CN117314045A - Security management system and method - Google Patents

Security management system and method Download PDF

Info

Publication number
CN117314045A
CN117314045A CN202311104238.4A CN202311104238A CN117314045A CN 117314045 A CN117314045 A CN 117314045A CN 202311104238 A CN202311104238 A CN 202311104238A CN 117314045 A CN117314045 A CN 117314045A
Authority
CN
China
Prior art keywords
task
security management
information
management center
target task
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311104238.4A
Other languages
Chinese (zh)
Inventor
李光华
田长征
赵朝霖
胡昌明
张宇
何亚东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guoneng Dadu River Dagangshan Power Generation Co ltd
Original Assignee
Guoneng Dadu River Dagangshan Power Generation Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guoneng Dadu River Dagangshan Power Generation Co ltd filed Critical Guoneng Dadu River Dagangshan Power Generation Co ltd
Priority to CN202311104238.4A priority Critical patent/CN117314045A/en
Publication of CN117314045A publication Critical patent/CN117314045A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The disclosure relates to a security management system and a security management method, and relates to the technical field of security management. The system comprises a security management center, employee clients and auditing clients, wherein the security management center is used for generating a target task form and sending the target task form to the employee clients corresponding to task execution personnel; the employee client is used for receiving the target task form and sending task completion information for filling the target task form to the security management center; the security management center is used for sending a target task form and task completion information to the auditing client; the auditing client is used for displaying the target task form and the task completion information, and sending an instruction for indicating completion of the target task form to the security management center so that the security management center can delete the target task form in response to the instruction. Therefore, centralized management, closed-loop management and real-time monitoring of the safety tasks can be realized, the automation degree of the safety management is improved, manual operation is reduced, and the efficiency is improved.

Description

Security management system and method
Technical Field
The disclosure relates to the technical field of security management, in particular to a security management system and a security management method.
Background
In the related art, the management of the security tasks mainly depends on manual work, and the requirements of various aspects of actual scenes related in the security management cannot be met, for example, an effective closed loop cannot be formed in each link of the management, an effective linkage mechanism is not formed in the service in the security management process, and the security management process is low in efficiency and easy to make mistakes.
Disclosure of Invention
To overcome the problems in the related art, an object of the present disclosure is to provide a security management system and method.
According to a first aspect of embodiments of the present disclosure, there is provided a security management system comprising:
the system comprises a security management center, an employee client and an audit client;
the safety management center is used for generating a target task form according to target task information, wherein the target task form comprises a task execution requirement, a task execution person and task execution time;
the security management center is used for sending the target task form to an employee client corresponding to the task executive personnel;
the employee client is used for receiving the target task form and sending task completion information for filling in the target task form to the security management center;
the security management center is used for sending the target task form and the task completion information to the auditing client;
the auditing client is used for displaying the target task form and the task completion information, and sending an instruction for indicating completion of the target task form to the security management center so that the security management center responds to the instruction and deletes the target task form.
Optionally, the target task form includes a regular task form, and the target task information includes a preset track rule;
the safety management center is used for generating a track list according to the track rule and generating a conventional task form according to the task category of the track list.
Optionally, the security management center is further configured to obtain job performance task confirmation information corresponding to the conventional task form, where the job performance task confirmation information is used to characterize whether a task executor corresponding to the conventional task form arrives at a task location indicated by the conventional task form;
the security management center is specifically configured to send the regular task form, the task completion information and the job practice task confirmation information to the audit client;
the auditing client is specifically used for displaying the conventional task form, the task completion information and the job practice task confirmation information, and sending an instruction for indicating completion of the conventional task form to the security management center so that the security management center responds to the instruction and deletes the conventional task form.
Optionally, the security management center is further configured to obtain, from an access control system, presence information corresponding to the task executor, and obtain, from an installation center system, a task completion record corresponding to the conventional task form, where the installation center system is configured to record whether the task executor completes the corresponding conventional task form;
the safety management center is used for obtaining the track job task confirmation information according to the presence information and/or the task completion record.
Optionally, the target task form includes a burst task form, and the target task information includes security problem information;
the security management center is used for receiving the security problem information sent by the employee client and sending the security problem information to the auditing client;
the auditing client is used for sending task allocation information corresponding to the security problem information to the security management center according to the security problem information;
the safety management center is used for receiving the task allocation information and generating the burst task form according to the safety problem information and the task allocation information.
Optionally, the security management center is configured to invoke an information sending module of the integrated management platform to send the target task form to an employee client corresponding to the task executor, where the integrated management platform stores communication information corresponding to the employee client.
Optionally, the security management center is further configured to invoke the information sending module to send a reminder to a corresponding employee client when there is a target task form that is not completed within the task execution time;
the comprehensive management platform stores communication information corresponding to the employee client, and the information sending module is used for sending the reminding information to the employee client according to the communication information.
Optionally, the security management center further comprises a knowledge base for storing task specification files, and the target task form further comprises task specification files;
the security management center is further used for determining a task specification file matched with the target task information in the knowledge base according to the target task information.
Optionally, the security management system further comprises:
and the industrial television is used for accessing the security management center through the hyperlink so as to access a system accessing the security management center through the security management center.
According to a second aspect of embodiments of the present disclosure, there is provided a security management method applied to the security management center described in the first aspect, the method including:
generating a target task form according to target task information, wherein the target task form comprises a task execution requirement, a task execution person and task execution time;
the target task form is sent to an employee client corresponding to the task executive personnel, so that the employee client receives the target task form and sends task completion information for filling in the target task form to the security management center;
the target task form and the task completion information are sent to an auditing client side, so that the auditing client side displays the target task form and the task completion information, and an instruction for indicating completion of the target task form is sent to the security management center;
deleting the target task form in response to an instruction indicating completion of the target task form.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the security management system comprises a security management center, employee clients and audit clients, wherein the security management center is used for generating a target task form and sending the target task form to the employee clients corresponding to task execution personnel; the employee client is used for receiving the target task form and sending task completion information for filling the target task form to the security management center; the security management center is used for sending a target task form and task completion information to the auditing client; the auditing client is used for displaying the target task form and the task completion information, and sending an instruction for indicating completion of the target task form to the security management center so that the security management center can delete the target task form in response to the instruction. Therefore, centralized management, closed-loop management and real-time monitoring of the safety tasks can be realized, the automation degree of the safety management is improved, manual operation is reduced, and the efficiency is improved.
Additional features and advantages of the present disclosure will be set forth in the detailed description which follows.
Drawings
The accompanying drawings are included to provide a further understanding of the disclosure, and are incorporated in and constitute a part of this specification, illustrate the disclosure and together with the description serve to explain, but do not limit the disclosure. In the drawings:
FIG. 1 is a schematic diagram of a security management system according to an exemplary embodiment of the present disclosure;
fig. 2 is a flow chart illustrating a security management method according to an exemplary embodiment of the present disclosure.
Detailed Description
Specific embodiments of the present disclosure are described in detail below with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the disclosure, are not intended to limit the disclosure.
Fig. 1 is a schematic diagram of a security management system according to an exemplary embodiment of the present disclosure. As shown in fig. 1, an embodiment of the present disclosure provides a security management system, the system including:
the system comprises a security management center 2, employee clients 1 and audit clients 3;
the safety management center 2 is used for generating a target task form according to target task information, wherein the target task form comprises a task execution requirement, a task execution personnel and task execution time;
the security management center 2 is used for sending the target task form to the employee client 1 corresponding to the task executive personnel;
the employee client 1 is used for receiving the target task form and sending task completion information for filling the target task form to the security management center 2;
the security management center 2 is used for sending a target task form and task completion information to the auditing client 3;
the auditing client 3 is used for displaying the target task form and the task completion information, and sending an instruction for indicating completion of the target task form to the security management center 2, so that the security management center 2 can delete the target task form in response to the instruction.
Here, the security management center 2 is a core coordination and management part in the security management system, and is responsible for generating, distributing, and deleting target task tables and receiving and distributing task completion information to ensure efficient execution and management of the security management flow. The security management center 2 may be a software platform of a computer network running in a server or a computer, such as a Web (World Wide Web) application, a mobile application, or the like. The employee client 1 runs an application program or software used by a task executor with a target task form, and is used for receiving the target task form and submitting task completion information. The auditing client 3 may run an application program or software for auditing the target task form and task completion information, typically for use by the responsible person or security administrator of the security management center 2. The employee client 1 and the audit client 3 may be mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (for example, in-vehicle navigation terminals), and the like, as well as fixed terminals such as digital TVs, desktop computers, and the like.
The target task information may refer to specific requirements and conditions of the task, including information such as designated personnel performing the task and their responsibilities, and time range for the task to complete. Through the target task information, the security management center 2 can generate and distribute a target task form to corresponding task executives to perform effective execution and monitoring of the target task.
The target task form may refer to a form or document generated in the security management system for recording and communicating specific requirements and execution information of the target task. The target task form may include details of task execution requirements, lists of executives, execution times, and the like. Through the target task form, the task executor can clearly know the instruction and the requirement of the task, and submit the task completion information to the security management center 2 after completion, so as to perform further auditing and processing.
Task execution requirements may refer to specific indications or requirements listed in a target task form that need to be followed or completed for a particular task. These requirements may include provisions in terms of action steps, operational flows, security measures, time constraints, etc. The task performers may be specific persons designated or assigned in the security management system that are responsible for performing particular tasks according to the requirements and instructions in the target task form. The task executor checks and receives the target task form and submits task completion information through the employee client 1, so that interaction with the security management system is realized. The task execution time may refer to a time range of starting and ending of a task specified in a target task form for guiding a task executor to complete the task within a specified time.
The task completion information may refer to information about task execution completion, results, and related data submitted by a task executor at the employee client 1 according to task execution requirements. Such data information may include task completion time, problems in execution, advice regarding task execution, and the like.
After the security management center 2 generates the target task form, the target task form is sent to the corresponding employee client 1, and the employee client 1 receives and displays the target task form so as to prompt a task executor to execute the task corresponding to the target task form according to the target task form. After the task executor completes the target task form, the task executor may input task completion information through the employee client 1, and the employee client 1 receives the task completion information input by the task executor and sends the task completion information to the security management center 2. The security management center 2 forwards the received task completion information and the target task form to the auditing client 3, the auditing client 3 displays the target task form and the task completion information so that auditing personnel can audit whether the task corresponding to the target task form is completed according to the target task form and the task completion information, and under the condition of completion, an instruction for indicating completion of the target task form is sent to the security management center 2, and the security management center 2 deletes the target task form in response to the instruction for indicating completion of the target task form.
The interaction of the security management center 2, employee clients 1 and audit clients 3 together form a closed loop of the security management system. The security management center 2 issues tasks and assigns the tasks to executive staff, the staff receives the tasks through the staff client 1 and submits task completion information, and the auditing staff audits and makes decisions on target tasks through the auditing client 3. By the method, the safety management system realizes the full life cycle management of the target task, and ensures the effective execution of the target task and the implementation of safety management from the formulation, execution and audit of the target task. Therefore, centralized management, closed-loop management and real-time monitoring of the safety tasks can be realized, the automation degree of the safety management is improved, manual operation is reduced, and the efficiency is improved.
In one embodiment, the target task form comprises a conventional task form, and the target task information comprises preset track rules;
the safety management center 2 is used for generating a track list according to the track rule and generating a conventional task form according to the task category of the track list.
Here, a performance rule may refer to a series of criteria and rules that should be followed in defining and normalizing task performance in a security management system. The performance list may refer to a list of responsibilities and task points that a task performer needs to perform, and may include information about key steps, schedules, required resources, task requirements, and performance criteria of the task.
Conventional task forms are tables or documents used in security management systems to record and manage standardized, periodic, or repetitive tasks. The task category refers to a time category of a task execution period in the track list, such as daily, weekly, monthly, quarterly, yearly, and custom. If a regular task form is generated according to daily and weekly periodic time categories, the periodic task form is corresponding. If the task list is a regular task list generated according to the self-defined time category, if the task list is defined for a certain time, the task list is correspondingly a temporary task list.
After the security management center 2 generates the regular task form, the regular task form is used as a target task form to interact with the employee client 1 and the auditing client 3 so as to complete the management and control of the regular task form from the specification, execution to the auditing process.
In an embodiment, the security management center 2 is further configured to obtain job performance task confirmation information corresponding to the conventional task form, where the job performance task confirmation information is used to characterize whether a task executor corresponding to the conventional task form arrives at a task location indicated by the conventional task form;
the security management center 2 is specifically configured to send a conventional task form, task completion information and job practice task confirmation information to the audit client 3;
the auditing client 3 is specifically configured to display a conventional task form, task completion information, and job performance confirmation information, and send an instruction for indicating completion of the conventional task form to the security management center 2, so that the security management center 2 deletes the conventional task form in response to the instruction.
Here, the job confirmation information may refer to information that a job executor confirms to a corresponding system after completing a job, including start-stop time and completion condition of job execution, and the like. The track job confirmation information can also be used for auditing the performance and work result of the job executor by the auditor through the auditing client 3 so as to evaluate the performance and track the job execution condition.
When the target task form corresponds to the conventional task form, the security management center 2 also needs to acquire corresponding track job confirmation information, send the corresponding track job confirmation information to the auditing client 3, and display the track job confirmation information on the auditing client 3. And the auditor can audit whether the execution completion condition of the security task corresponding to the conventional task form is qualified according to the caterpillar job confirmation information during audit. If the verification is passed, an instruction for indicating the completion of the conventional task form is sent to the security management center 2, and the completed conventional task form is deleted.
In an embodiment, the security management center 2 is further configured to obtain, from the access control system, presence information corresponding to a task executor, and obtain, from the wind installation center system, a task completion record corresponding to a conventional task form, where the wind installation center system is configured to record whether the task executor completes the corresponding conventional task form;
the safety management center 2 is used for obtaining the confirmation information of the track job task according to the presence information and/or the task completion record.
Here, the access control system may refer to a security system for managing and controlling entry into and exit from a task execution place designated by a conventional task form. The access information of the task executives can be recorded by using technical means such as identity verification, access control and monitoring equipment. The access information may include presence information, where presence information may refer to information that a task performer arrives at a task execution location specified by a conventional task form.
The security center system can be an integrated security system for monitoring, early warning and managing security events, and is used for storing the execution condition information of a conventional task form corresponding to the security events. The execution condition information includes a task completion record, which may refer to that a task executor completes a corresponding conventional task according to a task execution requirement of a conventional task form.
After the task executor completes the conventional task, a corresponding conventional task form is punched in an access control system where the task execution place in the task execution requirement is located. Correspondingly, the access control system records the arrival information corresponding to the task executor. The security management center 2 can acquire the field information from the access control system as the confirmation information of the job execution task of the conventional task form.
When the task executor completes the corresponding routine task, the system has corresponding task completion record in the wind installation. The security management center 2 can obtain the task completion record from the security center system as the job performance confirmation information of the conventional task form. The security management center 2 can obtain the confirmation information of the track job task independently according to the presence information, can obtain the confirmation information of the track job task independently according to the task completion record, and can obtain the confirmation information of the track job task independently according to the presence information and the task completion record.
The safety management system integrates data of the access control system and the wind installation center system, and links the access control system and the wind installation center system, so that centralized management, closed-loop management and real-time monitoring of safety tasks can be realized, the automation degree of safety management is improved, manual operation is reduced, and efficiency is improved.
In one embodiment, the target task form comprises a burst task form and the target task information comprises security issue information;
the security management center 2 is used for receiving the security problem information sent by the employee client 1 and sending the security problem information to the auditing client 3;
the auditing client 3 is used for sending task allocation information corresponding to the generated safety problem information to the safety management center 2 according to the safety problem information;
the security management center 2 is configured to receive the task allocation information, and generate a burst task form according to the security problem information and the task allocation information.
Here, the security problem information is that the employee fills in the photograph and description information of the spot discovery problem in the employee client 1 and sends it to the security management center 2. The burst task form is a form or document for recording and managing burst tasks in the security management system, and contains the above-mentioned security problem information, task executors, task execution requirements, task execution places, and the like. The task allocation information may refer to personnel allocation information that an auditor designates to perform a burst task according to the security problem information.
There are two types of target task forms, a regular task form and a burst task form. When the target task form is a conventional task form, the target task information includes a job execution rule, and when the target task form is a burst task form, the target task information includes safety problem information.
After receiving the security problem information, the security management center 2 sends the security problem information to the auditing client 3 so as to complete the function of reporting the security problem information. And the auditing personnel distributes the security problems to corresponding staff for processing through the auditing client 3, fills in task allocation information corresponding to the security problem information in the auditing client 3, and sends the task allocation information to the security management center 2. After the security management center 2 generates the burst task form according to the security problem information and the task allocation information, the burst task form is used as a target task form and is interacted with the employee client 1 and the auditing client 3 to complete the management and control of the burst task form from formulation, execution to auditing.
In an embodiment, the security management center 2 is configured to invoke an information sending module of the integrated management platform to send the target task form to the employee client 1 corresponding to the task executor, where the integrated management platform stores communication information corresponding to the employee client 1.
Here, the integrated management platform stores communication information corresponding to the employee client 1, such as a phone number and an email address of the employee. The security management center 2 calls an information sending module of the integrated management platform and sends the target task form to the security management platform. And the comprehensive management platform sends the target task form to the task execution personnel according to the communication information of the task execution personnel corresponding to the target task form so as to remind the task execution personnel of executing the task.
In an embodiment, the security management center 2 is further configured to invoke the information sending module to send the alert information to the corresponding employee client 1 when there is a target task form that is not completed within the task execution time;
the comprehensive management platform stores communication information corresponding to the employee client 1, and the information sending module is used for sending reminding information to the employee client 1 according to the communication information.
Here, the security management center 2 also sends the reminding information to the task executor corresponding to the target task form which is not completed in the task execution time through the integrated management platform. And the comprehensive management platform sends reminding information to the task execution personnel according to the communication information of the task execution personnel corresponding to the target task form so as to remind the task execution personnel to execute the task as soon as possible.
The safety management system is interacted with the comprehensive management platform to realize the execution monitoring of the target task form, so that the centralized management and the real-time monitoring of the safety task can be realized, the automation degree of the safety management is improved, the manual operation is reduced, and the efficiency is improved.
In an embodiment, the security management center 2 further includes a knowledge base for storing task specification files, and the target task form further includes task specification files;
the security management center 2 is further configured to determine, in the knowledge base, a task specification file that matches the target task information according to the target task information.
Here, the knowledge base is a database that centrally stores and organizes secure knowledge files. The task specification file is a file for defining and specifying the execution requirements and standards of the target task form, and contains relevant information such as operation specifications and safety requirements. The security management center 2 sends the task specification file to the employee client 1 corresponding to the task executor, so that the task execution meets the specified requirement and the expected result is achieved. The security management center 2 also sends the task specification file to the auditing client 3, and provides monitoring and evaluation basis for the executive result of the target task form for auditing personnel.
In the security management center 2, task specification files are typically stored in a knowledge base for the security management center 2 to match and find according to target task information. When a new target task form is generated, the security management center 2 can determine a corresponding task specification file in the knowledge base according to the target task information so as to ensure that the task execution accords with preset specifications and standards.
In addition, the security management center 2 may also respond to the corresponding instructions to sort, catalog, add, delete, modify and export files in the knowledge base. Meanwhile, before deleting the target task form, the security management center 2 may automatically store related information of the target task form in the knowledge base, so as to record information such as a title, time, an initiating unit, an initiating person, a participating unit, a participating person, and the like of the target task form.
The security management center 2 can also respond to the corresponding inquiry command and output statistical data according to the input inquiry statistical conditions, so that statistics and analysis on security production indexes, security problems, violation behaviors, target task completion conditions and early warning information can be realized.
In one embodiment, the security management system further comprises:
an industrial television for accessing the security management center 2 through a hyperlink to access a system accessing the security management center 2 through the security management center 2.
Here, the industrial tv has the capability of supporting hyperlinks and remote access, and can access the security management center 2 and interfaces of the system accessing the security management center 2, so that an operator can conveniently acquire related information, perform tasks or perform control operations. The system for accessing the security management center 2 can be an access control system, an air installation center system, a comprehensive management platform and an intelligent work ticket cabinet system. The security management system may interact with the intelligent work ticket cabinet system to obtain the status of the work ticket to track the process of execution of the target task form.
The safety management system is in integrated linkage with the access control system, the wind installation center system, the comprehensive management platform and the intelligent work ticket cabinet system through the industrial television, and can realize closed-loop management and control of safety tasks through data interaction and reinforcement supervision management.
Based on the same concept, the present disclosure also provides a security management method applied to a security management center, referring to fig. 2, the method including the steps of:
in step 110, a target task form is generated according to the target task information, wherein the target task form includes a task execution requirement, a task execution person and a task execution time.
In step 120, the target task form is sent to the employee client corresponding to the task executor, so that the employee client receives the target task form, and task completion information for filling in the target task form is sent to the security management center.
In step 130, the target task form and the task completion information are sent to the audit client, so that the audit client displays the target task form and the task completion information, and sends an instruction for indicating completion of the target task form to the security management center.
In step 140, the target task form is deleted in response to the instruction indicating completion of the target task form.
Here, the security management method is applied to the security management center, generates a target task form based on target task information, and transmits it to the employee client of the task executor. And the employee client terminal fills in the task completion information after receiving the form and sends the task completion information to the security management center. Meanwhile, the target task form is also sent to the auditing client side for displaying and sending a completion instruction to the security management center. And according to the instruction, the security management center deletes the target task form to finish closing and record updating of the task.
The target task form is generated, distributed and recorded, so that the flow and coordination of target task distribution, execution and auditing are realized, and the accuracy and efficiency of task execution are improved. Therefore, centralized management, closed-loop management and real-time monitoring of the safety tasks can be realized, the automation degree of the safety management is improved, manual operation is reduced, and the efficiency is improved.
The preferred embodiments of the present disclosure have been described in detail above with reference to the accompanying drawings, but the present disclosure is not limited to the specific details of the above embodiments, and various simple modifications may be made to the technical solutions of the present disclosure within the scope of the technical concept of the present disclosure, and all the simple modifications belong to the protection scope of the present disclosure.
Moreover, any combination between the various embodiments of the present disclosure is possible as long as it does not depart from the spirit of the present disclosure, which should also be construed as the disclosure of the present disclosure.

Claims (10)

1. A security management system, comprising:
the system comprises a security management center, an employee client and an audit client;
the safety management center is used for generating a target task form according to target task information, wherein the target task form comprises a task execution requirement, a task execution person and task execution time;
the security management center is used for sending the target task form to an employee client corresponding to the task executive personnel;
the employee client is used for receiving the target task form and sending task completion information for filling in the target task form to the security management center;
the security management center is used for sending the target task form and the task completion information to the auditing client;
the auditing client is used for displaying the target task form and the task completion information, and sending an instruction for indicating completion of the target task form to the security management center so that the security management center responds to the instruction and deletes the target task form.
2. The security management system of claim 1, wherein the target task form comprises a regular task form and the target task information comprises a preset job performance rule;
the safety management center is used for generating a track list according to the track rule and generating a conventional task form according to the task category of the track list.
3. The security management system of claim 2, wherein the security management system is configured to,
the safety management center is further used for acquiring the job performance task confirmation information corresponding to the conventional task form, wherein the job performance task confirmation information is used for representing whether a task executor corresponding to the conventional task form arrives at a task place indicated by the conventional task form;
the security management center is specifically configured to send the regular task form, the task completion information and the job practice task confirmation information to the audit client;
the auditing client is specifically used for displaying the conventional task form, the task completion information and the job practice task confirmation information, and sending an instruction for indicating completion of the conventional task form to the security management center so that the security management center responds to the instruction and deletes the conventional task form.
4. The security management system of claim 3, wherein the security management system comprises a security management system,
the security management center is further used for acquiring the presence information corresponding to the task executor from an access control system and acquiring a task completion record corresponding to the conventional task form from an security center system, wherein the security center system is used for recording whether the task executor completes the corresponding conventional task form;
the safety management center is used for obtaining the track job task confirmation information according to the presence information and/or the task completion record.
5. The security management system of claim 1, wherein the target task form comprises a burst task form, and the target task information comprises security issue information;
the security management center is used for receiving the security problem information sent by the employee client and sending the security problem information to the auditing client;
the auditing client is used for sending task allocation information corresponding to the security problem information to the security management center according to the security problem information;
the safety management center is used for receiving the task allocation information and generating the burst task form according to the safety problem information and the task allocation information.
6. The security management system of any of claims 1-5, wherein,
the safety management center is used for calling an information sending module of the integrated management platform to send the target task form to an employee client corresponding to the task executive personnel, wherein the integrated management platform stores communication information corresponding to the employee client.
7. The security management system of claim 6, wherein the security management system comprises a security management system,
the security management center is also used for calling the information sending module to send reminding information to the corresponding employee client when a target task form which is not completed in the task execution time exists;
the comprehensive management platform stores communication information corresponding to the employee client, and the information sending module is used for sending the reminding information to the employee client according to the communication information.
8. The security management system of any of claims 1-5, wherein the security management center further comprises a knowledge base for storing task specification files, the target task form further comprising task specification files;
the security management center is further used for determining a task specification file matched with the target task information in the knowledge base according to the target task information.
9. The security management system of any of claims 1-5, further comprising:
and the industrial television is used for accessing the security management center through the hyperlink so as to access a system accessing the security management center through the security management center.
10. A security management method, applied to a security management center, the method comprising:
generating a target task form according to target task information, wherein the target task form comprises a task execution requirement, a task execution person and task execution time;
the target task form is sent to an employee client corresponding to the task executive personnel, so that the employee client receives the target task form and sends task completion information for filling in the target task form to the security management center;
the target task form and the task completion information are sent to an auditing client side, so that the auditing client side displays the target task form and the task completion information, and an instruction for indicating completion of the target task form is sent to the security management center;
deleting the target task form in response to an instruction indicating completion of the target task form.
CN202311104238.4A 2023-08-29 2023-08-29 Security management system and method Pending CN117314045A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311104238.4A CN117314045A (en) 2023-08-29 2023-08-29 Security management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311104238.4A CN117314045A (en) 2023-08-29 2023-08-29 Security management system and method

Publications (1)

Publication Number Publication Date
CN117314045A true CN117314045A (en) 2023-12-29

Family

ID=89248841

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311104238.4A Pending CN117314045A (en) 2023-08-29 2023-08-29 Security management system and method

Country Status (1)

Country Link
CN (1) CN117314045A (en)

Similar Documents

Publication Publication Date Title
US7640165B2 (en) Web based methods and systems for managing compliance assurance information
CN112488487A (en) Electric power material supply chain system based on intelligent operation center and construction and application thereof
US10282683B2 (en) Technician control system
US6954737B2 (en) Method and apparatus for work management for facility maintenance
US8364513B2 (en) Technician control system
US20100332509A1 (en) Systems and methods for integrated management of governmental projects
CN112288903A (en) Card punching system, method and equipment
CN111709707A (en) Management and control system and method applied to project delivery construction site
CN110796356A (en) Bank counter business monitoring system
US10621535B1 (en) Method and apparatus to onboard resources
JP2008525920A (en) System and method for maintaining business continuity
US20030135378A1 (en) Method and system for reporting, assigning, and tracking facilities incident reports
CN109359900A (en) A kind of inspection management platform
US20050273381A1 (en) System and method for monitoring employee productivity, attendance and safety
CN111260251A (en) Operation and maintenance service management platform and operation method thereof
JP2003162612A (en) Management method and apparatus for license information
CN115344888A (en) Data access method and device, electronic equipment and storage medium
CN112070388A (en) Petrochemical engineering supervision, inspection, detection and consultation management system
CN115017484A (en) Access control method and device
KR20020041390A (en) Method for construction project management using internet and system therefor
CN110782198A (en) Webpage end rail transit equipment monitoring information control platform and implementation method thereof
CN104182829A (en) Instrument development reliability management and support system
CN113869853A (en) Office management system
CN114493131A (en) Supervision cloud system
CN110689219A (en) Big data-based user behavior evaluation display method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination