CN111612290B - Security scheme generation method and device, computer equipment and storage medium - Google Patents

Security scheme generation method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN111612290B
CN111612290B CN202010245118.6A CN202010245118A CN111612290B CN 111612290 B CN111612290 B CN 111612290B CN 202010245118 A CN202010245118 A CN 202010245118A CN 111612290 B CN111612290 B CN 111612290B
Authority
CN
China
Prior art keywords
target
activity
risk
historical
risk degree
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010245118.6A
Other languages
Chinese (zh)
Other versions
CN111612290A (en
Inventor
马量
丁雪玲
傅东生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Miracle Intelligent Network Co Ltd
Original Assignee
Shenzhen Miracle Intelligent Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Miracle Intelligent Network Co Ltd filed Critical Shenzhen Miracle Intelligent Network Co Ltd
Priority to CN202010245118.6A priority Critical patent/CN111612290B/en
Publication of CN111612290A publication Critical patent/CN111612290A/en
Application granted granted Critical
Publication of CN111612290B publication Critical patent/CN111612290B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to a security scheme generation method and device, computer equipment and a storage medium. The method comprises the following steps: acquiring a target activity category corresponding to a target activity; determining a target risk index corresponding to the target activity according to the target activity category; acquiring historical activity data corresponding to target historical activities according to the target risk indexes, and acquiring target influence factors corresponding to the target activities according to the target risk indexes, wherein the activity type of the target historical activities is a target activity type; determining a first risk degree corresponding to the target risk index according to the historical activity data, and determining a second risk degree corresponding to the target risk index according to the target influence factor; obtaining a target risk degree corresponding to the target risk index according to the first risk degree and the second risk degree; and generating a target security scheme corresponding to the target activity according to the target risk degree. By adopting the method, the generation efficiency of the security scheme can be improved.

Description

Security scheme generation method and device, computer equipment and storage medium
Technical Field
The application relates to the technical field of security protection, in particular to a security scheme generation method and device, computer equipment and a storage medium.
Background
With the rapid advancement of economic globalization and the continuous deepening of the reform of the supply side of China, the exhibition economy becomes a new economic form in the modern three-product service industry system and becomes a new growth point of the economic development of China. In recent years, various kinds of large-scale exhibitions have been increasing, and the scale has been gradually increasing.
However, due to the large flow of people and vehicles at a large exhibitions, abnormal events often occur, thereby preventing the activities from being performed normally. Therefore, a security scheme needs to be specified to maintain the exhibition order.
At present, when a security scheme is specified, the security scheme is often manually specified, so that the generation efficiency of the security scheme is low.
Disclosure of Invention
In view of the above, it is necessary to provide a security scheme generation method, an apparatus, a computer device, and a storage medium, which can improve the security scheme generation efficiency, in order to solve the technical problem of low security scheme generation efficiency.
A method of generating a security scheme, the method comprising: acquiring a target activity category corresponding to the target activity; determining a target risk index corresponding to the target activity according to the target activity category; acquiring historical activity data corresponding to target historical activities according to the target risk indicators, and acquiring target influence factors corresponding to the target activities according to the target risk indicators, wherein the activity type of the target historical activities is the target activity type; determining a first risk degree corresponding to the target risk index according to the historical activity data, and determining a second risk degree corresponding to the target risk index according to the target influence factor; obtaining a target risk degree corresponding to the target risk index according to the first risk degree and the second risk degree; and generating a target security scheme corresponding to the target activity according to the target risk degree.
In some embodiments, the obtaining historical activity data corresponding to the target historical activity according to the target risk indicator includes: acquiring a target activity area corresponding to the target activity; acquiring historical activities corresponding to the target activity type from the candidate historical activities corresponding to the target activity area to serve as target historical activities; and acquiring historical activity data corresponding to the target historical activity.
In some embodiments, the target risk indicator includes a crowd risk indicator, the historical activity data includes the historical traffic, and determining the first risk degree corresponding to the target risk indicator according to the historical activity data includes: acquiring the size of an activity space corresponding to the target activity area; determining a first risk degree corresponding to the crowd risk index according to the historical pedestrian volume and the size of the activity space, wherein the first risk degree is in positive correlation with the historical pedestrian volume, and the first risk degree is in negative correlation with the size of the activity space.
In some embodiments, the obtaining of the target influence factor corresponding to the target activity according to the target risk indicator includes: acquiring an activity occurrence time period corresponding to the target activity; acquiring weather information corresponding to the activity occurrence time period; the determining a second risk degree corresponding to the target risk indicator according to the target influence factor includes: and acquiring the risk degree corresponding to the weather information according to the corresponding relation between the weather and the risk degree, and acquiring a second risk degree corresponding to the target risk index according to the risk degree corresponding to the weather information.
In some embodiments, the generating, according to the target risk degree, a target security scheme corresponding to the target activity includes: acquiring the personnel planning number corresponding to a target sub-activity area according to the target risk degree, wherein the target sub-activity area is obtained by dividing the target activity area corresponding to the target activity; selecting the security personnel with the personnel planning number from the candidate security personnel set as target security personnel corresponding to the target sub-activity area; and generating a target security scheme corresponding to the target activity according to the target sub-activity area and the corresponding target security personnel.
In some embodiments, the method further comprises: acquiring a related sub-activity area corresponding to the target sub-activity area; setting the access authority of the target security personnel to the target sub-activity area and the associated sub-activity area to be in an open state; and sending security task information to a terminal corresponding to the target security personnel, wherein the security task information comprises the area identification of the sub-activity area and the corresponding authority configuration information.
A security scheme generation apparatus, the apparatus comprising: the target activity category acquisition module is used for acquiring a target activity category corresponding to the target activity; a target risk indicator obtaining module, configured to determine a target risk indicator corresponding to the target activity according to the target activity category; a target influence factor obtaining module, configured to obtain historical activity data corresponding to a target historical activity according to the target risk indicator, and obtain a target influence factor corresponding to the target activity according to the target risk indicator, where an activity category of the target historical activity is the target activity category; a risk degree determining module, configured to determine a first risk degree corresponding to the target risk indicator according to the historical activity data, and determine a second risk degree corresponding to the target risk indicator according to the target influence factor; a target risk degree obtaining module, configured to obtain a target risk degree corresponding to the target risk index according to the first risk degree and the second risk degree; and the target security scheme generation module is used for generating a target security scheme corresponding to the target activity according to the target risk degree.
In some embodiments, the target influence factor obtaining module comprises: a target activity area unit, configured to acquire a target activity area corresponding to the target activity; acquiring historical activities corresponding to the target activity type from the candidate historical activities corresponding to the target activity area to serve as target historical activities; and acquiring historical activity data corresponding to the target historical activity.
A computer device comprises a memory and a processor, wherein the memory stores a computer program, and the processor implements the steps of the security scheme generation method when executing the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned security scheme generation method.
The method, the device, the computer equipment and the storage medium for generating the security scheme obtain a target activity category corresponding to a target activity, determine a target risk index corresponding to the target activity according to the target activity category, obtain historical activity data corresponding to a target historical activity according to the target risk index, obtain a target influence factor corresponding to the target activity according to the target risk index, wherein the activity category of the target historical activity is the target activity category, determine a first risk degree corresponding to the target risk index according to the historical activity data, determine a second risk degree corresponding to the target risk index according to the target influence factor, obtain a target risk degree corresponding to the target risk index according to the first risk degree and the second risk degree, and generate the target security scheme corresponding to the target activity according to the target risk degree. Therefore, the automatic generation of the security scheme is realized, and the generation efficiency of the security scheme is improved. In addition, in the security scheme generation method, the activity category, the historical activity data and the target influence factor are combined to jointly determine the target risk degree, so that the accuracy of the target risk degree is improved, and the accuracy of the security scheme is improved.
Drawings
FIG. 1 is a diagram of an application environment for a method for generating a security scheme in some embodiments;
FIG. 2 is a schematic flow diagram of a security scheme generation method in some embodiments;
FIG. 3A is a schematic diagram of risk assessment in some embodiments;
FIG. 3B is a schematic diagram of an indicator risk level display interface in some embodiments;
FIG. 3C is a diagram illustrating a human deployment manifest, an equipment state manifest, and an access permission manifest, in accordance with certain embodiments;
FIG. 3D is a schematic flow diagram of a security scheme generation method in some embodiments;
FIG. 4 is a schematic flow chart of the first risk level obtaining step in some embodiments;
FIG. 5 is a schematic flow chart of a second risk level obtaining step in some embodiments;
FIG. 6 is a schematic flow chart diagram of a method for generating a security scheme in some embodiments;
FIG. 7A is a schematic flow chart diagram of a method for generating a security scheme in some embodiments;
FIG. 7B is a diagram illustrating deployment information and permission information for security personnel in some embodiments;
FIG. 8 is a block diagram of a security scheme generation apparatus in some embodiments;
FIG. 9 is a diagram of the internal structure of a computer device in some embodiments.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application.
The security scheme generation method provided by the application can be applied to the application environment shown in fig. 1. The application environment includes a terminal 102 and a server 104, wherein the terminal 102 communicates with the server 104 via a network.
Specifically, the server may obtain a target activity category corresponding to the target activity, where the target activity may be an exhibition, and the activity category may be a consumption category. The server may determine a target risk indicator corresponding to the target activity according to the target activity category, where the target risk indicator refers to an indicator that may have a risk, such as a crowd risk indicator. The server may obtain historical activity data corresponding to a target historical activity according to the target risk indicator, where the target historical activity refers to a historical activity that has already occurred, a place where the target historical activity and the target activity occur may be the same, and an activity category of the target historical activity may be a target activity category. Historical activity data is for example human traffic etc. The server may obtain a target influence factor corresponding to the target activity according to the target risk indicator, where the target influence factor is, for example, weather. The server can determine a first risk degree corresponding to the target risk index according to the historical activity data, determine a second risk degree corresponding to the target risk index according to the target influence factor, obtain the target risk degree corresponding to the target risk index according to the first risk degree and the second risk degree, and generate a target security scheme corresponding to the target activity according to the target risk degree. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 104 may be implemented by an independent server or a server cluster formed by a plurality of servers.
It can be understood that the foregoing application scenario is only an example, and does not constitute a limitation to the method provided in the embodiment of the present application, and the method provided in the embodiment of the present application may also be applied in other scenarios, for example, the terminal 102 may execute the method provided in the embodiment of the present application.
In some embodiments, as shown in fig. 2, a security scheme generation method is provided, which is described by taking the method as an example applied to the server 104 in fig. 1, and includes the following steps:
s202, acquiring a target activity type corresponding to the target activity.
Specifically, an activity is an event commonly attended by a plurality of persons for a specific purpose, and a target activity is an object to be subjected to risk assessment and security scheme establishment. The target activity may be an exhibition, such as a Baobo meeting. The activity category is set as needed, and may be determined according to at least one of the purpose of the activity or the category of the item in the activity, for example. May include at least one of a consumer category, a furniture category, a machinery category, or a chemical category. The target activity category refers to an activity category to which the target activity belongs.
In some embodiments, the target activity category for a target activity may include multiple activity categories, for example, a Baobo club has both a consumption category and a mechanical category.
And S204, determining a target risk index corresponding to the target activity according to the target activity type.
Specifically, the activity category corresponds to a risk indicator. The correspondence between the activity category and the risk indicator may be set in advance. For example, the risk indicators corresponding to the furniture categories may include at least one of fire protection, freight transportation, traffic congestion, or crowd congestion; the mechanical risk indicator may be included in at least one of a freight vehicle or crowd congestion; and distributing the chemical risk to at least one of dangerous chemical hazards or freight vehicles.
In some embodiments, when the target activity category includes an activity category, the risk indicator corresponding to the included activity category is taken as the target risk indicator corresponding to the target activity. When the target activity category includes more than one activity category, risk index sets corresponding to the included activity categories may be acquired, and a union of the risk index sets is calculated as a target risk index. For example, the risk indicators of the Baobo meeting are obtained from the risk indicators of the consumption category and the risk indicators of the machinery category, and may include at least one of crowd crowding, fire fighting, spectator vehicles, freight vehicles, valuables, hazardous chemical poisoning, exhibitions of insects, current and voltage, dangerous construction, or theft.
And S206, acquiring historical activity data corresponding to the target historical activity according to the target risk indicator, and acquiring target influence factors corresponding to the target activity according to the target risk indicator, wherein the activity type of the target historical activity is a target activity type.
In particular, a target historical activity refers to an activity that has already occurred, and the target historical activity may be the same as where the target activity occurred. Historical activity data refers to data related to a target historical activity, such as people flow information in the target historical activity. A target impact factor refers to a factor that impacts the risk level of a target risk indicator. For example, the risk level of the risk indicator of crowd congestion is affected by weather, and therefore, weather can be used as an influence factor of crowd congestion. The target influencing factors may further include at least one of operation information of a venue hosting the target event, audience information, exhibitor information, or exhibit information participating in the target event. The activity category of the target historical activity is the target activity category, which means that the activity category of the target historical activity is the same as the activity category of the target activity, for example, both the target historical activity and the target activity are only consumption categories.
As shown in fig. 3A, historical activity data, influence factors and risk assessment results considered when risk assessment is performed on the bao-bo meeting are shown, in the figure, "the flow of people in the last year: 8 ten thousand people' belong to historical activity data, and weather, venue audiences, exhibitors and exhibits belong to influence factors. As can be seen from the figure, when the weather is clear, the risk of the population increases; when the operation is carried out for the first time, the risk of the crowd is increased and the probability of the occurrence of the spread insects is increased; when local residents of audiences or driving is mainly carried out, the parking risk is increased; when the number of industrial enterprises in the exhibitor is large, the risk that the waiting area and the loading area are full is increased; when individual enterprises in the exhibit involve chemical man-hours, the danger of chemical hazard is increased. The closer the boundary between the area a and the area B is, the greater the risk degree is, and thus it can be seen that the degree of risk of crowding is the greatest.
And S208, determining a first risk degree corresponding to the target risk index according to the historical activity data, and determining a second risk degree corresponding to the target risk index according to the target influence factor.
In particular, the historical activity data and the first risk level may have at least one of a positive correlation or a negative correlation. The target influencing factor and the second risk level may have at least one of a positive correlation or a negative correlation.
In some embodiments, the first risk degree corresponding to the target risk indicator may be determined according to the size of the target activity area and the historical activity data. For example, the first risk degree corresponding to the crowd risk indicator may be determined by combining the size of the target activity area and the traffic information of the historical activity, and the first risk degree corresponding to the vehicle risk indicator may be determined by combining the size of the target activity area and the traffic information of the historical activity. Wherein the target activity area may be negatively correlated with the first risk level.
In some embodiments, the correspondence between the target influence factor and the second risk degree may be set in advance. The set second risk degree may be different when the same influencing factor corresponds to different risk indicators. For example, when the influencing factor is rainy weather and the target risk index is a vehicle risk index, the second risk degree may be set as a primary risk degree; when the influencing factor is rainy weather and the target risk index is winged insect, the second risk degree can be set as a secondary risk degree. Wherein the primary risk level is greater than the secondary risk level.
And S210, obtaining a target risk degree corresponding to the target risk index according to the first risk degree and the second risk degree.
Specifically, a statistical value of the first risk degree and the second risk degree may be calculated as a target risk degree corresponding to the target risk index. For example, an average of the first risk level and the second risk level is calculated as the target risk level.
In some embodiments, a first weight may be set for the first risk degree in advance, a second weight may be set for the second risk degree, and the first risk degree and the second risk degree may be weighted and summed according to the first weight and the second weight to obtain the target risk degree.
In some embodiments, the server may send the index and the corresponding risk degree to the terminal, and the terminal displays the index and the corresponding risk degree through the interface. The terminal can express different risk degrees in a user-defined mode, as shown in fig. 3B, the terminal is an index risk degree display interface, the crowded color of the crowd in the figure is gray, other indexes are white, and when the gray indicates that the risk degree is large, the risk degree of the crowd can be judged to be large.
And S212, generating a target security scheme corresponding to the target activity according to the target risk degree.
Specifically, the server can determine the number of security personnel allocated to each location in the target activity area according to the target risk degree, set different permissions for the security personnel according to the permissions of different locations, and generate a target security scheme corresponding to the target activity according to the number of the security personnel at each location and the permissions of the security personnel.
In some embodiments, the human deployment information, the device state information, and the access authority information may be determined according to the target risk level to obtain a human deployment list, a device state list, and an access authority list, and the target security scheme may be obtained according to the human deployment list, the device state list, and the access authority list. As shown in fig. 3C, various listings are presented, wherein the manpower deployment listing includes an area (gate 1) and a number of deployment personnel (3 people); the equipment state list comprises equipment types, equipment names, online states and channel numbers; the entrance and exit permission list comprises areas, gates, states and permissions, wherein the permissions refer to the identities of persons who can enter the areas, such as visitors or workers in the figure.
According to the method for generating the security scheme, a target activity type corresponding to a target activity is obtained, a target risk index corresponding to the target activity is determined according to the target activity type, historical activity data corresponding to target historical activities are obtained according to the target risk index, a target influence factor corresponding to the target activity is obtained according to the target risk index, the activity type of the target historical activities is the target activity type, a first risk degree corresponding to the target risk index is determined according to the historical activity data, a second risk degree corresponding to the target risk index is determined according to the target influence factor, the target risk degree corresponding to the target risk index is obtained according to the first risk degree and the second risk degree, and the target security scheme corresponding to the target activity is generated according to the target risk degree. Therefore, the automatic generation of the security scheme is realized, and the generation efficiency of the security scheme is improved. In addition, in the security scheme generation method, the activity category, the historical activity data and the target influence factor are combined to jointly determine the target risk degree, so that the accuracy of the target risk degree is improved, and the accuracy of the security scheme is improved.
The security measures of the existing exhibitions or exhibitions are usually customized manually, the accuracy is low, the risk is not accurately mastered, and the execution and the management and control are inconvenient, so that the safety of the exhibitions or the exhibitions is low. The security scheme obtained by the security scheme generation method provided by the application is high in accuracy, and the safety of the exhibitions or exhibitions is improved.
In some embodiments, as shown in fig. 3D, the obtaining of historical activity data corresponding to the target historical activity according to the target risk indicator in step S206 includes:
s302, acquiring a target activity area corresponding to the target activity.
In particular, the target activity region can refer to the place where the target activity occurs, e.g., "Shenzhen abc Hotel".
S304, acquiring the historical activities corresponding to the target activity type from the candidate historical activities corresponding to the target activity area as the target historical activities.
Specifically, the candidate historical activities may be plural. Candidate historical activities refer to activities that have occurred and occurred with respect to the target activity region, such as "individual exhibitions that were launched one year in Shenzhen City abc Hotel". The activity category of each historical activity occurring in the target activity area may be various, and the historical activity having the same activity category as that of the target activity may be obtained from each candidate historical activity as the target historical activity. The target historical activity may be multiple.
S306, obtaining historical activity data corresponding to the target historical activity.
In the above embodiment, the target activity area corresponding to the target activity is obtained, and the historical activity corresponding to the target activity category is obtained from the candidate historical activities corresponding to the target activity area and is used as the target historical activity, so that the target historical activity with a higher similarity to the target activity is obtained.
In some embodiments, as shown in fig. 4, the target risk indicator includes a crowd risk indicator, the historical activity data includes historical pedestrian volume, and the determining the first risk degree corresponding to the target risk indicator according to the historical activity data in step S208 includes:
s402, obtaining the size of the activity space corresponding to the target activity area.
Specifically, the historical traffic may be a total number of people or a total number of people, for example, 8 ten thousand people, participating in the target historical activity. The activity space size may include at least one of an area, a length, a width, a diameter, or a radius of the target activity region.
S404, determining a first risk degree corresponding to the crowd risk index according to the historical pedestrian volume and the size of the activity space, wherein the first risk degree and the historical pedestrian volume are in a positive correlation relationship, and the first risk degree and the size of the activity space are in a negative correlation relationship.
Specifically, the larger the historical pedestrian volume is, the higher the probability of crowd congestion is, and the larger the risk degree corresponding to the crowd risk index is, that is, the larger the first risk degree is. The larger the activity space is, the lower the possibility of crowd congestion is, and the smaller the risk degree corresponding to the crowd risk index is, i.e. the smaller the first risk degree is.
In the above embodiment, the first risk degree corresponding to the crowd risk index is determined according to the historical visitor flow and the size of the activity space, rather than considering only one of the historical visitor flow and the size of the activity space, so that the accuracy of the first risk degree is improved.
In some embodiments, as shown in fig. 5, the obtaining of the target influence factor corresponding to the target activity according to the target risk indicator in step S206 includes:
and S502, acquiring an activity occurrence time period corresponding to the target activity.
Specifically, the event occurrence time period refers to the time when the event is held, for example, the event occurrence time period may be a period of time between the time when the target event starts and the time when the target event ends.
And S504, acquiring weather information corresponding to the activity occurrence time period.
Specifically, the weather information may include at least one of temperature, presence of rain, or sunny weather.
The determining the second risk degree corresponding to the target risk indicator according to the target influence factor in step S208 includes:
s506, acquiring the risk degree corresponding to the weather information according to the corresponding relation between the weather and the risk degree, and obtaining a second risk degree corresponding to the target risk index according to the risk degree corresponding to the weather information.
Specifically, the correspondence between the weather and the risk level includes at least one of positive correlation or negative correlation between the weather and the risk level. The corresponding relation between the weather and the risk degree can comprise at least one of the relation between the weather information and the risk degree of the crowd, the relation between the weather information and the risk degree of the fire fighting and the like. The relationship between the weather information and the degree of risk of the crowd is, for example, that the degree of risk of the crowd increases when the weather is clear. The relation between the weather information and the degree of fire risk is, for example, that the degree of fire risk increases when the weather is dry.
In some embodiments, the target influence factor corresponding to the target risk indicator includes weather information, and therefore, the second risk degree corresponding to the target risk indicator may be determined according to the risk degree corresponding to the weather information.
In the above embodiment, the second risk degree corresponding to the target risk indicator is obtained according to the weather information corresponding to the activity occurrence time period, and because the influence degree of the weather information on the risk indicator is relatively prominent, for example, rainy or snowy weather affects people and traffic, the accuracy of the second risk degree obtained by using the weather information is high.
In some embodiments, as shown in fig. 6, the step S212 of generating the target security scheme corresponding to the target activity according to the target risk level includes:
and S602, acquiring the personnel planning number corresponding to the target sub-activity area according to the target risk degree, wherein the target sub-activity area is obtained by dividing the target activity area corresponding to the target activity.
Specifically, the target activity area may be divided into a plurality of target sub-activity areas, and the target sub-activity area may be a part of the target activity area, and the target sub-activity area is, for example, gate No. 1. The planned number of people is, for example, 20 people. The server may determine the number of staff plans corresponding to the target sub-activity area according to the target risk degree, and the number of staff plans and the target risk degree may be in a positive relationship, that is, the larger the target risk degree is, the larger the number of staff plans is.
S604, selecting the security personnel with the personnel planning number from the candidate security personnel set as the target security personnel corresponding to the target sub-activity area.
Specifically, the candidate security personnel set may be preset, and the candidate security personnel in the candidate security personnel set may include security personnel available for the target activity area. The server can select the security personnel with the personnel planning number from the candidate security personnel set, and the selected security personnel are used as the target security personnel of the target sub-activity area.
And S606, generating a target security scheme corresponding to the target activity according to the target sub-activity area and the corresponding target security personnel.
Specifically, the server may obtain the human deployment information according to the target sub-activity area and the target security personnel, and obtain the target security scheme according to the human deployment information.
In the above embodiment, the staff planning number corresponding to the target sub-activity area is obtained according to the target risk degree, the target security scheme corresponding to the target activity is generated according to the target sub-activity area and the corresponding target security staff, the risk degree is fully considered when the security scheme is customized, and the accuracy of the security scheme is improved.
In some embodiments, as shown in fig. 7A, the method further comprises:
s702, acquiring the associated sub-activity area corresponding to the target sub-activity area.
In particular, the sub-activity areas may be associated with each other or not, and the two associated sub-activity areas may be adjacent in geographic location or may be functionally identical or similar.
S704, the access authority of the target security personnel to the target sub-activity area and the associated sub-activity area is set to be in an open state.
Specifically, the access right state may include a prohibited state and an open state, in the prohibited state, the security personnel does not have the right to enter the sub-activity area, and in the open state, the security personnel may enter the sub-activity area.
S706, security task information is sent to a terminal corresponding to the target security personnel, and the security task information comprises the area identification of the sub-activity area and the corresponding authority configuration information.
Specifically, the area identification is used to uniquely identify one sub-activity area. The area identifier may be defined as needed, for example, the target activity area may be divided into 3 sub-activity areas, and the area identifiers are defined as A1, A2, and A3, respectively. The authority configuration information may include a state of access authority, for example, the state of access authority to the A1 area is an open state.
In some embodiments, the server may provide a corresponding client or a web page, and the terminal corresponding to the security personnel may access the client or the web page provided by the server to view detailed information of the security scheme, such as the deployment of the personnel and the personnel permission condition. As shown in fig. 7B, the deployment information and the authority information of the security personnel are presented.
In the above embodiment, the access permissions of the target security personnel on the target sub-activity areas and the associated sub-activity areas are set to be in the open state, and the security task information is sent to the terminal corresponding to the target security personnel, so that the security personnel can quickly obtain the security task information. Therefore, corresponding automatic deployment and authority opening processing is automatically carried out according to the deployment list and the authority list in the security scheme, and security management personnel do not need to carry out manual deployment and authority opening processing according to the deployment list and the authority list in the security scheme, so that the deployment efficiency is improved, and the execution efficiency of the security scheme is improved.
In some embodiments, the neural network model may be trained through activity data corresponding to activities before the historical activities are held, activity categories of the historical activities, and exhibitions of the historical activities, so as to obtain the risk assessment model. When the risk assessment or risk prediction needs to be performed on the event to be held, the category of the event to be held, the historical event data and the participation influence factor can be input into the risk assessment, the risk pre-judgment result corresponding to each risk index of the event is obtained, and the security scheme is formulated according to the risk pre-judgment result corresponding to each risk index.
It should be understood that, although the steps in the flowcharts of the above embodiments are shown in sequence as indicated by the arrows, the steps are not necessarily executed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a part of the steps in the flowcharts of the above embodiments may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least a part of the steps or stages in other steps.
In some embodiments, as shown in fig. 8, there is provided a security scheme generation apparatus, including: a target activity category obtaining module 802, a target risk index obtaining module 804, a target influence factor obtaining module 806, a risk degree determining module 808, a target risk degree obtaining module 810, and a target security scheme generating module 812, where:
a target activity category obtaining module 802, configured to obtain a target activity category corresponding to the target activity.
And a target risk indicator obtaining module 804, configured to determine a target risk indicator corresponding to the target activity according to the target activity category.
And a target influence factor obtaining module 806, configured to obtain historical activity data corresponding to the target historical activity according to the target risk indicator, and obtain a target influence factor corresponding to the target activity according to the target risk indicator, where an activity category of the target historical activity is a target activity category.
The risk degree determining module 808 is configured to determine a first risk degree corresponding to the target risk indicator according to the historical activity data, and determine a second risk degree corresponding to the target risk indicator according to the target influence factor.
And a target risk degree obtaining module 810, configured to obtain a target risk degree corresponding to the target risk indicator according to the first risk degree and the second risk degree.
And a target security scheme generating module 812, configured to generate a target security scheme corresponding to the target activity according to the target risk degree.
In some embodiments, the target influence factor acquisition module 806 includes:
and the target activity area acquisition unit is used for acquiring a target activity area corresponding to the target activity.
And the target historical activity acquisition unit is used for acquiring the historical activity corresponding to the target activity type from the candidate historical activities corresponding to the target activity area as the target historical activity.
And the historical activity data acquisition unit is used for acquiring historical activity data corresponding to the target historical activity.
In some embodiments, the target risk indicator comprises a crowd risk indicator, the historical activity data comprises historical traffic, and the risk level determination module 808 comprises:
and the activity space size acquisition unit is used for acquiring the activity space size corresponding to the target activity area.
The first risk degree obtaining unit is used for determining a first risk degree corresponding to the crowd risk index according to the historical pedestrian volume and the activity space size, wherein the first risk degree and the historical pedestrian volume form a positive correlation relationship, and the first risk degree and the activity space size form a negative correlation relationship.
In some embodiments, the target influence factor acquisition module 806 includes:
and the activity occurrence time period acquisition unit is used for acquiring the activity occurrence time period corresponding to the target activity.
And the weather information acquisition unit is used for acquiring the weather information corresponding to the activity occurrence time period.
The risk degree determining module 808 is further configured to obtain a risk degree corresponding to the weather information according to the corresponding relationship between the weather and the risk degree, and obtain a second risk degree corresponding to the target risk indicator according to the risk degree corresponding to the weather information.
In some embodiments, target security scheme generation module 812 includes:
and the personnel planning quantity obtaining unit is used for obtaining the personnel planning quantity corresponding to the target sub-activity area according to the target risk degree, and the target sub-activity area is obtained by dividing the target activity area corresponding to the target activity.
And the target security personnel selecting unit is used for selecting the security personnel with the personnel planning number from the candidate security personnel set as the target security personnel corresponding to the target sub-activity area.
And the target security scheme generating unit is used for generating a target security scheme corresponding to the target activity according to the target sub-activity area and the corresponding target security personnel.
In some embodiments, the apparatus further comprises:
and the associated sub-activity area acquisition module is used for acquiring the associated sub-activity area corresponding to the target sub-activity area.
And the access authority setting module is used for setting the access authority of the target security personnel to the target sub-activity area and the associated sub-activity area to be in an opening state.
And the security task information sending module is used for sending security task information to a terminal corresponding to the target security personnel, wherein the security task information comprises the area identification of the sub-activity area and the corresponding authority configuration information.
For specific limitations of the security scheme generation apparatus, reference may be made to the above limitations of the security scheme generation method, which is not described herein again. The modules in the security scheme generation apparatus may be wholly or partially implemented by software, hardware, or a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In some embodiments, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 9. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a security scheme generation method.
Those skilled in the art will appreciate that the architecture shown in fig. 9 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In some embodiments, a computer device is provided, comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of the security scheme generation method described above when executing the computer program.
In some embodiments, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, realizes the steps of the above-mentioned security scheme generation method.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, and these are all within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for generating a security scheme, the method comprising:
acquiring a target activity category corresponding to a target activity;
determining a target risk index corresponding to the target activity according to the target activity category;
acquiring historical activity data corresponding to target historical activities according to the target risk indicators, and acquiring target influence factors corresponding to the target activities according to the target risk indicators, wherein the activity type of the target historical activities is the target activity type;
determining a first risk degree corresponding to the target risk index according to the historical activity data, and determining a second risk degree corresponding to the target risk index according to the target influence factor;
obtaining a target risk degree corresponding to the target risk index according to the first risk degree and the second risk degree;
and generating a target security scheme corresponding to the target activity according to the target risk degree.
2. The method according to claim 1, wherein the obtaining historical activity data corresponding to the target historical activity according to the target risk indicator comprises:
acquiring a target activity area corresponding to the target activity;
acquiring historical activities corresponding to the target activity type from the candidate historical activities corresponding to the target activity area to serve as target historical activities;
and acquiring historical activity data corresponding to the target historical activity.
3. The method of claim 2, wherein the target risk indicator comprises a crowd risk indicator, wherein the historical activity data comprises historical traffic, and wherein determining the first risk level corresponding to the target risk indicator based on the historical activity data comprises:
acquiring the size of an activity space corresponding to the target activity area;
and determining a first risk degree corresponding to the crowd risk index according to the historical pedestrian volume and the size of the activity space, wherein the first risk degree is in a positive correlation with the historical pedestrian volume, and the first risk degree is in a negative correlation with the size of the activity space.
4. The method according to claim 1, wherein the obtaining the target influence factor corresponding to the target activity according to the target risk indicator comprises:
acquiring an activity occurrence time period corresponding to the target activity;
acquiring weather information corresponding to the activity occurrence time period;
the determining, according to the target influence factor, a second risk degree corresponding to the target risk indicator includes:
and acquiring the risk degree corresponding to the weather information according to the corresponding relation between the weather and the risk degree, and acquiring a second risk degree corresponding to the target risk index according to the risk degree corresponding to the weather information.
5. The method of claim 1, wherein generating the target security scheme corresponding to the target activity according to the target risk level comprises:
acquiring the personnel planning number corresponding to a target sub-activity area according to the target risk degree, wherein the target sub-activity area is obtained by dividing a target activity area corresponding to the target activity;
selecting the security personnel with the personnel planning number from the candidate security personnel set as target security personnel corresponding to the target sub-activity area;
and generating a target security scheme corresponding to the target activity according to the target sub-activity area and the corresponding target security personnel.
6. The method of claim 5, further comprising:
acquiring a related sub-activity area corresponding to the target sub-activity area;
setting the access authority of the target security personnel to the target sub-activity area and the associated sub-activity area to be in an open state;
and sending security task information to a terminal corresponding to the target security personnel, wherein the security task information comprises the area identification of the sub-activity area and the corresponding authority configuration information.
7. A security scheme generation apparatus, the apparatus comprising:
the target activity category acquisition module is used for acquiring a target activity category corresponding to the target activity;
the target risk index acquisition module is used for determining a target risk index corresponding to the target activity according to the target activity category;
a target influence factor obtaining module, configured to obtain historical activity data corresponding to a target historical activity according to the target risk indicator, and obtain a target influence factor corresponding to the target activity according to the target risk indicator, where an activity category of the target historical activity is the target activity category;
a risk degree determining module, configured to determine a first risk degree corresponding to the target risk indicator according to the historical activity data, and determine a second risk degree corresponding to the target risk indicator according to the target influence factor;
a target risk degree obtaining module, configured to obtain a target risk degree corresponding to the target risk indicator according to the first risk degree and the second risk degree;
and the target security scheme generation module is used for generating a target security scheme corresponding to the target activity according to the target risk degree.
8. The apparatus of claim 7, wherein the target influencing factor obtaining module comprises:
a target activity area unit, configured to obtain a target activity area corresponding to the target activity;
acquiring historical activities corresponding to the target activity type from the candidate historical activities corresponding to the target activity area to serve as target historical activities;
and acquiring historical activity data corresponding to the target historical activity.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 6.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN202010245118.6A 2020-03-31 2020-03-31 Security scheme generation method and device, computer equipment and storage medium Active CN111612290B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010245118.6A CN111612290B (en) 2020-03-31 2020-03-31 Security scheme generation method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010245118.6A CN111612290B (en) 2020-03-31 2020-03-31 Security scheme generation method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111612290A CN111612290A (en) 2020-09-01
CN111612290B true CN111612290B (en) 2023-04-07

Family

ID=72196000

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010245118.6A Active CN111612290B (en) 2020-03-31 2020-03-31 Security scheme generation method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111612290B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136392A (en) * 2011-11-29 2013-06-05 北京航天长峰科技工业集团有限公司 Design method of security running chart for large-scale sport events
CN103778493A (en) * 2012-10-25 2014-05-07 北京航天长峰科技工业集团有限公司 Large-scale activity security command system construction method
CN106910078A (en) * 2015-12-22 2017-06-30 阿里巴巴集团控股有限公司 Risk identification method and device
CN107239905A (en) * 2017-06-08 2017-10-10 中国民航大学 Onboard networks safety risk estimating method based on advanced AHP GCM
CN107818421A (en) * 2017-11-10 2018-03-20 国网天津市电力公司 Substation project security risk identification appraisal procedure based on QFD
CN109214274A (en) * 2018-07-19 2019-01-15 国政通科技有限公司 A kind of airport security management system
CN109359897A (en) * 2018-12-10 2019-02-19 西安邮电大学 A kind of Large Physical Games radio system Information Security Risk Assessment Methods
CN109886096A (en) * 2019-01-09 2019-06-14 武汉中联智诚科技有限公司 A kind of supervision of smart travel and safety emergency management interlinked command system
CN110009225A (en) * 2019-04-03 2019-07-12 平安科技(深圳)有限公司 Risk evaluating system construction method, device, computer equipment and storage medium
WO2020037942A1 (en) * 2018-08-20 2020-02-27 平安科技(深圳)有限公司 Risk prediction processing method and apparatus, computer device and medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136392A (en) * 2011-11-29 2013-06-05 北京航天长峰科技工业集团有限公司 Design method of security running chart for large-scale sport events
CN103778493A (en) * 2012-10-25 2014-05-07 北京航天长峰科技工业集团有限公司 Large-scale activity security command system construction method
CN106910078A (en) * 2015-12-22 2017-06-30 阿里巴巴集团控股有限公司 Risk identification method and device
CN107239905A (en) * 2017-06-08 2017-10-10 中国民航大学 Onboard networks safety risk estimating method based on advanced AHP GCM
CN107818421A (en) * 2017-11-10 2018-03-20 国网天津市电力公司 Substation project security risk identification appraisal procedure based on QFD
CN109214274A (en) * 2018-07-19 2019-01-15 国政通科技有限公司 A kind of airport security management system
WO2020037942A1 (en) * 2018-08-20 2020-02-27 平安科技(深圳)有限公司 Risk prediction processing method and apparatus, computer device and medium
CN109359897A (en) * 2018-12-10 2019-02-19 西安邮电大学 A kind of Large Physical Games radio system Information Security Risk Assessment Methods
CN109886096A (en) * 2019-01-09 2019-06-14 武汉中联智诚科技有限公司 A kind of supervision of smart travel and safety emergency management interlinked command system
CN110009225A (en) * 2019-04-03 2019-07-12 平安科技(深圳)有限公司 Risk evaluating system construction method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN111612290A (en) 2020-09-01

Similar Documents

Publication Publication Date Title
US11436510B1 (en) Event forecasting system
Camacho-Collados et al. A decision support system for predictive police patrolling
Camacho-Collados et al. A multi-criteria police districting problem for the efficient and effective design of patrol sector
Caplan et al. Risk terrain modeling: Brokering criminological theory and GIS methods for crime forecasting
Kennedy et al. Risk clusters, hotspots, and spatial intelligence: risk terrain modeling as an algorithm for police resource allocation strategies
Dong et al. Inferring unusual crowd events from mobile phone call detail records
US20110295624A1 (en) Insurance Policy Data Analysis and Decision Support System and Method
Forssberg et al. The variation of pre-movement time in building evacuation
CN111523762A (en) Exhibition data processing method and device, computer equipment and storage medium
CN111507571B (en) Emergency group scheduling method, device, computer equipment and storage medium
US11250362B2 (en) Machine learning based decentralized business planning system
CN111539862B (en) Emergency processing method and device based on individual dispatch and computer equipment
Hunter et al. Where should police forces target their residential burglary reduction efforts? Using official victimisation data to predict burglary incidences at the neighbourhood level
Baptista et al. A case study on the application of an approximated hypercube model to emergency medical systems management
CN111540194B (en) Vehicle monitoring data processing method and device, computer equipment and storage medium
CN111612290B (en) Security scheme generation method and device, computer equipment and storage medium
Li et al. Modeling a Risk‐Based Dynamic Bus Schedule Problem under No‐Notice Evacuation Incorporated with Dynamics of Disaster, Supply, and Demand Conditions
CN110598124A (en) Numerical value attribute mining method and device, computer equipment and storage medium
Venerandi et al. Guns of Brixton: which London neighborhoods host gang activity?
van Koppen et al. When to refrain from using likelihood surface methods for geographic offender profiling: An ex ante test of assumptions
Yang et al. Configuration, deployment, and scheduling models for management and optimization of patrol services
Karake Adoption of electronic policing services in crime control in Nairobi county
Tsai et al. Simulation optimization in security screening systems subject to budget and waiting time constraints
Krishnan et al. Robust ambulance allocation using risk-based metrics
Porter et al. Detecting local regions of change in high-dimensional criminal or terrorist point processes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant