Dom> Blog> Application field of wifi probe technology _ public security bureau wifi probe use

Application field of wifi probe technology _ public security bureau wifi probe use

October 07, 2022
WIFI probe overview

When one device sends information to another device through wireless transmission technology, other similar devices around it can receive wireless information. The WiFi probe technology is based on this principle. Specifically, when the WiFi device is within the listening range of the WiFi probe, when the WiFi device (whether a terminal, a router, or other WiFi device) transmits any frame, the probe can be intercepted regardless of the sender. And analyze some information of the MAC layer and the physical layer of the frame, such as the MAC address, frame type, and signal strength of the transmitting and receiving devices. The WiFi probe does not need to have any interaction with the surrounding devices, and does not emit any WiFi signal itself, that is, realizes the sensorless acquisition of MAC information.

Application field of wifi probe technology _ public security bureau wifi probe use

Network protocol used by WIFI probe

The network protocol used by the WIFI probe is the IEEE 802.11 protocol suite, which contains many sub-protocols. Among them, they are developed in chronological order, mainly:

(1) 802.11a

(2) 802.11b

(3) 802.11g

(4) 802.11n

In network communication, data is encapsulated into frames (a block of data in communication). Frames are fixed in the data link layer transmission, and can be transmitted without random packaging and packaging. The size is limited, the minimum is 46 bytes, and the maximum is 1500 bytes.

Application field of wifi probe technology _ public security bureau wifi probe use

Wifi probe technology application field

1. Statistics and analysis of real-time passenger flow, mastering offline population data, and providing valuable passenger flow data for merchants.

2. Use the detection data to interface with the user information to achieve offline marketing, such as crowd portraits.

3. Public safety business, engineering, etc., as a supplement to urban security.

4, employee attendance, employee tracking, etc., enterprise attendance data accurate attendance, WiFi probe can help implement, such as automatic punch.

5, VIP customer reminder, such as help offline shopping guide sales.

6, family care, family reminders, etc.

Application field of wifi probe technology _ public security bureau wifi probe use

Public Security Bureau wifi probe use product features:

1. Massive collection: Wi-Fi probes cover a wide range of coverage, and can collect MAC addresses in the range. At the same time, data is not restricted, and Mac addresses can be collected in large quantities.

2. Real-time data transmission: Wi-Fi probe can realize real-time data transmission, and monitoring data can be transmitted back in real time;

3. Identity matching: The MAC address is used as the unique identification code of the mobile phone, and can be matched with other data to achieve identity matching;

use:

Security warnings, regional hotspot maps, crowd trajectories, criminal detection, and flow monitoring.

Application field of wifi probe technology _ public security bureau wifi probe use

Business architecture

Skontaktuj się z nami

Author:

Ms. Zoe Zhong

Phone/WhatsApp:

+86 18617178558

Wszystkie produkty
You may also like
Related Categories

Wyślij je do tym dostawcy

Przedmiot:
Mobile Phone:
Email:
wiadomość:

Your message must be betwwen 20-8000 characters

Skontaktować

  • Tel: 86-186-17178558
  • Whatsapp: +86 18617178558
  • Email: sales07@ynxantenna.com
  • Adres: Room #101,201,301,5BLDG , No.4 of XinWuCun New Area ,Shabo community Maluan Street Pingshan District, Shenzhen ,Guangdong , China, Shenzhen, Guangdong China

Send Inquiry

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Wysłać