WO2022092497A1 - Système de fourniture d'informations de cas similaires et procédé associé - Google Patents
Système de fourniture d'informations de cas similaires et procédé associé Download PDFInfo
- Publication number
- WO2022092497A1 WO2022092497A1 PCT/KR2021/009858 KR2021009858W WO2022092497A1 WO 2022092497 A1 WO2022092497 A1 WO 2022092497A1 KR 2021009858 W KR2021009858 W KR 2021009858W WO 2022092497 A1 WO2022092497 A1 WO 2022092497A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- criminal
- similar
- person
- event
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/33—Querying
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/33—Querying
- G06F16/332—Query formulation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/33—Querying
- G06F16/338—Presentation of query results
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/103—Formatting, i.e. changing of presentation of documents
- G06F40/117—Tagging; Marking up; Designating a block; Setting of attributes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/279—Recognition of textual entities
- G06F40/289—Phrasal analysis, e.g. finite state techniques or chunking
- G06F40/295—Named entity recognition
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
Definitions
- the present invention relates to a similar case information providing system and method, and more particularly, by combining main characteristic information of a person and an incident using a security information data bank and a criminal person knowledge network, search for similar cases and provide the information It relates to a similar event information providing system and method therefor.
- the present invention is to provide similar case information and related data to investigative personnel by searching for similar cases based on case and person.
- the similar incident information providing system to solve the above problems includes an integrated security information data bank and a criminal person knowledge network, and the criminal person knowledge network identifies and extracts criminal suspects from unstructured documents and structured data a criminal suspect candidate extraction module; a criminal character inference module for inferring the criminal suspect as a criminal through learning of the criminal suspect extracted from the criminal suspect candidate extraction module; a criminal name classification module in the document for creating a node candidate list by integrating the criminal name inferred from the criminal person inference module and the criminal name extracted from the security information data bank; Create a human node with the names of criminals extracted from the criminal name classification module and related names extracted from the security information data bank, and reanalyze and reconstruct the case contents through the past criminal record information of the persons and the information related to similar cases.
- a similar incident information providing service method using a similar incident information providing system includes the steps of: inputting information related to a case currently under investigation; deriving main characteristics by analyzing cases and people in the criminal person knowledge network; It characterized in that it comprises the steps of searching for similar incidents in the integrated security information data bank by utilizing the derived main characteristics and providing information related to similar incidents to the user.
- the step of deriving the main features based on the event may include: performing natural language processing analysis on the received information; It is characterized in that it comprises the steps of extracting the main keywords related to the event, and performing entity name recognition and tagging.
- the step of deriving the main characteristics centered on the person may include: performing natural language processing analysis on the received information; It characterized in that it comprises the steps of performing tagging by extracting the life candidate related to the case and by classifying the position in the document for the human name.
- the step of searching for similar events may include combining main characteristics and information centered on the event and person; retrieving past criminal records of major persons including the suspect; It characterized in that it comprises the steps of searching for an incident similar to the case input from the search result and the security information data bank, and storing the search result in the similar case information list.
- obtaining additional case and person information related to the case input from the criminal person knowledge network It is characterized in that it further comprises a similar incident expansion search step comprising the step of re-searching the similar incident in the integrated security information data bank by adding additional information and adding the additionally confirmed information to the similar incident information list.
- the step of providing similar event-related information includes providing a list of similar event information searched for based on the event information input by the user and providing a visualization function for the convenience of identifying similarities with the inputted event. characterized in that
- similar incident information can be provided quickly and accurately from the security information data bank by automating the similar incident search system.
- FIG. 1 is a conceptual diagram illustrating a similar event information providing system according to an embodiment of the present invention.
- FIG. 2 is a block diagram of a criminal person knowledge network according to an embodiment of the present invention.
- FIG. 3 is a flowchart of a service method using a similar event information providing system according to another embodiment of the present invention.
- FIG. 5 is a flowchart of a step of deriving a main characteristic centering on a person.
- 6 is a flowchart of the steps of searching for similar events.
- the present invention provides three-dimensional information by searching for similar incidents using various big data analysis techniques and search techniques based on an integrated security information data bank and a criminal person knowledge network.
- FIG. 1 is a conceptual diagram illustrating a similar incident information providing system according to an embodiment of the present invention.
- incident information is input based on the integrated public security information data bank 200 and the criminal person knowledge network 100, it is a person-centered and event-centered It provides a visualization method that can identify similarities and lists of similar events by extracting key features and searching for similar events.
- the integrated security information data bank is data collected from various security information systems managed by the National police Agency across the country, and the criminal person knowledge network creates a life node with criminals and their related persons extracted from the integrated security information data bank. It is a system that provides three-dimensional information related to a suspect through information related to past criminal records and similar incidents.
- Figure 2 is a criminal person inference inferred as a criminal through the configuration book of the criminal person knowledge network, a criminal name candidate extraction module 10 that identifies and extracts criminal suspects from unstructured documents and structured data, and the extracted criminal suspects
- the module 20 the integrated security information data bank 200 and the criminal name classification module 30 in the document for tagging the criminal and their related persons extracted from the biography dictionary and creating a node candidate list, the integrated security information data bank and the criminal name
- a knowledge network construction module that creates a human node with criminals and their related people extracted from the extraction module, and re-analyses and reconstructs the case contents through information related to past criminal records and similar cases to build a criminal knowledge network (40) and an information support module 50 that supports the criminal person knowledge network information to the user.
- the atypical document of the candidate extraction module 10 includes investigation data, 112 report data, and a report.
- the extraction target of the present invention may include semi-structured and structured documents, including unstructured documents.
- Data is divided into structured, semi-structured, and unstructured data according to the degree of standardization.
- Structured data refers to data stored in a fixed field with a certain format, for example, data stored in DB or Excel
- semi-structured data is a fixed field.
- metadata or schema such as XML or HTML.
- the unstructured documents and structured data are analyzed through natural language processing technology, and criminal name candidates are extracted by referring to a pre-established biographical dictionary to create a list.
- Natural language processing technology is one of the fields of automation technology in which machine learning (deep learning) is added to artificial intelligence technology. It is a calculation technique to automate human language analysis and expression.
- a nominative investigation means an investigation that points to the subject of an action, such as ' ⁇ goes', ⁇ is, or ⁇ in(heard). It is more likely to be placed on the root node, which is the central node of the human node.
- the actor-subject mark is an element that distinguishes which character is the actor and the subject through morphological analysis.
- the criminal character inference module 20 is a module for inferring a criminal suspect as a criminal through learning the location information of a specific suspect and age, gender, complex, language habits, etc., in order to generate an inference module with high probability You may need the advice of a profiler (criminal psychoanalyst).
- the criminal name classification module 30 in the document performs the task of tagging the criminal persons extracted from the integrated security information data bank 200 and the biographical dictionary and their related persons, and creating a node candidate list.
- the integrated security information data bank is big data of security information managed by the National police Agency. It is used for case resolution or prediction and automatically builds a life dictionary, which is one of the main elements of integrated security information management. It is one of the public services that collects suspect information from various angles and provides information to users so that security information existing in other systems can be used as related information.
- the location where the suspect's name appears in the document and the surrounding words appearing with the suspect are extracted and trained in the classification model.
- the people appearing in the new input document are classified into suspects and people around them, and what kind of relationship the people around them have with the suspect is automatically analyzed.
- the input documents are atypical documents such as police reports or case documents, but they are highly structured documents with a high probability of being structured to a certain extent. It is possible to automatically classify and tag the positions or roles that the persons extracted by learning with the document have in the document.
- the system for verifying the correct rate of the classification model is included in the criminal name classification module 30, it is frequently tested whether the correct rate of the classification model is higher than or equal to the reference value, and if it is less than the standard, the process of re-learning is repeated until it becomes higher than the standard value.
- the standard correct answer rate can also be set through expert advice.
- the standard probability value after expert advice is applied in the tagging process for criminals and related persons. That is, the suspects are classified in the order of highest probability, and those with probability values greater than or equal to the standard are tagged with their respective statuses, and those with lower than the standard are tagged with other classifications. It is desirable to allow the user to view and edit all status tags.
- the knowledge network building module 40 creates a human node with the criminals and their related persons extracted from the integrated security information data bank and the criminal name extraction module, and the case contents through past criminal record information and correlation information with similar cases Reanalyze and reconstruct the criminal character knowledge network.
- each human information is noded through the human name information list for the integrated security information data bank, which is the security information big data managed by the National police Agency, and the criminal name candidates constructed by extracting and constructing natural language processing technology from unstructured and structured data. It specifies the relationship between human nodes through the status classification tag in the document.
- the process first creates a root node using the suspect information, and personal information other than the suspect is created and stored as a subnode of the root node according to the relationship with the root node, and the relationship between the nodes is indicated by using the status tag in the document.
- the root node is the central node in the criminal knowledge network, and is the first node to be created and a suspect candidate.
- a node corresponds to a point in a graph of a tree structure consisting of points and lines.
- the highest node is called a root node and the lowest node is called a leaf.
- a data communication network it is one or more functional units connected to a data transmission path and mainly refers to a branch point of a communication network or an access point of a terminal.
- a node is mapped with personal information such as a suspect, an accomplice, a victim or a reporter, and a line indicates a relationship between them.
- Building a criminal knowledge network is to search for the suspect's past criminal record information in the integrated security information data bank, analyze the information, collect relevant information, reconstruct the data according to the schema based on the six-fourth principle, and store it in the criminal name node. .
- the criminal person knowledge network is constructed by extracting basic information from the documents input by the user to compose basic information about the suspect, and for insufficient matters, supplementary data is obtained from the data bank and basic information is prepared; As basic suspect information, if the suspect's past criminal record exists as a result of the data bank search, the record is analyzed and the original document for the case is generated as a past incident node; Creates human nodes of past events as sub-nodes of past event nodes, summarizes event contents according to schema based on the six-fold principle, for example, person, time, place, event, motive, method, etc.
- TF-IDF Term Frequency-Inverse Document Frequency
- the information support module 50 provides a user with a choice between selecting a suspect's name and selecting a person with the same name to the user, and provides a criminal information support service for the target selected by the user.
- the information support module provides a visualization of all the contents analyzed by the system or the criminal person knowledge network narrowed by the user through an intermediate option, and displays the contents summarized in the six-fold principle when clicking on a past case or similar case or view the original text
- clicking each node such as displaying the original text
- the detailed information connected to it is displayed, and items with a high degree of similarity to the root suspect are expressed by using different colors or line thickness to allow the user to track the content related to the suspect.
- It supports easy access establishes a criminal person knowledge network that expands by connecting people related to the case, such as accomplices, witnesses, and victims, with the suspect information as the central node, and manages so that users can modify the criminal person knowledge network providing tools, etc.
- the visualization service in the information support module provides a visualization tool using a web browser or VR (virtual reality) based on the criminal person knowledge network.
- the web browser visualizes the collection status and statistical information according to the monitoring results with various charts and graphs, and configures the web to provide services.
- VR uses 3D or augmented reality development tools such as Unity to virtualize monitoring results and reflects them on the implemented virtual space engine.
- the user provides visualization services such as various charts and graphs for the collection status and statistical information according to monitoring results through interworking with VR devices, and provides related data search results through actions such as clicking and moving data in the form of nodes and networks do.
- a service method using a similar case information providing system including an integrated security information data bank and a criminal person knowledge network includes the steps of inputting information related to a case currently under investigation, as shown in FIG. It includes the steps of deriving main characteristics by analyzing the case and the person, using the derived main characteristics to search for similar incidents in the integrated security information data bank, and providing users with similar incident-related information.
- the steps of deriving the main characteristics centering on the event are as shown in FIG. 4, and the steps of performing natural language processing analysis on the received information, extracting major keywords related to the event, and performing entity name recognition and tagging are performed.
- the steps of deriving the main characteristics centering on the person are as shown in FIG. 5, and the step of performing natural language processing analysis on the input information, the step of extracting the human candidate related to the event, and the classification and tagging of the status of the person in the document It includes the step of performing
- the human candidate extraction extracts the surrounding vocabulary of the human candidate by processing natural language processing whether the nominative investigation is combined and whether the actor and the subject are marked, and checks whether the human candidate is really a human name.
- the position with the highest probability value is tagged as the person's position, and when the probability value is less than the standard value, other classification is tagged.
- the tagging of a status is viewable and editable by the user.
- the step of searching for a similar case is as shown in FIG. 6, a step of searching for a similar event in the security information data bank based on the extracted main characteristics and information, a step of combining the main characteristics and information centered on the case and person, and the main person (suspect etc.), searching for a similar case to the case input from the search result and the security information data bank, and storing the search result in a similar case information list.
- Similar event search uses a similarity analysis algorithm such as TF-IDF.
- the similar case expansion search step includes the steps of acquiring additional case and person information related to the case input from the criminal person knowledge network, the step of re-searching the similar case in the integrated security information data bank by adding additional information, and comparing the additionally confirmed information. adding to the event information list.
- the step of providing similar event-related information includes providing a list of similar event information searched based on the event information input by the user, and providing a visualization function for the convenience of identifying similarities with the inputted event. .
- the visualization function can highlight the main characteristic information extracted for the search for similar events in the search result, or provide it with a web browser or VR.
- Candidate extraction module 20 criminal character inference module
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Computational Linguistics (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Tourism & Hospitality (AREA)
- General Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Marketing (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Artificial Intelligence (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Entrepreneurship & Innovation (AREA)
- Educational Administration (AREA)
- Mathematical Physics (AREA)
- Primary Health Care (AREA)
- Development Economics (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Un système pour fournir des informations de cas similaires, selon la présente invention, comprend une banque de données d'informations de sécurité intégrée et un réseau de connaissances en matière de criminalité, recherche des cas similaires en combinant des informations de caractéristiques principales de personnes et de cas, et fournit des informations de cas similaires.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR20200142424 | 2020-10-29 | ||
| KR10-2020-0142424 | 2020-10-29 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2022092497A1 true WO2022092497A1 (fr) | 2022-05-05 |
Family
ID=81382838
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/KR2021/009858 Ceased WO2022092497A1 (fr) | 2020-10-29 | 2021-07-29 | Système de fourniture d'informations de cas similaires et procédé associé |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2022092497A1 (fr) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN117391877A (zh) * | 2023-12-07 | 2024-01-12 | 武汉大千信息技术有限公司 | 一种快速生成可疑人员关系网的方法 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20150020428A (ko) * | 2013-08-14 | 2015-02-26 | 한국과학기술연구원 | 사회적 관계 특징을 이용한 콘텐츠 수집장치 및 방법 |
| KR20160123101A (ko) * | 2015-04-15 | 2016-10-25 | (주)엔텔스 | 특정 범죄자의 범죄 유형 분류 방법 및 시스템 |
| KR20200067654A (ko) * | 2018-12-04 | 2020-06-12 | 한국전자통신연구원 | 실종사고 초동대응 시스템 및 그 동작 방법 |
-
2021
- 2021-07-29 WO PCT/KR2021/009858 patent/WO2022092497A1/fr not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20150020428A (ko) * | 2013-08-14 | 2015-02-26 | 한국과학기술연구원 | 사회적 관계 특징을 이용한 콘텐츠 수집장치 및 방법 |
| KR20160123101A (ko) * | 2015-04-15 | 2016-10-25 | (주)엔텔스 | 특정 범죄자의 범죄 유형 분류 방법 및 시스템 |
| KR20200067654A (ko) * | 2018-12-04 | 2020-06-12 | 한국전자통신연구원 | 실종사고 초동대응 시스템 및 그 동작 방법 |
Non-Patent Citations (2)
| Title |
|---|
| CHUNG, TAE JIN: "Countermeasure strategy for the international crime and terrorism by use of SNA and Big data analysis", CONVERGENCE SECURITY JOURNAL, vol. 16, no. 2, 30 March 2016 (2016-03-30), pages 25 - 34, XP055925994, ISSN: 1598-7329 * |
| LEE, SEONGYONG: "Weekly ICT Trends. IITP. Issue 1902", WEEKLY ICT TRENDS. IITP, no. 1902, 26 June 2019 (2019-06-26), Korea , pages 1 - 44, XP009536540, ISSN: 1225-6447 * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN117391877A (zh) * | 2023-12-07 | 2024-01-12 | 武汉大千信息技术有限公司 | 一种快速生成可疑人员关系网的方法 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Al-Sarem et al. | Deep learning-based rumor detection on microblogging platforms: a systematic review | |
| CN117708746B (zh) | 一种基于多模态数据融合的风险预测方法 | |
| Ratkiewicz et al. | Truthy: mapping the spread of astroturf in microblog streams | |
| Kruspe et al. | Detection of actionable tweets in crisis events | |
| Ghahremanlou et al. | Geotagging twitter messages in crisis management | |
| CN105512316B (zh) | 一种结合移动终端的知识服务系统 | |
| Khatoon et al. | Development of social media analytics system for emergency event detection and crisismanagement | |
| CN113742496B (zh) | 一种基于异构资源融合的电力知识学习系统及方法 | |
| Kruspe et al. | Detection of informative tweets in crisis events | |
| CN119903159A (zh) | 一种基于人工智能的知识问答快速处理系统 | |
| CN104834739B (zh) | 互联网信息存储系统 | |
| KR102228873B1 (ko) | 치안정보를 활용한 범죄인물 지식망 구축 시스템 및 그 방법 | |
| CN113015171A (zh) | 一种具有网络舆情监控及分析功能的系统 | |
| CN118194133A (zh) | 一种基于知识图谱的网络赌博团伙分析方法 | |
| CN115632839B (zh) | 一种智慧校园环境网络监管方法和系统 | |
| WO2022092497A1 (fr) | Système de fourniture d'informations de cas similaires et procédé associé | |
| Diaz et al. | Classifying Twitter users for disaster response: A highly multimodal or simple approach? | |
| Schwarz et al. | Ai-enhanced disaster management: A modular osint system for rapid automated reporting | |
| CN119967457A (zh) | 信令分析方法、系统、电子设备及存储介质 | |
| CN120705362A (zh) | 基于大模型的多模态异构知识融合构建与语义增强检索系统 | |
| US11475222B2 (en) | Automatically extending a domain taxonomy to the level of granularity present in glossaries in documents | |
| CN115296892B (zh) | 数据信息服务系统 | |
| CN106777124B (zh) | 语义认知方法、装置及系统 | |
| Camilleri et al. | Investigating the relationship between earthquakes and online news | |
| Diallo et al. | Process of building a vocabulary for the infection domain |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21886496 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 21886496 Country of ref document: EP Kind code of ref document: A1 |