CN118037064A - Targeted security authentication method, device and system based on risk pre-control - Google Patents

Targeted security authentication method, device and system based on risk pre-control Download PDF

Info

Publication number
CN118037064A
CN118037064A CN202410430172.6A CN202410430172A CN118037064A CN 118037064 A CN118037064 A CN 118037064A CN 202410430172 A CN202410430172 A CN 202410430172A CN 118037064 A CN118037064 A CN 118037064A
Authority
CN
China
Prior art keywords
risk
determining
authentication
target
security authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410430172.6A
Other languages
Chinese (zh)
Inventor
国汉君
王兴中
曹海滨
王勇
孙志春
张小兵
王莉娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Shenhua Energy Co Ltd
Original Assignee
China Shenhua Energy Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Shenhua Energy Co Ltd filed Critical China Shenhua Energy Co Ltd
Priority to CN202410430172.6A priority Critical patent/CN118037064A/en
Publication of CN118037064A publication Critical patent/CN118037064A/en
Pending legal-status Critical Current

Links

Landscapes

  • General Factory Administration (AREA)

Abstract

The disclosure relates to the field of safety management of production operation processes, in particular to a targeted safety certification method, device and system based on risk pre-control. The method comprises the following steps: dividing the operation tasks to obtain a plurality of operation procedures; analyzing the operation procedures by adopting a Bayesian network, and determining the risk probability and the sensitivity value of each operation procedure; determining a security authentication point from the operation procedure according to the risk probability and the sensitivity value; and determining a target authentication scheme according to the security authentication point, wherein the target authentication scheme comprises a target authentication person, a target authentication mode and target authentication equipment. Therefore, the high-risk and high-sensitivity security authentication point can be determined, a targeted personalized authentication scheme is established aiming at the security authentication point from three different dimensions of personnel, modes and equipment, and blindness of production security supervision is reduced.

Description

Targeted security authentication method, device and system based on risk pre-control
Technical Field
The disclosure relates to the field of safety management of production operation processes, in particular to a targeted safety certification method, device and system based on risk pre-control.
Background
With the continuous development of society and the increasing production activities, the safety production supervision of enterprises has become an important link for ensuring the safety of production operation. Once the safety production supervision of enterprises is problematic, the operators may face greater safety risks in production operation, and the probability of accidents is increased.
At present, the supervision personnel of the enterprise's safe production mainly relies on experience supervision, and supervision form, method are single, and supervision means is lagged behind. The production operation site supervision is not scientific and reasonable enough, the site supervision pertinence is not strong, the phenomena of inadequate supervision, resource waste of supervision staff, low supervision efficiency, poor effect and the like are easy to occur, and the problems of ineffective safety supervision, labor cost waste and the like are further caused. Therefore, there is a need to establish a scientific and effective security supervision method.
Disclosure of Invention
The purpose of the present disclosure is to provide a targeted security authentication method, device and system based on risk pre-control, and according to risk points of different levels in each process of production operation, a targeted personalized authentication scheme is formulated, which reduces blindness of production security supervision and improves supervision efficiency of production operation.
To achieve the above object, a first aspect of the present disclosure provides a targeted security authentication method based on risk pre-control, including:
dividing the operation tasks to obtain a plurality of operation procedures;
Analyzing the operation procedures by adopting a Bayesian network, and determining the risk probability and the sensitivity value of each operation procedure, wherein the risk probability of the security authentication point is greater than a first risk threshold value, and/or the sensitivity value is greater than a first sensitivity threshold value;
Determining a security authentication point from the operation procedure according to the risk probability and the sensitivity value;
and determining a target authentication scheme according to the security authentication point, wherein the target authentication scheme comprises a target authentication person, a target authentication mode and target authentication equipment.
Optionally, analyzing the working procedures by using a bayesian network, and determining the risk probability of each working procedure includes:
determining the operation task as an operation task node, determining the operation procedure as an operation procedure node, and constructing a target Bayesian network;
determining the prior probability of each node in the target Bayesian network according to the historical accident data;
Correcting the prior probability of the job task node;
Determining posterior probability of each operation procedure node according to the corrected probability;
and determining the risk probability according to the posterior probability and the prior probability.
Optionally, analyzing the operation procedure by using a bayesian network, and determining a sensitivity value of each operation procedure includes:
determining the operation task as an operation task node, determining the operation procedure as an operation procedure node, and constructing a target Bayesian network;
and determining the sensitivity degree value of each working procedure node by using the sensitivity analysis function of the Bayesian network.
Optionally, the target authentication scheme includes a target authentication person, and the determining the target authentication scheme according to the security authentication point includes:
determining the risk level of the security authentication point according to the risk probability and the sensitivity value;
And determining the target authentication personnel according to the risk level of the security authentication point.
Optionally, the determining the risk level of the security authentication point according to the risk probability and the sensitivity value includes:
If the risk probability and the sensitivity value meet a first preset condition and do not meet a second preset condition, determining that the risk level is a high risk level;
If the risk probability and the sensitivity value do not meet the first preset condition and the second preset condition, determining that the risk level is a stroke risk level;
And if the risk probability and the sensitivity value do not meet the first preset condition and meet the second preset condition, determining that the risk level is a low risk level.
Optionally, the first preset condition includes: the risk probability of the operation procedure is greater than a second risk threshold, and/or the sensitivity value of the operation procedure is greater than a second sensitivity threshold;
the second preset condition includes: the risk probability of the operation procedure is smaller than a third risk threshold value, and/or the sensitivity level value of the operation procedure is smaller than a third sensitivity threshold value;
wherein the second risk threshold is greater than the third risk threshold, the third risk threshold being greater than the first risk threshold; the second sensitivity threshold is greater than the third sensitivity threshold, which is greater than the first sensitivity threshold.
Optionally, the determining the target authentication person according to the risk level of the security authentication point includes:
And determining the target authentication personnel corresponding to the current risk level according to the corresponding relation between the predetermined risk level and the authentication personnel.
Optionally, the target authentication scheme includes a target authentication mode, and the determining the target authentication scheme according to the security authentication point includes:
And determining the target authentication mode according to the hazard factor characteristics of the security authentication point.
Optionally, the hazard factor features include: an action characteristic and a generation phase, wherein the action characteristic comprises a hard correlation characteristic and a soft correlation characteristic related to the effect aging, and a trace characteristic and a trace-free characteristic related to the tracing angle; the production phase comprises a production preparation phase, a production phase and a production ending phase;
The determining the target authentication mode according to the hazard factor characteristics of the security authentication point comprises the following steps:
Aiming at the hazard factors generated in the production preparation stage, determining the target authentication mode to be a corresponding operation procedure after the authentication of a target authentication person;
Aiming at the hazard factors with the action characteristics of hard association characteristics or traceless characteristics, determining the target authentication mode to be the corresponding operation procedure of the whole-course continuous monitoring of the target authentication personnel;
aiming at the hazard factors with the action characteristics being soft correlation characteristics or trace characteristics, the target authentication mode is determined to be that the target authentication personnel does not need to monitor the corresponding operation procedure.
A second aspect of the present disclosure provides a targeted security authentication device based on risk pre-control, including:
the dividing module is used for dividing the operation tasks to obtain a plurality of operation procedures;
the first determining module is used for analyzing the operation procedures by adopting a Bayesian network and determining the risk probability and the sensitivity value of each operation procedure;
the second determining module is used for determining a security authentication point from the operation procedure according to the risk probability and the sensitivity value, wherein the risk probability of the security authentication point is greater than a first risk threshold value and/or the sensitivity value is greater than a first sensitivity threshold value;
And the third determining module is used for determining a target authentication scheme according to the security authentication point, wherein the target authentication scheme comprises a target authentication person, a target authentication mode and target authentication equipment.
A third aspect of the present disclosure provides a targeted security authentication device based on risk pre-control, including:
a memory having a computer program stored thereon;
And a processor, configured to execute the computer program in the memory, to implement the steps of the risk pre-control-based targeted security authentication method provided in the first aspect of the present disclosure.
A fourth aspect of the present disclosure provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the risk pre-control based targeted security authentication method provided in the first aspect of the present disclosure.
A fifth aspect of the present disclosure provides a security authentication information system, comprising:
A security authentication unit including a risk pre-control-based targeted security authentication device as provided in the second aspect of the present disclosure or in the third aspect of the present disclosure;
the checking and permitting unit is used for establishing pre-operation checking content and standard and inputting approval comments of approval personnel;
The operation monitoring unit is used for acquiring an operation checking result before the operation starts and related information of operation process authentication;
The plan observation unit is used for establishing an observation plan so as to evaluate the security authentication effect;
The data processing unit is used for adjusting the security authentication scheme according to the acquired operation process related information;
The personnel checking unit is used for realizing the study training of the certification personnel;
and the personnel management unit is used for constructing the work file of each supervision personnel.
A seventh aspect of the present disclosure provides a computer program product which, when executed by a processor, implements the steps of the risk pre-control based targeted security authentication method provided by the first aspect of the present disclosure.
In the technical scheme, the operation tasks are divided to obtain a plurality of operation procedures; analyzing the operation procedures by adopting a Bayesian network, and determining the risk probability and the sensitivity value of each operation procedure; determining a security authentication point from the operation procedure according to the risk probability and the sensitivity value; and determining a target authentication scheme according to the security authentication point, wherein the target authentication scheme comprises a target authentication person, a target authentication mode and target authentication equipment, the risk probability of the security authentication point is greater than a first risk threshold value, and/or the sensitivity value is greater than a first sensitivity threshold value. Therefore, the risk pre-control established by taking the operation task as the guide can be realized in each operation procedure of specific operation, the operation procedure with high risk and high sensitivity is determined from a plurality of operation procedures and is determined as a safety authentication point, and then a targeted personalized authentication scheme is established aiming at the safety authentication point from three different dimensions of personnel, modes and equipment, so that blindness of production safety supervision is reduced, supervision efficiency of production operation is improved, and scientific safety management of refinement and systemization of the production task is realized.
Additional features and advantages of the present disclosure will be set forth in the detailed description which follows.
Drawings
The accompanying drawings are included to provide a further understanding of the disclosure, and are incorporated in and constitute a part of this specification, illustrate the disclosure and together with the description serve to explain, but do not limit the disclosure. In the drawings:
fig. 1 is a flow chart of a targeted security authentication method based on risk pre-control provided in an exemplary embodiment of the present disclosure.
Fig. 2 is a schematic diagram illustrating a division of a working process according to an exemplary embodiment of the present disclosure.
Fig. 3 is a schematic diagram showing a specific division of a job phase job procedure according to an exemplary embodiment of the present disclosure.
Fig. 4 is a schematic diagram of a pre-adjustment bayesian network provided by an exemplary embodiment of the present disclosure.
Fig. 5 is a schematic diagram of an adjusted bayesian network provided by an exemplary embodiment of the present disclosure.
FIG. 6 is a schematic illustration of the results of a sensitivity analysis provided by an exemplary embodiment of the present disclosure.
FIG. 7 is a schematic diagram of hazard factor features provided by an exemplary embodiment of the present disclosure.
Fig. 8 is a block diagram of a targeted security authentication device based on risk pre-control provided in an exemplary embodiment of the present disclosure.
Fig. 9 is a block diagram of a targeted security authentication device based on risk pre-control provided in an exemplary embodiment of the present disclosure.
Fig. 10 is a block diagram of a security authentication information system provided in an exemplary embodiment of the present disclosure.
Detailed Description
Specific embodiments of the present disclosure are described in detail below with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the disclosure, are not intended to limit the disclosure.
It should be noted that, all actions for acquiring signals, information or data in the present disclosure are performed under the condition of conforming to the corresponding data protection rule policy of the country of the location and obtaining the authorization given by the owner of the corresponding device.
Fig. 1 is a flow chart of a targeted security authentication method based on risk pre-control provided in an exemplary embodiment of the present disclosure. The method provided by the disclosure can be applied to targeted security authentication technology based on risk pre-control of enterprises in various fields, such as security authentication technology in the fields of thermal power plants, battery manufacturing and the like. For a clearer understanding of the present disclosure, an example of application to a thermal power plant will be exemplified below. It should be understood, however, that the illustration of a thermal power plant is not to be taken as a limitation on the field of application and the scope of protection of the present disclosure. As shown in fig. 1, the method may include S101 to S104.
S101, dividing the job tasks to obtain a plurality of job procedures.
By way of example, the job tasks of a power generation enterprise may refer broadly to production activities such as operation, overhaul, maintenance, inspection, testing, sampling, testing, engineering, etc., each job task may be divided into job procedures according to a process flow. Each working procedure has corresponding risks, the dangerous sources are gradually identified according to the working procedures, the possible accident types of each working procedure are clarified, and correspondingly formulated control measures can be more systematically and comprehensively realized.
In order to facilitate the subsequent bayesian network analysis, the task may first be divided into a number of work procedures, defining the work sites of the specific work procedures, and systems and areas associated with the work. According to different characteristics of operation, equipment overhaul and the like, the operation procedures are divided differently. Fig. 2 is a schematic diagram illustrating a division of working procedures according to an exemplary embodiment of the present disclosure, and as shown in fig. 2, the pre-job preparation may include working procedures such as security measure inspection, personnel preparation, equipment preparation, material preparation, and spare part preparation, and the post-job site cleaning stage may include working procedures such as security measure recovery, equipment self-condition and equipment environment condition confirmation, spare part consumption statistics, and defect handling conditions.
Taking the reheater service operation shown in fig. 3 as an example, the operation stage thereof may be divided into several operation steps. For example, preparation before overhaul, wear and explosion prevention inspection of the high-temperature reheater, inspection of a connecting pipe and a header hanging point, sampling of a reheater pipe, scaffold removal, and end of overhaul work, etc. can be included. Wherein, the preparation before maintenance can be further subdivided into: ① Entering the interior of a furnace top hot box for vibration coking; ② The outer wall of the tube of the heating surface of the low-temperature reheater and the high-temperature reheater is cleaned up of accumulated ash; ③ The high-order reheater area is erected with a scaffold. The high temperature reheater wear and explosion protection inspection can be further subdivided into: ① Checking the sparse clamp, the protective tile and the pipe clamp of the high-temperature reheater; ② Checking anti-wear protection tiles of the low-temperature reheater and the high-temperature reheater tube rows; ③ Repairing the abrasion-proof explosion-proof inspection defect of the reheater; ④ And checking the wear-resistant protection tile. Reheater tube sampling can be further subdivided into: ① Determining a sampling position; ② Checking a weld joint; ③ The pipe is assembled, and the welded junctions at the two ends are clamped by the pipe clamp, so that the pipe can be welded. The end of the service work can be further subdivided into: ① Counting tools and materials, and cleaning the site; ② Checking whether the scaffold, the temporary power supply and the illumination needed for overhauling the present place are dismantled and cleaned.
S102, analyzing the operation procedures by adopting a Bayesian network, and determining the risk probability and the sensitivity value of each operation procedure.
For example, a specific job task of the thermal power plant may be determined as a job task node; the job tasks are divided to obtain a plurality of job steps, and the job steps are determined as job step nodes. In this manner, a target Bayesian network can be constructed based on job task nodes, job process nodes, and associations between individual processes and tasks. The state of each node in the target bayesian network may be that a security problem has occurred or that no security problem has occurred.
The safety problem may be a specific cause of safety accidents in the working tasks and working procedures, and may be classified into five types of unsafe behavior of a person, personnel conditions, conditions of objects, environmental conditions and production work management from the "man-machine-ring-pipe" level. Wherein the personnel condition elements include three aspects of mental condition, physiological condition and skill condition; the personnel unsafe behavior elements comprise the elements of incorrect operation (regulation) execution, nonstandard self behavior (actions, postures, station standardability requirements), safety risks existing in the state conditions of the production site, incorrect wearing and wearing of individual protective equipment, incorrect emergency treatment and the like; the condition elements of the object comprise the integrity and work suitability of the design and selection of the equipment system, the perfect quality of equipment facilities, the safety state and measures of a production place before operation, the sudden abnormal unsafe factors in the production operation and the like; the environmental condition elements comprise physical environment, space environment, safety protection, operation interference factors and other aspects; the production job management elements comprise technical management, production organization management, pre-job preparation management, job process management, basic management, compliance management and other aspects.
In the Bayesian comprehensive risk assessment process, a Bayesian network analysis method can be adopted for each operation procedure to obtain the risk probability of safety problems of each operation procedure node, determine the operation procedure which is easy to cause problems, and perform sensitivity analysis on each operation procedure node to determine the operation procedure with high sensitivity.
S103, determining a security authentication point from the operation procedure according to the risk probability and the sensitivity level value, wherein the risk probability of the security authentication point is greater than a first risk threshold value, and/or the sensitivity level value is greater than a first sensitivity threshold value.
For example, the first risk threshold and the first sensitivity threshold may be preset based on actual requirements. Security authentication may refer to the supervision of production security. Therefore, the operation procedure which is easy to cause problems and the operation procedure with higher sensitivity can be determined as the safety authentication point, the necessity of determining the safety authentication point is ensured, the pertinence of operation supervision is improved, and the operation supervision efficiency is further improved.
S104, determining a target authentication scheme according to the security authentication point.
The target authentication scheme comprises a target authentication person, a target authentication mode and target authentication equipment.
For example, the target authentication person may determine based on a risk level of the security authentication point, the target authentication manner may be determined based on a hazard factor characteristic of the security authentication point, and the target authentication device may be determined based on the target authentication manner of the security authentication point.
Therefore, the risk pre-control established by taking the operation task as the guide can be realized in each operation procedure of specific operation, the operation procedure with high risk and high sensitivity is determined from a plurality of operation procedures and is determined as a safety authentication point, and then a targeted personalized authentication scheme is established aiming at the safety authentication point from three different dimensions of personnel, modes and equipment, so that blindness of production safety supervision is reduced, supervision efficiency of production operation is improved, and scientific safety management of refinement and systemization of the production task is realized.
In an alternative embodiment, in S102, the analysis of the working procedures using the bayesian network, determining the risk probability of each working procedure may include:
Determining a job task as a job task node, determining a job procedure as a job procedure node, and constructing a target Bayesian network;
determining the prior probability of each node in the target Bayesian network according to the historical accident data;
correcting the prior probability of the job task node;
Determining posterior probability of each operation procedure node according to the corrected probability;
and determining the risk probability according to the posterior probability and the prior probability.
By way of example, the historical incident data may include thermal power plant overhaul incident cases and historical experience management data, from which a parameter learning matrix may be constructedThe specific formula is as follows:
Wherein, For the total amount of historical accident data,/>Is the total number of job process nodes and job task nodes. Parameter learning matrix/>, which can utilize a target Bayesian networkAnd learning is carried out, and the prior probability that each operation procedure node and each operation task node are likely to have safety problems is obtained. The prior probability of the problem occurring in the job task node can be corrected to obtain the posterior probability of each job process node, and for example, the posterior probability corresponding to each job process can be obtained by the following formula:
Wherein, Characterization at job task/>Under the condition of safety problem, the operation procedure/>Probability of occurrence of a security problem, i.e., posterior probability; /(I)Characterization of working procedure/>The prior probability of a security problem occurring; /(I)Characterization in working procedure/>Under the condition of safety problem, job task/>Probability of a security problem occurring.
Fig. 4 is a schematic diagram of a bayesian network before adjustment, that is, a schematic diagram representing prior probabilities of each node, according to an exemplary embodiment of the present disclosure, the probability of occurrence of a safety problem may be adjusted to be 100% for the reheater maintenance operation state in fig. 4, and the probabilities of the other nodes may be correspondingly changed accordingly, so as to obtain fig. 5, that is, a schematic diagram representing posterior probabilities of each node after adjustment. The difference values of the corresponding nodes in fig. 4 and fig. 5 can be compared, and the key node which is greatly affected by the safety problem of the overhaul operation of the reheater, namely the operation procedure which is easy to cause the problem, is determined, wherein the greater the difference value is, the more easy the safety problem is caused in the operation procedure. The operation procedure which is easy to cause problems is determined as a security authentication point.
Therefore, the risk probability can be updated in real time through the continuously updated historical accident data, so that the safety certification point is updated in real time, the necessity of determining the safety certification point is ensured, the blindness of production safety supervision is reduced, and the supervision efficiency of production operation is improved.
In an alternative embodiment, in S102, the analysis of the working procedures using the bayesian network to determine the sensitivity level value of each working procedure may include:
Determining a job task as a job task node, determining a job procedure as a job procedure node, and constructing a target Bayesian network;
and determining the sensitivity degree value of each working procedure node by using the sensitivity analysis function of the Bayesian network.
For example, a task node in the target bayesian network may be set as a target node, the sensitivity analysis function of the bayesian network is utilized to perform sensitivity analysis on the task, and according to the sensitivity degree value of each task node for the task node, a task with higher sensitivity to the security problem of the task is determined, and the task is determined as a security authentication point. For example, the reheater overhaul operation may be set as a target node, and the sensitivity analysis is performed on the target bayesian network, a result of the sensitivity analysis is shown in fig. 6, a Gr on the upper right side in a schematic block diagram of each node in the figure is used for representing the high and low of the sensitivity level value, the larger the value of r is, the lower of the sensitivity level value represented by the Gr is, the sensitivity level value represented by the G1 is higher than the sensitivity level value represented by the G2 in fig. 6, the sensitivity level value represented by the G2 is higher than the sensitivity level value represented by the G3, and the sensitivity level value represented by the G3 is higher than the sensitivity level value represented by the G4. Therefore, the high-sensitivity operation procedure can be determined as the safety authentication point, the necessity of determining the safety authentication point is ensured, the blindness of production safety supervision is reduced, and the supervision efficiency of production operation is improved.
In an alternative embodiment, the target authentication scheme includes a target authentication person, and in S104, determining the target authentication scheme according to the security authentication point may include:
Determining the risk level of the security authentication point according to the risk probability and the sensitivity value;
and determining the target authentication personnel according to the risk level of the security authentication point.
In an alternative embodiment, determining the risk level of the security authentication point according to the risk probability and the sensitivity value may include:
if the risk probability and the sensitivity level value meet the first preset condition and do not meet the second preset condition, determining that the risk level is a high risk level;
if the risk probability and the sensitivity level value do not meet the first preset condition and the second preset condition, determining that the risk level is a middle risk level;
if the risk probability and the sensitivity level value do not meet the first preset condition and meet the second preset condition, the determined risk level is a low risk level.
In one embodiment, the first preset condition includes: the risk probability of the operation procedure is larger than a second risk threshold value, and/or the sensitivity degree value of the operation procedure is larger than a second sensitivity threshold value; the second preset condition includes: the risk probability of the working procedure is smaller than the third risk threshold value, and/or the sensitivity degree value of the working procedure is smaller than the third sensitivity threshold value.
The second risk threshold is greater than the third risk threshold, and the third risk threshold is greater than the first risk threshold; the second sensitivity threshold is greater than the third sensitivity threshold, which is greater than the first sensitivity threshold. The second risk threshold, the second sensitivity threshold, the third risk threshold, and the third sensitivity threshold may be preset based on actual requirements.
Based on the scheme, the operation procedures with higher sensitivity and high possibility of generating safety problems can be determined as safety authentication points, the risks of the safety authentication points can be classified into three grades of low, medium and high, for example, the risk grade of the operation procedure node with higher sensitivity value or higher risk probability can be determined as high risk grade, and for example, the risk grade of the operation procedure node with higher posterior probability, for example, the risk grade of the operation procedure node with the posterior probability of more than 60 percent, can be determined as high risk grade; the risk level of the working procedure node with the smaller sensitivity value or the smaller risk probability can be determined as a low risk level, and for example, the risk level of the working procedure node with the smaller posterior probability, for example, the risk level of the working procedure node with the posterior probability less than 30%, can be determined as a low risk level, and the risk levels corresponding to the other nodes are medium risk levels. The risk level of each operation procedure can be obtained through the bayesian network analysis result of the reheater maintenance operation, and the risk level can be shown in table 1:
TABLE 1
Different levels of security authentication points can be set according to different risk levels. If the risk level of the operation procedure is a low risk level, setting the security authentication point as a 1-level security authentication point; if the risk level of the operation procedure is the risk level of the stroke, setting the security authentication point as a 2-level security authentication point; if the risk level of the operation procedure is a high risk level, the security authentication point can be set to be a 3-level security authentication point. Specifically, it can be shown in table 2:
TABLE 2
In an alternative embodiment, determining the target authentication person according to the risk level of the security authentication point may include:
And determining the target authentication personnel corresponding to the current risk level according to the corresponding relation between the predetermined risk level and the authentication personnel.
Illustratively, the provers may be classified into different levels, such as different levels of manager in a factory leader, department, team, etc. The correspondence between the risk level and the certifying person may be pre-calibrated and stored.
Aiming at low risk level operation procedures, such as connection pipe and header hanging point inspection in reheater maintenance, a 1-level safety authentication point is set, and a first-level acceptance check can be adopted. Before the working procedure is executed, a working responsible person needs to check the execution condition of risk pre-control management safety measures of the working procedure on site before the working procedure is started, and signs and confirms on the premise of meeting the working standard.
Aiming at the working procedures of medium risk level, such as entering the furnace top box for coke vibration and the like in the overhaul of a reheater, a 2-level safety identification point is set, and a second-level acceptance check can be adopted. Two levels of personnel signing are required before this procedure is performed. The working responsible person, each production department spot check (special worker) and the above personnel check the risk pre-control management safety measure execution condition of the working procedure on site before the working procedure starts, and respectively sign and confirm on the premise of meeting the working standard.
Aiming at high risk level operation procedures, such as checking anti-abrasion protection tiles and the like in reheater overhaul, a 3-level safety certification point is set, and three-level acceptance is adopted. Three levels of signatures are required before this procedure is performed. The working person in charge, each production department spot check (special worker) and above, the production technical department or An Jian ring monitoring department person in charge and above need to check the risk pre-control management safety measure execution condition of the high risk level working procedure on site before working the high risk level working procedure, and respectively sign and confirm on the premise of meeting the operation standard.
Therefore, according to the corresponding relation between the predetermined risk level and the certification personnel, the target certification personnel corresponding to the current risk level can be rapidly determined, the waste of manpower is avoided, the flexibility of production operation supervision is improved, and the problem that supervision is not in place is avoided.
In an alternative embodiment, the target authentication scheme includes a target authentication mode, and in S104, determining the target authentication scheme according to the security authentication point may include:
and determining a target authentication mode according to the hazard factor characteristics of the security authentication point.
The hazard factor characteristics of the working procedure may include: action characteristics and production phase. As shown in fig. 7, the action characteristics include hard-related characteristics and soft-related characteristics related to the effect aging, and trace-back characteristics and trace-free characteristics related to the trace-back angle, and the production phase includes a production preparation phase, a production phase, and a production end phase. The safety authentication point is a selected operation procedure, namely the hazard factor characteristic of the safety authentication point can refer to the hazard factor characteristic of the corresponding operation procedure.
Hazard factors can be classified into hard and soft associations from the time-efficiency perspective of the effect, and some hazard factors directly cause serious accident effects, which are called hard association hazard factors, such as sparks capable of igniting combustible gases, causing fires or explosions, and the supervision of such hazard factors is strictly prevented. Some hazard factors cannot immediately cause accident consequences, but can continuously influence safe production, have time persistence, and finally cause accident conditions to be influenced by other factors, namely soft-association hazard factors, such as equipment leakage can not obviously influence production or cause accidents, but can influence the health state of equipment or cause fire due to leakage, high-concentration gas can cause gas explosion and the like under the condition of sparks, so that the supervision of the hazard factors is controlled on one hand, and on the other hand, the hazard factors are treated and eliminated immediately after the occurrence.
Hazard factors can be classified into trace and no trace from the traceability point of view of action, some hazard factors can not leave trace, and the hazard factors belong to no trace, and the state of the hazard factors can only be found in the occurring process, typically, unsafe behaviors of people in most cases can only be monitored in the production operation process. Some harmful factors can leave marks, can be found after the post-production, can be detected after the production operation is stopped, and can be detected only after the shutdown, and the timeliness related to the results can be combined.
Hazard factors are divided from the process of production and can be divided into a production preparation stage, a production stage and a production ending stage. The hazard factors are generated in the production preparation stage, some are generated in the production process, and other are generated in the production ending stage, so that hidden danger is left for subsequent work.
The hazard factors have various action characteristics, and the target identification mode can be determined by specifically analyzing the action characteristics of various hazard factors. In one embodiment, the target authentication may be determined by:
Aiming at the hazard factors generated in the production preparation stage, determining a target authentication mode as to execute a corresponding operation procedure after the authentication of a target authentication person, wherein the target authentication mode can be represented by H;
aiming at the hazard factors with the action characteristics of hard association characteristics or traceless characteristics, determining a target authentication mode as a corresponding operation procedure of the target authentication personnel in a full-range continuous monitoring mode, wherein W can be used for representing the target authentication mode;
Aiming at the hazard factors with the action characteristics of soft association characteristics or trace characteristics, the target authentication mode is determined to be the target authentication mode, and the target authentication mode can be represented by S without monitoring corresponding operation procedures.
Therefore, according to the hazard factor characteristics, the target authentication mode which is adaptive to the safety authentication point and flexible and effective can be determined, the blindness of production safety supervision is reduced, and the supervision efficiency of production operation is improved.
In addition, the target authentication mode can be further supplemented by combining the production operation state during supervision and authentication, the required checking frequency and the position of the authentication personnel.
For example, the production job status at the time of supervision and authentication may refer to a supervision check or a shutdown supervision check during the production job. Aiming at the authentication mode of continuously monitoring the corresponding operation procedure in the whole process of the target authentication personnel, the supervision and inspection in the production process can be determined; the target certification personnel can determine to carry out supervision and inspection after the production is finished, namely, the shutdown without monitoring the corresponding operation.
For example, the required inspection frequency may be determined according to a risk level of the work process, the higher the risk level, the higher the required inspection frequency. The required inspection frequency may be determined from the hazard factor characteristics, in particular, for hazard factors whose action characteristics are hard-associated characteristics or traceless characteristics, the required inspection frequency may be determined to be always under supervision on site; the required inspection frequency may be determined as a periodic spot inspection for a hazard factor whose action characteristic is a soft-related characteristic or a mark characteristic, or a hazard factor generated at a production preparation stage.
For example, the location of the authentication personnel may be determined based on available authentication equipment and complexity of field operations, i.e., determining whether the supervising authentication personnel is performing field authentication or remote authentication. Or may be determined by the authenticating person itself.
Still, the operation of repairing the reheater is taken as an example, wherein the target authentication mode corresponding to each operation procedure can be as shown in table 3:
TABLE 3 Table 3
In an alternative embodiment, the target authentication scheme further includes a target authentication device, and in S104, determining the target authentication scheme according to the security authentication point may include:
and determining target authentication equipment according to the security authentication point.
For example, besides field visual inspection, related equipment can be used as a verification means, and different target verification equipment can be selected according to specific screened operation procedures, namely safety verification points, so as to form a verification means scheme of the system. Therefore, the safety authentication can be flexibly and scientifically realized, and the supervision efficiency of production operation is improved. The selection of the authentication means may take into account the risk characteristics of each working procedure, and may specifically include:
(1) The visual perception equipment means adopted for the remote authentication working procedure of the authentication personnel can comprise a remote monitoring system, an unmanned aerial vehicle, a robot and a personnel positioning system.
Remote monitoring system: monitoring personnel can be located in the monitoring room, and the monitoring personnel can remotely monitor the monitoring room through the field camera to verify the production operation safety condition.
Unmanned aerial vehicle and robot: the two can replace supervisory personnel to carry out production authentication monitoring, the unmanned aerial vehicle is suitable for monitoring of outdoor large-space-range operation places, and the robot is suitable for monitoring of indoor or specific small-space-area-range operation places. If a track robot, a wheel robot and the like are used, the automatic inspection is carried out on a zero meter indoor area, a main transformer area, a booster station area, an outdoor fan area, a distribution room area and a coal corridor area of a power plant steam turbine and a boiler.
Personnel positioning system: the method is suitable for tracking the personnel movement track. By using UWB (Ultra Wide Band) personnel positioning technology, the anchor points and communication base stations with known positions are utilized to communicate with positioning labels held by personnel, and the TDOA (TIME DIFFERENCE of Arrival) positioning algorithm is utilized to position the personnel on the production site by measuring the transmission delay difference between different anchor points and mobile terminals.
(2) Aiming at monitoring illegal entry of field personnel into a strictly forbidden environment area, the adopted equipment means can comprise:
electronic (virtual) fences: the method is suitable for temporary area limitation and prevents personnel from entering illegally. Firstly, an admission list is formulated aiming at relevant areas such as key areas (hydrogen stations, ammonia areas and oil areas) of a power plant, high-risk operation areas (high-altitude operation, lifting operation and ray operation) and the like, personnel are limited to enter a limited area, and when illegal intrusion occurs or the number of the personnel entering and exiting is unequal, a personnel positioning system is used for displaying on a monitoring picture to give an alarm in real time. And pushing key information pictures such as time, camera position, number of intruders and the like to a monitoring room through an information system, and reserving an alarm screenshot when the intruder runs.
An access control device: the gate system with the face recognition and the person verification functions is used, the face recognition function is used when an external person enters a factory, and the person verification function is used to ensure that the identity of the person is real.
(3) Aiming at monitoring the behavior of the personnel in violation of regulations, the adopted equipment means can comprise:
Image tracking and identification intelligent video platform: the method is suitable for identifying unsafe behavior in personnel operation activities. On the basis of a traditional video monitoring system, an intelligent video platform for tracking and identifying images facing production operation scenes is developed. An extensible artificial intelligence general algorithm framework is constructed, related key technologies such as distributed deep learning, knowledge graph and the like are developed, an intelligent video analysis technology based on computer vision and modes is established, and key useful target information can be automatically distinguished, identified and extracted from numerous video images. Specifically, various unsafe behaviors of personnel can be made into VR (Virtual Reality) videos, and the unsafe behaviors of field operators, such as the unsafe behaviors of not hanging safety belts, not carrying safety caps, not carrying eye protection glasses, entering dangerous areas and the like, which occur in practice can be automatically identified by applying a deep learning image algorithm through comparison with a display picture. And simultaneously, carrying out real-time alarm. And pushing the key information picture to a monitoring room through an information system, and keeping an alarm screenshot.
(4) Aiming at the illegal misoperation of personnel on equipment under the condition of controlling a specific complex environment, the adopted equipment means can comprise:
Electronic lock (intelligent lock control device): the method is suitable for equipment such as an electrical control cabinet. The microcomputer is locked in five-prevention mode, and the circuit breaker is prevented from being opened or closed by mistake; the on-load separation switch is prevented; preventing the electrification from hanging (closing) the grounding wire (grounding switch); preventing the combined circuit breaker (isolating switch) with the grounding wire (grounding switch); preventing false entry into the charging interval.
(5) For monitoring equipment facilities and environmental anomalies (unsafe conditions), the equipment means employed may include:
(signal) alarm device: the method is suitable for risk alarming under abnormal conditions of the production site. And (3) on-site monitoring is carried out by using a measuring instrument, an inductor and the like, the acquired related information is transmitted to a monitoring room, and an alarm is given immediately when the related information exceeds a threshold value. Such as infrared temperature sensing, is used for infrared temperature sensing.
(6) For certain high risk production operations, the facility means employed may include:
If limited space operation is inconvenient for supervisory personnel to authenticate due to condition limitation, special authentication equipment can be developed for the purpose, narrow-band internet of things based on the Lora protocol is applied, a monitoring device (IN) is installed IN the limited space aiming at the condition that signal transmission IN the limited space is limited by combining a personnel positioning system, parameters such as gas concentration and the like IN the limited space are received through Bluetooth, personnel position information IN the limited space is received through UWB, and the monitoring device (OUT) is communicated with monitoring equipment installed outside the limited space through a network cable and is transmitted to a monitoring platform.
(7) For the on-site authentication of the authentication personnel, the adopted equipment means can comprise:
Besides field visual inspection, the security authentication personnel can also adopt related auxiliary authentication tools to improve the authentication work efficiency. If the electronic tag is adopted, the electronic tag is used for reading the identification information of the field related equipment and recording the authentication condition information from the database; and a personnel identification card is adopted to read the related information of the field operators, the information of the recorded authentication condition and the like.
Taking the operation of repairing the reheater as an example, based on each operation procedure, the following target authentication device can be adopted:
The means of authentication (equipment) in preparation before service are as follows: ① When vibration is carried out in the furnace top box, special authentication equipment for limited space operation is adopted to acquire personnel position information, oxygen concentration information and the like, so that the safety of operators is ensured; ② Adopting an image tracking and identification intelligent video platform to monitor whether safety measures are taken; ③ And the monitoring camera is used for monitoring the operation condition of the scaffold at the high position, so as to avoid illegal behaviors.
The means of authentication (equipment) in the wear and explosion protection inspection of the high temperature reheater are as follows: ① Reading identification information, input condition information and the like of the high-temperature reheater and the low-temperature reheater from a database in real time by adopting an auxiliary identification tool such as an electronic tag and the like; ② And (5) checking whether the welding of the equipment meets the requirement by adopting a professional certification tool.
The means of authentication (equipment) in the inspection of the tie-tube and the header hanging point are as follows: ① Applying a deep learning image algorithm to identify whether the header hanger is askew; ② The safety measures of field personnel are monitored by adopting a wheel robot, so that the safety belt hook is tied and hung in place.
The means of authentication (equipment) in the reheater tube sampling is as follows: ① Adopting intelligent devices such as an electronic lock, if the power supply is not turned off when the turning tool is replaced, the electronic lock cannot be unlocked, and the turning tool can be replaced by unlocking the electronic lock after the power supply is cut off; ② Automatically calculating the weight mass of the chain crane by adopting a computer system, and if the weight mass does not reach the standard, carrying out hoisting inaccurately; ③ And reading personnel related information of the reheater pipe cutting and cutting operation information by adopting an auxiliary identification tool such as a personnel identification card and the like.
The means of authentication (equipment) at the end of the maintenance work are as follows: the inspection robot is adopted to count the on-site arrangement condition, so that the on-site oil pollution is avoided, and the waste is timely cleaned.
Based on the same inventive concept, the present disclosure also provides a targeted security authentication device based on risk pre-control. Fig. 8 is a block diagram of a targeted security authentication device 300 based on risk pre-control provided in an exemplary embodiment of the present disclosure. Referring to fig. 8, the risk pre-control-based targeted security authentication device 300 may include:
the dividing module 301 is configured to divide the job task to obtain a plurality of job procedures;
A first determining module 302, configured to analyze the operation procedures by using a bayesian network, and determine a risk probability and a sensitivity value of each operation procedure;
A second determining module 303, configured to determine a security authentication point from the working procedure according to the risk probability and the sensitivity level value, where the risk probability of the security authentication point is greater than a first risk threshold, and/or the sensitivity level value is greater than a first sensitivity threshold;
and a third determining module 304, configured to determine a target authentication scheme according to the security authentication point, where the target authentication scheme includes a target authentication person, a target authentication mode, and a target authentication device.
Therefore, the risk pre-control established by taking the operation task as the guide can be realized in each operation procedure of specific operation, the operation procedure with high risk and high sensitivity is determined from a plurality of operation procedures and is determined as a safety authentication point, and then a targeted personalized authentication scheme is established aiming at the safety authentication point from three different dimensions of personnel, modes and equipment, so that blindness of production safety supervision is reduced, supervision efficiency of production operation is improved, and scientific safety management of refinement and systemization of the production task is realized.
Optionally, the first determining module 302 is configured to determine the risk probability of each of the working procedures by:
determining the operation task as an operation task node, determining the operation procedure as an operation procedure node, and constructing a target Bayesian network;
determining the prior probability of each node in the target Bayesian network according to the historical accident data;
Correcting the prior probability of the job task node;
Determining posterior probability of each operation procedure node according to the corrected probability;
and determining the risk probability according to the posterior probability and the prior probability.
Optionally, the first determining module 302 is configured to determine the sensitivity level value of each of the working procedures by:
determining the operation task as an operation task node, determining the operation procedure as an operation procedure node, and constructing a target Bayesian network;
and determining the sensitivity degree value of each working procedure node by using the sensitivity analysis function of the Bayesian network.
Optionally, the target authentication scheme includes a target authentication person, and the third determining module 304 includes:
the first determining submodule is used for determining the risk level of the security authentication point according to the risk probability and the sensitivity value;
And the second determining submodule is used for determining the target authentication personnel according to the risk level of the security authentication point.
Optionally, the first determining submodule is configured to determine a risk level of the security authentication point by:
If the risk probability and the sensitivity value meet a first preset condition and do not meet a second preset condition, determining that the risk level is a high risk level;
If the risk probability and the sensitivity value do not meet the first preset condition and the second preset condition, determining that the risk level is a stroke risk level;
And if the risk probability and the sensitivity value do not meet the first preset condition and meet the second preset condition, determining that the risk level is a low risk level.
Optionally, the first preset condition includes: the risk probability of the operation procedure is greater than a second risk threshold, and/or the sensitivity value of the operation procedure is greater than a second sensitivity threshold; the second preset condition includes: the risk probability of the operation procedure is smaller than a third risk threshold value, and/or the sensitivity level value of the operation procedure is smaller than a third sensitivity threshold value;
wherein the second risk threshold is greater than the third risk threshold, the third risk threshold being greater than the first risk threshold; the second sensitivity threshold is greater than the third sensitivity threshold, which is greater than the first sensitivity threshold.
Optionally, the first determining submodule is configured to determine the target authentication person by:
And determining the target authentication personnel corresponding to the current risk level according to the corresponding relation between the predetermined risk level and the authentication personnel.
Optionally, the target authentication scheme includes a target authentication person, and the third determining module 304 includes:
and the third determining sub-module is used for determining the target authentication mode according to the hazard factor characteristics of the security authentication point.
Optionally, the hazard factor features include: an action characteristic and a generation phase, wherein the action characteristic comprises a hard correlation characteristic and a soft correlation characteristic related to the effect aging, and a trace characteristic and a trace-free characteristic related to the tracing angle; the production phase includes a production preparation phase, a production process phase, and a production end phase.
A third determining sub-module, configured to determine the target authentication mode by:
aiming at the hazard factors generated in the production preparation stage, determining the target authentication mode to be a corresponding operation procedure after the target authentication personnel authenticates;
Aiming at the hazard factors with the action characteristics of hard association characteristics or traceless characteristics, determining the target authentication mode to be the corresponding operation procedure of the whole-course continuous monitoring of the target authentication personnel;
aiming at the hazard factors with the action characteristics being soft correlation characteristics or trace characteristics, the target authentication mode is determined to be that the target authentication personnel does not need to monitor the corresponding operation procedure.
Optionally, the target authentication scheme includes a target authentication device, and the third determining module 304 includes:
and the fourth determining submodule is used for determining the target authentication equipment according to the security authentication point.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Fig. 9 is a block diagram of a targeted security authentication device 700 based on risk pre-control provided in an exemplary embodiment of the present disclosure. As shown in fig. 9, the targeted security authentication device 700 based on risk pre-control may include: a processor 701, a memory 702. The risk pre-control based targeted security authentication device 700 may also include one or more of a multimedia component 703, an input/output (I/O) interface 704, and a communication component 705.
The processor 701 is configured to control the overall operation of the targeted security authentication device 700 based on risk pre-control, so as to complete all or part of the steps in the targeted security authentication method based on risk pre-control. The memory 702 is used to store various types of data to support operation at the risk-based predictive targeted security authentication device 700, which may include, for example, instructions for any application or method operating on the risk-based predictive targeted security authentication device 700, as well as application-related data such as contact data, messages, pictures, audio, video, and the like. The Memory 702 may be implemented by any type or combination of volatile or non-volatile Memory devices, such as static random access Memory (Static Random Access Memory, SRAM for short), electrically erasable programmable Read-Only Memory (ELECTRICALLY ERASABLE PROGRAMMABLE READ-Only Memory, EEPROM for short), erasable programmable Read-Only Memory (Erasable Programmable Read-Only Memory, EPROM for short), programmable Read-Only Memory (Programmable Read-Only Memory, PROM for short), read-Only Memory (ROM for short), magnetic Memory, flash Memory, magnetic disk, or optical disk. The multimedia component 703 can include a screen and an audio component. Wherein the screen may be, for example, a touch screen, the audio component being for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signals may be further stored in the memory 702 or transmitted through the communication component 705. The audio assembly further comprises at least one speaker for outputting audio signals. The I/O interface 704 provides an interface between the processor 701 and other interface modules, which may be a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 705 is configured to perform wired or wireless communication between the risk-based pre-controlled targeted security authentication device 700 and other devices. Wireless Communication, such as Wi-Fi, bluetooth, near Field Communication (NFC) for short, 2G, 3G, 4G, NB-IOT, eMTC, or other 5G, etc., or one or a combination of more of them, is not limited herein. The corresponding communication component 705 may thus comprise: wi-Fi module, bluetooth module, NFC module, etc.
In an exemplary embodiment, the risk-based targeted security authentication device 700 may be implemented by one or more Application Specific Integrated Circuits (ASIC), digital Signal Processors (DSP), digital signal processing devices (DIGITAL SIGNAL Processing Device DSPD), programmable logic devices (Programmable Logic Device PLD), field programmable gate arrays (Field Programmable GATE ARRAY FPGA), controllers, microcontrollers, microprocessors, or other electronic components for performing the risk-based targeted security authentication method described above.
In another exemplary embodiment, a computer readable storage medium is also provided, comprising program instructions which, when executed by a processor, implement the steps of the risk pre-control based targeted security authentication method described above. For example, the computer readable storage medium may be the memory 702 including program instructions described above, which are executable by the processor 701 of the risk-based predictive targeted security authentication device 700 to perform the risk-based predictive targeted security authentication method described above.
In another exemplary embodiment, a computer program product is also provided, comprising a computer program executable by a programmable apparatus, the computer program having code portions for performing the risk pre-control based targeted security authentication method described above when executed by the programmable apparatus.
In order to achieve refined, systematic, informationized, self-learning scientific security management and improve production operation supervision efficiency, the present disclosure further provides a security authentication information system, as shown in fig. 10, the security authentication information system 900 may include:
the security authentication unit 901 includes the targeted security authentication device based on risk pre-control provided in the above embodiment.
The specific manner in which the various modules perform operations in relation to the risk-based pre-controlled targeted security authentication device has been described in detail in relation to embodiments of the method and will not be described in detail herein. Therefore, the risk pre-control established by taking the operation task as the guide can be realized, each operation procedure of specific operation is realized, the operation procedure with high risk and high sensitivity is determined from a plurality of operation procedures, the operation procedure is determined to be a safety authentication point, and then a corresponding target authentication scheme is determined, so that blindness of production safety supervision can be reduced, and supervision efficiency of production operation is improved.
And the checking and permitting unit 902 is used for establishing pre-operation checking content and standard and inputting approval comments of approval personnel.
For example, pre-job audit content and criteria may be established based on bayesian network analysis and possible security issues with each element, item-by-item audit. After the approver signs the opinion on the job ticket, the operator can enter the job site, the level of the approver of the licensed job ticket should be consistent with the level of the job risk, and the relevant condition records are entered into the management system. For example, the verification permission unit 902 may determine, according to the bayesian network analysis result, that the main overhaul content of the overhaul operation of the reheater is the ash accumulation cleaning of the reheater, the scaffold erection of the reheater, the wear-resistant and explosion-proof inspection of the reheater, and the sampling of the reheater, determine the pre-operation verification content, the standard, the quality inspector and the safety inspector of the related process, and input the approval comments of the approver. For example, the on-site operation monitoring module generates the content and standard of checking the safety measures of the construction site according to the characteristics of the overhaul operation of the reheater, wherein the content and standard comprise that a dust mask is required to be worn in the operation of a dust place, the temperature of a boiler exceeds 60 ℃ and is not accurate, and a combustion chamber working chamber with the temperature of more than 60 ℃ is required to be formulated with relevant standard and special person monitoring is required to be arranged; the standard for preparing and checking the well-being of the tools is also generated, and the standard comprises the number requirements and well-being of an angle grinder, a cutting machine, a toothless saw, a beveling machine, a running light and the like.
The job monitoring unit 903 is configured to obtain a job check result before the job starts and related information of job procedure authentication.
For example, before the operation is started, the professional can start the operation after checking the safety tool and the protective equipment used against a check list; and after the process supervision is finished, the situation that the requirements are not met or the measures are not executed in place is found, and the correction is stopped. In the above-described process, the job check result and the job process related information before the start of the job can be recorded in the management system by the job monitoring unit 903.
And a plan view unit 904 for creating a view plan to evaluate the security authentication effect.
For example, in addition to the security authentication, the method can also carry out planned work observation under the condition of not informing and not influencing the work of the staff, so as to more accurately grasp the actual working state of the staff and evaluate the effect of the security authentication. An observation plan can be established through the plan observation unit 904, work observation can be carried out on high-risk work projects, content standards are clearly observed, a plan work observation table is filled in, and relevant safety work measures are perfected through risks.
The data processing unit 905 is configured to adjust the security authentication scheme according to the acquired information related to the operation process.
For example, after information related to security authentication is entered into the system, the data processing unit 905 may perform statistical analysis on the information periodically, including security operations, authentication underwriting, etc.; adjusting the risk level and the safety certification mode, and continuously improving; according to the field change, when hidden danger and major change are found or along with data accumulation, the risk level is continuously adjusted according to the actual situation through big data analysis, and the implementation mode is continuously adjusted by means of advanced equipment. For example, with the accumulation of the number of security authentication operations for the reheater maintenance operation, by counting the security operations in each operation process, the performance of the authentication personnel, etc., can adjust the risk level and security authentication mode for some operation processes that have no security problem for a long period of time.
And the personnel checking unit 906 is used for realizing the study training of the certification personnel.
For example, an examination and evaluation question library of the supervisory personnel can be established according to the safety certification content and standard requirements, before working, the supervisory personnel should train and learn to be familiar with the certification content, and the examination questions can be extracted from the question library through the personnel examination unit 906 and pushed to be examined, and the qualification side can approve the working.
A personnel management unit 907 for constructing a work profile for each supervisor.
For example, the personnel management unit 907 may establish a working file for each supervisor, record working conditions, evaluate regularly, discover existing problems in time to improve, and provide accurate basis for the reward and punishment incentive mechanism to form a long-acting mechanism. The supervisory personnel may include certification personnel, auditors, and the like, who are involved in the production process.
Therefore, based on the security certification information system, the production operation supervision efficiency can be improved for realizing scientific security management of refinement, systemization, informatization and self-learning.
In an embodiment, a supervisory person APP corresponding to the security authentication information system can be constructed based on the security authentication information system, and the APP can be applied to a mobile terminal, including a personalized operation authentication requirement, a training and examination module, a notification, communication and feedback module and a review and archiving module, which are not described herein.
The preferred embodiments of the present disclosure have been described in detail above with reference to the accompanying drawings, but the present disclosure is not limited to the specific details of the embodiments described above, and various simple modifications may be made to the technical solutions of the present disclosure within the scope of the technical concept of the present disclosure, and all the simple modifications belong to the protection scope of the present disclosure.
In addition, the specific features described in the above embodiments may be combined in any suitable manner without contradiction. The various possible combinations are not described further in this disclosure in order to avoid unnecessary repetition.
Moreover, any combination between the various embodiments of the present disclosure is possible as long as it does not depart from the spirit of the present disclosure, which should also be construed as the disclosure of the present disclosure.

Claims (12)

1. The targeted security authentication method based on risk pre-control is characterized by comprising the following steps of:
dividing the operation tasks to obtain a plurality of operation procedures;
Analyzing the operation procedures by adopting a Bayesian network, and determining the risk probability and the sensitivity value of each operation procedure;
Determining a security authentication point from the operation procedure according to the risk probability and the sensitivity value, wherein the risk probability of the security authentication point is greater than a first risk threshold value and/or the sensitivity value is greater than a first sensitivity threshold value;
and determining a target authentication scheme according to the security authentication point, wherein the target authentication scheme comprises a target authentication person, a target authentication mode and target authentication equipment.
2. The risk-precontrolled targeted security authentication method according to claim 1, wherein the step of analyzing the working procedures by using a bayesian network to determine risk probability of each working procedure comprises:
determining the operation task as an operation task node, determining the operation procedure as an operation procedure node, and constructing a target Bayesian network;
determining the prior probability of each node in the target Bayesian network according to the historical accident data;
Correcting the prior probability of the job task node;
Determining posterior probability of each operation procedure node according to the corrected probability;
and determining the risk probability according to the posterior probability and the prior probability.
3. The risk-precontrolled targeted security authentication method according to claim 1, wherein the step of analyzing the operation procedures by using a bayesian network to determine a sensitivity level value of each operation procedure comprises:
determining the operation task as an operation task node, determining the operation procedure as an operation procedure node, and constructing a target Bayesian network;
and determining the sensitivity degree value of each working procedure node by using the sensitivity analysis function of the Bayesian network.
4. The risk-precontrolled targeted security authentication method according to claim 1, wherein the target authentication scheme includes a target authentication person, and the determining the target authentication scheme according to the security authentication point includes:
determining the risk level of the security authentication point according to the risk probability and the sensitivity value;
And determining the target authentication personnel according to the risk level of the security authentication point.
5. The risk-precontrolled targeted security authentication method according to claim 4, wherein the determining the risk level of the security authentication point according to the risk probability and the sensitivity value comprises:
If the risk probability and the sensitivity value meet a first preset condition and do not meet a second preset condition, determining that the risk level is a high risk level;
If the risk probability and the sensitivity value do not meet the first preset condition and the second preset condition, determining that the risk level is a stroke risk level;
And if the risk probability and the sensitivity value do not meet the first preset condition and meet the second preset condition, determining that the risk level is a low risk level.
6. The risk-precontrolled targeted security authentication method according to claim 5, wherein,
The first preset condition includes: the risk probability of the operation procedure is greater than a second risk threshold, and/or the sensitivity value of the operation procedure is greater than a second sensitivity threshold;
the second preset condition includes: the risk probability of the operation procedure is smaller than a third risk threshold value, and/or the sensitivity level value of the operation procedure is smaller than a third sensitivity threshold value;
wherein the second risk threshold is greater than the third risk threshold, the third risk threshold being greater than the first risk threshold; the second sensitivity threshold is greater than the third sensitivity threshold, which is greater than the first sensitivity threshold.
7. The risk-precontrolled targeted security authentication method according to claim 5, wherein the determining the target authentication person according to the risk level of the security authentication point comprises:
And determining the target authentication personnel corresponding to the current risk level according to the corresponding relation between the predetermined risk level and the authentication personnel.
8. The risk-precontrolled targeted security authentication method according to claim 1, wherein the target authentication scheme includes a target authentication mode, and the determining the target authentication scheme according to the security authentication point includes:
And determining the target authentication mode according to the hazard factor characteristics of the security authentication point.
9. The risk-precontrolled targeted security authentication method according to claim 8, wherein the hazard factor features include: an action characteristic and a generation phase, wherein the action characteristic comprises a hard correlation characteristic and a soft correlation characteristic related to the effect aging, and a trace characteristic and a trace-free characteristic related to the tracing angle; the production phase comprises a production preparation phase, a production phase and a production ending phase;
The determining the target authentication mode according to the hazard factor characteristics of the security authentication point comprises the following steps:
aiming at the hazard factors generated in the production preparation stage, determining the target authentication mode to be a corresponding operation procedure after the target authentication personnel authenticates;
Aiming at the hazard factors with the action characteristics of hard association characteristics or traceless characteristics, determining the target authentication mode to be the corresponding operation procedure of the whole-course continuous monitoring of the target authentication personnel;
aiming at the hazard factors with the action characteristics being soft correlation characteristics or trace characteristics, the target authentication mode is determined to be that the target authentication personnel does not need to monitor the corresponding operation procedure.
10. Target type safety certification device based on risk pre-control, which is characterized by comprising:
the dividing module is used for dividing the operation tasks to obtain a plurality of operation procedures;
the first determining module is used for analyzing the operation procedures by adopting a Bayesian network and determining the risk probability and the sensitivity value of each operation procedure;
the second determining module is used for determining a security authentication point from the operation procedure according to the risk probability and the sensitivity value, wherein the risk probability of the security authentication point is greater than a first risk threshold value and/or the sensitivity value is greater than a first sensitivity threshold value;
And the third determining module is used for determining a target authentication scheme according to the security authentication point, wherein the target authentication scheme comprises a target authentication person, a target authentication mode and target authentication equipment.
11. Target type safety certification device based on risk pre-control, which is characterized by comprising:
a memory having a computer program stored thereon;
a processor for executing the computer program in the memory to implement the steps of the risk pre-control based targeted security authentication method of any one of claims 1-9.
12. A security authentication information system, comprising:
A security authentication unit comprising a risk pre-control based targeted security authentication device as claimed in claim 10 or claim 11;
the checking and permitting unit is used for establishing pre-operation checking content and standard and inputting approval comments of approval personnel;
The operation monitoring unit is used for acquiring an operation checking result before the operation starts and related information of operation process authentication;
The plan observation unit is used for establishing an observation plan so as to evaluate the security authentication effect;
The data processing unit is used for adjusting the security authentication scheme according to the acquired operation process related information;
The personnel checking unit is used for realizing the study training of the certification personnel;
and the personnel management unit is used for constructing the work file of each supervision personnel.
CN202410430172.6A 2024-04-10 2024-04-10 Targeted security authentication method, device and system based on risk pre-control Pending CN118037064A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410430172.6A CN118037064A (en) 2024-04-10 2024-04-10 Targeted security authentication method, device and system based on risk pre-control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410430172.6A CN118037064A (en) 2024-04-10 2024-04-10 Targeted security authentication method, device and system based on risk pre-control

Publications (1)

Publication Number Publication Date
CN118037064A true CN118037064A (en) 2024-05-14

Family

ID=90989734

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410430172.6A Pending CN118037064A (en) 2024-04-10 2024-04-10 Targeted security authentication method, device and system based on risk pre-control

Country Status (1)

Country Link
CN (1) CN118037064A (en)

Similar Documents

Publication Publication Date Title
CN107885170B (en) Safety production control device, system and method
CN108510248B (en) Construction project environment approval system capable of achieving comprehensive monitoring
CN107798479B (en) Knowledge management system based on full life cycle integrated knowledge experience information
CN111199349A (en) Fire insurance business method and system based on intelligent fire safety assessment
CN110652684A (en) Electric fire safety integrated management system
CN113554318A (en) Three-dimensional visual risk intelligent management and control integrated system and method for chemical industry park
KR102421223B1 (en) Method and System for preventing serious accident in idustrial site
CN106230780A (en) A kind of intelligent transformer substation information and control system safety analysis Evaluation Platform
JP2007042014A (en) System and method for monitoring plant condition
CN112819374A (en) System and method for risk management of railway bridge constructors
CN105184519A (en) Standardized safety operation tracing management system
KR20220071880A (en) Digital twin disaster management system customized for underground public areas
KR102238764B1 (en) Real-time accident prediction system using hazard assessment and method thereof
CN110929985A (en) Hierarchical fire fighting management method and system
CN118037064A (en) Targeted security authentication method, device and system based on risk pre-control
Le Blanc et al. Characterizing cyber tools for monitoring power grid systems: What information is available and who needs it?
CN115412460A (en) Intelligent terminal based on electric wire netting big data acquisition
JP2006252226A (en) Power plant construction and work support system and method thereof
CN105116821B (en) A kind of petrochemical equipment commissioning run test safety custody platform and application method
RU2709155C1 (en) Safety assessment system for hazardous production facility
CN113487840A (en) Gas management and monitoring early warning system
Fang et al. Design and Development of Industrial Safety APPs
CN116739870B (en) Emergency system management system and method
CN117977813B (en) Remote intelligent inspection system for transformer substation
KR102655252B1 (en) HSE management system and method for systemic operating and managing wind farms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination