Background
At present, with the development of internet technology, third-party internet platforms are also rapidly developed. By means of various third-party internet platforms, people can perform operations such as social contact, shopping, riding, traveling and the like. For the public security network management platform, a better deployment and control effect can be achieved by acquiring relevant deployment and control data (such as riding data, shopping data, social network data and the like) of a deployment and control object on a third-party internet platform.
However, since the public security network management platform is different from the network used by the third-party internet platform, in order to introduce the deployment and control data of the third-party internet platform into the internal network of the public security network, an additional data interface is needed to be customized, the input cost is relatively high, and the security of the access data is difficult to guarantee.
Disclosure of Invention
The embodiment of the application provides a data access system, method and device based on a public security network, which can open a data interaction barrier between a public security network management platform and a third-party internet platform, reduce the deployment and control data acquisition cost and realize a better deployment and control data acquisition effect.
In a first aspect, an embodiment of the present application provides a data access system based on a public security network, including: the system comprises a third-party internet platform, a public security network management platform and a plurality of mobile terminals;
the third-party internet platform stores communication identification information of each mobile terminal and corresponding deployment object information in advance, is used for extracting deployment data of a corresponding deployment object in real time according to the deployment object information, and sends the deployment data to the corresponding mobile terminal based on the communication identification information, wherein the deployment data comprises the deployment object information;
each mobile terminal is used for receiving the control data and forwarding the control data to the public security network management platform through a mobile private network;
the public security network management platform is used for receiving the control data, and monitoring corresponding control objects and generating and distributing control services based on the control data.
In a second aspect, an embodiment of the present application provides a data access method based on a public security network, which is applied to a data access system based on a public security network according to the first aspect of the embodiment of the present application, and includes:
the third-party internet platform extracts the deployment and control data corresponding to the deployment and control object in real time according to the pre-stored deployment and control object information, and sends the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information;
the mobile terminal receives the deployment and control data and forwards the deployment and control data to a public security network management platform through a mobile private network;
and the public security network management platform receives the deployment and control data, and performs monitoring of the corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
In a third aspect, an embodiment of the present application provides a data access method based on a public security network, including:
the third-party internet platform extracts the deployment and control data corresponding to the deployment and control object in real time according to the pre-stored deployment and control object information, sends the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information, so that the mobile terminal can receive the deployment and control data and then forward the deployment and control data to the public security network management platform through a mobile private network, and the public security network management platform carries out monitoring of the corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
Further, the third-party internet platform extracts the deployment and control data corresponding to the deployment and control object in real time according to the pre-stored deployment and control object information, and the method comprises the following steps:
the third-party internet platform retrieves and compares platform service data generated in real time according to pre-stored control object information;
and when the platform service data containing the deployment object information is retrieved, extracting the platform service data as deployment data corresponding to the deployment object.
Further, the sending the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information includes:
and sending the deployment and control data to a mobile terminal corresponding to the communication identification information in the form of short messages or system messages based on the prestored communication identification information.
In a fourth aspect, an embodiment of the present application provides a data access method based on a public security network, including:
the mobile terminal receives the deployment and control data, the deployment and control data of the corresponding deployment and control object is extracted in real time by the third-party internet platform according to the pre-stored deployment and control object information, and the deployment and control data is sent to the corresponding mobile terminal based on the pre-stored communication identification information;
and forwarding the deployment and control data to a public security network management platform through a mobile private network, so that the public security network management platform receives the deployment and control data and carries out monitoring of corresponding deployment and control objects and generation and distribution of deployment and control services based on the deployment and control data.
Further, the mobile terminal receives the deployment and control data, and forwards the deployment and control data to the public security network management platform through the mobile private network, including:
the mobile terminal receives the control data in the form of short messages or system information;
and the mobile terminal screens and filters own short messages or system messages through a preset data filtering program based on the pre-stored deployment and control object information, determines the short messages or system messages containing the deployment and control object information as the deployment and control data, and forwards the deployment and control data to a public security network management platform through a mobile private network.
Further, forwarding the deployment and control data to a public security network management platform further includes:
and when monitoring that the control data is unsuccessfully forwarded, writing the control data into a data retransmission buffer folder, sending a forwarding failure alarm message to an operation and maintenance terminal, and/or automatically extracting the control data from the data retransmission buffer folder for data retransmission after a set time period.
In a fifth aspect, an embodiment of the present application provides a data access method based on a public security network, including:
the public security network management platform receives the deployment and control data, monitors corresponding deployment and control objects based on the deployment and control data, generates and distributes deployment and control services, extracts the deployment and control data in real time by a third-party internet platform according to pre-stored deployment and control object information, sends the deployment and control data to a corresponding mobile terminal based on pre-stored communication identification information, and forwards the deployment and control data to the public security network management platform by the mobile terminal through a mobile private network.
Further, the monitoring of the corresponding deployment object, the generation and the distribution of the deployment service are performed based on the deployment data, and the method includes the following steps:
analyzing the control data, and generating corresponding control business in real time when the control data meets a predefined control business generation rule;
and sending the control business and the control data to corresponding control business processing terminals according to the control object information corresponding to the control data, wherein the control business processing terminals are bound with the control object information in advance.
Further, after the monitoring of the corresponding deployment object, the generation and the distribution of the deployment service are performed based on the deployment data, the method further includes:
and the public security network management platform receives a control business processing result fed back by the control business processing terminal, binds the control business processing result, the corresponding control data and the control object information to generate a control record and stores the control record.
In a sixth aspect, an embodiment of the present application provides a data access apparatus based on a public security network, including:
the extraction module is used for extracting the deployment and control data of the corresponding deployment and control object in real time through a third-party internet platform according to the pre-stored deployment and control object information;
and the sending module is used for sending the deployment and control data to a corresponding mobile terminal based on the prestored communication identification information so that the mobile terminal can receive the deployment and control data and then forward the deployment and control data to a public security network management platform through a mobile private network, and the public security network management platform carries out monitoring of a corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
In a seventh aspect, an embodiment of the present application provides a data access apparatus based on a public security network, including:
the receiving module is used for receiving the deployment and control data, the deployment and control data of the corresponding deployment and control object is extracted in real time by the third-party internet platform according to the pre-stored deployment and control object information, and the deployment and control data is sent to the corresponding mobile terminal based on the pre-stored communication identification information;
and the forwarding module is used for forwarding the control data to a public security network management platform through a mobile private network so that the public security network management platform receives the control data and carries out monitoring of a corresponding control object and generation and distribution of control business based on the control data.
In an eighth aspect, an embodiment of the present application provides a data access apparatus based on a public security network, including:
and the service distribution module is used for receiving the deployment and control data through the public security network management platform, monitoring corresponding deployment and control objects based on the deployment and control data, generating and distributing deployment and control services, extracting the deployment and control data in real time by the third-party internet platform according to pre-stored deployment and control object information, sending the data to the corresponding mobile terminal based on pre-stored communication identification information, and then forwarding the data to the public security network management platform through the mobile private network by the mobile terminal.
In a ninth aspect, embodiments of the present application provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the method for data access based on a public security network according to any one of the second aspect to the fifth aspect.
According to the embodiment of the application, the third-party internet platform extracts the deployment and control data of the corresponding deployment and control object in real time according to the pre-stored deployment and control object information, the deployment and control data are sent to the corresponding mobile terminal based on the pre-stored communication identification information, the mobile terminal receives the deployment and control data, and the deployment and control data are forwarded to the public security network management platform through the mobile private network. And then, the public security network management platform monitors the corresponding control object and generates and distributes control business based on the control data. By adopting the technical means, the mobile terminal is used as a deployment and control data forwarding medium, a data interaction barrier between the third-party internet platform and the public security network management platform can be opened, the public security network management platform can conveniently access the deployment and control data generated by the third-party internet platform, and the data access cost is saved.
Moreover, the control data are filtered through the mobile terminal, so that the safety risk of accessing the control data by the public security network management platform can be reduced, and the safety of data access is improved.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, specific embodiments of the present application will be described in detail with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some but not all of the relevant portions of the present application are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The data access system and method based on the public security network aim at using the mobile terminal as a deployment and control data access medium of a public security network management platform, receiving deployment and control data sent by a third-party internet platform by the mobile terminal, and forwarding the deployment and control data to the public security network management platform through a mobile private network. Therefore, the interaction barrier of the data domain and the user domain existing between the third-party internet platform and the public security network management platform is opened, and the control data of the third-party internet platform can be accessed to the public security network management platform. The whole data access operation is simple and convenient, and the security risk is lower. Compared with the existing public security network management platform, when internet related data is to be accessed to the internal network of the public security network, the data file needs to be ferried through a boundary and also needs to be subjected to security verification, meanwhile, in order to enable the data of a third-party internet network platform to be accessed to the public security network management platform, customized development of a data interface needs to be carried out, the whole process is relatively complicated, and the investment in cost and time is relatively large. Based on this, the data access system and method based on the public security network in the embodiment of the application are provided to solve the technical problems of complicated data distribution and control processes and inconvenient operation when the internal network of the existing public security network accesses the third-party internet.
The first embodiment is as follows:
fig. 1 shows a data access system based on a public security network according to an embodiment of the present application, and referring to fig. 1, the data access system based on the public security network includes: the system comprises a third-party internet platform 11, a public security network management platform 13 and a plurality of mobile terminals 12; the third-party internet platform 11 prestores communication identification information of each mobile terminal 12 and corresponding deployment and control object information, and is configured to extract deployment and control data of a corresponding deployment and control object in real time according to the deployment and control object information, and send the deployment and control data to the corresponding mobile terminal 12 based on the communication identification information, where the deployment and control data includes the deployment and control object information; each mobile terminal 12 is configured to receive the deployment and control data, and forward the deployment and control data to the public security network management platform 13 through a mobile private network; the public security network management platform 13 is configured to receive the deployment and control data, and perform monitoring of a corresponding deployment and control object, generation and distribution of a deployment and control service based on the deployment and control data.
Specifically, in the embodiment of the present application, the third-party internet platform may be an online car appointment platform, a social network platform, an online shopping platform, and the like, and when the platforms process daily service businesses, platform service data may be generated. For example, when a user makes an appointment for a network car reservation to go out through a network car reservation platform, the generated corresponding car taking data comprises the identity information, the car taking place and the destination place of the user. For the network appointment platform, the riding data is platform service data generated when the platform processes daily service business. For the public security network management platform, considering that the behaviors of people such as going out, online shopping and social contact in daily life can be required to depend on various third-party internet platforms, therefore, in order to achieve a better control effect on related deployment and control objects, the public security network management platform needs to collect and analyze platform service data (namely deployment and control data) generated by the deployment and control objects on the third-party internet platforms, so that the related conditions of the deployment and control objects can be known more vividly according to the collected deployment and control data.
Furthermore, in order to enable the public security network management platform to access the deployment and control data of the related deployment and control object generated by the third-party internet platform, the deployment and control data needs to be forwarded by means of the mobile terminal. In the embodiment of the application, the mobile terminals can be mobile phones or tablet computers and the like, the number of the mobile terminals is multiple, a certain number of control objects are distributed to each mobile terminal according to actual control requirements, and each mobile terminal performs control data filtering and forwarding according to corresponding control object information. Correspondingly, in order to clearly extract platform service data as deployment and control data and send the deployment and control data to a corresponding mobile terminal, the third-party internet platform needs to pre-store related deployment and control object information on the third-party internet platform and correspondingly bind communication identification information of the mobile terminal, so that platform service data generated by the corresponding deployment and control object can be subsequently extracted in real time according to the deployment and control object information to serve as deployment and control data. And according to the communication identification information correspondingly bound to the deployment object information, sending the extracted deployment data to the mobile terminal to which the communication identification information belongs.
For one end of the mobile terminal, after receiving the deployment and control data, the deployment and control data are forwarded to the public security network management platform. And the mobile terminal receives the deployment and control data sent by the third-party internet and forwards the deployment and control data to the public security network management platform through the mobile private network. Therefore, the transmission process of the control data from the internet, the mobile terminal, the mobile private network to the public security network is completed, and the control data of the third-party internet platform accessed by the public security network management platform is realized.
Further, fig. 2 is a flowchart of a data access method based on a public security network according to an embodiment of the present disclosure, where the data access method based on the public security network provided in this embodiment may be executed by the data access system based on the public security network, the data access system based on the public security network may be implemented in a software and/or hardware manner, and the following description will be given by taking the data access system based on the public security network as an example of a main body for executing the data access method based on the public security network. Referring to fig. 1, the data access method based on the public security network specifically includes:
s110, the third-party internet platform extracts the deployment and control data of the corresponding deployment and control object in real time according to the pre-stored deployment and control object information, and sends the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information.
In the operation process of the third-party internet platform, the deployment and control data can be extracted according to the pre-stored deployment and control object information, and the deployment and control data can be bus taking data, online shopping data or social network data according to the difference of the third-party internet platform. It should be noted that, because there are a plurality of mobile terminals, each mobile terminal is assigned with a different deployment object for performing corresponding deployment data forwarding on the deployment object assigned thereto. Correspondingly, for the third-party internet platform, after extracting the deployment and control data, communication identification information pre-bound to the deployment and control object information needs to be extracted according to the deployment and control object information corresponding to the deployment and control data, and the deployment and control data is sent to the mobile terminal to which the communication identification information belongs. It can be understood that each piece of control object information stored in advance by the third-party internet platform is bound with corresponding communication identification information. The control object information indicates the identity information of a control object which needs to be acquired by the control data acquisition of the third-party internet platform, and the communication identification information indicates the receiver of the acquired control data, so that the third-party internet platform can clearly determine the acquisition object and the receiving end of the control data.
Specifically, referring to fig. 3, the deployment and control data extraction process of the third-party internet platform includes:
s1101, searching and comparing platform service data generated in real time by a third-party internet platform according to pre-stored control object information;
and S1102, when the platform service data containing the deployment object information is retrieved, extracting the platform service data as deployment data corresponding to the deployment object.
Specifically, in order to extract the deployment and control data in real time, the third-party internet platform needs to retrieve and compare platform service data generated in real time, and when the retrieval and comparison are performed, each piece of platform service data is compared according to the deployment and control object information of the deployment and control object. It can be understood that the deployment object information is identity information of the deployment object, and each piece of platform service data may also include identity information of the user. When the platform service data contains the deployment object information pre-stored by the third-party internet platform, the platform service data is considered to be the deployment data of the deployment object.
Further, after the control data is extracted, communication identification information pre-bound to the control object information is extracted according to the control object information of the control object corresponding to the control data, the communication identification information belongs to the mobile terminal receiving the control data, and the communication identification information can be unique communication identification information such as a mobile phone number and a terminal identification. Specifically, the third-party internet platform sends the deployment and control data to the mobile terminal corresponding to the communication identification information in the form of a short message or a system message based on the pre-stored communication identification information. And when the control data is sent to the mobile terminal, the control data is sent in a short message or system message mode. When the control data in the form of the short message is sent, the mobile phone number of the mobile terminal is required to be used as communication identification information, so that the short message can be sent to the mobile terminal corresponding to the mobile phone number in a follow-up manner. When the control data in the form of the system message is sent, the terminal identifier of the mobile terminal is required to be used as communication identifier information, so that the system message is subsequently sent to the mobile terminal corresponding to the terminal identifier, and the control data is received by the mobile terminal through a related application program (such as a WeChat applet).
And S120, the mobile terminal receives the control data and forwards the control data to a public security network management platform through a mobile private network.
Furthermore, after receiving the deployment and control data, the mobile terminal can forward the deployment and control data, and when the deployment and control data are forwarded, the mobile terminal forwards the deployment and control data by using the mobile private network, so that the setting of a customized data interface is omitted, and the deployment and control data can be accessed into the public security network through the mobile private network. It should be noted that the deployment and control data is generally sent in the form of a short message or a system message. For one end of the mobile terminal, the number of short messages or system messages stored in the mobile terminal is large, and the control data needs to be filtered from the large number of short messages or system messages and sent to the public security network management platform. Referring to fig. 4, the deployment and control data filtering and forwarding process includes:
s1201, the mobile terminal receives the control data in the form of short messages or system information;
s1202, the mobile terminal screens and filters own short messages or system messages through a preset data filtering program based on the pre-stored deployment and control object information, determines the short messages or system messages containing the deployment and control object information as the deployment and control data, and forwards the deployment and control data to a public security network management platform through a mobile private network.
Specifically, in order to filter and screen the deployment and control data, a data filtering program needs to be added to the mobile terminal in advance to filter the short messages or system messages on the mobile terminal. Taking the short message filtering as an example, when the data filtering program filters the short message, the content server tool provided in the mobile terminal system is used to monitor the content change of the short message database, and the corresponding filtering processing is performed by observing (capturing) the change of the database caused by the specific identifier Uri. The method comprises the steps of obtaining a short message reading authority of a mobile phone through a data filtering program, registering a short message monitor to monitor whether a short message database changes or not in real time, and extracting newly added short message content when the short message database changes. Judging whether the source of the short message is a third-party Internet platform or not, if not, discarding and not processing the short message; and if the short message is from the third-party Internet platform, further judging whether the short message contains the control object information of the control object bound by the current mobile terminal. If the short message contains the control object information, the short message is extracted as control data to be forwarded. Otherwise, the short message is not processed. In some embodiments, the determination of the deployment data may be directly determined by determining the source of the short message or whether the short message includes corresponding deployment object information. The method for judging the source of the short message and judging whether the short message contains the corresponding control object information can more accurately determine the control data, and avoid the problem that the control data accessed into the public security network has safety risk due to data forwarding errors. Therefore, the control data determined after the short messages or the system information is filtered and screened can be forwarded to the public security network management platform through the mobile private network.
In an embodiment, after sending the deployment and control data, the mobile terminal further monitors whether the deployment and control data is successfully sent, when it is monitored that the deployment and control data is unsuccessfully forwarded, the deployment and control data is written into a data retransmission buffer folder, forwarding failure warning information is sent to an operation and maintenance terminal, and/or after a set time period, the deployment and control data is automatically extracted from the data retransmission buffer folder for data retransmission. Specifically, when the deployment and control data is sent, conditions such as network abnormality and platform abnormality may occur, so that the deployment and control data cannot be forwarded to the public security network management platform. Therefore, after the mobile terminal sends the deployment and control data, the mobile terminal monitors the feedback information of the public security network management platform based on the deployment and control data in real time within a set time period. If the information returned by the public security network management platform is monitored in a set time period, the control data is successfully sent, otherwise, the control data is failed to be sent. When the distribution and control data is failed to be sent, in order to ensure that the distribution and control data can be successfully forwarded to the public security network management platform, the mobile terminal outputs a forwarding failure alarm message to the operation and maintenance terminal to inform operation and maintenance personnel of the condition that the current distribution and control data is failed to be sent, so that the operation and maintenance personnel can extract the distribution and control data from the data retransmission buffer folder by manually triggering a data exception retransmission interface and retransmit the data by using the interface. And further deleting the control data from the data retransmission buffering folder after the retransmission is successful, otherwise, continuously retaining the control data in the data retransmission buffering folder. In some embodiments, the re-transmission of the scheduled data may also be done automatically by the mobile terminal. And after the set time period of failure of the transmission of the deployment control data, the mobile terminal automatically extracts the deployment control data from the data retransmission buffer folder for data retransmission, so that the successful transmission of the deployment control data is ensured.
S130, the public security network management platform receives the deployment and control data, and performs monitoring of the corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
And corresponding to one end of the public security network management platform, after receiving the control data, monitoring the control object based on the related riding data, online shopping data or social network data contained in the control data. For example, the destination point included in the riding data can be used to determine the destination to which the control object goes when traveling in the next riding, so as to determine the whereabouts of the control object. Further, based on the deployment and control data, the corresponding deployment and control service can be generated through a predefined deployment and control service generation rule. Referring to fig. 5, the deployment and control service generation and distribution process includes:
s1301, analyzing the deployment and control data, and generating corresponding deployment and control business in real time when the deployment and control data meet predefined deployment and control business generation rules;
s1302, sending the deployment and control service and the deployment and control data to corresponding deployment and control service processing terminals according to the deployment and control object information corresponding to the deployment and control data, wherein the deployment and control service processing terminals are bound with the deployment and control object information in advance.
According to the embodiment of the application, the related deployment and control service generation rule is predefined, and when the deployment and control data meet the deployment and control service generation rule, the deployment and control service needs to be generated correspondingly. Taking the riding data as an example, the activity range of the controlled object is limited in advance based on the controlled service generation rule, and according to the riding starting point and the riding destination point contained in the controlled data, when the riding starting point or the riding destination point exceeds the activity range limited by the controlled service generation rule, the controlled service needs to be generated correspondingly. And after the deployment and control service is generated, the generated deployment and control service is sent to a corresponding deployment and control service processing terminal for processing. The control service processing terminal can be a mobile terminal such as a mobile phone of a public security policeman. Before this, each control business processing terminal is allocated with a control object in advance, and when a control business is generated based on the control data of one control object, the control business is distributed to the corresponding control business processing terminal for processing. It should be noted that, when the deployment and control service is distributed to the deployment and control service processing terminal, the deployment and control service processing terminal may receive the deployment and control service in the manners of an APP end, a public security network management platform client, a short message service or a government affair WeChat. The control service is used for informing the public security policeman of the specific control condition of the current control object and prompting the public security policeman to process the control service of the related control object. After receiving the deployment and control data based on the deployment and control service processing terminal, the policeman can go to process related deployment and control services (such as faithfully monitoring deployment and control objects, warning and even controlling the deployment and control objects and the like).
In one embodiment, after the public security policeman completes the control service, the control service processing result is uploaded to the public security network management platform. And the public security network management platform receives a control business processing result fed back by the control business processing terminal, binds the control business processing result, the corresponding control data and the control object information to generate a control record and stores the control record. Through storing the above-mentioned cloth accuse record, can be convenient for follow-up implement the management and control to relevant cloth accuse object better to reach better cloth accuse effect.
Specifically, referring to fig. 6, taking the network appointment platform as an example, relevant key personnel are scheduled on the network appointment platform, the key personnel are defined as schedule objects, and schedule object information of the key personnel is stored in advance. And the network car booking platform also prestores a mobile phone number (namely communication identification information) corresponding to the public security policeman, the mobile phone number is bound with the control object information, and subsequently extracted control data corresponding to the control object can be sent to the mobile terminal corresponding to the mobile phone number, so that the extraction and the sending of the control data of the network car booking platform are completed. And after the network appointment platform extracts the deployment and control data, the deployment and control data is sent to the mobile phone corresponding to the mobile phone number in a short message mode. After receiving the short message, the mobile phone can filter the short message through a data filtering program on the mobile phone. Thereby determining the short messages belonging to the control data. Further, after the short message belonging to the control data is determined, the short message is forwarded to the public security network management platform through the mobile private network. The mobile phone transfers the short message by calling the relevant data interface and utilizing the mobile private network. When the short message is forwarded, whether the short message is forwarded successfully is further monitored, and if not, relevant retransmission operation is required. If yes, the public security network management platform processes the short message. The public security network management platform analyzes based on the short message, judges whether the content of the short message meets a predefined control service generation rule, and issues a corresponding control service to a control service processing terminal when the content of the short message meets the control service generation rule, so that distribution of the control service is completed. For example, the short message content refers to the current activity position or the position to which the deployment object is going, and the position exceeds the activity range of the deployment object defined by the deployment service generation rule, the public security network management platform generates a deployment service according to the short message content and the related deployment service generation rule, and the deployment service is sent to a mobile phone of a public security policeman responsible for processing the deployment service of the deployment object. After receiving the deployment and control service through the mobile phone, the policeman can go to the corresponding position to monitor and control the deployment and control object on the spot, so that a better deployment and control effect is realized.
The third-party internet platform extracts the deployment and control data corresponding to the deployment and control object in real time according to the pre-stored deployment and control object information, sends the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information, receives the deployment and control data by the mobile terminal, and forwards the deployment and control data to the public security network management platform through the mobile private network. And then, the public security network management platform monitors the corresponding control object and generates and distributes control business based on the control data. By adopting the technical means, the mobile terminal is used as a deployment and control data forwarding medium, a data interaction barrier between the third-party internet platform and the public security network management platform can be opened, the public security network management platform can conveniently access the deployment and control data generated by the third-party internet platform, and the data access cost is saved.
Moreover, the control data are filtered through the mobile terminal, so that the safety risk of accessing the control data by the public security network management platform can be reduced, and the safety of data access is improved.
Example two:
based on the foregoing embodiment, fig. 7 is a schematic structural diagram of a data access device based on a public security network according to a second embodiment of the present application. Referring to fig. 7, the data access apparatus based on the public security network provided in this embodiment specifically includes: a receiving module 21 and a forwarding module 22.
The receiving module 21 is configured to receive deployment and control data, where the deployment and control data is extracted in real time by a third-party internet platform according to pre-stored deployment and control object information, and sent to a corresponding mobile terminal based on pre-stored communication identification information;
the forwarding module 22 is configured to forward the deployment and control data to a public security network management platform through a mobile private network, so that the public security network management platform receives the deployment and control data and performs monitoring of a corresponding deployment and control object and generation and distribution of a deployment and control service based on the deployment and control data.
The third-party internet platform extracts the deployment and control data corresponding to the deployment and control object in real time according to the pre-stored deployment and control object information, sends the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information, receives the deployment and control data by the mobile terminal, and forwards the deployment and control data to the public security network management platform through the mobile private network. And then, the public security network management platform monitors the corresponding control object and generates and distributes control business based on the control data. By adopting the technical means, the mobile terminal is used as a deployment and control data forwarding medium, a data interaction barrier between the third-party internet platform and the public security network management platform can be opened, the public security network management platform can conveniently access the deployment and control data generated by the third-party internet platform, and the data access cost is saved.
On the basis of the second embodiment, the embodiment of the present application further provides another data access apparatus based on a public security network, including:
the extraction module is used for extracting the information of the pre-stored control object in real time through a third-party internet platform
The extraction module is used for extracting the deployment and control data of the corresponding deployment and control object in real time through a third-party internet platform according to the pre-stored deployment and control object information;
and the sending module is used for sending the deployment and control data to a corresponding mobile terminal based on the prestored communication identification information so that the mobile terminal can receive the deployment and control data and then forward the deployment and control data to the public security network management platform through a mobile private network, and then the public security network management platform carries out monitoring of a corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
In addition, an embodiment of the present application further provides another data access device based on a public security network, including:
and the service distribution module is used for receiving the deployment and control data through the public security network management platform, monitoring corresponding deployment and control objects based on the deployment and control data, generating and distributing deployment and control services, extracting the deployment and control data in real time by a third-party internet platform according to pre-stored deployment and control object information, sending the data to a corresponding mobile terminal based on pre-stored communication identification information, and then forwarding the data to the public security network management platform through a mobile private network by the mobile terminal.
The data access device based on the public security network provided by the second embodiment of the present application can be used to execute the data access method based on the public security network executed by the mobile terminal in the first embodiment, and has corresponding functions and beneficial effects.
Example three:
embodiments of the present application further provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a data access method based on a public security network, where the data access method based on the public security network includes: the third-party internet platform extracts the deployment and control data corresponding to the deployment and control object in real time according to the pre-stored deployment and control object information, and sends the deployment and control data to the corresponding mobile terminal based on the pre-stored communication identification information; the mobile terminal receives the deployment and control data and forwards the deployment and control data to a public security network management platform through a mobile private network; and the public security network management platform receives the deployment and control data, and performs monitoring of the corresponding deployment and control object and generation and distribution of deployment and control services based on the deployment and control data.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media residing in different locations, e.g., in different computer systems connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium containing the computer-executable instructions provided in the embodiments of the present application is not limited to the data access method based on the public security network described above, and may also perform related operations in the data access method based on the public security network provided in any embodiments of the present application.
The data access system, the device and the storage medium based on the public security network provided in the above embodiments may execute the data access method based on the public security network provided in any embodiment of the present application, and reference may be made to the data access method based on the public security network provided in any embodiment of the present application without detailed technical details described in the above embodiments.
The foregoing is considered as illustrative of the preferred embodiments of the invention and the technical principles employed. The present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the claims.