CN112187898A - Data access system, method and device based on public security network - Google Patents

Data access system, method and device based on public security network Download PDF

Info

Publication number
CN112187898A
CN112187898A CN202010989980.8A CN202010989980A CN112187898A CN 112187898 A CN112187898 A CN 112187898A CN 202010989980 A CN202010989980 A CN 202010989980A CN 112187898 A CN112187898 A CN 112187898A
Authority
CN
China
Prior art keywords
deployment
control
data
control data
public security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010989980.8A
Other languages
Chinese (zh)
Other versions
CN112187898B (en
Inventor
尹金伟
石立阳
郝亚
李晓峰
高永清
熊湘琛
曹毅
余银星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Public Security Bureau
PCI Suntek Technology Co Ltd
Original Assignee
Foshan Public Security Bureau
PCI Suntek Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Public Security Bureau, PCI Suntek Technology Co Ltd filed Critical Foshan Public Security Bureau
Priority to CN202010989980.8A priority Critical patent/CN112187898B/en
Publication of CN112187898A publication Critical patent/CN112187898A/en
Application granted granted Critical
Publication of CN112187898B publication Critical patent/CN112187898B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • H04L12/2869Operational details of access network equipments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Educational Administration (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • General Engineering & Computer Science (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application discloses a data access system, a data access method and a data access device based on a public security network. According to the technical scheme, the control data of the corresponding control object are extracted in real time through the third-party internet platform according to the pre-stored control object information, the control data are sent to the corresponding mobile terminal based on the pre-stored communication identification information, the control data are received by the mobile terminal, and the control data are forwarded to the public security network management platform through the mobile private network. And then, the public security network management platform monitors the corresponding control object and generates and distributes control business based on the control data. By adopting the technical means, the mobile terminal is used as a deployment and control data forwarding medium, a data interaction barrier between the third-party internet platform and the public security network management platform can be opened, the public security network management platform can conveniently access the deployment and control data generated by the third-party internet platform, and the data access cost is saved.

Description

Data access system, method and device based on public security network
Technical Field
The embodiment of the application relates to the technical field of public security network big data management platforms, in particular to a data access system, a data access method and a data access device based on a public security network.
Background
At present, with the development of internet technology, third-party internet platforms are also rapidly developed. By means of various third-party internet platforms, people can perform operations such as social contact, shopping, riding, traveling and the like. For the public security network management platform, a better deployment and control effect can be achieved by acquiring relevant deployment and control data (such as riding data, shopping data, social network data and the like) of a deployment and control object on a third-party internet platform.
However, since the public security network management platform is different from the network used by the third-party internet platform, in order to introduce the deployment and control data of the third-party internet platform into the internal network of the public security network, an additional data interface is needed to be customized, the input cost is relatively high, and the security of the access data is difficult to guarantee.
Disclosure of Invention
The embodiment of the application provides a data access system, method and device based on a public security network, which can open a data interaction barrier between a public security network management platform and a third-party internet platform, reduce the deployment and control data acquisition cost and realize a better deployment and control data acquisition effect.
In a first aspect, an embodiment of the present application provides a data access system based on a public security network, including: the system comprises a third-party internet platform, a public security network management platform and a plurality of mobile terminals;
the third-party internet platform stores communication identification information of each mobile terminal and corresponding deployment object information in advance, is used for extracting deployment data of a corresponding deployment object in real time according to the deployment object information, and sends the deployment data to the corresponding mobile terminal based on the communication identification information, wherein the deployment data comprises the deployment object information;
each mobile terminal is used for receiving the control data and forwarding the control data to the public security network management platform through a mobile private network;
the public security network management platform is used for receiving the control data, and monitoring corresponding control objects and generating and distributing control services based on the control data.
In a second aspect, an embodiment of the present application provides a data access method based on a public security network, which is applied to a data access system based on a public security network according to the first aspect of the embodiment of the present application, and includes:
the third-party internet platform extracts the deployment and control data corresponding to the deployment and control object in real time according to the pre-stored deployment and control object information, and sends the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information;
the mobile terminal receives the deployment and control data and forwards the deployment and control data to a public security network management platform through a mobile private network;
and the public security network management platform receives the deployment and control data, and performs monitoring of the corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
In a third aspect, an embodiment of the present application provides a data access method based on a public security network, including:
the third-party internet platform extracts the deployment and control data corresponding to the deployment and control object in real time according to the pre-stored deployment and control object information, sends the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information, so that the mobile terminal can receive the deployment and control data and then forward the deployment and control data to the public security network management platform through a mobile private network, and the public security network management platform carries out monitoring of the corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
Further, the third-party internet platform extracts the deployment and control data corresponding to the deployment and control object in real time according to the pre-stored deployment and control object information, and the method comprises the following steps:
the third-party internet platform retrieves and compares platform service data generated in real time according to pre-stored control object information;
and when the platform service data containing the deployment object information is retrieved, extracting the platform service data as deployment data corresponding to the deployment object.
Further, the sending the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information includes:
and sending the deployment and control data to a mobile terminal corresponding to the communication identification information in the form of short messages or system messages based on the prestored communication identification information.
In a fourth aspect, an embodiment of the present application provides a data access method based on a public security network, including:
the mobile terminal receives the deployment and control data, the deployment and control data of the corresponding deployment and control object is extracted in real time by the third-party internet platform according to the pre-stored deployment and control object information, and the deployment and control data is sent to the corresponding mobile terminal based on the pre-stored communication identification information;
and forwarding the deployment and control data to a public security network management platform through a mobile private network, so that the public security network management platform receives the deployment and control data and carries out monitoring of corresponding deployment and control objects and generation and distribution of deployment and control services based on the deployment and control data.
Further, the mobile terminal receives the deployment and control data, and forwards the deployment and control data to the public security network management platform through the mobile private network, including:
the mobile terminal receives the control data in the form of short messages or system information;
and the mobile terminal screens and filters own short messages or system messages through a preset data filtering program based on the pre-stored deployment and control object information, determines the short messages or system messages containing the deployment and control object information as the deployment and control data, and forwards the deployment and control data to a public security network management platform through a mobile private network.
Further, forwarding the deployment and control data to a public security network management platform further includes:
and when monitoring that the control data is unsuccessfully forwarded, writing the control data into a data retransmission buffer folder, sending a forwarding failure alarm message to an operation and maintenance terminal, and/or automatically extracting the control data from the data retransmission buffer folder for data retransmission after a set time period.
In a fifth aspect, an embodiment of the present application provides a data access method based on a public security network, including:
the public security network management platform receives the deployment and control data, monitors corresponding deployment and control objects based on the deployment and control data, generates and distributes deployment and control services, extracts the deployment and control data in real time by a third-party internet platform according to pre-stored deployment and control object information, sends the deployment and control data to a corresponding mobile terminal based on pre-stored communication identification information, and forwards the deployment and control data to the public security network management platform by the mobile terminal through a mobile private network.
Further, the monitoring of the corresponding deployment object, the generation and the distribution of the deployment service are performed based on the deployment data, and the method includes the following steps:
analyzing the control data, and generating corresponding control business in real time when the control data meets a predefined control business generation rule;
and sending the control business and the control data to corresponding control business processing terminals according to the control object information corresponding to the control data, wherein the control business processing terminals are bound with the control object information in advance.
Further, after the monitoring of the corresponding deployment object, the generation and the distribution of the deployment service are performed based on the deployment data, the method further includes:
and the public security network management platform receives a control business processing result fed back by the control business processing terminal, binds the control business processing result, the corresponding control data and the control object information to generate a control record and stores the control record.
In a sixth aspect, an embodiment of the present application provides a data access apparatus based on a public security network, including:
the extraction module is used for extracting the deployment and control data of the corresponding deployment and control object in real time through a third-party internet platform according to the pre-stored deployment and control object information;
and the sending module is used for sending the deployment and control data to a corresponding mobile terminal based on the prestored communication identification information so that the mobile terminal can receive the deployment and control data and then forward the deployment and control data to a public security network management platform through a mobile private network, and the public security network management platform carries out monitoring of a corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
In a seventh aspect, an embodiment of the present application provides a data access apparatus based on a public security network, including:
the receiving module is used for receiving the deployment and control data, the deployment and control data of the corresponding deployment and control object is extracted in real time by the third-party internet platform according to the pre-stored deployment and control object information, and the deployment and control data is sent to the corresponding mobile terminal based on the pre-stored communication identification information;
and the forwarding module is used for forwarding the control data to a public security network management platform through a mobile private network so that the public security network management platform receives the control data and carries out monitoring of a corresponding control object and generation and distribution of control business based on the control data.
In an eighth aspect, an embodiment of the present application provides a data access apparatus based on a public security network, including:
and the service distribution module is used for receiving the deployment and control data through the public security network management platform, monitoring corresponding deployment and control objects based on the deployment and control data, generating and distributing deployment and control services, extracting the deployment and control data in real time by the third-party internet platform according to pre-stored deployment and control object information, sending the data to the corresponding mobile terminal based on pre-stored communication identification information, and then forwarding the data to the public security network management platform through the mobile private network by the mobile terminal.
In a ninth aspect, embodiments of the present application provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the method for data access based on a public security network according to any one of the second aspect to the fifth aspect.
According to the embodiment of the application, the third-party internet platform extracts the deployment and control data of the corresponding deployment and control object in real time according to the pre-stored deployment and control object information, the deployment and control data are sent to the corresponding mobile terminal based on the pre-stored communication identification information, the mobile terminal receives the deployment and control data, and the deployment and control data are forwarded to the public security network management platform through the mobile private network. And then, the public security network management platform monitors the corresponding control object and generates and distributes control business based on the control data. By adopting the technical means, the mobile terminal is used as a deployment and control data forwarding medium, a data interaction barrier between the third-party internet platform and the public security network management platform can be opened, the public security network management platform can conveniently access the deployment and control data generated by the third-party internet platform, and the data access cost is saved.
Moreover, the control data are filtered through the mobile terminal, so that the safety risk of accessing the control data by the public security network management platform can be reduced, and the safety of data access is improved.
Drawings
Fig. 1 is a schematic structural diagram of a data access system based on a public security network according to an embodiment of the present application;
fig. 2 is a flowchart of a data access method based on a public security network according to an embodiment of the present application;
FIG. 3 is a flowchart of the acquisition of deployment and control data according to the first embodiment of the present application;
fig. 4 is a flow chart of filtering and forwarding control data in the first embodiment of the present application;
fig. 5 is a flow chart of controlling service generation and distribution in the first embodiment of the present application;
fig. 6 is a flowchart of controlling data access to a public security network according to a first embodiment of the present application;
fig. 7 is a schematic structural diagram of a data access device based on a public security network according to a second embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, specific embodiments of the present application will be described in detail with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some but not all of the relevant portions of the present application are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The data access system and method based on the public security network aim at using the mobile terminal as a deployment and control data access medium of a public security network management platform, receiving deployment and control data sent by a third-party internet platform by the mobile terminal, and forwarding the deployment and control data to the public security network management platform through a mobile private network. Therefore, the interaction barrier of the data domain and the user domain existing between the third-party internet platform and the public security network management platform is opened, and the control data of the third-party internet platform can be accessed to the public security network management platform. The whole data access operation is simple and convenient, and the security risk is lower. Compared with the existing public security network management platform, when internet related data is to be accessed to the internal network of the public security network, the data file needs to be ferried through a boundary and also needs to be subjected to security verification, meanwhile, in order to enable the data of a third-party internet network platform to be accessed to the public security network management platform, customized development of a data interface needs to be carried out, the whole process is relatively complicated, and the investment in cost and time is relatively large. Based on this, the data access system and method based on the public security network in the embodiment of the application are provided to solve the technical problems of complicated data distribution and control processes and inconvenient operation when the internal network of the existing public security network accesses the third-party internet.
The first embodiment is as follows:
fig. 1 shows a data access system based on a public security network according to an embodiment of the present application, and referring to fig. 1, the data access system based on the public security network includes: the system comprises a third-party internet platform 11, a public security network management platform 13 and a plurality of mobile terminals 12; the third-party internet platform 11 prestores communication identification information of each mobile terminal 12 and corresponding deployment and control object information, and is configured to extract deployment and control data of a corresponding deployment and control object in real time according to the deployment and control object information, and send the deployment and control data to the corresponding mobile terminal 12 based on the communication identification information, where the deployment and control data includes the deployment and control object information; each mobile terminal 12 is configured to receive the deployment and control data, and forward the deployment and control data to the public security network management platform 13 through a mobile private network; the public security network management platform 13 is configured to receive the deployment and control data, and perform monitoring of a corresponding deployment and control object, generation and distribution of a deployment and control service based on the deployment and control data.
Specifically, in the embodiment of the present application, the third-party internet platform may be an online car appointment platform, a social network platform, an online shopping platform, and the like, and when the platforms process daily service businesses, platform service data may be generated. For example, when a user makes an appointment for a network car reservation to go out through a network car reservation platform, the generated corresponding car taking data comprises the identity information, the car taking place and the destination place of the user. For the network appointment platform, the riding data is platform service data generated when the platform processes daily service business. For the public security network management platform, considering that the behaviors of people such as going out, online shopping and social contact in daily life can be required to depend on various third-party internet platforms, therefore, in order to achieve a better control effect on related deployment and control objects, the public security network management platform needs to collect and analyze platform service data (namely deployment and control data) generated by the deployment and control objects on the third-party internet platforms, so that the related conditions of the deployment and control objects can be known more vividly according to the collected deployment and control data.
Furthermore, in order to enable the public security network management platform to access the deployment and control data of the related deployment and control object generated by the third-party internet platform, the deployment and control data needs to be forwarded by means of the mobile terminal. In the embodiment of the application, the mobile terminals can be mobile phones or tablet computers and the like, the number of the mobile terminals is multiple, a certain number of control objects are distributed to each mobile terminal according to actual control requirements, and each mobile terminal performs control data filtering and forwarding according to corresponding control object information. Correspondingly, in order to clearly extract platform service data as deployment and control data and send the deployment and control data to a corresponding mobile terminal, the third-party internet platform needs to pre-store related deployment and control object information on the third-party internet platform and correspondingly bind communication identification information of the mobile terminal, so that platform service data generated by the corresponding deployment and control object can be subsequently extracted in real time according to the deployment and control object information to serve as deployment and control data. And according to the communication identification information correspondingly bound to the deployment object information, sending the extracted deployment data to the mobile terminal to which the communication identification information belongs.
For one end of the mobile terminal, after receiving the deployment and control data, the deployment and control data are forwarded to the public security network management platform. And the mobile terminal receives the deployment and control data sent by the third-party internet and forwards the deployment and control data to the public security network management platform through the mobile private network. Therefore, the transmission process of the control data from the internet, the mobile terminal, the mobile private network to the public security network is completed, and the control data of the third-party internet platform accessed by the public security network management platform is realized.
Further, fig. 2 is a flowchart of a data access method based on a public security network according to an embodiment of the present disclosure, where the data access method based on the public security network provided in this embodiment may be executed by the data access system based on the public security network, the data access system based on the public security network may be implemented in a software and/or hardware manner, and the following description will be given by taking the data access system based on the public security network as an example of a main body for executing the data access method based on the public security network. Referring to fig. 1, the data access method based on the public security network specifically includes:
s110, the third-party internet platform extracts the deployment and control data of the corresponding deployment and control object in real time according to the pre-stored deployment and control object information, and sends the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information.
In the operation process of the third-party internet platform, the deployment and control data can be extracted according to the pre-stored deployment and control object information, and the deployment and control data can be bus taking data, online shopping data or social network data according to the difference of the third-party internet platform. It should be noted that, because there are a plurality of mobile terminals, each mobile terminal is assigned with a different deployment object for performing corresponding deployment data forwarding on the deployment object assigned thereto. Correspondingly, for the third-party internet platform, after extracting the deployment and control data, communication identification information pre-bound to the deployment and control object information needs to be extracted according to the deployment and control object information corresponding to the deployment and control data, and the deployment and control data is sent to the mobile terminal to which the communication identification information belongs. It can be understood that each piece of control object information stored in advance by the third-party internet platform is bound with corresponding communication identification information. The control object information indicates the identity information of a control object which needs to be acquired by the control data acquisition of the third-party internet platform, and the communication identification information indicates the receiver of the acquired control data, so that the third-party internet platform can clearly determine the acquisition object and the receiving end of the control data.
Specifically, referring to fig. 3, the deployment and control data extraction process of the third-party internet platform includes:
s1101, searching and comparing platform service data generated in real time by a third-party internet platform according to pre-stored control object information;
and S1102, when the platform service data containing the deployment object information is retrieved, extracting the platform service data as deployment data corresponding to the deployment object.
Specifically, in order to extract the deployment and control data in real time, the third-party internet platform needs to retrieve and compare platform service data generated in real time, and when the retrieval and comparison are performed, each piece of platform service data is compared according to the deployment and control object information of the deployment and control object. It can be understood that the deployment object information is identity information of the deployment object, and each piece of platform service data may also include identity information of the user. When the platform service data contains the deployment object information pre-stored by the third-party internet platform, the platform service data is considered to be the deployment data of the deployment object.
Further, after the control data is extracted, communication identification information pre-bound to the control object information is extracted according to the control object information of the control object corresponding to the control data, the communication identification information belongs to the mobile terminal receiving the control data, and the communication identification information can be unique communication identification information such as a mobile phone number and a terminal identification. Specifically, the third-party internet platform sends the deployment and control data to the mobile terminal corresponding to the communication identification information in the form of a short message or a system message based on the pre-stored communication identification information. And when the control data is sent to the mobile terminal, the control data is sent in a short message or system message mode. When the control data in the form of the short message is sent, the mobile phone number of the mobile terminal is required to be used as communication identification information, so that the short message can be sent to the mobile terminal corresponding to the mobile phone number in a follow-up manner. When the control data in the form of the system message is sent, the terminal identifier of the mobile terminal is required to be used as communication identifier information, so that the system message is subsequently sent to the mobile terminal corresponding to the terminal identifier, and the control data is received by the mobile terminal through a related application program (such as a WeChat applet).
And S120, the mobile terminal receives the control data and forwards the control data to a public security network management platform through a mobile private network.
Furthermore, after receiving the deployment and control data, the mobile terminal can forward the deployment and control data, and when the deployment and control data are forwarded, the mobile terminal forwards the deployment and control data by using the mobile private network, so that the setting of a customized data interface is omitted, and the deployment and control data can be accessed into the public security network through the mobile private network. It should be noted that the deployment and control data is generally sent in the form of a short message or a system message. For one end of the mobile terminal, the number of short messages or system messages stored in the mobile terminal is large, and the control data needs to be filtered from the large number of short messages or system messages and sent to the public security network management platform. Referring to fig. 4, the deployment and control data filtering and forwarding process includes:
s1201, the mobile terminal receives the control data in the form of short messages or system information;
s1202, the mobile terminal screens and filters own short messages or system messages through a preset data filtering program based on the pre-stored deployment and control object information, determines the short messages or system messages containing the deployment and control object information as the deployment and control data, and forwards the deployment and control data to a public security network management platform through a mobile private network.
Specifically, in order to filter and screen the deployment and control data, a data filtering program needs to be added to the mobile terminal in advance to filter the short messages or system messages on the mobile terminal. Taking the short message filtering as an example, when the data filtering program filters the short message, the content server tool provided in the mobile terminal system is used to monitor the content change of the short message database, and the corresponding filtering processing is performed by observing (capturing) the change of the database caused by the specific identifier Uri. The method comprises the steps of obtaining a short message reading authority of a mobile phone through a data filtering program, registering a short message monitor to monitor whether a short message database changes or not in real time, and extracting newly added short message content when the short message database changes. Judging whether the source of the short message is a third-party Internet platform or not, if not, discarding and not processing the short message; and if the short message is from the third-party Internet platform, further judging whether the short message contains the control object information of the control object bound by the current mobile terminal. If the short message contains the control object information, the short message is extracted as control data to be forwarded. Otherwise, the short message is not processed. In some embodiments, the determination of the deployment data may be directly determined by determining the source of the short message or whether the short message includes corresponding deployment object information. The method for judging the source of the short message and judging whether the short message contains the corresponding control object information can more accurately determine the control data, and avoid the problem that the control data accessed into the public security network has safety risk due to data forwarding errors. Therefore, the control data determined after the short messages or the system information is filtered and screened can be forwarded to the public security network management platform through the mobile private network.
In an embodiment, after sending the deployment and control data, the mobile terminal further monitors whether the deployment and control data is successfully sent, when it is monitored that the deployment and control data is unsuccessfully forwarded, the deployment and control data is written into a data retransmission buffer folder, forwarding failure warning information is sent to an operation and maintenance terminal, and/or after a set time period, the deployment and control data is automatically extracted from the data retransmission buffer folder for data retransmission. Specifically, when the deployment and control data is sent, conditions such as network abnormality and platform abnormality may occur, so that the deployment and control data cannot be forwarded to the public security network management platform. Therefore, after the mobile terminal sends the deployment and control data, the mobile terminal monitors the feedback information of the public security network management platform based on the deployment and control data in real time within a set time period. If the information returned by the public security network management platform is monitored in a set time period, the control data is successfully sent, otherwise, the control data is failed to be sent. When the distribution and control data is failed to be sent, in order to ensure that the distribution and control data can be successfully forwarded to the public security network management platform, the mobile terminal outputs a forwarding failure alarm message to the operation and maintenance terminal to inform operation and maintenance personnel of the condition that the current distribution and control data is failed to be sent, so that the operation and maintenance personnel can extract the distribution and control data from the data retransmission buffer folder by manually triggering a data exception retransmission interface and retransmit the data by using the interface. And further deleting the control data from the data retransmission buffering folder after the retransmission is successful, otherwise, continuously retaining the control data in the data retransmission buffering folder. In some embodiments, the re-transmission of the scheduled data may also be done automatically by the mobile terminal. And after the set time period of failure of the transmission of the deployment control data, the mobile terminal automatically extracts the deployment control data from the data retransmission buffer folder for data retransmission, so that the successful transmission of the deployment control data is ensured.
S130, the public security network management platform receives the deployment and control data, and performs monitoring of the corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
And corresponding to one end of the public security network management platform, after receiving the control data, monitoring the control object based on the related riding data, online shopping data or social network data contained in the control data. For example, the destination point included in the riding data can be used to determine the destination to which the control object goes when traveling in the next riding, so as to determine the whereabouts of the control object. Further, based on the deployment and control data, the corresponding deployment and control service can be generated through a predefined deployment and control service generation rule. Referring to fig. 5, the deployment and control service generation and distribution process includes:
s1301, analyzing the deployment and control data, and generating corresponding deployment and control business in real time when the deployment and control data meet predefined deployment and control business generation rules;
s1302, sending the deployment and control service and the deployment and control data to corresponding deployment and control service processing terminals according to the deployment and control object information corresponding to the deployment and control data, wherein the deployment and control service processing terminals are bound with the deployment and control object information in advance.
According to the embodiment of the application, the related deployment and control service generation rule is predefined, and when the deployment and control data meet the deployment and control service generation rule, the deployment and control service needs to be generated correspondingly. Taking the riding data as an example, the activity range of the controlled object is limited in advance based on the controlled service generation rule, and according to the riding starting point and the riding destination point contained in the controlled data, when the riding starting point or the riding destination point exceeds the activity range limited by the controlled service generation rule, the controlled service needs to be generated correspondingly. And after the deployment and control service is generated, the generated deployment and control service is sent to a corresponding deployment and control service processing terminal for processing. The control service processing terminal can be a mobile terminal such as a mobile phone of a public security policeman. Before this, each control business processing terminal is allocated with a control object in advance, and when a control business is generated based on the control data of one control object, the control business is distributed to the corresponding control business processing terminal for processing. It should be noted that, when the deployment and control service is distributed to the deployment and control service processing terminal, the deployment and control service processing terminal may receive the deployment and control service in the manners of an APP end, a public security network management platform client, a short message service or a government affair WeChat. The control service is used for informing the public security policeman of the specific control condition of the current control object and prompting the public security policeman to process the control service of the related control object. After receiving the deployment and control data based on the deployment and control service processing terminal, the policeman can go to process related deployment and control services (such as faithfully monitoring deployment and control objects, warning and even controlling the deployment and control objects and the like).
In one embodiment, after the public security policeman completes the control service, the control service processing result is uploaded to the public security network management platform. And the public security network management platform receives a control business processing result fed back by the control business processing terminal, binds the control business processing result, the corresponding control data and the control object information to generate a control record and stores the control record. Through storing the above-mentioned cloth accuse record, can be convenient for follow-up implement the management and control to relevant cloth accuse object better to reach better cloth accuse effect.
Specifically, referring to fig. 6, taking the network appointment platform as an example, relevant key personnel are scheduled on the network appointment platform, the key personnel are defined as schedule objects, and schedule object information of the key personnel is stored in advance. And the network car booking platform also prestores a mobile phone number (namely communication identification information) corresponding to the public security policeman, the mobile phone number is bound with the control object information, and subsequently extracted control data corresponding to the control object can be sent to the mobile terminal corresponding to the mobile phone number, so that the extraction and the sending of the control data of the network car booking platform are completed. And after the network appointment platform extracts the deployment and control data, the deployment and control data is sent to the mobile phone corresponding to the mobile phone number in a short message mode. After receiving the short message, the mobile phone can filter the short message through a data filtering program on the mobile phone. Thereby determining the short messages belonging to the control data. Further, after the short message belonging to the control data is determined, the short message is forwarded to the public security network management platform through the mobile private network. The mobile phone transfers the short message by calling the relevant data interface and utilizing the mobile private network. When the short message is forwarded, whether the short message is forwarded successfully is further monitored, and if not, relevant retransmission operation is required. If yes, the public security network management platform processes the short message. The public security network management platform analyzes based on the short message, judges whether the content of the short message meets a predefined control service generation rule, and issues a corresponding control service to a control service processing terminal when the content of the short message meets the control service generation rule, so that distribution of the control service is completed. For example, the short message content refers to the current activity position or the position to which the deployment object is going, and the position exceeds the activity range of the deployment object defined by the deployment service generation rule, the public security network management platform generates a deployment service according to the short message content and the related deployment service generation rule, and the deployment service is sent to a mobile phone of a public security policeman responsible for processing the deployment service of the deployment object. After receiving the deployment and control service through the mobile phone, the policeman can go to the corresponding position to monitor and control the deployment and control object on the spot, so that a better deployment and control effect is realized.
The third-party internet platform extracts the deployment and control data corresponding to the deployment and control object in real time according to the pre-stored deployment and control object information, sends the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information, receives the deployment and control data by the mobile terminal, and forwards the deployment and control data to the public security network management platform through the mobile private network. And then, the public security network management platform monitors the corresponding control object and generates and distributes control business based on the control data. By adopting the technical means, the mobile terminal is used as a deployment and control data forwarding medium, a data interaction barrier between the third-party internet platform and the public security network management platform can be opened, the public security network management platform can conveniently access the deployment and control data generated by the third-party internet platform, and the data access cost is saved.
Moreover, the control data are filtered through the mobile terminal, so that the safety risk of accessing the control data by the public security network management platform can be reduced, and the safety of data access is improved.
Example two:
based on the foregoing embodiment, fig. 7 is a schematic structural diagram of a data access device based on a public security network according to a second embodiment of the present application. Referring to fig. 7, the data access apparatus based on the public security network provided in this embodiment specifically includes: a receiving module 21 and a forwarding module 22.
The receiving module 21 is configured to receive deployment and control data, where the deployment and control data is extracted in real time by a third-party internet platform according to pre-stored deployment and control object information, and sent to a corresponding mobile terminal based on pre-stored communication identification information;
the forwarding module 22 is configured to forward the deployment and control data to a public security network management platform through a mobile private network, so that the public security network management platform receives the deployment and control data and performs monitoring of a corresponding deployment and control object and generation and distribution of a deployment and control service based on the deployment and control data.
The third-party internet platform extracts the deployment and control data corresponding to the deployment and control object in real time according to the pre-stored deployment and control object information, sends the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information, receives the deployment and control data by the mobile terminal, and forwards the deployment and control data to the public security network management platform through the mobile private network. And then, the public security network management platform monitors the corresponding control object and generates and distributes control business based on the control data. By adopting the technical means, the mobile terminal is used as a deployment and control data forwarding medium, a data interaction barrier between the third-party internet platform and the public security network management platform can be opened, the public security network management platform can conveniently access the deployment and control data generated by the third-party internet platform, and the data access cost is saved.
On the basis of the second embodiment, the embodiment of the present application further provides another data access apparatus based on a public security network, including:
the extraction module is used for extracting the information of the pre-stored control object in real time through a third-party internet platform
The extraction module is used for extracting the deployment and control data of the corresponding deployment and control object in real time through a third-party internet platform according to the pre-stored deployment and control object information;
and the sending module is used for sending the deployment and control data to a corresponding mobile terminal based on the prestored communication identification information so that the mobile terminal can receive the deployment and control data and then forward the deployment and control data to the public security network management platform through a mobile private network, and then the public security network management platform carries out monitoring of a corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
In addition, an embodiment of the present application further provides another data access device based on a public security network, including:
and the service distribution module is used for receiving the deployment and control data through the public security network management platform, monitoring corresponding deployment and control objects based on the deployment and control data, generating and distributing deployment and control services, extracting the deployment and control data in real time by a third-party internet platform according to pre-stored deployment and control object information, sending the data to a corresponding mobile terminal based on pre-stored communication identification information, and then forwarding the data to the public security network management platform through a mobile private network by the mobile terminal.
The data access device based on the public security network provided by the second embodiment of the present application can be used to execute the data access method based on the public security network executed by the mobile terminal in the first embodiment, and has corresponding functions and beneficial effects.
Example three:
embodiments of the present application further provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a data access method based on a public security network, where the data access method based on the public security network includes: the third-party internet platform extracts the deployment and control data corresponding to the deployment and control object in real time according to the pre-stored deployment and control object information, and sends the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information; the mobile terminal receives the deployment and control data and forwards the deployment and control data to a public security network management platform through a mobile private network; and the public security network management platform receives the deployment and control data, and performs monitoring of the corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media residing in different locations, e.g., in different computer systems connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium containing the computer-executable instructions provided in the embodiments of the present application is not limited to the data access method based on the public security network described above, and may also perform related operations in the data access method based on the public security network provided in any embodiments of the present application.
The data access system, the device and the storage medium based on the public security network provided in the above embodiments may execute the data access method based on the public security network provided in any embodiment of the present application, and reference may be made to the data access method based on the public security network provided in any embodiment of the present application without detailed technical details described in the above embodiments.
The foregoing is considered as illustrative of the preferred embodiments of the invention and the technical principles employed. The present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the claims.

Claims (15)

1. A data access system based on a public security network is characterized by comprising: the system comprises a third-party internet platform, a public security network management platform and a plurality of mobile terminals;
the third-party internet platform stores communication identification information of each mobile terminal and corresponding deployment object information in advance, is used for extracting deployment data of a corresponding deployment object in real time according to the deployment object information, and sends the deployment data to the corresponding mobile terminal based on the communication identification information, wherein the deployment data comprises the deployment object information;
each mobile terminal is used for receiving the control data and forwarding the control data to the public security network management platform through a mobile private network;
the public security network management platform is used for receiving the control data, and monitoring corresponding control objects and generating and distributing control services based on the control data.
2. A data access method based on a public security network, applied to the data access system based on the public security network as claimed in claim 1, characterized by comprising:
the third-party internet platform extracts the deployment and control data corresponding to the deployment and control object in real time according to the pre-stored deployment and control object information, and sends the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information;
the mobile terminal receives the deployment and control data and forwards the deployment and control data to a public security network management platform through a mobile private network;
and the public security network management platform receives the deployment and control data, and performs monitoring of the corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
3. A data access method based on a public security network is characterized by comprising the following steps:
the third-party internet platform extracts the deployment and control data corresponding to the deployment and control object in real time according to the pre-stored deployment and control object information, sends the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information, so that the mobile terminal can receive the deployment and control data and then forward the deployment and control data to the public security network management platform through a mobile private network, and the public security network management platform carries out monitoring of the corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
4. The data access method based on the public security network as claimed in claim 3, wherein the third party internet platform extracts the deployment and control data of the corresponding deployment and control object in real time according to the pre-stored deployment and control object information, and the method comprises the following steps:
the third-party internet platform retrieves and compares platform service data generated in real time according to pre-stored control object information;
and when the platform service data containing the deployment object information is retrieved, extracting the platform service data as deployment data corresponding to the deployment object.
5. The data access method based on the public security network as claimed in claim 3, wherein the sending of the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information comprises:
and sending the deployment and control data to a mobile terminal corresponding to the communication identification information in the form of short messages or system messages based on the prestored communication identification information.
6. A data access method based on a public security network is characterized by comprising the following steps: the mobile terminal receives the deployment and control data, the deployment and control data of the corresponding deployment and control object is extracted in real time by the third-party internet platform according to the pre-stored deployment and control object information, and the deployment and control data is sent to the corresponding mobile terminal based on the pre-stored communication identification information;
and forwarding the deployment and control data to a public security network management platform through a mobile private network, so that the public security network management platform receives the deployment and control data and carries out monitoring of corresponding deployment and control objects and generation and distribution of deployment and control services based on the deployment and control data.
7. The data access method based on the public security network of claim 6, wherein the mobile terminal receives the deployment and control data, and forwards the deployment and control data to the public security network management platform through a mobile private network, and the method comprises the following steps:
the mobile terminal receives the control data in the form of short messages or system information;
and the mobile terminal screens and filters own short messages or system messages through a preset data filtering program based on the pre-stored deployment and control object information, determines the short messages or system messages containing the deployment and control object information as the deployment and control data, and forwards the deployment and control data to a public security network management platform through a mobile private network.
8. The data access method based on the public security network of claim 6, wherein the step of forwarding the deployment and control data to a management platform of the public security network further comprises the steps of:
and when monitoring that the control data is unsuccessfully forwarded, writing the control data into a data retransmission buffer folder, sending a forwarding failure alarm message to an operation and maintenance terminal, and/or automatically extracting the control data from the data retransmission buffer folder for data retransmission after a set time period.
9. A data access method based on a public security network is characterized by comprising the following steps:
the public security network management platform receives the deployment and control data, monitors corresponding deployment and control objects based on the deployment and control data, generates and distributes deployment and control services, extracts the deployment and control data in real time by a third-party internet platform according to pre-stored deployment and control object information, sends the deployment and control data to a corresponding mobile terminal based on pre-stored communication identification information, and forwards the deployment and control data to the public security network management platform by the mobile terminal through a mobile private network.
10. The data access method based on the public security network according to claim 9, wherein the monitoring of the corresponding control object, the generation and distribution of the control service based on the control data comprises:
analyzing the control data, and generating corresponding control business in real time when the control data meets a predefined control business generation rule;
and sending the control business and the control data to corresponding control business processing terminals according to the control object information corresponding to the control data, wherein the control business processing terminals are bound with the control object information in advance.
11. The data access method based on the public security network according to claim 10, after performing monitoring of the corresponding deployment object, generation and distribution of the deployment service based on the deployment data, further comprising:
and the public security network management platform receives a control business processing result fed back by the control business processing terminal, binds the control business processing result, the corresponding control data and the control object information to generate a control record and stores the control record.
12. A data access device based on a public security network is characterized by comprising:
the extraction module is used for extracting the deployment and control data of the corresponding deployment and control object in real time through a third-party internet platform according to the pre-stored deployment and control object information;
and the sending module is used for sending the deployment and control data to a corresponding mobile terminal based on the prestored communication identification information so that the mobile terminal can receive the deployment and control data and then forward the deployment and control data to a public security network management platform through a mobile private network, and the public security network management platform carries out monitoring of a corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
13. A data access device based on a public security network is characterized by comprising:
the receiving module is used for receiving the deployment and control data, the deployment and control data of the corresponding deployment and control object is extracted in real time by the third-party internet platform according to the pre-stored deployment and control object information, and the deployment and control data is sent to the corresponding mobile terminal based on the pre-stored communication identification information;
and the forwarding module is used for forwarding the control data to a public security network management platform through a mobile private network so that the public security network management platform receives the control data and carries out monitoring of a corresponding control object and generation and distribution of control business based on the control data.
14. A data access device based on a public security network is characterized by comprising:
and the service distribution module is used for receiving the deployment and control data through the public security network management platform, monitoring corresponding deployment and control objects based on the deployment and control data, generating and distributing deployment and control services, extracting the deployment and control data in real time by the third-party internet platform according to pre-stored deployment and control object information, sending the data to the corresponding mobile terminal based on pre-stored communication identification information, and then forwarding the data to the public security network management platform through the mobile private network by the mobile terminal.
15. A storage medium containing computer-executable instructions for performing the method for data access over a public security network of any one of claims 2-11 when executed by a computer processor.
CN202010989980.8A 2020-09-18 2020-09-18 Data access system, method and device based on public security network Active CN112187898B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010989980.8A CN112187898B (en) 2020-09-18 2020-09-18 Data access system, method and device based on public security network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010989980.8A CN112187898B (en) 2020-09-18 2020-09-18 Data access system, method and device based on public security network

Publications (2)

Publication Number Publication Date
CN112187898A true CN112187898A (en) 2021-01-05
CN112187898B CN112187898B (en) 2023-05-16

Family

ID=73956610

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010989980.8A Active CN112187898B (en) 2020-09-18 2020-09-18 Data access system, method and device based on public security network

Country Status (1)

Country Link
CN (1) CN112187898B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113329209A (en) * 2021-05-28 2021-08-31 广州高新兴机器人有限公司 Police robot and police service communication cooperative deployment and control method and system
CN113507530A (en) * 2021-09-09 2021-10-15 深圳市安软慧视科技有限公司 Data forwarding method, related system and device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891802A (en) * 2012-09-19 2013-01-23 深圳市深信服电子科技有限公司 Data flow distributing method, mobile terminal and data flow distributing system
CN107832475A (en) * 2017-12-01 2018-03-23 浪潮软件集团有限公司 Deployment control method, deployment control engine and deployment control system
WO2019062384A1 (en) * 2017-09-26 2019-04-04 大唐移动通信设备有限公司 Method and device for public network user accessing private network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891802A (en) * 2012-09-19 2013-01-23 深圳市深信服电子科技有限公司 Data flow distributing method, mobile terminal and data flow distributing system
WO2019062384A1 (en) * 2017-09-26 2019-04-04 大唐移动通信设备有限公司 Method and device for public network user accessing private network
CN107832475A (en) * 2017-12-01 2018-03-23 浪潮软件集团有限公司 Deployment control method, deployment control engine and deployment control system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113329209A (en) * 2021-05-28 2021-08-31 广州高新兴机器人有限公司 Police robot and police service communication cooperative deployment and control method and system
CN113507530A (en) * 2021-09-09 2021-10-15 深圳市安软慧视科技有限公司 Data forwarding method, related system and device and storage medium
CN113507530B (en) * 2021-09-09 2022-01-04 深圳市安软慧视科技有限公司 Data forwarding method, related system and device and storage medium

Also Published As

Publication number Publication date
CN112187898B (en) 2023-05-16

Similar Documents

Publication Publication Date Title
CN101194233B (en) System and method of testing wireless component applications
US10158670B1 (en) Automatic privilege determination
CN110365634B (en) Abnormal data monitoring method, device, medium and electronic equipment
CN111404937B (en) Method and device for detecting server vulnerability
CN112187898A (en) Data access system, method and device based on public security network
CN107786551B (en) Method for accessing intranet server and device for controlling access to intranet server
CN112698820B (en) Unified monitoring management method and device for memory and switch and computer equipment
CN112329001B (en) Data distribution method, system, terminal and medium between internal network and external network
CN107895039B (en) Method for constructing log database of campus network authentication system
CN110930561A (en) Control method and device of intelligent lock
CN116383035A (en) Buried point inspection method, mobile terminal and storage medium
EP2479962A1 (en) Method and mobile terminal for recycling short messages
US20220028008A1 (en) Signals-based data syndication and collaboration
CN104053137A (en) Data recovery method and device
CN112308542B (en) Method and system for realizing intelligent and non-inductive data input
CN105760777A (en) Safety information management method and system based on intelligent platform
CN112910868A (en) Enterprise network security management method and device, computer equipment and storage medium
CN108200532B (en) Method and system for verifying subscriber identity of subsidized SIM card and associating SIM card
CN110807184B (en) Method for intelligently recording screen and acquiring behavior data of computer and mobile terminal user
CN112804098B (en) Domain name fault line switching method and device, terminal equipment and storage medium
CN111143526B (en) Method and device for generating and controlling configuration information of counsel service control
CN107172097B (en) Efficient message sending method and system
CN111581613A (en) Account login verification method and system
US20200167500A1 (en) Providing transparency in private-user-data access
Cahyani et al. Event Reconstruction of Indonesian E-Banking Services on Windows Phone Devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 306, zone 2, building 1, Fanshan entrepreneurship center, Panyu energy saving technology park, No. 832 Yingbin Road, Donghuan street, Panyu District, Guangzhou City, Guangdong Province

Applicant after: Jiadu Technology Group Co.,Ltd.

Applicant after: FOSHAN PUBLIC SECURITY BUREAU

Address before: Room 306, zone 2, building 1, Fanshan entrepreneurship center, Panyu energy saving technology park, No. 832 Yingbin Road, Donghuan street, Panyu District, Guangzhou City, Guangdong Province

Applicant before: PCI-SUNTEKTECH Co.,Ltd.

Applicant before: FOSHAN PUBLIC SECURITY BUREAU

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant