Electrical anti-misoperation locking system and anti-misoperation locking method based on iris identification

A technology of anti-mislocking and identity recognition, applied in character and pattern recognition, electrical components, circuit devices, etc., can solve problems such as easy loss, inability to control and record illegal operators, poor password storage, etc.

Inactive Publication Date: 2010-05-12
XIAN HUAHONG INTELLIGENT SCI & TECH CO LTD
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above-mentioned traditional anti-mistake locking methods have their own advantages and disadvantages, and each has a certain range of applications, and the anti-mistake function also has certain limitations.
①The traditional anti-misoperation locking method mainly realizes the locking through the auxiliary contact connection of related equipment, and the locking is reliable; but it needs to connect a large number of secondary cables, the wiring method is more complicated, and the operation and maintenance are more difficult; ②The traditional anti-misoperation locking method is generally It can only prevent the misoperation of switches, spacers and floor knives, but it can’t do anything about strayed into live intervals, hooking (removal) of grounding wires, etc.; A large number of keys will bring inconvenience to the switching operation; ④The last and most important thing is that the complete "five defenses" function cannot be realized
Although the microcomputer anti-misoperation locking method is the development direction of anti-misoperation locking, its inherent weaknesses cannot but arouse our attention
[0006] In addition to the reasons for equipment reliability, from the perspective of the process of misoperation, misoperation consists of three parts, which are caused by misoperations of operating personnel, maintenance personnel and other personnel. Microcomputer anti-misoperation is only for misoperations of operating personnel. , mistakenly closing the knife switch and switch, mistakenly entering the interval, etc. are likely to cause serious accidents. It can only meet the operating requirements of operators, and cannot completely solve the problem of misoperation by maintenance personnel and other personnel. For maintenance personnel, misoperation It mainly occurs during maintenance and testing, and is not under the control of the computer error prevention system. For old substations, it can be solved by properly retaining some old locking methods during the transformation process; for new substations, directly install computer As far as the error prevention device is concerned, this problem can only be solved by management means. In addition, although the operation of the secondary part of the substation is reflected in the error prevention system, it is not included in the operating rules, that is, there is no locking , can only rely on the technical level and sense of responsibility of the operating personnel to ensure that this part does not go wrong.
[0007] At present, the identity authentication scheme of the microcomputer five-defense operating system for the operator generally adopts the method of password authentication during operation. If the password is correct, the operation with the corresponding authority is allowed, otherwise the operation is prohibited. The shortcomings of easy loss and cumbersome use often make it impossible to effectively control and record illegal operators, and the following problems often occur:
[0008] 1>. Due to the poor storage of passwords, people without operating authority log in illegally and operate in violation of regulations;
[0009] 2>. Because the user forgets the login password, it is impossible to prevent misoperation;
[0010] 3>. Due to poor password management, the operator performs operations beyond their own authority, such as illegally modifying logical relationships, illegally modifying system configuration, etc.;
[0011] 4>. It is difficult to have a one-to-one correspondence between the operation password and the operator, and it is impossible to carry out effective records, and it is impossible to take responsibility for any problems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electrical anti-misoperation locking system and anti-misoperation locking method based on iris identification
  • Electrical anti-misoperation locking system and anti-misoperation locking method based on iris identification
  • Electrical anti-misoperation locking system and anti-misoperation locking method based on iris identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] Such as figure 1 The shown is a power mistake-proof locking system based on iris identification, including a "five-defense" monitoring host 1 and a computer key 2 connected to the "five-defense" monitoring host 1 and correspondingly unlocking and controlling the coded lock system 3, It also includes an iris identification device 4 connected with the "five defenses" monitoring host 1. The iris identifier 4 includes an iris information collection module 4-1 and a main control module 4-2 connected with the iris information collection module 4-1 and analyzing and processing the collected information and realizing automatic personal identity authentication. The main control module 4-2 is connected with the "five defenses" monitoring host 1. The coded lock system 3 includes various coded locks such as intelligent locks, remote locking relays, electric coded locks, and mechanical coded locks.

[0071]In this embodiment, the iris information collection module 4-1 includes an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electrical anti-misoperation locking system and an anti-misoperation locking method based on iris identification. The system comprises a five-anti monitoring computer, a computer key and an iris identification unit, wherein the computer key is connected with the five-anti monitoring computer and carries out unlocking control on a code lock system, and the iris identification unit is connected with the five-anti monitoring computer and is formed by an iris information acquisition module and a main control module. The method comprises the following steps: 1. acquiring the iris image; 2. using the main control module to analyze the obtained iris image and realize automatic personal identity authentication, namely matching, specifically comprising image processing, characteristic extraction and characteristic matching; and 3. using the five-anti monitoring computer to correspondingly carry out unlocking control on the computer key according to the matching results transmitted by the main control module. The invention features reasonable design, simple and convenient use and operation, flexible operating mode, highest identification accuracy, fast speed and strongest anti-counterfeit capacity, and can effectively overcome various defects and shortcomings in the current electrical anti-misoperation locking systems.

Description

technical field [0001] The invention belongs to the technical field of electric power mis-locking prevention, and in particular relates to an electric power mis-prevention locking system and an anti-misoperation locking method based on iris identification. Background technique [0002] The electrical misoperation of the substation may cause large-scale power outages, equipment damage, personal casualties, and even cause serious consequences such as grid oscillation and disintegration. In the face of countless bloody lessons, my country's power system, combined with the practice of Chinese and foreign electrical operations, in order to effectively prevent the operation of electrical equipment In 1980, the former Ministry of Water Resources and Electric Power listed the prevention of electrical misoperation accidents as a major technical problem that urgently needs to be solved in power production. And in 1990, the requirement of "five defenses" for electrical equipment was put...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H02J13/00G07C9/00G06K9/00G06K9/62
Inventor 甄为忠齐春
Owner XIAN HUAHONG INTELLIGENT SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products