CN116780778B - Energy isolation processing method and visualized intelligent power cut and transmission information management system - Google Patents

Energy isolation processing method and visualized intelligent power cut and transmission information management system Download PDF

Info

Publication number
CN116780778B
CN116780778B CN202310814395.8A CN202310814395A CN116780778B CN 116780778 B CN116780778 B CN 116780778B CN 202310814395 A CN202310814395 A CN 202310814395A CN 116780778 B CN116780778 B CN 116780778B
Authority
CN
China
Prior art keywords
information
target
switch cabinet
identity
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310814395.8A
Other languages
Chinese (zh)
Other versions
CN116780778A (en
Inventor
刘晓玉
郭志雷
刘敏
张月斌
王君杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Tianneng Software Technology Co ltd
Original Assignee
Xi'an Tianneng Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Tianneng Software Technology Co ltd filed Critical Xi'an Tianneng Software Technology Co ltd
Priority to CN202310814395.8A priority Critical patent/CN116780778B/en
Publication of CN116780778A publication Critical patent/CN116780778A/en
Application granted granted Critical
Publication of CN116780778B publication Critical patent/CN116780778B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00001Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by the display of information or by user interaction, e.g. supervisory control and data acquisition systems [SCADA] or graphical user interfaces [GUI]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02HEMERGENCY PROTECTIVE CIRCUIT ARRANGEMENTS
    • H02H7/00Emergency protective circuit arrangements specially adapted for specific types of electric machines or apparatus or for sectionalised protection of cable or line systems, and effecting automatic switching in the event of an undesired change from normal working conditions
    • H02H7/22Emergency protective circuit arrangements specially adapted for specific types of electric machines or apparatus or for sectionalised protection of cable or line systems, and effecting automatic switching in the event of an undesired change from normal working conditions for distribution gear, e.g. bus-bar systems; for switching devices
    • H02H7/222Emergency protective circuit arrangements specially adapted for specific types of electric machines or apparatus or for sectionalised protection of cable or line systems, and effecting automatic switching in the event of an undesired change from normal working conditions for distribution gear, e.g. bus-bar systems; for switching devices for switches
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00002Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by monitoring
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00032Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for
    • H02J13/00036Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for the elements or equipment being or involving switches, relays or circuit breakers
    • H02J13/0004Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for the elements or equipment being or involving switches, relays or circuit breakers involved in a protection system
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an energy isolation processing method and a visual intelligent power cut and transmission information management system, and relates to the technical field of power transmission and transformation. The method comprises the steps of receiving and analyzing to obtain a target electric switch cabinet and a corresponding target operator, wherein the target electric switch cabinet is required to execute energy isolation operation; generating an instruction data packet according to the target electrical switch cabinet and the corresponding target operator, wherein the instruction data packet comprises verification information of the target electrical switch cabinet and the target operator; transmitting an instruction data packet to an operation terminal corresponding to a target operator; receiving a consistency verification result returned by the operation terminal; judging whether the identity authentication and the equipment authentication are passed; if yes, marking the target electrical appliance switch cabinet as an energy isolation state, if not, sending a recovery instruction to the operation terminal and ending the steps. The invention effectively improves the operation efficiency on the premise of avoiding misoperation by carrying out multiple verification on operators and equipment.

Description

Energy isolation processing method and visualized intelligent power cut and transmission information management system
Technical Field
The invention belongs to the technical field of power transmission and transformation, and particularly relates to an energy isolation processing method and a visual intelligent power cut and transmission information management system.
Background
With the development of industrialization and modernization, the management and utilization of energy becomes a critical issue. In particular, in a power system, accurate and effective management and scheduling of power resources has important significance for guaranteeing reliability and safety of power supply. In power system operation, power outage operation is a common operation that typically involves overhauling, maintaining or otherwise handling electrical equipment to ensure stable operation of the system.
However, the conventional power outage and transmission management method often depends on manual operation and judgment, which is not only inefficient, but also may cause potential safety hazards due to human errors. In addition, when the power system fails, the problem area can be rapidly and accurately isolated to prevent further spread of the failure, which is important to ensure the stability of the system. However, the existing energy isolation processing method has defects in fault detection, isolation and information feedback, and cannot effectively cope with complex and large-scale power systems.
In addition, in conventional power-on and power-off information management, information presentation and interaction are often not intuitive enough, making it difficult for an operator to quickly understand and grasp the state of the system. In emergency situations, this may affect the operator to make accurate decisions and respond quickly.
Disclosure of Invention
The invention aims to provide an energy isolation processing method and a visual intelligent power cut and transmission information management system, which can effectively improve the operation efficiency on the premise of avoiding misoperation by carrying out multiple verification on operators and equipment.
In order to solve the technical problems, the invention is realized by the following technical scheme:
the invention provides an energy isolation processing method, which comprises the following steps,
Receiving, analyzing and acquiring a target electric switch cabinet needing to execute energy isolation operation and a corresponding target operator;
Generating an instruction data packet according to the target electrical switch cabinet and a corresponding target operator, wherein the instruction data packet comprises verification information of the target electrical switch cabinet and the target operator;
the instruction data packet is sent to an operation terminal corresponding to the target operator;
receiving a consistency verification result returned by the operation terminal;
Judging whether the identity authentication and the equipment authentication are passed;
If yes, the target electrical switch cabinet is marked as an energy isolation state,
If not, sending a recovery instruction to the operation terminal and ending the steps.
The invention also discloses an energy isolation processing method, which comprises the following steps,
Receiving an instruction data packet sent by a server;
Finding a target electrical switch cabinet according to the number of the target electrical switch cabinet in the instruction data packet;
acquiring the identity characteristics of an operator;
Verifying the identity characteristics of an operator according to the identity verification information in the instruction data packet;
If not, ending the step or reminding the retry;
If the energy isolation operation is passed, the energy isolation operation is carried out on the target electrical appliance switch cabinet;
Acquiring equipment information of a target electrical switch cabinet in a hidden area of the target electrical switch cabinet as hidden equipment information, wherein the hidden equipment information comprises a two-dimensional code tag positioned inside the target electrical switch cabinet;
verifying the hidden equipment information according to the instruction data packet;
If the identity verification result passes the identity verification and the equipment verification, a consistency verification result passing the identity verification is returned to the server;
If not, returning an inconsistent verification result of the identity verification and the equipment verification to the server.
The invention also discloses a visual intelligent power-off and power-on information management system which is characterized by comprising,
The server side is used for receiving and analyzing and acquiring a target electric switch cabinet and a corresponding target operator, wherein the target electric switch cabinet is required to execute energy isolation operation;
Generating an instruction data packet according to the target electrical switch cabinet and a corresponding target operator, wherein the instruction data packet comprises verification information of the target electrical switch cabinet and the target operator;
the instruction data packet is sent to an operation terminal corresponding to the target operator;
receiving a consistency verification result returned by the operation terminal;
Judging whether the identity authentication and the equipment authentication are passed;
If yes, the target electrical switch cabinet is marked as an energy isolation state,
If not, sending a recovery instruction to the operation terminal and ending the step;
the operation terminal is used for receiving the instruction data packet sent by the server;
Finding a target electrical switch cabinet according to the number of the target electrical switch cabinet in the instruction data packet;
acquiring the identity characteristics of an operator;
Verifying the identity characteristics of an operator according to the identity verification information in the instruction data packet;
If not, ending the step or reminding the retry;
If the energy isolation operation is passed, the energy isolation operation is carried out on the target electrical appliance switch cabinet;
Acquiring equipment information of a target electrical switch cabinet in a hidden area of the target electrical switch cabinet as hidden equipment information, wherein the hidden equipment information comprises a two-dimensional code tag positioned inside the target electrical switch cabinet;
verifying the hidden equipment information according to the instruction data packet;
If the identity verification result passes the identity verification and the equipment verification, a consistency verification result passing the identity verification is returned to the server;
If not, returning an inconsistent verification result of the identity verification and the equipment verification to the server.
The invention can effectively improve the operation efficiency on the premise of avoiding misoperation by carrying out multiple verification on operators and equipment. In the implementation process, the information of the target electric switch cabinet and the corresponding target operator, which need to execute the energy isolation operation, is received and analyzed. Instruction packets are then generated based on this information. And then sending the instruction data packet to an operation terminal corresponding to the target operator. And after receiving a consistency verification result returned by the operation terminal, carrying out identity verification and equipment verification judgment. The target electrical switchgear is marked as energy isolated if validated. And if the verification is not passed, sending a recovery instruction to the operation terminal and ending the operation step. Through the flow, misoperation can be avoided in the operation process, and the operation efficiency is improved.
Of course, it is not necessary for any one product to practice the invention to achieve all of the advantages set forth above at the same time.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of functional units and information flow of a visual intelligent power-off and power-on information management system according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating steps performed by the server according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating steps performed by the operation terminal according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating the step S2 according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating the step S24 according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating a step S241 according to an embodiment of the invention;
fig. 7 is a flowchart illustrating the step S2412 according to an embodiment of the invention;
Fig. 8 is a flow chart illustrating the step of step S15 according to an embodiment of the invention.
In the drawings, the list of components represented by the various numbers is as follows:
1-a server and 2-an operation terminal.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In order to accurately position the operation of the electrical switch cabinet and monitor the state of the electrical switch cabinet, the invention provides the following scheme.
Referring to fig. 1, the present invention provides a visual intelligent power-off and power-on information management system, which may include a server 1 and an operation terminal 2 from functional units. The server 1 may be located in a main control room or may be deployed in a cloud. The operation terminal 2 is held by an operator. The following description will be made separately.
Referring to fig. 2, for the server 1, in the implementation process, step S1 may be first performed to receive and analyze the target electric switch cabinet and the corresponding target operator that need to perform the energy isolation operation, where the information may be generated by the power distribution system. Step S2 may then be performed to generate an instruction packet according to the target electrical switch cabinet and the corresponding target operator, where the instruction packet includes verification information of the target electrical switch cabinet and the target operator. Step S3 may be performed to send an instruction packet to the operation terminal corresponding to the target operator. Step S4 may be performed next to receive a consistency verification result returned by the operation terminal. Step S5 may next be performed to determine whether authentication and device authentication are passed. If yes, the step S6 can be executed next to mark the target electrical appliance switch cabinet as an energy isolation state, and if not, the step S7 can be executed next to send a recovery instruction to the operation terminal and finish the step.
In order to avoid potential safety hazards caused by the fact that the electrical switch cabinet in the energy isolation state is connected in a misconnection mode, the target electrical switch cabinet can be physically locked, and lock information of the state lock of the target electrical switch cabinet is uploaded to the server 1. Specifically, first, lock information of a state lock of a target electrical appliance switch cabinet transmitted by an operation terminal is received. And then, correlating the number of the target electrical appliance switch cabinet with the lock information of the corresponding state lock to obtain the equipment lock correlation. And then receiving a lock association inquiry request sent by the operation terminal, wherein the lock association inquiry request contains the number of the electric switch cabinet to be confirmed and the lock information of the state lock. And then inquiring the equipment lock association relation according to the lock association inquiry command, and judging whether the number of the electric switch cabinet to be confirmed and the lock information of the state lock contained in the lock association inquiry request have association. If yes, the relevance is returned to the operation terminal, and if not, the relevance is returned to the operation terminal. Thus, misoperation of the target electrical appliance switch cabinet in the energy isolation state can be avoided.
To supplement the above-described implementation procedures of step S1 to step S7, source codes of part of the functional modules are provided, and a comparison explanation is made in the annotation section. In order to meet the data security requirements of the related laws and regulations on the building, desensitization treatment is carried out on partial data which does not influence the implementation of the scheme, and the following is carried out.
Referring to fig. 3, for the operation terminal 2, in a specific implementation process, step S8 may be performed first to receive the instruction packet sent by the server 1 in step S3. Step S9 may then be performed to find the target electrical switch cabinet based on the number of the target electrical switch cabinet within the command data packet. Step S10 may then be performed to obtain an identity of the operator. Step S11 may be performed to verify the identity of the operator based on the identity verification information in the instruction packet. If not, the step S12 may be executed next to end the step or remind the retry, and if so, the step S13 may be executed next to execute the energy isolation operation on the target electrical appliance switch cabinet. Step S14 may be performed to obtain the device information of the target electrical switch cabinet in the hidden area of the target electrical switch cabinet as the hidden device information, and in practical application, a two-dimensional code recording the device information of the target electrical switch cabinet may be set on the outer side of the drawer housing of the target electrical switch cabinet as the hidden device information, and the hidden device information may be read only after the energy isolation operation is performed by extracting the target electrical switch cabinet. Step S15 may then be performed to verify the hidden device information from the instruction packet. If so, then step S16 may be performed to return a consistency verification result to the server through identity verification and device verification. If not, step S17 can be executed finally to return the inconsistent verification results of the identity verification and the equipment verification to the server.
In the implementation process, the server side receives, analyzes and acquires the information of the target electrical switch cabinet and the target operator, generates an instruction data packet containing verification information, and sends the instruction data packet to an operation terminal of the target operator. The operation terminal receives the service end instruction data packet, finds the target electrical switch cabinet according to the number, and verifies the identity of the operator. If the verification is not passed, ending or reminding the retry; if the verification is passed, an energy isolation operation is performed and hidden device information is acquired. And verifying the hidden equipment information according to the instruction data packet, returning a consistency verification result to the server if the hidden equipment information passes, and returning an inconsistency verification result if the hidden equipment information does not pass. According to the scheme, the operating staff and the equipment are verified through multiple times, and the operating efficiency is effectively improved on the premise of avoiding misoperation.
To supplement the above-described implementation procedures of step S8 to step S17, source codes of part of the functional modules are provided, and a comparison explanation is made in the annotation section.
Referring to fig. 4, the secondary verification is performed during the operation of the target electrical switch cabinet by the operator, and meanwhile, the situation that the operator fails to report after finding an error is avoided, and the equipment verification information used in the secondary verification can be encrypted. In view of this, step S2 described above may be performed in a specific implementation process by first generating the device information according to the number of the target electrical switch cabinet in step S21. Step S22 may be performed next to combine the device authentication instruction and the device information to obtain the device authentication information. Step S23 may be performed to extract the characteristics of the biological information of the target operator to obtain the identity of the target operator. Step S24 may be performed to generate authentication information according to the identity of the target operator, and encrypt the device authentication information to obtain device authentication encrypted information. Finally, step S25 may be executed to generate an instruction packet according to the number of the target electrical switch cabinet, the device verification encryption information, and the identity verification information.
In order to supplement the implementation process of the steps, source codes of partial functional modules are provided, and the explanation is compared in the annotating part.
As shown in fig. 5, because the electromagnetic environment between the operations of the electrical devices is complex, the connection between the server 1 and the operation terminal 2 is unstable, which may cause communication delay, and in order to improve the operation efficiency, both the authentication information and the device authentication encryption information may be sent to the operation terminal 2. However, in order to avoid disclosure of the identity of the target operator, step S24 may be performed first to obtain an irreversible digital digest of the identity of the target operator according to the generation algorithm in step S241. Step S242 may then be performed to split the digital digest of the identity of the target operator into an explicit number field and an implicit number field. Step S243 may then be performed to encrypt the device authentication information using the implicit number field as a key to obtain device authentication encryption information. Finally, step S244 may be performed to combine the generation algorithm with the explicit digital segment to obtain authentication information.
In order to supplement the implementation process of the steps, source codes of partial functional modules are provided, and the explanation is compared in the annotating part.
Referring to fig. 6, in order to effectively reduce the data size of the digital digests of the identity features, and also avoid the occurrence of duplicate digital digests of the identity features of different operators, it is necessary to extract the most representative features of the target operator. In view of this, in the implementation process of step S241, step S2411 may be performed first to obtain a numerical distribution of the identity of the target operator in a plurality of feature dimensions according to the identity of the target operator. Step S2412 may then be performed to obtain, for each feature dimension, a regular distribution interval of the target operator in the corresponding feature dimension according to the corresponding numerical distribution. Step S2413 may then be performed to combine the data information for each feature dimension and corresponding regular distribution interval into one feature data set. Step S2414 may then be performed to assign each feature data set to either an explicit data block or an implicit data block according to the corresponding regular distribution interval. And distributing the characteristic data group with large regular distribution interval to the explicit data block, and distributing the characteristic data group with small regular distribution interval to the implicit data block. And finally, step S2415 can be executed to obtain irreversible digital abstracts of the dominant data blocks and the recessive data blocks according to the generation algorithm, and the irreversible digital abstracts are combined to obtain the digital abstracts of the identity features.
According to the steps, the digital abstract corresponding to the dominant data block is used as the dominant digital field, and the digital abstract corresponding to the recessive data block is used as the recessive digital field.
In order to supplement the implementation process of the steps, source codes of partial functional modules are provided, and the explanation is compared in the annotating part.
Referring to fig. 7, in order to calculate a conventional distribution interval of a target operator in a corresponding feature dimension, the identification accuracy is not reduced on the premise of improving the identification efficiency, and for each feature dimension, step S2412 may be executed first to obtain a sequential sequence of corresponding values as a value sequence according to a corresponding value distribution in a specific implementation process in step S24121. Step S24122 may then be performed to obtain differences between all adjacent values in the sequence of values. Step S24123 may then be performed to calculate a mean value of the differences between all adjacent values in the acquired sequence of values as a screening criterion. Step S24124 may be performed to reject values within the sequence of values that have a difference from the neighboring values less than the screening criteria as outliers. Finally, step S24125 may be executed to obtain a distribution interval of values in the sequence of values after the outlier is removed as a regular distribution interval of the target operator in the feature dimension.
In order to supplement the implementation process of the steps, source codes of partial functional modules are provided, and the explanation is compared in the annotating part.
Referring to fig. 8, in order to decrypt the hidden device information, step S15 may be executed first in the implementation process to obtain the generation algorithm, the explicit field, and the device verification encryption information according to the parsing of the instruction packet in step S151. Step S152 may then be performed to obtain a digital digest of the operator' S identity using a generation algorithm. Step S153 may be performed to obtain an implicit number field from the digital digest and the explicit number field. Step S154 may be performed to decrypt the device authentication encryption information according to the implicit number field as a key to obtain a device authentication instruction and device information in the device authentication information. Step S155 may then be performed to execute the device authentication instruction to compare the device information in the device authentication information with the hidden device information. If so, the consistency of the device authentication of step S156 may be performed next, and if not, the inconsistency of the device authentication of step S157 may be performed last.
In order to supplement the implementation process of the steps, source codes of partial functional modules are provided, and the explanation is compared in the annotating part.
In summary, the scheme adopts a multiple verification method, so that the operation efficiency is effectively improved, and meanwhile, misoperation is avoided. In the implementation process, the information of the target electrical switch cabinet and the corresponding target operator, which need to execute the energy isolation operation, is firstly acquired and analyzed. Then, an instruction packet is generated based on the information and transmitted to the operation terminal of the target operator. And then, receiving a consistency verification result returned by the operation terminal, and carrying out identity verification and equipment verification. And if the verification is passed, marking the target electrical switch cabinet as an energy isolation state. If the verification is not passed, a recovery instruction is sent to the operation terminal, and the operation is ended. Through the flow, misoperation can be avoided in the operation process, and the operation efficiency is effectively improved.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by hardware, such as circuits or ASICs (Application SPECIFIC INTEGRATED circuits), which perform the corresponding functions or acts, or combinations of hardware and software, such as firmware and the like.
Although the invention is described herein in connection with various embodiments, other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed invention, from a study of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
The foregoing description of embodiments of the application has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope of the various embodiments described. The terminology used herein was chosen in order to best explain the principles of the embodiments, the practical application, or the improvement of technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (6)

1. An energy isolation processing method is characterized by comprising the following steps of,
Receiving, analyzing and acquiring a target electric switch cabinet needing to execute energy isolation operation and a corresponding target operator;
Generating an instruction data packet according to the target electrical switch cabinet and a corresponding target operator, wherein the instruction data packet comprises verification information of the target electrical switch cabinet and the target operator;
the instruction data packet is sent to an operation terminal corresponding to the target operator;
receiving a consistency verification result returned by the operation terminal;
Judging whether the identity authentication and the equipment authentication are passed;
If yes, the target electrical switch cabinet is marked as an energy isolation state,
If not, sending a recovery instruction to the operation terminal and ending the step;
wherein,
The step of generating a command data packet according to the target electrical switchgear and the corresponding target operator, comprises,
Generating and obtaining equipment information according to the number of the target electrical switch cabinet;
Combining the equipment verification instruction and the equipment information to obtain equipment verification information;
extracting the characteristics of the biological information of the target operator to obtain the identity characteristics of the target operator;
generating identity verification information according to the identity characteristics of the target operator, and encrypting the equipment verification information to obtain equipment verification encryption information;
Generating and obtaining the instruction data packet according to the number of the target electrical switch cabinet, the equipment verification encryption information and the identity verification information;
the step of generating authentication information according to the identity of the target operator and encrypting the device authentication information to obtain device authentication encryption information comprises,
Acquiring an irreversible digital abstract of the identity characteristic of the target operator according to a generation algorithm;
Splitting the digital abstract of the identity characteristic of the target operator into an explicit digital field and an implicit digital field;
encrypting the equipment verification information by using the implicit number field as a secret key to obtain equipment verification encryption information;
combining the generation algorithm with the explicit digital field to obtain authentication information;
the step of obtaining an irreversible digital digest of the identity of the target operator according to a generation algorithm, comprising,
Obtaining numerical distribution of the identity characteristics of the target operator in a plurality of characteristic dimensions according to the identity characteristics of the target operator;
For each characteristic dimension, obtaining a conventional distribution interval of a target operator on the corresponding characteristic dimension according to the corresponding numerical distribution;
Combining the data information of each characteristic dimension and the corresponding conventional distribution interval into a characteristic data set;
Distributing each characteristic data group to an explicit data block or an implicit data block according to a corresponding conventional distribution interval;
acquiring an explicit data block and an irreversible digital abstract of the implicit data block according to a generation algorithm, and combining to obtain the digital abstract of the identity feature;
The step of obtaining a conventional distribution interval of the target operator in the corresponding characteristic dimension according to the corresponding numerical distribution for each characteristic dimension comprises the following steps,
For each of the feature dimensions,
Acquiring a sequential ordering sequence of corresponding values as a value sequence according to the corresponding value distribution;
Obtaining the difference value of all adjacent two values in the value sequence;
calculating and obtaining the average value of the difference values of all two adjacent values in the value sequence as a screening calibration value;
Removing the numerical value, which is smaller than the screening calibration value and is different from the adjacent numerical value, in the numerical value sequence as an abnormal value;
And acquiring a distribution interval of the numerical values in the numerical value sequence after abnormal values are removed as a conventional distribution interval of a target operator in the characteristic dimension.
2. The method of claim 1, wherein the step of splitting the digital digest of the identity of the target operator into an explicit number field and an implicit number field comprises,
Taking the digital abstract corresponding to the dominant data block as a dominant digital field;
and taking the digital abstract corresponding to the recessive data block as a recessive digital field.
3. The method of claim 1, further comprising,
Receiving lockset information of a state lock of the target electrical appliance switch cabinet, which is sent by the operation terminal;
Correlating the serial number of the target electrical appliance switch cabinet with the corresponding lock information of the state lock to obtain a device lock correlation;
receiving a lock association inquiry request sent by the operation terminal, wherein the lock association inquiry request comprises the number of the electric switch cabinet to be confirmed and the lock information of the state lock;
Inquiring the equipment lock association relation according to the lock association inquiry command, and judging whether the number of the electric switch cabinet to be confirmed contained in the lock association inquiry request has association with the lock information of the state lock or not;
if yes, returning the relevance to the operation terminal;
If not, returning the non-association to the operation terminal.
4. An energy isolation processing method is characterized by comprising the following steps of,
Receiving an instruction data packet in the energy isolation processing method according to any one of claims 1 to 3 sent by a server;
Finding a target electrical switch cabinet according to the number of the target electrical switch cabinet in the instruction data packet;
acquiring the identity characteristics of an operator;
Verifying the identity characteristics of an operator according to the identity verification information in the instruction data packet;
If not, ending the step or reminding the retry;
If the energy isolation operation is passed, the energy isolation operation is carried out on the target electrical appliance switch cabinet;
Acquiring equipment information of a target electrical switch cabinet in a hidden area of the target electrical switch cabinet as hidden equipment information, wherein the hidden equipment information comprises a two-dimensional code tag positioned inside the target electrical switch cabinet;
verifying the hidden equipment information according to the instruction data packet;
If the identity verification result passes the identity verification and the equipment verification, a consistency verification result passing the identity verification is returned to the server;
If not, returning an inconsistent verification result of the identity verification and the equipment verification to the server.
5. The method of claim 4, wherein said step of verifying said hidden device information based on an instruction packet comprises,
Analyzing according to the instruction data packet to obtain a generation algorithm, an explicit digital field and equipment verification encryption information;
acquiring a digital abstract of the identity characteristics of an operator by using the generating algorithm;
obtaining an implicit digital field according to the digital abstract and the explicit digital field;
Decrypting the device verification encryption information according to the implicit number field as a secret key to obtain a device verification instruction and device information in the device verification information;
Executing the equipment verification instruction to compare the equipment information with the hidden equipment information in the equipment verification information;
If the device authentication is the same, the device authentication is consistent;
if not, the device authentication is inconsistent.
6. A visual intelligent power cut and transmission information management system is characterized by comprising,
The server side is used for receiving and analyzing and acquiring a target electric switch cabinet and a corresponding target operator, wherein the target electric switch cabinet is required to execute energy isolation operation;
Generating an instruction data packet according to the target electrical switch cabinet and a corresponding target operator, wherein the instruction data packet comprises verification information of the target electrical switch cabinet and the target operator;
the instruction data packet is sent to an operation terminal corresponding to the target operator;
receiving a consistency verification result returned by the operation terminal;
Judging whether the identity authentication and the equipment authentication are passed;
If yes, the target electrical switch cabinet is marked as an energy isolation state,
If not, sending a recovery instruction to the operation terminal and ending the step;
the operation terminal is used for receiving the instruction data packet sent by the server;
Finding a target electrical switch cabinet according to the number of the target electrical switch cabinet in the instruction data packet;
acquiring the identity characteristics of an operator;
Verifying the identity characteristics of an operator according to the identity verification information in the instruction data packet;
If not, ending the step or reminding the retry;
If the energy isolation operation is passed, the energy isolation operation is carried out on the target electrical appliance switch cabinet;
Acquiring equipment information of a target electrical switch cabinet in a hidden area of the target electrical switch cabinet as hidden equipment information, wherein the hidden equipment information comprises a two-dimensional code tag positioned inside the target electrical switch cabinet;
verifying the hidden equipment information according to the instruction data packet;
If the identity verification result passes the identity verification and the equipment verification, a consistency verification result passing the identity verification is returned to the server;
If not, returning an inconsistent verification result of identity verification and equipment verification to the server;
wherein,
The step of generating a command data packet according to the target electrical switchgear and the corresponding target operator, comprises,
Generating and obtaining equipment information according to the number of the target electrical switch cabinet;
Combining the equipment verification instruction and the equipment information to obtain equipment verification information;
extracting the characteristics of the biological information of the target operator to obtain the identity characteristics of the target operator;
generating identity verification information according to the identity characteristics of the target operator, and encrypting the equipment verification information to obtain equipment verification encryption information;
Generating and obtaining the instruction data packet according to the number of the target electrical switch cabinet, the equipment verification encryption information and the identity verification information;
the step of generating authentication information according to the identity of the target operator and encrypting the device authentication information to obtain device authentication encryption information comprises,
Acquiring an irreversible digital abstract of the identity characteristic of the target operator according to a generation algorithm;
Splitting the digital abstract of the identity characteristic of the target operator into an explicit digital field and an implicit digital field;
encrypting the equipment verification information by using the implicit number field as a secret key to obtain equipment verification encryption information;
combining the generation algorithm with the explicit digital field to obtain authentication information;
the step of obtaining an irreversible digital digest of the identity of the target operator according to a generation algorithm, comprising,
Obtaining numerical distribution of the identity characteristics of the target operator in a plurality of characteristic dimensions according to the identity characteristics of the target operator;
For each characteristic dimension, obtaining a conventional distribution interval of a target operator on the corresponding characteristic dimension according to the corresponding numerical distribution;
Combining the data information of each characteristic dimension and the corresponding conventional distribution interval into a characteristic data set;
Distributing each characteristic data group to an explicit data block or an implicit data block according to a corresponding conventional distribution interval;
acquiring an explicit data block and an irreversible digital abstract of the implicit data block according to a generation algorithm, and combining to obtain the digital abstract of the identity feature;
The step of obtaining a conventional distribution interval of the target operator in the corresponding characteristic dimension according to the corresponding numerical distribution for each characteristic dimension comprises the following steps,
For each of the feature dimensions,
Acquiring a sequential ordering sequence of corresponding values as a value sequence according to the corresponding value distribution;
Obtaining the difference value of all adjacent two values in the value sequence;
calculating and obtaining the average value of the difference values of all two adjacent values in the value sequence as a screening calibration value;
Removing the numerical value, which is smaller than the screening calibration value and is different from the adjacent numerical value, in the numerical value sequence as an abnormal value;
And acquiring a distribution interval of the numerical values in the numerical value sequence after abnormal values are removed as a conventional distribution interval of a target operator in the characteristic dimension.
CN202310814395.8A 2023-07-05 2023-07-05 Energy isolation processing method and visualized intelligent power cut and transmission information management system Active CN116780778B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310814395.8A CN116780778B (en) 2023-07-05 2023-07-05 Energy isolation processing method and visualized intelligent power cut and transmission information management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310814395.8A CN116780778B (en) 2023-07-05 2023-07-05 Energy isolation processing method and visualized intelligent power cut and transmission information management system

Publications (2)

Publication Number Publication Date
CN116780778A CN116780778A (en) 2023-09-19
CN116780778B true CN116780778B (en) 2024-07-09

Family

ID=88011378

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310814395.8A Active CN116780778B (en) 2023-07-05 2023-07-05 Energy isolation processing method and visualized intelligent power cut and transmission information management system

Country Status (1)

Country Link
CN (1) CN116780778B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600183A (en) * 2018-03-28 2018-09-28 湖南东方华龙信息科技有限公司 Target device control method

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7761910B2 (en) * 1994-12-30 2010-07-20 Power Measurement Ltd. System and method for assigning an identity to an intelligent electronic device
CN104065652B (en) * 2014-06-09 2015-10-14 北京石盾科技有限公司 A kind of auth method, device, system and relevant device
CN109951489B (en) * 2019-03-27 2020-11-03 深圳市网心科技有限公司 Digital identity authentication method, equipment, device, system and storage medium
CN214670762U (en) * 2020-12-25 2021-11-09 国家能源集团宁夏煤业有限责任公司 Energy isolation locking tag hanging system
CN113421360A (en) * 2021-06-11 2021-09-21 北京必可测科技股份有限公司 Safety operation control system and method based on man-machine bidirectional intelligent identification switch cabinet
CN113918904B (en) * 2021-10-12 2024-10-18 工银科技有限公司 Data processing method and device, electronic equipment and computer readable storage medium
CN114142383B (en) * 2021-12-03 2024-02-09 厦门华数电力科技有限公司 Misoperation preventing method in distribution network process

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600183A (en) * 2018-03-28 2018-09-28 湖南东方华龙信息科技有限公司 Target device control method

Also Published As

Publication number Publication date
CN116780778A (en) 2023-09-19

Similar Documents

Publication Publication Date Title
CN110602455B (en) Video storage system, video processing method, device, equipment and storage medium
US9531705B1 (en) Systems and methods for computer digital certificate management and analysis
CN108347361B (en) Application program testing method and device, computer equipment and storage medium
CN111106671B (en) Five-prevention management control method and system for substation coded lock
US10229291B2 (en) Method and system for cryptographically enabling and disabling lockouts for critical operations in a smart grid network
CN111949718A (en) Data anomaly analysis method based on cloud computing
CN116780778B (en) Energy isolation processing method and visualized intelligent power cut and transmission information management system
CN110912915B (en) Communication safety early warning system based on data acquisition
CN111611624A (en) Verification method and system for information point table file partition digital signature
CN112163036A (en) Block chain information construction and query method and related device
CN106896792B (en) Method of data synchronization and device
EP4220518A1 (en) Blockchain network-based device management method, related device, and storage medium
US10063348B2 (en) Retransmission data processing device, retransmission data communication device, retransmission data communication system, retransmission data processing method, retransmission data communication method, and non-transitory computer readable medium for detecting abnormality by comparing retransmission data to transmission data
CN112184478B (en) Method and system for controlling boundary operation equipment in heterogeneous system in distribution network fault recovery
CN112825093B (en) Security baseline checking method, host, server, electronic device and storage medium
CN114499880A (en) Method and device for transmitting operation and maintenance data of gas turbine
CN118264424A (en) Management method of LED display screen control system and related equipment thereof
CN105228138A (en) A kind of safety detecting method of Wireless Communication Equipment and system
CN113507499B (en) Smart campus dormitory-checking system based on big data
JP6461837B2 (en) Information processing apparatus, system, program, and method
CN113593082B (en) Five-prevention lockset management method and system based on blockchain
Kwon et al. Recovery measure against disabling reassembly attack to DNP3 communication
CN110569646B (en) File recognition method and medium
CN117640149A (en) Security authentication method and power distribution system
CN110972141B (en) Information verification method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant