Unlock instant, AI-driven research and patent intelligence for your innovation.

A power facility protection system based on passive intelligent lock and its execution flow

A protection system and power facility technology, applied in the transmission system, digital transmission system, information technology support system, etc., can solve the problems of not knowing who opened the equipment, inaccurate lock registration, and difficulty in managing multiple keys. Unauthorized access control and key private allocation, easy management and system audit, enhanced protection and security

Active Publication Date: 2022-05-20
WUXI VOCATIONAL & TECHN COLLEGE
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] On the one hand, the traditional mechanical lock keys have brought many problems to the daily operation and management: first, the locks are not highly anti-theft, and the lock itself is rusted, posing serious safety hazards; second, too many keys make management more difficult, There are problems such as inaccurate lock registration, lock change unchanged and timely update, etc.
Third, the mechanical lock cannot audit the switching status of the device, and does not know when and where the device was opened by whom; fourth, the management side cannot know the status of the device in time, and even the lock is always in a damaged state, and no one cares about it.
Fifth, operation and maintenance personnel need to carry a large number of keys, making it inconvenient for users to manage keys
At the same time, the use of traditional mechanical locks for security protection is difficult to meet the physical and environmental security requirements of equal security and secret evaluation
[0005] On the other hand, some of the existing schemes using smart locks are basically put forward before the release of the security and secret evaluation, and the requirements of security and secret evaluation were not taken into account in the design of the scheme, and some of them did not meet the requirements. design, such as using unsafe cryptographic algorithms that have been cracked or cryptographic algorithms that do not meet the requirements of the national cryptographic management department, such as SHA-1 algorithm, MD5 algorithm, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A power facility protection system based on passive intelligent lock and its execution flow
  • A power facility protection system based on passive intelligent lock and its execution flow
  • A power facility protection system based on passive intelligent lock and its execution flow

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Embodiment, the composition of the present embodiment system is as figure 1 As shown, the system consists of a management subsystem, a smart key management device, a smart key and a smart lock.

[0057] The composition of the management subsystem of this embodiment is as follows: figure 2 As shown, the management subsystem manages all devices, issues electronic access tokens to legal smart keys, and performs log audit on the system. The management subsystem includes the device communication module, management module, access control module, log audit module, database, and password module. The functions of each module are as follows. The communication module is a module for long-distance wired or wireless communication with the smart key management device; The management module is mainly to manage the equipment; the access control module is to manage the access control list rules of the smart key to the smart lock; the log audit module is to audit the system log and ide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a power facility protection system based on a passive intelligent lock and its execution flow. In the system, the management subsystem manages all equipment, issues electronic access tokens to legal intelligent keys, and performs log auditing; the intelligent key management equipment serves as The agent of the smart key communicates with the management subsystem; when there is an electronic access token matching the target smart lock inside the smart key, identity authentication is performed between the smart lock and the smart key, and the smart lock can only be opened after passing. The execution process of the system is as follows, ① management subsystem initialization; ② device registration; ③ applying for a smart key from the smart key management device; ④ accessing the smart lock with the smart key; ⑤ returning the smart key to the smart key management device. The present invention is designed according to the requirements of the security and secret evaluation regulations, and the encryption module used is also a password module approved by the State Encryption Administration, so the whole system can be applied to the security system.

Description

technical field [0001] The invention relates to the technical field of industrial control safety, in particular to a power facility protection system based on a passive intelligent lock and its execution flow. Background technique [0002] There are a large number of indoor and outdoor power-related equipment in my country's power industry distribution network, and the safety protection of these equipment basically adopts traditional mechanical locks. [0003] In 2019, the network security level protection 2.0 (hereinafter referred to as "level protection") was officially implemented; in the same year, the security evaluation of commercial encryption applications (hereinafter referred to as "secret evaluation") was also implemented on a pilot basis. The information system of the electric power industry belongs to the information system within the scope of class security and secret evaluation, and should be constructed in accordance with the requirements of class security and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00H04L9/06H04L9/32H04W4/80
CPCG07C9/00571G07C9/00658G07C9/00896H04L9/0618H04L9/0631H04L9/3273H04L9/3228H04W4/80Y04S40/20
Inventor 杨先伟战学秋朱翔屈寅春
Owner WUXI VOCATIONAL & TECHN COLLEGE