CN116090986A - Contractor safety management method and platform - Google Patents

Contractor safety management method and platform Download PDF

Info

Publication number
CN116090986A
CN116090986A CN202211647859.2A CN202211647859A CN116090986A CN 116090986 A CN116090986 A CN 116090986A CN 202211647859 A CN202211647859 A CN 202211647859A CN 116090986 A CN116090986 A CN 116090986A
Authority
CN
China
Prior art keywords
contractor
personnel
generating
outsourcing
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211647859.2A
Other languages
Chinese (zh)
Inventor
杨龙滨
卢闽南
陈健涛
肖军
程广华
王玉宝
白玉茹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaneng Information Technology Co Ltd
Original Assignee
Huaneng Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaneng Information Technology Co Ltd filed Critical Huaneng Information Technology Co Ltd
Priority to CN202211647859.2A priority Critical patent/CN116090986A/en
Publication of CN116090986A publication Critical patent/CN116090986A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063114Status monitoring or status determination for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/1091Recording time for administrative or management purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Development Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to the technical field of production safety, in particular to a contractor safety management method and a contractor safety management platform. Comprising the following steps: acquiring contractor information data and outsourcer information data, and generating a contractor qualification database and an identity information coding database; generating outsourcing personnel grades according to the outsourcing personnel information data, setting training modes according to the outsourcing personnel grades, acquiring outsourcing personnel assessment data, and generating an assessment qualified database; and generating an outsourcing personnel management flow, presetting a time node, and generating a contractor evaluation value and an outsourcing personnel evaluation value according to the time node. By setting the grade evaluation of the contractors, the information assessment record and statistics of the contractors are realized, a data basis is provided for the blacklists of the contractors and the blacklists of outsourcers, the comprehensive supervision of the outsourcers by security managers in factories is truly realized, and the supervision loopholes caused by information asymmetry are solved.

Description

Contractor safety management method and platform
Technical Field
The application relates to the technical field of production safety, in particular to a contractor safety management method and a contractor safety management platform.
Background
In the safety production management of power generation enterprises, a large number of outsourcing projects exist, staff related to contractors enter production sites, the contractors need to submit a large amount of project data, the digitization and the electronization of each power plant of the information are large in difference, outsourcing staff business skills, personal safety consciousness, dangerous source identification, prevention and the like are uneven, and a plurality of safety management problems exist in the factory area, so that the power generation enterprises bear huge safety production responsibility.
The contractor management platform of the power generation enterprise at the current stage can not dynamically update the qualification management of contractors according to the actual conditions of the site, and has the problems that the data files of the contractors, personnel qualification, training education and the like are scattered, the information sharing among all management modules is poor, the information is asymmetric, and the vulnerability is supervised.
Disclosure of Invention
The purpose of the present application is: in order to solve the technical problems, the application provides a contractor safety management method and platform, which aim to realize informationized management of contractor safety, strengthen safety supervision means and improve enterprise working efficiency.
In some embodiments of the application, the training module is arranged to integrate the outsourcing personnel list with three-level security education and three-level examination information, and an outsourcing personnel security file is established; and updating the evaluation value of outsourcing personnel through a preset time node to realize dynamic management and control of the outsourcing personnel.
In some embodiments of the present application, through setting up the work early warning module, through nimble configuration, can send the notice to security manager such as security supervision portion, recruitment department, team, contractor main management personnel, play initiative safety supervision effect.
In some embodiments of the method, the device and the system, the contractor information assessment record and statistics are realized by setting the contractor grade evaluation, data basis is provided for the contractor blacklist and the outsourcer blacklist, and the outsourcer management flow is set, so that the speed of handling the pass certificates of the outsourcers is accelerated, the standardization and the refinement of the contractor safety management are promoted, the comprehensive supervision of the outsourcers by the safety manager in a factory is truly realized, and the supervision loopholes caused by the information asymmetry are solved.
Some embodiments of the present application provide a contractor security management platform, comprising:
the system comprises a contractor management unit, an outsourcing personnel management unit and a field management unit, wherein the outsourcing personnel management unit is connected with the field management unit through wireless signals;
the contractor management unit includes:
the qualification auditing module is used for acquiring contractor qualification information data and generating a contractor qualification database;
the contractor evaluation module is used for acquiring contractor evaluation parameters according to a preset time node, generating a contractor evaluation value and a contractor grade, and generating a security file according to the contractor evaluation value and the contractor grade;
the outsourcing personnel management unit includes:
the identity data management module is used for acquiring outsourcing personnel information data and generating an identity information coding database;
the training module generates a training task instruction according to the type of outsourcers, acquires outsourcer assessment data and generates an assessment qualified database;
and the personnel evaluation module is used for generating an outsourcing personnel evaluation value according to the preset time node.
The site management unit includes:
the access control module is used for acquiring the identity information coding database and the qualified examination database;
and the face recognition module is used for verifying information through the face recognition module when outsourcing personnel enter a factory and generating a verification result.
In some embodiments of the present application, the contractor management unit further comprises:
the right management module is used for setting the right of the contractor and the right of the outsourcing personnel;
and the data storage module is used for storing the contractor security file generated by the contractor evaluation module.
In some embodiments of the present application, the outsourcing personnel management unit further includes:
the information management module is used for updating outsourcing personnel information data;
the personnel management module is used for setting working state data of outsourcing personnel, and updating the rights of the outsourcing personnel according to the working state data of the outsourcing personnel;
and the personnel monitoring module is used for generating an age checking result according to the preset time node and generating an age early warning instruction according to the age checking result.
In some embodiments of the present application, the field management unit further comprises:
the work early warning module is used for acquiring construction task data and factory entering personnel data, setting a factory entering time threshold according to the construction task data, generating a factory entering time value according to the factory entering personnel data, and generating a factory entering time reminding instruction when the factory entering time value is larger than the factory entering time threshold; when the outsourcing personnel are not matched with the factory entering and leaving data, the work early-warning module generates a brushing early-warning command;
and the personnel management module updates the working state data of outsourcing personnel according to the personnel data of the factory entering personnel acquired by the working early warning module.
Some embodiments of the present application provide a method for contractor security management, including:
acquiring contractor information data and outsourcer information data, and generating a contractor qualification database and an identity information coding database;
generating outsourcing personnel grades according to the outsourcing personnel information data, setting training modes according to the outsourcing personnel grades, acquiring outsourcing personnel assessment data, and generating an assessment qualified database;
and generating an outsourcing personnel management flow, presetting a time node, and generating a contractor evaluation value and an outsourcing personnel evaluation value according to the time node.
Wherein, when setting the training level according to the outsourcing personnel level, the method comprises the following steps:
presetting a first outsourcing personnel level and a second outsourcing personnel level;
when the outsourcing personnel is the first outsourcing personnel level, setting a first-level training mode,
and when the outsourcing personnel is the second outsourcing personnel level, setting a training-free mode.
In some embodiments of the present application, the generating the qualification database includes:
when the outsourcing personnel is the second outsourcing personnel level, generating a qualified instruction;
generating training content and test content when outsourcing personnel are in a first outsourcing personnel level, and generating a qualified instruction when the outsourcing personnel pass the test;
and generating an assessment qualified database according to the qualified instruction, inquiring a personnel qualification database according to the assessment qualified database, and generating a personnel qualification early warning instruction according to an inquiry result.
In some embodiments of the present application, when generating the outsourcing personnel management flow, the method includes:
when outsourcing personnel enter a factory, the entrance guard module performs information verification through the face recognition module and generates a verification result;
allowing the outsourcing personnel information data to pass when the outsourcing personnel information data exist in the identity information coding database and the qualified examination database at the same time;
when outsourcing personnel data exist in the identity information coding database, and outsourcing personnel data do not exist in the qualified examination database, the face recognition module photographs and sends a retraining instruction to the training module;
when outsourcing personnel data does not exist in the identity information coding database, the face recognition module photographs and generates personnel abnormal entrance early warning instructions.
In some embodiments of the present application, when generating the outsourcing personnel management flow, the method further includes:
acquiring construction task data and factory personnel data, setting a factory time threshold according to the construction task data, and generating a factory time value according to the factory personnel data;
generating a time-to-live reminding instruction when the time-to-live value is larger than the time-to-live threshold;
when the outsourcing personnel are not matched with the factory entering and leaving data, generating a brushing early warning instruction;
and obtaining outsourcing personnel age data according to the preset time node, generating an age checking result, and generating an age early warning instruction according to the age checking result.
In some embodiments of the present application, when generating the outsourcer evaluation value, the method includes:
acquiring outsourcer construction data between a current time node and a previous time node according to a preset time node, and generating an outsourcer evaluation value according to the outsourcer construction data;
presetting a first outsourcing personnel evaluation value and a second outsourcing personnel evaluation value, wherein the first outsourcing personnel evaluation value is larger than the second outsourcing personnel evaluation value;
generating a retraining instruction when the real-time outsourcing personnel evaluation value is larger than the first outsourcing personnel evaluation value;
and when the real-time outsourcing personnel evaluation value is larger than the second outsourcing personnel evaluation value, generating a behavior early warning instruction.
In some embodiments of the present application, the generating the contractor evaluation value includes:
presetting a contractor grade matrix A, and setting A (A1, A2, A3 and A4), wherein A1 is a first preset contractor grade, A2 is a second preset contractor grade, A3 is a third preset contractor grade, and A4 is a fourth preset contractor grade;
presetting a contractor evaluation value matrix B, and setting B (B1, B2, B3 and B4), wherein B1 is a preset first contractor evaluation value, B2 is a second contractor evaluation value, B3 is a third contractor evaluation value, B4 is a fourth contractor evaluation value, and B1 is more than 2 and less than 3 and less than 4;
acquiring a real-time contractor evaluation value b according to a preset time node, and setting a contractor grade a according to the real-time contractor evaluation value b;
when B1 < B2, setting the first preset contractor level A1 as the contractor level a, i.e. a=a1;
when B2 < B3, setting the second preset contractor level A2 as the contractor level a, i.e. a=a2;
when B3 < B4, setting a third preset contractor level A3 as contractor level a, i.e. a=a3;
when B > B4, a fourth preset contractor level A4 is set to contractor level a, i.e. a=a4.
Compared with the prior art, the contractor safety management method and the contractor safety management system have the beneficial effects that:
the problems of low safety information circulation efficiency, poor sharing performance, untimely transmission, poor management penetrability and the like are solved, the dynamic perception capability of main management personnel of outsourcing project management and control and contractors is improved, and the actual effect of field management is enhanced.
The safety management of the production and contract-issuing engineering of the basic unit is standardized, the life safety and the physical health of outsourcers are ensured, the contract-issuing business of the power plant is standardized, and a qualified contract-issuing database is established.
Drawings
FIG. 1 is a schematic diagram of a contractor security management platform in accordance with the preferred embodiments of the present application;
FIG. 2 is a schematic diagram of a contractor management unit in a contractor security management platform in accordance with the preferred embodiments of the present application;
FIG. 3 is a schematic diagram of a personnel management unit in a contractor security management platform in accordance with the preferred embodiments of the present application;
FIG. 4 is a schematic diagram of a field management unit in a contractor security management platform in accordance with the preferred embodiments of the present application;
FIG. 5 is a flow chart of a method for contractor security management in accordance with the preferred embodiments of the present application.
Detailed Description
The detailed description of the present application is further described in detail below with reference to the drawings and examples. The following examples are illustrative of the present application, but are not intended to limit the scope of the present application.
In the description of the present application, it should be understood that the terms "center," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like indicate orientations or positional relationships based on the orientation or positional relationships shown in the drawings, merely to facilitate description of the present application and simplify the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and therefore should not be construed as limiting the present application.
The terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the present application, unless otherwise indicated, the meaning of "a plurality" is two or more.
