CN117082457A - Personnel positioning management method and system for safety monitoring - Google Patents

Personnel positioning management method and system for safety monitoring Download PDF

Info

Publication number
CN117082457A
CN117082457A CN202311069114.7A CN202311069114A CN117082457A CN 117082457 A CN117082457 A CN 117082457A CN 202311069114 A CN202311069114 A CN 202311069114A CN 117082457 A CN117082457 A CN 117082457A
Authority
CN
China
Prior art keywords
wireless access
positioning
tracking
personnel
mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311069114.7A
Other languages
Chinese (zh)
Other versions
CN117082457B (en
Inventor
李锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tangshan Dongdao Network Technology Co ltd
Original Assignee
Tangshan Dongdao Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tangshan Dongdao Network Technology Co ltd filed Critical Tangshan Dongdao Network Technology Co ltd
Priority to CN202311069114.7A priority Critical patent/CN117082457B/en
Publication of CN117082457A publication Critical patent/CN117082457A/en
Application granted granted Critical
Publication of CN117082457B publication Critical patent/CN117082457B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/318Received signal strength
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application relates to the technical field of personnel positioning management, and provides a personnel positioning management method and a system for safety monitoring, wherein the method comprises the following steps: determining a target activity area and a target positioning tracking person; laying an image acquisition device, networking the image acquisition device, and taking the image acquisition device as a reference node; determining a positioning label and setting a mobile node; screening 3 wireless access points; obtaining first mobile signal intensity data; obtaining second mobile signal intensity data at the next tracking time node; and the positioning label is added to position and track the target positioning and tracking personnel, so that the technical problems that the positioning and tracking precision of the target personnel cannot be guaranteed and the safety monitoring requirement cannot be met are solved, the positions of the target positioning and tracking personnel are positioned and tracked by measuring the signal intensity between the wireless access point and the mobile node, the real-time positioning and tracking of the target personnel are realized, the real-time performance and accuracy of the positioning and tracking are guaranteed, and the safety monitoring reliability technical effect is effectively improved.

Description

Personnel positioning management method and system for safety monitoring
Technical Field
The application relates to the technical field of personnel positioning management, in particular to a personnel positioning management method and system for safety monitoring.
Background
The process of real-time positioning and tracking the monitored target positioning and tracking personnel and managing and controlling the position information of the target positioning and tracking personnel is realized by using technical means such as GPS positioning and the like.
Through real-time positioning and tracking, potential safety threats can be found and handled in time, and the safety of personnel is guaranteed. Generally, the position of the target person is positioned and tracked by using the GPS technology, but the target person is required to be used in an open outdoor environment, and the effect is poor in an indoor or closed place. Positioning and tracking of the target person is achieved by implanting or wearing an RFID (Radio Frequency Identification ) tag on the target person in combination with a wireless receiving device. This method requires physical access to the target person, and the reading range of the tag is limited and is easily disturbed. In general, the common security monitoring personnel positioning management method has some limitations and cannot meet the requirements of modern security monitoring.
In summary, in the prior art, there is a technical problem that the accuracy of positioning and tracking of the target personnel cannot be guaranteed and the requirement of safety monitoring cannot be met.
Disclosure of Invention
The application provides a personnel positioning management method and a system for safety monitoring, which aim to solve the technical problems that the positioning tracking precision of target personnel in the prior art cannot be ensured and the requirement of safety monitoring cannot be met.
In view of the above, the present application provides a personnel location management method and system for security monitoring.
In a first aspect of the disclosure, a personnel location management method for security monitoring is provided, wherein the method comprises: determining a target activity area and a target positioning tracking person, wherein the target positioning tracking person carries a mobile intelligent terminal with him, and simultaneously, acquiring a WIFI network address and an MAC address of the mobile intelligent terminal; arranging an image acquisition device in the target active area, networking the image acquisition device, and taking the image acquisition device as a reference node; taking the WIFI network address and the MAC address of the mobile intelligent terminal as the positioning label of the target positioning tracking personnel, and setting the mobile intelligent terminal as a mobile node; comparing the wireless access points recorded by the personnel positioning management system for safety monitoring, and screening the wireless access points to obtain 3 wireless access points which are not in the same line; measuring and calculating signal intensity between the mobile node and a reference node through 3 wireless access points which are not in the same line to obtain first mobile signal intensity data; measuring and calculating the signal intensity between the mobile node and the reference node through 3 wireless access points which are not in the same line at the next tracking time node to obtain second mobile signal intensity data; and adding the first moving signal intensity data and the second moving signal intensity data to the positioning tag to position and track a target positioning and tracking person.
In another aspect of the present disclosure, a personnel location management system for security monitoring is provided, wherein the system comprises: the address acquisition module is used for determining a target activity area and a target positioning tracking person, wherein the target positioning tracking person carries a mobile intelligent terminal with him, and simultaneously, the WIFI network address and the MAC address of the mobile intelligent terminal are acquired; the reference node determining module is used for arranging an image acquisition device in the target active area, networking the image acquisition device and taking the image acquisition device as a reference node; the mobile node determining module is used for taking the WIFI network address and the MAC address of the mobile intelligent terminal as the positioning labels of the target positioning tracking personnel and setting the mobile intelligent terminal as a mobile node; the access point screening module is used for screening the wireless access points according to the wireless access points recorded by the personnel positioning management system for safety monitoring to obtain 3 wireless access points which are not in the same line; the first signal intensity measuring and calculating module is used for measuring and calculating the signal intensity between the mobile node and the reference node through 3 wireless access points which are not in the same line to obtain first mobile signal intensity data; the second signal strength measuring and calculating module is used for measuring and calculating the signal strength between the mobile node and the reference node through 3 wireless access points which are not in the same line at the next tracking time node to obtain second mobile signal strength data; and the positioning tracking module is used for adding the first moving signal intensity data and the second moving signal intensity data to the positioning tag to perform positioning tracking on the target positioning tracking personnel.
One or more technical schemes provided by the application have at least the following technical effects or advantages:
because the target activity area and the target positioning tracking personnel are determined, the target positioning tracking personnel carry the mobile intelligent terminal with them, and meanwhile, the WIFI network address and the MAC address of the mobile intelligent terminal are acquired; arranging an image acquisition device in a target active area, networking the image acquisition device, and taking the image acquisition device as a reference node; taking the WIFI network address and the MAC address of the mobile intelligent terminal as positioning labels of target positioning tracking personnel, and setting the mobile intelligent terminal as a mobile node; comparing the wireless access points recorded by the personnel positioning management system for safety monitoring, and screening the wireless access points to obtain 3 wireless access points which are not in the same line; measuring and calculating signal intensity between the mobile node and the reference node through 3 wireless access points which are not in the same line to obtain first mobile signal intensity data; measuring and calculating the signal intensity between the mobile node and the reference node through 3 wireless access points which are not in the same line at the next tracking time node to obtain second mobile signal intensity data; the first mobile signal intensity data and the second mobile signal intensity data are added to the positioning tag to position and track the target positioning and tracking personnel, so that the positions of the target personnel are positioned and tracked by measuring the signal intensity between the wireless access point and the mobile node, the real-time positioning and tracking of the target personnel are realized, the real-time performance and accuracy of the positioning and tracking are ensured, and the technical effect of the reliability of safety monitoring is effectively improved.
The foregoing description is only an overview of the present application, and is intended to be implemented in accordance with the teachings of the present application in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present application more readily apparent.
Drawings
FIG. 1 is a schematic diagram of a possible flow chart of a personnel location management method for security monitoring according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of a method for personnel location management for security monitoring according to an embodiment of the present application for determining whether there is a possibility of MAC address modification;
FIG. 3 is a schematic diagram of a possible flow of a location tracking display output in a personnel location management method for security monitoring according to an embodiment of the present application;
fig. 4 is a schematic diagram of a possible configuration of a personnel location management system for security monitoring according to an embodiment of the present application.
Reference numerals illustrate: the system comprises an address acquisition module 100, a reference node determination module 200, a mobile node determination module 300, an access point screening module 400, a first signal strength measurement module 500, a second signal strength measurement module 600, and a location tracking module 700.
Detailed Description
The embodiment of the application provides a personnel positioning management method and a system for safety monitoring, which solve the technical problems that the positioning and tracking precision of target personnel cannot be ensured and the safety monitoring requirement cannot be met, realize the positioning and tracking of the personnel position by measuring the signal intensity between a wireless access point and a mobile node, realize the real-time positioning and tracking of the target personnel, ensure the real-time performance and accuracy of positioning and tracking, and effectively improve the reliability of safety monitoring.
Having described the basic principles of the present application, various non-limiting embodiments of the present application will now be described in detail with reference to the accompanying drawings.
Embodiment one:
as shown in fig. 1, an embodiment of the present application provides a personnel location management method for security monitoring, where the method includes:
s10: determining a target activity area and a target positioning tracking person, wherein the target positioning tracking person carries a mobile intelligent terminal with him, and simultaneously, acquiring a WIFI network address and an MAC address of the mobile intelligent terminal;
step S10 further includes the steps of:
s11: acquiring an original MAC address of the mobile intelligent terminal;
s12: comparing the original MAC address with the current MAC address of the mobile intelligent terminal;
s13: if the comparison is consistent, the MAC address is not modified, and the MAC address of the mobile intelligent terminal is directly obtained;
s14: if the comparison is inconsistent, the MAC address is modified, a network interface and a security log are checked, the current MAC address is covered by the original MAC address, and the MAC address of the mobile intelligent terminal is obtained.
Step S14 includes the steps of:
s141: checking a network interface comprises checking the network interface and a virtual interface connected with the mobile intelligent terminal, and determining whether MAC address spoofing exists;
s142: checking the security log includes checking whether the mobile intelligent terminal has abnormal network activity or unauthorized device connection, and determining whether a security threat exists.
Specifically, the technology of positioning and tracking by using the signal intensity between the wireless access point and the mobile node can overcome some limitations of the common positioning management method of the security monitoring personnel, has higher precision and real-time performance, and is suitable for various different occasions and environments.
The deployment of the wireless access points in the target active area is proper, and after the deployment of the wireless access points in the target active area is completed, the coverage area of the wireless access points is fully overlapped with the target active area; the target positioning tracking personnel are target personnel for personnel positioning management, a target activity area and the target positioning tracking personnel are determined, the target positioning tracking personnel are required to carry a mobile intelligent terminal, meanwhile, a WIFI network address and an MAC address of the mobile intelligent terminal are acquired, the WIFI network address is an address for uniquely identifying one device in a network, and the MAC address is a unique identifier of a network interface, so that support is provided for subsequent personnel positioning tracking;
further, acquiring the MAC address of the mobile intelligent terminal includes acquiring an original MAC address of the device by means of a command line or a network management tool; comparing the acquired original MAC address with the MAC address of the current equipment, and if the comparison is consistent, indicating that the MAC address is not modified, and directly acquiring the MAC address of the mobile intelligent terminal; if the comparison is inconsistent, the MAC address is modified, a network interface and a security log are checked, the original MAC address is used for covering the current MAC address, and the MAC address of the mobile intelligent terminal is obtained, so that the obtained MAC address is ensured to be credible, network attack and security threat are prevented by checking the network interface and the security log, and other potential safety hazards such as tampering of target positioning tracking personnel positioning caused by the network attack and the security threat are avoided.
Specifically, the network interface is checked: if the MAC address is found to be modified, the state of the network interface can be checked to see whether a plurality of network interfaces or virtual interfaces exist or not so as to determine whether the behaviors such as MAC address spoofing exist or not; checking a security log: if the MAC address is found to be modified, the security log of the system can be checked to see whether abnormal network activities or unauthorized equipment connection exist or not so as to determine whether security threat exists or not, the network interface and the security log are checked, the reliability of the MAC address is improved, and a malicious user is prevented from tampering the MAC address to attack.
As shown in fig. 2, the embodiment of the present application further includes:
s151: determining network equipment with a function of modifying the MAC addresses, and obtaining a first address falsification factor if the condition that a plurality of MAC addresses correspond to the same IP address is found;
s152: if the condition that a plurality of network devices have the same MAC address is found, obtaining a second address falsification factor;
s153: and determining whether MAC address modification behavior exists or not through the first address falsification factor and the second address falsification factor.
Specifically, since the network devices such as a computer, a router, and a switch have a function of modifying a MAC address, it is necessary to consider this in making a MAC address determination, and based on this, the network devices such as a computer, a router, and a switch are network devices having a function of modifying a MAC address, and address falsification is to spoof the behavior of a network device or a system by modifying a MAC address or an IP address, and a network monitoring tool such as Wireshark or the like can be used to monitor network traffic and analyze the MAC address. If the condition that a plurality of MAC addresses correspond to the same IP address is found, MAC address falsification can exist, and the condition that the plurality of MAC addresses correspond to the same IP address is taken as a first address falsification factor; whether MAC address falsification exists can be determined by checking the physical address of the device, such as the network card serial number, etc. Since the physical address is generally unique, if a plurality of network devices are found to have the same physical address, there is a high possibility of MAC address falsification, taking the case where a plurality of network devices have the same MAC address as a second address falsification factor;
the first address falsification factor and the second address falsification factor are combined to judge whether the MAC address modification behavior exists or not, and whether the MAC address modification behavior exists or not is determined, namely, the network security is improved by comprehensively using various network security technologies and measures, the advanced network attack technology is prevented from bypassing single monitoring, the network reliability is improved, the behavior that a malicious user modifies or deceptively exercises the MAC address can be detected, and measures are timely taken to prevent network attack.
S20: arranging an image acquisition device in the target active area, networking the image acquisition device, and taking the image acquisition device as a reference node;
s30: taking the WIFI network address and the MAC address of the mobile intelligent terminal as the positioning label of the target positioning tracking personnel, and setting the mobile intelligent terminal as a mobile node;
s40: comparing the wireless access points recorded by the personnel positioning management system for safety monitoring, and screening the wireless access points to obtain 3 wireless access points which are not in the same line;
step S40 includes the steps of:
s41: comparing with a personnel positioning management system for safety monitoring, recording, and acquiring N wireless access point coordinates, wherein N is a positive integer greater than or equal to 3;
s42: setting coordinates P (x, y, z) of the mobile intelligent terminal;
s43: based on the N wireless access point coordinates, in a first direction interval, randomly acquiring the sitting position of a first wireless access pointLabel Q 1 (x 1 ,y 1 ,z 1 );
S44: based on the N wireless access point coordinates, randomly acquiring a second wireless access point coordinate Q in a second direction interval 2 (x 2 ,y 2 ,z 2 );
S45: based on the N wireless access point coordinates, randomly acquiring a third wireless access point coordinate Q in a third direction interval 3 (x 3 ,y 3 ,z 3 );
S46: calculating the coordinates P (x, y, z) and the first wireless access point coordinates Q 1 (x 1 ,y 1 ,z 1 ) Second wireless access point coordinates Q 2 (x 2 ,y 2 ,z 2 ) Third wireless access point coordinate Q 3 (x 3 ,y 3 ,z 3 ) Distance d between 1 、d 2 、d 3 And screening the wireless access points to obtain 3 wireless access points which are not in the same line.
Specifically, an image acquisition device is arranged in the target active area, and is connected with the network, the image acquisition device is used for providing equipment of a reference node, on the other hand, real-time image information in the target area can be acquired through the image acquisition device, and the real-time image information is used as reference information for target positioning and tracking, and the image acquisition device is connected with the network, so that the acquired image information can be transmitted and processed, and the real-time performance and accuracy of monitoring are improved;
and taking the WIFI network address and the MAC address of the mobile intelligent terminal as the positioning label of the target positioning tracking personnel, setting the mobile intelligent terminal as a mobile node, acquiring real-time position information of the target positioning tracking personnel through the mobile intelligent terminal based on the positioning label, and tracking and managing the track of the target positioning tracking personnel. Meanwhile, the mobile intelligent terminal is used as a mobile node to update and transmit the target position information in real time, so that the accuracy and the instantaneity of positioning and tracking are improved;
comparing with the wireless access points recorded by the personnel positioning management system for safety monitoring, performing wireless access point screening to obtain 3 wireless access points which are not in the same line, wherein in the overlapping area of the 3 wireless access points, the mobile node can receive signals, and as the three wireless access points are not in the same line, the position of the mobile node can be calculated by using a triangulation positioning method;
further, comparing with the wireless access points recorded by the personnel positioning management system for safety monitoring, performing wireless access point screening to obtain 3 wireless access points which are not in the same line, wherein the wireless access points refer to an infrastructure for connecting equipment in a wireless communication network, and are usually some wireless routers or base stations; distance d 1 Namely P (x, y, z) and the first wireless access point coordinate Q 1 (x 1 ,y 1 ,z 1 ) Actual distance d between 2 Namely P (x, y, z) and a second wireless access point coordinate Q 2 (x 2 ,y 2 ,z 2 ) Actual distance d between 3 Namely P (x, y, z) and a third wireless access point coordinate Q 3 (x 3 ,y 3 ,z 3 ) The actual distance between two points is usually calculated by Euclidean distance, i.e. the straight line distance between the two points;
comparing with a personnel positioning management system for safety monitoring, recording, and acquiring N wireless access point coordinates, wherein N is a positive integer greater than or equal to 3; since the position of the mobile node can be calculated by using a triangulation method, a first direction interval, a second direction interval and a third direction interval are defined, and the coordinates P (x, y, z) of the mobile intelligent terminal are set; based on the N wireless access point coordinates, randomly acquiring a first wireless access point coordinate Q in a first direction interval 1 (x 1 ,y 1 ,z 1 ) The method comprises the steps of carrying out a first treatment on the surface of the Based on the N wireless access point coordinates, randomly acquiring a second wireless access point coordinate Q in a second direction interval 2 (x 2 ,y 2 ,z 2 ) The method comprises the steps of carrying out a first treatment on the surface of the Based on the N wireless access point coordinates, randomly acquiring a third wireless access point coordinate Q in a third direction interval 3 (x 3 ,y 3 ,z 3 );
Calculating the coordinates P (x, y, z) and the first wireless access point coordinates Q 1 (x 1 ,y 1 ,z 1 ) Second wireless access point coordinates Q 2 (x 2 ,y 2 ,z 2 ) Third wireless access point coordinate Q 3 (x 3 ,y 3 ,z 3 ) Distance d between 1 、d 2 、d 3 The screening determines the 3 nearest wireless access points that are not on the same line, and the position determined by using the three wireless access points can obtain higher accuracy.
The embodiment of the application further comprises the steps of:
s471: acquiring the ith signal and transmitting the ith signal to a first wireless access point coordinate Q 1 Time t of (2) i1 The ith signal is sent to the second wireless access point coordinate Q 2 Time t of (2) i2 The ith signal is sent to the third wireless access point coordinate Q 3 Time t of (2) i3 The ith signal is a real-time signal sent by the mobile intelligent terminal;
s472: if the distance d 1 =ct i1 Distance d 2 =ct i2 Distance d 3 =ct i3 Time synchronization of the ith signal, where c is the propagation velocity of the ith signal in air, ct i Is the physical path length of the communication link for the ith signal.
Specifically, to ensure the synchronism of the tracking data, the ith signal is acquired and sent to the first wireless access point coordinate Q 1 Time t of (2) i1 The ith signal is sent to the second wireless access point coordinate Q 2 Time t of (2) i2 The ith signal is sent to the third wireless access point coordinate Q 3 Time t of (2) i3 The ith signal is a real-time signal sent by the mobile intelligent terminal;
if the distance d 1 =ct i1 Distance d 2 =ct i2 Distance d 3 =ct i3 Then the time of the ith signal is synchronized, wherein the distance d 1 For P (x, y, z) and the first wireless access point coordinate Q 1 (x 1 ,y 1 ,z 1 ) Actual distance d between 2 Namely P (x, y, z) and a second wireless access point coordinate Q 2 (x 2 ,y 2 ,z 2 ) Actual distance d between 3 Namely P (x, y, z) and a third wireless access point coordinate Q 3 (x 3 ,y 3 ,z 3 ) The actual distance between the two signals, c is the propagation speed of the ith signal in the air, ct i The physical path length of the communication link for the ith signal, i.e. the physical path length of the communication link is equal to the actual distance between the mobile intelligent terminal and the coordinates of the wireless access point, to determine the time synchronization of the ith signal.
S50: measuring and calculating signal intensity between the mobile node and a reference node through 3 wireless access points which are not in the same line to obtain first mobile signal intensity data;
s60: measuring and calculating the signal intensity between the mobile node and the reference node through 3 wireless access points which are not in the same line at the next tracking time node to obtain second mobile signal intensity data;
step S50 includes the steps of:
s51: modeling path loss, and constructing a logarithmic loss model: p=a-10 Blg (d), where p is the received signal strength data; a depends on the transmit power, extra losses and other system constants; b is the path loss index; d is the physical path length of the communication link.
Specifically, when a mobile node measures for the first time, measuring and calculating the signal intensity between the mobile node and a reference node through 3 wireless access points which are not in the same line, so as to obtain first mobile signal intensity data; in the next tracking time node, the mobile node calculates the signal intensity between the mobile node and the reference node through 3 wireless access points which are not in the same line during the second measurement to obtain second mobile signal intensity data;
further, the signal strength between the mobile node and the reference node is measured and calculated through 3 wireless access points which are not in the same line to obtain first mobile signal strength data, which comprises the steps of modeling path loss and constructing a logarithmic loss model: p=a-10 Blg (d), where p is the received signal strength data; a depends on the transmit power, extra losses and other system constants; b is the path loss index; d is the physical path length of the communication link; substituting the transmission power, the extra loss, other system constants and the physical path length of the communication link involved in the first measurement into the first mobile signal strength data, and providing a model foundation for the calculation of the signal strength data.
S70: and adding the first moving signal intensity data and the second moving signal intensity data to the positioning tag to position and track a target positioning and tracking person.
As shown in fig. 3, the embodiment of the present application further includes the steps of:
s71: positioning and tracking are carried out on target positioning and tracking personnel, and meanwhile, data protection is carried out on the collected positioning and tracking data, so that positioning, tracking and encrypting data are obtained;
s72: after authorized access login, the positioning tracking encryption data are sent to a user terminal, decrypted and displayed and output.
Specifically, adding the first moving signal intensity data and the second moving signal intensity data to the positioning tag, performing positioning tracking on a target positioning tracking person, calculating a moving direction and a moving speed of the mobile node by comparing the signal intensity data obtained by the first measurement and the second measurement, and further estimating a position of the mobile node, including: the direction of movement of the mobile node is calculated using triangulation. Commonly, using the side length ratio of triangles to calculate the direction angle can be achieved by comparing the signal strengths of the first and second measurements to the distance between two known nodes: p (x, y, z) and first wireless access point coordinates Q 1 (x 1 ,y 1 ,z 1 ) Or second wireless access point coordinates Q 2 (x 2 ,y 2 ,z 2 ) Or third wireless access point coordinate Q 3 (x 3 ,y 3 ,z 3 ) Andp (x, y, z) is compared with a reference node corresponding to the image acquisition device. Calculating the speed of the mobile node by using the calculated moving direction and the time interval between the two measurements, thereby obtaining the position of the mobile node;
furthermore, in order to ensure the safety of the positioning tracking data, the embodiment of the application further comprises the steps of positioning tracking the target positioning tracking personnel, and meanwhile, performing data encryption protection on the collected positioning tracking data to obtain positioning tracking encrypted data; after authorized access login, the positioning tracking encryption data are sent to a user terminal, the positioning tracking encryption data are decrypted, and the positioning tracking data are synthesized into tracks to be displayed and output. After the real-time positioning tracking of the target personnel is realized, the collected data is required to be encrypted and protected, so that the safety and privacy protection of the data can be ensured through technical means of authorized access login and encryption and decryption, the safe transmission and access control of the data are ensured, and the reliability and safety of the system are further improved.
In summary, the personnel positioning management method and system for safety monitoring provided by the embodiment of the application have the following technical effects:
1. because the target activity area and the target positioning tracking personnel are determined, the target positioning tracking personnel carry the mobile intelligent terminal with them, and meanwhile, the WIFI network address and the MAC address of the mobile intelligent terminal are acquired; arranging an image acquisition device in a target active area, networking the image acquisition device, and taking the image acquisition device as a reference node; taking the WIFI network address and the MAC address of the mobile intelligent terminal as positioning labels of target positioning tracking personnel, and setting the mobile intelligent terminal as a mobile node; comparing the wireless access points recorded by the personnel positioning management system for safety monitoring, and screening the wireless access points to obtain 3 wireless access points which are not in the same line; measuring and calculating signal intensity between the mobile node and the reference node through 3 wireless access points which are not in the same line to obtain first mobile signal intensity data; measuring and calculating the signal intensity between the mobile node and the reference node through 3 wireless access points which are not in the same line at the next tracking time node to obtain second mobile signal intensity data; the application provides a personnel positioning management method and a system for safety monitoring, which realize the positioning and tracking of personnel by measuring the signal intensity between a wireless access point and a mobile node, realize the real-time positioning and tracking of target personnel, ensure the real-time performance and accuracy of positioning and tracking and effectively improve the technical effect of the reliability of safety monitoring.
2. Due to the adoption of the acquisition of the ith signal to the first wireless access point coordinate Q 1 Time t of (2) i1 The ith signal is sent to the second wireless access point coordinate Q 2 Time t of (2) i2 The ith signal is sent to the third wireless access point coordinate Q 3 Time t of (2) i3 The ith signal is a real-time signal sent by the mobile intelligent terminal; if the distance d 1 =ct i1 Distance d 2 =ct i2 Distance d 3 =ct i3 Time synchronization of the ith signal, where c is the propagation velocity of the ith signal in air, ct i Is the physical path length of the communication link for the ith signal. I.e. the physical path length of the communication link is equal to the actual distance between the mobile intelligent terminal and the coordinates of the wireless access point to determine the time synchronization of the i-th signal.
Embodiment two:
based on the same inventive concept as the personnel location management method for safety monitoring in the foregoing embodiments, as shown in fig. 4, an embodiment of the present application provides a personnel location management system for safety monitoring, wherein the system includes:
the address acquisition module 100 is configured to determine a target activity area and a target positioning and tracking person, where the target positioning and tracking person carries a mobile intelligent terminal with him, and acquire a WIFI network address and a MAC address of the mobile intelligent terminal at the same time;
a reference node determining module 200, configured to lay an image acquisition device in the target active area, and simultaneously, network the image acquisition device, and use the image acquisition device as a reference node;
the mobile node determining module 300 is configured to use a WIFI network address and a MAC address of the mobile intelligent terminal as a location tag of the target location tracking person, and set the mobile intelligent terminal as a mobile node;
the access point screening module 400 is used for screening wireless access points according to the wireless access points recorded by the personnel positioning management system for security monitoring, so as to obtain 3 wireless access points which are not in the same line;
a first signal strength measurement module 500, configured to measure signal strength between the mobile node and a reference node through 3 wireless access points that are not in the same line, so as to obtain first mobile signal strength data;
a second signal strength measurement module 600, configured to measure and calculate, at a next tracking time node, signal strength between the mobile node and a reference node through 3 wireless access points that are not on the same line, to obtain second mobile signal strength data;
the positioning tracking module 700 is configured to add the first moving signal intensity data and the second moving signal intensity data to the positioning tag, and perform positioning tracking on a target positioning tracking person.
Further, the address obtaining module 100 is configured to perform the following steps:
acquiring an original MAC address of the mobile intelligent terminal;
comparing the original MAC address with the current MAC address of the mobile intelligent terminal;
if the comparison is consistent, the MAC address is not modified, and the MAC address of the mobile intelligent terminal is directly obtained;
if the comparison is inconsistent, the MAC address is modified, a network interface and a security log are checked, the current MAC address is covered by the original MAC address, and the MAC address of the mobile intelligent terminal is obtained.
Further, the address obtaining module 100 is further configured to perform the following steps:
checking a network interface comprises checking the network interface and a virtual interface connected with the mobile intelligent terminal, and determining whether MAC address spoofing exists;
checking the security log includes checking whether the mobile intelligent terminal has abnormal network activity or unauthorized device connection, and determining whether a security threat exists.
Further, the address obtaining module 100 is further configured to perform the following steps:
determining network equipment with a function of modifying the MAC addresses, and obtaining a first address falsification factor if the condition that a plurality of MAC addresses correspond to the same IP address is found;
if the condition that a plurality of network devices have the same MAC address is found, obtaining a second address falsification factor;
and determining whether MAC address modification behavior exists or not through the first address falsification factor and the second address falsification factor.
Further, the access point screening module 400 is configured to perform the following steps:
comparing with a personnel positioning management system for safety monitoring, recording, and acquiring N wireless access point coordinates, wherein N is a positive integer greater than or equal to 3;
setting coordinates P (x, y, z) of the mobile intelligent terminal;
based on the N wireless access point coordinates, randomly acquiring a first wireless access point coordinate Q in a first direction interval 1 (x 1 ,y 1 ,z 1 );
Based on the N wireless access point coordinates, randomly acquiring a second wireless access point coordinate Q in a second direction interval 2 (x 2 ,y 2 ,z 2 );
Based on the N wireless access point coordinates, randomly acquiring a third wireless access point coordinate Q in a third direction interval 3 (x 3 ,y 3 ,z 3 );
Calculating the coordinates P (x, y, z) and the first wireless access point coordinates Q 1 (x 1 ,y 1 ,z 1 ) Second wireless access point coordinates Q 2 (x 2 ,y 2 ,z 2 ) Third wireless access point coordinate Q 3 (x 3 ,y 3 ,z 3 ) Distance d between 1 、d 2 、d 3 And screening the wireless access points to obtain 3 wireless access points which are not in the same line.
Further, the access point screening module 400 is further configured to perform the following steps:
acquiring the ith signal and transmitting the ith signal to a first wireless access point coordinate Q 1 Time t of (2) i1 The ith signal is sent to the second wireless access point coordinate Q 2 Time t of (2) i2 The ith signal is sent to the third wireless access point coordinate Q 3 Time t of (2) i3 The ith signal is a real-time signal sent by the mobile intelligent terminal;
if the distance d 1 =ct i1 Distance d 2 =ct i2 Distance d 3 =ct i3 Time synchronization of the ith signal, where c is the propagation velocity of the ith signal in air, ct i Is the physical path length of the communication link for the ith signal.
Further, the first signal strength measurement module 500 is configured to perform the following steps:
modeling path loss, and constructing a logarithmic loss model: p=a-10 Blg (d), where p is the received signal strength data; a depends on the transmit power, extra losses and other system constants; b is the path loss index; d is the physical path length of the communication link.
Further, the personnel location management system for safety monitoring is further configured to perform the following steps:
positioning and tracking are carried out on target positioning and tracking personnel, and meanwhile, data protection is carried out on the collected positioning and tracking data, so that positioning, tracking and encrypting data are obtained;
after authorized access login, the positioning tracking encryption data are sent to a user terminal, decrypted and displayed and output.
Any of the steps of the methods described above may be stored as computer instructions or programs in a non-limiting computer memory and may be called by a non-limiting computer processor to identify any method for implementing an embodiment of the present application, without unnecessary limitations.
Further, the first or second element may not only represent a sequential relationship, but may also represent a particular concept, and/or may be selected individually or in whole among a plurality of elements. It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the scope of the application. Thus, the present application is intended to include such modifications and alterations insofar as they come within the scope of the application or the equivalents thereof.

Claims (9)

1. A personnel location management method for security monitoring, the method comprising:
determining a target activity area and a target positioning tracking person, wherein the target positioning tracking person carries a mobile intelligent terminal with him, and simultaneously, acquiring a WIFI network address and an MAC address of the mobile intelligent terminal;
arranging an image acquisition device in the target active area, networking the image acquisition device, and taking the image acquisition device as a reference node;
taking the WIFI network address and the MAC address of the mobile intelligent terminal as the positioning label of the target positioning tracking personnel, and setting the mobile intelligent terminal as a mobile node;
comparing the wireless access points recorded by the personnel positioning management system for safety monitoring, and screening the wireless access points to obtain 3 wireless access points which are not in the same line;
measuring and calculating signal intensity between the mobile node and a reference node through 3 wireless access points which are not in the same line to obtain first mobile signal intensity data;
measuring and calculating the signal intensity between the mobile node and the reference node through 3 wireless access points which are not in the same line at the next tracking time node to obtain second mobile signal intensity data;
and adding the first moving signal intensity data and the second moving signal intensity data to the positioning tag to position and track a target positioning and tracking person.
2. The personnel location management method for security monitoring of claim 1, wherein before obtaining the WIFI network address and the MAC address of the mobile intelligent terminal, the method further comprises:
acquiring an original MAC address of the mobile intelligent terminal;
comparing the original MAC address with the current MAC address of the mobile intelligent terminal;
if the comparison is consistent, the MAC address is not modified, and the MAC address of the mobile intelligent terminal is directly obtained;
if the comparison is inconsistent, the MAC address is modified, a network interface and a security log are checked, the current MAC address is covered by the original MAC address, and the MAC address of the mobile intelligent terminal is obtained.
3. A personnel location management method for security monitoring as in claim 2, wherein the checking network interface with security log, the method comprising:
checking a network interface comprises checking the network interface and a virtual interface connected with the mobile intelligent terminal, and determining whether MAC address spoofing exists;
checking the security log includes checking whether the mobile intelligent terminal has abnormal network activity or unauthorized device connection, and determining whether a security threat exists.
4. A personnel location management method for security monitoring as in claim 2, further comprising:
determining network equipment with a function of modifying the MAC addresses, and obtaining a first address falsification factor if the condition that a plurality of MAC addresses correspond to the same IP address is found;
if the condition that a plurality of network devices have the same MAC address is found, obtaining a second address falsification factor;
and determining whether MAC address modification behavior exists or not through the first address falsification factor and the second address falsification factor.
5. The personnel location management method for security monitoring according to claim 1, wherein the personnel location management system for security monitoring performs wireless access point screening to obtain 3 wireless access points not in the same line, the method comprising:
comparing with a personnel positioning management system for safety monitoring, recording, and acquiring N wireless access point coordinates, wherein N is a positive integer greater than or equal to 3;
setting coordinates P (x, y, z) of the mobile intelligent terminal;
based on the N wireless access point coordinates, randomly acquiring a first wireless access point coordinate Q in a first direction interval 1 (x 1 ,y 1 ,z 1 );
Based on the N wireless access point coordinates, randomly acquiring a second wireless access point coordinate Q in a second direction interval 2 (x 2 ,y 2 ,z 2 );
Based on the N wireless access point coordinates, randomly acquiring a third wireless access point coordinate Q in a third direction interval 3 (x 3 ,y 3 ,z 3 );
Calculating the coordinates P (x, y, z) and the first wireless access point coordinates Q 1 (x 1 ,y 1 ,z 1 ) Second wireless access point coordinates Q 2 (x 2 ,y 2 ,z 2 ) Third wireless access point coordinate Q 3 (x 3 ,y 3 ,z 3 ) Distance d between 1 、d 2 、d 3 And screening the wireless access points to obtain 3 wireless access points which are not in the same line.
6. A personnel location management method for security monitoring as in claim 5, the method comprising:
acquiring the ith signal and transmitting the ith signal to a first wireless access point coordinate Q 1 Time t of (2) i1 The ith signal is sent to the second wireless access point coordinate Q 2 Time t of (2) i2 The ith signal is sent to the third wireless access point coordinate Q 3 Time t of (2) i3 The ith signal is a real-time signal sent by the mobile intelligent terminal;
if the distance d 1 =ct i1 Distance d 2 =ct i2 Distance d 3 =ct i3 Time synchronization of the ith signal, where c is the propagation velocity of the ith signal in air, ct i Is the physical path length of the communication link for the ith signal.
7. The personnel location management method for security monitoring according to claim 1, wherein the measuring signal strength between the mobile node and a reference node through 3 wireless access points not on the same line, and obtaining first mobile signal strength data, the method comprising:
modeling path loss, and constructing a logarithmic loss model:
p=a-10Blg(d),
wherein p is the received signal strength data; a depends on the transmit power, extra losses and other system constants; b is the path loss index; d is the physical path length of the communication link.
8. A personnel location management method for security monitoring as in claim 1, further comprising:
positioning and tracking are carried out on target positioning and tracking personnel, and meanwhile, data protection is carried out on the collected positioning and tracking data, so that positioning, tracking and encrypting data are obtained;
after authorized access login, the positioning tracking encryption data are sent to a user terminal, decrypted and displayed and output.
9. Personnel location management system for safety monitoring, characterized by implementing a personnel location management method for safety monitoring according to any of claims 1-8, comprising:
the address acquisition module is used for determining a target activity area and a target positioning tracking person, wherein the target positioning tracking person carries a mobile intelligent terminal with him, and simultaneously, the WIFI network address and the MAC address of the mobile intelligent terminal are acquired;
the reference node determining module is used for arranging an image acquisition device in the target active area, networking the image acquisition device and taking the image acquisition device as a reference node;
the mobile node determining module is used for taking the WIFI network address and the MAC address of the mobile intelligent terminal as the positioning labels of the target positioning tracking personnel and setting the mobile intelligent terminal as a mobile node;
the access point screening module is used for screening the wireless access points according to the wireless access points recorded by the personnel positioning management system for safety monitoring to obtain 3 wireless access points which are not in the same line;
the first signal intensity measuring and calculating module is used for measuring and calculating the signal intensity between the mobile node and the reference node through 3 wireless access points which are not in the same line to obtain first mobile signal intensity data;
the second signal strength measuring and calculating module is used for measuring and calculating the signal strength between the mobile node and the reference node through 3 wireless access points which are not in the same line at the next tracking time node to obtain second mobile signal strength data;
and the positioning tracking module is used for adding the first moving signal intensity data and the second moving signal intensity data to the positioning tag to perform positioning tracking on the target positioning tracking personnel.
CN202311069114.7A 2023-08-24 2023-08-24 Personnel positioning management method and system for safety monitoring Active CN117082457B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311069114.7A CN117082457B (en) 2023-08-24 2023-08-24 Personnel positioning management method and system for safety monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311069114.7A CN117082457B (en) 2023-08-24 2023-08-24 Personnel positioning management method and system for safety monitoring

Publications (2)

Publication Number Publication Date
CN117082457A true CN117082457A (en) 2023-11-17
CN117082457B CN117082457B (en) 2024-04-02

Family

ID=88701962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311069114.7A Active CN117082457B (en) 2023-08-24 2023-08-24 Personnel positioning management method and system for safety monitoring

Country Status (1)

Country Link
CN (1) CN117082457B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117440512A (en) * 2023-12-18 2024-01-23 泉州医学高等专科学校 Personnel positioning system based on wireless communication network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105872481A (en) * 2016-05-31 2016-08-17 中科劲点(北京)科技有限公司 Tracking and positioning device, method and system combining visual signals and wireless signals
CN107590439A (en) * 2017-08-18 2018-01-16 湖南文理学院 Target person identification method for tracing and device based on monitor video
CN111601254A (en) * 2020-04-16 2020-08-28 深圳市优必选科技股份有限公司 Target tracking method and device, storage medium and intelligent equipment
CN113395761A (en) * 2020-03-11 2021-09-14 深圳光启超材料技术有限公司 Target positioning method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105872481A (en) * 2016-05-31 2016-08-17 中科劲点(北京)科技有限公司 Tracking and positioning device, method and system combining visual signals and wireless signals
CN107590439A (en) * 2017-08-18 2018-01-16 湖南文理学院 Target person identification method for tracing and device based on monitor video
CN113395761A (en) * 2020-03-11 2021-09-14 深圳光启超材料技术有限公司 Target positioning method and system
CN111601254A (en) * 2020-04-16 2020-08-28 深圳市优必选科技股份有限公司 Target tracking method and device, storage medium and intelligent equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117440512A (en) * 2023-12-18 2024-01-23 泉州医学高等专科学校 Personnel positioning system based on wireless communication network
CN117440512B (en) * 2023-12-18 2024-03-05 泉州医学高等专科学校 Personnel positioning system based on wireless communication network

Also Published As

Publication number Publication date
CN117082457B (en) 2024-04-02

Similar Documents

Publication Publication Date Title
US8023959B2 (en) Method and system for personal area networks
CN114189807B (en) Aggregation crowd tracking system and method based on mobile phone positioning algorithm
Tippenhauer et al. Attacks on public WLAN-based positioning systems
AU2017376793B2 (en) System and method for detecting and locating contraband devices in a secure environment
CN105142215B (en) Method for various dimensions user location location Calculation
US7426383B2 (en) Wireless LAN intrusion detection based on location
CN117082457B (en) Personnel positioning management method and system for safety monitoring
EP3335482A1 (en) Generating and publishing validated location information
US7020476B2 (en) Wireless network security
US20110306370A1 (en) Receiver system, method for arranging the receiver system and positioning system comprising the receiver system
Tippenhauer et al. iPhone and iPod location spoofing: Attacks on public WLAN-based positioning systems
TW202207721A (en) Identification of an invalid reference device in device positioning
Chen et al. Secure localization against wormhole attacks using conflicting sets
Zhou et al. A passive indoor tracking scheme with geometrical formulation
US20230232362A1 (en) Technique for determining a location of a radio network node
Bhargava et al. Physical authentication through localization in wireless local area networks
CN114363798A (en) Device positioning
Restuccia et al. Preserving QoI in participatory sensing by tackling location-spoofing through mobile WiFi hotspots
Saracino et al. Practical location validation in participatory sensing through mobile wifi hotspots
Velasco et al. Challenges of location tracking techniques in wireless forensics
Korolkov et al. Received-signal-strength-based approach for detection and 2D indoor localization of evil twin rogue access point in 802.11
Bhargava et al. Physical Security Perimeters for Wireless Local Area Networks.
Miraoui et al. A large scale and low cost solution for real-time indoor localisation based on wireless sensor network
Restuccia et al. Practical location validation in participatory sensing through mobile WiFi hotspots
Khauphung et al. On robustness of centralized-based location determination using WSN

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant