CN116433004A - Urban public security-oriented risk prevention and control method and system based on coding traceability - Google Patents

Urban public security-oriented risk prevention and control method and system based on coding traceability Download PDF

Info

Publication number
CN116433004A
CN116433004A CN202310136145.3A CN202310136145A CN116433004A CN 116433004 A CN116433004 A CN 116433004A CN 202310136145 A CN202310136145 A CN 202310136145A CN 116433004 A CN116433004 A CN 116433004A
Authority
CN
China
Prior art keywords
user
information
accessed object
risk
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310136145.3A
Other languages
Chinese (zh)
Other versions
CN116433004B (en
Inventor
朱东
邱荣国
彭希男
蓝文耀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yaodong Safety Technology Co ltd
Original Assignee
Shenzhen Yaodong Safety Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yaodong Safety Technology Co ltd filed Critical Shenzhen Yaodong Safety Technology Co ltd
Priority to CN202310136145.3A priority Critical patent/CN116433004B/en
Publication of CN116433004A publication Critical patent/CN116433004A/en
Application granted granted Critical
Publication of CN116433004B publication Critical patent/CN116433004B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A30/00Adapting or protecting infrastructure or their operation
    • Y02A30/60Planning or developing urban green infrastructure

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of urban safety, in particular to a risk prevention and control method and system for urban public safety based on coding tracing, which are applied to the technical field of urban safety. The public security risk management scheme provided by the invention can be used for implementing urban security management more precisely, comprehensively making urban integral security management, and improving urban integral public security supervision efficiency.

Description

Urban public security-oriented risk prevention and control method and system based on coding traceability
Technical Field
The application relates to the technical field of urban safety, in particular to a risk prevention and control method and system for urban public safety based on coding tracing.
Background
The urban complex giant system has similar operation mechanism and complexity to human body. In analogy to the human body, a complex urban system can be regarded as a living body, an indication of the state of operation of which is the "urban body sign". The urban physical sign has three characteristics of system integration, dynamic and static combination and quantifiable display.
The vital signs of the city are combined dynamically and statically, and have relatively long-term steady-state signs such as construction land and the like and transient change signs such as road traffic flow and the like. Because the running condition of the city is complex and changeable, public safety management becomes a problem to be solved urgently, the current public safety management lacks an effective and efficient management scheme, is relatively scattered, not centralized and is characterized in that a large number of supervision personnel are required to examine and follow-up transaction processing on various conditions of the city in face of various potential safety hazards, and the city is inconvenient to supervise.
Disclosure of Invention
In order to solve the problems that a large number of supervisory personnel are required to examine various conditions of the city and the city is inconvenient to supervise due to complex and changeable conditions in the city, the application provides a risk prevention and control method and system for public security of the city based on coding tracing.
In a first aspect, the present application provides a risk prevention and control method for public security of cities based on code tracing, which adopts the following technical scheme: the method comprises the following steps:
s1, user applies for coding
A user sends a coding request to a public safety risk prevention and control system through a user side, and the public safety risk prevention and control system is requested to give an access safety code;
s2, checking a coding request of a user to perform first risk assessment and determining whether coding is performed or not
The public safety risk prevention and control system responds to the coding request, performs information check and first risk assessment on the user and the accessed object, and determines whether to code or not based on the information check result and the first risk assessment result;
the public security risk prevention and control system generates an access security code based on a preset rule through information check and first risk assessment, and sends the access security code to a user side;
the public safety risk prevention and control system sends feedback information to the user side without passing the information check and the first risk assessment;
s3, sending and verifying access request
A user obtaining an access security code sends an access request to a current accessed object through a user terminal, when the current accessed object receives the access request, the access security code sent by the user is identified, access request information contained in the access security code is extracted, whether the current user has access authority for the current accessed object is judged, and a judgment result is given;
s4, if the user has access rights, accessing the current accessed object by the user based on the user rights;
s5, if the user does not have the access right after judging, feeding back unrecognizable information to the user side and a background terminal of the public safety risk prevention and control system, and determining whether to return to the step S1 or not by the user side based on the feedback information, and submitting the coding request again;
s6, carrying out real-time safety monitoring on the user and the visited object
The public safety risk prevention and control system monitors an accessed object and a user in real time, extracts necessary safety information according to a preset rule based on a monitoring result and sends the necessary safety information to a user side and/or an accessed object side and/or a public safety risk prevention and control system terminal;
s7, performing second risk assessment based on real-time safety monitoring;
the public security risk prevention and control system makes a second risk assessment for the current user and/or the current accessed object based on the received necessary security information, and sends a second risk assessment result for the current user to the accessed object side and a second risk assessment result of the accessed object to the user side; s8, early warning and/or real-time access intervention are/is carried out based on the second risk assessment result
And the background of the public safety risk prevention and control system decides whether to send early warning information to the accessed object side and/or the user side and whether to forcibly interfere with the current access or not based on a preset rule according to a second risk assessment result made by the system.
Further, the coding request at least comprises user information and accessed object information, wherein the accessed object information at least comprises the name of an accessed object, the address of the accessed object and the number of the accessed object;
the user information comprises user basic information, current access application authority, access matters and/or user numbers.
Further, the user of the user terminal comprises a natural person and/or safety monitoring equipment;
the accessed objects include sites, devices and/or internet platforms provided with access rights.
Further, in the step S2, the public security risk prevention and control system responds to the coding request, performs information verification and first risk assessment on the identity of the user and the accessed object,
the information check comprises a user information check, an accessed object information check and a check whether the user is matched with the accessed object or not;
the user information verification comprises user access application authority verification, user access item verification and user basic information verification;
the accessed object information check comprises a name check of an accessed object, an address check of the accessed object and a number check of the accessed object;
the user is checked against the accessed object for a match, including checking whether the access transaction issued by the current user matches the accessed object.
Further, in the step S2, the public security risk prevention and control system responds to the coding request, performs information verification and first risk assessment on the identity of the user and the accessed object,
wherein the first risk assessment includes a user risk assessment and an accessed object risk assessment,
the user risk assessment comprises user identity risk assessment, user access item risk assessment and/or user position risk assessment, and user risk grade is given;
the accessed object risk assessment comprises accessed object identity assessment and/or accessed object associated event risk assessment corresponding to user access matters, and gives the accessed object risk level.
Further, in step S2, the public security risk prevention and control system sends feedback information to the user side without passing through the information check and the first risk assessment, where the feedback information includes a reason that the first risk assessment of the user fails and/or a reason that the first risk assessment of the accessed object fails, and a corresponding first risk assessment level;
in step S5, if the user does not have the access right, the feedback is unable to identify information to the user side and the background terminal of the public security risk prevention and control system, and the user side decides whether to return to step S1 based on the feedback information, and resubmisses the coding request, specifically including: the user decides whether to carry out the coding request after the information correction or to terminate the coding request based on the received feedback information; the background terminal of the public safety risk prevention and control system determines whether to forcibly interrupt coding and send out early warning or not according to a first risk assessment level of a user or an accessed object based on a preset safety risk prevention and control rule.
Further, in step S6, the public security risk prevention and control system monitors the accessed object and the user in real time, extracts necessary security information according to a preset rule based on the monitoring result, and sends the information to the user terminal and/or the accessed object terminal and/or the public security risk prevention and control system terminal, which specifically includes: the public security risk prevention and control system extracts key information related to potential hazard current public security access related to users and/or accessed objects in real time based on big data and internet security sharing platform updating data, sorts the necessary security information of the users and/or the necessary security information of the accessed objects based on preset rules, sends the necessary security information of the users to the accessed objects for receiving, helps the accessed objects evaluate the security level of the currently accessed users, and/or sends the necessary security information of the accessed objects to the currently accessed users, and helps the users evaluate the security level of the currently accessed objects.
Further, in step S7, the public security risk prevention and control system makes a second risk assessment for the current user and/or the current accessed object based on the received necessary security information, and sends a second risk assessment result for the current user to the accessed object side, and sends a second risk assessment result of the accessed object to the user side, which specifically includes: the public security risk prevention and control system synchronously receives necessary security information of a user and/or necessary security information of an accessed object in real time, makes a second risk assessment for a current user and/or the current accessed object based on the received necessary security information, sends a second risk assessment result for the current user to the accessed object side, and sends a second risk assessment result of the accessed object to the user side;
the step S8 of forcibly intervening the current access specifically comprises the following steps: the system forcibly interrupts the communication or transaction between the user and the accessed object, or the public safety risk prevention and control system directly alarms through the Internet alarm to execute manual intervention access.
The invention also provides a city-oriented public security risk prevention and control system based on coding tracing, which is used for executing the city-oriented public security risk prevention and control method based on coding tracing, and comprises the following steps:
the user terminal module is used for information interaction between the user and the accessed object module, the monitoring module, the early warning module, the risk assessment module and the coding module;
the accessed object module is used for information interaction between the accessed object and the user, the monitoring module, the early warning module and the risk assessment module;
the checking and evaluating module is used for finishing information checking and risk evaluation of the user and the accessed object and sending a risk evaluation result to the user side, the accessed object side and the control background;
the coding module is used for determining whether to code or not according to the information checking result and the first risk assessment result; the coding module generates an access security code based on a preset rule through information check and first risk assessment, and sends the access security code to the user side module; the verification evaluation module sends feedback information to the user side without passing the information verification and the first risk evaluation;
the monitoring module is used for carrying out real-time safety monitoring on the user and the accessed object;
the monitoring module monitors the accessed object and the user in real time, extracts necessary safety information according to preset rules based on monitoring results and sends the necessary safety information to a user terminal module, a checking and evaluating module, an accessed object module, an early warning module and/or a background terminal of the public safety risk prevention and control system;
the early warning module is used for early warning and/or real-time access intervention based on the second risk assessment result
And the background of the public safety risk prevention and control system decides whether to send early warning information to the accessed object side and/or the user side and whether to forcibly interfere with the current access or not based on a preset rule according to a second risk assessment result made by the system.
Further, the user terminal module comprises a coding request unit and an access request unit,
the coding request unit is used for sending a coding request to the public safety risk prevention and control system through the user side and requesting the public safety risk prevention and control system to give an access safety code;
the access request unit is used for sending an access request to the accessed module after the user obtains the access security code;
the accessed object module comprises an access request authorization unit,
the access request authorization unit is used for obtaining an access security code sent by a user, identifying the access security code sent by the user, extracting access request information contained in the access security code, judging whether the current user has access rights to the current accessed object, and if so, allowing the current user to access the current accessed object based on the user rights; if the user does not have the access right, feeding back unrecognizable information to the user side module and a background terminal of the public safety risk prevention and control system, and determining whether to resubmit the coding request to the verification evaluation module and the coding module by the user side module based on the feedback information;
the checking and evaluating module comprises an information checking unit, a first risk evaluating unit and a second risk evaluating unit,
wherein the information checking unit is used for checking whether the information of the user and the accessed object is correct,
a first risk assessment unit for responding to the coding request, checking information of the user and the accessed object and assessing first risk,
the second risk assessment unit is used for making a second risk assessment for the current user and/or the current accessed object based on the necessary security information sent by the monitoring module, sending a second risk assessment result for the current user to the accessed object module, sending a second risk assessment result for the accessed object to the user side module, and sending a second risk assessment result for the current user and/or the current accessed object to the background terminal and the early warning module.
The beneficial technical effects are as follows:
the technical scheme provided by the invention creatively aims at the integral public security of the city as an object, realizes that each specific security responsible person, including visitors and visited objects, can be incorporated into the urban security management system, can carry out risk investigation and risk monitoring in the early stage of visit through tracing, and can also carry out security risk monitoring in the visit process, namely the public security risk management scheme provided by the invention can carry out urban security management more finely, can carry out integral security management of the city more comprehensively, ensures that the urban public security management is more effective and more convenient, really realizes early risk discovery and early investigation, and improves the integral public security supervision efficiency of the city.
Drawings
Fig. 1 is a flowchart of a risk prevention and control method for urban public security based on code tracing in the present application.
Fig. 2 is a block diagram of a city public security risk tracing device.
Detailed Description
The present application is described in further detail below in conjunction with fig. 1-2.
The embodiment of the application discloses a risk prevention and control method for urban public security based on coding tracing, which adopts the following technical scheme: the method comprises the following steps:
s1, user applies for coding
A user sends a coding request to a public safety risk prevention and control system through a user side, and the public safety risk prevention and control system is requested to give an access safety code; for example, the current user is a natural person, the accessed object to be accessed is an office building, and the access person can input an access request in the system in advance by using mobile equipment of the user side, such as a mobile phone, without the need of arriving at the site to perform access registration in a traditional mode, thereby improving the working efficiency.
S2, checking a coding request of a user to perform first risk assessment and determining whether coding is performed or not
The public safety risk prevention and control system responds to the coding request, performs information check and first risk assessment on the user and the accessed object, and determines whether to code or not based on the information check result and the first risk assessment result; through the first risk assessment, the defect that the existing public place access coding tends to be situation coding does not really play a role in safety management is overcome, when a visitor does not arrive at the site, the first risk investigation of the visitor, namely an access user, can be completed, and the access safety code can be obtained only by the information check and the risk investigation user, namely the safety access permission is obtained.
The public security risk prevention and control system generates an access security code based on a preset rule through information check and first risk assessment, and sends the access security code to a user side;
the public safety risk prevention and control system sends feedback information to the user side without passing the information check and the first risk assessment;
s3, sending and verifying access request
A user obtaining an access security code sends an access request to a current accessed object through a user terminal, when the current accessed object receives the access request, the access security code sent by the user is identified, access request information contained in the access security code is extracted, whether the current user has access authority for the current accessed object is judged, and a judgment result is given; in other words, for the user who obtains the access security code, when the user performs access to the accessed object, the accessed object performs real-time information check, only if the check is correct, the access can be allowed, the access is not allowed due to the check error, and the security monitoring is not reduced while the access time program is registered on the saved site.
S4, if the user has access rights, accessing the current accessed object by the user based on the user rights;
s5, if the user does not have the access right after judging, feeding back unrecognizable information to the user side and a background terminal of the public safety risk prevention and control system, and determining whether to return to the step S1 or not by the user side based on the feedback information, and submitting the coding request again;
s6, carrying out real-time safety monitoring on the user and the visited object
The public safety risk prevention and control system monitors an accessed object and a user in real time, extracts necessary safety information according to a preset rule based on a monitoring result and sends the necessary safety information to a user side and/or an accessed object side and/or a public safety risk prevention and control system terminal; the whole safety scheme still executes real-time safety supervision and monitoring for events in the access process, such as real-time access to public places, and real-time acquisition of safety information of visitors or accessed objects through a monitoring camera or based on Internet big data.
S7, performing second risk assessment based on real-time safety monitoring;
the public security risk prevention and control system makes a second risk assessment for the current user and/or the current accessed object based on the received necessary security information, and sends a second risk assessment result for the current user to the accessed object side and a second risk assessment result of the accessed object to the user side; s8, early warning and/or real-time access intervention are/is carried out based on the second risk assessment result
And the background of the public safety risk prevention and control system decides whether to send early warning information to the accessed object side and/or the user side and whether to forcibly interfere with the current access or not based on a preset rule according to a second risk assessment result made by the system.
Preferably, the coding request at least comprises user information and accessed object information,
the accessed object information at least comprises the name of the accessed object, the address of the accessed object and the number of the accessed object;
the user information comprises user basic information, current access application authority, access matters and/or user numbers.
In specific implementation, the identities of the user and the accessed object are actually exchanged according to whether the user and the accessed object are visitors or the accessed object in an occurrence event, and the user at the user end can enable a natural person and/or safety monitoring equipment to enter and exit from an office building, a company or a mall, the visitor is a person, the accessed object is an office building, if a fire alarm needs to be linked with a fire department in the occurrence time, the visitor is fire monitoring equipment in a public place, the accessed object is an Internet line alarm platform or a fire department, the monitoring equipment directly sends an access coding request to the Internet platform when shooting a fire, the Internet platform recognizes whether the fire alarm requirement is met based on a preset rule, and further allows the alarm permission to be further directly given to an alarm receiving end through the coding mode, namely the accessed object, and then carries out subsequent processing, and the visitor, namely the user and the accessed object are broad understanding based on urban common public safety risk management and are not limited to the natural person or a specific place and place;
the accessed objects include sites, devices and/or internet platforms provided with access rights.
Preferably, in the step S2, the public security risk prevention and control system performs information verification and first risk assessment on the identity of the user and the accessed object in response to the coding request,
the information check comprises a user information check, an accessed object information check and a check whether the user is matched with the accessed object or not;
the user information verification comprises user access application authority verification, user access item verification and user basic information verification;
the accessed object information check comprises a name check of an accessed object, an address check of the accessed object and a number check of the accessed object;
the user is checked against the accessed object for a match, including checking whether the access transaction issued by the current user matches the accessed object.
Preferably, in the step S2, the public security risk prevention and control system performs information verification and first risk assessment on the identity of the user and the accessed object in response to the coding request,
wherein the first risk assessment includes a user risk assessment and an accessed object risk assessment,
the user risk assessment comprises user identity risk assessment, user access item risk assessment and/or user position risk assessment, and user risk grade is given;
the accessed object risk assessment comprises accessed object identity assessment and/or accessed object associated event risk assessment corresponding to user access matters, and gives the accessed object risk level.
Preferably, in step S2, the public security risk prevention and control system sends feedback information to the user side without passing through the information check and the first risk assessment, where the feedback information includes a reason that the first risk assessment of the user fails and/or a reason that the first risk assessment of the accessed object fails, and a corresponding first risk assessment level;
in step S5, if the user does not have the access right, the feedback is unable to identify information to the user side and the background terminal of the public security risk prevention and control system, and the user side decides whether to return to step S1 based on the feedback information, and resubmisses the coding request, specifically including: the user decides whether to carry out the coding request after the information correction or to terminate the coding request based on the received feedback information; the background terminal of the public safety risk prevention and control system determines whether to forcibly interrupt coding and send out early warning or not according to a first risk assessment level of a user or an accessed object based on a preset safety risk prevention and control rule.
Preferably, in step S6, the public security risk prevention and control system monitors the accessed object and the user in real time, extracts necessary security information according to a preset rule based on the monitoring result, and sends the extracted necessary security information to the user side and/or the accessed object side and/or the public security risk prevention and control system terminal, and specifically includes: the public security risk prevention and control system extracts key information related to potential hazard current public security access related to users and/or accessed objects in real time based on big data and internet security sharing platform updating data, sorts the necessary security information of the users and/or the necessary security information of the accessed objects based on preset rules, sends the necessary security information of the users to the accessed objects for receiving, helps the accessed objects evaluate the security level of the currently accessed users, and/or sends the necessary security information of the accessed objects to the currently accessed users, and helps the users evaluate the security level of the currently accessed objects.
Preferably, in step S7, the public security risk prevention and control system makes a second risk assessment for the current user and/or the current accessed object based on the received necessary security information, and sends a second risk assessment result for the current user to the accessed object side, and sends a second risk assessment result of the accessed object to the user side, which specifically includes: the public security risk prevention and control system synchronously receives necessary security information of a user and/or necessary security information of an accessed object in real time, makes a second risk assessment for a current user and/or the current accessed object based on the received necessary security information, sends a second risk assessment result for the current user to the accessed object side, and sends a second risk assessment result of the accessed object to the user side;
the step S8 of forcibly intervening the current access specifically comprises the following steps: the system forcibly interrupts the communication or transaction between the user and the accessed object, or the public safety risk prevention and control system directly alarms through the Internet alarm to execute manual intervention access.
The invention also provides a city-oriented public security risk prevention and control system based on coding tracing, which is used for executing the city-oriented public security risk prevention and control method based on coding tracing, and comprises the following steps:
the user terminal module is used for information interaction between the user and the accessed object module, the monitoring module, the early warning module, the risk assessment module and the coding module;
the accessed object module is used for information interaction between the accessed object and the user, the monitoring module, the early warning module and the risk assessment module;
the checking and evaluating module is used for finishing information checking and risk evaluation of the user and the accessed object and sending a risk evaluation result to the user side, the accessed object side and the control background;
the coding module is used for determining whether to code or not according to the information checking result and the first risk assessment result; the coding module generates an access security code based on a preset rule through information check and first risk assessment, and sends the access security code to the user side module; the verification evaluation module sends feedback information to the user side without passing the information verification and the first risk evaluation;
the monitoring module is used for carrying out real-time safety monitoring on the user and the accessed object;
the monitoring module monitors the accessed object and the user in real time, extracts necessary safety information according to preset rules based on monitoring results and sends the necessary safety information to a user terminal module, a checking and evaluating module, an accessed object module, an early warning module and/or a background terminal of the public safety risk prevention and control system;
the early warning module is used for early warning and/or real-time access intervention based on the second risk assessment result
And the background of the public safety risk prevention and control system decides whether to send early warning information to the accessed object side and/or the user side and whether to forcibly interfere with the current access or not based on a preset rule according to a second risk assessment result made by the system.
Preferably, the client module comprises a coding request unit and an access request unit,
the coding request unit is used for sending a coding request to the public safety risk prevention and control system through the user side and requesting the public safety risk prevention and control system to give an access safety code;
the access request unit is used for sending an access request to the accessed module after the user obtains the access security code;
the accessed object module comprises an access request authorization unit,
the access request authorization unit is used for obtaining an access security code sent by a user, identifying the access security code sent by the user, extracting access request information contained in the access security code, judging whether the current user has access rights to the current accessed object, and if so, allowing the current user to access the current accessed object based on the user rights; if the user does not have the access right, feeding back unrecognizable information to the user side module and a background terminal of the public safety risk prevention and control system, and determining whether to resubmit the coding request to the verification evaluation module and the coding module by the user side module based on the feedback information;
the checking and evaluating module comprises an information checking unit, a first risk evaluating unit and a second risk evaluating unit,
wherein the information checking unit is used for checking whether the information of the user and the accessed object is correct,
a first risk assessment unit for responding to the coding request, checking information of the user and the accessed object and assessing first risk,
the second risk assessment unit is used for making a second risk assessment for the current user and/or the current accessed object based on the necessary security information sent by the monitoring module, sending a second risk assessment result for the current user to the accessed object module, sending a second risk assessment result for the accessed object to the user side module, and sending a second risk assessment result for the current user and/or the current accessed object to the background terminal and the early warning module.
The embodiment of the application also discloses a computer readable storage medium for storing the scheme of the method.
In particular, the computer readable storage medium stores a computer program capable of being loaded by a processor and executing a city public security oriented risk prevention and control method based on coded trace-back as described above, the computer readable storage medium for example comprising: a U-disk, a removable hard disk, a Read-only memory (ROM), a random access memory (RandomAccessMemory, RAM), a magnetic disk, an optical disk, or other various media capable of storing program codes.
The foregoing are all preferred embodiments of the present application, and are not intended to limit the scope of the present application in any way, therefore: all equivalent changes in structure, shape and principle of this application should be covered in the protection scope of this application.

Claims (10)

1. The utility model provides a risk prevention and control method facing city public security based on coding traceability, which is characterized in that the method comprises the following steps:
s1, user applies for coding
A user sends a coding request to a public safety risk prevention and control system through a user side, and the public safety risk prevention and control system is requested to give an access safety code;
s2, checking a coding request of a user to perform first risk assessment and determining whether coding is performed or not
The public safety risk prevention and control system responds to the coding request, performs information check and first risk assessment on the user and the accessed object, and determines whether to code or not based on the information check result and the first risk assessment result;
the public security risk prevention and control system generates an access security code based on a preset rule through information check and first risk assessment, and sends the access security code to a user side;
the public safety risk prevention and control system sends feedback information to the user side without passing the information check and the first risk assessment;
s3, sending and verifying access request
A user obtaining an access security code sends an access request to a current accessed object through a user terminal, when the current accessed object receives the access request, the access security code sent by the user is identified, access request information contained in the access security code is extracted, whether the current user has access authority for the current accessed object is judged, and a judgment result is given;
s4, if the user has access rights, accessing the current accessed object by the user based on the user rights;
s5, if the user does not have the access right after judging, feeding back unrecognizable information to the user side and a background terminal of the public safety risk prevention and control system, and determining whether to return to the step S1 or not by the user side based on the feedback information, and submitting the coding request again;
s6, carrying out real-time safety monitoring on the user and the visited object
The public safety risk prevention and control system monitors an accessed object and a user in real time, extracts necessary safety information according to a preset rule based on a monitoring result and sends the necessary safety information to a user side and/or an accessed object side and/or a public safety risk prevention and control system terminal;
s7, performing second risk assessment based on real-time safety monitoring;
the public security risk prevention and control system makes a second risk assessment for the current user and/or the current accessed object based on the received necessary security information, and sends a second risk assessment result for the current user to the accessed object side and a second risk assessment result of the accessed object to the user side;
s8, early warning and/or real-time access intervention are/is carried out based on the second risk assessment result
And the background of the public safety risk prevention and control system decides whether to send early warning information to the accessed object side and/or the user side and whether to forcibly interfere with the current access or not based on a preset rule according to a second risk assessment result made by the system.
2. The urban public security-oriented risk prevention and control method based on code tracing according to claim 1, wherein,
the transcoding request includes at least user information and accessed object information,
the accessed object information at least comprises the name of the accessed object, the address of the accessed object and the number of the accessed object;
the user information comprises user basic information, current access application authority, access matters and/or user numbers.
3. The urban public security-oriented risk prevention and control method based on code tracing according to claim 2, wherein,
the user of the user terminal comprises natural people and/or safety monitoring equipment;
the accessed objects include sites, devices and/or internet platforms provided with access rights.
4. The method for controlling risk of public security in city based on code traceability according to claim 3, wherein in step S2, the public security risk control system responds to the code assignment request to perform information check and first risk assessment on the identity of the user and the accessed object,
the information check comprises a user information check, an accessed object information check and a check whether the user is matched with the accessed object or not;
the user information verification comprises user access application authority verification, user access item verification and user basic information verification;
the accessed object information check comprises a name check of an accessed object, an address check of the accessed object and a number check of the accessed object;
the user is checked against the accessed object for a match, including checking whether the access transaction issued by the current user matches the accessed object.
5. The method for controlling risk of public security in city based on code traceability according to claim 4, wherein in step S2, the public security risk control system performs information verification and first risk assessment on the identity of the user and the accessed object in response to the code assignment request, wherein the first risk assessment includes risk assessment of the user and risk assessment of the accessed object,
the user risk assessment comprises user identity risk assessment, user access item risk assessment and/or user position risk assessment, and user risk grade is given;
the accessed object risk assessment comprises accessed object identity assessment and/or accessed object associated event risk assessment corresponding to user access matters, and gives the accessed object risk level.
6. The urban public security-oriented risk prevention and control method based on code traceability according to claim 5, wherein,
in step S2, the public safety risk prevention and control system sends feedback information to the user side without passing through the information check and the first risk assessment, wherein the feedback information includes a reason that the first risk assessment of the user fails and/or a reason that the first risk assessment of the accessed object fails, and a corresponding first risk assessment level;
in step S5, if the user does not have the access right, the feedback is unable to identify information to the user side and the background terminal of the public security risk prevention and control system, and the user side decides whether to return to step S1 based on the feedback information, and resubmisses the coding request, specifically including: the user decides whether to carry out the coding request after the information correction or to terminate the coding request based on the received feedback information; the background terminal of the public safety risk prevention and control system determines whether to forcibly interrupt coding and send out early warning or not according to a first risk assessment level of a user or an accessed object based on a preset safety risk prevention and control rule.
7. The urban public security-oriented risk prevention and control method based on code traceability according to claim 6, wherein,
in step S6, the public security risk prevention and control system monitors the accessed object and the user in real time, extracts necessary security information according to a preset rule based on the monitoring result, and sends the information to the user terminal and/or the accessed object terminal and/or the public security risk prevention and control system terminal, which specifically includes: the public security risk prevention and control system extracts key information related to potential hazard current public security access related to users and/or accessed objects in real time based on big data and internet security sharing platform updating data, sorts the necessary security information of the users and/or the necessary security information of the accessed objects based on preset rules, sends the necessary security information of the users to the accessed objects for receiving, helps the accessed objects evaluate the security level of the currently accessed users, and/or sends the necessary security information of the accessed objects to the currently accessed users, and helps the users evaluate the security level of the currently accessed objects.
8. The urban public security-oriented risk prevention and control method based on code traceability according to claim 7, wherein,
in step S7, the public security risk prevention and control system makes a second risk assessment for the current user and/or the current accessed object based on the received necessary security information, and sends a second risk assessment result for the current user to the accessed object side, and sends a second risk assessment result of the accessed object to the user side, which specifically includes: the public security risk prevention and control system synchronously receives necessary security information of a user and/or necessary security information of an accessed object in real time, makes a second risk assessment for a current user and/or the current accessed object based on the received necessary security information, sends a second risk assessment result for the current user to the accessed object side, and sends a second risk assessment result of the accessed object to the user side;
the step S8 of forcibly intervening the current access specifically comprises the following steps: the system forcibly interrupts the communication or transaction between the user and the accessed object, or the public safety risk prevention and control system directly alarms through the Internet alarm to execute manual intervention access.
9. An urban-oriented public security risk prevention and control system based on code tracing, wherein the system is configured to execute the urban-oriented public security risk prevention and control method based on code tracing as set forth in any one of claims 1 to 8, the public security risk prevention and control system comprising:
the user terminal module is used for information interaction between the user module and the accessed object module, the monitoring module, the early warning module, the risk assessment module and the coding module;
the accessed object module is used for information interaction between the accessed object and the user module, the monitoring module, the early warning module and the risk assessment module;
the checking and evaluating module is used for finishing information checking and risk evaluation of the user and the accessed object and sending a risk evaluation result to the user side, the accessed object side and the control background;
the coding module is used for determining whether to code or not according to the information checking result and the first risk assessment result; the coding module generates an access security code based on a preset rule through information check and first risk assessment, and sends the access security code to the user side module; the verification evaluation module sends feedback information to the user side without passing the information verification and the first risk evaluation;
the monitoring module is used for carrying out real-time safety monitoring on the user and the accessed object;
the monitoring module monitors the accessed object and the user in real time, extracts necessary safety information according to preset rules based on monitoring results and sends the necessary safety information to a user terminal module, a checking and evaluating module, an accessed object module, an early warning module and/or a background terminal of the public safety risk prevention and control system;
the early warning module is used for early warning and/or real-time access intervention based on the second risk assessment result
And the background of the public safety risk prevention and control system decides whether to send early warning information to the accessed object side and/or the user side and whether to forcibly interfere with the current access or not based on a preset rule according to a second risk assessment result made by the system.
10. A city-oriented public security risk prevention and control system based on coding tracing is characterized in that,
the user terminal module comprises an encoding request unit and an access request unit,
the coding request unit is used for sending a coding request to the public safety risk prevention and control system through the user side and requesting the public safety risk prevention and control system to give an access safety code;
the access request unit is used for sending an access request to the accessed module after the user obtains the access security code;
the accessed object module comprises an access request authorization unit,
the access request authorization unit is used for obtaining an access security code sent by a user, identifying the access security code sent by the user, extracting access request information contained in the access security code, judging whether the current user has access rights to the current accessed object, and if so, allowing the current user to access the current accessed object based on the user rights; if the user does not have the access right, feeding back unrecognizable information to the user side module and a background terminal of the public safety risk prevention and control system, and determining whether to resubmit the coding request to the verification evaluation module and the coding module by the user side module based on the feedback information;
the checking and evaluating module comprises an information checking unit, a first risk evaluating unit and a second risk evaluating unit,
wherein the information checking unit is used for checking whether the information of the user and the accessed object is correct,
a first risk assessment unit for responding to the coding request, checking information of the user and the accessed object and assessing first risk,
the second risk assessment unit is used for making a second risk assessment for the current user and/or the current accessed object based on the necessary security information sent by the monitoring module, sending a second risk assessment result for the current user to the accessed object module, sending a second risk assessment result for the accessed object to the user side module, and sending a second risk assessment result for the current user and/or the current accessed object to the background terminal and the early warning module.
CN202310136145.3A 2023-02-20 2023-02-20 Urban public security-oriented risk prevention and control method and system based on coding traceability Active CN116433004B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310136145.3A CN116433004B (en) 2023-02-20 2023-02-20 Urban public security-oriented risk prevention and control method and system based on coding traceability

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310136145.3A CN116433004B (en) 2023-02-20 2023-02-20 Urban public security-oriented risk prevention and control method and system based on coding traceability

Publications (2)

Publication Number Publication Date
CN116433004A true CN116433004A (en) 2023-07-14
CN116433004B CN116433004B (en) 2024-04-09

Family

ID=87088019

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310136145.3A Active CN116433004B (en) 2023-02-20 2023-02-20 Urban public security-oriented risk prevention and control method and system based on coding traceability

Country Status (1)

Country Link
CN (1) CN116433004B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102724204A (en) * 2012-06-28 2012-10-10 电子科技大学 Secure and trusted capability opening platform
CN106713337A (en) * 2017-01-03 2017-05-24 北京并行科技股份有限公司 Method and system for accessing supercomputing center, and dispatch server
CN112685711A (en) * 2021-02-02 2021-04-20 杭州宁达科技有限公司 Novel information security access control system and method based on user risk assessment
CN113536258A (en) * 2021-07-29 2021-10-22 中国建设银行股份有限公司 Terminal access control method and device, storage medium and electronic equipment
CN115022008A (en) * 2022-05-30 2022-09-06 苏州浪潮智能科技有限公司 Access risk assessment method, device, equipment and medium
US11531784B1 (en) * 2022-02-22 2022-12-20 Uab 360 It System and method for protecting browser data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102724204A (en) * 2012-06-28 2012-10-10 电子科技大学 Secure and trusted capability opening platform
CN106713337A (en) * 2017-01-03 2017-05-24 北京并行科技股份有限公司 Method and system for accessing supercomputing center, and dispatch server
CN112685711A (en) * 2021-02-02 2021-04-20 杭州宁达科技有限公司 Novel information security access control system and method based on user risk assessment
CN113536258A (en) * 2021-07-29 2021-10-22 中国建设银行股份有限公司 Terminal access control method and device, storage medium and electronic equipment
US11531784B1 (en) * 2022-02-22 2022-12-20 Uab 360 It System and method for protecting browser data
CN115022008A (en) * 2022-05-30 2022-09-06 苏州浪潮智能科技有限公司 Access risk assessment method, device, equipment and medium

Also Published As

Publication number Publication date
CN116433004B (en) 2024-04-09

Similar Documents

Publication Publication Date Title
CN110335187B (en) Smart city operating system
CN111464951B (en) Epidemic situation prevention and control method, device, equipment and computer readable storage medium
CN106295349A (en) Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen
CN107548547A (en) The method for identifying the unauthorized access of the account of online service
CN106276469A (en) A kind of elevator emergency processing system and emergency processing method
CN101902345A (en) Digital city management system
CN210150534U (en) Elevator maintenance system with early warning function
CN106131006A (en) House based on GIS Life cycle safety management system
CN111581417A (en) Identity recognition method, terminal, system and storage medium for power distribution room constructors
CN112688820A (en) Civil air defense engineering equipment maintenance method based on big data
CN114841662A (en) Infrastructure construction project management and control method and device, computer equipment and storage medium
CN112016520A (en) AI-based traffic violation voucher generation method, device, terminal and storage medium
CN113298405A (en) Intelligent chemical industry park emergency comprehensive management system based on BIM and GIS
CN113469509B (en) Dynamic analysis method for safety risk of oil and gas storage and transportation station and four-color chart system
CN116433004B (en) Urban public security-oriented risk prevention and control method and system based on coding traceability
CN104778562B (en) A kind of safe eye supervising platform system in job site
KR20130124777A (en) Equipment management system using nfc tag
CN111199293B (en) Existing curtain wall safety supervision system, method and storage medium
CN108509796A (en) A kind of detection method and server of risk
CN113365219A (en) Monitoring information management method, system, terminal and readable storage medium
CN116798199A (en) Early warning method, electronic equipment and early warning system for industrial park
CN103903099A (en) Electromagnetic environment protection management information platform for alternating-current and direct-current transmission and transformation project and management method
CN113191685A (en) Comprehensive evaluation system for safety of construction site
CN114186962A (en) House area expropriation and migration integrated system based on consensus method
CN111832334A (en) Personnel database establishing method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant