CN108229174A - Security risk management system and management method based on cloud data - Google Patents
Security risk management system and management method based on cloud data Download PDFInfo
- Publication number
- CN108229174A CN108229174A CN201711462349.7A CN201711462349A CN108229174A CN 108229174 A CN108229174 A CN 108229174A CN 201711462349 A CN201711462349 A CN 201711462349A CN 108229174 A CN108229174 A CN 108229174A
- Authority
- CN
- China
- Prior art keywords
- data
- information
- hidden danger
- data center
- quick response
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
Abstract
The present invention relates to a kind of security risk management systems and management method based on cloud data, mainly solve existing test mode of high cost, inefficiency, inspection be not thorough not comprehensively, be unable to the problems such as Correct Analysis entirety hidden danger situation, which includes mobile terminal, PC ends, high in the clouds data center and Quick Response Code;Quick Response Code is fixed or is shown on monitored object, and the object that is monitored includes equipment, place and event location;The information of Quick Response Code includes internet access address and/or master data, and master data includes accident details, history checks situation, emphasis inspection item, hidden danger endangers and/or hidden danger processing scheme;Mobile terminal includes camera, satellite positioning module, communication module and touch screen, and camera is used to identify the Quick Response Code;Communication module is connect with high in the clouds data center, the information of acquisition for mobile terminal is transferred to high in the clouds data center, PC ends are connect with high in the clouds data center, and the data of acquisition are stored and processed.
Description
Technical field
The present invention relates to safety management fields, and in particular to a kind of security risk management system and management based on cloud data
Method.
Background technology
With the development of economy, safety in production becomes state key Focus Area, and hidden troubles removing also becomes the most important thing,
Internet and disparate networks cover comprehensively substantially at present, intelligent mobile terminal (including mobile phone, PAD) also human hand one substantially,
Safety in production can be made information-based using these conditions, hidden troubles removing high efficiency, mobile, intelligence become a reality.
Existing hidden troubles removing method is slowly changed to information system, mobile terminal from papery report, hand inspection, but is turned
Change be not thorough not perfect and less efficient, execution method ossify, cost it is higher, such as check venue location whether have wireless network,
3G/4G networks etc., the system for being limited to mobile terminal;Android or the system for being only applicable to IOS are such as only applicable to, it is each to be
Data sharing is unable between the APP of system;It is such as limited to need fixed handheld terminal, it is impossible to by mobile APP in arbitrary intelligent sliding
It is used in dynamic terminal;It can only be taken pictures when checking to checking equipment, writing record etc., need manually to go to judge by rule of thumb,
It is unable to intelligent analysis;It needs to be checked according to standing plans, and by professional for checking;Disadvantages described above causes existing
Test mode is of high cost, inefficiency, inspection be not thorough not comprehensively, even if having checked can not Correct Analysis entirety hidden danger situation
The problems such as.
Invention content
Present invention aim to address existing test mode is of high cost, inefficiency, inspection be not thorough not comprehensively, Bu Nengzheng
Really the problems such as analysis entirety hidden danger situation, a kind of security risk management system and management method based on cloud data are provided.
Technical proposal that the invention solves the above-mentioned problems is:
A kind of security risk management system based on cloud data, including mobile terminal, PC ends and high in the clouds data center, is also wrapped
Include Quick Response Code;The Quick Response Code is fixed or is shown on monitored object and corresponded with it, and the monitored object includes
Equipment, place and event location;The information of the Quick Response Code includes internet access address and/or master data, described basic
Data include accident details, history checks situation, emphasis inspection item, hidden danger endangers and/or hidden danger processing scheme;It is described
Mobile terminal includes camera, satellite positioning module, communication module and touch screen, and the camera is used to identify the two dimension
Code;The communication module is connect with high in the clouds data center, and the information of acquisition for mobile terminal is transferred to high in the clouds data center, PC ends
Data center connect with high in the clouds, and the data of acquisition are stored and processed, and PC ends are equipped with intelligence learning reptile, and the intelligence is learned
Reptile is practised according to demand to the information of hidden troubles removing system on the internet into line search, and intelligently cleans, store and learns.
Further, the high in the clouds data center includes photo automatic identification module, master database and volatile data base;
The master database includes master data and without hidden danger situation example picture data;The volatile data base includes real-time Internet of Things
Network data and/or e-learning data.
Meanwhile the present invention also provides a kind of security risk management method based on cloud data, include the following steps:
1) master database and management system are established:
1.1) master data, address information and the photographic intelligence of monitored object are collected, the master data includes accident
Details, history check situation, emphasis inspection item, hidden danger harm and/or hidden danger processing scheme;
1.2) master data, address information and photographic intelligence are uploaded to high in the clouds data center, pass through intelligence learning reptile
To the master data, address information and photographic intelligence of acquisition on the internet into line search, and intelligently clean, store and study;
1.3) it generates and by the one-to-one Quick Response Code of monitored object;
1.4) Quick Response Code is fixed or including on monitored object;
2) it monitors:
2.1) mobile terminal scans the two-dimensional code at any time;
2.2) safe condition is uploaded into high in the clouds data center;
2.3) high in the clouds data center record security status data;
2.4) high in the clouds data center judges whether security risk occur, and information warning is sent if occurring.
Further, step is further included:3) high in the clouds data center includes normal to mobile terminal feedback information, described information
Or information warning.
Further, step 2.4) medium cloud end data center judges whether that security risk occur specifically comprises the following steps:
2.4.1) to checking that item is associated;
2.4.2) photo content and example are contrasted;
2.4.3) hidden danger implied in photo is identified.
Further, the safe condition in step 2.2) includes normal condition and hidden danger situation.
Further, the generation of the Quick Response Code includes the generation of high in the clouds data center, monitored object generation or movement eventually
End generation.
Advantages of the present invention is:
1. the present invention thoroughly incorporates planar bar code technology in hidden danger management overall flow, the series connection and implementation of flow are played
Efficiently succinct effect.
2. the present invention realizes the comprehensive intelligence accumulation of hidden troubles removing data and collects, formed complete, perfect, high quality
Hidden troubles removing cloud data center provides data for related industry chain and supports.
3. the present invention realizes hidden troubles removing management intellectual analysis function, user of service only needs simple operations, and system can carry
Inspection scheme, check process for science etc., avoid work repeated work, and to may from the offers such as hidden danger, risk it is pre-
Estimate, and prediction scheme is provided, in the non-review time, system automatically provides hidden troubles removing early warning and simulation.
During 4. photo match cognization technology is used hidden troubles removing by the method for the present invention, hidden danger management is made to check more
Intelligence is convenient.
5. the present invention realizes that the download of arbitrary handheld terminal uses, real existing network and without all can be used under network condition.
6. the present invention realizes that layman carries out professional inspection, and ensure the accuracy of inspection result, integrality and
Standard.
7. entirety hidden danger management of the invention is simple, efficient, intelligence, it is greatly improved and checks efficiency, reduce cost, contain and disappear
Go out enterprise production and public life present in hidden danger, a piece of Lang Lang blue skies of also keeping the safety in production.
Description of the drawings
Fig. 1 is present system composition figure.
Specific embodiment
Present disclosure is described in further detail below in conjunction with the drawings and specific embodiments:
A kind of security risk management system based on cloud data as shown in Figure 1, including mobile terminal, PC ends, high in the clouds number
According to center and Quick Response Code;Quick Response Code is fixed or is shown on monitored object and corresponded with it, and monitored object includes setting
Standby, place and event location;The information of Quick Response Code includes internet access address and/or master data, and master data includes thing
Therefore details, history check situation, emphasis inspection item, hidden danger harm and/or hidden danger processing scheme;Mobile terminal includes taking the photograph
As head, satellite positioning module, communication module and touch screen, camera is used to identify the Quick Response Code;Communication module and high in the clouds number
It is connected according to center, the information of acquisition for mobile terminal is transferred to high in the clouds data center, PC ends are connect with high in the clouds data center, to obtaining
The data taken are stored and processed, and PC ends are connect with high in the clouds data center, and the data of acquisition are stored and processed, PC ends
Equipped with intelligence learning reptile, the intelligence learning reptile according to demand searches the information of hidden troubles removing system on the internet
It seeks, and intelligently cleans, stores and learn, Quick Response Code is fixed or is shown on different inspection item positions, according to there are hidden
Suffer from and safety in production weak link is divided into 2 major class, 13 group, corresponded with the check item of each production-operation unit.
High in the clouds data center includes photo automatic identification module, master database and volatile data base;Master database packet
Include master data and without hidden danger situation example picture data;Volatile data base includes real-time Internet of Things data and/or e-learning
Data.System provides common inspection equipment, place etc. without hidden danger situation example photo, and photo is carried out by machine learning techniques
Recognition memory, inspection personnel provides according to specification checks photo, system intellectual analysis, to checking that item is associated, and compare
Piece content is contrasted with example, and the hidden danger implied in photo is identified.
Meanwhile the present invention also provides a kind of security risk management method based on cloud data, include the following steps:
1) master database and management system are established:
1.1) master data, address information and the photographic intelligence of monitored object are collected, it is detailed that master data includes accident
Information, history check situation, emphasis inspection item, hidden danger harm and/or hidden danger processing scheme;
Data collection means are divided into two major class, and one kind is that web crawlers collects associated safety hidden danger pipe in internet automatically
Information is managed, one kind is to be collected by system using unit associated safety hidden danger management information, and collected information is according to time, thing
Part, enterprises ' industry, hidden danger management content etc. are classified, and are corresponded with Quick Response Code classification, data collection includes correlation
Enterprise's master data of unit, special equipment, personal information, security system, related license, equipment library, experts database, resources bank,
The information such as special equipment information, accident treatment prediction scheme, and examined comprising its current check, to mark inspection, examination of law enforcement, main body responsibility
It looks into, the detailed history information of accident treatment etc.;With associated safety hidden danger information in the upload of security risk inspection information, network
Collection, Various types of data is included in hidden danger prediction model by system, hidden danger causes calamity trend evolution model, hidden danger causes calamity Governance Model etc.
Algorithm model, and machine learning is carried out, data analysis meter is calculated, all kinds of hidden danger, disaster can be predicted in real time, to hidden
Suffer from can caused by disaster carry out real simulation, and provide optimization process prediction scheme;
1.2) master data, address information and photographic intelligence are uploaded to high in the clouds data center, pass through intelligence learning reptile
To the master data, address information and photographic intelligence of acquisition on the internet into line search, and intelligently clean, store and study;
1.3) by hidden danger management project generate respectively with the one-to-one Quick Response Code of monitored object, generate the side of Quick Response Code
Formula includes the generation of high in the clouds data center, monitored object generation or mobile terminal generation;
1.4) Quick Response Code is fixed or including on the specific location of monitored device, place and dependent event;
2) it monitors:
2.1) mobile terminal scans the two-dimensional code at any time, and obtain distinct device, place, event current condition information;This
Locate information two classes of classification, one kind is to obtain the existing feelings for being capable of information-based equipment, place, system in real time by technology of Internet of things
Condition is obtained, and one kind is to include the inspection items such as institutional improvement, safety in production organizational framework to the project that needs check to carry out
It checks and reminds;
2.2) safe condition is uploaded into high in the clouds data center, safe condition includes normal condition, hidden danger situation and emphasis inspection
Look into item;
2.3) high in the clouds data center record security status data;The project checked and project real time status will be needed to upload
Afterwards, system is analyzed by built hidden troubles removing intelligent analytical model, automatically analyze the inspection item with the presence or absence of hidden danger or
Person also needs to which entry emphasis checks, further to carry out Analysis of Potential or inspection;
2.4) high in the clouds data center judges whether security risk occur, and information warning is sent if occurring;If specially go out
Safe condition is transmitted to particular device or terminal by existing security risk or emphasis inspection item, data center;In the data of high in the clouds
The heart judges whether that security risk occur specifically comprises the following steps:
2.4.1) to checking that item is associated;
2.4.2) photo content and example are contrasted;
2.4.3) hidden danger implied in photo is identified.
3) high in the clouds data center includes normal or information warning to mobile terminal feedback information, information.
System initially sets up complete, high quality hidden troubles removing large data center, as core, relies at distribution
Reason, distributed data base and cloud storage virtualization technology, the data come to collection carry out distributed data digging, carry out profession
Change is handled, and data is made to become information assets.
System is equipped with hidden troubles removing system intelligence learning reptile, and reptile is according to the demand of setting to the mark of hidden troubles removing system
Quasi- check item, the scope of examination, hidden danger identification, laws and regulations, Control of Hidden, prediction scheme, risk lighting relevant knowledge are on the internet
It into line search, and intelligently cleans, store and learns, manually provide powerful theory for hidden troubles removing and operation is supported.System is led to
Cross the arrangement study that study reptile carries out internet knowledge, uploaded with reference to the data of system user of service, by machine learning and
Intellectual analysis, the corresponding association being standardized to relevant information.It such as takes pictures when inspection personnel carries out simple operations, select inspection
Place, selection inspection equipment etc. are looked into, network analysis history inspection record and the monitoring data obtained in real time are made newest at once
Inspection and evaluation is shielded without check item, provides new suggestion from procuratorial organ and project, and give risk to related hidden danger that may be present
Assessment and prediction scheme setting, system also provide non-inspection period risk and must verification certificate position, place, apparatus suggested, pass through history inspection
Data, real-time Internet of Things data and e-learning data carry out intellectual analysis acquisition.
Expanding data source, system user cover all ordinary persons, including enterprise (unit, self-employed worker etc.), common public affairs
Many users, all kinds of government department users etc., all users, which collect the information concluded, can carry out analysis storage;Integrated Internet of Things is set
Standby information, including sensors such as all kinds of temperature, humidity, wind speed;The information such as integrated industrial production system, monitoring system;Largely
Data source provides reliable guarantee for all kinds of intellectual analysis of hidden troubles removing;User is according to actual conditions and operation flow to checking oneself certainly
Report, main body duty fulfillment, major hazard source, hidden troubles removing, hang out one's shingle supervise and direct, report accept, the functions such as risk prevention system are manipulated,
Form user data;System by technology of Internet of things to sorts of systems it is administrative under various kinds of equipment, sensor etc. counted in real time
According to collection formation networking monitoring data;System realization integrates all types of industries production system, monitoring system, and it is raw to form industry
Produce data;System is collected arrangement to hidden troubles removing data related present on network by web crawlers and machine learning and learns
It practises, forms internet data, system carries out classification model construction to all data into system, formed in hidden troubles removing big data
The heart.
System increases system deployment occupation mode, and system can carry out server in the systems such as Windows, Linux, Unix
Hold installation and deployment;User uses all kinds of Intelligent mobile equipments according to self-condition, and the system type of unlimited intelligent mobile terminal is right
There is corresponding installation procedure in the systems such as Android, IOS, Windows phone, for Windows, Linux, Unix etc.
System supports client and use and the installation and deployment of server end, user to install government end, enterprise respectively according to self-role
End and public end do not have particular/special requirement in PC end systems for displaying browser, and arbitrary browser can be carried out showing and grasp
Make.The Quick Response Code of all kinds of enterprises (unit, self-employed worker), equipment, article, event etc. automatically generates, and is swept when using mobile client
When retouching respective two-dimensional code, there are the details of all kinds of affairs, history checks situation, emphasis inspection item, hidden danger endanger, hidden danger
The information such as processing scheme are in case use.
Layman's hidden troubles removing abatement functions are provided, when mobile terminal is used to carry out hidden troubles removing, for corresponding
Things, real time information that system is provided according to historical information, currently carries out automatic hidden troubles removing, and identification hidden danger simultaneously provides correlation
Inspection scheme (such as emphasis check item, without check item etc.);The set photograph taking side that user can also provide according to system
Case takes pictures to the equipment that checks of needs, place, and system carries out analysis inspection by intelligent photo analysis module to passed photo
Look into, can there are affairs, check item, hidden danger points etc. in automatic identification photo, inspection, which finishes, can automatically provide audit report, and
Blue-tooth printer can be connected and carry out report printing.
It provides public user to clap conveniently and look into function conveniently, arbitrary user does not need to system login, only need to install or use
Wechat public platform, when finding that anywhere there are hidden danger, can take photos and upload, system automatically analyzes matching photographic intelligence,
It will change and check that information is included in hidden troubles removing process flow, and be transmitted if without the check item automatically by workflow and cause corresponding personnel
Audit is handled, and processing procedure and relevant information can be monitored online in user, is looked into specially user conveniently and is found doubtful hidden danger, oneself is straight
Row inspection (including to mark inspection, two-dimensional code scanning inspection, intelligence of taking pictures inspection etc.) is tapped into, system intellectual analysis simultaneously provides inspection
As a result, then circulate to corresponding responsibility people if any hidden danger, so ensure that mass participation allows hidden danger without being stealthy.
For the Various types of data stored by system and by the network data acquired in web crawlers, system is by building
Vertical hidden danger prediction model, hidden danger cause calamity trend evolution model, hidden danger that calamity Governance Model scheduling algorithm model is caused to be analyzed, and provide
Corresponding solution.For system after data are included, backstage carries out intellectual analysis to data automatically, not only analyzes single things
Existing hidden danger can also carry out affairs existing in corresponding region whole association analysis, find out all kinds of non-hidden danger information
The hidden danger caused by association.
For historical information and cause calamity information, system by the technologies such as machine learning, artificial intelligence, BP network neurals into
The relevant autonomous learning of row hidden troubles removing extracts and analyzes Flood inducing factors possessed by all kinds of disasters, and hidden danger prediction, hidden danger are controlled
The models such as reason carry out sustained improvement.For layman, including users such as enterprise, government, the public, system provides intelligent photo
Identification technology, when user takes pictures to required inspection affairs (including scene, environment, equipment, harmful influence etc.), system provides figure
Piece content recognition and the function to scheme to search figure coordinate the GPS positioning of position, the Direct Recognition affairs and can match the affairs
Relevant information and hidden troubles removing relevant information.
The affairs that participated in for all types of user in system or needs are responsible for or are handled, system push away automatically into row information
It send, is reminded comprising short message, prompting message, PC ends message notifying, wechat message notifying etc. in APP;System by each class model and
Intellectual analysis function carries out analysis and arrangement conclusion, for doubtful hidden danger, hidden danger and emphasis to all inspections and the information got
The information such as inspection carry out related news prompting and push automatically, for basic data, historical data, network data, all types of user
Data and inspection data, system provide the intelligent objects such as all kinds of trend, prediction by big data analysis.
Present invention is mainly used for enterprise's progress hidden danger is checked oneself, departments of government carries out hidden danger inspection, Gong Zhongyong to enterprise
Family, which is met hidden danger for finding and report, supervises enterprise and government department to rectify and improve.For enterprise, government and public user,
Mobile terminal can download corresponding APP and be installed, and be not only restricted to held terminal system, existing Intelligent mobile equipment system
Use can be downloaded, each type operating system and all kinds of browsers are also supported in PC ends, if mobile terminal and PC ends are temporarily and network
It can not connect, inspection result carries out local preservation, and in network connection, system will upload data to cloud data center automatically.It is right
In inspection result, system automatically forms audit report on the spot, connection printer can direct print result, scene signs and seal to be formed
Legal effect.Data are uploaded to cloud data center after having checked etc., and system carries out fractionation filing, and right to this data automatically
Check that data carry out laterally similar comparison, longitudinal historical comparison forms analysis report, it is pre- to carry out induction and conclusion, trend for user
Survey, emphasis division etc..Public user then by system to finding, meet doubtful hidden danger and report, correspondence is carried out to message and is pushed away
It send, reports and submits to enterprise and government department, enterprise and government department are handled, and user can exercise supervision until doubtful hidden danger disappears
Remove, system divides enterprises end, government end and public end by user's property difference, forms hidden troubles removing memorandum, according to different user,
Different role carries out corresponding memorandum and automatically generates.
The present invention is not limited by network, suitable for feelings such as any LAN, Metropolitan Area Network (MAN), wide area network, personal net, internets
Condition is not limited by mobile end system, and the systems such as android, IOS, Windows phone are respectively mounted corresponding A PP, the present invention not by
PC end systems limit, and are applicable in the systems such as Widows, Linux, Unix, and the present invention is for including the various kinds of equipment of storage, article, list
Position etc. automatically generates related Quick Response Code, and for system, other functions use, and using cloud data center, shares hidden troubles removing dependency number
According to two-dimensional code scanning is flexibly introduced security risk management by the present invention, and effect and use are related to entire check process, scanning two
It ties up code and checks equipment harmful influence etc., which includes basic information, checks scheme, check criteria, hidden danger processing prediction scheme, history inspection
Look into the Auto-matchings such as information.
For present system without individually registering, data center is unified to verify generation account number, and phone, card are used when user logs in
Piece number etc. can user bound and relevant information.Check equipment when scan the two-dimensional code can obtain relevant information for example temperature, humidity,
Operation conditions and history check information, match coherence check standard, carry out intellectual analysis, and inspection report is then automatically generated without checking
Accuse, if you need to check, prompt emphasis check item and without check entry, after automatically generate audit report, can be automatically by cloud
Data center carries out checked affairs comprehensive analysis, and laterally it is multi-faceted to carry out hidden danger for similar comparison, longitudinal historical comparison etc.
Analysis.
For specific equipment, harmful influence, unit, scene etc., sample photo storage is carried out in cloud data center, later
During use such as direct licence plate, system comparison identify photo and GPS positioning, you can the basic information and correlation of the Auto-matching equipment
Information, accuracy is up to more than 90% (with the accumulation of cloud central database sample photo and perfect, matching degree will higher), nothing
Artificial selection is needed, can not such as be matched, then provides Correlation selection entry, when database does not preserve sample photo, can be received automatically
The photo that collection preserves carries out the generation of the article sample photo, multipath audit report and relevant documentation printing, and PC ends can connect
Wired and wireless printer, mobile terminal can connect the flexible printing that the printing of wireless and bluetooth carries out document.
Claims (7)
1. a kind of security risk management system based on cloud data, including mobile terminal, PC ends and high in the clouds data center, feature
It is:Further include Quick Response Code;
The Quick Response Code is fixed or is shown on monitored object and corresponded with it, the monitored object include equipment,
Place and event location;
The information of the Quick Response Code includes internet access address and/or master data, and it is detailed that the master data includes accident
Information, history check situation, emphasis inspection item, hidden danger harm and/or hidden danger processing scheme;
The mobile terminal includes camera, satellite positioning module, communication module and touch screen, and the camera is used to identify institute
State Quick Response Code;
The communication module is connect with high in the clouds data center, and the information of acquisition for mobile terminal is transferred to high in the clouds data center, institute
It states PC ends to connect with high in the clouds data center, the data of acquisition is stored and processed, the PC ends are equipped with intelligence learning reptile,
The intelligence learning reptile is intelligently cleaned, deposits according to demand to the information of hidden troubles removing system on the internet into line search
Storage and study.
2. the security risk management system according to claim 1 based on cloud data, it is characterised in that:The high in the clouds data
Center includes photo automatic identification module, master database and volatile data base;The master database include master data and
Without hidden danger situation example picture data;The volatile data base includes real-time Internet of Things data and/or e-learning data.
3. a kind of security risk management method based on cloud data, which is characterized in that include the following steps:
1) master database and management system are established:
1.1) master data, address information and the photographic intelligence of monitored object are collected, it is detailed that the master data includes accident
Information, history check situation, emphasis inspection item, hidden danger harm and/or hidden danger processing scheme;
1.2) master data, address information and photographic intelligence are uploaded to high in the clouds data center, by intelligence learning reptile to obtaining
Master data, address information and the photographic intelligence taken is intelligently cleaned, stores and is learnt on the internet into line search;
1.3) it generates and by the one-to-one Quick Response Code of monitored object;
1.4) Quick Response Code is fixed or including on monitored object;
2) it monitors:
2.1) mobile terminal scans the two-dimensional code at any time;
2.2) safe condition is uploaded into high in the clouds data center;
2.3) high in the clouds data center record security status data;
2.4) high in the clouds data center judges whether security risk occur, and information warning is sent if occurring.
4. the security risk management method according to claim 3 based on cloud data, which is characterized in that further include step:
3) high in the clouds data center includes normal or information warning to mobile terminal feedback information, described information.
5. the security risk management method according to claim 3 or 4 based on cloud data, which is characterized in that step 2.4)
Medium cloud end data center judges whether that security risk occur specifically comprises the following steps:
2.4.1) to checking that item is associated;
2.4.2) photo content and example are contrasted;
2.4.3) hidden danger implied in photo is identified.
6. the security risk management method according to claim 5 based on cloud data, it is characterised in that:In step 2.2)
Safe condition includes normal condition and hidden danger situation.
7. the security risk management method according to claim 6 based on cloud data, it is characterised in that:The Quick Response Code
Generation includes the generation of high in the clouds data center, monitored object generation or mobile terminal generation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711462349.7A CN108229174A (en) | 2017-12-28 | 2017-12-28 | Security risk management system and management method based on cloud data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711462349.7A CN108229174A (en) | 2017-12-28 | 2017-12-28 | Security risk management system and management method based on cloud data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108229174A true CN108229174A (en) | 2018-06-29 |
Family
ID=62645730
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711462349.7A Pending CN108229174A (en) | 2017-12-28 | 2017-12-28 | Security risk management system and management method based on cloud data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108229174A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109707447A (en) * | 2019-01-07 | 2019-05-03 | 张效春 | Improvement system is analyzed in a kind of coal mine safety management Internet-based and hidden troubles removing |
CN110020755A (en) * | 2019-04-12 | 2019-07-16 | 城云科技(中国)有限公司 | City management system based on man-machine coordination |
CN110782953A (en) * | 2018-11-19 | 2020-02-11 | 中国石油化工股份有限公司 | Intelligent recognition system for oil extraction chemical agent detection waste liquid and use method thereof |
CN112150098A (en) * | 2020-08-14 | 2020-12-29 | 国网安徽省电力有限公司 | Electric power facility anti-terrorism security supervision method and system |
CN112348210A (en) * | 2020-10-31 | 2021-02-09 | 华能新能源上海发电有限公司 | Wind power plant equipment management system and management method |
CN112785474A (en) * | 2021-01-28 | 2021-05-11 | 深圳博沃智慧科技有限公司 | Potential safety hazard supervision method, device and equipment |
JP6915183B1 (en) * | 2021-02-04 | 2021-08-04 | 株式会社システムサポート | Security inspection system and security inspection method |
CN113627128A (en) * | 2020-05-07 | 2021-11-09 | 上海同是科技股份有限公司 | Hidden danger troubleshooting check item coding method and system |
CN117150097A (en) * | 2023-08-31 | 2023-12-01 | 应急管理部大数据中心 | Automatic matching method for law enforcement checklist |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101957325A (en) * | 2010-10-14 | 2011-01-26 | 山东鲁能智能技术有限公司 | Substation equipment appearance abnormality recognition method based on substation inspection robot |
US20140122988A1 (en) * | 2012-10-30 | 2014-05-01 | FHOOSH, Inc. | Systems and methods for populating user information on electronic forms |
CN105388870A (en) * | 2015-11-23 | 2016-03-09 | 广东新鑫自动化设备有限公司 | Safety production monitoring system based on Internet of Things |
CN106485396A (en) * | 2016-09-09 | 2017-03-08 | 北京科技大学 | A kind of safety in production hidden troubles removing system |
CN106844747A (en) * | 2017-02-16 | 2017-06-13 | 国网上海市电力公司 | Transmission line equipment association picture crawling method based on seed picture recognition |
CN107180242A (en) * | 2017-05-25 | 2017-09-19 | 上海地铁第运营有限公司 | Security against fire hidden danger image-recognizing method based on embedded system |
CN107330453A (en) * | 2017-06-19 | 2017-11-07 | 中国传媒大学 | The Pornographic image recognizing method of key position detection is recognized and merged based on substep |
CN107341860A (en) * | 2017-06-02 | 2017-11-10 | 深圳市巨龙科教网络有限公司 | A kind of 2 D code system for Campus Security inspection |
CN107506930A (en) * | 2017-08-28 | 2017-12-22 | 上海网罗电子科技有限公司 | A kind of fire supervision inspection system and method based on artificial intelligence |
-
2017
- 2017-12-28 CN CN201711462349.7A patent/CN108229174A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101957325A (en) * | 2010-10-14 | 2011-01-26 | 山东鲁能智能技术有限公司 | Substation equipment appearance abnormality recognition method based on substation inspection robot |
US20140122988A1 (en) * | 2012-10-30 | 2014-05-01 | FHOOSH, Inc. | Systems and methods for populating user information on electronic forms |
CN105388870A (en) * | 2015-11-23 | 2016-03-09 | 广东新鑫自动化设备有限公司 | Safety production monitoring system based on Internet of Things |
CN106485396A (en) * | 2016-09-09 | 2017-03-08 | 北京科技大学 | A kind of safety in production hidden troubles removing system |
CN106844747A (en) * | 2017-02-16 | 2017-06-13 | 国网上海市电力公司 | Transmission line equipment association picture crawling method based on seed picture recognition |
CN107180242A (en) * | 2017-05-25 | 2017-09-19 | 上海地铁第运营有限公司 | Security against fire hidden danger image-recognizing method based on embedded system |
CN107341860A (en) * | 2017-06-02 | 2017-11-10 | 深圳市巨龙科教网络有限公司 | A kind of 2 D code system for Campus Security inspection |
CN107330453A (en) * | 2017-06-19 | 2017-11-07 | 中国传媒大学 | The Pornographic image recognizing method of key position detection is recognized and merged based on substep |
CN107506930A (en) * | 2017-08-28 | 2017-12-22 | 上海网罗电子科技有限公司 | A kind of fire supervision inspection system and method based on artificial intelligence |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110782953A (en) * | 2018-11-19 | 2020-02-11 | 中国石油化工股份有限公司 | Intelligent recognition system for oil extraction chemical agent detection waste liquid and use method thereof |
CN110782953B (en) * | 2018-11-19 | 2023-04-18 | 中国石油化工股份有限公司 | Intelligent recognition system for oil extraction chemical agent detection waste liquid and use method thereof |
CN109707447A (en) * | 2019-01-07 | 2019-05-03 | 张效春 | Improvement system is analyzed in a kind of coal mine safety management Internet-based and hidden troubles removing |
CN110020755A (en) * | 2019-04-12 | 2019-07-16 | 城云科技(中国)有限公司 | City management system based on man-machine coordination |
CN113627128A (en) * | 2020-05-07 | 2021-11-09 | 上海同是科技股份有限公司 | Hidden danger troubleshooting check item coding method and system |
CN112150098A (en) * | 2020-08-14 | 2020-12-29 | 国网安徽省电力有限公司 | Electric power facility anti-terrorism security supervision method and system |
CN112348210A (en) * | 2020-10-31 | 2021-02-09 | 华能新能源上海发电有限公司 | Wind power plant equipment management system and management method |
CN112785474A (en) * | 2021-01-28 | 2021-05-11 | 深圳博沃智慧科技有限公司 | Potential safety hazard supervision method, device and equipment |
JP6915183B1 (en) * | 2021-02-04 | 2021-08-04 | 株式会社システムサポート | Security inspection system and security inspection method |
CN117150097A (en) * | 2023-08-31 | 2023-12-01 | 应急管理部大数据中心 | Automatic matching method for law enforcement checklist |
CN117150097B (en) * | 2023-08-31 | 2024-03-01 | 应急管理部大数据中心 | Automatic matching method for law enforcement checklist |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108229174A (en) | Security risk management system and management method based on cloud data | |
CN105637439B (en) | The system and method for data acquisition | |
Valinejadshoubi et al. | Integrating BIM into sensor-based facilities management operations | |
CN105825337A (en) | Intelligent inspection system for 500KV substation communication device | |
CN109427115A (en) | A kind of Design of Laboratory Management System and method | |
US20180268305A1 (en) | Retrospective event verification using cognitive reasoning and analysis | |
CN108700851A (en) | System, method and platform based on cloud for predicting energy expenditure | |
CN114140999B (en) | Project supervision system based on communication of Internet of things | |
DE102016218537A1 (en) | Method and arrangement for maintaining a database (iBase) with regard to devices installed in a building or area | |
KR102481223B1 (en) | A smart integrated safety management system that can support various safety management, including safety inspection and education, using digital technology | |
CN108761199A (en) | Monitoring system and method is transported in the start and stop of contamination type enterprise | |
CN102768753A (en) | Source information acquisition and management system for small and medium-sized special industries | |
CN113727214A (en) | Method, device, equipment and storage medium for inspecting atmospheric pollution | |
CN110210338A (en) | The dressing information of a kind of pair of target person carries out the method and system of detection identification | |
CN113935645A (en) | High-risk operation management and control system and method based on identification analysis technology | |
CN103198266B (en) | Method and system for device security | |
CN107610261A (en) | The system of management of withdrawing from the arena is entered in a kind of building site that can carry out | |
JP7467846B2 (en) | Information processing device, method, and program | |
CN108710978A (en) | Enterprise management method and system and computer readable storage medium | |
CN109902209B (en) | Special pressure-bearing equipment user three-dimensional visualization method based on space intelligence | |
CN115170993A (en) | AR acquisition and analysis-based on-site inspection method and system for waste gas treatment equipment | |
WO2018092133A1 (en) | Multi-threat maritime detection system | |
CN113779125A (en) | Construction safety information management method and system | |
CN114091944A (en) | Cloud-end-coordinated distribution network engineering field operation analysis decision system | |
RU2701993C1 (en) | Method of forming a competence model |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180629 |