CN111162908A - Key solar power transmission line field operation method and system - Google Patents

Key solar power transmission line field operation method and system Download PDF

Info

Publication number
CN111162908A
CN111162908A CN201911268941.2A CN201911268941A CN111162908A CN 111162908 A CN111162908 A CN 111162908A CN 201911268941 A CN201911268941 A CN 201911268941A CN 111162908 A CN111162908 A CN 111162908A
Authority
CN
China
Prior art keywords
terminal
job
key
responsible
work
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911268941.2A
Other languages
Chinese (zh)
Other versions
CN111162908B (en
Inventor
段绍辉
宗伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Power Supply Bureau Co Ltd
Original Assignee
Shenzhen Power Supply Bureau Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Power Supply Bureau Co Ltd filed Critical Shenzhen Power Supply Bureau Co Ltd
Priority to CN201911268941.2A priority Critical patent/CN111162908B/en
Publication of CN111162908A publication Critical patent/CN111162908A/en
Application granted granted Critical
Publication of CN111162908B publication Critical patent/CN111162908B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/06Electricity, gas or water supply
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Abstract

The application relates to a key solar power transmission line field operation method and a key solar power transmission line field operation system. According to the key sun type power transmission line field operation method, the responsible terminal is used as the center, each operation terminal is arranged to be safely checked with the responsible terminal in advance in a key mode before operation, and the operation can be performed through unlocking operation permission at the rear part after checking, so that closed control over the power transmission line field operation process is achieved, and safety is greatly improved.

Description

Key solar power transmission line field operation method and system
Technical Field
The application relates to the technical field of transmission line field operation, in particular to a key solar transmission line field operation method and system.
Background
The field operation of the power transmission line includes four types, namely inspection operation, maintenance operation, overhaul operation and test operation. The field operation of the power transmission line relates to ten elements, wherein one element is a person, and the other nine elements are object elements used in the operation process, such as an operation vehicle, safety equipment, safety measures, operation equipment, an operation method, an operation position, an operation environment, an operation object, an operation ticket and the like. Each personal element and the matter element interact to form an operation link in the operation.
In the traditional scheme, the operation mode of the operation link is that a work person in charge designates a work class member to interact with corresponding matter elements, so that the operation link is completed. However, the conventional work method has a problem: in actual operation, operators or equipment which do not accord with operation regulations exist, and each operator or equipment can not meet the requirements only by means of commanding of a working responsible person on site, so that the safety of the field operation of the power transmission line is greatly critical, and meanwhile, the operation efficiency is low.
For example, there are operators who do not operate according to the job rules, operators who do not have the qualifications and capabilities, equipment used during the job do not meet the requirements of the job rules, and so on.
Disclosure of Invention
Therefore, it is necessary to provide a key sun-type transmission line field operation method and system for solving the problem that each operator or equipment is in accordance with requirements only by means of on-site command of a working responsible person, which is caused by the existence of operators or equipment which are not in accordance with operation regulations in the conventional transmission line field operation method.
The application provides a key sun type power transmission line field operation method, which comprises the following steps:
the responsible terminal sends an unlocking instruction to an operation terminal;
the operation terminal acquires the unlocking instruction, reads a key locally stored by the operation terminal, and sends the key to the responsible terminal;
the responsible terminal verifies the secret key, and sends an operation token to the operation terminal after the verification is passed, wherein the operation token is used for unlocking the operation authority of the operation terminal and recording the operation flow of the operation terminal;
the operation terminal acquires the operation token, scans an electronic tag attached to the surface of an operation object corresponding to the operation terminal, and starts to execute the operation of a link responsible for the operation terminal;
after the operation terminal finishes the operation of the link which is responsible for the operation terminal, the operation terminal sends an unlocking instruction to the next operation terminal according to the operation sequence in the operation token and simultaneously returns the operation token to the responsible terminal;
repeatedly executing the second step to the fourth step until the last operation terminal finishes the operation of the link which is responsible for by the last operation terminal, and sending an operation finishing instruction and the operation token to the responsible terminal by the last operation terminal;
and the responsible terminal receives the operation completion instruction and the operation token, closes the operation completed by the last operation terminal and completes the whole operation process.
The application also provides a key solar power transmission line field operation system, and the key solar power transmission line field operation method adopting the content comprises the following steps:
the charge terminal is used for sending an unlocking instruction to the operation terminal, verifying the certificate key sent by the operation terminal and sending an operation token to the operation terminal after the verification is passed; the job token is used for unlocking the job authority of the job terminal and recording the job flow of the job terminal;
the plurality of operation terminals are sequentially connected according to an operation sequence, and the operation terminals are used for receiving an unlocking instruction sent by the load terminal, reading a key locally stored by the operation terminals and sending the key to the responsible terminal;
after the key verification is passed, the operation terminal is further used for acquiring an operation token sent by the responsible terminal, scanning an electronic tag attached to the surface of an operation object corresponding to the operation terminal, starting to execute the operation of the link responsible for the operation terminal, and sending an unlocking instruction to the next operation terminal after the operation is completed until the last operation terminal completes the operation of the link responsible for the last operation terminal;
the plurality of operation terminals are respectively connected with the responsible terminal;
each work object is connected with one work terminal and is used for being matched with the work terminal to complete the work of the link which is responsible for the work terminal.
The application relates to a key solar power transmission line field operation method and system, wherein each operation terminal is arranged to be safely checked with a responsible terminal in advance in a key mode before operation by taking the responsible terminal as a center, and operation can be performed by unlocking operation permission at the rear part after checking, so that closed management and control of a power transmission line field operation process are realized, and the safety is greatly improved.
Drawings
Fig. 1 is a schematic flow chart of a key sun-type power transmission line field operation method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a key-based solar power transmission line field operation system according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an operation object in a key-based solar power transmission line field operation system according to an embodiment of the present application.
Reference numerals:
10 secret key solar power transmission line field operation system
100 responsible terminal
200 operation terminal
300 work object
400 identity authentication module
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The application provides a secret key sun type power transmission line field operation method.
It should be noted that the key-based field operation method for the solar power transmission line provided by the present application is not limited to the implementation subject. Optionally, an execution subject of the key solar power transmission line field operation method provided by the present application may be a key solar power transmission line field operation system 10. Alternatively, the executing entity may be a processor or other control device with a control function provided in the key solar transmission line field operation system 10.
As shown in fig. 1, in an embodiment of the present application, the key-based method for field work of the solar power transmission line includes the following steps S100 to S600:
s100, the responsible terminal 100 sends an unlock instruction to one job terminal 200.
Specifically, the responsible terminal 100 may be one of a mobile phone, a notebook computer and a tablet computer, or any other kind of intelligent terminal. Similarly, the operation terminal 200 may also be one of a mobile phone, a notebook computer and a tablet computer. The responsible terminal 100 is one. The work terminal 200 may be plural.
The person issuing the job task sets up the job sequence in advance. In this step, the plurality of work terminals 200 perform the work in order of the work. In this step, the responsible terminal 100 sends an unlocking instruction to one job terminal 200. The job terminal 200 can be understood as a job terminal 200 that executes a job first, also referred to as a job terminal 200 that starts a job.
The unlocking instruction is used for unlocking the operation authority of the operation terminal 200.
And S200, the operation terminal 200 acquires the unlocking instruction, reads a key locally stored by the operation terminal 200, and sends the key to the responsible terminal 100.
Specifically, the key is stored locally in the work terminal 200 in advance. The job terminal 200 extracts a key stored locally and transmits the key to the in-charge terminal 100.
S300, the responsible terminal 100 verifies the key. After the verification is passed, the in-charge terminal 100 transmits a job token to the job terminal 200. The job token is used for unlocking the job authority of the job terminal 200 and recording the job flow of the job terminal 200.
Specifically, in order to ensure the validity of the work terminal 200, it is necessary to verify the key transmitted by the work terminal 200. After the verification is passed, the in-charge terminal 100 transmits a job token to the job terminal 200. The job token is used for recording a job flow when the job terminal 200 executes a job of a link in charge of the job terminal 200. The job token is also used to unlock the job authority of the job terminal 200.
In step S200, the job terminal 200 responsible for transmitting the authentication key is the job terminal 200 that starts the job. It is to be understood that, in step S300, it is also the job terminal 200 that initiated the job that passes the key authentication, and the in-charge terminal 100 sends the job token to the job terminal 200 that initiated the job.
And S400, the job terminal 200 acquires the job token, scans the electronic tag attached to the surface of the job object 300 corresponding to the job terminal 200, and starts to execute the job of the link in charge of the job terminal 200.
After the job terminal 200 completes the job of the link in which the job terminal 200 is responsible, the job terminal 200 sends an unlocking instruction to the next job terminal 200 according to the job sequence in the job token, and simultaneously returns the job token to the responsible terminal 100.
Specifically, the job terminal 200 in this step is the job terminal 200 that starts the job. And the operation terminal 200 which starts the operation acquires the operation token and unlocks the operation of the link which is responsible for the operation terminal 200. It is understood that the job terminal 200 that starts the job at this time is equivalent to being unlocked the job authority. Further, the job terminal 200 that starts the job may scan the electronic tag attached to the surface of the job object 300 corresponding to the job terminal 200, and start to execute the job of the link for which the job terminal 200 is responsible.
The number of the work objects 300 may be plural, and the work terminals 200 may correspond to the work objects 300 one by one. The work object 300 may be a vehicle, a work tool, a safety tool, or the like used in the field work of the power transmission line, and an electronic tag is attached to the surface of each work object 300. The electronic tag can be a two-dimensional code. The electronic tag can be a two-dimensional code.
The job terminal 200 scans the electronic tag attached to the surface of the job object 300 corresponding to the job terminal 200, and can establish a job relationship linked with the job object 300, so that the job terminal 200 can cooperate with the job object 300 to complete the job of the link in which the job terminal 200 is responsible.
After the job terminal 200 completes the job of the link in charge of the job terminal 200, the job terminal 200 sends an unlocking instruction to the next job terminal 200 according to the job sequence in the job token. This step is to verify the validity of the next job terminal 200.
S500, repeatedly executing the steps S200 to S400 until the last job terminal 200 completes the job of the link for which the last job terminal 200 is responsible. The last job terminal 200 transmits a job completion instruction and the job token to the in-charge terminal 100.
Specifically, by repeatedly executing the process of verifying the key-transmitting the job token after verification-executing the job, completion of the job flow of all job terminals 200 can be achieved. After the last job terminal 200 completes the job of the link for which the last job terminal 200 is responsible, the last job terminal 200 sends a job completion instruction and the job token to the responsible terminal 100.
S600, the responsible terminal 100 receives the job completion instruction and the job token. Further, the responsible terminal 100 closes the job completed by the last job terminal 200, and completes the whole job flow.
Specifically, after the responsible terminal 100 acquires the job completion instruction and the job token, it is determined that the entire job flow has been completed. Further, the in-charge terminal 100 sends a closing instruction to the last job terminal 200 to close the job flow of the last job terminal 200.
In this embodiment, by taking the responsible terminal 100 as a center, before the operation, each operation terminal 200 is set to perform security verification in advance with the responsible terminal 100 in a form of a secret key, and the verification can be performed by unlocking the operation authority at the rear, so that the closed management and control of the field operation process of the power transmission line are realized, and the security is greatly improved.
In an embodiment of the present application, the step S400 includes the following steps S411 to S419:
s411, the job terminal 200 acquires the job token.
S413, the job terminal 200 reads the job relation in the job token.
S415, the job terminal 200 determines the job object 300 corresponding to the job terminal 200 according to the job relationship.
S417, the job terminal 200 scans the electronic tag attached to the surface of the job object 300 corresponding to the job terminal 200, and starts to execute the job of the link in which the job terminal 200 is responsible.
S419, after the job terminal 200 completes the job of the link in charge of the job terminal 200, the job terminal 200 sends an unlocking instruction to the next job terminal 200 according to the job sequence in the job token.
Specifically, the steps S411 to S419 are steps in which the job terminal 200 that starts a job specifically executes a job flow and transfers a key. The steps S411 to S419 are not only steps for specifically executing the job flow for the job terminal 200 that starts the job, but also steps for specifically executing the job flow for other job terminals 200. When one job terminal 200 completes the job of the link for which it is responsible, an unlocking instruction is sent to the next job terminal 200.
In this embodiment, the operation terminal 200 acquires the operation relationship from the operation token, and further determines the operation object 300 corresponding to the operation terminal 200, so that irregular operations of the irregular operation terminal 200 or the irregular operation object 300 can be prevented, and the operation safety is improved.
In an embodiment of the present application, in the process of repeatedly executing the steps S200 to S400, when the next job terminal 200 acquires the job token, the next job terminal 200 sends a job closing instruction to the previous job terminal 200 to close the job flow of the previous job terminal 200.
Specifically, the plurality of job terminals 200 can form an ordered job flow in this way.
In this embodiment, when the next job terminal 200 acquires the job token, each job flow is locked by closing the job flow of the link job for which the previous job terminal 200 is responsible, so as to avoid errors and waste of job resources (e.g., electric power) in the job flow.
In an embodiment of the application, the key comprises a serial number of the key. The step S300 includes the following steps S310 to S340:
s310, the responsible terminal 100 acquires the key sent by the job terminal 200.
Specifically, the steps S310 to S340 are specific verification procedures of the key by the responsible terminal 100. The key may be a public key.
S320, the responsible terminal 100 uses the serial number of the key as an index to locally search for the verification key corresponding to the serial number of the key.
In particular, the authentication key may be a private key. The responsible terminal 100 may locally store a plurality of authentication keys, and different authentication keys may correspond to keys sent by different job terminals 200. The key includes serial numbers, and keys of different serial numbers match with different work terminals 200.
For example, the key with the serial number 001 is a key corresponding to the start job terminal 200. In order to verify the validity of the initial operation terminal 200, the responsible terminal 100 needs to locally search for a verification key corresponding to the key with the serial number 001. The key of the last job-completed job terminal 200 is a key of serial number 010. In order to verify the validity of the last job-completed job terminal 200, the responsible terminal 100 needs to search for a verification key corresponding to the key with the serial number 010 locally.
S330, the responsible terminal 100 decrypts the key based on the verification key, and determines whether the decryption of the key is successful.
Specifically, the secret key may be a public key, and the verification secret key may be a private key. Similarly, the secret key may be a private key, and the verification secret key may be a public key. The key and the authentication key are generated based on a key generation algorithm, the key being used to encrypt data and the authentication key being used to decrypt data. Therefore, by decrypting the key based on the authentication key, it can be determined whether the decryption of the key is successful.
S340, if the key is decrypted successfully, the key is determined to pass the verification. Further, the in-charge terminal 100 transmits the job token to the job terminal 200.
Specifically, if the key decryption is successful, it is determined that the job terminal 200 is legitimate, and the responsible terminal 100 sends a job token and the key to the job terminal 200.
If the key decryption is unsuccessful, it indicates that the serial number of the key is correct, but the key is incorrect, the job terminal 200 has no validity, and the responsible terminal 100 interrupts the current step.
In this embodiment, whether the decryption of the secret key is successful is determined by decrypting the secret key based on the verification secret key, so that each operation terminal 200 is safely checked with the responsible terminal 100 in advance in a secret key mode before operation, and operation can be performed by unlocking operation permission at the rear part after the check, thereby realizing closed control over the field operation process of the power transmission line and greatly improving the safety.
In an embodiment of the application, before the step S100, the key solar power transmission line field operation method further includes the following steps S010 to S030:
and S010, the responsible terminal 100 acquires the work ticket. The work ticket includes a job relationship and a job order.
The job relationship is used to represent the relationship between each job terminal 200 and the job object 300 corresponding to the job terminal 200. Each job terminal 200 has a job object 300 uniquely corresponding to the job terminal 200.
The operation sequence is a sequence in which the plurality of operation terminals 200 sequentially transmit the unlocking instruction to perform the operation.
Specifically, the work ticket is a written command that permits execution of work on each job object 300, and is also a written basis for execution of a security technical measure. The work ticket is filled in by the person issuing the job task and is generated after filling. After the work ticket is generated, the person who issues the job task inputs the work ticket to the charge terminal 100. The work ticket contains a job relationship and a job order.
And S020, reading the job relation and the job sequence in the work ticket by the responsible terminal 100. Further, according to the operation relation and the operation sequence, an operation token is generated. The responsible terminal 100 also generates a key and an authentication key based on the encryption and decryption algorithm.
Specifically, the job token contains the job relationship and the job order. The responsible terminal 100 may generate a key and an authentication key based on any form of encryption and decryption algorithm. The key is used to encrypt a string of data. The verification key can decrypt the key to obtain the data before encryption.
S030, the responsible terminal 100 locally stores the job token and the verification key. Further, the in-charge terminal 100 sequentially transmits the key to the plurality of job terminals 200 so that each of the job terminals 200 stores one key.
Specifically, in order to perform the key-based solar power transmission line field work method of steps S100 to S600, the work token and the verification key need to be stored locally at the responsible terminal 100. The verification key is used to verify the validity of each of the job terminals 200. The job token is used for sending the job token to the job terminal 200 which passes the validity verification after the job terminal 200 passes the validity verification, so as to unlock the job authority of the job terminal 200.
Each of the job terminals 200 stores a key, so that each job terminal 200 can perform key authentication by the in-charge terminal 100.
In this embodiment, an operation token is generated according to the operation relationship and the operation sequence, and a key and a verification key are generated according to an encryption and decryption algorithm, so that authority association and key association are provided for implementing the whole key type transmission line field operation method.
In an embodiment of the application, after the step S030, the key solar power transmission line field operation method further includes the following steps S040 to S050:
and S040, the responsible terminal 100 generates a plurality of electronic tags according to the operation relation. Each electronic tag corresponds to one job object 300 and one job terminal 200.
Specifically, the electronic tag may be a two-dimensional code including a job relation. Each job object 300 corresponds to a unique electronic tag. The electronic tag includes a correspondence relationship between the work terminal 200 and the work object 300.
S050, the responsible terminal 100 sets each electronic tag on the surface of the work object 300 corresponding to the electronic tag.
Specifically, the electronic tag may be attached to the surface of the work object 300 by means of pasting or spraying.
In the embodiment, the responsible terminal 100 reads the job relation in the job ticket, generates the electronic tag containing the job relation and arranges the electronic tag on the surface of the job object 300, so that the job terminal 200 and the job object 300 are rigidly bound, the illegal operation condition of the field operation of the power transmission line is reduced, and the safety degree of the field operation of the power transmission line is improved.
In an embodiment of the application, after step S050, the key solar power transmission line field operation method further includes steps S061 to S063:
s061, generates the preset identity information and identity authentication module 400 corresponding to each job terminal 200.
Specifically, the preset identity information may be identity information of an operator who operates the work terminal 200. The identity authentication module 400 corresponds to the preset identity information one to one.
S062, searching for the job object 300 corresponding to each piece of the predetermined identity information according to the correspondence relationship.
Specifically, the job relationship in the job ticket has determined the correspondence of the job terminal 200 and the job object 300. Step S061 also determines the correspondence between the preset identity information and the job terminal 200. It is understood that, according to the job relationship, the corresponding relationship between the job object 300 and the preset identity information may be determined. In other words, the correspondence relationship of the job terminal 200, the job object 300, and the preset identification information can be determined.
S063, embeds each preset identity information and identity authentication module 400 in the job object 300 corresponding to the preset identity information.
In particular, the identity authentication module 400 may include a memory. The preset identity information may be stored in the memory. The identity authentication module 400 storing the preset identity information may be embedded in the job object 300 corresponding to the preset identity information. After this step is performed, the job object 300 includes both the preset identity information and the electronic tag.
In this embodiment, by generating the preset identity information and the identity authentication module 400 corresponding to each operation terminal 200, the preset identity information can be bound to the operation object 300 and the operation terminal 200, so that the identity information of the operation terminal 200 can be conveniently checked by the subsequent operation terminal 200 before scanning the two-dimensional code on the surface of the operation object 300, and the security is improved.
In an embodiment of the present application, before the step S417, the step S400 further includes the following steps S416a to S416 d:
s416a, the work terminal 200 issues an authentication request to the authentication module 400 built in the work object 300.
Specifically, after the step S415, that is, after the job object 300 corresponding to the job terminal 200 is determined, the step S417 is not performed for the first time, but the steps S416a to S416d are performed. The S416a to S416d are procedures for verifying the identity information of the job terminal 200.
S416b, the authentication module 400 starts the authentication function. Further, the work terminal 200 inputs authentication information to the authentication module 400.
Specifically, after the identity authentication module 400 receives the identity authentication request, the identity authentication module 400 starts an identity verification function. Alternatively, the job object 300 may pop up an authentication interface, or may pop up the authentication interface on the job terminal 200. Through the authentication interface, the operation terminal 200 may input authentication information. For example, a password is entered.
S416c, the identity authentication module 400 determines whether the identity verification information matches the preset identity information.
Specifically, the authentication information is the identity information input by the operation terminal 200. The preset identity information is pre-generated identity information. The identity authentication module 400 determines whether the identity verification information matches the preset identity information.
S416d, if the authentication information matches the preset identity information, the identity authentication module 400 sends an instruction to the job terminal 200 to allow the job terminal 200 to scan an electronic tag.
Specifically, if the identity verification information matches the preset identity information, it is determined that the operation terminal 200 is a legal operation terminal 200, and the identity authentication module 400 sends an instruction allowing the operation terminal 200 to scan the electronic tag to the operation terminal 200.
If the identity verification information does not match the preset identity information, it is determined that the operation terminal 200 is an illegal operation terminal 200, and the identity authentication module 400 sends an instruction for rejecting the operation terminal 200 to scan the electronic tag to the operation terminal 200, and closes the connection relationship between the operation object 300 and the operation terminal 200.
In this embodiment, the identity authentication module 400 of the operation object 300 performs identity authentication on the operation terminal 200, so that validity verification of the operation terminal 200 is realized, and after the verification is passed, the operation terminal 200 is allowed to scan an instruction of an electronic tag, so that the safety of the field operation process of the whole power transmission line is further improved.
In an embodiment of the present application, the authentication information may be one of a password, fingerprint information, and face image information, which are presented in a digital form.
Specifically, the authentication information may not be limited to the above embodiments. When the authentication information is a password presented in a digital form, the operation terminal 200 inputs a digital password to the authentication module 400 to complete the authentication of the operation terminal 200. When the authentication information is fingerprint information, the operation terminal 200 inputs a fingerprint of an operator to the identity authentication module 400, and completes the identity authentication of the operation terminal 200 through fingerprint identification. When the authentication information is face image information, the operation terminal 200 completes the authentication of the operation terminal 200 through face recognition.
In this embodiment, by setting various forms of authentication information, the authentication process of the operation terminal 200 is simplified and made efficient.
As shown in fig. 2, the present application further provides a key solar power transmission line field operation system 10. The key solar power transmission line field operation system 10 adopts the key solar power transmission line field operation method mentioned in the foregoing.
In an embodiment of the present application, the key-based solarium work site system 10 includes a responsible terminal 100, a plurality of work terminals 200, and a plurality of work objects 300. The plurality of work terminals 200 are connected in order according to the work order. The plurality of work terminals 200 are connected to the in-charge terminal 100, respectively. Each job object 300 is connected to one job terminal 200.
The responsible terminal 100 is configured to send an unlocking instruction to the job terminal 200, and verify the certificate key sent by the job terminal 200. After the verification is passed, a job token is sent to the job terminal 200. The job token is used for unlocking the job authority of the job terminal 200 and recording the job flow of the job terminal 200. The operation terminal 200 is configured to receive an unlocking instruction sent by the load terminal, read a key locally stored in the operation terminal 200, and send the key to the responsible terminal 100.
After the key verification is passed, the job terminal 200 is further configured to obtain a job token sent by the responsible terminal 100, scan an electronic tag attached to the surface of the job object 300 corresponding to the job terminal 200, start to execute the job of the link responsible for the job terminal 200, and send an unlocking instruction to the next job terminal 200 after the job is completed until the last job terminal 200 completes the job of the link responsible for the last job terminal 200.
The job object 300 is configured to cooperate with the job terminal 200 to complete a job of a link in which the job terminal 200 is responsible.
Specifically, the number of the job terminals 200 may be equal to the number of the job objects 300. One job terminal 200 corresponds to one job object 300. The responsible terminal 100 may be one of a mobile phone, a notebook computer and a tablet computer, or any other kind of intelligent terminal. Similarly, the operation terminal 200 may be one of a mobile phone, a notebook computer and a tablet computer. The work object 300 may be one of a work vehicle, a safety tool, a safety measure, a work tool, a work method, a work location, a work environment, the work object 300, and a work ticket.
In this embodiment, the responsible terminal 100 is provided, so that the entire operation flow is monitored. By setting the rigid binding of the plurality of operation terminals 200 and the plurality of operation objects 300, the generation of the illegal operation condition of the field operation of the power transmission line is reduced, and the safety degree of the field operation of the power transmission line is improved. In addition, by taking the responsible terminal 100 as a center, each operation terminal 200 is arranged to be safely checked with the responsible terminal 100 in advance in a key mode before operation, and the operation authority can be unlocked for operation after the check, so that the closed management and control of the field operation process of the power transmission line are realized, and the safety is greatly improved.
As shown in fig. 3, in an embodiment of the present application, the key-based field work system 10 further includes a plurality of identity authentication modules 400. The identity authentication module 400 is configured to perform identity verification on the work terminal 200 before the work terminal 200 scans an electronic tag attached to the surface of the work object 300 corresponding to the work terminal 200.
Specifically, the identity authentication module 400 may perform identity authentication on the operation terminal 200 through various implementation manners such as digital password authentication, fingerprint authentication, face authentication, and the like.
In this embodiment, the identity authentication module 400 is arranged to authenticate the identity of the operation terminal 200, so that the validity of the operation terminal 200 is verified, and after the verification is passed, the operation terminal 200 is allowed to scan the instruction of the electronic tag, so that the safety of the field operation process of the whole power transmission line is further improved.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (11)

1. A secret key sun type power transmission line field operation method is characterized by comprising the following steps:
s100, the responsible terminal (100) sends an unlocking instruction to one operation terminal (200);
s200, the operation terminal (200) acquires the unlocking instruction, reads a key locally stored by the operation terminal (200), and sends the key to the responsible terminal (100);
s300, the responsible terminal (100) verifies the secret key, and after the secret key passes the verification, a job token is sent to the job terminal (200), and the job token is used for unlocking the job authority of the job terminal (200) and recording the job flow of the job terminal (200);
s400, the operation terminal (200) acquires the operation token, scans an electronic tag attached to the surface of an operation object (300) corresponding to the operation terminal (200), and starts to execute the operation of a link in charge of the operation terminal (200);
after the operation terminal (200) finishes the operation of the link which is responsible for the operation terminal (200), the operation terminal (200) sends an unlocking instruction to the next operation terminal (200) according to the operation sequence in the operation token, and simultaneously returns the operation token to the responsible terminal (100);
s500, repeatedly executing the steps S200 to S400 until the last operation terminal (200) finishes the operation of the link which is responsible for the last operation terminal (200), and sending an operation finishing instruction and the operation token to the responsible terminal (100) by the last operation terminal (200);
s600, the responsible terminal (100) receives the job completion instruction and the job token, and closes the job completed by the last job terminal (200) to complete the whole job flow.
2. The key solar power transmission line field operation method of claim 1, wherein the step S400 comprises:
s411, the job terminal (200) acquires the job token;
s413, the job terminal (200) reads the job relation in the job token;
s415, the operation terminal (200) determines an operation object (300) corresponding to the operation terminal (200) according to the operation relation;
s417, the work terminal (200) scans the electronic label attached to the surface of the work object (300) corresponding to the work terminal (200) and starts to execute the work of the link in charge of the work terminal (200);
and S419, after the operation terminal (200) completes the operation of the link in charge of the operation terminal (200), the operation terminal (200) sends an unlocking instruction to the next operation terminal (200) according to the operation sequence in the operation token.
3. The key-type solar power transmission line field operation method according to claim 2, wherein in the process of repeatedly executing the steps S200 to S400, when the next operation terminal (200) acquires the operation token, the next operation terminal (200) sends an operation closing instruction to the previous operation terminal (200) to close the operation flow of the previous operation terminal (200).
4. The key-based solar power transmission line field operation method of claim 3, wherein the key comprises a serial number of the key, and the step S300 comprises:
s310, the responsible terminal (100) acquires a key sent by the operation terminal (200);
s320, the responsible terminal (100) takes the serial number of the secret key as an index, and locally searches for a verification secret key corresponding to the serial number of the secret key;
s330, the responsible terminal (100) decrypts the key based on the verification key and judges whether the decryption of the key is successful;
s340, if the key is decrypted successfully, the key is determined to pass the verification, and the responsible terminal (100) sends the job token to the job terminal (200).
5. The key-based solar power transmission line field operation method according to claim 4, further comprising, before the step S100:
s010, the responsible terminal (100) obtains a work ticket, and the work ticket comprises a work relation and a work sequence;
the operation relation is used for representing the relation between each operation terminal (200) and the operation object (300) corresponding to the operation terminal (200), and each operation terminal (200) has the operation object (300) uniquely corresponding to the operation terminal (200);
the operation sequence is a sequence in which a plurality of operation terminals (200) transmit unlocking instructions in sequence to perform operation;
s020, reading the job relation and the job sequence in the work ticket by the responsible terminal (100), generating a job token according to the job relation and the job sequence, and generating a key and a verification key based on an encryption and decryption algorithm;
and S030, the responsible terminal (100) stores the job token and the verification key locally, and sequentially transmits the keys to a plurality of job terminals (200), so that each job terminal (200) stores one key.
6. The key solar power transmission line field operation method according to claim 5, further comprising, after the step S030:
s040, the responsible terminal (100) generates a plurality of electronic tags according to the operation relation, and each electronic tag corresponds to one operation object (300) and one operation terminal (200);
and S050, wherein each electronic tag is arranged on the surface of the operation object (300) corresponding to the electronic tag by the responsible terminal (100).
7. The key-type field work method for the solar power transmission line according to claim 6, wherein after the step S050, the method further comprises:
s061, generating a preset identity information and identity authentication module (400) corresponding to each operation terminal (200);
s062, according to the said corresponding relation, search for each preset identity information correspondent job target (300);
s063, embedding each preset identity information and identity authentication module (400) into the operation object (300) corresponding to the preset identity information.
8. The key-based solar power transmission line field work method according to claim 7, wherein before the step S417, the step S400 further comprises:
s416a, the job terminal (200) issuing an authentication request to an authentication module (400) built in the job object (300);
s416b, the identity authentication module (400) starts the identity verification function, and the operation terminal (200) inputs the identity verification information to the identity authentication module (400);
s416c, the identity authentication module (400) determines whether the identity verification information matches the preset identity information;
s416d, if the authentication information matches the preset identity information, the identity authentication module (400) sends an instruction to the operation terminal (200) to allow the operation terminal (200) to scan an electronic tag.
9. The key-based on-site operation method for the solar power transmission line of claim 8, wherein the authentication information may be one of a password, fingerprint information and facial image information presented in a digital form.
10. A key solar transmission line field operation system, characterized in that, by using the key solar transmission line field operation method of any one of claims 1 to 9, the key solar transmission line field operation system (10) comprises:
the system comprises a responsible terminal (100) and a service terminal, wherein the responsible terminal is used for sending an unlocking instruction to the service terminal (200), verifying a certificate key sent by the service terminal (200), and sending a service token to the service terminal (200) after the verification is passed; the job token is used for unlocking the job authority of the job terminal (200) and recording the job flow of the job terminal (200);
the system comprises a plurality of operation terminals (200) which are sequentially connected according to an operation sequence, wherein the operation terminals (200) are used for receiving an unlocking instruction sent by the load terminal, reading a key locally stored by the operation terminals (200) and sending the key to the responsible terminal (100);
after the key verification is passed, the operation terminal (200) is further configured to acquire an operation token sent by the responsible terminal (100), scan an electronic tag attached to the surface of an operation object (300) corresponding to the operation terminal (200), start to execute the operation of the link responsible for the operation terminal (200), and send an unlocking instruction to the next operation terminal (200) after the operation is completed until the last operation terminal (200) completes the operation of the link responsible for the last operation terminal (200);
the plurality of work terminals (200) are respectively connected with the responsible terminal (100);
the system comprises a plurality of work objects (300), wherein each work object (300) is connected with one work terminal (200) and is used for being matched with the work terminal (200) to complete the work of the link which is taken charge by the work terminal (200).
11. The key solar grid field operation system according to claim 10, wherein the key solar grid field operation system (10) further comprises:
the identity authentication system comprises a plurality of identity authentication modules (400), wherein each identity authentication module (400) is embedded in one operation object (300) and used for carrying out identity authentication on the operation terminal (200) before the operation terminal (200) scans an electronic tag attached to the surface of the operation object (300) corresponding to the operation terminal (200).
CN201911268941.2A 2019-12-11 2019-12-11 Key solar power transmission line field operation method and system Active CN111162908B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911268941.2A CN111162908B (en) 2019-12-11 2019-12-11 Key solar power transmission line field operation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911268941.2A CN111162908B (en) 2019-12-11 2019-12-11 Key solar power transmission line field operation method and system

Publications (2)

Publication Number Publication Date
CN111162908A true CN111162908A (en) 2020-05-15
CN111162908B CN111162908B (en) 2022-07-22

Family

ID=70557035

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911268941.2A Active CN111162908B (en) 2019-12-11 2019-12-11 Key solar power transmission line field operation method and system

Country Status (1)

Country Link
CN (1) CN111162908B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850699A (en) * 2017-04-10 2017-06-13 中国工商银行股份有限公司 A kind of mobile terminal login authentication method and system
US20170288872A1 (en) * 2014-12-23 2017-10-05 Feitian Technologies Co., Ltd. Activating mobile terminal token method
CN108304260A (en) * 2017-12-15 2018-07-20 上海超算科技有限公司 A kind of virtualization job scheduling system and its implementation based on high-performance cloud calculating
CN108401028A (en) * 2018-02-28 2018-08-14 北京华虹集成电路设计有限责任公司 A kind of cloud server, control device and operation managing and control system
CN110516908A (en) * 2019-07-19 2019-11-29 长园共创电力安全技术股份有限公司 A kind of operation management-control method applied to industry spot

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170288872A1 (en) * 2014-12-23 2017-10-05 Feitian Technologies Co., Ltd. Activating mobile terminal token method
CN106850699A (en) * 2017-04-10 2017-06-13 中国工商银行股份有限公司 A kind of mobile terminal login authentication method and system
CN108304260A (en) * 2017-12-15 2018-07-20 上海超算科技有限公司 A kind of virtualization job scheduling system and its implementation based on high-performance cloud calculating
CN108401028A (en) * 2018-02-28 2018-08-14 北京华虹集成电路设计有限责任公司 A kind of cloud server, control device and operation managing and control system
CN110516908A (en) * 2019-07-19 2019-11-29 长园共创电力安全技术股份有限公司 A kind of operation management-control method applied to industry spot

Also Published As

Publication number Publication date
CN111162908B (en) 2022-07-22

Similar Documents

Publication Publication Date Title
CN101300808B (en) Method and arrangement for secure autentication
CN107771383A (en) At least two authenticating devices are mapped to the method for user account using certificate server
TW201741922A (en) Biological feature based safety certification method and device
CN110990827A (en) Identity information verification method, server and storage medium
CN105389500A (en) Method of using one device to unlock another device
CN101102574A (en) Terminal verification method and device
CN105518687A (en) Secure data storage
CN110879880B (en) Password device for user to autonomously control data security level protection
CZ2015473A3 (en) The method of authentication security in electronic communication
CN102281143B (en) Remote unlocking system of intelligent card
CN106789024A (en) A kind of remote de-locking method, device and system
CN115527292B (en) Mobile phone terminal remote vehicle unlocking method of security chip and security chip device
CN103955664A (en) High-speed document scanner capable of safely decoding two-dimensional code of vehicle approval certificate and decoding method
US8151111B2 (en) Processing device constituting an authentication system, authentication system, and the operation method thereof
CN113963464A (en) Bank safe deposit box unlocking system and method based on block chain
CN106953731A (en) The authentication method and system of a kind of terminal management person
CN108964883B (en) Digital certificate storage and signature method taking smart phone as medium
CN111162908B (en) Key solar power transmission line field operation method and system
CN111130006B (en) Key type transmission line field operation method and system
CN111130007B (en) Sequential power transmission line field operation method and system
CN110994452B (en) Sequential solar power transmission line field operation method and system
WO2013114649A1 (en) Biological authentication system, biological authentication device, and biological authentication method
CN111105207B (en) Random transmission line field operation method and system
CN113487765A (en) CTID (computer telephony integration) access control method and system supporting dynamic encryption
CN111080253B (en) Random sun type power transmission line field operation method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant