CN110210989A - A kind of security risk reporting system and its method - Google Patents

A kind of security risk reporting system and its method Download PDF

Info

Publication number
CN110210989A
CN110210989A CN201910303605.0A CN201910303605A CN110210989A CN 110210989 A CN110210989 A CN 110210989A CN 201910303605 A CN201910303605 A CN 201910303605A CN 110210989 A CN110210989 A CN 110210989A
Authority
CN
China
Prior art keywords
report
information
security risk
user
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910303605.0A
Other languages
Chinese (zh)
Inventor
王海军
王帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Haideda Safety Technology Development Co Ltd
Original Assignee
Shanxi Haideda Safety Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Haideda Safety Technology Development Co Ltd filed Critical Shanxi Haideda Safety Technology Development Co Ltd
Priority to CN201910303605.0A priority Critical patent/CN110210989A/en
Publication of CN110210989A publication Critical patent/CN110210989A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/02Agriculture; Fishing; Forestry; Mining

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Agronomy & Crop Science (AREA)
  • Animal Husbandry (AREA)
  • Marine Sciences & Fisheries (AREA)
  • Mining & Mineral Resources (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of security risk reporting system and its methods, including identity management platform, security risk information reporting platform, wherein identity management platform includes user ID data library, identification module and identity information shroud module, identity information shroud module carries out anonymization processing to the subscriber identity information in user ID data library, report user after the processing of the anonymization of identity information shroud module, it is disclosed without having to worry about subscriber identity information and brings unnecessary trouble, preferred embodiment further includes report reward platform and capital management platform simultaneously, report reward platform is according to the received security risk report information of security risk information reporting platform, it is reported that after information is verified effectively, safety manager timely and effectively can provide reward to report user by capital management platform.The present invention can greatly protect the identity information safety of speaker; and reward is provided in time; concern and investment of the report user to security risk information are preferably transferred, promotes the raising of staff's security precautions, avoids the generation of security risk to a greater extent.

Description

A kind of security risk reporting system and its method
Technical field
The invention belongs to high risk industries security technology areas, specifically, being related to a kind of high risk industries security risk report The system of information report.
Background technique
Such as Safety of Coal Mine Production is the most important thing of enterprise development, prior art security risk investigation is generally pacified by enterprise Full production division is managed collectively and is supervised, although enterprise puts into huge, such as a large amount of buyings in terms of safety in production every year Safe production equipment, work safety training education, safety in production communication and education etc., enterprise still deposits in daily production management process In security risk.Lot of accident investigation and analysis show casualty accident be mostly as caused by Unsafe behavior, and Main cause is that current security evaluation and supervision also lack effective ways and means, not yet realizes supervision, public affairs to security risk Show, audit and effective report reward mechanism, these hidden danger are substantially with generality and versatility.It will be fundamentally The generation for preventing accident needs in advance to security risk early warning, and existing security risk processing mode, and there are security risk letters Breath treatment process takes a long time, and causing a hidden trouble, it is long to rectify and improve the period.Although enterprise is equipped with security risk box for letters of accusation, enterprise throughout the year Security risk can not timely and effectively be fed back due to considering immediate superior or other factors and arrive enterprise security manager portion by employee Door.In order to improve the safety behavior consciousness and enthusiasm of the staff, and it can reward report information accurate employee in time, together When protect employee information not to be leaked, some enterprises carry out security information report, prize using the instant message applications such as wechat at present Encourage work, as a certain position employee find actual production process in there are security risks, then the employee need to re-register one it is micro- Report photo, video, text are transmitted to safety management personnel again after signal, taken pictures by mobile terminal, record the hands such as video There is report user and adopt in Duan Shangchuan security risk data although such method solves the problems, such as that report information uploads in time Security risk is reported with anonymous way, and safety management personnel can not audit report person part.
Application No. is the Chinese patents of CN201020641532.0 to disclose a kind of mine potential safety hazard closed loop management system, Include office data library, management server, handheld terminal which disclose one kind, passes through local side server and handheld terminal benefit It is connected with internet, is connected with management server therebetween.The patent solves safety of coal mines hidden danger closed loop pipe in a way Reason, but special practitioner is needed to utilize finger-print recognising instrument identification, that is, need special security risk information inspection Personnel, and since special messenger is responsible for, real-name authentication is needed to personal information.Conventional security hidden danger management is largely followed Methods only change a kind of means.
Application No. is the Chinese patents of CN201420530932.2 to disclose a kind of safety of coal mines hidden troubles removing management system, The patent includes that handheld terminal (U1) is connected by WIFI signal with wireless receiving substation (U8), wireless receiving substation (U8) and work Industrial Ethernet (U2) is attached, and further includes Web server (U4), inquiring client terminal (U5), management client (U6) and short Believe gateway (U7).The patent changes traditional manual typing mode, improves efficiency, but the implementation of the patent and can not transfer The prevention of total involvement security risk can not more protect the sensitive informations such as the user identity of report security risk information.
In view of this present invention is specifically proposed.
Summary of the invention
The technical problem to be solved in the present invention is that overcoming the deficiencies of the prior art and provide a kind of high risk industries security risk Reporting system.
Existing security risk report manner functions, the report information such as conveniently take pictures, record a video using mobile terminal can be remembered in time Record uploads;Report that award method is carried out still by the way of traditional or using other modes such as the instant message applications such as wechat.By Can take into account real name report in report user influences the direct or indirect interests of this department, and most employees are using anonymous report Mode to business report security risk, this method has the following problems:
1, speaker using anonymous way report security risk, safety management personnel can not audit report person part, I.e. the operating method to worker cannot verify and anonymization is handled.If speaker's real name is reported, speaker's load The report behavior of the heart oneself can be known by immediate superior.
2, it is reported using instant message applications such as wechats, there are information management, Information Statistics, information to deposit for report information The problem of shelves etc..
3, enterprise is caused to be difficult to due to being anonymous granting using the granting that the instant message applications such as wechat carry out bonus The whereabouts etc. of prize funds is managed, there are capital management hidden danger.
In order to solve the above technical problems, the present invention is using the basic conception of technical solution:
A kind of security risk reporting system is provided, anonymization can be carried out to sensitive informations such as the identity informations for reporting user Processing, can also be managed archive to report information, award in time after can also verifying effectively report user and to peace Full hidden danger report bonus is managed, and has the function of information report etc..
After adopting the above technical scheme, the present invention has the advantages that compared with prior art.
1, identity management platform includes user ID data library, identification module and identity information shroud module, wherein
User ID data library, identification module can identify and judge whether user identity is the our unit person of being exactly Work, identity information shroud module can report subscriber identity information with anonymization, and report user does not have to concern report behavior bring The direct or indirect conflict of interest.
2, the report information of security risk information reporting platform obtains module, receiving module and memory module, can be timely To security information carry out information management, Information Statistics, archival of information, update module can be at any time according to rank of security risk etc. Grade updating record information state.
3, there is report verification in the report result publicity that report reward platform is provided according to security risk information reporting platform Effect timely triggers capital management platform to corresponding report user and transfers report reward, and all prize funds whereabouts can lead to Cross capital management platform statistical report form.
To sum up, a kind of security risk reporting system of the present invention can report subscriber identity information in protection, eliminate report The trouble and worry of user can timely provide report reward, greatly transfer the prevention security risk consciousness of the staff, together Shi Suoyou security risk report information can be achieved, classifies, be counted, and relevant prize funds, which can count, report etc. is many has Beneficial effect.
A specific embodiment of the invention is described in further detail with reference to the accompanying drawing.
Detailed description of the invention
Attached drawing is as a part of the invention, and for providing further understanding of the invention, of the invention is schematic Examples and descriptions thereof are used to explain the present invention, but does not constitute an undue limitation on the present invention.Obviously, the accompanying drawings in the following description Only some embodiments to those skilled in the art without creative efforts, can be with Other accompanying drawings can also be obtained according to these attached drawings.In the accompanying drawings:
Fig. 1 is module diagram of the invention;
Fig. 2 is workflow schematic diagram of the invention;
Fig. 3 is method and step schematic diagram of the invention;
It should be noted that these attached drawings and verbal description are not intended to the design model limiting the invention in any way It encloses, but illustrates idea of the invention by referring to specific embodiments for those skilled in the art.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, the technical solution in embodiment is clearly and completely described, the following examples are intended to illustrate the invention, but It is not intended to limit the scope of the invention.
In the description of the present invention, it should be noted that term " on ", "front", "rear", "left", "right", " is erected at "lower" Directly ", the orientation or positional relationship of the instructions such as "inner", "outside" is to be based on the orientation or positional relationship shown in the drawings, merely to just In description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation, with Specific orientation construction and operation, therefore be not considered as limiting the invention.
In the description of the present invention, it should be noted that unless otherwise clearly defined and limited, term " installation ", " phase Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, it can also be indirectly connected through an intermediary.For this For the those of ordinary skill in field, the concrete meaning of above-mentioned term in the present invention can be understood with concrete condition.
As shown in Figure 1, security risk reporting system of the invention includes identity management platform, for managing report user's body Part information.Subscriber identity information can include but is not limited to personnel's name, fingerprint, blood group, photo, educational background, home address, connection Mode, unit post, kinsfolk, staff redeployment record, person works' rewards and punishments information etc..Above-mentioned subscriber identity information passes through body Part management platform typing is simultaneously stored to user ID data library.Report of the identification module to security risk information reporting platform User information and user ID data library are compared to identify and judge user identity, for example, identification module is to user Carry out identity differentiation, differentiate whether the user is enterprises worker, if it is, open security risk report permission and by Permission is rewarded, if non-, security risk report permission do not opened and is awarded permission, only general access authority.Body Identity database in part management platform can also establish white list according to identity data, the foundation of white list can be according to Duty registration employee information preparation can also be worked out according to the form of unit organization or the group that keeps the safety in production.Identification module pair The anonymization report user information of security risk information reporting platform and the white list are compared to identify and judge user Identity.The identification function of identification module, largely avoids the report behavior of irrelevant personnel, while also having controlled and have The malice for closing report user reports behavior, avoids the waste of associated safety hidden danger report resource.Identity information shroud module can be with It uses as needed and anonymization processing is carried out with one of lower node:
(1) identity information shroud module carries out anonymization processing to the subscriber identity information in user ID data library, i.e., Identity information shroud module carries out anonymization processing simultaneously in subscriber identity information typing, and the subscriber identity information is through anonymization Data that treated are stored in user ID data library.Because of subscriber identity information, in typing after anonymization is handled, with anonymity Data mode after change is stored in user ID data library, greatly protects subscriber identity information safe, even if user identity Database lost, since data are by anonymization treated data, user identity sensitive information will not divulge a secret.
(2) subscriber identity information records normal typing user ID data library, and identity information shroud module is only in report user When carrying out the report of security risk information, carried out at anonymization when calling the report user information in relative users identity database Reason.Subscriber identity information normal typing user ID data library, although not can guarantee subscriber identity information safety, due to only When reporting user report security risk, identity information shroud module calls the report user letter in relative users identity database Anonymization processing is carried out when breath, this anonymity turns to disposable anonymization, even if next time, same position report user was handled through anonymization Result afterwards is not identical, thus the identity for protecting report user to report security risk to the full extent.
(3) identity information shroud module carries out anonymization processing in subscriber identity information typing, and report user into When row security risk information is reported, anonymization processing is carried out when calling the report user information in relative users identity database. Due to all using the anonymization of identity information shroud module to handle at two nodes, such mode both can guarantee report user identity Database security, and can guarantee that report security risk Information Times accuses subscriber identity information.
The anonymization processing function of identity information shroud module, can be digital authorization certificate form, is also possible to one kind The anonymization of above-mentioned various node mode password reversible transformation mode processes is exemplified below in password reversible transformation mode process A kind of implementation of processing function:
(1) identity information shroud module carries out anonymization processing, the user identity in subscriber identity information typing simultaneously Treated that data are stored in user ID data library through anonymization for information.Such as: report subscriber identity information (name: A, refers to Line: B, blood group: C, photo: D, educational background: E, home address: F, contact method: G, unit post: H, kinsfolk: I, personnel's tune Dynamic record: J, person works' rewards and punishments information: K) after anonymization is handled, being stored in user ID data library is that data are (name: a, fingerprint: b, blood group: c, photo: d, educational background: e, home address: f, contact method: g, unit post: h, family at Member: i, staff redeployment record: j, person works' rewards and punishments information: k) or the user identity that can not directly read after coding is replaced with Data.The subscriber identity information in user ID data library is safe and reliable, and irrelevant personnel can not be obtained directly from user ID data library To any relevant user identity information.
(2) subscriber identity information records normal typing user ID data library, and identity information shroud module is only in report user When carrying out the report of security risk information, carried out at anonymization when calling the report user information in relative users identity database Reason.Such as: report subscriber identity information (name: A, fingerprint: B, blood group: C, photo: D, educational background: E, home address: F, correspondent party Formula: G, unit post: H, kinsfolk: I, staff redeployment record: J, person works' rewards and punishments information: K) normal typing is stored in use Family identity database.When report user A hidden danger information with high safety reports behavior, identity information shroud module assigns report at random Attribute (a) is hidden in mono- display information of user A (report user x) and a fixation, and display information (report user x) follows always In security risk reporting process, hiding attribute (a) will be reversed to determine report during subsequent implementation security risk is reported and rewarded The identity of user A.When user A hidden danger information with high safety reports behavior next time, identity information shroud module is assigned at random again It gives report mono- display information of user A (report user y) and attribute (a), display information (report user y) one is hidden in a fixation It directly follows in security risk reporting process, hiding attribute (a) will be reversed true during subsequent implementation security risk is reported and rewarded Surely the identity of user A is reported.It avoids in this way, the first fixed form assigns the anonymization process of report subscriber identity information It brings, after the security risk report behavior for reporting the certain number of user, it is possible to be deduced the body of corresponding report user Part information.
(3) identity information shroud module carries out anonymization processing in subscriber identity information typing, and report user into When row security risk information is reported, anonymization processing is carried out when calling the report user information in relative users identity database. It can not only guarantee safety of the user ID data in identity database, can more guarantee to report that user reports in security risk The safety of subscriber identity information in action process.
Security risk information reporting platform includes report information acquisition, reception, storage and update module, the report information It obtains, receive, memory module is obtained accordingly, received, storage report information, update module updating record information processing shape State.
Report information obtains module, can be various handheld terminals, such as mobile phone, tablet computer, with camera shooting sound-recording function Instrument and equipment etc., the APP form for being also possible to intelligent terminal realizes.It is also possible to set in security risk maximum probability generation position The fixed terminal device set, such as security cameras monitoring device.Report that user obtains module using report information, acquisition obtains Various security risk information are taken, security risk information can be the report informations such as video, photo, audio data.Report information connects Receiving module can be Web server, WIFI receiver, Industrial Ethernet etc..Report information receiving module, which receives, to be obtained in module Report information is stored in report information memory module by the report information of biography, and report information memory module can be data service Device is also possible to the equipment with data storage function, such as hard disk.
Update module updating record information processing state, report information processing status include report in, investigation in, report knot Fruit publicity, report result publicity include that report verification is effective, report information is wrong.According to security risk report information, safety is specially Family, production responsible person or full-time responsible person carry out verification security information, will report result publicity exhibition in time by update module It is shown in security risk information reporting platform.The verification of security risk report information can also be, using automatic under big data mode Safety verification, and according to security risk danger coefficient, according to investigation, prediction, hidden danger grade classification and classify, while giving preferential Determine and detection, and introduce manpower intervention according to the actual situation, and will report result publicity by update module automatically update to Security risk information reporting platform.Security risk information reporting platform also has security risk Information Statistics module, security risk Statistical module generates report to security risk report information statistic of classification, can provide number for the specific investigation of current safety hidden danger According to the mode that can also keep the safety in production for big data from now on provides data and supports.
Using security risk reporting system of the invention, safety equipment operation and input cost can be greatly reduced, improve Safety in production information system operational efficiency, effectively improves the integrated management ability of safety in production, effectively contains the hair of safety accident It is raw.
Preferably, security risk reporting system further includes report reward platform and capital management platform, report reward platform It is verified effectively according to the update module updating record information processing state report in security risk information reporting platform, Identity Management Identity information shroud module in platform calls the report subscriber identity information in user ID data library, triggers capital management platform Reward is provided to corresponding report user.Capital management platform mainly includes online payment system, and online payment includes and all kinds of branch The interface for paying platform, bank finance mechanism provides with funds account management function to enterprise security manager department, is used for security risk The clearing of prize funds.Online payment needs enterprise first to squeeze into security risk bonus in capital management platform, enterprise security Administrative staff pay the report bonus of corresponding prize scale into speaker's account after audit report information is effective;? Can be used it is similar form is provided with monthly earnings, condition of providing is that audit report information is effective, and capital management platform is automatically by phase The report bonus of prize scale is answered to pay into speaker's account.Further, the update mould of security risk information reporting platform Block updating record information processing state report verify effectively, can by the risk size of security risk, the height of priority level, Match corresponding report reward.That is the report prize funds of capital management platform management can divide height multiple ranks, no With the reward of the amount of money.Since security risk is reported and rewards hook, after the processing of identity information shroud module anonymization, greatly Report subscriber identity information safety is protected, the action that personnel participate in the report of security risk information is improved, thus bigger The generation of security risk is avoided in degree.
More preferably gold management platform has capital management statistical module, reports prize funds statistic of classification to security risk Generate report, management report prize funds.Report prize funds whereabouts can be looked into, can be traced back, to ensure enterprise reward fund security.
As shown in Fig. 2, the flow diagram of embodiment,
The node location handled according to above-mentioned identity information shroud module anonymization is different, and process can be divided into three kinds of situations:
1. identity information shroud module carries out anonymization processing, subscriber identity information warp in subscriber identity information typing simultaneously Treated that data are stored in user ID data library for anonymization.Report subscriber identity information " name: A " is stored in user identity Database is " name: a ".The legitimacy of user identity is determined by identification module.
It reports that user " name: a " obtains module by the report information in security risk information reporting platform, such as reports User obtains security risk photo, video or audio-frequency information using mobile phone;Security risk information data is sent to security risk Information reporting platform, by connecing, receiving module receives security risk information to security risk information reporting platform and report user believes Breath, for example, mobile phone is obtained security risk photo, video or audio-frequency information anonymization treated user's body by report user Part information passes through Industrial Ethernet together and is uploaded to Web server;Security risk information reporting platform by security risk information and Report user information is stored in relevant data server.
The responsible person that keeps the safety in production consults the security risk information of security risk information reporting platform and handles by anonymization Subscriber identity information " name: a " (checking and approving identity, not can know that true identity) afterwards, according to investigation, prediction, hidden danger grade It divides and classifies, judge the validity of report information, and by the update module of security risk information reporting platform according to update Report information processing status, report information processing status include report in, investigation in, report result publicity.Report result publicity Including reporting that verification is effective, report information is wrong.
2. subscriber identity information is logged the user ID data library (body in identity management platform in identity management platform Part database establishes white list according to identity data, and the foundation of white list is based on on-job registration employee) i.e. identity database In include subscriber identity information, report subscriber identity information " name: A " etc. information are stored in identity database (white list user Corresponding information is address name and user identity legitimacy, reports address name A, is white list for on-job registration employee User).The legitimacy for determining user identity is known by identification module.
It reports that user " name: A " obtains module by the report information in security risk information reporting platform, such as reports User obtains security risk photo, video or audio-frequency information using mobile phone;Security risk information data is sent to security risk Information reporting platform, by connecing, receiving module receives security risk information to security risk information reporting platform and report user believes Breath, for example, mobile phone is obtained security risk photo, video or audio-frequency information anonymization treated user's body by report user Part information passes through Industrial Ethernet together and is uploaded to Web server;Security risk information reporting platform by security risk information and Report user information is stored in relevant data server.
The responsible person that keeps the safety in production consults the security risk information of security risk information reporting platform, identity information shroud module Anonymization processing is carried out to the subscriber identity information in user ID data library, after anonymization is handled, display report user's body Part information is " name: a " (anonymization and belong to white list user).According to investigation, prediction, hidden danger grade classification and classify, Judge the validity of report information, and by the update module of security risk information reporting platform according to updating record information processing State, report information processing status include report in, investigation in, report result publicity.Report that result publicity includes that report is verified Effectively, report information is wrong.
3. identity information shroud module carries out anonymization processing in subscriber identity information typing, and carries out in report user When security risk information is reported, anonymization processing is carried out when calling the report user information in relative users identity database.Report Accusing subscriber identity information " name: A " and being stored in user ID data library is " name: a ".User is determined by identification module The legitimacy of identity.
It reports that user " name: a " obtains module by the report information in security risk information reporting platform, such as reports User obtains security risk photo, video or audio-frequency information using mobile phone;Security risk information data is sent to security risk Information reporting platform, by connecing, receiving module receives security risk information to security risk information reporting platform and report user believes Breath, for example, mobile phone is obtained security risk photo, video or audio-frequency information anonymization treated user's body by report user Part information passes through Industrial Ethernet together and is uploaded to Web server;Security risk information reporting platform by security risk information and Report user information is stored in relevant data server.
The responsible person that keeps the safety in production consults the security risk information of security risk information reporting platform and handles by anonymization Afterwards subscriber identity information " name: b " (identity information shroud module assign at random report mono- display information of user A " name: B " and a fixed hiding attribute (a), check and approve identity, not can know that true identity), it is drawn according to investigation, prediction, hidden danger grade Divide and classify, judges the validity of report information, and report according to update by the update module of security risk information reporting platform Accuse information processing state, report information processing status include report in, investigation in, report result publicity.Report result publicity packet It includes and reports that verification is effective, report information is wrong.
It being verified effectively according to report, safety in production responsible person arranges the relevant personnel to register security risk in time, with The standby foundation as later period rectification.If it was found that same type security risk, illustrates it is " common fault ", then needs thoroughly to rectify and improve, and root Decision is instructed according to the safety management that actual conditions formulate the later period.It is verified effectively in report, instantaneity safety hazards occurs, then It must order to stop work to rectify and improve immediately.For violation commander, violation operation behaviour, should directly contact party carry out it is corresponding correct and Punishment.For security risk person liable, visual love knot weight gives education and punishment.Due to the anonymity of identity information shroud module Change processing function, greatly protects the identity information of report user, avoid security risk person liable, colleague, leading body at a higher level Revenge may.
Preferably, report reward platform is verified effectively according to report in report result publicity, shields mould by identity information Root tuber is reversed to obtain corresponding report subscriber identity information " name: A ", enterprise according to one of above-mentioned three kinds corresponding anonymization nodes Industry safety manager is after audit report information is effective, by the report bonus payment of corresponding prize scale to report user's hair In " name: A " account.
It is highly preferred that the capital management statistical module of capital management platform, to security risk report prize funds classification system Family planning is at report.For example, subscriber identity information (name: a) report after report user (name: A) or anonymization is safe several times Hidden danger information obtains corresponding amount of money award.
As shown in figure 3, the step schematic diagram of the application method of security risk reporting system,
S101. the user ID data library in subscriber identity information typing identity management platform, identity information shroud module To the subscriber identity information in user ID data library and/or report that user information carries out anonymization processing.
S102. the identity database in identity management platform establishes white list, identification module pair according to identity data Security risk information reporting platform report user information or anonymization report user information and the white list compare with Identify and judge user identity.
S103. report user obtains module by the report information in security risk information reporting platform, by security risk Information is sent to security risk information reporting platform, and security risk information reporting platform receives security risk by connecing receiving module Information and report user information or anonymization report user information, by security risk information and report user information or anonymization report It accuses user information and is stored in memory module, identification module is to the report user information of security risk information reporting platform or hides Nameization report user information and user ID data library are compared to identify and judge user identity.
S104. the update module of security risk information reporting platform is according to actual development updating record information processing state, Report information processing status include report in, investigation in, report result publicity.
S105. report result publicity includes that report verification is effective, report information is wrong.
S106. report reward platform is verified effectively according to report in report result publicity, and identity information shroud module calls The report user information or anonymization in user ID data library report user information, trigger capital management platform to corresponding report User provides reward.
S107. the capital management statistical module of capital management platform, it is raw to security risk report prize funds statistic of classification At report.
The above is only presently preferred embodiments of the present invention, is not intended to limit the present invention in any form, It may not only be applied to the high risk industries such as coal mine, be equally applicable to be related to the other industry of security hidden trouble.Although the present invention is It is disclosed above in the preferred embodiment, however, it is not intended to limit the invention, and any technical staff for being familiar with this patent is not departing from Within the scope of technical solution of the present invention, when the technology contents using above-mentioned prompt make a little change or are modified to equivalent variations Equivalent embodiment, but anything that does not depart from the technical scheme of the invention content, according to the technical essence of the invention to above embodiments Made any simple modification, equivalent change and modification, in the range of still falling within the present invention program.

Claims (10)

1. a kind of security risk reporting system, including identity management platform, security risk information reporting platform, wherein Identity Management Platform includes user ID data library and identification module, which is characterized in that identity management platform further includes identity information screen Module is covered, the security risk information reporting platform receives security risk information and report user information, identification module The report user information and user ID data library of security risk information reporting platform are compared to identify and judge user Identity, the identity information shroud module in user ID data library subscriber identity information and/or report user information into The processing of row anonymization.
2. a kind of safety in production hidden danger reporting system according to claim 1, which is characterized in that the identity management platform In identity database white list, report of the identification module to security risk information reporting platform are established according to identity data User information or anonymization report user information and the white list are compared to identify and judge user identity.
3. a kind of security risk reporting system according to claim 1, which is characterized in that the identity information shroud module Anonymization processing include user's typing when identity information anonymization and/or identification module to report user information call When anonymization user ID data library compare to identify and judge user identity.
4. a kind of security risk reporting system according to claim 1, which is characterized in that the security risk information report Accusing platform includes that report information obtains module, receiving module, memory module and update module, the report information obtains, receives, Memory module obtained accordingly, received, storage report information, update module updating record information processing state.
5. a kind of security risk reporting system according to claim 4, it is characterised in that the report information handles shape State include report in, investigation in, report result publicity, the report result publicity include report verify effectively, report information It is wrong.
6. a kind of security risk reporting system according to claim 5, which is characterized in that further include report reward platform and Capital management platform, identity information shroud module call the report subscriber identity information in user ID data library, the report It rewards platform to be verified effectively according to report in report result publicity, triggering capital management platform provides reward to report user.
7. a kind of security risk reporting system according to claim 1, which is characterized in that the security risk information report Platform has security risk Information Statistics module, and security risk statistical module generates security risk report information statistic of classification and reports Table.
8. a kind of security risk reporting system according to claim 6, which is characterized in that the capital management platform has Capital management statistical module generates report to security risk report prize funds statistic of classification.
9. a kind of method based on security risk reporting system described in claim 1, it is characterised in that the following steps are included:
S101. the user ID data library in subscriber identity information typing identity management platform, identity information shroud module to Subscriber identity information and/or report user information in the identity database of family carry out anonymization processing.
S102. the identity database in identity management platform establishes white list according to identity data, and identification module is to safety Report user information or anonymization the report user information of hidden danger information reporting platform and the white list are compared to identify With judge user identity.
S103. report user obtains module by the report information in security risk information reporting platform, by security risk information Be sent to security risk information reporting platform, security risk information reporting platform by receiving module receive security risk information and It reports that user information or anonymization report user information, reports security risk information and report user information or anonymization to user Information is stored in memory module, report user information or anonymization report of the identification module to security risk information reporting platform It accuses user information and user ID data library is compared to identify and judge user identity.
S104. the update module of security risk information reporting platform is according to actual development updating record information processing state, report Information processing state include report in, investigation in, report result publicity.
S105. report result publicity includes that report verification is effective, report information is wrong.
10. a kind of method based on security risk reporting system as claimed in claim 6, it is characterised in that the following steps are included:
S101. the user ID data library in subscriber identity information typing identity management platform, identity information shroud module to Subscriber identity information and/or report user information in the identity database of family carry out anonymization processing.
S102. the identity database in identity management platform establishes white list according to identity data, and identification module is to safety Report user information or anonymization the report user information of hidden danger information reporting platform and the white list are compared to identify With judge user identity.
S103. report user obtains module by the report information in security risk information reporting platform, by security risk information It is sent to security risk information reporting platform, security risk information reporting platform receives security risk information by connecing receiving module User information is reported with report user information or anonymization, and security risk information and report user information or anonymization report are used Family information is stored in memory module, report user information or anonymization of the identification module to security risk information reporting platform Report user information and user ID data library are compared to identify and judge user identity.
S104. the update module of security risk information reporting platform is according to actual development updating record information processing state, report Information processing state include report in, investigation in, report result publicity.
S105. report result publicity includes that report verification is effective, report information is wrong.
S106. report reward platform is verified effectively according to report in report result publicity, and identity information shroud module calls user The report user information or anonymization of identity database report user information, trigger capital management platform to corresponding report user Provide reward.
S107. the capital management statistical module of capital management platform generates report to security risk report prize funds statistic of classification Table.
CN201910303605.0A 2019-04-16 2019-04-16 A kind of security risk reporting system and its method Pending CN110210989A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910303605.0A CN110210989A (en) 2019-04-16 2019-04-16 A kind of security risk reporting system and its method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910303605.0A CN110210989A (en) 2019-04-16 2019-04-16 A kind of security risk reporting system and its method

Publications (1)

Publication Number Publication Date
CN110210989A true CN110210989A (en) 2019-09-06

Family

ID=67785360

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910303605.0A Pending CN110210989A (en) 2019-04-16 2019-04-16 A kind of security risk reporting system and its method

Country Status (1)

Country Link
CN (1) CN110210989A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111783145A (en) * 2020-09-04 2020-10-16 城云科技(中国)有限公司 Remote supervision platform based on urban road management

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106952078A (en) * 2017-03-16 2017-07-14 青岛国际机场集团有限公司 SMS safety management systems based on BPM flow engines
CN107609765A (en) * 2017-09-01 2018-01-19 中国东方电气集团有限公司 A kind of factory's hidden troubles removing method and system
CN108717604A (en) * 2018-05-21 2018-10-30 西安科技大学 A kind of production safety hidden danger closed loop management system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106952078A (en) * 2017-03-16 2017-07-14 青岛国际机场集团有限公司 SMS safety management systems based on BPM flow engines
CN107609765A (en) * 2017-09-01 2018-01-19 中国东方电气集团有限公司 A kind of factory's hidden troubles removing method and system
CN108717604A (en) * 2018-05-21 2018-10-30 西安科技大学 A kind of production safety hidden danger closed loop management system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
中国战略与管理研究会主编: "《战略与管理 公营住宅:日本住宅保障制度的战后70年》", 30 September 2015 *
赵岗等: "《中国证券业监管发展与改革研究》", 31 January 2015, 中国发展出版社 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111783145A (en) * 2020-09-04 2020-10-16 城云科技(中国)有限公司 Remote supervision platform based on urban road management

Similar Documents

Publication Publication Date Title
US7379879B1 (en) Incident reporting system and method
CN106797417B (en) Contact center anti-fraud monitoring, detection and prevention scheme
CN104486346B (en) A kind of springboard machine system
CN103026345A (en) Dynamic multidimensional schemas for event monitoring priority
CN104217288A (en) Security management device and system for community comprehensive grid
Dennis A Mosaic Shield: Maynard, the Fourth Amendment, and Privacy Rights in the Digital Age
CN111598574A (en) Intelligent service transaction oriented supervision method and supervision interface
CN104240014B (en) A kind of online access control method and platform
CN103944719A (en) Comprehensive verification system and method for identities and documentary evidences
US20050131828A1 (en) Method and system for cyber-security damage assessment and evaluation measurement (CDAEM)
CN105427203A (en) House renting information management method and system
Gierlack et al. License plate readers for law enforcement: Opportunities and obstacles
CN110472944A (en) Safe operation and maintenance system based on comprehensive law enforcement management platform
CN107610261B (en) System capable of managing entrance and exit of construction site
CN110210989A (en) A kind of security risk reporting system and its method
KR102365571B1 (en) Method and apparatus for managing password including one-time password issuance function for integrally managing closed-circuit television
CN109726596A (en) A kind of appraisal of labor capacity plateform system
Satwiko Privacy and Data Protection: Indonesian Legal Framework
CN115563620A (en) Credible security method and security protection system for intelligent education platform
US20200285768A1 (en) Method for determining and displaying the security state of data
JP2014081951A (en) Real credit determination device for credit card and method therefor
EP3869435A1 (en) System for tracking banknotes transactions
Ibrahim et al. Fraud management system in detecting fraud in cellular telephone networks
Gurkin et al. Time and Attendance: Agencies Generally Compiled Data on Misconduct, and Reported Using Various Internal Controls for Monitoring
CN116955441A (en) Broken card early warning platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190906

RJ01 Rejection of invention patent application after publication