Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wind power plant information security system based on identity authentication and maintenance method

A technology for information security systems and wind farms, applied in transmission systems, electrical components, etc., can solve problems such as reduced security, damage to unit components, and inconsistent keys, and achieve the effect of ensuring security

Active Publication Date: 2021-10-22
SHANGHAI ELECTRIC WIND POWER GRP CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the tower doors of domestic wind turbines are mostly keyed door locks. Due to long-term exposure to the outside of the tower, they are easily corroded by rain or air. After a long time, the key cannot be used to open the door. Lock
Since the tower door lock is a key door lock, it is easy to be violently destroyed by criminals who enter the tower to steal wind turbine equipment
Easy to cause damage and loss of unit components
And because there are many wind turbines in the wind farm, if all the wind turbines use the same key, the security will be reduced, or if the keys of each unit are not uniform, it is often easy to take the wrong key and affect the maintenance efficiency of the wind turbines
And at present, the maintenance personnel who enter the unit can only be recorded through the key record book of the maintenance personnel on duty in the wind farm, which is easy to miss and misremember

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wind power plant information security system based on identity authentication and maintenance method
  • Wind power plant information security system based on identity authentication and maintenance method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further elaborated below by describing a preferred specific embodiment in detail in conjunction with the accompanying drawings.

[0041] Such as figure 1 As shown, a wind farm information security system based on identity authentication includes: a wind farm maintenance control system and an authorization end; the wind farm maintenance control system distributes different types of maintenance information to the authorization end; a verification end, which is connected to In the wind farm maintenance control system, it is used to read the authority information stored in the authorization terminal, and to verify the authority information; the wind turbine controller is connected to the verification terminal and the wind farm maintenance control system, and is used to receive verification The maintenance information read by the end, and perform corresponding operations according to different types of maintenance information. Further, the abov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wind power plant information security system based on identity authentication and a maintenance method. The wind power plant information security system comprises a wind field maintenance control system and an authorization end, wherein the wind field maintenance control system distributes different types of maintenance information to the authorization end; a verification end used for reading the maintenance information stored in the authorization end and verifying the maintenance information; and a wind-driven generator controller connected to the verification end, and used for receiving the maintenance information read by the verification end after the verification end verifies the maintenance information, and executing corresponding operations according to different types of maintenance information. According to the invention, a unauthorized person can be prevented from logging in the system to operate the wind-driven generator, information and operation of logging in the system by maintainers can be recorded, and maintenance work of the wind-driven generator is facilitated.

Description

technical field [0001] The invention relates to a wind power plant, in particular to an identity authentication-based wind power plant information security system and maintenance method. Background technique [0002] At present, the tower tube door of domestic wind turbines is currently the key door lock for most wind turbines in China. Due to long-term exposure to the outside of the tower tube, it is easily corroded by rain or air. After a long time, the key cannot be used to open the door. Lock. Because the tower tube door lock is a keyed door lock, it is easy to be violently destroyed by criminals who enter the tower tube to steal wind turbine equipment. It is easy to cause damage and loss of unit components. And because there are many wind turbines in the wind farm, if all the wind turbines use the same key, the security will be reduced, or if the keys of each unit are not uniform, it is often easy to take the wrong key and affect the maintenance efficiency of the wind...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/12
Inventor 韦永清顾丽娜梅乐孙佳林
Owner SHANGHAI ELECTRIC WIND POWER GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products