CN111385364A - Remote control method and device for electricity utilization loop - Google Patents
Remote control method and device for electricity utilization loop Download PDFInfo
- Publication number
- CN111385364A CN111385364A CN202010193577.4A CN202010193577A CN111385364A CN 111385364 A CN111385364 A CN 111385364A CN 202010193577 A CN202010193577 A CN 202010193577A CN 111385364 A CN111385364 A CN 111385364A
- Authority
- CN
- China
- Prior art keywords
- verification
- power
- operator
- authority
- verification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02E—REDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
- Y02E60/00—Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/12—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment
- Y04S40/128—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment involving the use of Internet protocol
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Medical Informatics (AREA)
- Remote Monitoring And Control Of Power-Distribution Networks (AREA)
Abstract
The invention provides a remote control method and a remote control device for a power utilization loop, wherein the method comprises the steps of constructing a power failure authority control method according to a power utilization management post and authority, and constructing a power failure verification system according to the power failure authority control method; the power failure verification system is connected with the remote power utilization loop through the Internet and is provided with a user operation end; the power-off authority control method comprises the following steps: step 1: a user initiates a remote power-off request through a user operation end; at the moment, the user operation end initiates double-person permission verification according to a preset program; step 2: verifying the verification information of the operator A; and step 3: verifying the verification information of the operator B; and 4, step 4: and if the operator A and the operator B are judged to have the authority, executing the power-off action, and if the operator A and/or the operator B are judged not to have the authority, not executing the power-off action. According to the method, power is cut off after double verification, so that the problems that a power circuit is maliciously cut off in an intelligent power system and the like are solved.
Description
Technical Field
The present invention relates to power-off methods, and more particularly, to a method and apparatus for remotely controlling a power circuit.
Background
The intelligent power utilization system is an intelligent service system which digitalizes the traditional power utilization mode and realizes internet of things. With the access of the power utilization circuit to the internet, remote connection, power failure and other operations can be realized, great convenience is brought to life and work of people, but risks exist, once an intelligent power utilization system is illegally invaded, the power utilization circuit can be illegally cut off, and serious damage can be caused in special places such as hospitals, banks and the like.
Disclosure of Invention
The invention provides a remote control method and a remote control device for a power utilization loop.
The technical scheme of the invention is realized as follows:
a remote control method for an electric loop comprises the following steps:
constructing a power failure authority control method according to the power utilization management post and the power failure authority, and constructing a power failure verification system according to the power failure authority control method; the power failure verification system is connected with the remote power utilization loop through the Internet and is provided with a user operation end;
the power-off authority control method comprises the following steps:
step 1: a user initiates a remote power-off request through a user operation end; at the moment, the user operation end initiates double-person permission verification according to a preset program;
step 2: the operator A inputs verification information, the power-off verification system judges whether verification is successful, and if the verification is successful, the operator B is required to input the verification information; if the verification is unsuccessful, the verification information is required to be input again;
and step 3: the operator B inputs verification information, the power-off verification system judges whether the verification is successful, and if the verification is successful, whether the operator A and the operator B have the authority is judged; if the verification is unsuccessful, the verification information is required to be input again;
and 4, step 4: and if the operator A and the operator B are judged to have the authority, executing the power-off action, and if the operator A and/or the operator B are judged not to have the authority, not executing the power-off action.
Further, the power failure verification system comprises a server and a user side arranged on the power utilization circuit, wherein the user side comprises a verification information identification terminal.
Further, the method for verifying whether the power failure verification system verification information is matched comprises the following steps: and after the operator inputs the verification information, the verification information identification terminal transmits the verification information to the server, the server decrypts and judges whether the verification information identification terminal is matched with the power utilization loop, and then the verification information is compared with the information stored in the database to judge whether the verification information is correct.
Further, the authentication information is encrypted by an encryption program before being transmitted to the server.
Further, the verification information identification terminal is a fingerprint machine or a face recognition machine.
Furthermore, the power utilization loop is connected with an intelligent air switch, and the intelligent air switch is connected to the Internet.
Further, the user operation end is provided with a Web page.
Further, the power utilization management posts and the power utilization authority comprise:
an administrator having authority to input authentication information of the operator a;
the leader has the authority to input the verification information of the operator B.
Compared with the prior art, the power utilization loop cutting method provided by the embodiment of the invention has the following advantages:
through constructing the power-off verification system, the double-post verification is adopted, the double-post verification is required to pass, and the power-off can be realized only after the double-post verification has the corresponding authority, so that the loss caused by the malicious power-off of the power circuit is avoided.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate exemplary embodiments of the invention and together with the description serve to explain the principles of the invention.
FIG. 1 is a schematic flow diagram of a method for remote control of a power utilization circuit in accordance with the present invention;
FIG. 2 is a schematic of the topology of the outage verification system of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and embodiments. It is to be understood that the specific embodiments described herein are for purposes of illustration only and are not to be construed as limitations of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
In addition, the embodiments of the present invention and the features of the embodiments may be combined with each other without conflict. The present invention will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
The embodiment provides a remote control method of an electric loop;
referring to fig. 1, the cutting method includes the steps of:
constructing a power failure authority control method according to the power utilization management post and the power failure authority, and constructing a power failure verification system according to the power failure authority control method; the power failure verification system is connected with the remote power utilization loop through the Internet and is provided with a user operation end;
the power-off authority control method comprises the following steps:
step 1: a user initiates a remote power-off request through a user operation end; at the moment, the user operation end initiates double-person permission verification according to a preset program;
step 2: the operator A inputs verification information, the power-off verification system judges whether verification is successful, and if the verification is successful, the operator B is required to input the verification information; if the verification is unsuccessful, the verification information is required to be input again;
and step 3: the operator B inputs verification information, the power-off verification system judges whether the verification is successful, and if the verification is successful, whether the operator A and the operator B have the authority is judged; if the verification is unsuccessful, the verification information is required to be input again;
and 4, step 4: and if the operator A and the operator B are judged to have the authority, executing the power-off action, and if the operator A and/or the operator B are judged not to have the authority, not executing the power-off action.
Referring to fig. 2, the power-off verification system includes a device access service layer, a public service layer, a Web backend and a Web frontend;
in step 2, after the operator A passes the verification, the equipment access service layer uploads the verification result to a public service layer, the public service layer notifies a Web back end, and the Web back end controls a Web front end to display that the verification passes and prompts the operator B to enter the next step for verification;
in step 3, after the operator B passes the verification, the equipment access service layer uploads the verification result to a public service layer, the public service layer notifies a Web back end, and the Web back end controls the Web front end to display that the verification passes and simultaneously issues a control instruction to the public service layer;
in step 4, the public service layer judges whether the operator A and the operator B have the authority.
In this embodiment, the power failure verification system includes a server and a user side disposed in the power utilization circuit, where the user side includes a verification information identification terminal. The verification information identification terminal is a fingerprint machine or a face recognition machine. The user side can also be a smart phone of a user, verification information is input in a mode of receiving a mobile phone verification code for verification, the user operation side is provided with a Web page, and the mobile phone verification code can be input through the Web page.
In this embodiment, the method for verifying whether the power failure verification system verifies information is matched includes: and after the operator inputs the verification information, the verification information identification terminal transmits the verification information to the server, the server decrypts and judges whether the verification information identification terminal is matched with the power utilization loop, and then the verification information is compared with the information stored in the database to judge whether the verification information is correct. Whether the verification information identification terminal is matched with the power utilization loop is judged through a line, the possibility that a hacker steals user verification information or simulates the user verification information to cheat the power failure verification system after the intelligent power utilization system is invaded is avoided from hardware, and the safety is improved.
In order to ensure the security of the authentication, the authentication information is encrypted by an encryption program before being transmitted to the server.
In this embodiment, the power utilization loop is connected with an intelligent air switch, and the intelligent air switch is connected to the internet.
In this embodiment, the power consumption management post and the power consumption authority include:
an administrator having authority to input authentication information of the operator a;
the leader has the authority to input the verification information of the operator B.
It will be understood by those skilled in the art that the foregoing embodiments are merely for clarity of description and are not intended to limit the scope of the invention. It will be apparent to those skilled in the art that other variations or modifications may be made on the above invention and still be within the scope of the invention.
Claims (8)
1. A remote control method for an electric loop is characterized by comprising the following steps:
constructing a power failure authority control method according to the power utilization management post and the power failure authority, and constructing a power failure verification system according to the power failure authority control method; the power failure verification system is connected with the remote power utilization loop through the Internet and is provided with a user operation end;
the power-off authority control method comprises the following steps:
step 1: a user initiates a remote power-off request through a user operation end; at the moment, the user operation end initiates double-person permission verification according to a preset program;
step 2: the operator A inputs verification information, the power-off verification system judges whether verification is successful, and if the verification is successful, the operator B is required to input the verification information; if the verification is unsuccessful, the verification information is required to be input again;
and step 3: the operator B inputs verification information, the power-off verification system judges whether the verification is successful, and if the verification is successful, whether the operator A and the operator B have the authority is judged; if the verification is unsuccessful, the verification information is required to be input again;
and 4, step 4: and if the operator A and the operator B are judged to have the authority, executing the power-off action, and if the operator A and/or the operator B are judged not to have the authority, not executing the power-off action.
2. The method as claimed in claim 1, wherein the power failure verification system comprises a server and a user end installed on the power utilization circuit, and the user end comprises a verification information identification terminal.
3. The method of claim 2, wherein the method for verifying the matching of the power failure verification system verification information comprises: and after the operator inputs the verification information, the verification information identification terminal transmits the verification information to the server, the server decrypts and judges whether the verification information identification terminal is matched with the power utilization loop, and then the verification information is compared with the information stored in the database to judge whether the verification information is correct.
4. A method as claimed in claim 3, wherein the authentication information is encrypted by an encryption program before being transmitted to the server.
5. The remote control method for electric loop according to claim 2, wherein said authentication information recognition terminal is a fingerprint machine or a face recognition machine.
6. The method for remotely controlling a power utilization circuit according to any one of claims 1 to 5, wherein an intelligent air switch is connected to the power utilization circuit, and the intelligent air switch is connected to the Internet.
7. A method for remote control of a power consuming circuit according to any of claims 1 to 5, wherein the user operating terminal has a Web page.
8. A method for remotely controlling a power utilization circuit as claimed in any one of claims 1 to 5, wherein the power utilization management post and authority includes:
an administrator having authority to input authentication information of the operator a;
the leader has the authority to input the verification information of the operator B.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010193577.4A CN111385364B (en) | 2020-03-18 | 2020-03-18 | Remote control method and device for electricity utilization loop |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010193577.4A CN111385364B (en) | 2020-03-18 | 2020-03-18 | Remote control method and device for electricity utilization loop |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111385364A true CN111385364A (en) | 2020-07-07 |
CN111385364B CN111385364B (en) | 2022-10-21 |
Family
ID=71221631
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010193577.4A Active CN111385364B (en) | 2020-03-18 | 2020-03-18 | Remote control method and device for electricity utilization loop |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111385364B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09258854A (en) * | 1996-03-19 | 1997-10-03 | Hitachi Ltd | Power source turn-off control system by software |
JP2007068016A (en) * | 2005-09-01 | 2007-03-15 | Ntt Docomo Inc | Mobile terminal device and security management method thereof |
CN101197053A (en) * | 2007-12-20 | 2008-06-11 | 烟台三环科技有限公司 | GSM wireless remote fingerprint gate guard control system and computer remote control method |
CN101447692A (en) * | 2008-12-29 | 2009-06-03 | 沧州供电公司 | Safe and reliable scheduling operation device in an unattended transformer station |
CN101540095A (en) * | 2009-04-16 | 2009-09-23 | 上海交通大学 | Mobile-network-based system for remotely controlling turning on and turning off of home appliances by cell phone |
CN103729922A (en) * | 2013-12-30 | 2014-04-16 | 北京瑞福临科技有限公司 | Double-wing type security terminal desk and controlling system thereof |
CN106783440A (en) * | 2017-01-03 | 2017-05-31 | 国网江苏省电力公司电力科学研究院 | A kind of intelligent miniature breaker and its integrated electric energy metrical and remote interaction system |
CN108492410A (en) * | 2018-03-12 | 2018-09-04 | 雅砻江流域水电开发有限公司 | A kind of Intelligent locking system based on more people control |
CN110109525A (en) * | 2019-04-19 | 2019-08-09 | 深圳市国鑫恒宇科技有限公司 | A kind of method of long-range control mainboard power-off |
CN110223431A (en) * | 2019-06-24 | 2019-09-10 | 浙江泰科力合科技有限公司 | A kind of intelligence boot system and its working method |
-
2020
- 2020-03-18 CN CN202010193577.4A patent/CN111385364B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09258854A (en) * | 1996-03-19 | 1997-10-03 | Hitachi Ltd | Power source turn-off control system by software |
JP2007068016A (en) * | 2005-09-01 | 2007-03-15 | Ntt Docomo Inc | Mobile terminal device and security management method thereof |
CN101197053A (en) * | 2007-12-20 | 2008-06-11 | 烟台三环科技有限公司 | GSM wireless remote fingerprint gate guard control system and computer remote control method |
CN101447692A (en) * | 2008-12-29 | 2009-06-03 | 沧州供电公司 | Safe and reliable scheduling operation device in an unattended transformer station |
CN101540095A (en) * | 2009-04-16 | 2009-09-23 | 上海交通大学 | Mobile-network-based system for remotely controlling turning on and turning off of home appliances by cell phone |
CN103729922A (en) * | 2013-12-30 | 2014-04-16 | 北京瑞福临科技有限公司 | Double-wing type security terminal desk and controlling system thereof |
CN106783440A (en) * | 2017-01-03 | 2017-05-31 | 国网江苏省电力公司电力科学研究院 | A kind of intelligent miniature breaker and its integrated electric energy metrical and remote interaction system |
CN108492410A (en) * | 2018-03-12 | 2018-09-04 | 雅砻江流域水电开发有限公司 | A kind of Intelligent locking system based on more people control |
CN110109525A (en) * | 2019-04-19 | 2019-08-09 | 深圳市国鑫恒宇科技有限公司 | A kind of method of long-range control mainboard power-off |
CN110223431A (en) * | 2019-06-24 | 2019-09-10 | 浙江泰科力合科技有限公司 | A kind of intelligence boot system and its working method |
Also Published As
Publication number | Publication date |
---|---|
CN111385364B (en) | 2022-10-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104134253B (en) | A kind of gate control system and gate inhibition's deployment method | |
CN105303664A (en) | Intelligent access control system based on two dimensional code technology and control method thereof | |
EP2579220A1 (en) | Entrance guard control method and system thereof | |
CN104504796A (en) | Intelligent machine room access control opening method and system based on wireless network | |
CN103825871A (en) | Authentication system and emission terminal, reception terminal and authority authentication method thereof | |
US10229291B2 (en) | Method and system for cryptographically enabling and disabling lockouts for critical operations in a smart grid network | |
CN103414881A (en) | Method for fast configuring remote video monitoring system | |
CN109523662B (en) | Identity verification electricity taking method, electricity taking device, access control method and device | |
EP2544397B1 (en) | Method and communication device for accessing to devices in security | |
CN110035071A (en) | A kind of long-range double factor mutual authentication method, client and server-side towards industrial control system | |
CN106127900A (en) | A kind of user identity comprehensive verification method for unlocking and device | |
CN110796220B (en) | Public transportation-based identification code sending system | |
CN109002875A (en) | Two dimensional code encryption method, two dimensional code Transmission system and storage medium | |
CN107426160A (en) | Control method, system, terminal, FIDO servers and the safety means of smart home | |
CN109902462A (en) | A kind of unified identity authentication method towards power scheduling control system | |
CN103905194A (en) | Identity traceability authentication method and system | |
CN105096423A (en) | Two-dimension code-based intelligent student apartment access control system and control method thereof | |
CN104978515A (en) | Computer intelligent hole-locking device | |
CN105608349A (en) | Terminal mode switching method and apparatus as well as terminal | |
CN113674455A (en) | Intelligent door lock remote control method, device, system, equipment and storage medium | |
CN113591057A (en) | Biological characteristic off-line identity recognition method and system | |
CN106230869B (en) | Based on power distribution automation wireless maintenance safety certifying method and system | |
CN104835038A (en) | Networking payment device and networking payment method | |
CN111385364B (en) | Remote control method and device for electricity utilization loop | |
CN106710049A (en) | Holographic door control system and control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |