15

How to prove where you have been? Ministry of industry and information technology

category:Hot
 How to prove where you have been? Ministry of industry and information technology


In view of the current return to work tide and the behavior of concealing the itinerary in the floating population after the festival, Han Xia, director of the information and communication administration of the Ministry of industry and information technology, said at the ventilation meeting that three basic telecommunication enterprises provide users with their own 14 day visit inquiry service based on the analysis of big data of telecommunication under the authorization of users according to the needs of epidemic prevention and control. This service can help the relevant departments to improve the efficiency of itinerary inspection for floating personnel, conduct screening for key groups, implement precise prevention and control, especially help to resume work and production under the current situation.

The Ministry of industry and information technology has just issued a notice to co-ordinate the SMS query service provided by the three major operators on users itinerary. Each user sends a query code in his own SMS. With the authorization of the user, he can query where he has been in the previous 14 days, and the requirement is to stay for more than 4 hours. When the mobile phone users are asked about the itinerary, they can use this SMS to prove their itinerary to the employing unit, community management and other departments. I believe that journalists and friends also receive this reminder. Han Xia explains.

Han Xia said that the floating population refers to the overall data. We mainly analyze the population flowing out of Wuhan and Hubei to all parts of the country. For the confirmed, suspected and close contacts, we have established a linkage mechanism with the health care commission to analyze the flow based on the relevant data provided by them.

It is understood that novel coronavirus pneumonia has been playing an active role in tracing and monitoring the epidemic situation, supporting the epidemic situation and carrying out epidemic prevention and control since the outbreak of the new crown pneumonia epidemic situation: first, the comprehensive nature, the large scale of the telecom users, the wide coverage, and the large amount of data, such as the daily data generated by the existing public communication network, which are about 100 billion, and are on the Spring Festival holidays. In the case of high mobility, the data volume will be larger. Second, it is dynamic. Through the big data of telecommunications, we can make statistics and Analysis on the dynamic flow of personnel in key areas of the country, especially in Wuhan and Hubei, analyze and predict the dynamic flow of key populations such as confirmed, suspected patients and close contacts, and support the deployment of epidemic prevention and control. Third, it is real-time, which can collect, summarize and process telecommunication related data in real time, provide various data analysis results in time, and provide refined data support for epidemic prevention and control.

How accurate is the result of the mobility and distribution of the telecom big data analysis? Can big data be used to find patients and close contacts? In this regard, Liu duo, President of China Academy of information and communication, explained at the conference that the big data of telecommunications comes from the basic data in the public communication network, which can more accurately analyze the flow of people in all provinces and cities and key regions of the country, and generally analyze the flow and distribution of people at the county level. By combining the data of other departments such as health and epidemic prevention, we can further analyze and judge the distribution of key populations such as confirmed, suspected patients and close contacts.

At the same time, it should be noted that the above big data analysis will violate the privacy of users? What are the measures to protect personal information? Han Xia said that in order to implement the relevant decision-making and deployment of the Party Central Committee and the State Council, the Ministry of industry and information technology made full use of the basic data resources of telecommunications, gave full play to its technical advantages and supported the epidemic prevention and control work. According to the relevant provisions of the network security law, the emergency response law, the law on the prevention and control of infectious diseases, the regulations on the emergency response to public health emergencies, the notice of the office of the central network security and Information Technology Commission on the protection of personal information and the use of big data to support joint prevention and control, and in accordance with the requirements of the joint prevention and control mechanism of the State Council, the data are collected and analyzed for epidemic according to regulations Data related to situation prevention and control, and services support the needs of the competent health and Epidemic Prevention Department of the State Council and local governments. At the same time, in the process of analysis and use, according to the relevant laws and regulations of personal information protection, strictly implement the relevant measures of data security and personal information protection. First, from the perspective of upper application, statistical analysis is mainly carried out through big data technology to provide information such as personnel distribution, flow and regional early warning needed for epidemic prevention and control. These are statistical big data formed based on a large number of network signaling, not involving personal information of the general population. Second, from the perspective of bottom-level processing, we collect data according to the principle of minimization, and design data anti attack, anti leakage, anti stealing and other security protection technical means in data flow, use and other links, such as deployment of encryptor, leak scanning system, database audit system, etc., to ensure the safety of relevant data. Third, in terms of management, our department has organized and formulated strict management standards, strengthened personnel management and data classification management, made log records, and prevented data leakage, data abuse and other violations. Fourth, in terms of data use, our department provides relevant data according to the joint prevention and control mechanism and the needs of health prevention and control departments, and the data is only limited to the needs of epidemic prevention and control.