Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Use monitoring method and device of intelligent key

A smart key and intelligent technology, applied in the field of electric power, can solve the problems of low on-site operation efficiency, insufficient operation management and control ability of electric facilities, and inability to control electric facilities operation, etc., and achieve the effect of monitoring the scope of use.

Pending Publication Date: 2022-03-18
SHENZHEN COMTOP INFORMATION TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the operation and maintenance work in the station needs to complete the unlocking of the five-proof lock without switching operation protection. The traditional unlocking method is that the substation provides a universal mechanical five-proof key (referred to as "universal key") for manual unlocking. This traditional operation method only realizes manual control of the application process, and cannot effectively control the operation of power facilities, resulting in low efficiency of on-site operations
Therefore, a method and device for monitoring the use of smart keys are now provided to solve the problems of insufficient management and control of power facility operations and low efficiency of on-site operations in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Use monitoring method and device of intelligent key
  • Use monitoring method and device of intelligent key
  • Use monitoring method and device of intelligent key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0097] see figure 1 , figure 1 It is a schematic flowchart of a method for monitoring the use of a smart key disclosed in an embodiment of the present invention. in, figure 1 The described smart key use monitoring method can be applied to a smart key use monitoring device, wherein the device can include a smart key or a smart storage device (such as a smart key cabinet) or a power grid management system (grid management platform), the smart key The keys may be stored in a smart storage device. Wherein, the power grid management system may be a local power grid management system, or a power grid management cloud platform, which is not limited in this embodiment of the present invention. Such as figure 1 As shown, the usage monitoring method of the smart key may include the following operations:

[0098] 101. When detecting the user's use request triggered by the smart key of the smart five-proof lock, assign the user a smart key according to the use request.

[0099] In t...

Embodiment 2

[0154] see figure 2 , figure 2 It is a schematic flowchart of another smart key usage monitoring method disclosed in the embodiment of the present invention. in, figure 2 The described smart key use monitoring method can be applied to a smart key use monitoring device, wherein the device can include a smart key or a smart storage device (such as a smart key cabinet) or a power grid management system (grid management platform), the smart key The keys may be stored in a smart storage device. Wherein, the power grid management system may be a local power grid management system, or a power grid management cloud platform, which is not limited in this embodiment of the present invention. Such as figure 2 As shown, the usage monitoring method of the smart key may include the following operations:

[0155] 201. When detecting the user's use request triggered by the smart key of the smart five-proof lock, assign the user a smart key according to the use request.

[0156] 202....

Embodiment 3

[0168] see image 3 , image 3 It is a structural schematic diagram of an intelligent key usage monitoring device disclosed in an embodiment of the present invention. Wherein, the device may include a smart key or a smart storage device (such as a smart key cabinet) or a grid management system (grid management platform), and the smart key may be stored in the smart storage device. Wherein, the power grid management system may be a local power grid management system, or a power grid management cloud platform, which is not limited in this embodiment of the present invention. Such as image 3 As shown, the smart key usage monitoring device may include: a detection module 301, an allocation module 302, a monitoring module 303, a judgment module 304, a determination module 305, and an execution module 306, wherein:

[0169] The detection module 301 is configured to detect the user's use request triggered by the smart key of the smart five-proof lock.

[0170] The allocation mod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a use monitoring method and device for an intelligent key, and the method comprises the steps: distributing the intelligent key for a user according to a use request when the use request triggered by the user for the intelligent key of an intelligent five-prevention lock is detected, and monitoring the use condition of the intelligent key when the user obtains the intelligent key, monitoring information of the intelligent key is obtained, whether the user normally uses the intelligent key or not is judged according to the monitoring information of the intelligent key, and when it is judged that the user does not normally use the intelligent key, abnormal use information of the intelligent key is determined, and operation matched with the abnormal use information of the intelligent key is executed. According to the invention, the corresponding intelligent key is distributed to the user and the operation of the user is monitored in real time, so that the management and control capability of the operation of the electric power facility is improved and the operation efficiency is improved.

Description

technical field [0001] The invention relates to the field of electric power technology, in particular to a method and device for monitoring the use of an intelligent key. Background technique [0002] In the control and maintenance of the power facility system, the switching operation of the substation is one of the key and difficult tasks of the substation operation. It mainly relies on the five-proof system to complete the control of the on-site operation, and standardize the operation process of the on-site operation in management , effectively avoiding the risk of personal and equipment safety. However, the operation and maintenance work in the station needs to complete the unlocking of the five-proof lock without switching operation protection. The traditional unlocking method is that the substation provides a universal mechanical five-proof key (referred to as "universal key") for manual unlocking. This traditional operation method only realizes the manual control of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): E05B19/00E05B49/00E05B53/00
CPCE05B19/00E05B53/00E05B49/00
Inventor 谢路李锐赵铭林镇锋周海田松林刘兆平
Owner SHENZHEN COMTOP INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products