CN108229174A - Security risk management system and management method based on cloud data - Google Patents

Security risk management system and management method based on cloud data Download PDF

Info

Publication number
CN108229174A
CN108229174A CN201711462349.7A CN201711462349A CN108229174A CN 108229174 A CN108229174 A CN 108229174A CN 201711462349 A CN201711462349 A CN 201711462349A CN 108229174 A CN108229174 A CN 108229174A
Authority
CN
China
Prior art keywords
data
information
hidden danger
data center
quick response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711462349.7A
Other languages
Chinese (zh)
Inventor
王文
张勇敢
张维佳
吴波
张日明
芦碧波
任保国
惠宇
张睿
周欢
刘航
闫文娟
姜龙
王治国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Sunny Technology Development Co Ltd
Original Assignee
Shaanxi Sunny Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Sunny Technology Development Co Ltd filed Critical Shaanxi Sunny Technology Development Co Ltd
Priority to CN201711462349.7A priority Critical patent/CN108229174A/en
Publication of CN108229174A publication Critical patent/CN108229174A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device

Abstract

The present invention relates to a kind of security risk management systems and management method based on cloud data, mainly solve existing test mode of high cost, inefficiency, inspection be not thorough not comprehensively, be unable to the problems such as Correct Analysis entirety hidden danger situation, which includes mobile terminal, PC ends, high in the clouds data center and Quick Response Code;Quick Response Code is fixed or is shown on monitored object, and the object that is monitored includes equipment, place and event location;The information of Quick Response Code includes internet access address and/or master data, and master data includes accident details, history checks situation, emphasis inspection item, hidden danger endangers and/or hidden danger processing scheme;Mobile terminal includes camera, satellite positioning module, communication module and touch screen, and camera is used to identify the Quick Response Code;Communication module is connect with high in the clouds data center, the information of acquisition for mobile terminal is transferred to high in the clouds data center, PC ends are connect with high in the clouds data center, and the data of acquisition are stored and processed.

Description

Security risk management system and management method based on cloud data
Technical field
The present invention relates to safety management fields, and in particular to a kind of security risk management system and management based on cloud data Method.
Background technology
With the development of economy, safety in production becomes state key Focus Area, and hidden troubles removing also becomes the most important thing, Internet and disparate networks cover comprehensively substantially at present, intelligent mobile terminal (including mobile phone, PAD) also human hand one substantially, Safety in production can be made information-based using these conditions, hidden troubles removing high efficiency, mobile, intelligence become a reality.
Existing hidden troubles removing method is slowly changed to information system, mobile terminal from papery report, hand inspection, but is turned Change be not thorough not perfect and less efficient, execution method ossify, cost it is higher, such as check venue location whether have wireless network, 3G/4G networks etc., the system for being limited to mobile terminal;Android or the system for being only applicable to IOS are such as only applicable to, it is each to be Data sharing is unable between the APP of system;It is such as limited to need fixed handheld terminal, it is impossible to by mobile APP in arbitrary intelligent sliding It is used in dynamic terminal;It can only be taken pictures when checking to checking equipment, writing record etc., need manually to go to judge by rule of thumb, It is unable to intelligent analysis;It needs to be checked according to standing plans, and by professional for checking;Disadvantages described above causes existing Test mode is of high cost, inefficiency, inspection be not thorough not comprehensively, even if having checked can not Correct Analysis entirety hidden danger situation The problems such as.
Invention content
Present invention aim to address existing test mode is of high cost, inefficiency, inspection be not thorough not comprehensively, Bu Nengzheng Really the problems such as analysis entirety hidden danger situation, a kind of security risk management system and management method based on cloud data are provided.
Technical proposal that the invention solves the above-mentioned problems is:
A kind of security risk management system based on cloud data, including mobile terminal, PC ends and high in the clouds data center, is also wrapped Include Quick Response Code;The Quick Response Code is fixed or is shown on monitored object and corresponded with it, and the monitored object includes Equipment, place and event location;The information of the Quick Response Code includes internet access address and/or master data, described basic Data include accident details, history checks situation, emphasis inspection item, hidden danger endangers and/or hidden danger processing scheme;It is described Mobile terminal includes camera, satellite positioning module, communication module and touch screen, and the camera is used to identify the two dimension Code;The communication module is connect with high in the clouds data center, and the information of acquisition for mobile terminal is transferred to high in the clouds data center, PC ends Data center connect with high in the clouds, and the data of acquisition are stored and processed, and PC ends are equipped with intelligence learning reptile, and the intelligence is learned Reptile is practised according to demand to the information of hidden troubles removing system on the internet into line search, and intelligently cleans, store and learns.
Further, the high in the clouds data center includes photo automatic identification module, master database and volatile data base; The master database includes master data and without hidden danger situation example picture data;The volatile data base includes real-time Internet of Things Network data and/or e-learning data.
Meanwhile the present invention also provides a kind of security risk management method based on cloud data, include the following steps:
1) master database and management system are established:
1.1) master data, address information and the photographic intelligence of monitored object are collected, the master data includes accident Details, history check situation, emphasis inspection item, hidden danger harm and/or hidden danger processing scheme;
1.2) master data, address information and photographic intelligence are uploaded to high in the clouds data center, pass through intelligence learning reptile To the master data, address information and photographic intelligence of acquisition on the internet into line search, and intelligently clean, store and study;
1.3) it generates and by the one-to-one Quick Response Code of monitored object;
1.4) Quick Response Code is fixed or including on monitored object;
2) it monitors:
2.1) mobile terminal scans the two-dimensional code at any time;
2.2) safe condition is uploaded into high in the clouds data center;
2.3) high in the clouds data center record security status data;
2.4) high in the clouds data center judges whether security risk occur, and information warning is sent if occurring.
Further, step is further included:3) high in the clouds data center includes normal to mobile terminal feedback information, described information Or information warning.
Further, step 2.4) medium cloud end data center judges whether that security risk occur specifically comprises the following steps:
2.4.1) to checking that item is associated;
2.4.2) photo content and example are contrasted;
2.4.3) hidden danger implied in photo is identified.
Further, the safe condition in step 2.2) includes normal condition and hidden danger situation.
Further, the generation of the Quick Response Code includes the generation of high in the clouds data center, monitored object generation or movement eventually End generation.
Advantages of the present invention is:
1. the present invention thoroughly incorporates planar bar code technology in hidden danger management overall flow, the series connection and implementation of flow are played Efficiently succinct effect.
2. the present invention realizes the comprehensive intelligence accumulation of hidden troubles removing data and collects, formed complete, perfect, high quality Hidden troubles removing cloud data center provides data for related industry chain and supports.
3. the present invention realizes hidden troubles removing management intellectual analysis function, user of service only needs simple operations, and system can carry Inspection scheme, check process for science etc., avoid work repeated work, and to may from the offers such as hidden danger, risk it is pre- Estimate, and prediction scheme is provided, in the non-review time, system automatically provides hidden troubles removing early warning and simulation.
During 4. photo match cognization technology is used hidden troubles removing by the method for the present invention, hidden danger management is made to check more Intelligence is convenient.
5. the present invention realizes that the download of arbitrary handheld terminal uses, real existing network and without all can be used under network condition.
6. the present invention realizes that layman carries out professional inspection, and ensure the accuracy of inspection result, integrality and Standard.
7. entirety hidden danger management of the invention is simple, efficient, intelligence, it is greatly improved and checks efficiency, reduce cost, contain and disappear Go out enterprise production and public life present in hidden danger, a piece of Lang Lang blue skies of also keeping the safety in production.
Description of the drawings
Fig. 1 is present system composition figure.
Specific embodiment
Present disclosure is described in further detail below in conjunction with the drawings and specific embodiments:
A kind of security risk management system based on cloud data as shown in Figure 1, including mobile terminal, PC ends, high in the clouds number According to center and Quick Response Code;Quick Response Code is fixed or is shown on monitored object and corresponded with it, and monitored object includes setting Standby, place and event location;The information of Quick Response Code includes internet access address and/or master data, and master data includes thing Therefore details, history check situation, emphasis inspection item, hidden danger harm and/or hidden danger processing scheme;Mobile terminal includes taking the photograph As head, satellite positioning module, communication module and touch screen, camera is used to identify the Quick Response Code;Communication module and high in the clouds number It is connected according to center, the information of acquisition for mobile terminal is transferred to high in the clouds data center, PC ends are connect with high in the clouds data center, to obtaining The data taken are stored and processed, and PC ends are connect with high in the clouds data center, and the data of acquisition are stored and processed, PC ends Equipped with intelligence learning reptile, the intelligence learning reptile according to demand searches the information of hidden troubles removing system on the internet It seeks, and intelligently cleans, stores and learn, Quick Response Code is fixed or is shown on different inspection item positions, according to there are hidden Suffer from and safety in production weak link is divided into 2 major class, 13 group, corresponded with the check item of each production-operation unit.
High in the clouds data center includes photo automatic identification module, master database and volatile data base;Master database packet Include master data and without hidden danger situation example picture data;Volatile data base includes real-time Internet of Things data and/or e-learning Data.System provides common inspection equipment, place etc. without hidden danger situation example photo, and photo is carried out by machine learning techniques Recognition memory, inspection personnel provides according to specification checks photo, system intellectual analysis, to checking that item is associated, and compare Piece content is contrasted with example, and the hidden danger implied in photo is identified.
Meanwhile the present invention also provides a kind of security risk management method based on cloud data, include the following steps:
1) master database and management system are established:
1.1) master data, address information and the photographic intelligence of monitored object are collected, it is detailed that master data includes accident Information, history check situation, emphasis inspection item, hidden danger harm and/or hidden danger processing scheme;
Data collection means are divided into two major class, and one kind is that web crawlers collects associated safety hidden danger pipe in internet automatically Information is managed, one kind is to be collected by system using unit associated safety hidden danger management information, and collected information is according to time, thing Part, enterprises ' industry, hidden danger management content etc. are classified, and are corresponded with Quick Response Code classification, data collection includes correlation Enterprise's master data of unit, special equipment, personal information, security system, related license, equipment library, experts database, resources bank, The information such as special equipment information, accident treatment prediction scheme, and examined comprising its current check, to mark inspection, examination of law enforcement, main body responsibility It looks into, the detailed history information of accident treatment etc.;With associated safety hidden danger information in the upload of security risk inspection information, network Collection, Various types of data is included in hidden danger prediction model by system, hidden danger causes calamity trend evolution model, hidden danger causes calamity Governance Model etc. Algorithm model, and machine learning is carried out, data analysis meter is calculated, all kinds of hidden danger, disaster can be predicted in real time, to hidden Suffer from can caused by disaster carry out real simulation, and provide optimization process prediction scheme;
1.2) master data, address information and photographic intelligence are uploaded to high in the clouds data center, pass through intelligence learning reptile To the master data, address information and photographic intelligence of acquisition on the internet into line search, and intelligently clean, store and study;
1.3) by hidden danger management project generate respectively with the one-to-one Quick Response Code of monitored object, generate the side of Quick Response Code Formula includes the generation of high in the clouds data center, monitored object generation or mobile terminal generation;
1.4) Quick Response Code is fixed or including on the specific location of monitored device, place and dependent event;
2) it monitors:
2.1) mobile terminal scans the two-dimensional code at any time, and obtain distinct device, place, event current condition information;This Locate information two classes of classification, one kind is to obtain the existing feelings for being capable of information-based equipment, place, system in real time by technology of Internet of things Condition is obtained, and one kind is to include the inspection items such as institutional improvement, safety in production organizational framework to the project that needs check to carry out It checks and reminds;
2.2) safe condition is uploaded into high in the clouds data center, safe condition includes normal condition, hidden danger situation and emphasis inspection Look into item;
2.3) high in the clouds data center record security status data;The project checked and project real time status will be needed to upload Afterwards, system is analyzed by built hidden troubles removing intelligent analytical model, automatically analyze the inspection item with the presence or absence of hidden danger or Person also needs to which entry emphasis checks, further to carry out Analysis of Potential or inspection;
2.4) high in the clouds data center judges whether security risk occur, and information warning is sent if occurring;If specially go out Safe condition is transmitted to particular device or terminal by existing security risk or emphasis inspection item, data center;In the data of high in the clouds The heart judges whether that security risk occur specifically comprises the following steps:
2.4.1) to checking that item is associated;
2.4.2) photo content and example are contrasted;
2.4.3) hidden danger implied in photo is identified.
3) high in the clouds data center includes normal or information warning to mobile terminal feedback information, information.
System initially sets up complete, high quality hidden troubles removing large data center, as core, relies at distribution Reason, distributed data base and cloud storage virtualization technology, the data come to collection carry out distributed data digging, carry out profession Change is handled, and data is made to become information assets.
System is equipped with hidden troubles removing system intelligence learning reptile, and reptile is according to the demand of setting to the mark of hidden troubles removing system Quasi- check item, the scope of examination, hidden danger identification, laws and regulations, Control of Hidden, prediction scheme, risk lighting relevant knowledge are on the internet It into line search, and intelligently cleans, store and learns, manually provide powerful theory for hidden troubles removing and operation is supported.System is led to Cross the arrangement study that study reptile carries out internet knowledge, uploaded with reference to the data of system user of service, by machine learning and Intellectual analysis, the corresponding association being standardized to relevant information.It such as takes pictures when inspection personnel carries out simple operations, select inspection Place, selection inspection equipment etc. are looked into, network analysis history inspection record and the monitoring data obtained in real time are made newest at once Inspection and evaluation is shielded without check item, provides new suggestion from procuratorial organ and project, and give risk to related hidden danger that may be present Assessment and prediction scheme setting, system also provide non-inspection period risk and must verification certificate position, place, apparatus suggested, pass through history inspection Data, real-time Internet of Things data and e-learning data carry out intellectual analysis acquisition.
Expanding data source, system user cover all ordinary persons, including enterprise (unit, self-employed worker etc.), common public affairs Many users, all kinds of government department users etc., all users, which collect the information concluded, can carry out analysis storage;Integrated Internet of Things is set Standby information, including sensors such as all kinds of temperature, humidity, wind speed;The information such as integrated industrial production system, monitoring system;Largely Data source provides reliable guarantee for all kinds of intellectual analysis of hidden troubles removing;User is according to actual conditions and operation flow to checking oneself certainly Report, main body duty fulfillment, major hazard source, hidden troubles removing, hang out one's shingle supervise and direct, report accept, the functions such as risk prevention system are manipulated, Form user data;System by technology of Internet of things to sorts of systems it is administrative under various kinds of equipment, sensor etc. counted in real time According to collection formation networking monitoring data;System realization integrates all types of industries production system, monitoring system, and it is raw to form industry Produce data;System is collected arrangement to hidden troubles removing data related present on network by web crawlers and machine learning and learns It practises, forms internet data, system carries out classification model construction to all data into system, formed in hidden troubles removing big data The heart.
System increases system deployment occupation mode, and system can carry out server in the systems such as Windows, Linux, Unix Hold installation and deployment;User uses all kinds of Intelligent mobile equipments according to self-condition, and the system type of unlimited intelligent mobile terminal is right There is corresponding installation procedure in the systems such as Android, IOS, Windows phone, for Windows, Linux, Unix etc. System supports client and use and the installation and deployment of server end, user to install government end, enterprise respectively according to self-role End and public end do not have particular/special requirement in PC end systems for displaying browser, and arbitrary browser can be carried out showing and grasp Make.The Quick Response Code of all kinds of enterprises (unit, self-employed worker), equipment, article, event etc. automatically generates, and is swept when using mobile client When retouching respective two-dimensional code, there are the details of all kinds of affairs, history checks situation, emphasis inspection item, hidden danger endanger, hidden danger The information such as processing scheme are in case use.
Layman's hidden troubles removing abatement functions are provided, when mobile terminal is used to carry out hidden troubles removing, for corresponding Things, real time information that system is provided according to historical information, currently carries out automatic hidden troubles removing, and identification hidden danger simultaneously provides correlation Inspection scheme (such as emphasis check item, without check item etc.);The set photograph taking side that user can also provide according to system Case takes pictures to the equipment that checks of needs, place, and system carries out analysis inspection by intelligent photo analysis module to passed photo Look into, can there are affairs, check item, hidden danger points etc. in automatic identification photo, inspection, which finishes, can automatically provide audit report, and Blue-tooth printer can be connected and carry out report printing.
It provides public user to clap conveniently and look into function conveniently, arbitrary user does not need to system login, only need to install or use Wechat public platform, when finding that anywhere there are hidden danger, can take photos and upload, system automatically analyzes matching photographic intelligence, It will change and check that information is included in hidden troubles removing process flow, and be transmitted if without the check item automatically by workflow and cause corresponding personnel Audit is handled, and processing procedure and relevant information can be monitored online in user, is looked into specially user conveniently and is found doubtful hidden danger, oneself is straight Row inspection (including to mark inspection, two-dimensional code scanning inspection, intelligence of taking pictures inspection etc.) is tapped into, system intellectual analysis simultaneously provides inspection As a result, then circulate to corresponding responsibility people if any hidden danger, so ensure that mass participation allows hidden danger without being stealthy.
For the Various types of data stored by system and by the network data acquired in web crawlers, system is by building Vertical hidden danger prediction model, hidden danger cause calamity trend evolution model, hidden danger that calamity Governance Model scheduling algorithm model is caused to be analyzed, and provide Corresponding solution.For system after data are included, backstage carries out intellectual analysis to data automatically, not only analyzes single things Existing hidden danger can also carry out affairs existing in corresponding region whole association analysis, find out all kinds of non-hidden danger information The hidden danger caused by association.
For historical information and cause calamity information, system by the technologies such as machine learning, artificial intelligence, BP network neurals into The relevant autonomous learning of row hidden troubles removing extracts and analyzes Flood inducing factors possessed by all kinds of disasters, and hidden danger prediction, hidden danger are controlled The models such as reason carry out sustained improvement.For layman, including users such as enterprise, government, the public, system provides intelligent photo Identification technology, when user takes pictures to required inspection affairs (including scene, environment, equipment, harmful influence etc.), system provides figure Piece content recognition and the function to scheme to search figure coordinate the GPS positioning of position, the Direct Recognition affairs and can match the affairs Relevant information and hidden troubles removing relevant information.
The affairs that participated in for all types of user in system or needs are responsible for or are handled, system push away automatically into row information It send, is reminded comprising short message, prompting message, PC ends message notifying, wechat message notifying etc. in APP;System by each class model and Intellectual analysis function carries out analysis and arrangement conclusion, for doubtful hidden danger, hidden danger and emphasis to all inspections and the information got The information such as inspection carry out related news prompting and push automatically, for basic data, historical data, network data, all types of user Data and inspection data, system provide the intelligent objects such as all kinds of trend, prediction by big data analysis.
Present invention is mainly used for enterprise's progress hidden danger is checked oneself, departments of government carries out hidden danger inspection, Gong Zhongyong to enterprise Family, which is met hidden danger for finding and report, supervises enterprise and government department to rectify and improve.For enterprise, government and public user, Mobile terminal can download corresponding APP and be installed, and be not only restricted to held terminal system, existing Intelligent mobile equipment system Use can be downloaded, each type operating system and all kinds of browsers are also supported in PC ends, if mobile terminal and PC ends are temporarily and network It can not connect, inspection result carries out local preservation, and in network connection, system will upload data to cloud data center automatically.It is right In inspection result, system automatically forms audit report on the spot, connection printer can direct print result, scene signs and seal to be formed Legal effect.Data are uploaded to cloud data center after having checked etc., and system carries out fractionation filing, and right to this data automatically Check that data carry out laterally similar comparison, longitudinal historical comparison forms analysis report, it is pre- to carry out induction and conclusion, trend for user Survey, emphasis division etc..Public user then by system to finding, meet doubtful hidden danger and report, correspondence is carried out to message and is pushed away It send, reports and submits to enterprise and government department, enterprise and government department are handled, and user can exercise supervision until doubtful hidden danger disappears Remove, system divides enterprises end, government end and public end by user's property difference, forms hidden troubles removing memorandum, according to different user, Different role carries out corresponding memorandum and automatically generates.
The present invention is not limited by network, suitable for feelings such as any LAN, Metropolitan Area Network (MAN), wide area network, personal net, internets Condition is not limited by mobile end system, and the systems such as android, IOS, Windows phone are respectively mounted corresponding A PP, the present invention not by PC end systems limit, and are applicable in the systems such as Widows, Linux, Unix, and the present invention is for including the various kinds of equipment of storage, article, list Position etc. automatically generates related Quick Response Code, and for system, other functions use, and using cloud data center, shares hidden troubles removing dependency number According to two-dimensional code scanning is flexibly introduced security risk management by the present invention, and effect and use are related to entire check process, scanning two It ties up code and checks equipment harmful influence etc., which includes basic information, checks scheme, check criteria, hidden danger processing prediction scheme, history inspection Look into the Auto-matchings such as information.
For present system without individually registering, data center is unified to verify generation account number, and phone, card are used when user logs in Piece number etc. can user bound and relevant information.Check equipment when scan the two-dimensional code can obtain relevant information for example temperature, humidity, Operation conditions and history check information, match coherence check standard, carry out intellectual analysis, and inspection report is then automatically generated without checking Accuse, if you need to check, prompt emphasis check item and without check entry, after automatically generate audit report, can be automatically by cloud Data center carries out checked affairs comprehensive analysis, and laterally it is multi-faceted to carry out hidden danger for similar comparison, longitudinal historical comparison etc. Analysis.
For specific equipment, harmful influence, unit, scene etc., sample photo storage is carried out in cloud data center, later During use such as direct licence plate, system comparison identify photo and GPS positioning, you can the basic information and correlation of the Auto-matching equipment Information, accuracy is up to more than 90% (with the accumulation of cloud central database sample photo and perfect, matching degree will higher), nothing Artificial selection is needed, can not such as be matched, then provides Correlation selection entry, when database does not preserve sample photo, can be received automatically The photo that collection preserves carries out the generation of the article sample photo, multipath audit report and relevant documentation printing, and PC ends can connect Wired and wireless printer, mobile terminal can connect the flexible printing that the printing of wireless and bluetooth carries out document.

Claims (7)

1. a kind of security risk management system based on cloud data, including mobile terminal, PC ends and high in the clouds data center, feature It is:Further include Quick Response Code;
The Quick Response Code is fixed or is shown on monitored object and corresponded with it, the monitored object include equipment, Place and event location;
The information of the Quick Response Code includes internet access address and/or master data, and it is detailed that the master data includes accident Information, history check situation, emphasis inspection item, hidden danger harm and/or hidden danger processing scheme;
The mobile terminal includes camera, satellite positioning module, communication module and touch screen, and the camera is used to identify institute State Quick Response Code;
The communication module is connect with high in the clouds data center, and the information of acquisition for mobile terminal is transferred to high in the clouds data center, institute It states PC ends to connect with high in the clouds data center, the data of acquisition is stored and processed, the PC ends are equipped with intelligence learning reptile, The intelligence learning reptile is intelligently cleaned, deposits according to demand to the information of hidden troubles removing system on the internet into line search Storage and study.
2. the security risk management system according to claim 1 based on cloud data, it is characterised in that:The high in the clouds data Center includes photo automatic identification module, master database and volatile data base;The master database include master data and Without hidden danger situation example picture data;The volatile data base includes real-time Internet of Things data and/or e-learning data.
3. a kind of security risk management method based on cloud data, which is characterized in that include the following steps:
1) master database and management system are established:
1.1) master data, address information and the photographic intelligence of monitored object are collected, it is detailed that the master data includes accident Information, history check situation, emphasis inspection item, hidden danger harm and/or hidden danger processing scheme;
1.2) master data, address information and photographic intelligence are uploaded to high in the clouds data center, by intelligence learning reptile to obtaining Master data, address information and the photographic intelligence taken is intelligently cleaned, stores and is learnt on the internet into line search;
1.3) it generates and by the one-to-one Quick Response Code of monitored object;
1.4) Quick Response Code is fixed or including on monitored object;
2) it monitors:
2.1) mobile terminal scans the two-dimensional code at any time;
2.2) safe condition is uploaded into high in the clouds data center;
2.3) high in the clouds data center record security status data;
2.4) high in the clouds data center judges whether security risk occur, and information warning is sent if occurring.
4. the security risk management method according to claim 3 based on cloud data, which is characterized in that further include step: 3) high in the clouds data center includes normal or information warning to mobile terminal feedback information, described information.
5. the security risk management method according to claim 3 or 4 based on cloud data, which is characterized in that step 2.4) Medium cloud end data center judges whether that security risk occur specifically comprises the following steps:
2.4.1) to checking that item is associated;
2.4.2) photo content and example are contrasted;
2.4.3) hidden danger implied in photo is identified.
6. the security risk management method according to claim 5 based on cloud data, it is characterised in that:In step 2.2) Safe condition includes normal condition and hidden danger situation.
7. the security risk management method according to claim 6 based on cloud data, it is characterised in that:The Quick Response Code Generation includes the generation of high in the clouds data center, monitored object generation or mobile terminal generation.
CN201711462349.7A 2017-12-28 2017-12-28 Security risk management system and management method based on cloud data Pending CN108229174A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711462349.7A CN108229174A (en) 2017-12-28 2017-12-28 Security risk management system and management method based on cloud data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711462349.7A CN108229174A (en) 2017-12-28 2017-12-28 Security risk management system and management method based on cloud data

Publications (1)

Publication Number Publication Date
CN108229174A true CN108229174A (en) 2018-06-29

Family

ID=62645730

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711462349.7A Pending CN108229174A (en) 2017-12-28 2017-12-28 Security risk management system and management method based on cloud data

Country Status (1)

Country Link
CN (1) CN108229174A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109707447A (en) * 2019-01-07 2019-05-03 张效春 Improvement system is analyzed in a kind of coal mine safety management Internet-based and hidden troubles removing
CN110020755A (en) * 2019-04-12 2019-07-16 城云科技(中国)有限公司 City management system based on man-machine coordination
CN110782953A (en) * 2018-11-19 2020-02-11 中国石油化工股份有限公司 Intelligent recognition system for oil extraction chemical agent detection waste liquid and use method thereof
CN112150098A (en) * 2020-08-14 2020-12-29 国网安徽省电力有限公司 Electric power facility anti-terrorism security supervision method and system
CN112348210A (en) * 2020-10-31 2021-02-09 华能新能源上海发电有限公司 Wind power plant equipment management system and management method
CN112785474A (en) * 2021-01-28 2021-05-11 深圳博沃智慧科技有限公司 Potential safety hazard supervision method, device and equipment
JP6915183B1 (en) * 2021-02-04 2021-08-04 株式会社システムサポート Security inspection system and security inspection method
CN113627128A (en) * 2020-05-07 2021-11-09 上海同是科技股份有限公司 Hidden danger troubleshooting check item coding method and system
CN117150097A (en) * 2023-08-31 2023-12-01 应急管理部大数据中心 Automatic matching method for law enforcement checklist

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101957325A (en) * 2010-10-14 2011-01-26 山东鲁能智能技术有限公司 Substation equipment appearance abnormality recognition method based on substation inspection robot
US20140122988A1 (en) * 2012-10-30 2014-05-01 FHOOSH, Inc. Systems and methods for populating user information on electronic forms
CN105388870A (en) * 2015-11-23 2016-03-09 广东新鑫自动化设备有限公司 Safety production monitoring system based on Internet of Things
CN106485396A (en) * 2016-09-09 2017-03-08 北京科技大学 A kind of safety in production hidden troubles removing system
CN106844747A (en) * 2017-02-16 2017-06-13 国网上海市电力公司 Transmission line equipment association picture crawling method based on seed picture recognition
CN107180242A (en) * 2017-05-25 2017-09-19 上海地铁第运营有限公司 Security against fire hidden danger image-recognizing method based on embedded system
CN107330453A (en) * 2017-06-19 2017-11-07 中国传媒大学 The Pornographic image recognizing method of key position detection is recognized and merged based on substep
CN107341860A (en) * 2017-06-02 2017-11-10 深圳市巨龙科教网络有限公司 A kind of 2 D code system for Campus Security inspection
CN107506930A (en) * 2017-08-28 2017-12-22 上海网罗电子科技有限公司 A kind of fire supervision inspection system and method based on artificial intelligence

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101957325A (en) * 2010-10-14 2011-01-26 山东鲁能智能技术有限公司 Substation equipment appearance abnormality recognition method based on substation inspection robot
US20140122988A1 (en) * 2012-10-30 2014-05-01 FHOOSH, Inc. Systems and methods for populating user information on electronic forms
CN105388870A (en) * 2015-11-23 2016-03-09 广东新鑫自动化设备有限公司 Safety production monitoring system based on Internet of Things
CN106485396A (en) * 2016-09-09 2017-03-08 北京科技大学 A kind of safety in production hidden troubles removing system
CN106844747A (en) * 2017-02-16 2017-06-13 国网上海市电力公司 Transmission line equipment association picture crawling method based on seed picture recognition
CN107180242A (en) * 2017-05-25 2017-09-19 上海地铁第运营有限公司 Security against fire hidden danger image-recognizing method based on embedded system
CN107341860A (en) * 2017-06-02 2017-11-10 深圳市巨龙科教网络有限公司 A kind of 2 D code system for Campus Security inspection
CN107330453A (en) * 2017-06-19 2017-11-07 中国传媒大学 The Pornographic image recognizing method of key position detection is recognized and merged based on substep
CN107506930A (en) * 2017-08-28 2017-12-22 上海网罗电子科技有限公司 A kind of fire supervision inspection system and method based on artificial intelligence

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110782953A (en) * 2018-11-19 2020-02-11 中国石油化工股份有限公司 Intelligent recognition system for oil extraction chemical agent detection waste liquid and use method thereof
CN110782953B (en) * 2018-11-19 2023-04-18 中国石油化工股份有限公司 Intelligent recognition system for oil extraction chemical agent detection waste liquid and use method thereof
CN109707447A (en) * 2019-01-07 2019-05-03 张效春 Improvement system is analyzed in a kind of coal mine safety management Internet-based and hidden troubles removing
CN110020755A (en) * 2019-04-12 2019-07-16 城云科技(中国)有限公司 City management system based on man-machine coordination
CN113627128A (en) * 2020-05-07 2021-11-09 上海同是科技股份有限公司 Hidden danger troubleshooting check item coding method and system
CN112150098A (en) * 2020-08-14 2020-12-29 国网安徽省电力有限公司 Electric power facility anti-terrorism security supervision method and system
CN112348210A (en) * 2020-10-31 2021-02-09 华能新能源上海发电有限公司 Wind power plant equipment management system and management method
CN112785474A (en) * 2021-01-28 2021-05-11 深圳博沃智慧科技有限公司 Potential safety hazard supervision method, device and equipment
JP6915183B1 (en) * 2021-02-04 2021-08-04 株式会社システムサポート Security inspection system and security inspection method
CN117150097A (en) * 2023-08-31 2023-12-01 应急管理部大数据中心 Automatic matching method for law enforcement checklist
CN117150097B (en) * 2023-08-31 2024-03-01 应急管理部大数据中心 Automatic matching method for law enforcement checklist

Similar Documents

Publication Publication Date Title
CN108229174A (en) Security risk management system and management method based on cloud data
CN105637439B (en) The system and method for data acquisition
Valinejadshoubi et al. Integrating BIM into sensor-based facilities management operations
CN105825337A (en) Intelligent inspection system for 500KV substation communication device
CN109427115A (en) A kind of Design of Laboratory Management System and method
US20180268305A1 (en) Retrospective event verification using cognitive reasoning and analysis
CN108700851A (en) System, method and platform based on cloud for predicting energy expenditure
CN114140999B (en) Project supervision system based on communication of Internet of things
DE102016218537A1 (en) Method and arrangement for maintaining a database (iBase) with regard to devices installed in a building or area
KR102481223B1 (en) A smart integrated safety management system that can support various safety management, including safety inspection and education, using digital technology
CN108761199A (en) Monitoring system and method is transported in the start and stop of contamination type enterprise
CN102768753A (en) Source information acquisition and management system for small and medium-sized special industries
CN113727214A (en) Method, device, equipment and storage medium for inspecting atmospheric pollution
CN110210338A (en) The dressing information of a kind of pair of target person carries out the method and system of detection identification
CN113935645A (en) High-risk operation management and control system and method based on identification analysis technology
CN103198266B (en) Method and system for device security
CN107610261A (en) The system of management of withdrawing from the arena is entered in a kind of building site that can carry out
JP7467846B2 (en) Information processing device, method, and program
CN108710978A (en) Enterprise management method and system and computer readable storage medium
CN109902209B (en) Special pressure-bearing equipment user three-dimensional visualization method based on space intelligence
CN115170993A (en) AR acquisition and analysis-based on-site inspection method and system for waste gas treatment equipment
WO2018092133A1 (en) Multi-threat maritime detection system
CN113779125A (en) Construction safety information management method and system
CN114091944A (en) Cloud-end-coordinated distribution network engineering field operation analysis decision system
RU2701993C1 (en) Method of forming a competence model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180629