CN112116175A - Security management method based on Internet of things - Google Patents
Security management method based on Internet of things Download PDFInfo
- Publication number
- CN112116175A CN112116175A CN201910529046.5A CN201910529046A CN112116175A CN 112116175 A CN112116175 A CN 112116175A CN 201910529046 A CN201910529046 A CN 201910529046A CN 112116175 A CN112116175 A CN 112116175A
- Authority
- CN
- China
- Prior art keywords
- security
- safety
- responsibility
- person
- responsible
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06311—Scheduling, planning or task assignment for a person or group
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Computer Security & Cryptography (AREA)
- General Business, Economics & Management (AREA)
- Educational Administration (AREA)
- Tourism & Hospitality (AREA)
- Databases & Information Systems (AREA)
- Development Economics (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Game Theory and Decision Science (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Finance (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a safety management method based on the Internet of things, and relates to the field of enterprise safety production management. The autonomous safety responsibility management method comprises an operation management method and an equipment facility management method, wherein the operation management method comprises the steps of setting a block chain and a creation block, setting processing steps according to an operation rule, and setting a safety responsible person for each step; storing the fingerprint information of each level of safety responsible person in the corresponding safety responsible node respectively for identity verification; after the operation begins, the primary safety person A1Processing according to the operation rules and steps; person of safety accountability A2Through responsible node a2After the operation information is received, the fingerprint information and the 'receiving confirmation' instruction are uploaded, and then the information is spread. An autonomous informatization management mode aiming at the implementation of the safety production responsibility is established in the safety responsibility management method, and the effective implementation of the safety production responsibility is realized through full-flow informatization.
Description
Technical Field
The invention relates to the field of enterprise safety production management, in particular to a safety management method based on the Internet of things.
Background
The internet of things is a network technology which is extended and expanded on the basis of the internet technology, is primarily applied to the fields of production process management, equipment asset management, personnel management, safety management and the like in the petroleum and petrochemical industry at present, achieves a good effect, improves the real-time monitoring and dynamic management capacity of the petroleum industry, and improves the cooperation level of a petroleum and petrochemical industry chain. In the process of managing the internet of things, people are the management subject of things, the efficiency or effect of managing the internet of things is determined by the quality of management, and the key of managing is the safety responsibility of people.
At present, the determination of safety responsibility is mainly determined by the requirements of laws and regulations, and cannot be judged by utilizing big data, or a third party notarization is needed in the management process, so that the management cost is too high or the process is too complex, and effective regulatory management is difficult to realize. Therefore, how to realize the automatic judgment of the safety responsible party by automatically collecting the relevant safety responsible data in the management process and realize the safety certification which cannot be repudiated and has low cost by the block chain management is a key problem to be solved. The system combines automatic responsibility tracing, block chain and personnel-related fingerprint information authentication technologies, can be used for building an autonomous informatization management mode aiming at implementation of safety production responsibility, and realizes effective implementation of the safety production responsibility through full-process informatization.
Disclosure of Invention
The invention aims to provide a safety management method based on the Internet of things, which is implemented based on the Internet of things, and has better management effect of safety responsibility.
In order to achieve the purpose, the invention adopts the technical scheme that:
a safety management method based on the Internet of things integrates a block chain and a personnel related fingerprint information authentication technology and is used for improving safety management.
Preferably, the management method is applied to safety responsibility management, and the safety production responsibility is effectively implemented by constructing an autonomous informatization management mode aiming at the implementation of the safety production responsibility and performing full-flow informatization.
Preferably, the autonomous informatization management mode comprises an operation management method and an equipment facility management method.
Preferably, the operation management method includes the steps of:
step 11, setting a block chain and a creation block, wherein the block chain is started from the creation block;
step 12, setting processing steps according to the operation rules, and setting safety responsible persons and safety responsible nodes of different levels for each step;
step 13, respectively storing each safety responsible person in the corresponding safety responsible node for verifying the identity;
step 14, after the operation is started, the safety responsible person processes the safety responsibility information according to the operation rules and steps;
step 15, the safety responsible person on the safety responsible node carries out identity verification, if the verification is passed, the event is broadcasted, and the broadcasting object is the next responsible node;
step 16, the next responsible node receives the information and verifies the information, and after the verification is finished, the safety responsible person on the next node needs to process the task;
and step 17, broadcasting to the next safety responsibility node, and performing safety responsibility transmission and operation step processing according to step 16 until the operation is completed.
