Risk monitoring apparatus, risk monitoring system, and risk monitoring method
First Claim
1. A risk monitoring apparatus connected to a security device for monitoring a risk inside a workplace comprising:
- a server, including a processor, comprising;
a first monitor portion that monitors an asset in a specific place inside the workplace;
a second monitor portion that monitors an individual inside the workplace;
a first calculation portion that calculates a vulnerability of the individual being monitored by the second monitor portion quantitatively on the basis of identification information of the individual;
a second calculation portion that calculates a vulnerability of the asset being monitored by the first monitor portion and a vulnerability of a space where the asset is present quantitatively on the basis of information about the asset;
a third calculation portion that calculates a comprehensive vulnerability quantitatively on the basis of the vulnerability of the individual calculated in the first calculation portion, the vulnerability of the asset calculated in the second calculation portion, and the vulnerability of the space calculated in the second calculation portion;
an analysis portion that analyzes a risk state in the specific place on the basis of information about the asset being monitored by the first monitor portion, information about the individual being monitored by the second monitor portion, the vulnerability of the individual calculated in the first calculation portion, and the comprehensive vulnerability calculated in the third calculation portion; and
an output portion that outputs an analysis result by the analysis portion.
1 Assignment
0 Petitions
Accused Products
Abstract
A risk monitoring system is formed of a client terminal, a risk management apparatus, and a security device. A risk calculation portion in the risk management apparatus calculates the vulnerability of each room inside the workplace quantitatively in terms of three viewpoints: individuals, assets, and space, and calculates a risk value of an internal crime in each room in real time by multiplying the vulnerability by the internal crime probability and the asset value. A risk analysis portion analyzes a risk state on the basis of the risk value thus calculated and the analysis result is displayed on a display portion of the client terminal. It is thus possible to understand a risk situation of an internal crime against assets to protect in real time for enabling an action to be taken appropriately according to the situation.
10 Citations
7 Claims
-
1. A risk monitoring apparatus connected to a security device for monitoring a risk inside a workplace comprising:
a server, including a processor, comprising; a first monitor portion that monitors an asset in a specific place inside the workplace; a second monitor portion that monitors an individual inside the workplace; a first calculation portion that calculates a vulnerability of the individual being monitored by the second monitor portion quantitatively on the basis of identification information of the individual; a second calculation portion that calculates a vulnerability of the asset being monitored by the first monitor portion and a vulnerability of a space where the asset is present quantitatively on the basis of information about the asset; a third calculation portion that calculates a comprehensive vulnerability quantitatively on the basis of the vulnerability of the individual calculated in the first calculation portion, the vulnerability of the asset calculated in the second calculation portion, and the vulnerability of the space calculated in the second calculation portion; an analysis portion that analyzes a risk state in the specific place on the basis of information about the asset being monitored by the first monitor portion, information about the individual being monitored by the second monitor portion, the vulnerability of the individual calculated in the first calculation portion, and the comprehensive vulnerability calculated in the third calculation portion; and an output portion that outputs an analysis result by the analysis portion. - View Dependent Claims (2, 3, 4, 5)
-
6. A risk monitoring system, comprising:
-
a risk monitoring apparatus comprising; a server, including a processor, comprising; a first monitor portion that monitors an asset in a specific place inside the workplace; a second monitor portion that monitors an individual inside the workplace; a first calculation portion that calculates a vulnerability of the individual being monitored by the second monitor portion quantitatively on the basis of identification information of the individual; a second calculation portion that calculates a vulnerability of the asset being monitored by the first monitor portion and a vulnerability of a space where the asset is present quantitatively on the basis of information about the asset; a third calculation portion that calculates a comprehensive vulnerability quantitatively on the basis of the vulnerability of the individual calculated in the first calculation portion, the vulnerability of the asset calculated in the second calculation portion, and the vulnerability of the space calculated in the second calculation portion; an analysis portion that analyzes a risk state in the specific place on the basis of information about the asset being monitored by the first monitor portion, information about the individual being monitored by the second monitor portion, the vulnerability of the individual calculated in the first calculation portion, and the comprehensive vulnerability calculated in the third calculation portion; and an output portion that outputs an analysis result by the analysis portion; and a security device connected to the risk monitoring apparatus.
-
-
7. A risk monitoring method for monitoring a risk inside a workplace, said method being performed by a risk monitoring apparatus comprising a server, including a processor, which performs the acts comprising:
-
monitoring an asset in a specific place inside the workplace with a first monitor portion; monitoring an individual inside the workplace with a second monitor portion; calculating a vulnerability of the individual being monitored by the second monitor portion quantitatively on the basis of identification information of the individual in a first calculation portion; calculating a vulnerability of the asset being monitored by the first monitor portion and a vulnerability of a space where the asset is present quantitatively on the basis of information about the asset in a second calculation portion; calculating a comprehensive vulnerability quantitatively on the basis of the vulnerability of the individual calculated in the first calculation portion, the vulnerability of the asset calculated in the second calculation portion, and the vulnerability of the space calculated in the second calculation portion in a third calculation portion; analyzing a risk state in the specific place on the basis of the information about the asset being monitored by the first monitor portion and the information about the individual being monitored by the second monitor portion, the vulnerability of the individual calculated in the first calculation portion, and the comprehensive vulnerability calculated in the third calculation portion in an analysis portion; and outputting an analysis result in the analysis portion by an output portion.
-
Specification