In the description of the present application, it should be noted that, unless explicitly specified and limited otherwise, the terms "mounted," "connected," and "connected" are to be construed broadly, and may be either fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the terms in this application will be understood by those of ordinary skill in the art in a specific context.
As shown in fig. 1-4, in a preferred embodiment of the present application, a contractor security management platform is provided, including:
the system comprises a contractor management unit, an outsourcing personnel management unit and a field management unit, wherein the outsourcing personnel management unit and the field management unit are connected through wireless signals;
the contractor management unit includes:
the qualification auditing module is used for acquiring contractor qualification information data and generating a contractor qualification database;
the contractor evaluation module is used for acquiring contractor evaluation parameters according to the preset time node, generating a contractor evaluation value and a contractor grade, and generating a security file according to the contractor evaluation value and the contractor grade;
the right management module is used for setting the right of the contractor and the right of the outsourcing personnel;
and the data storage module is used for storing the contractor security file generated by the contractor evaluation module.
Specifically, the acquired contractor qualification information data includes: business license, qualification certificate, security production and other license certificates, legal certificate or legal order.
Specifically, the permission management module comprises an automatic off-duty and a manual off-duty, is convenient for a power plant user to manage the permission of an outsourcing account in time, and performs access control forbidden access operation on all, most or individual personnel under a specific contractor contract.
Specifically, the outsourcing personnel management unit includes:
the identity data management module is used for acquiring outsourcing personnel information data and generating an identity information coding database;
the training module generates a training task instruction according to the type of outsourcers, acquires outsourcer assessment data and generates an assessment qualified database;
the personnel evaluation module is used for generating an outsourcing personnel evaluation value according to the preset time node;
the information management module is used for updating outsourcing personnel information data;
the personnel management module is used for setting the working state data of outsourcing personnel, and updating the rights of the outsourcing personnel according to the working state data of the outsourcing personnel;
and the personnel monitoring module is used for generating an age checking result according to the preset time node and generating an age early warning instruction according to the age checking result.
Specifically, the outsourcing personnel information data comprises contractor information, basic identity information, contact information, facial information and the like, and can be directly and correspondingly inquired according to the identity information code;
specifically, the personnel management module functions comprise daily access record management, outsourcing personnel change contractor management, change department team management, fake requesting/selling management, pass delay and three personnel qualification application and issuing functions. The field work of outsourcing personnel is embodied in the form of work tickets, and the work staff members in the work tickets are all from the approved outsourcing personnel. The outsourcing three personnel qualification in the working ticket must be obtained through the tool, the outsourcing personnel or the working department puts forward the outsourcing three personnel qualification examination application (working responsible person, working licensor, issuing person), then the working department and the safety supervision respectively carry out technical examination and safety rule examination, the factory leads the three personnel qualification of the examination qualification person to issue, the related qualification is automatically effective, and the related personnel can carry out two ticket operation.
It can be understood that the main functions of outsourcing personnel registration, outsourcing personnel information maintenance, outsourcing personnel change contractor, outsourcing personnel pass delay, three-person examination, outsourcing personnel overage, outsourcing leave management, outsourcing personnel blacklist, outsourcing personnel leave the post, outsourcing personnel restart recovery and the like can be realized through the outsourcing personnel management unit, and multiple complex and complete business scenes of outsourcing personnel from factory entering, education, construction, leave the post, re-entering, re-education, re-leave the post and the like can be met.
Specifically, the field management unit includes:
the access control module is used for acquiring an identity information coding database and an assessment qualification database;
and the face recognition module is used for verifying information through the entrance guard module when outsourcing personnel enter a factory and generating a verification result.
The work early warning module is used for acquiring construction task data and factory personnel data, setting a factory time threshold according to the construction task data, generating a factory time value according to the factory personnel data, and generating a factory time reminding instruction when the factory time value is greater than the factory time threshold; when the outsourcing personnel are not matched with the factory entering and leaving data, the work early-warning module generates a brushing early-warning command;
and the personnel management module updates the working state data of outsourcing personnel according to the personnel data of the factory entering personnel acquired by the working early warning module.
As shown in fig. 5, based on another preferred implementation manner of the contractor security management platform in the foregoing embodiment, this embodiment provides a contractor security management method, including:
s101: acquiring contractor information data and outsourcer information data, and generating a contractor qualification database and an identity information coding database;
s102: generating outsourcing personnel grades according to the outsourcing personnel information data, setting training modes according to the outsourcing personnel grades, acquiring outsourcing personnel assessment data, and generating an assessment qualified database;
s103: generating an outsourcing personnel management flow, presetting a time node, and generating a contractor evaluation value and an outsourcing personnel evaluation value according to the time node;
wherein, when setting for training level according to outsourcing personnel's level, include:
presetting a first outsourcing personnel level and a second outsourcing personnel level;
when the outsourcing personnel is the first outsourcing personnel level, setting a first-level training mode,
and when the outsourcing personnel is the second outsourcing personnel level, setting a training-free mode.
Specifically, the method for generating the qualification database includes:
when the outsourcing personnel is the second outsourcing personnel level, generating a qualified instruction;
generating training content and test content when outsourcing personnel are in a first outsourcing personnel level, and generating a qualified instruction when the outsourcing personnel pass the test;
generating an assessment qualified database according to the qualified instruction, inquiring a personnel qualification database according to the assessment qualified database, and generating a personnel qualification early warning instruction according to the inquiry result.
Specifically, when outsourcing staff goes into factories, inquiring a historical database, evaluating the historical work records of outsourcing staff if the historical work records of the outsourcing staff exist, and setting the outsourcing staff grade as a second outsourcing staff grade if no punishment records exist in the historical data of the outsourcing staff and the evaluation value of the historical outsourcing staff accords with expectations; if the historical data has punishment records or the historical outsourcing personnel evaluation value does not accord with the expectations, setting the outsourcing personnel grade as a first outsourcing personnel grade, and if the historical data does not have work records, setting the outsourcing personnel grade as the first outsourcing personnel grade.
Specifically, the training content is three-level security education of factory level, department level and team level, corresponding examination questions are generated according to the training content, and outsourcing personnel can enter the factory to work through examination parties.
Specifically, according to the job attributes of outsourcers, outsourcers entering a factory are pulled into maintained outsourcers, basic correspondence of contractors, outsourcers and personnel is achieved, the valid period of outsourcer passes is automatically filled according to the valid period of a contract, and the method is also applicable to outsourcers entering the factory halfway. According to the long-term and short-term, the factory and security monitoring part, the department of employment and the team carry out three-level security education examination (supporting on-line training examination, uploading off-line examination paper and the like).
In a preferred embodiment of the present application, when generating an outsourcing personnel management flow, the method includes:
when outsourcing personnel enter a factory, the entrance guard module performs information verification through the face recognition module and generates a verification result;
allowing the outsourcing personnel information data to pass when the outsourcing personnel information data exist in the identity information coding database and the qualified examination database at the same time;
when outsourcing personnel data exist in the identity information coding database, and the outsourcing personnel data do not exist in the qualified database, the face recognition module photographs and sends a retraining instruction to the training module;
when outsourcing personnel data does not exist in the identity information coding database, the face recognition module photographs and generates personnel abnormal entrance early warning instructions.
Specifically, the outsourcing personnel who accomplish tertiary safety education, platform automatic push to factory side door forbidden system, and access control system can carry out operations such as checking, biological information collection, access control authorization to outsourcing personnel.
Specifically, when outsourcing personnel enter factories, face data of the outsourcing personnel are collected by the face recognition module, face data corresponding to the identity information codes collected by the access control system are checked, and if the face data are inconsistent, an early warning instruction is sent.
Specifically, the access control system queries according to the acquired identity code information, and only when outsourcers qualify and check data are qualified, the outsourcers are allowed to enter.
Specifically, when the outsourcing personnel management flow is generated, the method further comprises the following steps:
acquiring construction task data and factory personnel data, setting a factory time threshold according to the construction task data, and generating a factory time value according to the factory personnel data;
generating a time-to-live reminding instruction when the time-to-live value is larger than the time-to-live threshold;
when the outsourcing personnel are not matched with the factory entering and leaving data, generating a brushing early warning instruction;
according to the preset time node, obtaining outsourcing personnel age data, generating an age checking result, and generating an age early warning instruction according to the age checking result.
Specifically, after the outsourcing personnel completes three-level education, the relevant qualification accessory reminding such as labor contract, professional (health) physical examination, industrial injury/accident risk, contractor self-test proof and the like cannot be uploaded in time, and uploading material reminding is carried out; the platform calculates the overage and underage condition of outsourcing personnel at regular time and gives prompt in time; in the field construction process, outsourcing work responsible persons do not remind the persons in the factory;
after outsourcing personnel enter a factory, no factory record reminding exists in 24 hours; outsourcing personnel leave the factory and enter the factory to record mismatching, and provide active early warning for other people to swipe a card (face); and under the condition that outsourcing personnel do not enter the factory for a long time, the platform is linked with a side door forbidden system of the factory, the qualification of entering the factory is cancelled, and an automatic off-duty prompt is sent to related personnel.
It can be appreciated that in the above embodiment, by setting the outsourcing personnel management flow, through flexible configuration, a notification can be sent to security management personnel such as security monitoring parts, engineering departments, teams, contractors and the like, so as to play an active security monitoring role. The comprehensive supervision of the personnel to be packaged by the security manager in the factory is realized, and the supervision loopholes caused by the information asymmetry are solved;
in a preferred embodiment of the present application, when generating the outsourcing personnel evaluation value, the method includes:
acquiring outsourcer construction data between a current time node and a previous time node according to a preset time node, and generating an outsourcer evaluation value according to the outsourcer construction data;
presetting a first outsourcing personnel evaluation value and a second outsourcing personnel evaluation value, wherein the first outsourcing personnel evaluation value is larger than the second outsourcing personnel evaluation value;
when the real-time outsourcing personnel evaluation value is larger than the first outsourcing personnel evaluation value, generating a retraining instruction;
and when the real-time outsourcing personnel evaluation value is larger than the second outsourcing personnel evaluation value, generating a behavior early warning instruction.
Specifically, the factory area is provided with video monitoring full coverage, the scene dynamics is monitored in real time in an omnibearing way for 24 hours, specific construction action image data of outsourcing personnel are collected through an image collecting module, the image data of the construction process and personnel wearing image data of the factory area are obtained, the collected image data are processed through a behavior analyzing module and then are compared with the construction flow data, whether the construction process of the outsourcing personnel accords with the specification is judged, and whether the outsourcing personnel has illegal behaviors is obtained.
Specifically, the construction flow data is a standard construction specification generated from industry safety standards and construction site history data, which includes a construction sequence, construction notes, constructor operation specifications and behavior specifications, constructor wearing specifications, and the like.
Specifically, the real-time outsourcer evaluation value is determined in a manner that the data platform processes the collected image data according to the behavior analysis module, then processes the comparison result of the collected image data and the construction flow data, scores the image data according to the preset evaluation standard, and determines the real-time outsourcer evaluation value according to the score.
For example, the construction is not performed according to the prescribed sequence of steps, the deduction is performed according to the number and importance degree of the steps which are not performed, if the construction is not worn according to the regulations, the deduction is performed according to the articles which are not worn, if the construction is illegal, the deduction is performed according to the types of the actions.
For example, if the helmet, the reflective coating and the trousers are set in the preset evaluation standard, the outsourcer deducts 5 points when the outsourcer is detected to not wear the helmet, the outsourcer deducts 5 points when the outsourcer is detected to not wear the reflective coating, and the outsourcer deducts 5 points when the outsourcer is detected to not wear the trousers.
For example, when the construction process is divided into several steps, such as there are unexecuted steps in the construction process, one step is missing minus 5 points. The subtraction was 10 points absent for the important step.
The above is only an example, and the factory can set an evaluation standard according to the actual construction situation, and make a corresponding deduction item, so as to obtain the real-time outsourcing personnel evaluation value.
And finally accumulating all the deductions, wherein the obtained value is the evaluation value of the outsourcing personnel in real time.
Specifically, the smaller the actual outsourcer evaluation value is, the more compliance of the construction process is proved, and the larger the actual outsourcer evaluation value is, the more illegal behaviors exist in the construction process.
In a preferred embodiment of the present application, when generating the contractor evaluation value, the method includes:
presetting a contractor grade matrix A, and setting A (A1, A2, A3 and A4), wherein A1 is a first preset contractor grade, A2 is a second preset contractor grade, A3 is a third preset contractor grade, and A4 is a fourth preset contractor grade;
presetting a contractor evaluation value matrix B, and setting B (B1, B2, B3 and B4), wherein B1 is a preset first contractor evaluation value, B2 is a second contractor evaluation value, B3 is a third contractor evaluation value, B4 is a fourth contractor evaluation value, and B1 is more than 2 and less than 3 and less than 4;
acquiring a real-time contractor evaluation value b according to a preset time node, and setting a contractor grade a according to the real-time contractor evaluation value b;
when B1 < B2, setting the first preset contractor level A1 as the contractor level a, i.e. a=a1;
when B2 < B3, setting the second preset contractor level A2 as the contractor level a, i.e. a=a2;
when B3 < B4, setting a third preset contractor level A3 as contractor level a, i.e. a=a3;
when B > B4, a fourth preset contractor level A4 is set to contractor level a, i.e. a=a4.
Specifically, the evaluation index is selected for qualification evaluation, different weights are given to the sub-items by adopting an Analytic Hierarchy Process (AHP), the sub-items are provided with small scoring items, the scoring standard and the score of each scoring item are designed, the score of each sub-item is 100 points, and finally the score is converted into a percentage system according to a weight coefficient, so that the grade of the contractor is determined.
Specifically, when the score is greater than 90, the fourth preset contractor grade is given, the safety certification can be directly issued, and the bidding process is prioritized; when the score is between 80 and 90, the third preset contractor grade is adopted, and the safety certification can be directly issued; when the score is between 70 and 80, giving a correction period of 1 to 3 months for the second preset contractor grade, and issuing a qualification certificate after the correction and review qualification. The key supervision of the existing contractual projects; when the score is between 60 and 70, the admission limit is entered and no security pass is issued. The downtime of the existing contractor projects is completed.
According to the first conception, the training module is arranged to integrate the outsourcing personnel list with three-level security education and three-level examination information, and an outsourcing personnel security file is established; and updating the evaluation value of outsourcing personnel through a preset time node to realize dynamic management and control of the outsourcing personnel.
According to the second conception of the application, through setting the working early warning module, the working early warning module can send a notification to safety management personnel such as safety supervision parts, engineering departments, teams and contractors and the like through flexible configuration, and plays a role in active safety supervision.
According to the third conception, the contractor information assessment record and statistics are realized through setting the contractor grade evaluation, a data basis is provided for the contractor blacklist and the outsourcer blacklist, and through setting the outsourcer management flow, the outsourcer passing certificate handling speed is accelerated, the standardization and the refinement of the contractor safety management are promoted, the outsourcer information is accurate through the use of an identity card number logic algorithm and an identity card reader, the use of a fake identity card number is stopped, the comprehensive supervision of the outsourcer by the security manager in a factory is truly realized, and the supervision loophole caused by the information asymmetry is solved.
The foregoing is merely a preferred embodiment of the present application, and it should be noted that modifications and substitutions can be made by those skilled in the art without departing from the technical principles of the present application, and these modifications and substitutions should also be considered as being within the scope of the present application.

Claims (10)

1. A contractor security management platform, comprising:
the system comprises a contractor management unit, an outsourcing personnel management unit and a field management unit, wherein the outsourcing personnel management unit is connected with the field management unit through wireless signals;
the contractor management unit includes:
the qualification auditing module is used for acquiring contractor qualification information data and generating a contractor qualification database;
the contractor evaluation module is used for acquiring contractor evaluation parameters according to a preset time node, generating a contractor evaluation value and a contractor grade, and generating a security file according to the contractor evaluation value and the contractor grade;
the outsourcing personnel management unit includes:
the identity data management module is used for acquiring outsourcing personnel information data and generating an identity information coding database;
the training module generates a training task instruction according to the type of outsourcers, acquires outsourcer assessment data and generates an assessment qualified database;
the personnel evaluation module is used for generating an outsourcing personnel evaluation value according to the preset time node;
the site management unit includes:
the access control module is used for acquiring the identity information coding database and the qualified examination database;
and the face recognition module is used for verifying information through the entrance guard module when outsourcing personnel enter a factory and generating a verification result.
2. The contractor security management platform of claim 1, wherein the contractor management unit further comprises:
the right management module is used for setting the right of the contractor and the right of the outsourcing personnel;
and the data storage module is used for storing the contractor security file generated by the contractor evaluation module.
3. The contractor security management platform of claim 2, wherein the outsourcer management unit further comprises:
the information management module is used for updating outsourcing personnel information data;
the personnel management module is used for setting working state data of outsourcing personnel;
according to the working state data of the outsourcing personnel, the authority management module updates the authority of the outsourcing personnel;
and the personnel monitoring module is used for generating an age checking result according to the preset time node and generating an age early warning instruction according to the age checking result.
4. The contractor security management platform of claim 3, wherein the field management unit further comprises:
the work early warning module is used for acquiring construction task data and factory entering personnel data, setting a factory entering time threshold according to the construction task data, generating a factory entering time value according to the factory entering personnel data, and generating a factory entering time reminding instruction when the factory entering time value is larger than the factory entering time threshold; when the outsourcing personnel are not matched with the factory entering and leaving data, the work early-warning module generates a brushing early-warning command;
and the personnel management module updates the working state data of outsourcing personnel according to the personnel data of the factory entering personnel acquired by the working early warning module.
5. A method for contractor security management, comprising:
acquiring contractor information data and outsourcer information data, and generating a contractor qualification database and an identity information coding database;
generating outsourcing personnel grades according to the outsourcing personnel information data, setting training modes according to the outsourcing personnel grades, acquiring outsourcing personnel assessment data, and generating an assessment qualified database;
generating an outsourcing personnel management flow, presetting a time node, and generating a contractor evaluation value and an outsourcing personnel evaluation value according to the time node;
wherein, when setting the training level according to the outsourcing personnel level, the method comprises the following steps:
presetting a first outsourcing personnel level and a second outsourcing personnel level;
when the outsourcing personnel is the first outsourcing personnel level, setting a first-level training mode,
and when the outsourcing personnel is the second outsourcing personnel level, setting a training-free mode.
6. The method for managing contractor security according to claim 5, wherein the step of generating the qualification database comprises:
when the outsourcing personnel is the second outsourcing personnel level, generating a qualified instruction;
generating training content and test content when outsourcing personnel are in a first outsourcing personnel level, and generating a qualified instruction when the outsourcing personnel pass the test;
and generating an assessment qualified database according to the qualified instruction, inquiring a personnel qualification database according to the assessment qualified database, and generating a personnel qualification early warning instruction according to an inquiry result.
7. The contractor security management method of claim 6, wherein the generating the outsourcing personnel management flow comprises:
when outsourcing personnel enter a factory, the entrance guard module performs information verification through the face recognition module and generates a verification result;
allowing the outsourcing personnel information data to pass when the outsourcing personnel information data exist in the identity information coding database and the qualified examination database at the same time;
when outsourcing personnel data exist in the identity information coding database, and outsourcing personnel data do not exist in the qualified examination database, the face recognition module photographs and sends a retraining instruction to the training module;
when outsourcing personnel data does not exist in the identity information coding database, the face recognition module photographs and generates personnel abnormal entrance early warning instructions.
8. The contractor security management method of claim 7, wherein when generating the outsourcer management flow, further comprising:
acquiring construction task data and factory personnel data, setting a factory time threshold according to the construction task data, and generating a factory time value according to the factory personnel data;
generating a time-to-live reminding instruction when the time-to-live value is larger than the time-to-live threshold;
when the outsourcing personnel are not matched with the factory entering and leaving data, generating a brushing early warning instruction;
and obtaining outsourcing personnel age data according to the preset time node, generating an age checking result, and generating an age early warning instruction according to the age checking result.
9. The contractor security management method of claim 8, wherein; the step of generating the outsourcing personnel evaluation value comprises the following steps:
acquiring outsourcer construction data between a current time node and a previous time node according to a preset time node, and generating an outsourcer evaluation value according to the outsourcer construction data;
presetting a first outsourcing personnel evaluation value and a second outsourcing personnel evaluation value, wherein the first outsourcing personnel evaluation value is larger than the second outsourcing personnel evaluation value;
generating a retraining instruction when the real-time outsourcing personnel evaluation value is larger than the first outsourcing personnel evaluation value;
and when the real-time outsourcing personnel evaluation value is larger than the second outsourcing personnel evaluation value, generating a behavior early warning instruction.
10. The method for managing contractor security according to claim 5, wherein the step of generating the contractor evaluation value comprises:
presetting a contractor grade matrix A, and setting A (A1, A2, A3 and A4), wherein A1 is a first preset contractor grade, A2 is a second preset contractor grade, A3 is a third preset contractor grade, and A4 is a fourth preset contractor grade;
presetting a contractor evaluation value matrix B, and setting B (B1, B2, B3 and B4), wherein B1 is a preset first contractor evaluation value, B2 is a second contractor evaluation value, B3 is a third contractor evaluation value, B4 is a fourth contractor evaluation value, and B1 is more than 2 and less than 3 and less than 4;
acquiring a real-time contractor evaluation value b according to a preset time node, and setting a contractor grade a according to the real-time contractor evaluation value b;
when B1 < B2, setting the first preset contractor level A1 as the contractor level a, i.e. a=a1;
when B2 < B3, setting the second preset contractor level A2 as the contractor level a, i.e. a=a2;
when B3 < B4, setting a third preset contractor level A3 as contractor level a, i.e. a=a3;
when B > B4, a fourth preset contractor level A4 is set to contractor level a, i.e. a=a4.
CN202211647859.2A 2022-12-21 2022-12-21 Contractor safety management method and platform Pending CN116090986A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211647859.2A CN116090986A (en) 2022-12-21 2022-12-21 Contractor safety management method and platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211647859.2A CN116090986A (en) 2022-12-21 2022-12-21 Contractor safety management method and platform

Publications (1)

Publication Number Publication Date
CN116090986A true CN116090986A (en) 2023-05-09

Family

ID=86186057

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211647859.2A Pending CN116090986A (en) 2022-12-21 2022-12-21 Contractor safety management method and platform

Country Status (1)

Country Link
CN (1) CN116090986A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117151614A (en) * 2023-07-13 2023-12-01 华能信息技术有限公司 Workflow midflow Cheng Cuiban method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117151614A (en) * 2023-07-13 2023-12-01 华能信息技术有限公司 Workflow midflow Cheng Cuiban method

Similar Documents

Publication Publication Date Title
Collins Punishing risk
CN109508848B (en) Enterprise production security risk assessment and management system
US6714894B1 (en) System and method for collecting, processing, and distributing information to promote safe driving
Buchanan Toward a theory of the ethics of bureaucratic organizations
CN105701598A (en) Economic management cost control system
CN116090986A (en) Contractor safety management method and platform
KR102438757B1 (en) Smart Safety Platform
CN116050840B (en) Information security risk discovery method and discovery system
US10706654B2 (en) Worksite ingress/egress system
CN117056882B (en) Automatic approval method and system for security access management
CN113344313A (en) Management method of enterprise information assets
US7620555B1 (en) Process for computer implemented manuscript review
CN115641229A (en) Production safety management and control system of wisdom power plant
JP2008027272A (en) Site information management system
Zhan et al. An in-depth learn from incidents (LFI) approach based on HFACS-RAs
Kemshall Risk in probation practice: the hazards and dangers of supervision
Walton Regulation in child protection—policy failure?
Saurin et al. A human error perspective of safety planning and control
KR100435193B1 (en) System For Risk Based Audit on On-Line
Foulkes et al. Development and validation of the HMRI safety culture inspection model and toolkit
Mira et al. Testing and practical validation of an individual safety performance assessment methodology–the SSP System
Todolí-Signes Complying with the First Law of Robotics: An Analysis of the Occupational Risks Associated with Work Directed by an Algorithm/Artificial Intelligence
KR101352023B1 (en) Monitoring method for workload
CN117217625B (en) Enterprise safety supervision method and device based on data analysis
CN113990080B (en) Highway vehicle passing safety whole-course detection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination