, and it can have multiple different shape
Formula.Preferably, mobile terminal identification includes IMSI (International Mobile Subscriber Identification
Number, international mobile subscriber identity), IMEI (International Mobile Station Equipment Identification, International Mobile
Equipment Identity), any one or more in mobile terminal number.IMSI is unique international numbering of SIM,
IMEI is then the unique number of mobile terminal product, the cell-phone number that mobile terminal number then uses for this mobile terminal.Due to
It is likely to occur replacing SIM, changes the situation such as mobile terminal, use double-card mobile phone, therefore above all kinds of marks can be neutralized and use,
To determine mobile terminal more accurately.
Above mobile terminal locations is then the information representing mobile terminal position, and it can be base station number (Cell
ID), cell id (LAC ID) etc., it is also possible to be the shifting calculated according to the signal intensity of mobile terminal, direction etc. by each base station
The concrete coordinate (such as longitude and latitude) etc. of dynamic terminal.
Preferably, above core network signalling information also includes the contact object of mobile terminal.
It is to say, the operation that mobile terminal is carried out also can be recorded in more detail, including type of service (as call, QQ),
Business time started, business persistent period, business object (such as call distant terminal number, QQ contact person etc.), so that it is determined that respectively
Mobile terminal often with which object contacts.So after determining suspected crime mobile terminal, can be more preferable according to these information
Lookup suspect.
Gathering while core network signalling information, also will be by Crime Information collection and store.In Crime Information extremely
Include guilty place and time of crime less.Receiving after there is the reporting a case to the security authorities of crime, the police can reconnoitre, and tentatively judges the criminal of drawing
Position (i.e. guilty place) that crime occurs and time (i.e. time of crime), and according to the method for the present embodiment, can by these
Record for Crime Information, so that it is determined that when and where having crime to occur.
Preferably, above Crime Information also includes criminal type.
It is to say, also crime can be divided into different types and record, such as burglary, steal, robbery etc..
S202, according to core network signalling information and Crime Information, set up corresponding mobile terminal set for each crime, move
Dynamic termination set is combined near the time of crime of this crime the set of the mobile terminal once occurred in around guilty place.
It is to say, according to the guilty place of each crime and time of crime, make a look up in core network signalling information,
Find near the time that this crime occurs (as in front and back's error half an hour) once around crime scene (such as radius
Whole mobile terminals 500mi) occurred, and using it as a set (mobile terminal set).Such as, for 4 crimes,
Available 4 mobile terminals set A, B, C, D, the most each mobile terminal set includes multiple different mobile terminal, such as A=
{IMSIA1, IMSIA2, IMSIA3, B={IMSIB1, IMSIB2, IMSIB3, IMSIB3... etc., the most each IMSI is a shifting
The mark of dynamic terminal.
S203, in multiple mobile terminal set every both take common factor, and record whole nonempty sets of gained.
It is to say, the combination to each two in multiple mobile terminal set of gained takes the operation of common factor (i.e.
Each mobile terminal set will be occured simultaneously with other all of mobile terminal collection conjunction), thus obtain multiple set.Such as, right
In above 4 mobile terminals set A, B, C, D, following 6 set AB=A ∩ B, AC=A ∩ C, AD=A ∩ D, BC should be obtained altogether
=B ∩ C, BD=B ∩ D, CD=C ∩ D.Afterwards, nonempty set therein is recorded, for example, it is assumed that nonvoid set therein
It is combined into AB, AC, BD, CD totally 4.
Owing to the use of current mobile terminal is very universal, therefore the mobile terminal quantity in each mobile terminal set
May very big (such as thousand of), but wherein most mobile terminals are not the most suspected crime mobile terminals, if one by one to them
Carry out judgement and can cause the biggest wasting of resources, and be also difficult to.To this end, can first in each mobile terminal set every both
Take and occur simultaneously and record the nonempty set obtained, it is clear that every mobile end occurred in the nonempty set obtained by the method
End, means that it at least occurred two different scenes of a crime, and it is that the probability of suspected crime mobile terminal can be significantly
Improve.Therefore, by this step, can Preliminary screening go out to have the mobile terminal being probably more greatly suspected crime mobile terminal.
Preferably, if also including criminal type in above Crime Information, then this step is to corresponding with the crime of same type
In multiple mobile terminal set every both take common factor.
A lot of offenders often repeat of a sort criminal activity (such as confirmed thief), therefore, if according to crime
Type searches suspected crime mobile terminal respectively, is greatly improved accuracy rate.
In S204, statistics nonempty set, the occurrence number of mobile terminal, reaches the mobile terminal of scheduled volume with occurrence number
For suspected crime mobile terminal.
It is to say, to the mobile terminal occurred in all above any nonempty set, respectively in all nonempty sets
In it is made a look up, thus show that each mobile terminal occurs in how many nonempty sets;Afterwards, take and appear above number of times
Mobile terminal more than scheduled volume (such as 5 times), as suspected crime mobile terminal.
Visible, the mass action of above step S203 and S204 generally: to go out occurrence in multiple mobile terminal set
It is suspected crime mobile terminal that number reaches the mobile terminal of scheduled volume.According to above method, can add up and often obtain in crime now
The mobile terminal that field occurs;Owing to many criminals are habitual offender, the most repeatedly crime, therefore can often occur in scene of a crime, and
Its mobile terminal carried also can often occur in scene of a crime;Accordingly, the mobile end repeatedly repeated in scene of a crime
End (suspected crime mobile terminal) the most just has the mobile terminal being probably more greatly suspect;Therefore, this enforcement can determine that
Suspicious mobile terminal, the detection for case provides convenient.
Certainly, if above Crime Information also includes criminal type, then the acting as of step S203 and S204: with multiple
In the mobile terminal set corresponding with the crime of same type, occurrence number reaches the mobile terminal of scheduled volume is that suspected crime moves end
End.
Embodiment 3:
As it is shown on figure 3, the present embodiment provides the screening system of a kind of suspected crime mobile terminal, comprising:
Acquiring unit, for obtaining core network signalling information and the Crime Information of multiple crime of mobile terminal;Wherein, institute
State core network signalling information include time, mobile terminal identification, mobile terminal locations, described Crime Information include guilty place and
Time of crime.
Set signal generating unit, for according to described core network signalling information and Crime Information, setting up correspondence for each crime
Mobile terminal set, described mobile terminal collection is combined into and once occurred in around guilty place near the time of crime of this crime
The set of mobile terminal.
Terminal judges unit, for reaching the mobile terminal of scheduled volume with occurrence number in multiple mobile terminal set be
Suspected crime mobile terminal.
Embodiment 4:
As shown in Figure 4, the present embodiment provides the screening system of a kind of suspected crime mobile terminal, comprising:
Acquiring unit, for obtaining core network signalling information and the Crime Information of multiple crime of mobile terminal;Wherein, core
Heart net signaling information includes time, mobile terminal identification, mobile terminal locations, when Crime Information includes guilty place and crime
Between.
Set signal generating unit, for according to core network signalling information and Crime Information, setting up corresponding shifting for each crime
Dynamic terminal set, mobile terminal collection is combined near the time of crime of this crime the mobile end once occurring in around guilty place
The set of end.
Terminal judges unit, for reaching the mobile terminal of scheduled volume with occurrence number in multiple mobile terminal set be
Suspected crime mobile terminal.
Preferably, terminal judges unit includes: common factor module, in multiple mobile terminal set every both take friendship
Collection, and record whole nonempty sets of gained;Statistical module, for adding up the occurrence number of mobile terminal in nonempty set, with
It is suspected crime mobile terminal that occurrence number reaches the mobile terminal of scheduled volume.
Preferably, any one or more during mobile terminal identification includes IMSI, IMEI, mobile terminal number.
Preferably, Crime Information also includes criminal type;Terminal judges unit is specifically for violate with type multiple
In the mobile terminal set that crime is corresponding, occurrence number reaches the mobile terminal of scheduled volume is suspected crime mobile terminal.
Preferably, core network signalling information also includes operation behavior and/or the contact object of mobile terminal.
It is understood that the principle that is intended to be merely illustrative of the present of embodiment of above and the exemplary enforcement that uses
Mode, but the invention is not limited in this.For those skilled in the art, in the essence without departing from the present invention
In the case of god and essence, can make various modification and improvement, these modification and improvement are also considered as protection scope of the present invention.
Claims (10)
1. the screening technique of a suspected crime mobile terminal, it is characterised in that including:
Obtain core network signalling information and the Crime Information of multiple crime of mobile terminal;Wherein, described core network signalling information
Including time, mobile terminal identification, mobile terminal locations, described Crime Information includes guilty place and time of crime;
According to described core network signalling information and Crime Information, set up corresponding mobile terminal set, described shifting for each crime
Dynamic termination set is combined near the time of crime of this crime the set of the mobile terminal once occurred in around guilty place;
The mobile terminal of scheduled volume is reached for suspected crime mobile terminal with occurrence number in multiple mobile terminal set.
The screening technique of suspected crime mobile terminal the most according to claim 1, it is characterised in that
It is any one or more that described mobile terminal identification includes in IMSI, IMEI, mobile terminal number.
The screening technique of suspected crime mobile terminal the most according to claim 1, it is characterised in that described with in multiple shiftings
In dynamic terminal set, occurrence number reaches the mobile terminal of scheduled volume is that suspected crime mobile terminal includes:
To in multiple mobile terminal set every both take common factor, and record whole nonempty sets of gained;
In statistics nonempty set, the occurrence number of mobile terminal, reaches the mobile terminal of scheduled volume as suspected crime with occurrence number
Mobile terminal.
The screening technique of suspected crime mobile terminal the most according to claim 1, it is characterised in that
Described Crime Information also includes criminal type;
Described reach the mobile terminal of scheduled volume for suspected crime mobile terminal with occurrence number in multiple mobile terminal set
Including: reach the mobile terminal of scheduled volume for can with occurrence number in mobile terminal set corresponding to crime of multiple and same type
Suspect's crime mobile terminal.
The screening technique of suspected crime mobile terminal the most according to claim 1, it is characterised in that
Described core network signalling information also includes the contact object of mobile terminal.
6. the screening system of a suspected crime mobile terminal, it is characterised in that including:
Acquiring unit, for obtaining core network signalling information and the Crime Information of multiple crime of mobile terminal;Wherein, described core
Heart net signaling information includes that time, mobile terminal identification, mobile terminal locations, described Crime Information include guilty place and crime
Time;
Set signal generating unit, for according to described core network signalling information and Crime Information, setting up corresponding shifting for each crime
Dynamic terminal set, described mobile terminal collection is combined near the time of crime of this crime and once occurred in the shifting around guilty place
The set of dynamic terminal;
Terminal judges unit, is suspicious for reaching the mobile terminal of scheduled volume with occurrence number in multiple mobile terminal set
Crime mobile terminal.
The screening system of suspected crime mobile terminal the most according to claim 6, it is characterised in that
It is any one or more that described mobile terminal identification includes in IMSI, IMEI, mobile terminal number.
The screening system of suspected crime mobile terminal the most according to claim 6, it is characterised in that described terminal judges list
Unit includes:
Common factor module, in multiple mobile terminal set every both take common factor, and record whole nonempty sets of gained;
Statistical module, for adding up the occurrence number of mobile terminal in nonempty set, reaches the movement of scheduled volume with occurrence number
Terminal is suspected crime mobile terminal.
The screening system of suspected crime mobile terminal the most according to claim 6, it is characterised in that
Described Crime Information also includes criminal type;
Described terminal judges unit is specifically for occurrence number in the mobile terminal set corresponding in the crime of multiple and same type
The mobile terminal reaching scheduled volume is suspected crime mobile terminal.
The screening system of suspected crime mobile terminal the most according to claim 6, it is characterised in that
Described core network signalling information also includes the contact object of mobile terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610389207.1A CN106102001A (en) | 2016-06-02 | 2016-06-02 | The screening technique of suspected crime mobile terminal and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610389207.1A CN106102001A (en) | 2016-06-02 | 2016-06-02 | The screening technique of suspected crime mobile terminal and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106102001A true CN106102001A (en) | 2016-11-09 |
Family
ID=57446986
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610389207.1A Pending CN106102001A (en) | 2016-06-02 | 2016-06-02 | The screening technique of suspected crime mobile terminal and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106102001A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107835484A (en) * | 2017-09-15 | 2018-03-23 | 上海百林通信网络科技服务股份有限公司 | The method for assessing mobile device user potential degree of hazard |
CN108495268A (en) * | 2018-03-19 | 2018-09-04 | 中国联合网络通信集团有限公司 | A kind of safety protection method and platform of sensitizing range |
CN108810803A (en) * | 2018-06-12 | 2018-11-13 | 中国联合网络通信集团有限公司 | Find the method and system of lost contact user |
CN109041044A (en) * | 2018-08-20 | 2018-12-18 | 中国联合网络通信集团有限公司 | Technology methods of investigation and technology Reconnaissance system |
CN109151733A (en) * | 2018-08-03 | 2019-01-04 | 中国联合网络通信集团有限公司 | A kind of localization method and device of suspect |
TWI653874B (en) | 2017-09-30 | 2019-03-11 | 中華電信股份有限公司 | Method and system for screening specific cars by communication records |
CN110933605A (en) * | 2019-11-26 | 2020-03-27 | 武汉虹旭信息技术有限责任公司 | Excavation method and device for moving target |
CN111050293A (en) * | 2019-12-23 | 2020-04-21 | 北京明略软件系统有限公司 | Data processing method and device and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101656913A (en) * | 2009-09-23 | 2010-02-24 | 中兴通讯股份有限公司 | Method and system for monitoring analysis based on mobile network |
CN103716878A (en) * | 2013-12-12 | 2014-04-09 | 深圳先进技术研究院 | Method for locating with the use of mobile phone and video monitoring equipment |
CN103914532A (en) * | 2014-03-31 | 2014-07-09 | 安徽新华博信息技术股份有限公司 | Analyzing method for automatically troubleshooting suspects |
CN104077410A (en) * | 2014-07-14 | 2014-10-01 | 四川效率源信息安全技术有限责任公司 | Device and method for extracting mobile phone position information and marking mobile phone position information on map |
CN105246157A (en) * | 2015-11-03 | 2016-01-13 | 中国联合网络通信集团有限公司 | Mobile terminal positioning method and positioning system |
CN105323713A (en) * | 2014-06-20 | 2016-02-10 | 中兴通讯股份有限公司 | Technical investigation method and system based on passive positioning |
-
2016
- 2016-06-02 CN CN201610389207.1A patent/CN106102001A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101656913A (en) * | 2009-09-23 | 2010-02-24 | 中兴通讯股份有限公司 | Method and system for monitoring analysis based on mobile network |
CN103716878A (en) * | 2013-12-12 | 2014-04-09 | 深圳先进技术研究院 | Method for locating with the use of mobile phone and video monitoring equipment |
CN103914532A (en) * | 2014-03-31 | 2014-07-09 | 安徽新华博信息技术股份有限公司 | Analyzing method for automatically troubleshooting suspects |
CN105323713A (en) * | 2014-06-20 | 2016-02-10 | 中兴通讯股份有限公司 | Technical investigation method and system based on passive positioning |
CN104077410A (en) * | 2014-07-14 | 2014-10-01 | 四川效率源信息安全技术有限责任公司 | Device and method for extracting mobile phone position information and marking mobile phone position information on map |
CN105246157A (en) * | 2015-11-03 | 2016-01-13 | 中国联合网络通信集团有限公司 | Mobile terminal positioning method and positioning system |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107835484A (en) * | 2017-09-15 | 2018-03-23 | 上海百林通信网络科技服务股份有限公司 | The method for assessing mobile device user potential degree of hazard |
TWI653874B (en) | 2017-09-30 | 2019-03-11 | 中華電信股份有限公司 | Method and system for screening specific cars by communication records |
CN108495268A (en) * | 2018-03-19 | 2018-09-04 | 中国联合网络通信集团有限公司 | A kind of safety protection method and platform of sensitizing range |
CN108495268B (en) * | 2018-03-19 | 2020-08-28 | 中国联合网络通信集团有限公司 | Security method and platform for sensitive area |
CN108810803A (en) * | 2018-06-12 | 2018-11-13 | 中国联合网络通信集团有限公司 | Find the method and system of lost contact user |
CN109151733A (en) * | 2018-08-03 | 2019-01-04 | 中国联合网络通信集团有限公司 | A kind of localization method and device of suspect |
CN109151733B (en) * | 2018-08-03 | 2020-10-23 | 中国联合网络通信集团有限公司 | Criminal suspect positioning method and device |
CN109041044A (en) * | 2018-08-20 | 2018-12-18 | 中国联合网络通信集团有限公司 | Technology methods of investigation and technology Reconnaissance system |
CN110933605A (en) * | 2019-11-26 | 2020-03-27 | 武汉虹旭信息技术有限责任公司 | Excavation method and device for moving target |
CN110933605B (en) * | 2019-11-26 | 2021-09-28 | 武汉虹旭信息技术有限责任公司 | Excavation method and device for moving target |
CN111050293A (en) * | 2019-12-23 | 2020-04-21 | 北京明略软件系统有限公司 | Data processing method and device and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106102001A (en) | The screening technique of suspected crime mobile terminal and system | |
CN108924333B (en) | Fraud telephone identification method, device and system | |
US9165288B2 (en) | Inferring relationships based on geo-temporal data other than telecommunications | |
US8515565B2 (en) | Method and system for an integrated incident information and intelligence system | |
US9179259B2 (en) | Recognizing unknown actors based on wireless behavior | |
CN107423434B (en) | Mining method of potential social relationship network based on ticket data | |
CN109429230A (en) | A kind of communication swindle recognition methods and system | |
CN101621732A (en) | Intelligent video monitoring method for tracking identification | |
EP2403288B1 (en) | System and method for determining commonly used communication terminals and for identifying noisy entities in large-scale link analysis | |
CN103648096A (en) | Method for rapidly detecting and positioning illegal base station intrusion | |
CN108924759B (en) | Method, device and system for identifying mobile generator | |
US20140004817A1 (en) | Cell phone detection and alert information system | |
CN106549902A (en) | A kind of recognition methods of suspicious user and equipment | |
CN105307119A (en) | Pseudo base station positioning method based on RSSI base station signal estimation | |
CN106131784A (en) | A kind of suspicion number determines methods, devices and systems | |
CN106899948B (en) | Pseudo base station discovery method, system, terminal and server | |
CN106102082B (en) | A kind of suspicion number determines method, apparatus, system | |
CN107092651B (en) | Key character mining method and system based on communication network data analysis | |
CN105657130A (en) | Crank call intercepting method and system | |
CN107155186A (en) | A kind of pseudo-base station localization method and device | |
Giura et al. | Is it really you? User identification via adaptive behavior fingerprinting | |
CA2500082A1 (en) | Intelligent surveillance and profiling method and system for application in a wireless network | |
Jacques | Mobile phone metadata for development | |
CN102546272A (en) | Information leakage detection method and device and system utilizing method | |
CN109151733A (en) | A kind of localization method and device of suspect |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161109 |