CN112150098A - Electric power facility anti-terrorism security supervision method and system - Google Patents

Electric power facility anti-terrorism security supervision method and system Download PDF

Info

Publication number
CN112150098A
CN112150098A CN202010821162.7A CN202010821162A CN112150098A CN 112150098 A CN112150098 A CN 112150098A CN 202010821162 A CN202010821162 A CN 202010821162A CN 112150098 A CN112150098 A CN 112150098A
Authority
CN
China
Prior art keywords
client
task
supervision
flow
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010821162.7A
Other languages
Chinese (zh)
Inventor
肖安南
张蔚翔
朱宏
钟成元
刘武
操南圣
夏明�
焦玉平
赵德盛
崔泽宁
丁钧
阮海波
陈永祥
徐超峰
胡昌师
汪搏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Anhui Electric Power Co Ltd
Original Assignee
State Grid Anhui Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Anhui Electric Power Co Ltd filed Critical State Grid Anhui Electric Power Co Ltd
Priority to CN202010821162.7A priority Critical patent/CN112150098A/en
Publication of CN112150098A publication Critical patent/CN112150098A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Computational Linguistics (AREA)
  • Mathematical Physics (AREA)
  • Biophysics (AREA)
  • Biomedical Technology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Evolutionary Computation (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Human Computer Interaction (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method and a system for supervising electric power facility anti-terrorism security, which comprises the following steps: receiving a service starting request of a client, and providing a task scheme compiling interface for the client according to the service type; receiving task scheme data compiled by a client, and starting a BPM system to control the task flow execution according to a task form circulated by preset flow nodes and the client; and receiving data uploaded by the streaming node client when the task is executed, performing data processing analysis, and feeding back a data processing result to the BPM system for the BPM system to judge whether to continue node streaming according to a streaming rule. The workflow engine controls the circulation of the whole process of the supervision and inspection business and the rectification business, so that the links and functions of the electric power facilities for protecting respective responsibility are normalized and transparent, and the efficiency of the execution process of the anti-terrorism security work is improved.

Description

Electric power facility anti-terrorism security supervision method and system
Technical Field
The invention relates to the field of power facility management, in particular to a method and a system for monitoring anti-terrorism security of a power facility.
Background
At present, the protection, supervision and control of electric power facilities have the following problems, namely, along with the rapid development of social economy and urbanization construction, the scale of a power grid is rapidly increased year by year. The construction of high-speed rails, highways, urbanization and the like is rapid, the development and construction of various municipal roads, civil construction, urban greening and real estate are obviously increased, and large mechanical facilities for construction are more frequent and common. A large number of capital construction, house building, greening projects and power line channels with rapidly-increased scales are easy to form external broken hidden trouble points, the external broken hidden trouble control situation is severe, and the processing difficulty is increased. Secondly, in recent years, the public safety problem of electric power is obvious, and the poor management of waste electric power facilities influences the power supply safety and normal office order; the major events are social group events and major public opinion events.
In the protection, supervision and control work of the electric power facilities, according to the working requirements of the related laws and regulations, rule and system and the like of the existing electric power administrative law enforcement, the problems that three-barrier clearing law enforcement is difficult, the external damage of the electric power facilities is often prohibited, the coordination force among a few departments is insufficient and the like still exist at present, so that the auxiliary law enforcement work of the electric power administrative is not in place and cannot be effectively executed.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides an electric power facility anti-terrorism security supervision method which is applied to an electric power facility anti-terrorism security management platform comprising a BPM system and comprises the following steps:
receiving a service starting request of a client, and providing a task scheme compiling interface for the client according to a service class, wherein a flow modeling function of a BPM system is called when a subtask in the task scheme is a flow class;
receiving task scheme data compiled by a client, and starting a BPM system to control the task flow execution according to a task form circulated by preset flow nodes and the client;
and receiving data uploaded by the streaming node client when the task is executed, performing data processing analysis, and feeding back a data processing result to the BPM system for the BPM system to judge whether to continue node streaming according to a streaming rule.
As a further optimization of the above scheme, when the service class is the supervision inspection service, the method includes the following steps:
setting interfaces for each process node responding to supervision and inspection task execution to the inspection group client;
receiving process node setting data uploaded by a client, wherein the process node setting data comprises circulation time, a processor, processing time and a processing result;
responding a supervision check compilation interface for the circulation of each node of the supervision check task to the client;
receiving a compiled supervision and inspection sheet uploaded by a client, wherein the area to be filled in of the supervision and inspection sheet comprises a supervision main body, an inspection mode, a related line and inspection content and has main problems;
receiving a supervision and inspection task flow execution request of a client, starting a BPM system, analyzing flow node setting data and a flowing supervision and inspection list by the BPM system, and controlling the flow of the supervision and inspection list at each flow node;
receiving a filled supervision and inspection list and hidden danger point data uploaded by a process node client, analyzing and processing the uploaded data, and starting a supervision and inspection result auditing process of a BPM system;
and receiving an audit result uploaded by an audit node client in the audit process, and storing and warehousing the data of the audit result which passes the audit.
As a further optimization of the scheme, the method further comprises the step of including hidden danger point state data and processing time limit data when the hidden danger point data which passes the audit is put in storage, wherein the state data is to be processed when the hidden danger point data is put in storage.
As a further optimization of the above scheme, when the BPM system is started to execute the flow task, at least one of the information of the task to be handled, the node flow task form link address, and the form filling template address is pushed to the flow node.
As a further optimization of the above scheme, when the BPM system is started to execute the flow task, it is determined whether data specifying a next flow node exists in the form data uploaded by the flow node client, if not, the BPM system performs flow according to a preset default flow sequence, otherwise, the BPM system performs flow according to the specified next flow node.
As a further optimization of the above scheme, the analyzing the uploaded data includes analyzing the uploaded image hidden trouble point data, and the analyzing includes:
carrying out image preprocessing on the uploaded hidden danger point pictures and video data;
identifying the image and judging whether the image belongs to the hidden danger point image;
and if so, storing the hidden danger point image data, and entering an auditing process, otherwise, feeding back a judgment result to the node client for uploading the hidden danger point data without entering the auditing process.
As a further optimization of the above solution, the supervision and inspection service further includes:
(41) judging whether the states of the single-flow switching nodes are normally checked, if so, entering a step (42), and otherwise, not carrying out further processing;
(42) judging whether the states of the supervision and inspection nodes are normally finished, if so, entering a step (43), and otherwise, not performing further processing;
(43) starting a supervision and inspection result gathering and counting process of the BPM system;
(44) and receiving a supervision and inspection work report and the rectification item statistical form data uploaded by the client, and pushing the to-be-processed information of the rectification task to the corresponding client of the detected unit of the electric power facility according to the rectification item statistical data.
As a further optimization of the above scheme, when the service class is an adaptation service, the method includes the following steps:
receiving a rectification task starting request sent by a client of a detected unit, wherein the starting request comprises a supervision and inspection work report related to a rectification task and a rectification item statistical form identifier;
calling a flow modeling function of the BPM system, and responding to a rectification task work plan compilation interface to a client;
receiving a rectification task work plan uploaded by a client, and starting a rectification plan auditing process of a BPM system, wherein the rectification plan comprises rectification items and a process node client for executing the rectification tasks;
receiving an audit result uploaded by a client, calling a BPM (business process management) system to analyze an rectification plan for the rectification plan passing the audit, and controlling the rectification task to flow in each process node;
receiving an rectification and modification result uploaded by a client, and starting a rectification and modification result auditing process of a BPM system;
and receiving an examination result uploaded by the client, and changing the state of the corresponding hidden danger point in the database into processed state for the approved and modified result.
The invention also provides an electric power facility anti-terrorism security supervision system, which comprises:
the task scheme compiling module is used for receiving a service starting request of the client and providing a task scheme compiling interface function for the client according to the service class, wherein the task scheme calls a process modeling function of the BPM system when a subtask is in the process class;
the task flow execution module is used for receiving task scheme data compiled by the client and starting the BPM system to control the flow execution of the tasks according to a task form circulated by preset process nodes and the client;
and the task flow node data processing module is used for receiving data uploaded by the flow node client when executing the task, processing and analyzing the data, feeding back a data processing result to the BPM system, and judging whether to continue the node flow by the BPM system according to the flow rule.
As a further optimization of the scheme, the task scheme compiling module comprises a supervision and inspection task compiling unit and an adjusting and modifying service compiling unit.
The electric power facility anti-terrorism security supervision method and system have the following beneficial effects:
1. according to the electric power facility anti-terrorism security management method, the BPM system is called to control the circulation of the whole process of the supervision inspection service and the rectification service, so that the links and functions responsible for the protection of the electric power facility are normalized and transparent, the efficiency of the execution process of the anti-terrorism security work is improved, the responsibility tracing of the rectification problem of the supervision inspection of each process link is facilitated, and meanwhile, in the whole process, the organization units of the anti-terrorism security supervision inspection in provinces, cities and counties can check the current task circulation nodes in real time, the progress conditions of the supervision inspection service and the rectification service are determined, and the supervision management of the execution process of the anti-terrorism security work of the electric power facility is realized.
2. According to the electric power facility anti-terrorism security management method, the fifth process node is arranged in the inspection and supervision task process to collect and arrange all inspection results and potential hazard point data, a special supervision and inspection report and a supervision and inspection rectification notice sheet are compiled, the first process node in the rectification task process formulates a rectification plan scheme according to the rectification notice sheet, an electric power facility potential safety hazard processing linkage mechanism with inspection results as links is realized for inspected units and inspection groups, and closed-loop management from supervision and inspection to rectification of potential hazard problems of electric power facilities is realized.
Drawings
FIG. 1 is a block diagram of the overall flow of an electric power facility terrorist prevention supervision method according to the present invention;
FIG. 2 is a block diagram of a process of supervising and checking a service of the electric power facility anti-terrorism supervision method according to the present invention;
FIG. 3 is a block flow diagram of the analysis process for uploaded data of FIG. 2;
FIG. 4 is a block diagram of a method for entering a statistical flow of summary inspection results in the electrical facility terrorism prevention monitoring method of the present invention;
fig. 5 is a block diagram illustrating a flow of an rectification task in the electric power facility anti-terrorism supervision method according to the present invention.
Detailed Description
The technical solution of the present invention is further explained below with reference to the specific embodiments and the accompanying drawings.
In order to improve the working level of the security protection of the electric power facilities of the security and power-saving limited company and ensure the safe operation of important electric power facilities, according to the file requirements of the anti-terrorism law of the people's republic of China, the rules of public security and security in enterprise and public institution, the anti-terrorist prevention standard (trial implementation) of the electric power industry, the risk level of the public security of the electric power facilities and the safety protection requirements, and the like, the embodiment of the invention provides an electric power facility anti-terrorism security supervision method which is applied to an electric power facility anti-terrorism security management platform comprising a BPM system to realize the supervision and management of the execution process of the anti-terrorism security work of the electric power facilities, wherein the BPM system provides a complete business modeling and monitoring tool from the aspect of system functional architecture and comprises a flow model, a form model, a storage model, a report model and an authority model, and the code writing is not needed for realization, the method has the advantages that the visual zero-code business modeling platform can rapidly implement enterprise personalized process application in batches, and can rapidly adjust and deploy when business requirements change, so that the execution efficiency and effect of the business are guaranteed.
Specifically, the electric power facility anti-terrorism security supervision method provided by the embodiment of the invention comprises the following steps:
receiving a service starting request of a client, and providing a task scheme compiling interface for the client according to a service type, wherein when subtasks in the task scheme are in a flow type, such as a task execution flow, a task auditing flow, an execution result summarizing flow and the like, a flow modeling function of a BPM system is called to realize;
receiving task scheme data compiled by a client, and starting a BPM system to control the task flow execution according to a task form circulated by preset flow nodes and the client;
and receiving data uploaded by the streaming node client when the task is executed, performing data processing analysis, and feeding back a data processing result to the BPM system for the BPM system to judge whether to continue node streaming according to a streaming rule.
Specifically, when the service category is the supervision and inspection service, the supervision method for the execution process of the supervision and inspection service provided by the electric power facility anti-terrorism security management platform comprises the following steps:
setting interfaces for each process node responding to supervision and inspection task execution to the inspection group client;
receiving process node setting data uploaded by a client, wherein the process node setting data comprises circulation time, a processor, processing time and a processing result;
responding a supervision check compilation interface for the circulation of each node of the supervision check task to the client;
certainly, the flow node setting interface and the supervision, inspection and compilation interface call the flow modeling function of the BPM system, so as to realize the design of the task flow and the construction of the task form of the flow node;
receiving a compiled supervision and inspection sheet uploaded by a client, wherein the area to be filled in of the supervision and inspection sheet comprises a supervision main body, an inspection mode, a related line and inspection content and has main problems;
specifically, when the client compiles the form, the force facility anti-terrorism security management platform server provides a supervision examination order type selection form item for the client, and automatically lists corresponding examination order filling contents and comparison lists for the client to fill according to the selection of the client.
Receiving a request for executing the circulation of the supervision and inspection tasks of the client, namely starting to perform the inspection tasks of each power facility according to the compiled inspection list, starting the BPM system by the server, analyzing the flow node setting data and the circulated supervision and inspection list by the BPM system, acquiring the flow logic data in the flow node setting data and controlling the circulation of the supervision and inspection list at each flow node;
when the BPM system is started to execute the flow task, judging whether data of an appointed next flow transfer node exists in form data uploaded by a flow node client side, if not, the BPM system conducts flow according to a preset default flow sequence, otherwise, the BPM system conducts flow according to the appointed next flow transfer node.
The flow adjusting function is convenient for a user to adjust and change the flow according to the change of the actual service, so that the checking flow is more in line with the requirement of the actual work.
When the BPM system is started to execute the flow tasks, at least one of task information to be handled, node circulation task form link addresses and form filling template addresses is pushed to the flow nodes, and preset time limit data of each flow node processing task are provided.
And then, the client processes the tasks to be handled in time according to the information of the tasks to be handled pushed to the client, and uploads the result data of the executed tasks.
For the circulation of the supervision and inspection list, the server receives the filled supervision and inspection list and the hidden danger point data uploaded by the process node client, analyzes and processes the uploaded data, and then starts a supervision and inspection result auditing process of the BPM system;
in the step, the members of the inspection group supervise and inspect the 5 major items of the monitoring and inspection content of the anti-terrorism security monitoring and inspection responsibility and the management monitoring and inspection content according to the received monitoring and inspection list, and subdivide 25 minor items of major content to supervise and inspect. Reporting the problems and hidden troubles in each small item in time, and providing corresponding rectification opinions;
when the inspection group member uploads the inspection result and the hidden danger point data, the basic information of the hidden danger point is input, wherein the basic information comprises information such as position, belonging equipment or line information, description of the hidden danger point, the grade of the hidden danger point, a reporter, a reporting unit, reporting time and the like, and meanwhile hidden danger point evidence materials are uploaded in the modes such as photos, videos and the like;
the analyzing and processing of the uploaded data includes analyzing and processing the uploaded image hidden danger point data, and specifically includes:
carrying out image preprocessing on the uploaded hidden trouble point pictures and video data, such as denoising, enhancing, smoothing, sharpening, correcting and the like;
identifying the image and judging whether the image belongs to the hidden danger point image;
and if so, storing the hidden danger point image data, and entering an auditing process, otherwise, feeding back a judgment result to the node client for uploading the hidden danger point data without entering the auditing process.
The method for judging whether the images belong to the hidden danger points comprises the following steps: establishing a hidden danger point image feature database;
extracting the features of the uploaded hidden danger point images through a convolutional neural network;
calculating the distance between the extracted feature data and a corresponding feature data center in the hidden danger point image feature database;
and if the distance value is smaller than the preset threshold value, determining that the currently uploaded image is the hidden danger point image.
The established hidden danger point image feature database is dynamically updated: extracting the characteristics of all original hidden danger point image samples through a convolutional neural network, establishing a primary hidden danger point image characteristic database, and updating the characteristics of the newly added hidden danger point image into the characteristic database after judging and determining the uploaded hidden danger point image as a hidden danger point image each time.
Receiving an audit result uploaded by an audit node client in an audit process, and storing and warehousing the data of the audit result which passes the audit.
Through setting up the identification of many times to uploading data, examine and confirm, realize problem and hidden danger point information comprehensive, complete material to reporting in the inspection process to guarantee that the supervision inspection process of every turn is true effective. The standardization, comprehensiveness and strictness of the inspection group on the terrorism-proof security supervision and inspection work are realized.
Based on the circulation execution process of the supervision and inspection task, the supervision and inspection service further comprises the following steps:
(41) judging whether the states of the single-flow switching nodes are normally checked, if so, entering a step (42), and otherwise, not carrying out further processing;
(42) judging whether the states of the supervision and inspection nodes are normally finished, if so, entering a step (43), and otherwise, not performing further processing;
(43) starting a supervision and inspection result gathering and counting process of the BPM system;
(44) and receiving a supervision and inspection work report and the rectification item statistical form data uploaded by the client, and pushing the to-be-processed information of the rectification task to the corresponding client of the detected unit of the electric power facility according to the rectification item statistical data.
Through the statistic flow of the supervision and inspection result collection, on one hand, the completion of the inspection flow of the supervision and inspection work by the inspection group is realized, and on the other hand, the server management platform pushes various rectification problem lists to the inspected unit according to the supervision and inspection rectification notice sheet, and automatically carries out short message push prompt on the person responsible for the inspected unit, thereby realizing the closed loop of the anti-terrorism security supervision and inspection work-rectification work.
Specifically, when the service type is an adaptation service, the method includes the following steps:
receiving a rectification task starting request sent by a client of a detected unit, wherein the starting request comprises a supervision and inspection work report related to a rectification task and a rectification item statistical form identifier, and it can be understood that a rectification item in a rectification item list is related to hidden danger point data stored in a database and used for updating a corresponding hidden danger point in the database into a processed state when the rectification item is completed;
calling a flow modeling function of the BPM system, and responding to a rectification task work plan compilation interface to a client;
receiving a rectification task work plan uploaded by a client, and starting a rectification plan auditing process of a BPM system, wherein the rectification plan comprises rectification items and a process node client for executing the rectification tasks;
receiving an audit result uploaded by a client, calling a BPM (business process management) system to analyze an rectification plan for the rectification plan passing the audit, and controlling the rectification task to flow in each process node;
receiving an rectification and modification result uploaded by a client, and starting a rectification and modification result auditing process of a BPM system;
and receiving an examination result uploaded by the client, and changing the state of the corresponding hidden danger point in the database into processed state for the approved and modified result.
In this embodiment, after receiving each rectification problem list pushed by the management platform server, the inspected unit proposes the problem items of anti-terrorism security for the inspection group, performs plan management of problem rectification in time, and rectifies the lists one by one for each problem found by inspection, in an effort to complete rectification within the rectification period. After receiving the list of the various rectification problems pushed by the management platform server, the detected unit intelligently warns and prompts the problems needing to be rectified in time by the system once the problems are recorded and established in the system aiming at the problems found by the detection result of the detected unit; aiming at the rectification problem, the detected unit automatically sends a short message early warning 15 days in advance according to the rectification time limit. And the problem item which exceeds the rectification time limit and is not rectified in time carries out alarm prompt on the detected unit and simultaneously informs the unit of the inspection group. The method realizes that the checked unit can find problems, correct the problems and plan the correction in the anti-terrorism security supervision and inspection process.
And the checked unit immediately completes the rectification on time and according to the quantity after the rectification plan is reported and confirmed by the branch management leader and the checking group, and the checked unit needs to pass the confirmation through the checking group every time the rectification work is completed. Meanwhile, for the correction work which is not completed according to the quality on time, the reason explanation is required to be filled. The method realizes the inspection of the anti-terrorism security supervision inspection work and the closed-loop management of the rectification process by rectifying and modifying the achievement management. The non-dead angle and omnibearing management of the anti-terrorism security supervision and inspection is realized.
The embodiment of the invention also provides an electric power facility anti-terrorism security supervision system, which comprises:
the task scheme compiling module is used for receiving a service starting request of the client and providing a task scheme compiling interface function for the client according to the service class, wherein the task scheme calls a process modeling function of the BPM system when a subtask is in the process class; the task scheme compiling module comprises a supervision and inspection task compiling unit and an adjusting and modifying service compiling unit.
The task flow execution module is used for receiving task scheme data compiled by the client and starting the BPM system to control the flow execution of the tasks according to a task form circulated by preset process nodes and the client;
and the task flow node data processing module is used for receiving data uploaded by the flow node client when executing the task, processing and analyzing the data, feeding back a data processing result to the BPM system, and judging whether to continue the node flow by the BPM system according to the flow rule.
The present invention is not limited to the above-described embodiments, and those skilled in the art will be able to make various modifications without creative efforts from the above-described conception, and fall within the scope of the present invention.

Claims (10)

1. The utility model provides an electric power facility anti-terrorism security supervision method which characterized in that: be applied to electric power facility anti-terrorism security management platform who contains BPM system, include the following step:
receiving a service starting request of a client, and providing a task scheme compiling interface for the client according to a service class, wherein a flow modeling function of a BPM system is called when a subtask in the task scheme is a flow class;
receiving task scheme data compiled by a client, and starting a BPM system to control the task flow execution according to a task form circulated by preset flow nodes and the client;
and receiving data uploaded by the streaming node client when the task is executed, performing data processing analysis, and feeding back a data processing result to the BPM system for the BPM system to judge whether to continue node streaming according to a streaming rule.
2. The electric power facility anti-terrorism security supervision method according to claim 1, characterized in that: when the service class is the supervision check service, the method comprises the following steps:
setting interfaces for each process node responding to supervision and inspection task execution to the inspection group client;
receiving process node setting data uploaded by a client, wherein the process node setting data comprises circulation time, a processor, processing time and a processing result;
responding a supervision check compilation interface for the circulation of each node of the supervision check task to the client;
receiving a compiled supervision and inspection sheet uploaded by a client, wherein the area to be filled in of the supervision and inspection sheet comprises a supervision main body, an inspection mode, a related line and inspection content and has main problems;
receiving a supervision and inspection task flow execution request of a client, starting a BPM system, analyzing flow node setting data and a flowing supervision and inspection list by the BPM system, and controlling the flow of the supervision and inspection list at each flow node;
receiving a filled supervision and inspection list and hidden danger point data uploaded by a process node client, analyzing and processing the uploaded data, and starting a supervision and inspection result auditing process of a BPM system;
and receiving an audit result uploaded by an audit node client in the audit process, and storing and warehousing the data of the audit result which passes the audit.
3. The electric power facility anti-terrorism security supervision method according to claim 2, characterized in that: and when the checked hidden danger point data is put in storage, the hidden danger point data comprises hidden danger point state data and processing time limit data, and the state data is to be processed when being put in storage.
4. The electric power facility anti-terrorism security supervision method according to claim 2, characterized in that: when the BPM system is started to execute the flow tasks, at least one of task information to be handled, node circulation task form link addresses and form filling template addresses is pushed to the flow nodes.
5. The electric power facility anti-terrorism security supervision method according to claim 2, characterized in that: when the BPM system is started to execute the flow task, judging whether data of an appointed next flow transfer node exists in form data uploaded by a flow node client side, if not, the BPM system conducts flow according to a preset default flow sequence, otherwise, the BPM system conducts flow according to the appointed next flow transfer node.
6. The electric power facility anti-terrorism security supervision method according to claim 2, characterized in that: the analyzing and processing of the uploaded data comprises analyzing and processing of the uploaded image hidden danger point data, and comprises the following steps:
carrying out image preprocessing on the uploaded hidden danger point pictures and video data;
identifying the image and judging whether the image belongs to the hidden danger point image;
and if so, storing the hidden danger point image data, and entering an auditing process, otherwise, feeding back a judgment result to the node client for uploading the hidden danger point data without entering the auditing process.
7. The electric power facility anti-terrorism security supervision method according to claim 2, characterized in that: the supervisory check service further comprises:
(41) judging whether the states of the single-flow switching nodes are normally checked, if so, entering a step (42), and otherwise, not carrying out further processing;
(42) judging whether the states of the supervision and inspection nodes are normally finished, if so, entering a step (43), and otherwise, not performing further processing;
(43) starting a supervision and inspection result gathering and counting process of the BPM system;
(44) and receiving a supervision and inspection work report and the rectification item statistical form data uploaded by the client, and pushing the to-be-processed information of the rectification task to the corresponding client of the detected unit of the electric power facility according to the rectification item statistical data.
8. The electric power facility anti-terrorism security supervision method according to claim 7, characterized in that: when the service class is the modifying service, the method comprises the following steps:
receiving a rectification task starting request sent by a client of a detected unit, wherein the starting request comprises a supervision and inspection work report related to a rectification task and a rectification item statistical form identifier;
calling a flow modeling function of the BPM system, and responding to a rectification task work plan compilation interface to a client;
receiving a rectification task work plan uploaded by a client, and starting a rectification plan auditing process of a BPM system, wherein the rectification plan comprises rectification items and a process node client for executing the rectification tasks;
receiving an audit result uploaded by a client, calling a BPM (business process management) system to analyze an rectification plan for the rectification plan passing the audit, and controlling the rectification task to flow in each process node;
receiving an rectification and modification result uploaded by a client, and starting a rectification and modification result auditing process of a BPM system;
and receiving an examination result uploaded by the client, and changing the state of the corresponding hidden danger point in the database into processed state for the approved and modified result.
9. The utility model provides an electric power facility anti-terrorism security supervisory systems which characterized in that: the method comprises the following steps:
the task scheme compiling module is used for receiving a service starting request of the client and providing a task scheme compiling interface function for the client according to the service class, wherein the task scheme calls a process modeling function of the BPM system when a subtask is in the process class;
the task flow execution module is used for receiving task scheme data compiled by the client and starting the BPM system to control the flow execution of the tasks according to a task form circulated by preset process nodes and the client;
and the task flow node data processing module is used for receiving data uploaded by the flow node client when executing the task, processing and analyzing the data, feeding back a data processing result to the BPM system, and judging whether to continue the node flow by the BPM system according to the flow rule.
10. The electric power facility anti-terrorist security supervision system according to claim 9, characterized in that: the task scheme compiling module comprises a supervision and inspection task compiling unit and an adjusting and modifying service compiling unit.
CN202010821162.7A 2020-08-14 2020-08-14 Electric power facility anti-terrorism security supervision method and system Pending CN112150098A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010821162.7A CN112150098A (en) 2020-08-14 2020-08-14 Electric power facility anti-terrorism security supervision method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010821162.7A CN112150098A (en) 2020-08-14 2020-08-14 Electric power facility anti-terrorism security supervision method and system

Publications (1)

Publication Number Publication Date
CN112150098A true CN112150098A (en) 2020-12-29

Family

ID=73888213

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010821162.7A Pending CN112150098A (en) 2020-08-14 2020-08-14 Electric power facility anti-terrorism security supervision method and system

Country Status (1)

Country Link
CN (1) CN112150098A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113269334A (en) * 2021-05-14 2021-08-17 国网上海市电力公司 Method for preparing power protection process of important activity client side
CN113377886A (en) * 2021-05-20 2021-09-10 太湖流域管理局太湖流域水土保持监测中心站 Production and construction project water and soil conservation supervision field investigation method
CN113723936A (en) * 2021-10-12 2021-11-30 国网安徽省电力有限公司宿州供电公司 Power engineering quality supervision and management method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102496088A (en) * 2011-12-14 2012-06-13 河北省电力公司通信中心 Method for improving executive force of power communication overhaul core flow
CN105046408A (en) * 2015-06-25 2015-11-11 国网山东省电力公司 Configurable workflow realization method and system
CN108229174A (en) * 2017-12-28 2018-06-29 陕西山利科技发展有限责任公司 Security risk management system and management method based on cloud data
CN109447562A (en) * 2018-08-28 2019-03-08 国网天津市电力公司电力科学研究院 A kind of intelligence risk management and control platform and transmission line of electricity hidden danger management-control method
CN110276530A (en) * 2019-05-31 2019-09-24 江苏普信达智能交通有限公司 A kind of intelligent engineering operation and maintenance supervising method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102496088A (en) * 2011-12-14 2012-06-13 河北省电力公司通信中心 Method for improving executive force of power communication overhaul core flow
CN105046408A (en) * 2015-06-25 2015-11-11 国网山东省电力公司 Configurable workflow realization method and system
CN108229174A (en) * 2017-12-28 2018-06-29 陕西山利科技发展有限责任公司 Security risk management system and management method based on cloud data
CN109447562A (en) * 2018-08-28 2019-03-08 国网天津市电力公司电力科学研究院 A kind of intelligence risk management and control platform and transmission line of electricity hidden danger management-control method
CN110276530A (en) * 2019-05-31 2019-09-24 江苏普信达智能交通有限公司 A kind of intelligent engineering operation and maintenance supervising method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙亚菲;王永刚;杨建森;吴立鹏;: "民航空管***运行质量监督***的分析与设计", 计算机应用与软件, no. 04, 15 April 2015 (2015-04-15), pages 104 - 108 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113269334A (en) * 2021-05-14 2021-08-17 国网上海市电力公司 Method for preparing power protection process of important activity client side
CN113377886A (en) * 2021-05-20 2021-09-10 太湖流域管理局太湖流域水土保持监测中心站 Production and construction project water and soil conservation supervision field investigation method
CN113377886B (en) * 2021-05-20 2023-10-27 太湖流域管理局太湖流域水土保持监测中心站 Water and soil conservation supervision field investigation method for production and construction projects
CN113723936A (en) * 2021-10-12 2021-11-30 国网安徽省电力有限公司宿州供电公司 Power engineering quality supervision and management method and system
CN113723936B (en) * 2021-10-12 2023-11-14 国网安徽省电力有限公司宿州供电公司 Quality supervision and management method and system for electric power engineering

Similar Documents

Publication Publication Date Title
CN112150098A (en) Electric power facility anti-terrorism security supervision method and system
CN106815709B (en) Service quick response center support system and method
US12008483B2 (en) System to monitor and process water-related data
CN111639885A (en) Agricultural sewage management system and management method
CN111210108B (en) Performance management and control model of electric power material supply chain
CN106327087A (en) Test task assignment method
CN106447156A (en) Attendance management method and system
CN111177510A (en) Method and device for capturing and diagnosing electric charge customer service work order based on process automation
US20220386414A1 (en) System to monitor and process risk relationship sensor data
CN107423826A (en) A kind of method for inspecting of multi-reservoir, device and system
CN112288903A (en) Card punching system, method and equipment
CN112819306A (en) Method, system, device and medium for evaluating work efficiency based on computer vision
CN114091944A (en) Cloud-end-coordinated distribution network engineering field operation analysis decision system
CN212990152U (en) Agricultural sewage management system
CN117541195A (en) Intelligent management method and system for audit project
CN116993221A (en) Digital employee supervision method, device, equipment and medium
CN111639832B (en) Elevator information safety management system and method
CN115423367A (en) Intelligent environmental sanitation management system and method based on AIOT platform
CN108647905A (en) A kind of highway electromechanics operation management system and management method
CN114328787A (en) Information processing method, device and system for construction site, terminal and storage medium
JP3750939B2 (en) Data collection and classification system for failure maintenance management
CN113625673A (en) Dynamic scheduling method, device and system for power safety inspection personnel and storage device
CN114048991A (en) Sewage treatment sludge cleaning and management method and system
CN206505440U (en) Test assignment dispatching system
CN114372712B (en) Supervision task management system based on flow

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination