CN107464053A - A kind of enterprise security hidden danger management system and method - Google Patents

A kind of enterprise security hidden danger management system and method Download PDF

Info

Publication number
CN107464053A
CN107464053A CN201710641526.1A CN201710641526A CN107464053A CN 107464053 A CN107464053 A CN 107464053A CN 201710641526 A CN201710641526 A CN 201710641526A CN 107464053 A CN107464053 A CN 107464053A
Authority
CN
China
Prior art keywords
hidden danger
hidden
troubles
risk source
inventory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710641526.1A
Other languages
Chinese (zh)
Inventor
党杰
刘浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huateng Software (beijing) Information Technology Co Ltd
Original Assignee
Huateng Software (beijing) Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huateng Software (beijing) Information Technology Co Ltd filed Critical Huateng Software (beijing) Information Technology Co Ltd
Priority to CN201710641526.1A priority Critical patent/CN107464053A/en
Publication of CN107464053A publication Critical patent/CN107464053A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0631Resource planning, allocation or scheduling for a business operation
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0639Performance analysis
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis

Abstract

The invention provides a kind of enterprise security hidden danger management system and method.Enterprise security hidden danger management system and method provided by the invention is standardized as basis to keep the safety in production, implement the responsibility that each potential job safety hidden troubles removing is administered, potential safety hazard investigation work is set to enter post routine work arrangement, realize regulation and standardization, informationization, the under-enumeration and drain process of potential safety hazard are effectively prevented, the problem of potential safety hazard management process is broken, emergency cooperative is inconvenient is avoided, reduces security risk, General Promotion safety in production is horizontal, ensures enterprise's production safety.

Description

A kind of enterprise security hidden danger management system and method
Technical field
The invention belongs to technical field of information management, more particularly to a kind of enterprise security hidden danger management system and method.
Background technology
In recent years, downward trend is totally presented in national industrial accident, but situation of production is still severe, various peaces Full accident happens occasionally.Wherein, the various accident potential of production process fail investigation in time and administered, and are to cause accident tragedy to be sent out An important factor for raw.To instruct and specification hidden troubles removing control is carried out in a deep going way, country and Beijing in succession put into effect multinomial Regulation and file, it is desirable to the safety in production main body responsibility of enterprise and the security control responsibility of local people's governments are further implemented, Special campaigns are administered by carrying out hidden troubles removing, investigation administers accident potential and weak link comprehensively, is conscientiously dashed forward existing for solution Go wrong, establish major hazard installation control mechanism and major hidden danger investigation governance mechanism and differentiated control system, effectively take precautions against and Contain the generation of severe and great casualty, promote safety production situation further to stablize and take a turn for the better.
Existing enterprise security hidden danger management is mostly also in papery account controlled state, although or believing potential safety hazard Typing enterprise management system is ceased, but is disconnected in actual management process with the security information in system, easily causes potential safety hazard Fail investigation in time and processing.
The content of the invention
In order to solve the above-mentioned technical problem, the present invention provides a kind of enterprise security hidden danger management system, including hidden troubles removing Information management platform and some user terminals being connected with the hidden troubles removing information management platform;
The hidden troubles removing information management platform includes:
Hidden danger checklist module:For generating hidden troubles removing inventory, and it is clear for user terminal management and inquiry hidden troubles removing It is single;
Patrol record module:For generating position patrol inspection record according to hidden troubles removing inventory, and inquired about for user terminal;
Hidden danger reporting module:For reporting hidden danger for user terminal;
Hidden danger management module:For being assert to hidden danger and being handled;
Communication module:For the information exchange between hidden troubles removing information management platform and user terminal.
Further, the hidden danger management module includes:
Hidden danger assessment unit:For assessing hidden danger;
Hidden danger stage unit:For being classified according to hidden danger assessment result to hidden danger;
Hidden danger processing unit:For determining the Rectification of hidden dangers time limit for user terminal, specifying Rectification of hidden dangers director and check Director;
Rectify and improve administrative unit:For sending rectification notice to rectification director, and receive the hidden danger of rectification director's feedback Rectify and improve information;
Check administrative unit:For sending check notice and Rectification of hidden dangers information to check director, and it is negative to receive check Blame the hidden danger check information of people's feedback;
Hidden danger query unit:For the hidden danger and hidden danger disposition reported for user terminal inquiry.
Further, the hidden danger assessment unit calculates hidden danger and assesses fractional value according to the following formula:
Wherein:M is that hidden danger assesses fractional value, is the number that the hidden danger is reported in one month, is reported for the hidden danger Total degree, the possibility numerical value occurred for this hidden danger reported, the harmfulness numerical value of the hidden danger reported for ith, i= 1st, 2,3 ... n, it is the harmfulness numerical value of this hidden danger reported.
Further, the hidden danger checklist module includes:
Inventory generation unit:For generating hidden troubles removing inventory;
Inventory management unit:For supplying user terminal management hidden troubles removing inventory;
Inventory query unit:For for user terminal inquiry hidden troubles removing inventory.
Further, the inventory generation unit includes:
Hidden danger list and investigation frequency subelement:For determining hidden danger list and its investigation frequency according to risk source class information It is secondary;
Hidden troubles removing post setting subelement:For setting the investigation post of hidden danger for user terminal.
Further, the hidden troubles removing information management platform also includes risk source management module, the risk source management Module includes:
Risk source registration unit:For for user terminal registration risk source;
Risk source assessment unit:Risk source is assessed for providing risk source evaluation criteria, and for user terminal;
Risk source stage unit:For determining risk source grade according to risk source assessment result.
Further, the risk source management module also includes risk source changing unit, and the risk source changing unit is used In for user terminal Change risk source and inquiry risk source change record.
Further, the hidden troubles removing information management platform also includes statistical analysis module, the statistical analysis module Statistics and analysis for hidden troubles removing data.
Further, the hidden troubles removing information management platform also includes evaluation module, and the evaluation module is used for hidden Suffer from investigation and disposition is examined.
Further, the hidden troubles removing information management platform also includes alarm module, and the alarm module is used for not The post hidden troubles removing personnel of energy timely processing hidden danger send prompting and caution signal.
Further, methods described includes:
S1. hidden troubles removing inventory is established;
S2. system generates position patrol inspection record according to hidden troubles removing inventory;
S3. hidden troubles removing personnel record according to position patrol inspection and carry out post hidden danger inspection, find upper syndicate after the hidden danger of post System;
S4. hidden danger is assert and handled.
Further, the step S4 is specifically included:
S41. hidden danger assess and obtain hidden danger assessment fractional value, fractional value assessed according to hidden danger hidden danger is divided Level;
S42. the Rectification of hidden dangers time limit is limited, specifies Rectification of hidden dangers director and check director;
S43. rectify and improve director to complete after rectifying and improving, rectification situation is fed back into system, while push check director;
S44. after checking director's progress field review, check situation is fed back into system, and handle hidden troubles removing and wind up the case.
Further, the hidden danger information of the reporting system includes:Hidden danger title, hidden danger occur possibility numerical value and The harmfulness numerical value of hidden danger.
Further, the hidden danger is assessed fractional value and calculated according to the following formula:
Wherein:M is that hidden danger assesses fractional value, is the number that the hidden danger is reported in one month, is reported for the hidden danger Total degree, the possibility numerical value occurred for this hidden danger reported, the harmfulness numerical value of the hidden danger reported for ith, i= 1st, 2,3 ... n, it is the harmfulness numerical value of this hidden danger reported.
Further, the step S1 is specifically included:
S11. risk source is registered;
S12. risk source is assessed;
S13. risk source is classified;
S14. hidden troubles removing inventory is established according to risk source classification results.
Further, the method assessed risk source is artificial evaluation assessment or LEC evaluation assessments.
Further, methods described also includes:The statistics and analysis of hidden troubles removing data.
Further, methods described also includes:Hidden troubles removing and disposition to each post or each unit are carried out Examination.
Further, methods described also includes:The post hidden troubles removing personnel for failing timely processing hidden danger are reminded And warning.
Compared with prior art, the beneficial effects of the present invention are:
Enterprise security hidden danger management system and method provided by the invention is standardized as basis to keep the safety in production, and implements each hilllock The responsibility that position potential safety hazard investigation is administered, potential safety hazard investigation work is entered post routine work arrangement, realize standardization, mark Standardization, informationization, the under-enumeration and drain process of potential safety hazard are effectively prevented, avoid the fracture of potential safety hazard management process, emergency cooperative The problem of inconvenient, security risk is reduced, General Promotion safety in production is horizontal, ensures enterprise's production safety.
Brief description of the drawings
Fig. 1 is the structural representation of the enterprise security hidden danger management system of the embodiment of the present invention 1;
Fig. 2 is the structural representation of the hidden danger management module of the embodiment of the present invention 2;
Fig. 3 is the structural representation of the hidden troubles removing information management platform of the embodiment of the present invention 3;
Fig. 4 is the structural representation of the hidden troubles removing information management platform of the embodiment of the present invention 4;
Fig. 5 is the flow chart of the enterprise security hidden danger management method of the embodiment of the present invention 5;
Fig. 6 is the step S4 of the embodiment of the present invention 6 flow chart;
Fig. 7 is the step S1 of the embodiment of the present invention 7 flow chart.
Embodiment
Embodiment 1
A kind of enterprise security hidden danger management system, as shown in figure 1, including hidden troubles removing information management platform and with it is described Some user terminals of hidden troubles removing information management platform connection;
The hidden troubles removing information management platform includes:
Hidden danger checklist module:For generating hidden troubles removing inventory, and it is clear for user terminal management and inquiry hidden troubles removing It is single;
Patrol record module:For generating position patrol inspection record according to hidden troubles removing inventory, and inquired about for user terminal;
Hidden danger reporting module:For reporting hidden danger for user terminal;
Hidden danger management module:For being assert to hidden danger and being handled;
Communication module:For the information exchange between hidden troubles removing information management platform and user terminal.
In the present embodiment, user terminal can be fixed terminal, or mobile terminal.It is easy to using mobile terminal Personnel in enterprise is included into hidden troubles removing system, and the investigation of hidden danger can be carried out at any time and reported, is advantageous to The timely discovery of hidden danger.
In the present embodiment, hidden danger checklist module provides for safety manager directly enters or is imported outside system hidden danger The operation interface of inventory is investigated, hidden troubles removing inventory can also be directly generated according to the pre-set programs in system;Hidden troubles removing is clear After single generation, safety manager can be managed by hidden danger checklist module to it, and investigation officer can be clear by hidden danger The hidden danger that single module is inquired about in oneself authority;Patrol record module is set according to the post of hidden troubles removing inventory, investigation frequency etc. Automatically generate patrol record corresponding to each post and be sent to post staff, post staff is according to post Patrol record timing carries out inspection and fills in patrol record on the interface that patrol record module provides;Staff is in inspection After being scented a hidden danger in journey, the timely reporting system in interface that is provided by hidden danger reporting module reports content to include hidden danger position Put, hidden danger description, hidden danger picture, measure etc. before rectification;Hidden danger management module assert and handled to hidden danger, the identification of hidden danger It can be artificial operating process, i.e., preset hidden danger periodicals grading standard in systems, report the staff of hidden danger by hidden danger shape Condition assert that standard is compared with hidden danger and draws hidden danger rank;Can also be some the hidden danger identifications reported during by reporting hidden danger Parameter, then hidden danger rank is drawn by the computing comparison of system.
Embodiment 2
A kind of enterprise security hidden danger management system, as different from Example 1, as shown in Fig. 2 the hidden danger reporting module The hidden danger information reported includes the harmfulness numerical value of hidden danger title, the possibility numerical value that hidden danger occurs and hidden danger;
The hidden danger management module includes:
Hidden danger assessment unit:For assessing hidden danger, hidden danger is calculated according to the following formula and assesses fractional value:
Wherein:M is that hidden danger assesses fractional value, TmThe number being reported for the hidden danger in one month, TyIt is reported for the hidden danger Total degree, AnThe possibility numerical value occurred for this hidden danger reported, BnFor the harmfulness number of this hidden danger reported Value, BiThe harmfulness numerical value of the hidden danger reported for ith, the n of i=1,2,3 ...;
Hidden danger stage unit:For being classified according to hidden danger assessment result to hidden danger;
Hidden danger processing unit:For determining the Rectification of hidden dangers time limit for user terminal, specifying Rectification of hidden dangers director and check Director;
Rectify and improve administrative unit:For sending rectification notice to rectification director, and receive the hidden danger of rectification director's feedback Rectify and improve information;
Check administrative unit:For sending check notice and Rectification of hidden dangers information to check director, and it is negative to receive check Blame the hidden danger check information of people's feedback;
Hidden danger query unit:For the hidden danger and hidden danger disposition reported for user terminal inquiry.
In the present embodiment, the operation interface that hidden troubles removing personnel in post are provided by hidden danger reporting module reports hidden danger name The hidden danger information such as the harmfulness numerical value of title, the possibility numerical value that hidden danger occurs and hidden danger;Hidden danger assessment unit is according to each hidden That suffers from total reports number Ty, report number T in one monthm, occur possibility numerical value A and harmfulness numerical value B calculate it is hidden Suffer from and assess fractional value M, and the influence factor of different personnel is reduced by being modified to harmfulness numerical value B, improve hidden danger and comment Estimate fractional value M accuracy;Hidden danger stage unit is classified according to the result of calculation of hidden danger assessment unit to hidden danger, and will be divided Level result is sent to safety management personnel;Safety management personnel is true in the operation interface that hidden danger processing unit provides Determine the Rectification of hidden dangers time limit, specify Rectification of hidden dangers director and check director;It is whole to rectification director's transmission to rectify and improve administrative unit Change notice, and check signal is sent to check administrative unit after the Rectification of hidden dangers information of rectification director's feedback is received;Check Administrative unit sends check notice and Rectification of hidden dangers information to check director, and is answered in the hidden danger for receiving check director's feedback Look into the processing routine of the end of message hidden danger.
Embodiment 3
A kind of enterprise security hidden danger management system, as different from Example 1, as shown in figure 3, the hidden troubles removing information Management platform also includes risk source management module, and the risk source management module includes:
Risk source registration unit:For for user terminal registration risk source;
Risk source assessment unit:Risk source is assessed for providing risk source evaluation criteria, and for user terminal;
Risk source stage unit:For determining risk source grade according to risk source assessment result.
Risk source changing unit:For for user terminal Change risk source and inquiry risk source change record
The hidden danger checklist module includes:
Inventory generation unit:For generating hidden troubles removing inventory, the hidden troubles removing inventory includes hidden danger list, hidden danger is arranged Inspect the sentries position and the hidden troubles removing frequency;
Inventory management unit:For supplying user terminal management hidden troubles removing inventory;
Inventory query unit:For for user terminal inquiry hidden troubles removing inventory;
Wherein, the inventory generation unit includes:
Hidden danger list and investigation frequency subelement:For determining hidden danger list and its investigation frequency according to risk source class information It is secondary;
Hidden troubles removing post setting subelement:For setting the investigation post of hidden danger for user terminal.
In the present embodiment, the risk source evaluation criteria can be artificial evaluation assessment or LEC evaluation assessments.
Embodiment 4
A kind of enterprise security hidden danger management system, as different from Example 1, as shown in figure 4, the hidden troubles removing information Management platform also includes:
Statistical analysis module:Statistics and analysis for hidden troubles removing data;
Evaluation module:For being examined to hidden troubles removing and disposition;
Alarm module:For sending prompting and caution signal to the post hidden troubles removing personnel for failing timely processing hidden danger.
Embodiment 5
A kind of enterprise security hidden danger management method, as shown in figure 5, including:
S1. hidden troubles removing inventory is established;
S2. system generates position patrol inspection record according to hidden troubles removing inventory;
S3. hidden troubles removing personnel record according to position patrol inspection and carry out post hidden danger inspection, find upper syndicate after the hidden danger of post System;
S4. hidden danger is assert and handled.
In the present embodiment, check criteria of the foundation of hidden troubles removing inventory according to each enterprise, the mode of foundation can be Directly enter, import or directly generated according to the program in system outside system;System is supported to hidden troubles removing inventory template Foundation, inventory inspection project, thin item, the maintenance for investigating standard content, the local directed complete set of hidden troubles removing inventory can be also carried out, it is new to adjust Whole inventory can realize the matching with post automatically;The matching in hidden troubles removing inventory and post can carry out artificial simultaneously in typing Selection matching, can also automatically form our unit post by data of the system based on enterprise position storehouse, then on this basis to each Investigation inventory corresponding to individual Postmatch.
System can patrol according to corresponding to the settings such as the post of hidden troubles removing inventory, the investigation frequency automatically generate each post Inspection record, staff should carry out inspection according to the patrol record timing in respective post and fill in patrol record;Staff After being scented a hidden danger during inspection, timely reporting system, content is reported to include hidden danger position, hidden danger description, hidden danger figure Measure etc. before piece, rectification.
The identification of hidden danger can be artificial operating process, i.e., preset hidden danger periodicals grading standard in systems, report hidden danger Staff hidden danger situation and hidden danger assert that standard is compared draw hidden danger rank;When can also be by reporting hidden danger Some hidden danger reported assert parameter, then draw hidden danger rank by the computing comparison of system.
Embodiment 6
A kind of enterprise security hidden danger management method, as different from Example 5, as shown in fig. 6, the step S4 is specifically wrapped Include:
S41. hidden danger assess and obtain hidden danger assessment fractional value, and fractional value assessed according to hidden danger hidden danger is divided Level;
The hidden danger is assessed fractional value and calculated according to the following formula:
Wherein:M is that hidden danger assesses fractional value, TmThe number being reported for the hidden danger in one month, TyIt is reported for the hidden danger Total degree, AnThe possibility numerical value occurred for this hidden danger reported, BnFor the harmfulness number of this hidden danger reported Value, BiThe harmfulness numerical value of the hidden danger reported for ith, the n of i=1,2,3 ...;
S42. the Rectification of hidden dangers time limit is limited, specifies Rectification of hidden dangers director and check director;
S43. rectify and improve director complete rectification after, rectification situation is fed back into system, to deadline Rectification of hidden dangers time, Measures to rectify and reform are registered with scheme, rectification expense, rectification scene photograph, while push check director;
S44. after checking director's progress field review, check situation is fed back into system, fills in check opinion, uploaded existing Field photo, and handle hidden troubles removing and wind up the case.
In the present embodiment, what the identification of hidden danger was taken is to calculate hidden danger to assess fractional value M and assess fraction according to hidden danger The method that value M is classified to hidden danger, hidden danger assess fractional value M and the hidden danger it is total report number Ty, reporting in one month Number Tm, possibility numerical value A that hidden danger occurs and hidden danger harmfulness numerical value B it is related;The possibility number that wherein hidden danger occurs Value A and the harmfulness numerical value B of hidden danger can influence hidden danger assessment point due to personnel's influence factor unavoidably by reporting personnel to make a report on Numerical value M, therefore, in the present embodiment take with reference to all previous reported data before same hidden danger to enter to the harmfulness numerical value B of hidden danger The method of row amendment, eliminates as much as personnel's influence factor, improves the accuracy that hidden danger assesses fractional value M.
Hidden danger rank assesses fractional value M by hidden danger and determines that concrete condition is shown in Table 1.
The hidden danger grade scale of table 1
Hidden danger assesses fractional value M Hidden danger rank Disposal requires
> 150 One-level It is stopped immediately
70~150 Two level Rectify and improve immediately
25~70 Three-level Need to rectify and improve
8~25 Level Four It should be noted
< 8 Pyatyi It can receive
The possibility numerical value A and the harmfulness numerical value B of hidden danger normative reference that hidden danger occurs are shown in Table 2 and table 3. respectively
The possibility numerical value A of table 2 normative reference
The possibility that hidden danger occurs Possibility numerical value A
Completely it is anticipated that 10
Quite may 6
May, but infrequently 3
Possibility is small 1
It is extremely impossible 0.5
It is actual impossible 0.01
The harmfulness numerical value B of table 3 normative reference
Hidden danger hazard analysis and HACCP Harmfulness numerical value B
It is dead more than 4 people 100
2-4 people is dead 40
1 people is dead 15
Someone is severely injured 7
Someone is disabled 3
Someone's injury needs to give first aid to 1
In the present embodiment, when Rectification of hidden dangers, which runs into special circumstances (such as bad weather), is unable to timely processing, can apply Delay, need during application for adjournment to fill in delay time and the extension origin of an incident;After submission, Security Officer audits to extension, audits The time is rectified and improved into the restriction for changing Rectification of hidden dangers after.
Embodiment 7
A kind of enterprise security hidden danger management method, as different from Example 5, as shown in fig. 7, the step S1 is specifically wrapped Include:
S11. risk source is registered;
S12. risk source is assessed;
S13. risk source is classified;
S14. hidden troubles removing inventory is established according to risk source classification results.
In the present embodiment, the foundation of hidden troubles removing inventory is according to risk source classification results.Firstly the need of stepping in systems Remember risk source;Then identification assessment is carried out to risk source level, its property is judged, on harm caused by possibility and influenceed Prevented in advance, to ensure the safety and stability of production;Risk source is classified according to risk source level assessment result again;Most Hidden danger list and its investigation frequency and investigation post are determined according to risk source classification results afterwards, and it is clear with this to establish hidden troubles removing It is single.Typically according to risk source classification results, the risk source delimited higher than some risk class fully enters hidden danger list;And wind Dangerous source harmful grade is higher, and the investigation frequency is higher.
Risk source appraisal procedure in the present embodiment is artificial evaluation assessment or LEC evaluation assessments.
In the present embodiment, the risk source registered in system can be increased according to actual conditions, changed and be deleted.But look forward to Industry should formulate change management system, and the process of change is managed, and retain change record, and inform and train related work people Member.
Embodiment 8
A kind of enterprise security hidden danger management method, as different from Example 5, methods described also includes:Hidden troubles removing number According to statistics and analysis.
In the present embodiment, it is possible to collecting for hidden troubles removing data is realized, according to hidden danger quantity, rank, classification and generation Reason carries out automatic statistical analysis and generation statistical report form.In the accumulation of hidden troubles removing data, system can mainly collect to hidden danger In analyzed in which inspection project of hidden troubles removing inventory, moreover it is possible to realize and data and figure carried out to hidden danger type, risk Conformal analysis.
In the present embodiment, methods described also includes:Hidden troubles removing and disposition to each post or each unit Examined.Examination standards of grading be:100 points of basis point;Performance assessment criteria include exceeding the time limit it is untreated, exceed the time limit not assert, not by row Look into the frequency and investigate three aspects;Its weight is respectively:1 point is not detained every time by investigation frequency investigation;Exceed the time limit not assert button 2 every time Point;One-level hidden danger exceed the time limit it is untreated every time button 8 points, more than 3 working days, daily increase button 1 point;Two level hidden danger is examined with monthly In the cycle, untreated 5 points of button every time, on more than 3 working days, increase 1 point of button daily;Three-level system hidden danger was examined with monthly as the cycle, Untreated 3 points of button every time, on more than 3 working days, increases 1 point of button daily;Simultaneity factor captured above-mentioned again from monthly 1 day automatically Performance assessment criteria, and add up, real-time display score value.
In the present embodiment, methods described also includes:The post hidden troubles removing personnel for failing timely processing hidden danger are carried out Remind and alert.By sending prompting and caution signal, hidden troubles removing personnel in post are avoided to ignore or forget the processing to hidden danger.
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention and it is unrestricted, although reference The present invention is described in detail for preferred embodiment, it will be understood by those within the art that, can be to the present invention's Technical scheme is modified or equivalent substitution, and without departing from the spirit and scope of technical solution of the present invention, it all should cover Among scope of the presently claimed invention.

Claims (17)

  1. A kind of 1. enterprise security hidden danger management system, it is characterised in that the system include hidden troubles removing information management platform with And some user terminals being connected with the hidden troubles removing information management platform;
    The hidden troubles removing information management platform includes:
    Hidden danger checklist module:For generating hidden troubles removing inventory, and for user terminal management and inquiry hidden troubles removing inventory;
    Patrol record module:For generating position patrol inspection record according to hidden troubles removing inventory, and inquired about for user terminal;
    Hidden danger reporting module:For reporting hidden danger for user terminal;
    Hidden danger management module:For being assert to hidden danger and being handled;
    Communication module:For the information exchange between hidden troubles removing information management platform and user terminal.
  2. 2. system according to claim 1, it is characterised in that the hidden danger management module includes:
    Hidden danger assessment unit:For assessing hidden danger;
    Hidden danger stage unit:For being classified according to hidden danger assessment result to hidden danger;
    Hidden danger processing unit:For determining the Rectification of hidden dangers time limit for user terminal, specifying Rectification of hidden dangers director and check to be responsible for People;
    Rectify and improve administrative unit:For sending rectification notice to rectification director, and receive the Rectification of hidden dangers of rectification director's feedback Information;
    Check administrative unit:For sending check notice and Rectification of hidden dangers information to check director, and receive check director The hidden danger check information of feedback;
    Hidden danger query unit:For the hidden danger and hidden danger disposition reported for user terminal inquiry.
  3. 3. system according to claim 2, it is characterised in that the hidden danger assessment unit calculates hidden danger according to the following formula Assess fractional value:
    <mrow> <mi>M</mi> <mo>=</mo> <mo>&amp;lsqb;</mo> <msub> <mi>T</mi> <mi>m</mi> </msub> <mo>+</mo> <mn>0.1</mn> <mrow> <mo>(</mo> <msub> <mi>T</mi> <mi>y</mi> </msub> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> <mo>&amp;rsqb;</mo> <mo>&amp;CenterDot;</mo> <msub> <mi>A</mi> <mi>n</mi> </msub> <mo>&amp;CenterDot;</mo> <mo>&amp;lsqb;</mo> <msub> <mi>B</mi> <mi>n</mi> </msub> <mo>+</mo> <mfrac> <mn>1</mn> <mrow> <mi>n</mi> <mo>-</mo> <mn>1</mn> </mrow> </mfrac> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>i</mi> <mo>=</mo> <mn>1</mn> </mrow> <mrow> <mi>n</mi> <mo>-</mo> <mn>1</mn> </mrow> </munderover> <mrow> <mo>(</mo> <msub> <mi>B</mi> <mi>n</mi> </msub> <mo>-</mo> <msub> <mi>B</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <mo>&amp;rsqb;</mo> </mrow>
    Wherein:M is that hidden danger assesses fractional value, TmThe number being reported for the hidden danger in one month, TyIt is reported for the hidden danger total Number, AnThe possibility numerical value occurred for this hidden danger reported, BiThe harmfulness numerical value of the hidden danger reported for ith, i =1,2,3 ... n, BnFor the harmfulness numerical value of this hidden danger reported.
  4. 4. system according to claim 1, it is characterised in that the hidden danger checklist module includes:
    Inventory generation unit:For generating hidden troubles removing inventory;
    Inventory management unit:For supplying user terminal management hidden troubles removing inventory;
    Inventory query unit:For for user terminal inquiry hidden troubles removing inventory.
  5. 5. system according to claim 4, it is characterised in that the inventory generation unit includes:
    Hidden danger list and investigation frequency subelement:For determining hidden danger list and its investigation frequency according to risk source class information;
    Hidden troubles removing post setting subelement:For setting the investigation post of hidden danger for user terminal.
  6. 6. system according to claim 1, it is characterised in that the hidden troubles removing information management platform also includes risk source Management module, the risk source management module include:
    Risk source registration unit:For for user terminal registration risk source;
    Risk source assessment unit:Risk source is assessed for providing risk source evaluation criteria, and for user terminal;
    Risk source stage unit:For determining risk source grade according to risk source assessment result.
  7. 7. system according to claim 6, it is characterised in that the risk source management module also includes risk source Request for Change Member, the risk source changing unit are used for for user terminal Change risk source and inquiry risk source change record.
  8. 8. system according to claim 1, it is characterised in that the hidden troubles removing information management platform also includes statistical Module is analysed, the statistical analysis module is used for the statistics and analysis of hidden troubles removing data.
  9. A kind of 9. enterprise security hidden danger management method, it is characterised in that methods described includes:
    S1. hidden troubles removing inventory is established;
    S2. system generates position patrol inspection record according to hidden troubles removing inventory;
    S3. hidden troubles removing personnel record according to position patrol inspection and carry out post hidden danger inspection, find reporting system after the hidden danger of post;
    S4. hidden danger is assert and handled.
  10. 10. according to the method for claim 9, it is characterised in that the step S4 is specifically included:
    S41. hidden danger assess and obtain hidden danger assessment fractional value, assess fractional value according to hidden danger is classified to hidden danger;
    S42. the Rectification of hidden dangers time limit is limited, specifies Rectification of hidden dangers director and check director;
    S43. rectify and improve director to complete after rectifying and improving, rectification situation is fed back into system, while push check director;
    S44. after checking director's progress field review, check situation is fed back into system, and handle hidden troubles removing and wind up the case.
CN201710641526.1A 2017-07-31 2017-07-31 A kind of enterprise security hidden danger management system and method Pending CN107464053A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710641526.1A CN107464053A (en) 2017-07-31 2017-07-31 A kind of enterprise security hidden danger management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710641526.1A CN107464053A (en) 2017-07-31 2017-07-31 A kind of enterprise security hidden danger management system and method

Publications (1)

Publication Number Publication Date
CN107464053A true CN107464053A (en) 2017-12-12

Family

ID=60547802

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710641526.1A Pending CN107464053A (en) 2017-07-31 2017-07-31 A kind of enterprise security hidden danger management system and method

Country Status (1)

Country Link
CN (1) CN107464053A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108364111A (en) * 2017-12-25 2018-08-03 石雷 Information system is administered in hidden troubles removing
CN108388998A (en) * 2018-03-09 2018-08-10 四川安信科创科技有限公司 Business risk managing and control system and method
CN108830481A (en) * 2018-06-13 2018-11-16 华中科技大学 A kind of construction safety dynamic evaluation method based on security risk
CN109726207A (en) * 2019-01-03 2019-05-07 华腾软科(北京)信息技术有限公司 A kind of identification of dangerous source and management system
CN110020791A (en) * 2019-03-19 2019-07-16 杭州全视软件有限公司 A kind of product design method based on liability management
CN110070275A (en) * 2019-04-08 2019-07-30 合肥安玛尔市场信息咨询有限公司 A kind of data acquisition and management system based on Urban Governance mode

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880802A (en) * 2012-09-25 2013-01-16 浙江图讯科技有限公司 Fatal danger fountainhead analysis and evaluation method for safety production cloud service platform system facing industrial and mining enterprises
CN104376430A (en) * 2014-11-28 2015-02-25 东莞中国科学院云计算产业技术创新与育成中心 Hidden risk management system based on cloud service platform and implementing method of hidden risk management system
CN104573971A (en) * 2015-01-22 2015-04-29 山东烟台鑫泰黄金矿业有限责任公司 Metal mine underground safety digital management system based on radio frequency and WIFI technology

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880802A (en) * 2012-09-25 2013-01-16 浙江图讯科技有限公司 Fatal danger fountainhead analysis and evaluation method for safety production cloud service platform system facing industrial and mining enterprises
CN104376430A (en) * 2014-11-28 2015-02-25 东莞中国科学院云计算产业技术创新与育成中心 Hidden risk management system based on cloud service platform and implementing method of hidden risk management system
CN104573971A (en) * 2015-01-22 2015-04-29 山东烟台鑫泰黄金矿业有限责任公司 Metal mine underground safety digital management system based on radio frequency and WIFI technology

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108364111A (en) * 2017-12-25 2018-08-03 石雷 Information system is administered in hidden troubles removing
CN108388998A (en) * 2018-03-09 2018-08-10 四川安信科创科技有限公司 Business risk managing and control system and method
CN108830481A (en) * 2018-06-13 2018-11-16 华中科技大学 A kind of construction safety dynamic evaluation method based on security risk
CN109726207A (en) * 2019-01-03 2019-05-07 华腾软科(北京)信息技术有限公司 A kind of identification of dangerous source and management system
CN110020791A (en) * 2019-03-19 2019-07-16 杭州全视软件有限公司 A kind of product design method based on liability management
CN110070275A (en) * 2019-04-08 2019-07-30 合肥安玛尔市场信息咨询有限公司 A kind of data acquisition and management system based on Urban Governance mode

Similar Documents

Publication Publication Date Title
CN107464053A (en) A kind of enterprise security hidden danger management system and method
CN107451732A (en) A kind of enterprise safety operation total management system and method
CN104361419A (en) Electric transmission and transformation equipment state monitoring defect management system and method based on regulation and control integration
CN201508482U (en) Waste water processing real time monitoring system
CN105243518A (en) Municipal engineering measurement management system and method thereof
CN102195813A (en) Method and device for intelligently creating operation and maintenance worksheet
CN105160462B (en) A kind of raw material of reinforcement rebar information of precast concrete is automatically integrating device and method
CN102437644A (en) Distribution transformer long-distance monitoring system based on GPRS (general packet radio service)
CN103077437A (en) System for checking and reforming hidden dangers of safety production
CN103455845B (en) A kind of method controlling product quality with standard
CN107843765A (en) A kind of voltage monitoring instrument and its raising data report examination promptness rate percentage of head rice method
CN112148777A (en) Data acquisition system based on edge calculation
CN106600416A (en) Artificial intelligence (AI) mutual sharing system
CN103984043B (en) A kind of Atmospheric Composition Watch And system
CN101650788A (en) Method and system for electronic monitoring of administrative operations
CN110738458A (en) Engineering cost management system and method
CN109657926A (en) O&amp;M closed-loop management method
CN111598411A (en) Intelligent safety control system for operation site of transformer substation
CN102890795A (en) System and method for accounting production working hours of workshop
CN110865624A (en) Real-time monitoring system for automatic production
CN206363355U (en) The supervisory systems of detection process or production process
CN106204391A (en) A kind of system being applied to administrative law-enforcement departments&#39; routine monitoring
CN103679335A (en) Process safety performance index managing and calculating method
CN108229699A (en) A kind of Chinese medicine extractor management method
CN210924276U (en) Real-time monitoring system for automatic production

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171212