Unattended security protection system of transformer substation

A technology for security systems and substations, applied to instruments, individual input/output port registers, time registers, etc., can solve the problems of employee ID or ID card being easily stolen, poor flexibility, power supply failure, etc., to achieve Save labor costs and resources, and use flexible effects

Active Publication Date: 2014-12-03
STATE GRID CORP OF CHINA +1
View PDF9 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, in order to prevent illegal personnel from entering the substation, two methods are generally adopted. One method is that the staff is on duty, or the staff conducts inspections, but this method causes a waste of human resources and cannot always be effective. To achieve an effective security function, once someone breaks in illegally, there is no guarantee that they will be found every time; another way is to achieve through the access control system, through the employee's work number (that is, password method), work card or fingerprint to discharge Illegal personnel, but these methods still have shortcomings. For example, the employee number or badge is easy to be stolen and cause illegal personnel to break in. Compared with the first two verification methods, fingerprints are safer, but there is still the possibility of being stolen. Moreover, the flexibility is poor. Even if the access control system is adopted, on-duty personnel are still required, and it is difficult to feed back the on-site situation to the monitoring center in time.
[0004] There is still a common problem with the access control system or manual inspection in the prior art. When someone enters the substation and performs illegal actions on the power supply equipment, such as malfunctioning or stealing equipment, the alarm cannot be given in time, resulting in power supply failure. failure and serious economic loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unattended security protection system of transformer substation
  • Unattended security protection system of transformer substation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] figure 1 It is a block diagram of the present invention, figure 2 It is the work flow diagram of the present invention, as shown in the figure, a substation unattended security system provided by the present invention includes at least an access control system, and also includes:

[0029] The image detection equipment outside the station is set outside the entrance of the substation to obtain and output the head portrait information of the human body within the detection range. The image detection equipment outside the station uses a camera to obtain the head portrait information of the person entering the detection range. facial information;

[0030] The verification server is used to receive and process the human head portrait information output by the image detection equipment outside the station. The processing includes denoising, grayscale and other processing, so that the acquired human face information is clear and easy to compare, and the pre-stored work The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an unattended security protection system of a transformer substation. The unattended security protection system at least comprises a door control system, an outside-the-station image detection apparatus, an authentication server and an authentication terminal. The outside-the-station image detection apparatus is used for detecting people going in the transformer substation, the authentication server and the authentication terminal are used for verification, and then the door control system is controlled to act. Therefore, the round-the-clock security protection monitoring can be carried out on the substation, illegal people can be effectively stopped outside the substation, the security of power transformation devices can be ensured and the power transformation devices can be prevented from being operated illegally; besides, manual intervention is reduced, no full-time staff is required for watching, and thus the manpower resource and the cost are saved.

Description

technical field [0001] The invention relates to a security system, in particular to an unattended security system for a substation. Background technique [0002] The substation is a place to change the voltage, which can enable long-distance transmission of electric energy. The stability of the substation is the basis for realizing stable power supply. The stability of the substation includes the power supply equipment in the substation without failure and continuous work, and also includes the security of the substation, such as whether Illegal personnel enter the substation, whether there are illegal personnel mishandling and other non-operations on the equipment in the substation, etc. [0003] In the prior art, in order to prevent illegal personnel from entering the substation, two methods are generally adopted. One method is that the staff is on duty, or the staff conducts inspections, but this method causes a waste of human resources and cannot always be effective. To...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 李褔昌张航彭庆宇曾礼强
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products