Preferably, the security principal comprises an initial security principal A1Person of security accountant A2Person of security accountant A3… … security responsible persons An, each responsible person corresponding to a security responsible node of a blockchain.
Preferably, the security responsibility nodes are initial security responsibility nodes a respectively1Safety responsibility node a2Safety responsibility node a3、……、anAnd each step corresponds to one safety responsibility node.
Preferably, the information processed by the security responsibility information in step 14 includes fingerprint information, operation information, and information to be processed.
Preferably, the responsible person is set by the post security responsibility, one or two security responsibility nodes of the same level are shared by one or two other block chains.
Preferably, the responsible person is set by post security responsibility, the security responsibility nodes of the same level are multiple, and the multiple security responsibility nodes are shared by another multiple other block chains.
Preferably, the equipment facility management method includes the steps of:
step 31, creating a block chain and a starting block, starting the block chain from the starting block and establishing a facility security responsibility table;
step 32, inputting the fingerprint information of the person in safety responsibility into the block chain, and constructing a fingerprint information base of the person in safety responsibility;
step 33, setting a unique facility ID for the facility, and recording the facility ID and the safety accountant thereof into a facility safety responsibility table;
step 34, when the facility is transferred, the block link points collect the fingerprint information of the new safety responsible person and the old safety responsible person and broadcast the fingerprint information;
step 35, comparing the acquired fingerprint information with the information in the information base, if the fingerprint information is consistent with the information in the information base, allowing facility transfer through verification, generating a facility safety responsibility transfer data packet, and broadcasting the data packet;
and step 36, updating the facility safety responsibility table after the broadcasting is finished.
Preferably, the items of the facility safety responsibility table in step 31 include a facility ID, a safety responsibility person and a safety responsibility name.
Preferably, in the step 32, a sub-security responsibility table and a sub-security responsibility person are established, and the security responsibility person records the security information of the sub-security responsibility person.
Preferably, the security information of the sub security responsible person includes fingerprint information, telephone information and mailbox information, and the security responsible person enters the fingerprint information of the sub security responsible person into the block chain and constructs a sub security responsible person fingerprint information base responsible by the security responsible person.
Preferably, when the security responsible person performs the security responsibility transfer to the child security responsible person according to the methods in step 34 and step 35, the security responsibility transfer object of the child security responsible person is the responsible security responsible person and the child security responsible person in the fingerprint information base of the same child security responsible person.
Preferably, in a certain facility in the facility security responsibility table in the step 31, a facility transfer right is set, and when the new security responsible person satisfies the transfer right, the facility transfer is allowed.
Preferably, the facility transfer authority includes a specific security accountant, a number of security accountants or a transfer time zone.
Preferably, the information of the facility security responsibility transfer data packet in the step 35 includes a facility ID, fingerprint information of the old security responsible person, fingerprint information of the new security responsible person and a security responsibility name.
The invention has the beneficial effects that:
the invention provides a security management method based on the Internet of things, which realizes automatic judgment of responsible parties by automatically collecting related security responsibility data in the Internet of things management process. Meanwhile, the safety certification which cannot be repudiated and has low cost is realized through block chain management. Automatic tracing, block chain and fingerprint authentication technologies are combined, an autonomous informatization management mode aiming at safety production responsibility is established, and effective execution and optimization of a regulation system are realized through whole-process informatization. The safety management method of the invention defines the safety responsibility chain and the safety responsibility person during the process operation, defines the safety responsibility person and the safety responsibility management of the equipment, and can realize the autonomy mechanism of the safety management in the management process.
Drawings
In order to clearly illustrate the embodiments or technical solutions of the present invention in the prior art, the drawings used in the description of the embodiments or prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
Fig. 1 is a process diagram of a security management method based on the internet of things.
Fig. 2 is a block diagram illustrating a process of managing a storage tank in a petrochemical enterprise.
Fig. 3 is a block diagram of a process of managing a chemical transportation vehicle of a petrochemical enterprise.
Fig. 4 is a block diagram of a fire safety responsibility management process.
Fig. 5 is a block diagram of a process for managing cement tanker vehicles in a construction enterprise.
Fig. 6 is a block diagram of a process for managing a logistics enterprise container vehicle.
Detailed Description
The invention is described in detail below with reference to the accompanying drawings:
a safety management method based on the Internet of things integrates a block chain and a personnel related fingerprint information authentication technology and is used for improving safety management. The management method is applied to safety responsibility management, and the effective implementation of the safety production responsibility is realized by constructing an autonomous informatization management mode aiming at the implementation of the safety production responsibility and performing full-flow informatization.
The autonomous informatization management mode includes an operation management method and an equipment facility management method. The operation management method comprises the following steps:
step 11, setting a block chain and a creation block, wherein the block chain is started from the creation block;
step 12, setting processing steps according to the operation rules, and setting safety responsible persons and safety responsible nodes of different levels for each step;
step 13, respectively storing each safety responsible person in the corresponding safety responsible node for verifying the identity;
step 14, after the operation is started, the safety responsible person processes the safety responsibility information according to the operation rules and steps;
step 15, the safety responsible person on the safety responsible node carries out identity verification, if the verification is passed, the event is broadcasted, and the broadcasting object is the next responsible node;
step 16, the next responsible node receives the information and verifies the information, and after the verification is finished, the safety responsible person on the next node needs to process the task;
and step 17, broadcasting to the next safety responsibility node, and performing safety responsibility transmission and operation step processing according to step 16 until the operation is completed.
The security principal includes an initial security principal A1Person of security accountant A2Person of security accountant A3… … security responsible persons An, each responsible person corresponding to a security responsible node of a blockchain.
The safety responsibility nodes are respectively initial safety responsibility nodes a1Safety responsibility node a2Safety responsibility node a3、……、anAnd each step corresponds to one safety responsibility node.
The information processed by the security responsibility information in step 14 includes fingerprint information, operation information, and information to be processed.
The responsible person is set by the post security responsibility, one or two security responsibility nodes of the same level are shared by one or two other block chains.
The responsible person is set by the post security responsibility, the security responsibility nodes of the same level are a plurality of, and a plurality of security responsibility nodes are shared by another plurality of other block chains.
The equipment facility management method comprises the following steps:
step 31, creating a block chain and a starting block, starting the block chain from the starting block and establishing a facility security responsibility table;
step 32, inputting the fingerprint information of the person in safety responsibility into the block chain, and constructing a fingerprint information base of the person in safety responsibility;
step 33, setting a unique facility ID for the facility, and recording the facility ID and the safety accountant thereof into a facility safety responsibility table;
step 34, when the facility is transferred, the block link points collect the fingerprint information of the new safety responsible person and the old safety responsible person and broadcast the fingerprint information;
step 35, comparing the acquired fingerprint information with the information in the information base, if the fingerprint information is consistent with the information in the information base, allowing facility transfer through verification, generating a facility safety responsibility transfer data packet, and broadcasting the data packet;
and step 36, updating the facility safety responsibility table after the broadcasting is finished.
The items of the facility safety responsibility table in step 31 include a facility ID, a safety responsibility person, and a safety responsibility name.
In the step 32, a sub-safety responsibility table and a sub-safety responsible person are established, and the safety responsible person inputs the safety information of the sub-safety responsible person.
The safety information of the sub safety accountant comprises fingerprint information, telephone information and mailbox information, the safety accountant inputs the fingerprint information of the sub safety accountant into the block chain, and a sub safety accountant fingerprint information base which is responsible for the safety accountant is constructed.
When the safety responsibility person performs the safety responsibility transfer to the sub-safety responsibility person according to the methods described in step 34 and step 35, the range of the safety responsibility transfer object of the sub-safety responsibility person is the responsible safety responsibility person and the sub-safety responsibility persons in the fingerprint information base of the same sub-safety responsibility person.
