Risk assessment method and system for fixed protected objects in security protection network

A technology for security prevention and object protection, which is applied in the fields of instruments, computing, and electrical and digital data processing.

Inactive Publication Date: 2016-03-30
WUHAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Facing the severe security situation, my country has built a security system as an important measure to maintain social public security. As an important technical platform of the public security system, the security system has achieved positive results in the prevention and control of social security, but it has also exposed some Problem: Only pay attention to system construction, ignore the protection objects, resulting in some safety protection systems due to design flaws, there are safety protection loopholes, the safety protection function of the system cannot be fully exerted, and the protection objects in the safety protection network are still in danger. These problems Both restrict the development of security systems
This kind of evaluation from the perspective of management science has certain scientific significance, but because the construction of the index system and the scoring of the index system are inevitably subject to human factors, it is impossible to objectively give a quantitative evaluation of the risk of the protected object; and the risk based on management science Most of the assessment methods are post-assessment after the security system is built, which has little guiding significance for the early construction of the security system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk assessment method and system for fixed protected objects in security protection network
  • Risk assessment method and system for fixed protected objects in security protection network
  • Risk assessment method and system for fixed protected objects in security protection network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The traditional methods for qualitative risk assessment of protected objects using management science methods are as follows:

[0034] For the security node s, its key protection performance index is A 1 ,A 2 ,A 3 ,...,A n , The index weight corresponding to the protection performance index is w 1 , w 2 , w 3 , · · · , w n ( ∀ w i A [ 0,1 ] i = 1,2 , · · · , n ) , And X i = 1 n w 1 = 1 , And establish a measurement interval representing the level of protection performance. Suppose the field experts score the various protection performance indicators as a 1 , a 2 , a 3 , · · · , a n ( ∀ a i A [ 0,1 ] i = 1,2 , · · · , n ) , Then build the following protection performance evaluation model:

[0035] P(s)=[w 1 ,w 2 ,w 3 ,...,W n ]×[a 1 ,a 2 ,a 3 ,...,A n ] T

[0036] According to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a risk assessment method and system for a fixed protection object within a security network, and belongs to the technical field of security protection. The system comprises a data acquisition module, a data preprocessing module and a protection object risk assessment module, wherein the data acquisition module is used for obtaining the position of the security and protection node and the position of protection radius and protection object of the security and protection node; the data preprocessing module is used for conducting normalization to the data; the protection object risk assessment module is used for obtaining the risk assessing value of the protection object based on the physical distance between the protection object and the security and protection node, the protection radius of the security and protection node, and the protection performance degradation of the security and protection node. The method and system provided by the invention can help the safe guard system management personnel understand the risk value of the protection object in a protection area, can serve as a technique support to the public security system construction, and can be used for the construction of security and protection system.

Description

Technical field [0001] The invention belongs to the technical field of system security protection, and particularly relates to a risk assessment method and system for a fixed protection object in a security protection network of multiple security nodes. Background technique [0002] With the rapid economic development and the continuous improvement of people's living standards, various social security issues have also begun to emerge. Faced with a severe security situation, China’s construction of a security protection system is an important measure to maintain social public security. As an important technical platform for the public security system, the security protection system has achieved positive results in social security prevention and control, but it has also exposed some Problem: Only attach importance to system construction and ignore the protection objects, causing some security protection systems to have security protection loopholes due to design flaws, which cannot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F19/00
Inventor 胡瑞敏吕海涛陈军李红阳陈华锋何政王亦民郭熹
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products