Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Enterprise operation safety risk assessment method, system, equipment and medium

A technology for operating security risks and security risks, applied in data processing applications, resources, calculations, etc., can solve the problems of being unable to objectively and comprehensively reflect the security status of enterprises and strong subjectivity, and achieve effective display forms, comprehensive, The effect of great application value

Pending Publication Date: 2022-04-05
联通(广东)产业互联网有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the current enterprise risk assessment is mainly based on the judgment of various indicators based on personal experience, which is highly subjective and cannot objectively and comprehensively reflect the enterprise security situation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise operation safety risk assessment method, system, equipment and medium
  • Enterprise operation safety risk assessment method, system, equipment and medium
  • Enterprise operation safety risk assessment method, system, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] This embodiment provides an enterprise operation security risk assessment method, which is used to provide an objective risk assessment method for the enterprise, which does not involve personal experience judgment.

[0033] Such as figure 1 As shown, the method includes:

[0034] S110: Obtain enterprise information of all enterprises to be assessed from the enterprise risk assessment database;

[0035] In this step, the enterprise to be assessed refers to the enterprise that uses this method for risk assessment. The enterprise risk assessment database stores the information of several enterprises, which can be stored according to different types of enterprises. The stored enterprise information is at least Including the enterprise name, enterprise code, etc. of the enterprise. In the enterprise risk assessment database, each enterprise is pre-allocated with a unique identifier to distinguish it from other enterprises. When obtaining the enterprise information of all...

Embodiment 2

[0134] Based on the same idea as in Embodiment 1, such as Figure 6 As shown, this embodiment provides an enterprise operation security risk assessment system, including:

[0135] A data acquisition module 210, configured to acquire all enterprises to be assessed from the enterprise risk assessment database;

[0136] The first data processing module 220 is used to obtain all administrative compulsory measures decision information of all enterprises to be evaluated from the enterprise administrative compulsory database, and determine information according to the types of administrative compulsory measures of the enterprises to be evaluated, or determine the administrative compulsory measures of the enterprises to be evaluated The amount of information determines the measure-handling decision score for the enterprise to be assessed;

[0137] The second data processing module 230 is used to obtain the punishment decision information of all punishment cases of all enterprises to ...

Embodiment 3

[0152] Based on the same ideas as in Embodiment 1, this embodiment provides a computer device, including a memory and a processor, the memory stores a computer program, and the processor implements the enterprise provided by Embodiment 1 when executing the computer program. Run the security risk assessment methodology.

[0153] This embodiment also provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the enterprise operation security risk assessment method provided in Embodiment 1 is implemented.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an enterprise operation safety risk assessment method, system and device and a medium. The method comprises the steps of obtaining a to-be-assessed enterprise from an enterprise risk to-be-assessed database; obtaining administrative enforcement measure decision information of the to-be-evaluated enterprise from the enterprise administrative enforcement database, and determining a measure processing decision score according to the type or quantity of the administrative enforcement measure decision information; acquiring punishment decision information of a punishment case of the to-be-evaluated enterprise from an enterprise administrative punishment database, and determining a punishment decision score of the to-be-evaluated enterprise according to the type of the punishment decision information; obtaining an administrative examination result of the to-be-evaluated enterprise from the enterprise administrative examination database, determining an examination result score according to the administrative examination result, and determining an examination and punishment comprehensive score according to the examination result score and the punishment decision score; and determining an enterprise security risk score according to the inspection punishment comprehensive score and the measure processing decision score of the to-be-assessed enterprise. The method is objective and credible, and has huge application value.

Description

technical field [0001] The present invention relates to the field of risk assessment, and more specifically, to a method, system, equipment and media for enterprise operation safety risk assessment. Background technique [0002] Theme analysis of security supervision data is a bottom-up data development process based on business needs. The entire life cycle includes demand analysis, theme index construction, theme data extraction, data process design, model design, table creation, extraction and loading, and development. , testing, initialization, configuration, visual display and release of the entire process. This is a closed-loop process, and data modeling is a process of iterative iterations and continuous updating and improvement. [0003] Based on the theme database data formed by the aggregation and governance of security supervision data and the basic database data provided by the big data platform, the data computing engine (batch computing, stream computing, memor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/06
Inventor 李志彬国宇晨方辉敏吴仲维
Owner 联通(广东)产业互联网有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products