In a certain facility in the facility security responsibility table in step 31, a facility transfer right is set, and when the new security responsible person satisfies the transfer right, the facility transfer is allowed.
The facility transfer authority includes a specific security accountant, the number of security accountants, or a transfer time zone.
The information of the facility security responsibility transfer data packet in step 35 includes the facility ID, the fingerprint information of the old security responsible person, the fingerprint information of the new security responsible person, and the security responsibility name.
Example 1
With reference to fig. 1, an autonomous safety responsibility management method for a petrochemical enterprise based on the internet of things includes an operation management method and an equipment facility management method, where the operation management method includes the following steps:
a block chain and a creation block are set in a petrochemical enterprise, and the block chain is started from the creation block. Setting processing steps in a block chain and a creation block in a petrochemical enterprise according to operation rules, and setting a safety responsible person for each step, including an initial safety responsible person A1Person of security accountant A2Person of security accountant A3… … security responsible persons An, each responsible person corresponds to a security responsible node of the block chain, which is the initial security responsible node a1Safety responsibility node a2Safety responsibility node a3、……、anAnd each step corresponds to one safety responsibility node.
Person A responsible for initial security1Person of security accountant A2Person of security accountant A3… … person A in securitynThe fingerprint information of the security responsibility node is respectively stored in the corresponding security responsibility nodes for identity verification. After the operation starts, the person A with initial security responsibility1Processing according to the operation rules and steps; the processed content comprises the fingerprint information and operation information and information to be processed which are uploaded to the initial security responsibility node a1。
Initial security responsibility node a1For the initial security person A1And performing identity authentication, and broadcasting the event if the authentication is passed, wherein the broadcasting object is the next responsible node.
Person of safety accountability A2Through a security responsibility node a2After receiving the operation information, uploading fingerprint information and a 'receiving confirmation' instruction; safety responsibility node a2To the person of security blame A2After the identity verification is passed, primary security responsibility transmission is completed; person of safety accountability A2According to the operation procedures and the set steps, processing is carried out, and the processing content comprises uploading operation information and information to be processed to the safety responsibility node a2. Broadcast to the next security responsibility node, and then carry out security responsibility transmission and operation step processing until the operation is completed. The responsible person is set by the post security responsibility, one or more security responsibility nodes at the same level are provided, and one or more security responsibility nodes are shared by one or more other block chains.
Example 2
Referring to fig. 2, a method for managing a storage tank in a petrochemical enterprise includes the steps of:
when the block chain is started from the creation block, a facility safety responsibility table of the oil storage tank is established, and the items of the facility safety responsibility table of the oil storage tank comprise: oil storage tank ID, safety responsible person, safety responsible name;
inputting the fingerprint information of the safety person into the block chain, and constructing a safety person fingerprint information base;
a unique facility ID is set for the storage tank and the storage tank ID and its security responsible person are entered into the storage tank's facility security responsibility table.
When the oil storage tank is transferred, the fingerprint information of the new safety responsible person and the fingerprint information of the old safety responsible person are collected by the block chain link points and broadcasted.
Comparing the acquired fingerprint information with information in an information base, if the fingerprint information is consistent with the information in the information base, allowing the oil storage tank to transfer through verification, generating an oil storage tank safety responsibility transfer data packet, and broadcasting the packet; and meanwhile, updating a safety responsibility table of the oil storage tank.
Establishing a safety responsibility table of the oil storage tank among safety responsibility persons of the oil storage tank; the fingerprint information of the oil storage tank safety person is input into the block chain through the oil storage tank safety person, and an oil storage tank safety person fingerprint information base which is responsible for the oil storage tank safety person is established.
And the safety responsible person carries out safety responsibility transfer to the oil storage tank safety responsible person according to the method in the steps, and the safety responsibility transfer object of the oil storage tank safety responsible person is limited to the responsible safety responsible person and the sub-safety responsible persons in the fingerprint information base of the same sub-safety responsible person.
In a certain oil storage tank facility in the facility security responsibility table, the transfer authority of the oil storage tank facility, such as a specific security responsible person, the number of security responsible persons, or a transfer time zone, is set, and when the new security responsible person satisfies the transfer authority, the facility transfer is allowed.
Example 3
Referring to fig. 3, a chemical transportation vehicle management method for a petrochemical enterprise.
And 001, creating a private block chain of the enterprise, and establishing a safety responsibility table of the facility (chemical transport vehicle), wherein the items of the safety responsibility table comprise a facility ID, a safety responsible person and a safety responsibility name.
And step 002, inputting the fingerprints of the related compliance operators into the block chain, and constructing a security accountant fingerprint information base.
The chemical transport vehicle only allows specific qualified personnel to use, the transfer of the vehicle only can be related personnel in the information base, the check node verifies the fingerprint information of the transferred object in the transfer process, and if the fingerprint information does not accord with the authority, the transfer is not allowed.
Example 4
With reference to fig. 4, the present embodiment relates to emergency events, such as safety liability management of a fire:
102, setting processing steps according to national laws and regulations and enterprise related requirements, wherein each step is implemented to an appointed safety responsible person (a safety responsible person can be appointed through a post), and the steps are respectively an initial safety responsible person A1Person of security accountant A2Person of security accountant A3… … person A in securitynEach responsible person corresponds to a safety responsibility node of a block chain, namely an initial safety responsibility node a1Safety responsibility node a2Safety responsibility node a3、……、anA level security responsibility node.
Safety responsibility node a2Finishing the initial responsibility transmission of the event after the fingerprint identification of the responsible person is passed; person of safety accountability A2And processing the event according to the event processing procedure and the set processing steps. For example, according to the fire, an emergency rescue scheme is set, wherein the emergency rescue scheme comprises an emergency group x emergency rescue and a medical group y medical rescue, and then the fire information and the rescue scheme are uploaded to a safety responsibility node a2。
In this case, the supervisor B, where the responsible node is located, may share with the city-level or provincial emergency defense system block chain; when the fire is uncontrollable, a rescue request can be sent to an emergency system at the city level or the provincial level. After receiving the request, the city-level or provincial emergency system rescues the fire according to regulations. By the method, the safety responsibility is automatically put in place, the tampering can not be carried out, or the tampering cost is high.
Example 5
And (5) combining the figure 5, a method for managing the cement tank truck of a certain construction enterprise.
And creating a block chain private to the enterprise, and establishing a safety responsibility table of the cement tank truck, wherein the items of the safety responsibility table of the cement tank truck comprise the ID of the cement tank truck, a safety responsible person and a safety responsibility name.
And inputting the fingerprints of the related compliance operators into the block chain, and constructing a security accountant fingerprint information base.
A unique facility ID is set for each cement tanker and the facility ID and the current safety responsible person are entered into the facility safety liability chart.
When the driver E needs the vehicle F, the driver E communicates with the current security manager, namely the current security person G, after the communication, fingerprint information of a new security person and fingerprint information of an old security person are input through the block chain node, and the node obtains a facility transfer request and broadcasts the request.
The verification node compares the fingerprint information of the two parties with the information in the information base, if the verification is passed, the facility transfer is allowed, and a facility security responsibility transfer data packet is generated, wherein the facility security responsibility transfer data packet comprises a facility ID, the fingerprint information of the old security responsible person, the fingerprint information of the new security responsible person and a security responsibility name, and the broadcasting is carried out: and meanwhile, updating the facility safety responsibility table.
The cement tank truck only allows a specific qualified person to use, the transfer of the vehicle only can be related persons in the information base, the check node checks the fingerprint information of the transferred object in the transfer process, and if the fingerprint information does not accord with the authority, the transfer is not allowed.
In the case of the example 6, it is shown,
referring to fig. 4, a method for managing a logistics enterprise container vehicle.
And creating a block chain of the enterprise private, and establishing a safety responsibility list of the container vehicles, wherein the items of the safety responsibility list of the container vehicles comprise container vehicle IDs, safety responsible persons and safety responsibility names.
Recording conditions of relevant compliance operators, wherein the recording conditions of the relevant compliance operators comprise driving license levels of A1 certificates and A2 certificates; and recording the fingerprints of the drivers with certificates of A1 and A2 into the blockchain to construct a safety person fingerprint information base.
A unique facility ID is set for each container vehicle and entered into the facility security responsibility table along with the current security responsible person.
When the driver H needs the vehicle I, the driver H communicates with the current security manager, namely the current security person K, after the communication, fingerprint information of a new security person and fingerprint information of an old security person are input through the block chain node, and the node obtains a facility transfer request and broadcasts the request.
The verification node compares the fingerprint information of the two parties with the information in the information base, if the verification is passed, the facility transfer is allowed, and a facility security responsibility transfer data packet is generated, wherein the facility security responsibility transfer data packet comprises a facility ID, the fingerprint information of the old security responsible person, the fingerprint information of the new security responsible person and a security responsibility name, and the broadcasting is carried out: and meanwhile, updating the facility safety responsibility table.
The invention provides a safety management method based on the Internet of things, which realizes automatic judgment of safety responsible parties by automatically collecting relevant safety responsible data in the Internet of things management process. Meanwhile, the safety certification which cannot be repudiated and has low cost is realized through block chain management. Automatic tracing, block chain and fingerprint authentication technologies are combined, an autonomous informatization management mode aiming at implementation of safety production responsibility is established, and effective implementation of safety production responsibility is realized through full-flow informatization. The invention relates to a safety management method. The safety responsibility chain and the safety responsibility person during the process operation are determined, the safety responsibility person and the safety responsibility management of the equipment are determined, and the management process can realize an autonomy mechanism of the safety management.
It is to be understood that the above description is not intended to limit the present invention, and the present invention is not limited to the above examples, and those skilled in the art may make modifications, alterations, additions or substitutions within the spirit and scope of the present invention.
Claims (17)
1. A safety management method is characterized in that a block chain and personnel related fingerprint information authentication technology is fused based on the Internet of things, and the safety management method is used for improving safety management.
2. The safety management method according to claim 1, wherein the management method is applied to safety responsibility management, and the effective implementation of the safety production responsibility is realized by constructing an autonomous informatization management mode aiming at the implementation of the safety production responsibility and performing full-flow informatization.
3. A security management method according to claim 2, wherein the autonomous informatization management mode comprises an operation management method and an equipment management method.
4. A security management method according to claim 3, wherein said operation management method comprises the steps of:
step 11, setting a block chain and a creation block, wherein the block chain is started from the creation block;
step 12, setting processing steps according to the operation rules, and setting safety responsible persons and safety responsible nodes of different levels for each step;
step 13, respectively storing each safety responsible person in the corresponding safety responsible node for verifying the identity;
step 14, after the operation is started, the safety responsible person processes the safety responsibility information according to the operation rules and steps;
step 15, the safety responsible person on the safety responsible node carries out identity verification, if the verification is passed, the event is broadcasted, and the broadcasting object is the next responsible node;
step 16, the next responsibility node receives the information and confirms and audits the information, and after the audit is finished, the safety responsible person on the secondary node needs to process the task;
and step 17, broadcasting to the next safety responsibility node, and performing safety responsibility transmission and operation step processing according to step 16 until the operation is completed.
5. The method according to claim 4, wherein the security principal comprises an initial security principal A1Person of security accountant A2Person of security accountant A3… … security responsible persons An, each responsible person corresponding to a security responsible node of a blockchain.
6. A security management method according to claim 4, wherein the security responsibility nodes are initial security responsibility nodes a respectively1Safety responsibility node a2Safety responsibility node a3、……、anAnd each step corresponds to one safety responsibility node.
7. The security management method according to claim 6, wherein the content of the security responsibility information processing in step 14 includes fingerprint information, operation information, and information to be processed.
8. A security management method according to claim 4, wherein the responsible person is set by post security responsibility, one or two security responsibility nodes at the same level are shared by one or two other block chains.
9. A security management method according to claim 4, wherein the responsible person is set by post security responsibility, the security responsibility nodes of the same level are plural, and the plural security responsibility nodes are shared by another plural other block chains.
10. A security management method according to claim 3, wherein the facility management method comprises the steps of:
step 31, creating a block chain and a starting block, starting the block chain from the starting block and establishing a facility security responsibility table;
step 32, inputting the fingerprint information of the person in safety responsibility into the block chain, and constructing a fingerprint information base of the person in safety responsibility;
step 33, setting a unique facility ID for the facility, and recording the facility ID and the safety accountant thereof into a facility safety responsibility table;
step 34, when the facility is transferred, the block link points collect the fingerprint information of the new safety responsible person and the old safety responsible person and broadcast the fingerprint information;
step 35, comparing the acquired fingerprint information with the information in the information base, if the fingerprint information is consistent with the information in the information base, allowing facility transfer through verification, generating a facility safety responsibility transfer data packet, and broadcasting the data packet;
and step 36, updating the facility safety responsibility table after the broadcasting is finished.
11. A security management method according to claim 10, wherein the items of the facility security responsibility table in step 31 include a facility ID, a security responsibility person and a security responsibility name.
12. A security management method according to claim 10, wherein in the security responsible person in the step 32, a sub-security responsible table and a sub-security responsible person are established, and the security responsible person enters the security information of the sub-security responsible person.
13. The security management method according to claim 12, wherein the security information of the sub-security responsible person includes fingerprint information, phone information and mailbox information, and the security responsible person enters the fingerprint information of the sub-security responsible person into the block chain and constructs a fingerprint information library of the sub-security responsible person in charge of the security responsible person.
14. A security management method according to claim 13, wherein when the security responsible person performs the security responsibility transfer to the child security responsible person according to the method described in step 34 and step 35, the security responsibility transfer object of the child security responsible person is defined as the responsible security responsible person and the child security responsible person in the fingerprint information base of the same child security responsible person.
15. The method as claimed in claim 10, wherein in one of the facilities in the safety responsibility table of the facilities in the step 31, a facility transfer authority is set, and when the new safety responsible person satisfies the transfer authority, the facility transfer is allowed.
16. A security management method according to claim 15, wherein the facility transfer right includes a specific security responsible person, the number of security responsible persons or a transfer time zone.
17. A security management method according to claim 10, wherein the information of the facility security responsibility transfer data packet in the step 35 includes a facility ID, fingerprint information of an old security responsible person, fingerprint information of a new security responsible person and a security responsibility name.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910529046.5A CN112116175A (en) | 2019-06-19 | 2019-06-19 | Security management method based on Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910529046.5A CN112116175A (en) | 2019-06-19 | 2019-06-19 | Security management method based on Internet of things |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112116175A true CN112116175A (en) | 2020-12-22 |
Family
ID=73795993
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910529046.5A Pending CN112116175A (en) | 2019-06-19 | 2019-06-19 | Security management method based on Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112116175A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113128836A (en) * | 2021-03-19 | 2021-07-16 | 福建省万物智联科技有限公司 | Responsibility tracing method, device, equipment and storage medium |
CN114257574A (en) * | 2021-12-03 | 2022-03-29 | 浙江责联科技有限公司 | Method and system for generating responsibility networking protocol based on Internet of things message protocol |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107122938A (en) * | 2017-04-27 | 2017-09-01 | 电子科技大学 | A kind of freight logistics scheduling and tracking based on block chain |
CN107133353A (en) * | 2017-05-25 | 2017-09-05 | 杭州全视软件有限公司 | A kind of autonomous liability management method based on biological information |
CN108876192A (en) * | 2018-07-10 | 2018-11-23 | 赛飞特工程技术集团有限公司 | A kind of process safety management method based on block chain technology |
CN108876419A (en) * | 2018-08-14 | 2018-11-23 | 广东博云公共平台网络科技有限公司 | A kind of industrial products supply chain retroactive method and system based on Internet of Things and block chain |
US20180341910A1 (en) * | 2017-05-26 | 2018-11-29 | Chris Broveleit | Blockchain-based logistics systems |
CN109409784A (en) * | 2018-11-28 | 2019-03-01 | 杭州云象网络技术有限公司 | A kind of supervision of petroleum oil mass and method for quality control based on block chain |
KR20190051326A (en) * | 2017-11-06 | 2019-05-15 | 주식회사 케이티 | Internet Of Things Device Control System and Method Based On Block Chain |
-
2019
- 2019-06-19 CN CN201910529046.5A patent/CN112116175A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107122938A (en) * | 2017-04-27 | 2017-09-01 | 电子科技大学 | A kind of freight logistics scheduling and tracking based on block chain |
CN107133353A (en) * | 2017-05-25 | 2017-09-05 | 杭州全视软件有限公司 | A kind of autonomous liability management method based on biological information |
US20180341910A1 (en) * | 2017-05-26 | 2018-11-29 | Chris Broveleit | Blockchain-based logistics systems |
KR20190051326A (en) * | 2017-11-06 | 2019-05-15 | 주식회사 케이티 | Internet Of Things Device Control System and Method Based On Block Chain |
CN108876192A (en) * | 2018-07-10 | 2018-11-23 | 赛飞特工程技术集团有限公司 | A kind of process safety management method based on block chain technology |
CN108876419A (en) * | 2018-08-14 | 2018-11-23 | 广东博云公共平台网络科技有限公司 | A kind of industrial products supply chain retroactive method and system based on Internet of Things and block chain |
CN109409784A (en) * | 2018-11-28 | 2019-03-01 | 杭州云象网络技术有限公司 | A kind of supervision of petroleum oil mass and method for quality control based on block chain |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113128836A (en) * | 2021-03-19 | 2021-07-16 | 福建省万物智联科技有限公司 | Responsibility tracing method, device, equipment and storage medium |
CN114257574A (en) * | 2021-12-03 | 2022-03-29 | 浙江责联科技有限公司 | Method and system for generating responsibility networking protocol based on Internet of things message protocol |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108270551B (en) | Security service construction system on block chain | |
DE102019100333A1 (en) | ELECTRONIC PUBLIC TRACKING | |
DE102017113150A1 (en) | Locking and unlocking system, server for a locking and unlocking system and control method for executing a locking and unlocking system | |
CN108846647A (en) | A kind of intelligent meeting management-control method and system | |
CN109003207B (en) | Residence permit information processing method and platform based on block chain | |
CN109767129B (en) | Credit limit control method and device | |
JP2008293253A (en) | Car sharing management system | |
CN112116175A (en) | Security management method based on Internet of things | |
CN103761598A (en) | Enterprise information centralized collection processing method and system | |
CN109034431A (en) | A kind of predetermined management method of highly effective and safe meeting room and system | |
CN108875990A (en) | A kind of on-the-spot meeting intelligence building processing method and system | |
DE112021003971T5 (en) | SUSTAINABLE TOKENS FOR A PRIVACY PROTECTED PROTOCOL SUPPLY CHAIN | |
De Koker et al. | Regulating financial services in an era of technological disruption | |
CN108921316A (en) | A kind of predetermined application method of meeting room and system | |
CN110727734A (en) | Credit information synchronization method based on block chain and credit combined reward and punishment system | |
CN113393240A (en) | Electronic certificate storage system and operation method | |
CN112991121A (en) | Information-based construction management system and method for colleges and universities | |
CN112308484A (en) | Whole-course logistics information sharing method and system, equipment and medium | |
CN111666554A (en) | Certificate authentication method, device, equipment and storage medium | |
CN113239255B (en) | Heterogeneous data resource sharing method and device, computer equipment and medium | |
TW201335900A (en) | Parking space sharing system and method thereof | |
CN109033870A (en) | A kind of meeting room whole process unmanned management method and system | |
CN112199729B (en) | Cone blockchain verification method and system | |
CN114205089A (en) | Block chain-based Mian code authentication method and system | |
DE102020201232A1 (en) | Method and system for reserving public and / or private parking spaces |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |