GOOSE (generic object oriented substation event)-based five-prevention locking method of measuring and controlling device

A technology of measurement and control devices and locking contacts, which is applied in the direction of circuit devices, electrical components, information technology support systems, etc., can solve problems such as repetitive and cumbersome configuration, reduced reliability, and inconsistent databases, so as to improve operational safety and avoid misuse problem effect

Active Publication Date: 2011-08-17
NR ELECTRIC CO LTD +1
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The independent microcomputer five-defense system obtains real-time data through communication with the background network, but due to repetitive and cumbersome configuration, it is prone to database inconsistency errors and lower reliability; for offline devices, the corresponding operation permissions are judged and downloaded before operation Into the computer key, it is impossible to reflect the actual changes on site in real time, which is easy to cause misoperation; at the same time, during the operation of the offline device, the error prevention host cannot obtain the execution status of the operation in real time, and the return of the computer key can only indicate that the program of the computer key is completed , but can not reflect the real operation of the equipment and the lock
At present, some relevant units have proposed an integrated five-defense system, but this system only solves the consistency of the database maintenance of the original five-defense system, and cannot solve the existing offline operation problems
[0004] At the same time, there have been two independent five-proof billing systems in the scheduling and monitoring background, and there has always been a mutual exclusion problem between scheduling and monitoring.
How to ensure that the scheduling operation and the monitoring background operation do not affect each other and are independent of each other has always been the difficulty of the five-proof operation ticket system; at present, in most factories and stations, most of the scheduling systems are not open to directly control primary equipment, and are mostly completed by the following monitoring system , but this approach is obviously not in line with the future development direction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Backstage five anti-machines:

[0020] The background adopts an integrated five-defense platform, and the detailed plan is as follows:

[0021] 1. The monitoring background can reflect the actual location of each operation object in real time, and define a device type for each operation object to meet the different operation requirements of different objects. Under normal circumstances, the monitoring operation sequence flag (JKCZ) of each operation object is set to 0, and the monitoring five-defense-point permission flag (JKWF_EnaOpn) and monitoring five-defense combination permission flag (JKWF_EnaCls) of each operation object are calculated in real time; when running After the personnel write the operation ticket, after completing the rehearsal, set the JKCZ of the operation object of the current step to 1, and set the JKCZ of other operation objects to 0; send the (sub-permission flag) JKWF_EnaOpn and combination permission flag (JKWF_EnaCls) to the corresponding op...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a five-prevention locking method which takes a measuring and controlling device as the core and is based on a GOOSE (generic object oriented substation event) exchanging mechanism. The measuring and controlling device and a background are used for performing interactive operation ticket permission through the GOOSE way and monitoring opening and closing permission virtual marker bits in the downlink direction, and further performing five-prevention logic output of locking contact points according to the marker bits of the background and a separation layer of the measuring and controlling device so as to ensure correctness of operation; in the uplink way, a collection switch auxiliary contact and an auxiliary contact point of an electromagnetic lock are used for feeding back the operation process, thereby realizing real-time on-line monitoring of the operation of a full station. Through the technical scheme of the invention, the five-prevention program locking taking the measuring and controlling device as the core can be realized through the separation layer, the probability of false operation of a substation is reduced, the three-layer five-prevention check of dispatching remote control is further realized, and the repulsion problem of operation tickets of simultaneous operation of dispatching and the background is solved.

Description

technical field [0001] The invention relates to a microcomputer five-prevention system for realizing on-line monitoring of anti-mislocking of a substation by cooperating with a station control layer monitoring system and a bay layer control system in a substation. Background technique [0002] The equipment in the power system needs to be operated due to the change of operation mode and the need for maintenance and repair. In order to ensure possible misoperation during the operation of the substation, it is necessary to prevent possible misoperation by formulating anti-misoperation locking operation procedures. The most widely used at present is the traditional microcomputer anti-misoperation locking system. The microcomputer anti-misoperation locking system is mainly composed of three parts, namely the anti-mistake host (or five anti-simulation screens), computer keys and on-site locks. It is characterized by the anti-mistake host (or five-proof simulation screen), which ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H02J13/00
CPCY02E60/723Y04S10/16Y02E60/00
Inventor 熊慕文滕井玉笃峻王文龙陈桂友李俊格施永健
Owner NR ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products