CN111178677A - Personnel safety control method and device - Google Patents

Personnel safety control method and device Download PDF

Info

Publication number
CN111178677A
CN111178677A CN201911234149.5A CN201911234149A CN111178677A CN 111178677 A CN111178677 A CN 111178677A CN 201911234149 A CN201911234149 A CN 201911234149A CN 111178677 A CN111178677 A CN 111178677A
Authority
CN
China
Prior art keywords
information
personnel
authority
target activity
work
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911234149.5A
Other languages
Chinese (zh)
Inventor
宓群超
肖艳炜
阙凌燕
卢敏
陈伟伟
陈琼良
陈立
章杜锡
吴炳超
黄银强
周泰斌
奚洪磊
薛大立
陈晓雷
黄佳佳
戚峰
赖欢欢
朱乐超
徐欢
姚海蛟
蒋正威
金学奇
杨健一
刘子浩
潘伟
余知真
郑洪波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Zhejiang Electric Power Co Ltd
Wenzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
State Grid Zhejiang Electric Power Co Ltd
Wenzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Zhejiang Electric Power Co Ltd, Wenzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical State Grid Zhejiang Electric Power Co Ltd
Priority to CN201911234149.5A priority Critical patent/CN111178677A/en
Publication of CN111178677A publication Critical patent/CN111178677A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/1093Calendar-based scheduling for persons or groups
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Data Mining & Analysis (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a personnel safety control method and a personnel safety control device. The method comprises the following steps: determining working state information of personnel, wherein the working state information comprises user attribute information, effective time information and effective authority information; determining at least one target activity area, at least one target activity time and operation authority based on the working state information; generating a work authority card of the personnel according to the at least one target activity area, the at least one target activity time and the operation authority; and carrying out safety control on the personnel based on the work authority card. The personnel safety management and control method and the personnel safety management and control device can automatically identify the external personnel and specific tasks, and carry out effective access control strategy and cooperative management mechanism to establish a programmed safety management and control system for the external personnel.

Description

Personnel safety control method and device
Technical Field
The disclosure relates to the field of computer information processing, in particular to a personnel security control method and a personnel security control device.
Background
Aiming at the safety management technology of the power enterprises, some domestic researches provide the concept of an intrinsic safety power grid enterprise and an intrinsic safety management system of the power grid enterprise, according to the practical management of the power grid enterprise, through integrating excellent enterprise practices and by means of a big data model, a 'circle layer' model for constructing the intrinsic safety management system is provided, and the integrity of a safety management system framework is realized through three dimensions of personnel, a network and equipment.
At present, related technical terms assist in safety management of both network and equipment, but an effective management and control method is still lacking in the aspect of safety management of personnel. At present, the security management of personnel has been popularized to the daily security management of official personnel, such as establishing the authority of a user, tracking the operation state of the user, analyzing the behavior of the user, and the like. However, due to the special working environment of the power grid, external workers are often required to assist in debugging or installing various devices. Foreign staff have certain hidden dangers in the aspects of qualification determination, safety education and operation behavior specification, and a large burden is added to the safety management of workplaces such as a machine room and the like. The existing access control system safety management and control is difficult to automatically identify external personnel and specific tasks due to the fact that a system of the external personnel is not established for butt joint and linkage, and an effective access control strategy and a cooperative management mechanism are lacked, so that the automation and intelligentization level is low, the actual situation that a third party service provider enters a specific work place for more and more times along with the expansion of power grid services is faced, and if the external personnel are subjected to safety management and control, the problem is to be solved urgently at present.
Disclosure of Invention
In view of this, the present disclosure provides a method and an apparatus for personnel security management and control, which can automatically identify external personnel and specific tasks, and perform effective access control policy and cooperative management mechanism to establish a programmed security management and control system for the external personnel.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to an aspect of the present disclosure, there is provided a personnel safety control method, including: determining working state information of personnel, wherein the working state information comprises user attribute information, effective time information and effective authority information; determining at least one target activity area, at least one target activity time and operation authority based on the working state information; generating a work authority card of the personnel according to the at least one target activity area, the at least one target activity time and the operation authority; and carrying out safety control on the personnel based on the work authority card.
In an exemplary embodiment of the present disclosure, further comprising: when the personnel enter an operation site through the work authority card, acquiring the position information and the operation information of the work authority card in real time; generating personnel route data based on the position information of the work authority card; and generating personnel behavior data based on the operation information of the work authority card.
In an exemplary embodiment of the present disclosure, determining at least one target activity area, at least one target activity time, and operation authority based on the operation state information includes: determining at least one target activity area based on the user attribute information and an area attribute table; determining at least one target activity time based on the valid time information; and determining the operation authority based on the valid authority information.
In an exemplary embodiment of the present disclosure, acquiring the position information and the operation information of the work authority card in real time includes: and acquiring the position information and the operation information of the work authority card in real time based on an electronic fence technology.
In an exemplary embodiment of the present disclosure, the acquiring, in real time, the position information and the operation information of the work authority card based on the electronic fence technology includes: acquiring the position information of the work authority card in real time through a sensor in the electronic fence technology; and acquiring the operation data of the work authority card in real time through application layer software in the electronic fence technology to generate the operation information.
In an exemplary embodiment of the present disclosure, the performing security control on the person based on the work authority card includes: and updating the target activity area, the target activity time and the operation authority of the work authority card in real time based on control management software in the electronic fence technology.
In an exemplary embodiment of the present disclosure, further comprising: performing area division on an actual operation site to generate a plurality of activity areas; and generating the region division table based on the plurality of active regions and the region identifiers.
In an exemplary embodiment of the present disclosure, further comprising: performing attribute distribution on actual workers to generate a plurality of user attributes; and generating the attribute allocation table based on the plurality of user attributes and the attribute identification.
In an exemplary embodiment of the present disclosure, further comprising: and associating a plurality of active areas in the area division table with a plurality of user attributes in the attribute distribution tables to generate an area attribute table.
According to an aspect of the present disclosure, a personal safety management and control device is provided, the device including: the information module is used for determining the working state information of personnel, and the working state information comprises user attribute information, effective time information and effective authority information; the target module is used for determining at least one target activity area, at least one target activity time and operation authority based on the working state information; the authority module is used for generating a work authority card of the personnel according to the at least one target activity area, the at least one target activity time and the operation authority; and the management and control module is used for carrying out safety management and control on the personnel based on the work authority card.
According to the personnel safety management and control method and device, working state information of personnel is determined, wherein the working state information comprises user attribute information, effective time information and effective authority information; determining at least one target activity area, at least one target activity time and operation authority based on the working state information; generating a work authority card of the personnel according to the at least one target activity area, the at least one target activity time and the operation authority; and the mode of carrying out safety control on the personnel based on the work right card can automatically identify external personnel and specific tasks, and carry out effective access control strategy and cooperative management mechanism to establish an external personnel programmed safety control system.
Drawings
The present invention is described in detail below with reference to the attached drawings.
Fig. 1 is a system block diagram illustrating a method and apparatus for personnel security management according to an exemplary embodiment.
FIG. 2 is a flow chart illustrating a method for personnel safety management according to an exemplary embodiment.
Fig. 3 is a flow chart illustrating a method for personnel safety management according to another exemplary embodiment.
FIG. 4 is a schematic diagram illustrating a method of personnel safety management according to another exemplary embodiment.
Fig. 5 is a block diagram illustrating a personal safety management device according to an exemplary embodiment.
Detailed Description
Fig. 1 is a system block diagram illustrating a method and apparatus for personnel security management according to an exemplary embodiment.
As shown in FIG. 1, system architecture 100 may include work authority cards 101, 102, 103, network 104, and server 105. Network 104 is the medium used to provide communication links between work authority cards 101, 102, 103 and server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use work rights cards 101, 102, 103 to interact with server 105 over network 104 to receive or send messages, etc. Various radio frequency identification software may be installed on the work- rights cards 101, 102, 103.
The work right cards 101, 102, 103 may be devices with radio frequency transceiving means, and the work right cards 101, 102, 103 may also be built in the form of applications in the mobile terminals of users, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server that provides various services, such as a background management server that manages a work area into which a user enters using the work- right cards 101, 102, 103. The background management server may analyze and process the received data related to the work authority cards 101, 102, and 103, and may also configure data for the work authority cards 101, 102, and 103.
The server 105 may, for example, determine the working status information of the person, which includes user attribute information, validity time information, and validity authority information; server 105 may determine at least one target activity area, at least one target activity time, and operational rights, e.g., based on the operational state information; the server 105 may generate a work authority card for the person, e.g., based on the at least one target activity area, the at least one target activity time, the operating authority; the server 105 may, for example, perform security management on the person based on the work rights card.
The server 105 also obtains the position information and the operation information of the work authority card in real time when the personnel enters the operation field through the work authority card; the server 105 also generates personnel route data, for example, based on the location information of the work authority card; the server 105 also generates personnel behavior data, for example, based on the operational information of the work authority card.
The server 105 may be a physical server, or may be composed of a plurality of servers, for example, it should be noted that the personnel security management and control method provided by the embodiment of the present disclosure may be executed by the server 105, and accordingly, the personnel security management and control apparatus may be disposed in the server 105.
The utility model discloses a to the actual conditions that the number of times increases that current third party service provider gets into specific factory, the automatic all-in-one in the actual scene has realized that safety education and job ticket combine the management, but lack the key and OMS linkage, through implementing the intermodal management technology research based on OMS job ticket and computer lab entrance guard, can the very big degree divide work area meticulously, clear and definite work object and responsibility, through the small region route graphical linkage authorization technique based on electronic fence, establish effectual mathematical model and carry out electronic fence management, effectual promotion automation business management and control intellectuality and reliability level, strengthen whole safety control, unite different little regional management that refines, finally realize the reliability management in whole region.
The following detailed description of the present disclosure refers to specific embodiments thereof.
FIG. 2 is a flow chart illustrating a method for personnel safety management according to an exemplary embodiment. The personnel safety control method 20 at least comprises steps S202 to S208.
As shown in fig. 2, in S202, work state information of the person is determined, where the work state information includes user attribute information, valid time information, and valid authority information.
Wherein, the user attribute information may include: temporary personnel, short-term personnel, medium-and long-term personnel, and the like;
the effective time may include: single active, 24 hours active, active during working time, active during XX-XX, etc.;
valid permissions may include: the access control system comprises a gate access control authority, a device access control authority, an instrument operation authority, an XX area access control authority and the like.
Wherein, effective authority can be generated through a work ticket management mechanism, and the function of a work ticket system is as follows: the basic system for ensuring the safety production of the power system is an effective safety measure for preventing misoperation in the power operation management. The work ticket system is mainly used for determining the responsibility in work and taking necessary measures to avoid accidents after evaluating the problem points which may occur when dangerous work occurs.
In S204, at least one target activity area, at least one target activity time, and operation authority are determined based on the operation state information.
In one embodiment, may include: determining at least one target activity area based on the user attribute information and an area attribute table; determining at least one target activity time based on the valid time information; and determining the operation authority based on the valid authority information.
In one embodiment, further comprising: performing area division on an actual operation site to generate a plurality of activity areas; and generating the region division table based on the plurality of active regions and the region identifiers.
In one embodiment, further comprising: performing attribute distribution on actual workers to generate a plurality of user attributes; and generating the attribute allocation table based on the plurality of user attributes and the attribute identification.
In one embodiment, further comprising: and associating a plurality of active areas in the area division table with a plurality of user attributes in the attribute distribution tables to generate an area attribute table.
For example, for a transient person, the zone accessible to the transient person may be determined by a lookup in a zone attribute table.
In S206, a work right card of the person is generated according to the at least one target activity area, the at least one target activity time, and the operation right. And setting the authority of the work card of the personnel, specifically comprising that the personnel can carry out XX type operation in XX time and in XX area.
And in S208, safety control is carried out on the personnel based on the work authority card.
According to the personnel safety management and control method, the working state information of personnel is determined, wherein the working state information comprises user attribute information, effective time information and effective authority information; determining at least one target activity area, at least one target activity time and operation authority based on the working state information; generating a work authority card of the personnel according to the at least one target activity area, the at least one target activity time and the operation authority; and the mode of carrying out safety control on the personnel based on the work right card can automatically identify external personnel and specific tasks, and carry out effective access control strategy and cooperative management mechanism to establish an external personnel programmed safety control system.
It should be clearly understood that this disclosure describes how to make and use particular examples, but the principles of this disclosure are not limited to any details of these examples. Rather, these principles can be applied to many other embodiments based on the teachings of the present disclosure.
Fig. 3 is a flowchart illustrating a personnel safety control method and apparatus according to another exemplary embodiment. The flow shown in fig. 3 is a detailed description that is complementary to the flow shown in fig. 2.
As shown in fig. 3, in S302, when the person enters the operation site through the work authority card, the position information and the operation information of the work authority card are obtained in real time. The location information and operational information of the work authority card can be obtained in real time, for example, based on electronic fence technology.
In one embodiment, the acquiring the position information and the operation information of the work authority card in real time based on the electronic fence technology comprises the following steps: acquiring the position information of the work authority card in real time through a sensor in the electronic fence technology; and acquiring the operation data of the work authority card in real time through application layer software in the electronic fence technology to generate the operation information.
The electronic fence is a perimeter anti-theft alarm system and consists of an electronic fence host and a front-end detection fence. The electronic fence host generates and receives a high-voltage pulse signal, can generate an alarm signal when the front-end detection fence is in a state of touching, short-circuit and open-circuit, and sends an intrusion signal to a safety alarm center; the front end detection fence is a tangible perimeter formed by components such as rods, metal wires and the like. Through controlling the keyboard or controlling the software, can realize the multilevel network connection.
The electronic fence combines the traditional electronic fence technology and the network technology, and the terminal control machine can transmit information to the Web server through the network. The user can directly use the browser to watch the alarm information on the Web server, and the authorized user can also set the system configuration.
In S304, the person route data is generated based on the position information of the work authority card. As shown in fig. 4, the person position information may be generated according to the position information of the work authority card, and the person route data may also be generated according to the person position time series of the work authority card.
More specifically, the person route data may be generated by, for example, using 24 hours as the data update time, and recording the position information of the user once every predetermined time from the time when the user first uses the work authority card in the present day as the start time.
In S306, the person behavior data is generated based on the operation information of the work authority card. The personnel behavior data can be generated according to the operation behavior time sequence of the work authority card.
More specifically, for example, 24 hours may be used as the data update time, and all the operation behaviors performed by the user through the work authority card may be recorded from the time when the user uses the work authority card for the first time in the present day as the start time, so as to generate the personnel behavior data.
In S308, security control is performed on the person based on the work authority card. When the user exceeds the preset authority area, alarm information can be automatically generated to inform the manager.
Security issues may also be located, for example, by revisiting data from individual personnel when they occur.
The method can also comprise the following steps: and updating the target activity area, the target activity time and the operation authority of the work authority card in real time based on control management software in the electronic fence technology. The user authority cards of certain personnel can be automatically locked when an alarm occurs.
According to the method, the region responsibility and the region object are determined by finely dividing the actual operation site into small regions, effective electronic fence management and control are realized, meanwhile, a security strategy with special pertinence is established by combining the attributes of different types of operators, and finally behavior and route graphical analysis and display of the operators are realized on the basis; and the analysis of personnel working behaviors and the registration of the machine account can be realized by using a small-area route graphical linkage authorization technology based on the electronic fence.
Those skilled in the art will appreciate that all or part of the steps implementing the above embodiments are implemented as computer programs executed by a CPU. When executed by the CPU, performs the functions defined by the above-described methods provided by the present disclosure. The program may be stored in a computer readable storage medium, which may be a read-only memory, a magnetic or optical disk, or the like.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods. For details not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method of the present disclosure.
Fig. 5 is a block diagram illustrating a personal safety management device according to an exemplary embodiment. As shown in fig. 5, the personal safety management apparatus 50 includes: an information module 502, a goal module 504, a rights module 506, and a governance module 508.
The information module 502 is configured to determine working state information of a person, where the working state information includes user attribute information, valid time information, and valid permission information;
the target module 504 is used for determining at least one target activity area, at least one target activity time and operation authority based on the working state information; the method comprises the following steps: determining at least one target activity area based on the user attribute information and an area attribute table; determining at least one target activity time based on the valid time information; and determining the operation authority based on the valid authority information.
The authority module 506 is configured to generate a work authority card of the person according to the at least one target activity area, the at least one target activity time, and the operation authority; and
the management and control module 508 is configured to perform security management and control on the personnel based on the work authority card. The method comprises the following steps: and updating the target activity area, the target activity time and the operation authority of the work authority card in real time based on control management software in the electronic fence technology.
According to the personnel safety control device, working state information of personnel is determined, wherein the working state information comprises user attribute information, effective time information and effective authority information; determining at least one target activity area, at least one target activity time and operation authority based on the working state information; generating a work authority card of the personnel according to the at least one target activity area, the at least one target activity time and the operation authority; and the mode of carrying out safety control on the personnel based on the work right card can automatically identify external personnel and specific tasks, and carry out effective access control strategy and cooperative management mechanism to establish an external personnel programmed safety control system.
Exemplary embodiments of the present disclosure are specifically illustrated and described above. It is to be understood that the present disclosure is not limited to the precise arrangements, instrumentalities, or instrumentalities described herein; on the contrary, the disclosure is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (10)

1. A personnel safety control method is characterized by comprising the following steps:
determining working state information of personnel, wherein the working state information comprises user attribute information, effective time information and effective authority information;
determining at least one target activity area, at least one target activity time and operation authority based on the working state information;
generating a work authority card of the personnel according to the at least one target activity area, the at least one target activity time and the operation authority; and
and carrying out safety control on the personnel based on the work authority card.
2. The method of claim 1, further comprising:
when the personnel enter an operation site through the work authority card, acquiring the position information and the operation information of the work authority card in real time;
generating personnel route data based on the position information of the work authority card; and
and generating personnel behavior data based on the operation information of the work authority card.
3. The method of claim 1, wherein determining at least one target activity area, at least one target activity time, and operational rights based on the operational status information comprises:
determining at least one target activity area based on the user attribute information and an area attribute table;
determining at least one target activity time based on the valid time information; and
and determining the operation authority based on the effective authority information.
4. The method of claim 2, wherein obtaining location information and operational information of the work authority card in real-time comprises:
and acquiring the position information and the operation information of the work authority card in real time based on an electronic fence technology.
5. The method of claim 4, wherein obtaining the location information and the operation information of the work privilege card in real time based on electronic fence technology comprises:
acquiring the position information of the work authority card in real time through a sensor in the electronic fence technology; and
and acquiring the operation data of the work authority card in real time through application layer software in the electronic fence technology to generate the operation information.
6. The method of claim 4, wherein the security governing of the person based on the work authority card comprises:
and updating the target activity area, the target activity time and the operation authority of the work authority card in real time based on control management software in the electronic fence technology.
7. The method of claim 3, further comprising:
performing area division on an actual operation site to generate a plurality of activity areas; and
and generating the area division table based on the plurality of active areas and the area identification.
8. The method of claim 3, further comprising:
performing attribute distribution on actual workers to generate a plurality of user attributes; and
generating the attribute allocation table based on the plurality of user attributes and the attribute identification.
9. The method of claim 7 or 8, further comprising:
and associating a plurality of active areas in the area division table with a plurality of user attributes in the attribute distribution tables to generate an area attribute table.
10. Personnel's safety management and control device, its characterized in that includes:
the information module is used for determining the working state information of personnel, and the working state information comprises user attribute information, effective time information and effective authority information;
the target module is used for determining at least one target activity area, at least one target activity time and operation authority based on the working state information;
the authority module is used for generating a work authority card of the personnel according to the at least one target activity area, the at least one target activity time and the operation authority; and
and the management and control module is used for carrying out safety management and control on the personnel based on the work authority card.
CN201911234149.5A 2019-12-05 2019-12-05 Personnel safety control method and device Pending CN111178677A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911234149.5A CN111178677A (en) 2019-12-05 2019-12-05 Personnel safety control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911234149.5A CN111178677A (en) 2019-12-05 2019-12-05 Personnel safety control method and device

Publications (1)

Publication Number Publication Date
CN111178677A true CN111178677A (en) 2020-05-19

Family

ID=70657238

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911234149.5A Pending CN111178677A (en) 2019-12-05 2019-12-05 Personnel safety control method and device

Country Status (1)

Country Link
CN (1) CN111178677A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113724423A (en) * 2021-09-02 2021-11-30 广东电网有限责任公司 Personnel information interconnection management system of transformer substation
CN113763222A (en) * 2021-11-08 2021-12-07 四川旷谷信息工程有限公司 Corridor operation control method, system and storage medium
CN114360136A (en) * 2022-01-14 2022-04-15 云南电网有限责任公司电力科学研究院 Intelligent safety access control management method and system for power grid operation
CN114743297A (en) * 2022-03-30 2022-07-12 广东医科大学顺德妇女儿童医院(佛山市顺德区妇幼保健院) Inpatient passing management method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103280041A (en) * 2013-05-08 2013-09-04 广东电网公司珠海供电局 Monitoring method and monitoring system for automatic deploying virtual electronic fence
CN103699961A (en) * 2013-12-11 2014-04-02 中国广核集团有限公司 System and method for managing and controlling authority of personnel in multiple areas
US20180248891A1 (en) * 2017-02-28 2018-08-30 Microsoft Technology Licensing, Llc Content management based on spatial and temporal information
CN108960554A (en) * 2018-02-09 2018-12-07 珠海优特电力科技股份有限公司 It is a kind of to run and maintenance safety control device, system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103280041A (en) * 2013-05-08 2013-09-04 广东电网公司珠海供电局 Monitoring method and monitoring system for automatic deploying virtual electronic fence
CN103699961A (en) * 2013-12-11 2014-04-02 中国广核集团有限公司 System and method for managing and controlling authority of personnel in multiple areas
US20180248891A1 (en) * 2017-02-28 2018-08-30 Microsoft Technology Licensing, Llc Content management based on spatial and temporal information
CN108960554A (en) * 2018-02-09 2018-12-07 珠海优特电力科技股份有限公司 It is a kind of to run and maintenance safety control device, system and method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113724423A (en) * 2021-09-02 2021-11-30 广东电网有限责任公司 Personnel information interconnection management system of transformer substation
CN113763222A (en) * 2021-11-08 2021-12-07 四川旷谷信息工程有限公司 Corridor operation control method, system and storage medium
CN114360136A (en) * 2022-01-14 2022-04-15 云南电网有限责任公司电力科学研究院 Intelligent safety access control management method and system for power grid operation
CN114743297A (en) * 2022-03-30 2022-07-12 广东医科大学顺德妇女儿童医院(佛山市顺德区妇幼保健院) Inpatient passing management method and system
CN114743297B (en) * 2022-03-30 2023-08-08 广东医科大学顺德妇女儿童医院(佛山市顺德区妇幼保健院) Hospitalized patient passing management method and system

Similar Documents

Publication Publication Date Title
CN111178677A (en) Personnel safety control method and device
US10019677B2 (en) Active policy enforcement
US20150281287A1 (en) Policy/rule engine, multi-compliance framework and risk remediation
US20150302362A1 (en) Time tracking device and method
CN110892374A (en) System and method for providing access management platform
Ma et al. A blockchain-based risk and information system control framework
Baig et al. Cyber-security risk assessment framework for critical infrastructures
CN114639183A (en) Intelligent inspection method, system, computer equipment and medium based on element
CN109684863B (en) Data leakage prevention method, device, equipment and storage medium
CN111581417A (en) Identity recognition method, terminal, system and storage medium for power distribution room constructors
CN110033174A (en) A kind of industrial information efficient public security system building method
CN109029573A (en) A kind of pipeline method for inspecting and system
Aginsa et al. Enhanced information security management system framework design using ISO 27001 and zachman framework-A study case of XYZ company
CN115017484A (en) Access control method and device
Salehie et al. Adaptive security and privacy in smart grids: A software engineering vision
CN113973193A (en) Security quality control method, electronic device and readable medium
Shojaeshafiei et al. Cybersecurity framework requirements to quantify vulnerabilities based on GQM
Griffioen et al. Assessing risks and modeling threats in the internet of things
Hecht et al. Cybersecurity risk assessment in smart grids
CN116050848A (en) Risk management safety monitoring method based on cloud service
Smith et al. Cyber risk analysis for a smart grid: How smart is smart enough? A multi-armed bandit approach
Brown et al. AMI system security requirements
KR20040011863A (en) Real Time Information Security Risk Management System and Method
Dik et al. Key issues of information security of smart home systems
CN109714371A (en) A kind of industry control network safety detecting system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200519