[Explanation] Have you been to a key epidemic area or country within 14 days? How do you prove your schedule? A few days ago, the "Communication Big Data Itinerary Card" mini program (hereinafter referred to as the "Itinerary Card") launched by the China Academy of Information and Communication Technology, China Telecom, China Mobile and China Unicom was officially launched, providing itinerary inquiry and consultation services for 1.6 billion mobile phone users nationwide for free. Proof service. After the user enters his mobile phone number and verification code, the "trip card" will display the country where the user stayed in the previous 14 days and the domestic city that stayed for more than 4 hours, and display the red, yellow, and green color of the trip card according to the itinerary.

[Explanation] On March 8th, Jiang Chunyu, the person in charge of the "Communication Big Data Itinerary Card", introduced in an interview that the "Itinerary Card" is a service upgrade for querying itineraries through SMS before this.

[Same Period] Jiang Chunyu, Deputy Director of Big Data and Blockchain Department, Yunda Institute, China Academy of Information and Communications Technology

We found that the demand for resumption of production and production is very urgent. The three major operators have already provided such a method of SMS verification on February 13. However, we found that the entire query interface of SMS was scattered and the data caliber was not too great. Unity cannot meet some of the needs of society too efficiently. So in this context, we have launched a service called "trip card".

[Explanation] Jiang Chunyu said that the "trip card" obtains and analyzes the mobile phone signaling data through the base station location of the user's mobile phone, which has high authenticity and accuracy. It can assist employers to carry out fast and effective itinerary inspection of mobile personnel.

[Same Period] Jiang Chunyu, Deputy Director of Big Data and Blockchain Department, Yunda Institute, China Academy of Information and Communications Technology

We are now encountering a lot of needs for docking. With the management of the park, there may be tens of thousands of people in some large parks. There are also some traffic and travel types, such as some drivers of freight, because freight drivers often have to travel to many places, and when they manage these freight drivers, this also provides a trip certificate. There are many scenes such as shopping malls, hotels, and so on.

[Explanation] In addition, Jiang Chunyu said that with its comprehensive, dynamic, and real-time characteristics, communication big data can not only support enterprises in the management of return to work and production, but also play a role in the prevention and control of epidemic situations such as screening close contacts.

[Same Period] Jiang Chunyu, Deputy Director of Big Data and Blockchain Department, Yunda Institute, China Academy of Information and Communications Technology

There are actually many links in the prevention and control of the epidemic situation, some of which are high-risk, so I think the base station data of telecommunication operators and the data of such behavior trajectories can play a great role. Telecommunication (communication) data can be used to find close contacts and find some of their trajectories, or directly help the grassroots community to find where these close contacts are located, avoiding manual investigation.

[Explanation] Regarding the personal information security issues that users are concerned about, Jiang Chunyu said that the "trip card" will confirm my authorization and there is no need to fill in other personal information besides the mobile phone number to fully protect user privacy. As the application scope of communication big data in the prevention and control of this epidemic gradually expands, Jiang Chunyu believes that enterprises should seek a balance between data utilization and user privacy, and tap the value of data in compliance with laws and regulations.

[Same Period] Jiang Chunyu, Deputy Director of Big Data and Blockchain Department, Yunda Institute, China Academy of Information and Communications Technology

You can also see that our service is for individual users to query, and users check their own data, then it has an authorization agreement, and there is also a process of user text message verification. And we don't keep user data in this process. For enterprises, they should comply with some data management and data security regulations issued by the state. There are some good best practices in data collection, data use, and data sharing.

Cheng Yu reports from Beijing

Editor-in-chief: [Li Yuxin]