Intelligent lock-control system for electric power safety

A safe and intelligent technology for electric power, applied in instruments, time registers, single input/output registers, etc., can solve the problems of potential safety hazards, easy accidents, easy to go to the wrong position, etc., to achieve convenient operation and The effect of carrying and managing comprehensively and avoiding wrong positions

Inactive Publication Date: 2011-05-04
ZHUHAI LIXIANG TECH
4 Cites 35 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0002] In the important areas of substations/power plants, there are access doors (such as: high-voltage room doors, relay room doors, safety equipment room doors, communication room doors, offices, conference rooms, reference rooms, staff dormitories), various equipment boxes, etc. Cabinet doors (such as: protection cabinet doors, monitoring cabinet doors, terminal box doors, mechanism box doors, HSBC cabinet doors, frame ladder doors) and various manual equipment operating mechanisms, locks are usually u...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

[0062] As shown in Figure 4, a unique magnetic coupling communication/charging design is adopted between the smart key and the smart key transmission/charger, which not only maintains accurate communication between the two, but also charges the smart key, ensuring extremely high Communication and charging reliability, the communication rate can reach 19200Bit/s. The key-side magnetic coupling coil and the external transmission/ch...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention discloses an intelligent lock-control system for electric power safety, which has the advantages of reasonable structure, safety, reliability, and high work efficiency. The system comprises an administrator workstation, a master control machine communicated with the administrator workstation through a local communication network, an intelligent key and locksets arranged on terminal places, wherein unlocking scope data of different rank personnel is stored in the master control machine, the unlocking scope data comprises the scope of opening locksets and RFID (Radio Frequency Identification Device) code value corresponding to an RFID code piece in each lockset; and before the unlocking personnel takes away the intelligent key, the personnel needs to affirm identity on the master control machine, then the master control machine transfers the set unlocking scope data to the intelligent key, at last, the intelligent key judges whether to unlock through distinguishing the RFID code value in the lockset. The system can provide an effective technical method for strengthening personnel access management and equipment using management of a transformer station and a power station, improving work efficiency, and ensuring safe production.

Application Domain

Technology Topic

Image

  • Intelligent lock-control system for electric power safety
  • Intelligent lock-control system for electric power safety
  • Intelligent lock-control system for electric power safety

Examples

  • Experimental program(2)

Example Embodiment

[0028] Example one:
[0029] Such as figure 1 As shown, this solution is composed of administrator workstation, local area communication network, main control machine (embedded main control machine), smart key (Smart Key), locks and other components. Each lock is equipped with different RFID chips. ; The administrator workstation is configured in a higher-level department with operational and safety management functions (such as: dispatch center, substation management station, substation area, centralized control center, etc.), and the system administrator can set or change personnel permissions through the LAN, Safety supervisors can inquire and count the unlocking records.
[0030] As the main control unit of the system, the main control machine is an embedded main control machine and is equipped with lock control management software. It consists of an ARM11 embedded industrial computer, a 12-inch TFT color LCD touch screen, a high-pixel fingerprint reader, an RFID card reader, and a The gated smart key storage compartment, smart key transmission/charger and other components are composed of components such as figure 2 Shown. The main control machine stores the unlocking range data of different levels of personnel, and the unlocking range data includes the range of whether the lock can be opened and the RFID code value corresponding to the RFID chip in each lock. The staff can set or change the authority of other staff in the local master computer or the administrator workstation through the local area communication network by WEB.
[0031] Among them, the RFID card reader and fingerprint reader are used to identify the identity of the unlocking personnel, and the staff can choose a certain verification method according to the actual use needs; among them, the smart key transmission/charger is set in the smart key storage bin and can be inserted into the smart key. The key then transmits the unlocking range data of the identified person to the smart key.
[0032] The internal software of the main control machine divides the unlocking authority into seven levels according to different types of users, namely: system administrator, safety supervisor, person in charge of duty, operation personnel, maintenance personnel, sanitation and cleaning personnel, and construction personnel from outside units.
[0033] The system administrator has the highest level and is the administrator of the system, who can set or change the authority of other personnel in the local master computer or through the local area communication network by WEB.
[0034] Safety supervisors include safety specialists, factory managers, site managers, etc., who have the largest unlocking authority (open all locks) and can query unlocking records.
[0035] The person in charge on duty has the largest unlocking authority and can delineate the scope of unlocking by construction personnel and sanitation and cleaning personnel from outside units.
[0036] The operating personnel (referring to the personnel responsible for the operation of the substation/power plant equipment and the detection of the running status) have the authority to unlock doors or equipment within the scope of their duties.
[0037] Maintenance personnel (referring to the personnel responsible for the maintenance of substation/power plant equipment) unlock doors or equipment within the scope of their duties.
[0038] Sanitation and cleaning staff can unlock the lock in the set area for a long time, or the supervisor on duty can deline the unlocking range for them.
[0039] Construction personnel from outside units (referring to personnel from outside units such as civil construction, equipment installation, equipment maintenance, etc.) do not have a fixed unlocking range. Before work, the shift leader must delineate the unlocking range for them according to the content of the work ticket.
[0040] The above authority definition can be defined and modified by the system administrator according to different application occasions.
[0041] The main control computer graphically displays all doors or equipment included in the management range. The system administrator can delineate the fixed unlocking range of different levels of personnel through the graphical interface; the shift leader can delineate the unlocking for the construction personnel or sanitation and cleaning personnel of the outside unit according to the content of the work ticket range.
[0042] In this embodiment, the main control machine is mainly configured as follows:
[0043] 1.ARM11 embedded industrial computer
[0044] CPU: Samsung S3C6410, ARM11 core, 16/32-bit RISC (reduced instruction), clocked at 533MHz;
[0045] Storage space: RAM 128MB, flash memory 2GMB, built-in 2G SD card;
[0046] Two-channel audio: power 20W;
[0047] Mini microphone: sensitivity -48±3Db, frequency response 100~10KHz, signal to noise ratio>60Db;
[0048] Communication interface: dual 10M/100M adaptive Ethernet, one 802.11g wireless Ethernet, four USB2.0, four Rs232;
[0049] 2. TFT color LCD touch screen: 12 inches, 1024x768 dot matrix, 6.5K color, LED backlight, resistive touch screen;
[0050] 3. High pixel fingerprint reader
[0051] a) Pixel: 500dpi;
[0052] b) Fingerprint capacity: 3000 pieces (optional);
[0053] c) Record capacity: 50000 records (optional);
[0054] d) Rejection rate: ≤0.01%;
[0055] e) False recognition rate: ≤0.0001%;
[0056] f) Fingerprint recognition time: ≤1.2s;
[0057] g) Effective collection area: 18mm×16mm;
[0058] 4. RFID card reader: card reading frequency 125KHz, reading distance up to 120mm;
[0059] 5. Smart key storage compartment with door control: it can store four smart keys and two emergency unlock keys;
[0060] 6. Intelligent key transmission/charger: adopts the working principle of magnetic coupling, no contact, the maximum charging power can reach 5W, and the communication rate can reach 19200Bit/s;
[0061] Smart Key, as the main unlocking tool of this system, includes embedded MCU and reading dock, unlocking mechanism, magnetic coupling communication charging module, keyboard and power supply, etc. image 3 Shown. After the smart key receives the unlocking range data from the host computer, it uses the reading dock to read the RFID code value in the lock when unlocking, and compares it with the corresponding RFID code value in the received unlocking range data to determine whether it meets the unlocking conditions. The unlocking mechanism can be activated only when the conditions are met; the unlocking cannot be performed if the conditions are not met. Record related operation information after unlocking operation, and automatically return all unlocking operation records and read RFID card unlocking information after inserting the smart key transmission/charger. The main control machine can record 15536 ​​unlocking records at most, and it will be rolled over after exceeding. The above-mentioned unlocking information includes: unlocking person, unlocking object and time, locking situation and time (part of the door or equipment), unsuccessful unlocking object and time, etc., and can be stored for more than ten years. After the unlocking operation is completed, the smart key will return the unlocking information to the master computer through the magnetic coupling communication charging module, and the master will return the unlocking information to the administrator workstation for statistics, and it can be on the local master computer or through the local communication network Query unlocking records in WEB mode, there are three query methods by personnel, by time (year, month, day, interval), by door or equipment, which can form reports and can be transmitted online.
[0062] Such as Figure 4 As shown, a unique magnetic coupling communication/charging design is adopted between the smart key and the smart key transmission/charger, which not only maintains accurate communication between the two, but also charges the smart key, ensuring extremely high communication and charging reliability. The communication rate can reach 19200Bit/s. The key end magnetic coupling coil and the external transmission/charger end magnetic coupling coil form a magnetic coupling loop to generate a magnetic field change signal. The key end magnetic coupling coil converts the magnetic field change signal into an electrical signal, and then passes the bridge rectifier The modulation/demodulation circuit modulates the Uart signal and transmits it to the main control circuit. When the information is returned, the process is reversible.
[0063] The locks in this system include padlocks, room door locks, secondary equipment cabinet door locks, terminal box/institution box door locks, and RFID electronic control locks. Padlocks, room door locks, secondary equipment cabinet door locks, terminal box/institution box door locks are all "one key pass" locks, with RFID chips inside, which can be identified and opened by smart keys; RFID electric locks are used in offices , Meeting rooms, data rooms, staff dormitories and other places with confidentiality requirements, the smart key can authorize, unlock and unlock information inquiries on the RFID electronic control lock, and the unlock information is transmitted back to the master computer through the smart key.

Example Embodiment

[0064] Embodiment two:
[0065] Such as Figure 5 As shown, the difference between this embodiment and the first embodiment is that the master computer in the system includes two parts, namely a PC and a smart key transmission/charger. The smart key transmission/charger is an independent component and is The PC communicates. At this time, the PC has a user-defined display, and is also connected with an RFID card reader and a fingerprint recognizer. When a staff member needs to unlock, perform identity verification on the PC, delineate the person's unlocking range data, and then communicate with the smart key transmission/charger to transmit the data to the smart key transmission/charger; at this time, the smart key transmission/charge The indicator light of the corresponding key in the device will be on, and at the same time, the smart key transmission/charger and the smart key will transmit data to the key through magnetic coupling communication. The other features of this embodiment are the same as those of the first embodiment. The advantage of this system is that the personnel authority can be set or changed directly on the PC, and the security supervisor can query the unlocking record.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

PropertyMeasurementUnit
Snr>= 60.0
tensileMPa
Particle sizePa
strength10

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Classification and recommendation of technical efficacy words

  • Reasonable structure
  • Perfect process

A ceramic insulator device for high voltage capacitor

InactiveCN101546636ALow manufacturing costReasonable structureSuspension/strain insulatorsHigh voltage capacitorsEngineering
Owner:王海龙

NBR and PVC alloy rubber production technology

InactiveCN107418006APerfect processProcess stabilityCorrosionStearic acid
Owner:NINGBO SHUNZE RUBBER

Measuring asset management system and method based on mobile work

InactiveCN108376274AImprove sorting efficiency and accuracyPerfect processSustainable waste treatmentCo-operative working arrangementsCarrier signalManagement system
Owner:STATE GRID ZHEJIANG ELECTRIC POWER CO LTD QUZHOU POWER SUPPLY CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products