CN118246017A - Security management method, device, equipment and medium based on event processing task - Google Patents

Security management method, device, equipment and medium based on event processing task Download PDF

Info

Publication number
CN118246017A
CN118246017A CN202410139478.6A CN202410139478A CN118246017A CN 118246017 A CN118246017 A CN 118246017A CN 202410139478 A CN202410139478 A CN 202410139478A CN 118246017 A CN118246017 A CN 118246017A
Authority
CN
China
Prior art keywords
executive
event processing
management
processing task
personnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410139478.6A
Other languages
Chinese (zh)
Inventor
邓永春
蒋志平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Weican Technology Co ltd
Original Assignee
Hangzhou Weican Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Weican Technology Co ltd filed Critical Hangzhou Weican Technology Co ltd
Priority to CN202410139478.6A priority Critical patent/CN118246017A/en
Publication of CN118246017A publication Critical patent/CN118246017A/en
Pending legal-status Critical Current

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

The invention relates to the technical field of safety protection, and provides a safety management method, device, equipment and medium based on an event processing task.

Description

Security management method, device, equipment and medium based on event processing task
Technical Field
The present invention relates to the field of security protection technologies, and in particular, to a security management method, device, equipment, and medium based on an event processing task.
Background
Currently, for a processing task of a specific event, a security management is generally required to be manually performed on an event processing process so as to avoid a security problem.
However, the manual management is not only easy to generate loopholes, but also has higher labor cost.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method, apparatus, device, and medium for security management based on an event processing task, which can reduce the labor cost in the security management process of the event processing task, and has higher security.
A security management method based on an event processing task, the security management method based on the event processing task comprising:
responding to a security management instruction of an event processing task, and analyzing the security management instruction to obtain a management configuration item;
acquiring executive personnel and associated equipment of the event processing task;
and managing the executive according to the management configuration item, and performing security control on the associated equipment according to the management configuration item.
According to a preferred embodiment of the present invention, before the parsing the security management instruction to obtain the management configuration item, the method further includes:
displaying a configuration frame on a designated interface;
when the input data in the configuration frame is detected, acquiring the input data as data to be checked;
Detecting the format of the data to be checked;
And when the format of the data to be checked meets the format requirement of the corresponding configuration frame, generating the management configuration item according to the data to be checked.
According to a preferred embodiment of the present invention, the managing the executive according to the management configuration item includes:
when the executive personnel is subjected to attendance management, card punching information of the executive personnel is obtained;
When the card punching information shows that the card punching type of the executive is work card punching, detecting whether the executive is first card punching;
When the executive personnel performs card punching for the first time, displaying a registration interface and sending a registration prompt to the executive personnel;
receiving registration information uploaded by the executive personnel and checking the registration information;
when the registration information passes the verification, allowing the executive personnel to carry out the work-in card punching operation; and/or
And when the registration information fails to pass the verification, rejecting the executive to carry out the work-in card punching operation and sending out an abnormal alarm.
According to a preferred embodiment of the present invention, after the executive is allowed to perform the work attendance card punching operation, the method further includes:
Acquiring the human face of the executive personnel to obtain a target human face image;
performing quality detection on the target face image;
When the target face image passes the quality detection, acquiring a pre-stored face image of the executive person from a configuration database as a reference image;
comparing the target face image with the reference image;
when the target face image is the same as the reference image, recording successful work-in card punching; or alternatively
And when the target face image is different from the reference image, recording a working card punching failure.
According to a preferred embodiment of the present invention, after the quality detection is performed on the target face image, the method further includes:
when the target face image fails to pass the quality detection, acquiring a failed reason;
generating a face re-acquisition prompt according to the failed reason;
Re-acquiring the human face of the executive person according to the human face re-acquisition prompt;
the failed reasons comprise insufficient light, wrong angles and facial blurring.
According to a preferred embodiment of the present invention, the security control of the associated device according to the management configuration item includes:
when abnormality of the associated equipment is detected, positioning the associated equipment to obtain the position information of the associated equipment;
acquiring an area to which the associated equipment belongs as a target area;
acquiring operation staff of the target area;
And sending an operation and maintenance prompt to the associated equipment to the operation and maintenance personnel according to the position information.
According to a preferred embodiment of the present invention, the managing the executive according to the management configuration item includes:
When an early warning signal triggered by the executive through the appointed equipment is received, acquiring early warning information, recording the early warning information to an early warning list, and displaying the early warning list; and/or
When detecting that more than or equal to the preset number of people are gathered in the configuration area through the positioning equipment in the association equipment, triggering personnel gathering early warning; and/or
When detecting that the executive does not arrive at an event processing place within a specified time range for sign-in, sending an off-duty early warning prompt to the executive; and/or
And performing behavior detection on the personnel in the event processing place to obtain a behavior detection result, and sending a behavior abnormality early warning to the executive personnel when the behavior detection result shows that any personnel has abnormal behaviors.
A security management apparatus based on an event processing task, the security management apparatus based on an event processing task comprising:
The analysis unit is used for responding to the safety management instruction of the event processing task and analyzing the safety management instruction to obtain a management configuration item;
the acquisition unit is used for acquiring executives and associated equipment of the event processing task;
And the management unit is used for managing the executive according to the management configuration item and carrying out safety control on the associated equipment according to the management configuration item.
A computer device, the computer device comprising:
a memory storing at least one instruction; and
And the processor executes the instructions stored in the memory to realize the security management method based on the event processing task.
A computer readable storage medium having stored therein at least one instruction for execution by a processor in a computer device to implement the event processing task based security management method.
According to the technical scheme, the security management instruction can be analyzed to obtain the management configuration item, the executive personnel and the associated equipment of the event processing task are obtained, the executive personnel are managed according to the management configuration item, the associated equipment is safely controlled according to the management configuration item, and further, the automatic security management of the executive personnel and the associated equipment of the event processing task can be realized based on the management configuration item, so that the security problem is avoided, and meanwhile, the labor cost in the security management process is effectively reduced.
Drawings
FIG. 1 is a flow chart of a preferred embodiment of the event processing task based security management method of the present invention.
FIG. 2 is a functional block diagram of a preferred embodiment of the event processing task based security management device of the present invention.
FIG. 3 is a schematic diagram of a computer device implementing a method for event processing task based security management according to a preferred embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings and specific embodiments.
FIG. 1 is a flow chart of a preferred embodiment of a method for event processing task based security management of the present invention. The order of the steps in the flowchart may be changed and some steps may be omitted according to various needs.
The security management method based on the event processing task is applied to one or more computer devices, wherein the computer device is a device capable of automatically performing numerical calculation and/or information processing according to preset or stored instructions, and the hardware of the computer device comprises, but is not limited to, a microprocessor, an Application SPECIFIC INTEGRATED Circuit (ASIC), a Programmable gate array (Field-Programmable GATE ARRAY, FPGA), a digital Processor (DIGITAL SIGNAL Processor, DSP), an embedded device and the like.
The computer device may be any electronic product that can interact with a user in a human-computer manner, such as a Personal computer, a tablet computer, a smart phone, a Personal digital assistant (Personal DIGITAL ASSISTANT, PDA), a game console, an interactive internet protocol television (Internet Protocol Television, IPTV), a smart wearable device, etc.
The computer device may also include a network device and/or a user device. Wherein the network device includes, but is not limited to, a single network server, a server group composed of a plurality of network servers, or a Cloud based Cloud Computing (Cloud Computing) composed of a large number of hosts or network servers.
The server may be an independent server, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, content delivery networks (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms.
Wherein artificial intelligence (ARTIFICIAL INTELLIGENCE, AI) is the theory, method, technique, and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend, and expand human intelligence, sense the environment, acquire knowledge, and use knowledge to obtain optimal results.
Artificial intelligence infrastructure technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and other directions.
The network in which the computer device is located includes, but is not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a virtual private network (Virtual Private Network, VPN), and the like.
S10, responding to a security management instruction of an event processing task, and analyzing the security management instruction to obtain a management configuration item.
In this embodiment, the event processing task may include, but is not limited to: processing tasks for specific events, etc.
In this embodiment, the security management instruction may be triggered by a related staff member, which is not limited by the present invention.
In this embodiment, before the parsing the security management instruction to obtain the management configuration item, the method further includes:
displaying a configuration frame on a designated interface;
when the input data in the configuration frame is detected, acquiring the input data as data to be checked;
Detecting the format of the data to be checked;
And when the format of the data to be checked meets the format requirement of the corresponding configuration frame, generating the management configuration item according to the data to be checked.
The designated interface can be a security management configuration interface, and a user can configure the management configuration item through the designated interface.
The management configuration item may be an item needing to be securely managed, such as an attendance management item.
Through the embodiment, the self-defined configuration of the management configuration items can be realized, and the targeted configuration of the items needing to be safely managed according to actual requirements is supported.
S11, acquiring executive personnel and associated equipment of the event processing task.
In this embodiment, the association device may include, but is not limited to, a registered device such as an intelligent device, a positioning device, a service device, and the like.
Wherein the smart device may include, but is not limited to: urine examination terminal, double-sided cabinet, card swiping and fetching terminal, information registering terminal, intelligent cabinet, electronic water card, camera, NVR (Network Video Recorder ), LED (LIGHT EMITTING Diode), blood sample preservation cabinet, case delivery cabinet, etc.
The positioning device may include a GPS (Global Positioning System ) navigator, a mobile phone, etc.
Wherein the service device may comprise a server or the like.
And S12, managing the executive according to the management configuration item, and performing safety control on the associated equipment according to the management configuration item.
In this embodiment, the managing the executive according to the management configuration item includes:
when the executive personnel is subjected to attendance management, card punching information of the executive personnel is obtained;
When the card punching information shows that the card punching type of the executive is work card punching, detecting whether the executive is first card punching;
When the executive personnel performs card punching for the first time, displaying a registration interface and sending a registration prompt to the executive personnel;
receiving registration information uploaded by the executive personnel and checking the registration information;
when the registration information passes the verification, allowing the executive personnel to carry out the work-in card punching operation; and/or
And when the registration information fails to pass the verification, rejecting the executive to carry out the work-in card punching operation and sending out an abnormal alarm.
Wherein, the registration information may include, but is not limited to: face image, name, age, department, etc.
When the registration information fails to pass the verification, the face image uploaded by the executive personnel currently can be recorded, the face image uploaded currently is utilized to be compared in a specific database, when the face identical to the face image uploaded currently is acquired, the corresponding executive personnel is indicated to be impersonated, at the moment, the identity information of the face is acquired, and alarm information is generated according to the identity information and the impersonated executive personnel, so that the related personnel can be processed in time, and the safety risk caused by the impersonation event of the personnel is avoided.
By the embodiment, the attendance management of related executive personnel can be supported.
In this embodiment, after the allowing the executive to perform the work attendance card punching operation, the method further includes:
Acquiring the human face of the executive personnel to obtain a target human face image;
performing quality detection on the target face image;
When the target face image passes the quality detection, acquiring a pre-stored face image of the executive person from a configuration database as a reference image;
comparing the target face image with the reference image;
when the target face image is the same as the reference image, recording successful work-in card punching; or alternatively
And when the target face image is different from the reference image, recording a working card punching failure.
Wherein the configuration database may be any type of database. And, the configuration database may be a local database or a cloud database.
Through the embodiment, automatic attendance checking can be realized based on the face recognition technology.
In this embodiment, after the quality detection of the target face image, the method further includes:
when the target face image fails to pass the quality detection, acquiring a failed reason;
generating a face re-acquisition prompt according to the failed reason;
Re-acquiring the human face of the executive person according to the human face re-acquisition prompt;
the failed reasons comprise insufficient light, wrong angles and facial blurring.
For example: when the failed reason is an angle error, the executive can be instructed to take a picture at a correct angle so as to acquire face images meeting the requirements.
By the embodiment, when the target face image fails to pass the quality detection, the face image of the executive person can be acquired again according to the real-time failed reason indication, so that the face acquisition efficiency and quality are improved.
In this embodiment, the performing security control on the associated device according to the management configuration item includes:
when abnormality of the associated equipment is detected, positioning the associated equipment to obtain the position information of the associated equipment;
acquiring an area to which the associated equipment belongs as a target area;
acquiring operation staff of the target area;
And sending an operation and maintenance prompt to the associated equipment to the operation and maintenance personnel according to the position information.
For example: navigation information to the associated equipment can be generated according to the position information, so that the operation and maintenance personnel can quickly reach the area where the abnormal equipment is located, the maintenance efficiency of the abnormal equipment is improved, and normal execution of event processing tasks is ensured.
In this embodiment, the managing the executive according to the management configuration item includes:
When an early warning signal triggered by the executive through the appointed equipment is received, acquiring early warning information, recording the early warning information to an early warning list, and displaying the early warning list; and/or
When detecting that more than or equal to the preset number of people are gathered in the configuration area through the positioning equipment in the association equipment, triggering personnel gathering early warning; and/or
When detecting that the executive does not arrive at an event processing place within a specified time range for sign-in, sending an off-duty early warning prompt to the executive; and/or
And performing behavior detection on the personnel in the event processing place to obtain a behavior detection result, and sending a behavior abnormality early warning to the executive personnel when the behavior detection result shows that any personnel has abnormal behaviors.
For example: after the executor presses the chest card positioning button for 3 seconds for a long time, the executor can trigger emergency early warning, at the moment, corresponding early warning information is recorded and displayed in an early warning list; when a plurality of people (more than 3 people for example) are identified to be gathered in the nonfunctional area through the positioning system, triggering personnel gathering early warning; if the scheduled executive does not reach the specific area to finish sign-in within the scheduled time, performing off-duty early warning prompt according to the scheduled time; and when the person is determined to have limb conflict through behavior detection, an abnormal behavior early warning is sent out.
Through the embodiment, early warning operation can be performed according to real-time detection, so that safety problems are avoided.
According to the technical scheme, the security management instruction can be analyzed to obtain the management configuration item, the executive personnel and the associated equipment of the event processing task are obtained, the executive personnel are managed according to the management configuration item, the associated equipment is safely controlled according to the management configuration item, and further, the automatic security management of the executive personnel and the associated equipment of the event processing task can be realized based on the management configuration item, so that the security problem is avoided, and meanwhile, the labor cost in the security management process is effectively reduced.
FIG. 2 is a functional block diagram of a preferred embodiment of the security management apparatus of the present invention based on event handling tasks. The security management device 11 based on the event processing task includes an analysis unit 110, an acquisition unit 111, and a management unit 112. The module/unit referred to in the present invention refers to a series of computer program segments, which are stored in a memory, capable of being executed by a processor and of performing a fixed function. In the present embodiment, the functions of the respective modules/units will be described in detail in the following embodiments.
The parsing unit 110 is configured to parse the security management instruction to obtain a management configuration item in response to the security management instruction for the event processing task;
the acquiring unit 111 is configured to acquire an executive and associated equipment of the event processing task;
The management unit 112 is configured to manage the executive according to the management configuration item, and perform security control on the associated device according to the management configuration item.
According to the technical scheme, the security management instruction can be analyzed to obtain the management configuration item, the executive personnel and the associated equipment of the event processing task are obtained, the executive personnel are managed according to the management configuration item, the associated equipment is safely controlled according to the management configuration item, and further, the automatic security management of the executive personnel and the associated equipment of the event processing task can be realized based on the management configuration item, so that the security problem is avoided, and meanwhile, the labor cost in the security management process is effectively reduced.
FIG. 3 is a schematic diagram of a computer device according to a preferred embodiment of the present invention for implementing a security management method based on event processing tasks.
The computer device 1 may comprise a memory 12, a processor 13 and a bus, and may further comprise a computer program stored in the memory 12 and executable on the processor 13, such as a security management program based on event handling tasks.
It will be appreciated by those skilled in the art that the schematic diagram is merely an example of the computer device 1 and does not constitute a limitation of the computer device 1, the computer device 1 may be a bus type structure, a star type structure, the computer device 1 may further comprise more or less other hardware or software than illustrated, or a different arrangement of components, for example, the computer device 1 may further comprise an input-output device, a network access device, etc.
It should be noted that the computer device 1 is only used as an example, and other electronic products that may be present in the present invention or may be present in the future are also included in the scope of the present invention by way of reference.
The memory 12 includes at least one type of readable storage medium including flash memory, a removable hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, etc. The memory 12 may in some embodiments be an internal storage unit of the computer device 1, such as a removable hard disk of the computer device 1. The memory 12 may also be an external storage device of the computer device 1 in other embodiments, such as a plug-in mobile hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD) or the like, which are provided on the computer device 1. Further, the memory 12 may also include both an internal storage unit and an external storage device of the computer device 1. The memory 12 may be used not only for storing application software installed in the computer device 1 and various types of data, such as code of a security management program based on an event processing task, etc., but also for temporarily storing data that has been output or is to be output.
The processor 13 may be comprised of integrated circuits in some embodiments, for example, a single packaged integrated circuit, or may be comprised of multiple integrated circuits packaged with the same or different functions, including one or more central processing units (Central Processing unit, CPU), microprocessors, digital processing chips, graphics processors, various control chips, and the like. The processor 13 is a Control Unit (Control Unit) of the computer device 1, connects the respective components of the entire computer device 1 using various interfaces and lines, executes various functions of the computer device 1 and processes data by running or executing programs or modules (e.g., a security management program or the like that performs event processing tasks) stored in the memory 12, and calls data stored in the memory 12.
The processor 13 executes the operating system of the computer device 1 and various types of applications installed. The processor 13 executes the application program to implement the steps of the various embodiments of the event processing task based security management method described above, such as the steps shown in fig. 1.
Illustratively, the computer program may be partitioned into one or more modules/units that are stored in the memory 12 and executed by the processor 13 to complete the present invention. The one or more modules/units may be a series of computer readable instruction segments capable of performing the specified functions, which instruction segments describe the execution of the computer program in the computer device 1. For example, the computer program may be divided into a parsing unit 110, an acquisition unit 111, a management unit 112.
The integrated units implemented in the form of software functional modules described above may be stored in a computer readable storage medium. The software functional module is stored in a storage medium, and includes several instructions for causing a computer device (which may be a personal computer, a computer device, or a network device, etc.) or a processor (processor) to execute a portion of the event processing task-based security management method according to the embodiments of the present invention.
The modules/units integrated in the computer device 1 may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as separate products. Based on this understanding, the present invention may also be implemented by a computer program for instructing a relevant hardware device to implement all or part of the procedures of the above-mentioned embodiment method, where the computer program may be stored in a computer readable storage medium and the computer program may be executed by a processor to implement the steps of each of the above-mentioned method embodiments.
Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory, or the like.
Further, the computer-readable storage medium may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created from the use of blockchain nodes, and the like.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. The blockchain (Blockchain), essentially a de-centralized database, is a string of data blocks that are generated in association using cryptographic methods, each of which contains information from a batch of network transactions for verifying the validity (anti-counterfeit) of its information and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.
The bus may be a peripheral component interconnect standard (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus, or an extended industry standard architecture (extended industry standard architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, only one straight line is shown in fig. 3, but not only one bus or one type of bus. The bus is arranged to enable a connection communication between the memory 12 and at least one processor 13 or the like.
Although not shown, the computer device 1 may further comprise a power source (such as a battery) for powering the various components, preferably the power source may be logically connected to the at least one processor 13 via a power management means, whereby the functions of charge management, discharge management, and power consumption management are achieved by the power management means. The power supply may also include one or more of any of a direct current or alternating current power supply, recharging device, power failure detection circuit, power converter or inverter, power status indicator, etc. The computer device 1 may further include various sensors, bluetooth modules, wi-Fi modules, etc., which will not be described in detail herein.
Further, the computer device 1 may also comprise a network interface, optionally comprising a wired interface and/or a wireless interface (e.g. WI-FI interface, bluetooth interface, etc.), typically used for establishing a communication connection between the computer device 1 and other computer devices.
The computer device 1 may optionally further comprise a user interface, which may be a Display, an input unit, such as a Keyboard (Keyboard), or a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch, or the like. The display may also be referred to as a display screen or display unit, as appropriate, for displaying information processed in the computer device 1 and for displaying a visual user interface.
It should be understood that the embodiments described are for illustrative purposes only and are not limited to this configuration in the scope of the patent application.
Fig. 3 shows only a computer device 1 with components 12-13, it being understood by those skilled in the art that the structure shown in fig. 3 is not limiting of the computer device 1 and may include fewer or more components than shown, or may combine certain components, or a different arrangement of components.
In connection with fig. 1, the memory 12 in the computer device 1 stores a plurality of instructions to implement a method of event processing task based security management, the processor 13 being executable to implement:
responding to a security management instruction of an event processing task, and analyzing the security management instruction to obtain a management configuration item;
acquiring executive personnel and associated equipment of the event processing task;
and managing the executive according to the management configuration item, and performing security control on the associated equipment according to the management configuration item.
Specifically, the specific implementation method of the above instructions by the processor 13 may refer to the description of the relevant steps in the corresponding embodiment of fig. 1, which is not repeated herein.
The data in this case were obtained legally.
In the several embodiments provided in the present invention, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be other manners of division when actually implemented.
The invention is operational with numerous general purpose or special purpose computer system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units can be realized in a form of hardware or a form of hardware and a form of software functional modules.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. The units or means stated in the invention may also be implemented by one unit or means, either by software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.
Finally, it should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention.

Claims (10)

1. The security management method based on the event processing task is characterized by comprising the following steps of:
responding to a security management instruction of an event processing task, and analyzing the security management instruction to obtain a management configuration item;
acquiring executive personnel and associated equipment of the event processing task;
and managing the executive according to the management configuration item, and performing security control on the associated equipment according to the management configuration item.
2. The method for event processing task based security management according to claim 1, wherein before parsing the security management instruction to obtain a management configuration item, the method further comprises:
displaying a configuration frame on a designated interface;
when the input data in the configuration frame is detected, acquiring the input data as data to be checked;
Detecting the format of the data to be checked;
And when the format of the data to be checked meets the format requirement of the corresponding configuration frame, generating the management configuration item according to the data to be checked.
3. The event processing task based security management method according to claim 1, wherein the managing the executive according to the management configuration item comprises:
when the executive personnel is subjected to attendance management, card punching information of the executive personnel is obtained;
When the card punching information shows that the card punching type of the executive is work card punching, detecting whether the executive is first card punching;
When the executive personnel performs card punching for the first time, displaying a registration interface and sending a registration prompt to the executive personnel;
receiving registration information uploaded by the executive personnel and checking the registration information;
when the registration information passes the verification, allowing the executive personnel to carry out the work-in card punching operation; and/or
And when the registration information fails to pass the verification, rejecting the executive to carry out the work-in card punching operation and sending out an abnormal alarm.
4. The method for security management based on event processing tasks as claimed in claim 3, wherein after allowing the executive to perform a work-in-flight card punching operation, the method further comprises:
Acquiring the human face of the executive personnel to obtain a target human face image;
performing quality detection on the target face image;
When the target face image passes the quality detection, acquiring a pre-stored face image of the executive person from a configuration database as a reference image;
comparing the target face image with the reference image;
when the target face image is the same as the reference image, recording successful work-in card punching; or alternatively
And when the target face image is different from the reference image, recording a working card punching failure.
5. The method for event processing task based security management according to claim 4, wherein after the quality detection of the target face image, the method further comprises:
when the target face image fails to pass the quality detection, acquiring a failed reason;
generating a face re-acquisition prompt according to the failed reason;
Re-acquiring the human face of the executive person according to the human face re-acquisition prompt;
the failed reasons comprise insufficient light, wrong angles and facial blurring.
6. The method for event processing task based security management according to claim 1, wherein the security controlling of the associated device according to the management configuration item comprises:
when abnormality of the associated equipment is detected, positioning the associated equipment to obtain the position information of the associated equipment;
acquiring an area to which the associated equipment belongs as a target area;
acquiring operation staff of the target area;
And sending an operation and maintenance prompt to the associated equipment to the operation and maintenance personnel according to the position information.
7. The event processing task based security management method according to claim 1, wherein the managing the executive according to the management configuration item comprises:
When an early warning signal triggered by the executive through the appointed equipment is received, acquiring early warning information, recording the early warning information to an early warning list, and displaying the early warning list; and/or
When detecting that more than or equal to the preset number of people are gathered in the configuration area through the positioning equipment in the association equipment, triggering personnel gathering early warning; and/or
When detecting that the executive does not arrive at an event processing place within a specified time range for sign-in, sending an off-duty early warning prompt to the executive; and/or
And performing behavior detection on the personnel in the event processing place to obtain a behavior detection result, and sending a behavior abnormality early warning to the executive personnel when the behavior detection result shows that any personnel has abnormal behaviors.
8. An event processing task based security management apparatus, characterized in that the event processing task based security management apparatus comprises:
The analysis unit is used for responding to the safety management instruction of the event processing task and analyzing the safety management instruction to obtain a management configuration item;
the acquisition unit is used for acquiring executives and associated equipment of the event processing task;
And the management unit is used for managing the executive according to the management configuration item and carrying out safety control on the associated equipment according to the management configuration item.
9. A computer device, the computer device comprising:
a memory storing at least one instruction; and
A processor executing instructions stored in the memory to implement the event processing task based security management method of any of claims 1 to 7.
10. A computer-readable storage medium, characterized by: the computer-readable storage medium having stored therein at least one instruction for execution by a processor in a computer device to implement the event processing task based security management method of any of claims 1 to 7.
CN202410139478.6A 2024-01-31 2024-01-31 Security management method, device, equipment and medium based on event processing task Pending CN118246017A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410139478.6A CN118246017A (en) 2024-01-31 2024-01-31 Security management method, device, equipment and medium based on event processing task

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410139478.6A CN118246017A (en) 2024-01-31 2024-01-31 Security management method, device, equipment and medium based on event processing task

Publications (1)

Publication Number Publication Date
CN118246017A true CN118246017A (en) 2024-06-25

Family

ID=91553245

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410139478.6A Pending CN118246017A (en) 2024-01-31 2024-01-31 Security management method, device, equipment and medium based on event processing task

Country Status (1)

Country Link
CN (1) CN118246017A (en)

Similar Documents

Publication Publication Date Title
CN111949708B (en) Multi-task prediction method, device, equipment and medium based on time sequence feature extraction
CN112559535B (en) Multithreading-based asynchronous task processing method, device, equipment and medium
CN114022841A (en) Personnel monitoring and identifying method and device, electronic equipment and readable storage medium
CN112528265A (en) Identity recognition method, device, equipment and medium based on online conference
CN115147031B (en) Clearing workflow execution method, device, equipment and medium
CN118246017A (en) Security management method, device, equipment and medium based on event processing task
CN115689096A (en) Method and system for emergency group construction management
CN115101152A (en) Sample priority switching method, device, equipment and medium
CN113449037A (en) AI-based SQL engine calling method, device, equipment and medium
CN117316359B (en) Blood detection process tracking method, device, equipment and medium
CN112785811A (en) Video-based safety monitoring method and safety monitoring device
CN116976821B (en) Enterprise problem feedback information processing method, device, equipment and medium
CN117573217A (en) Personnel inquiry task execution method, device, equipment and medium
CN117576721A (en) Visitor management method, device, equipment and medium for appointed personnel
CN116882945B (en) Collaborative office method, equipment and medium based on office area station information
CN117313769A (en) Anti-loss method, device, equipment and medium based on RFID
CN113722590B (en) Medical information recommendation method, device, equipment and medium based on artificial intelligence
CN118037198B (en) Event-related article management method, device, equipment and medium
CN117151641A (en) Task tracking method, device, equipment and medium based on in-area personnel management
CN116957649B (en) Customer screening method, device, equipment and medium
CN116630048B (en) Trading method, device, equipment and medium based on futures quotation K line
CN117492454B (en) Unmanned vehicle control method, device, equipment and medium based on intelligent rod
CN116580329B (en) Unmanned aerial vehicle heat prediction method, device, equipment and medium
CN117151955A (en) Traffic case processing state tracking method, device, equipment and medium
CN117291779A (en) Personnel management method, device, equipment and medium based on alcohol detection

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination