Risk monitoring method for a physical protection system of a key infrastructure

A technology for physical protection and infrastructure, applied in the field of risk monitoring of key infrastructure physical protection systems, can solve problems such as immature risk monitoring methods, and achieve the effect of improving effectiveness

Active Publication Date: 2019-01-11
SOUTH CHINA UNIV OF TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the risk monitoring method of China's physical protection system is not yet matur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk monitoring method for a physical protection system of a key infrastructure
  • Risk monitoring method for a physical protection system of a key infrastructure
  • Risk monitoring method for a physical protection system of a key infrastructure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0056] This embodiment discloses a risk monitoring method for a physical protection system of critical infrastructure. The general process of the method of the present invention is as follows: analyze physical protection system regulations, modularize the regulations, sort out external events and internal events contained in the regulations; establish physical protection system risk knowledge base; establish physical protection system risk interaction simulator.

[0057] The present invention adopts following technical scheme:

[0058] 1. Carry out procedure analysis and modular processing on the physical protection system;

[0059] The physical protection system effectively links management personnel, testing personnel, and response forces through risk monitoring to achieve real-time linkage, comprehensive information exchange, and emergency response.

[0060] Key personnel involved in the physical protection system include critical infrastructure managers, detection personn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a risk monitoring method for a physical protection system of a key infrastructure, belonging to the field of key infrastructure security. The invention establishes a risk analysis model for a risk analysis method of a physical protection system and carries out risk monitoring, and the steps are as follows: modularization analysis of physical protection system rules, analysis of enemy intrusion information, analysis of intrusion detection rules, analysis of reaction force rules, analysis of management personnel rules, establishment of risk monitoring knowledge base, andestablishment of risk interactive simulator. The method can dynamically establish a physical protection system risk monitoring model (state, conversion and event) and an interaction modeling function(external event and internal event interaction) between physical protection system entities, thereby completing that risk monitoring of the key infrastructure. The risk monitoring method effectively integrates the physical protection system and its subsystems, and associates all the staff involved in the physical protection system for collaborative deduction, evaluates the weakness of the procedures, and improves the effectiveness of the drill procedures.

Description

technical field [0001] The invention relates to the technical field of key infrastructure security, in particular to a risk monitoring method for a physical protection system of key infrastructure. Background technique [0002] The physical protection system refers to a security defense system that uses physical barriers, detection delay technology, and personnel response capabilities to prevent theft, robbery, or illegal transfer of key facilities and key property. The physical protection system of critical infrastructure includes three principles in depth: defense in depth, which refers to the consistent strategy used to prevent theft, damage facilities, and protect personnel and information as a common compliance of an area; protection in depth, refers to the physical protection of one or more security functions. , psychology, procedures, technology or other equipment are realized by dividing physical space; security in depth is considered to be consistent with defense in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06
CPCG06Q10/0635G06Q10/067
Inventor 邹博文杨军韦关祥汪俊杨明
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products