CN112116175A - Security management method based on Internet of things - Google Patents

Security management method based on Internet of things Download PDF

Info

Publication number
CN112116175A
CN112116175A CN201910529046.5A CN201910529046A CN112116175A CN 112116175 A CN112116175 A CN 112116175A CN 201910529046 A CN201910529046 A CN 201910529046A CN 112116175 A CN112116175 A CN 112116175A
Authority
CN
China
Prior art keywords
security
safety
responsibility
person
responsible
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910529046.5A
Other languages
Chinese (zh)
Inventor
傅建斌
刘勃
贺伟东
杨杰
胡鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Petroleum and Chemical Corp
Sinopec Qingdao Safety Engineering Institute
Original Assignee
China Petroleum and Chemical Corp
Sinopec Qingdao Safety Engineering Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Petroleum and Chemical Corp, Sinopec Qingdao Safety Engineering Institute filed Critical China Petroleum and Chemical Corp
Priority to CN201910529046.5A priority Critical patent/CN112116175A/en
Publication of CN112116175A publication Critical patent/CN112116175A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Educational Administration (AREA)
  • Tourism & Hospitality (AREA)
  • Databases & Information Systems (AREA)
  • Development Economics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Game Theory and Decision Science (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a safety management method based on the Internet of things, and relates to the field of enterprise safety production management. The autonomous safety responsibility management method comprises an operation management method and an equipment facility management method, wherein the operation management method comprises the steps of setting a block chain and a creation block, setting processing steps according to an operation rule, and setting a safety responsible person for each step; storing the fingerprint information of each level of safety responsible person in the corresponding safety responsible node respectively for identity verification; after the operation begins, the primary safety person A1Processing according to the operation rules and steps; person of safety accountability A2Through responsible node a2After the operation information is received, the fingerprint information and the 'receiving confirmation' instruction are uploaded, and then the information is spread. An autonomous informatization management mode aiming at the implementation of the safety production responsibility is established in the safety responsibility management method, and the effective implementation of the safety production responsibility is realized through full-flow informatization.

Description

Security management method based on Internet of things
Technical Field
The invention relates to the field of enterprise safety production management, in particular to a safety management method based on the Internet of things.
Background
The internet of things is a network technology which is extended and expanded on the basis of the internet technology, is primarily applied to the fields of production process management, equipment asset management, personnel management, safety management and the like in the petroleum and petrochemical industry at present, achieves a good effect, improves the real-time monitoring and dynamic management capacity of the petroleum industry, and improves the cooperation level of a petroleum and petrochemical industry chain. In the process of managing the internet of things, people are the management subject of things, the efficiency or effect of managing the internet of things is determined by the quality of management, and the key of managing is the safety responsibility of people.
At present, the determination of safety responsibility is mainly determined by the requirements of laws and regulations, and cannot be judged by utilizing big data, or a third party notarization is needed in the management process, so that the management cost is too high or the process is too complex, and effective regulatory management is difficult to realize. Therefore, how to realize the automatic judgment of the safety responsible party by automatically collecting the relevant safety responsible data in the management process and realize the safety certification which cannot be repudiated and has low cost by the block chain management is a key problem to be solved. The system combines automatic responsibility tracing, block chain and personnel-related fingerprint information authentication technologies, can be used for building an autonomous informatization management mode aiming at implementation of safety production responsibility, and realizes effective implementation of the safety production responsibility through full-process informatization.
Disclosure of Invention
The invention aims to provide a safety management method based on the Internet of things, which is implemented based on the Internet of things, and has better management effect of safety responsibility.
In order to achieve the purpose, the invention adopts the technical scheme that:
a safety management method based on the Internet of things integrates a block chain and a personnel related fingerprint information authentication technology and is used for improving safety management.
Preferably, the management method is applied to safety responsibility management, and the safety production responsibility is effectively implemented by constructing an autonomous informatization management mode aiming at the implementation of the safety production responsibility and performing full-flow informatization.
Preferably, the autonomous informatization management mode comprises an operation management method and an equipment facility management method.
Preferably, the operation management method includes the steps of:
step 11, setting a block chain and a creation block, wherein the block chain is started from the creation block;
step 12, setting processing steps according to the operation rules, and setting safety responsible persons and safety responsible nodes of different levels for each step;
step 13, respectively storing each safety responsible person in the corresponding safety responsible node for verifying the identity;
step 14, after the operation is started, the safety responsible person processes the safety responsibility information according to the operation rules and steps;
step 15, the safety responsible person on the safety responsible node carries out identity verification, if the verification is passed, the event is broadcasted, and the broadcasting object is the next responsible node;
step 16, the next responsible node receives the information and verifies the information, and after the verification is finished, the safety responsible person on the next node needs to process the task;
and step 17, broadcasting to the next safety responsibility node, and performing safety responsibility transmission and operation step processing according to step 16 until the operation is completed.
Preferably, the security principal comprises an initial security principal A1Person of security accountant A2Person of security accountant A3… … security responsible persons An, each responsible person corresponding to a security responsible node of a blockchain.
Preferably, the security responsibility nodes are initial security responsibility nodes a respectively1Safety responsibility node a2Safety responsibility node a3、……、anAnd each step corresponds to one safety responsibility node.
Preferably, the information processed by the security responsibility information in step 14 includes fingerprint information, operation information, and information to be processed.
Preferably, the responsible person is set by the post security responsibility, one or two security responsibility nodes of the same level are shared by one or two other block chains.
Preferably, the responsible person is set by post security responsibility, the security responsibility nodes of the same level are multiple, and the multiple security responsibility nodes are shared by another multiple other block chains.
Preferably, the equipment facility management method includes the steps of:
step 31, creating a block chain and a starting block, starting the block chain from the starting block and establishing a facility security responsibility table;
step 32, inputting the fingerprint information of the person in safety responsibility into the block chain, and constructing a fingerprint information base of the person in safety responsibility;
step 33, setting a unique facility ID for the facility, and recording the facility ID and the safety accountant thereof into a facility safety responsibility table;
step 34, when the facility is transferred, the block link points collect the fingerprint information of the new safety responsible person and the old safety responsible person and broadcast the fingerprint information;
step 35, comparing the acquired fingerprint information with the information in the information base, if the fingerprint information is consistent with the information in the information base, allowing facility transfer through verification, generating a facility safety responsibility transfer data packet, and broadcasting the data packet;
and step 36, updating the facility safety responsibility table after the broadcasting is finished.
Preferably, the items of the facility safety responsibility table in step 31 include a facility ID, a safety responsibility person and a safety responsibility name.
Preferably, in the step 32, a sub-security responsibility table and a sub-security responsibility person are established, and the security responsibility person records the security information of the sub-security responsibility person.
Preferably, the security information of the sub security responsible person includes fingerprint information, telephone information and mailbox information, and the security responsible person enters the fingerprint information of the sub security responsible person into the block chain and constructs a sub security responsible person fingerprint information base responsible by the security responsible person.
Preferably, when the security responsible person performs the security responsibility transfer to the child security responsible person according to the methods in step 34 and step 35, the security responsibility transfer object of the child security responsible person is the responsible security responsible person and the child security responsible person in the fingerprint information base of the same child security responsible person.
Preferably, in a certain facility in the facility security responsibility table in the step 31, a facility transfer right is set, and when the new security responsible person satisfies the transfer right, the facility transfer is allowed.
Preferably, the facility transfer authority includes a specific security accountant, a number of security accountants or a transfer time zone.
Preferably, the information of the facility security responsibility transfer data packet in the step 35 includes a facility ID, fingerprint information of the old security responsible person, fingerprint information of the new security responsible person and a security responsibility name.
The invention has the beneficial effects that:
the invention provides a security management method based on the Internet of things, which realizes automatic judgment of responsible parties by automatically collecting related security responsibility data in the Internet of things management process. Meanwhile, the safety certification which cannot be repudiated and has low cost is realized through block chain management. Automatic tracing, block chain and fingerprint authentication technologies are combined, an autonomous informatization management mode aiming at safety production responsibility is established, and effective execution and optimization of a regulation system are realized through whole-process informatization. The safety management method of the invention defines the safety responsibility chain and the safety responsibility person during the process operation, defines the safety responsibility person and the safety responsibility management of the equipment, and can realize the autonomy mechanism of the safety management in the management process.
Drawings
In order to clearly illustrate the embodiments or technical solutions of the present invention in the prior art, the drawings used in the description of the embodiments or prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
Fig. 1 is a process diagram of a security management method based on the internet of things.
Fig. 2 is a block diagram illustrating a process of managing a storage tank in a petrochemical enterprise.
Fig. 3 is a block diagram of a process of managing a chemical transportation vehicle of a petrochemical enterprise.
Fig. 4 is a block diagram of a fire safety responsibility management process.
Fig. 5 is a block diagram of a process for managing cement tanker vehicles in a construction enterprise.
Fig. 6 is a block diagram of a process for managing a logistics enterprise container vehicle.
Detailed Description
The invention is described in detail below with reference to the accompanying drawings:
a safety management method based on the Internet of things integrates a block chain and a personnel related fingerprint information authentication technology and is used for improving safety management. The management method is applied to safety responsibility management, and the effective implementation of the safety production responsibility is realized by constructing an autonomous informatization management mode aiming at the implementation of the safety production responsibility and performing full-flow informatization.
The autonomous informatization management mode includes an operation management method and an equipment facility management method. The operation management method comprises the following steps:
step 11, setting a block chain and a creation block, wherein the block chain is started from the creation block;
step 12, setting processing steps according to the operation rules, and setting safety responsible persons and safety responsible nodes of different levels for each step;
step 13, respectively storing each safety responsible person in the corresponding safety responsible node for verifying the identity;
step 14, after the operation is started, the safety responsible person processes the safety responsibility information according to the operation rules and steps;
step 15, the safety responsible person on the safety responsible node carries out identity verification, if the verification is passed, the event is broadcasted, and the broadcasting object is the next responsible node;
step 16, the next responsible node receives the information and verifies the information, and after the verification is finished, the safety responsible person on the next node needs to process the task;
and step 17, broadcasting to the next safety responsibility node, and performing safety responsibility transmission and operation step processing according to step 16 until the operation is completed.
The security principal includes an initial security principal A1Person of security accountant A2Person of security accountant A3… … security responsible persons An, each responsible person corresponding to a security responsible node of a blockchain.
The safety responsibility nodes are respectively initial safety responsibility nodes a1Safety responsibility node a2Safety responsibility node a3、……、anAnd each step corresponds to one safety responsibility node.
The information processed by the security responsibility information in step 14 includes fingerprint information, operation information, and information to be processed.
The responsible person is set by the post security responsibility, one or two security responsibility nodes of the same level are shared by one or two other block chains.
The responsible person is set by the post security responsibility, the security responsibility nodes of the same level are a plurality of, and a plurality of security responsibility nodes are shared by another plurality of other block chains.
The equipment facility management method comprises the following steps:
step 31, creating a block chain and a starting block, starting the block chain from the starting block and establishing a facility security responsibility table;
step 32, inputting the fingerprint information of the person in safety responsibility into the block chain, and constructing a fingerprint information base of the person in safety responsibility;
step 33, setting a unique facility ID for the facility, and recording the facility ID and the safety accountant thereof into a facility safety responsibility table;
step 34, when the facility is transferred, the block link points collect the fingerprint information of the new safety responsible person and the old safety responsible person and broadcast the fingerprint information;
step 35, comparing the acquired fingerprint information with the information in the information base, if the fingerprint information is consistent with the information in the information base, allowing facility transfer through verification, generating a facility safety responsibility transfer data packet, and broadcasting the data packet;
and step 36, updating the facility safety responsibility table after the broadcasting is finished.
The items of the facility safety responsibility table in step 31 include a facility ID, a safety responsibility person, and a safety responsibility name.
In the step 32, a sub-safety responsibility table and a sub-safety responsible person are established, and the safety responsible person inputs the safety information of the sub-safety responsible person.
The safety information of the sub safety accountant comprises fingerprint information, telephone information and mailbox information, the safety accountant inputs the fingerprint information of the sub safety accountant into the block chain, and a sub safety accountant fingerprint information base which is responsible for the safety accountant is constructed.
When the safety responsibility person performs the safety responsibility transfer to the sub-safety responsibility person according to the methods described in step 34 and step 35, the range of the safety responsibility transfer object of the sub-safety responsibility person is the responsible safety responsibility person and the sub-safety responsibility persons in the fingerprint information base of the same sub-safety responsibility person.
In a certain facility in the facility security responsibility table in step 31, a facility transfer right is set, and when the new security responsible person satisfies the transfer right, the facility transfer is allowed.
The facility transfer authority includes a specific security accountant, the number of security accountants, or a transfer time zone.
The information of the facility security responsibility transfer data packet in step 35 includes the facility ID, the fingerprint information of the old security responsible person, the fingerprint information of the new security responsible person, and the security responsibility name.
Example 1
With reference to fig. 1, an autonomous safety responsibility management method for a petrochemical enterprise based on the internet of things includes an operation management method and an equipment facility management method, where the operation management method includes the following steps:
a block chain and a creation block are set in a petrochemical enterprise, and the block chain is started from the creation block. Setting processing steps in a block chain and a creation block in a petrochemical enterprise according to operation rules, and setting a safety responsible person for each step, including an initial safety responsible person A1Person of security accountant A2Person of security accountant A3… … security responsible persons An, each responsible person corresponds to a security responsible node of the block chain, which is the initial security responsible node a1Safety responsibility node a2Safety responsibility node a3、……、anAnd each step corresponds to one safety responsibility node.
Person A responsible for initial security1Person of security accountant A2Person of security accountant A3… … person A in securitynThe fingerprint information of the security responsibility node is respectively stored in the corresponding security responsibility nodes for identity verification. After the operation starts, the person A with initial security responsibility1Processing according to the operation rules and steps; the processed content comprises the fingerprint information and operation information and information to be processed which are uploaded to the initial security responsibility node a1
Initial security responsibility node a1For the initial security person A1And performing identity authentication, and broadcasting the event if the authentication is passed, wherein the broadcasting object is the next responsible node.
Person of safety accountability A2Through a security responsibility node a2After receiving the operation information, uploading fingerprint information and a 'receiving confirmation' instruction; safety responsibility node a2To the person of security blame A2After the identity verification is passed, primary security responsibility transmission is completed; person of safety accountability A2According to the operation procedures and the set steps, processing is carried out, and the processing content comprises uploading operation information and information to be processed to the safety responsibility node a2. Broadcast to the next security responsibility node, and then carry out security responsibility transmission and operation step processing until the operation is completed. The responsible person is set by the post security responsibility, one or more security responsibility nodes at the same level are provided, and one or more security responsibility nodes are shared by one or more other block chains.
Example 2
Referring to fig. 2, a method for managing a storage tank in a petrochemical enterprise includes the steps of:
when the block chain is started from the creation block, a facility safety responsibility table of the oil storage tank is established, and the items of the facility safety responsibility table of the oil storage tank comprise: oil storage tank ID, safety responsible person, safety responsible name;
inputting the fingerprint information of the safety person into the block chain, and constructing a safety person fingerprint information base;
a unique facility ID is set for the storage tank and the storage tank ID and its security responsible person are entered into the storage tank's facility security responsibility table.
When the oil storage tank is transferred, the fingerprint information of the new safety responsible person and the fingerprint information of the old safety responsible person are collected by the block chain link points and broadcasted.
Comparing the acquired fingerprint information with information in an information base, if the fingerprint information is consistent with the information in the information base, allowing the oil storage tank to transfer through verification, generating an oil storage tank safety responsibility transfer data packet, and broadcasting the packet; and meanwhile, updating a safety responsibility table of the oil storage tank.
Establishing a safety responsibility table of the oil storage tank among safety responsibility persons of the oil storage tank; the fingerprint information of the oil storage tank safety person is input into the block chain through the oil storage tank safety person, and an oil storage tank safety person fingerprint information base which is responsible for the oil storage tank safety person is established.
And the safety responsible person carries out safety responsibility transfer to the oil storage tank safety responsible person according to the method in the steps, and the safety responsibility transfer object of the oil storage tank safety responsible person is limited to the responsible safety responsible person and the sub-safety responsible persons in the fingerprint information base of the same sub-safety responsible person.
In a certain oil storage tank facility in the facility security responsibility table, the transfer authority of the oil storage tank facility, such as a specific security responsible person, the number of security responsible persons, or a transfer time zone, is set, and when the new security responsible person satisfies the transfer authority, the facility transfer is allowed.
Example 3
Referring to fig. 3, a chemical transportation vehicle management method for a petrochemical enterprise.
And 001, creating a private block chain of the enterprise, and establishing a safety responsibility table of the facility (chemical transport vehicle), wherein the items of the safety responsibility table comprise a facility ID, a safety responsible person and a safety responsibility name.
And step 002, inputting the fingerprints of the related compliance operators into the block chain, and constructing a security accountant fingerprint information base.
Step 003, a unique facility ID is set for each chemical delivery vehicle and the facility ID and the current safety responsible person are entered into the facility safety responsibility chart.
Step 004, when the driver B needs the vehicle C, the driver B communicates with the current security manager, namely the current security person A, after the communication, fingerprint information of a new security person and an old security person is input through the blockchain node, and the node obtains a facility transfer request and broadcasts the request.
Step 005, the verification node compares the fingerprint information of the two parties with the information in the information base, if the two parties pass the verification, the facility transfer is allowed, and a facility security responsibility transfer data packet is generated, wherein the facility security responsibility transfer data packet comprises the facility ID, the fingerprint information of the old security responsible person, the fingerprint information of the new security responsible person and the security responsibility name, and the broadcast is carried out: and meanwhile, updating the facility safety responsibility table.
The chemical transport vehicle only allows specific qualified personnel to use, the transfer of the vehicle only can be related personnel in the information base, the check node verifies the fingerprint information of the transferred object in the transfer process, and if the fingerprint information does not accord with the authority, the transfer is not allowed.
Example 4
With reference to fig. 4, the present embodiment relates to emergency events, such as safety liability management of a fire:
step 101, establishing a safety responsibility management block chain of the emergency event.
102, setting processing steps according to national laws and regulations and enterprise related requirements, wherein each step is implemented to an appointed safety responsible person (a safety responsible person can be appointed through a post), and the steps are respectively an initial safety responsible person A1Person of security accountant A2Person of security accountant A3… … person A in securitynEach responsible person corresponds to a safety responsibility node of a block chain, namely an initial safety responsibility node a1Safety responsibility node a2Safety responsibility node a3、……、anA level security responsibility node.
Step 103, the initial security person A is responsible1Person of security accountant A2Person of security accountant A3… … person A in securitynThe fingerprint information of the user is respectively stored in the corresponding safety responsibility nodes for identity verification.
Step 104, after the emergency event occurs, the patrolman A1Namely the initial security responsible person A1And according to the event processing procedure and the set processing steps, processing the event: including uploading fingerprint information and event related information to the primary responsible node.
Step 105, initial security responsibility node a1For the initial security person A1And (4) performing fingerprint identification, and broadcasting the event if the verification is passed. The broadcast object is the next level responsible node.
Step 106, supervisor A2I.e. the subordinate security person A2Through subordinate security responsibility node a2And after receiving the event information, uploading the fingerprint information and a 'receiving confirmation' instruction.
Safety responsibility node a2Finishing the initial responsibility transmission of the event after the fingerprint identification of the responsible person is passed; person of safety accountability A2And processing the event according to the event processing procedure and the set processing steps. For example, according to the fire, an emergency rescue scheme is set, wherein the emergency rescue scheme comprises an emergency group x emergency rescue and a medical group y medical rescue, and then the fire information and the rescue scheme are uploaded to a safety responsibility node a2
Step 107, the responsibility node a of the next level3Broadcasting, i.e. emergency team x and medical team y through respective security responsibility nodes a3And after receiving the event information, uploading the fingerprint information and a 'receiving confirmation' instruction. Safety responsibility node a3After the face recognition of the person in charge is passed, the transfer of event responsibility is completed; rescue is carried out according to the standard by the emergency group x and the medical group y.
In this case, the supervisor B, where the responsible node is located, may share with the city-level or provincial emergency defense system block chain; when the fire is uncontrollable, a rescue request can be sent to an emergency system at the city level or the provincial level. After receiving the request, the city-level or provincial emergency system rescues the fire according to regulations. By the method, the safety responsibility is automatically put in place, the tampering can not be carried out, or the tampering cost is high.
Example 5
And (5) combining the figure 5, a method for managing the cement tank truck of a certain construction enterprise.
And creating a block chain private to the enterprise, and establishing a safety responsibility table of the cement tank truck, wherein the items of the safety responsibility table of the cement tank truck comprise the ID of the cement tank truck, a safety responsible person and a safety responsibility name.
And inputting the fingerprints of the related compliance operators into the block chain, and constructing a security accountant fingerprint information base.
A unique facility ID is set for each cement tanker and the facility ID and the current safety responsible person are entered into the facility safety liability chart.
When the driver E needs the vehicle F, the driver E communicates with the current security manager, namely the current security person G, after the communication, fingerprint information of a new security person and fingerprint information of an old security person are input through the block chain node, and the node obtains a facility transfer request and broadcasts the request.
The verification node compares the fingerprint information of the two parties with the information in the information base, if the verification is passed, the facility transfer is allowed, and a facility security responsibility transfer data packet is generated, wherein the facility security responsibility transfer data packet comprises a facility ID, the fingerprint information of the old security responsible person, the fingerprint information of the new security responsible person and a security responsibility name, and the broadcasting is carried out: and meanwhile, updating the facility safety responsibility table.
The cement tank truck only allows a specific qualified person to use, the transfer of the vehicle only can be related persons in the information base, the check node checks the fingerprint information of the transferred object in the transfer process, and if the fingerprint information does not accord with the authority, the transfer is not allowed.
In the case of the example 6, it is shown,
referring to fig. 4, a method for managing a logistics enterprise container vehicle.
And creating a block chain of the enterprise private, and establishing a safety responsibility list of the container vehicles, wherein the items of the safety responsibility list of the container vehicles comprise container vehicle IDs, safety responsible persons and safety responsibility names.
Recording conditions of relevant compliance operators, wherein the recording conditions of the relevant compliance operators comprise driving license levels of A1 certificates and A2 certificates; and recording the fingerprints of the drivers with certificates of A1 and A2 into the blockchain to construct a safety person fingerprint information base.
A unique facility ID is set for each container vehicle and entered into the facility security responsibility table along with the current security responsible person.
When the driver H needs the vehicle I, the driver H communicates with the current security manager, namely the current security person K, after the communication, fingerprint information of a new security person and fingerprint information of an old security person are input through the block chain node, and the node obtains a facility transfer request and broadcasts the request.
The verification node compares the fingerprint information of the two parties with the information in the information base, if the verification is passed, the facility transfer is allowed, and a facility security responsibility transfer data packet is generated, wherein the facility security responsibility transfer data packet comprises a facility ID, the fingerprint information of the old security responsible person, the fingerprint information of the new security responsible person and a security responsibility name, and the broadcasting is carried out: and meanwhile, updating the facility safety responsibility table.
The invention provides a safety management method based on the Internet of things, which realizes automatic judgment of safety responsible parties by automatically collecting relevant safety responsible data in the Internet of things management process. Meanwhile, the safety certification which cannot be repudiated and has low cost is realized through block chain management. Automatic tracing, block chain and fingerprint authentication technologies are combined, an autonomous informatization management mode aiming at implementation of safety production responsibility is established, and effective implementation of safety production responsibility is realized through full-flow informatization. The invention relates to a safety management method. The safety responsibility chain and the safety responsibility person during the process operation are determined, the safety responsibility person and the safety responsibility management of the equipment are determined, and the management process can realize an autonomy mechanism of the safety management.
It is to be understood that the above description is not intended to limit the present invention, and the present invention is not limited to the above examples, and those skilled in the art may make modifications, alterations, additions or substitutions within the spirit and scope of the present invention.

Claims (17)

1. A safety management method is characterized in that a block chain and personnel related fingerprint information authentication technology is fused based on the Internet of things, and the safety management method is used for improving safety management.
2. The safety management method according to claim 1, wherein the management method is applied to safety responsibility management, and the effective implementation of the safety production responsibility is realized by constructing an autonomous informatization management mode aiming at the implementation of the safety production responsibility and performing full-flow informatization.
3. A security management method according to claim 2, wherein the autonomous informatization management mode comprises an operation management method and an equipment management method.
4. A security management method according to claim 3, wherein said operation management method comprises the steps of:
step 11, setting a block chain and a creation block, wherein the block chain is started from the creation block;
step 12, setting processing steps according to the operation rules, and setting safety responsible persons and safety responsible nodes of different levels for each step;
step 13, respectively storing each safety responsible person in the corresponding safety responsible node for verifying the identity;
step 14, after the operation is started, the safety responsible person processes the safety responsibility information according to the operation rules and steps;
step 15, the safety responsible person on the safety responsible node carries out identity verification, if the verification is passed, the event is broadcasted, and the broadcasting object is the next responsible node;
step 16, the next responsibility node receives the information and confirms and audits the information, and after the audit is finished, the safety responsible person on the secondary node needs to process the task;
and step 17, broadcasting to the next safety responsibility node, and performing safety responsibility transmission and operation step processing according to step 16 until the operation is completed.
5. The method according to claim 4, wherein the security principal comprises an initial security principal A1Person of security accountant A2Person of security accountant A3… … security responsible persons An, each responsible person corresponding to a security responsible node of a blockchain.
6. A security management method according to claim 4, wherein the security responsibility nodes are initial security responsibility nodes a respectively1Safety responsibility node a2Safety responsibility node a3、……、anAnd each step corresponds to one safety responsibility node.
7. The security management method according to claim 6, wherein the content of the security responsibility information processing in step 14 includes fingerprint information, operation information, and information to be processed.
8. A security management method according to claim 4, wherein the responsible person is set by post security responsibility, one or two security responsibility nodes at the same level are shared by one or two other block chains.
9. A security management method according to claim 4, wherein the responsible person is set by post security responsibility, the security responsibility nodes of the same level are plural, and the plural security responsibility nodes are shared by another plural other block chains.
10. A security management method according to claim 3, wherein the facility management method comprises the steps of:
step 31, creating a block chain and a starting block, starting the block chain from the starting block and establishing a facility security responsibility table;
step 32, inputting the fingerprint information of the person in safety responsibility into the block chain, and constructing a fingerprint information base of the person in safety responsibility;
step 33, setting a unique facility ID for the facility, and recording the facility ID and the safety accountant thereof into a facility safety responsibility table;
step 34, when the facility is transferred, the block link points collect the fingerprint information of the new safety responsible person and the old safety responsible person and broadcast the fingerprint information;
step 35, comparing the acquired fingerprint information with the information in the information base, if the fingerprint information is consistent with the information in the information base, allowing facility transfer through verification, generating a facility safety responsibility transfer data packet, and broadcasting the data packet;
and step 36, updating the facility safety responsibility table after the broadcasting is finished.
11. A security management method according to claim 10, wherein the items of the facility security responsibility table in step 31 include a facility ID, a security responsibility person and a security responsibility name.
12. A security management method according to claim 10, wherein in the security responsible person in the step 32, a sub-security responsible table and a sub-security responsible person are established, and the security responsible person enters the security information of the sub-security responsible person.
13. The security management method according to claim 12, wherein the security information of the sub-security responsible person includes fingerprint information, phone information and mailbox information, and the security responsible person enters the fingerprint information of the sub-security responsible person into the block chain and constructs a fingerprint information library of the sub-security responsible person in charge of the security responsible person.
14. A security management method according to claim 13, wherein when the security responsible person performs the security responsibility transfer to the child security responsible person according to the method described in step 34 and step 35, the security responsibility transfer object of the child security responsible person is defined as the responsible security responsible person and the child security responsible person in the fingerprint information base of the same child security responsible person.
15. The method as claimed in claim 10, wherein in one of the facilities in the safety responsibility table of the facilities in the step 31, a facility transfer authority is set, and when the new safety responsible person satisfies the transfer authority, the facility transfer is allowed.
16. A security management method according to claim 15, wherein the facility transfer right includes a specific security responsible person, the number of security responsible persons or a transfer time zone.
17. A security management method according to claim 10, wherein the information of the facility security responsibility transfer data packet in the step 35 includes a facility ID, fingerprint information of an old security responsible person, fingerprint information of a new security responsible person and a security responsibility name.
CN201910529046.5A 2019-06-19 2019-06-19 Security management method based on Internet of things Pending CN112116175A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910529046.5A CN112116175A (en) 2019-06-19 2019-06-19 Security management method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910529046.5A CN112116175A (en) 2019-06-19 2019-06-19 Security management method based on Internet of things

Publications (1)

Publication Number Publication Date
CN112116175A true CN112116175A (en) 2020-12-22

Family

ID=73795993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910529046.5A Pending CN112116175A (en) 2019-06-19 2019-06-19 Security management method based on Internet of things

Country Status (1)

Country Link
CN (1) CN112116175A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113128836A (en) * 2021-03-19 2021-07-16 福建省万物智联科技有限公司 Responsibility tracing method, device, equipment and storage medium
CN114257574A (en) * 2021-12-03 2022-03-29 浙江责联科技有限公司 Method and system for generating responsibility networking protocol based on Internet of things message protocol

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107122938A (en) * 2017-04-27 2017-09-01 电子科技大学 A kind of freight logistics scheduling and tracking based on block chain
CN107133353A (en) * 2017-05-25 2017-09-05 杭州全视软件有限公司 A kind of autonomous liability management method based on biological information
CN108876192A (en) * 2018-07-10 2018-11-23 赛飞特工程技术集团有限公司 A kind of process safety management method based on block chain technology
CN108876419A (en) * 2018-08-14 2018-11-23 广东博云公共平台网络科技有限公司 A kind of industrial products supply chain retroactive method and system based on Internet of Things and block chain
US20180341910A1 (en) * 2017-05-26 2018-11-29 Chris Broveleit Blockchain-based logistics systems
CN109409784A (en) * 2018-11-28 2019-03-01 杭州云象网络技术有限公司 A kind of supervision of petroleum oil mass and method for quality control based on block chain
KR20190051326A (en) * 2017-11-06 2019-05-15 주식회사 케이티 Internet Of Things Device Control System and Method Based On Block Chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107122938A (en) * 2017-04-27 2017-09-01 电子科技大学 A kind of freight logistics scheduling and tracking based on block chain
CN107133353A (en) * 2017-05-25 2017-09-05 杭州全视软件有限公司 A kind of autonomous liability management method based on biological information
US20180341910A1 (en) * 2017-05-26 2018-11-29 Chris Broveleit Blockchain-based logistics systems
KR20190051326A (en) * 2017-11-06 2019-05-15 주식회사 케이티 Internet Of Things Device Control System and Method Based On Block Chain
CN108876192A (en) * 2018-07-10 2018-11-23 赛飞特工程技术集团有限公司 A kind of process safety management method based on block chain technology
CN108876419A (en) * 2018-08-14 2018-11-23 广东博云公共平台网络科技有限公司 A kind of industrial products supply chain retroactive method and system based on Internet of Things and block chain
CN109409784A (en) * 2018-11-28 2019-03-01 杭州云象网络技术有限公司 A kind of supervision of petroleum oil mass and method for quality control based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113128836A (en) * 2021-03-19 2021-07-16 福建省万物智联科技有限公司 Responsibility tracing method, device, equipment and storage medium
CN114257574A (en) * 2021-12-03 2022-03-29 浙江责联科技有限公司 Method and system for generating responsibility networking protocol based on Internet of things message protocol

Similar Documents

Publication Publication Date Title
CN108270551B (en) Security service construction system on block chain
DE102019100333A1 (en) ELECTRONIC PUBLIC TRACKING
DE102017113150A1 (en) Locking and unlocking system, server for a locking and unlocking system and control method for executing a locking and unlocking system
CN108846647A (en) A kind of intelligent meeting management-control method and system
CN109003207B (en) Residence permit information processing method and platform based on block chain
CN109767129B (en) Credit limit control method and device
JP2008293253A (en) Car sharing management system
CN112116175A (en) Security management method based on Internet of things
CN103761598A (en) Enterprise information centralized collection processing method and system
CN109034431A (en) A kind of predetermined management method of highly effective and safe meeting room and system
CN108875990A (en) A kind of on-the-spot meeting intelligence building processing method and system
DE112021003971T5 (en) SUSTAINABLE TOKENS FOR A PRIVACY PROTECTED PROTOCOL SUPPLY CHAIN
De Koker et al. Regulating financial services in an era of technological disruption
CN108921316A (en) A kind of predetermined application method of meeting room and system
CN110727734A (en) Credit information synchronization method based on block chain and credit combined reward and punishment system
CN113393240A (en) Electronic certificate storage system and operation method
CN112991121A (en) Information-based construction management system and method for colleges and universities
CN112308484A (en) Whole-course logistics information sharing method and system, equipment and medium
CN111666554A (en) Certificate authentication method, device, equipment and storage medium
CN113239255B (en) Heterogeneous data resource sharing method and device, computer equipment and medium
TW201335900A (en) Parking space sharing system and method thereof
CN109033870A (en) A kind of meeting room whole process unmanned management method and system
CN112199729B (en) Cone blockchain verification method and system
CN114205089A (en) Block chain-based Mian code authentication method and system
DE102020201232A1 (en) Method and system for reserving public and / or private parking spaces

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination