CN111385364B - Remote control method and device for electricity utilization loop - Google Patents

Remote control method and device for electricity utilization loop Download PDF

Info

Publication number
CN111385364B
CN111385364B CN202010193577.4A CN202010193577A CN111385364B CN 111385364 B CN111385364 B CN 111385364B CN 202010193577 A CN202010193577 A CN 202010193577A CN 111385364 B CN111385364 B CN 111385364B
Authority
CN
China
Prior art keywords
verification
operator
power
authority
verification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010193577.4A
Other languages
Chinese (zh)
Other versions
CN111385364A (en
Inventor
左畅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haoyun Technologies Co Ltd
Original Assignee
Haoyun Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haoyun Technologies Co Ltd filed Critical Haoyun Technologies Co Ltd
Priority to CN202010193577.4A priority Critical patent/CN111385364B/en
Publication of CN111385364A publication Critical patent/CN111385364A/en
Application granted granted Critical
Publication of CN111385364B publication Critical patent/CN111385364B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/12Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment
    • Y04S40/128Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment involving the use of Internet protocol
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Medical Informatics (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)

Abstract

The invention provides a remote control method and a remote control device for a power utilization loop, wherein the method comprises the steps of constructing a power failure authority control method according to a power utilization management post and authority, and constructing a power failure verification system according to the power failure authority control method; the power failure verification system is connected with the remote power utilization loop through the Internet and is provided with a user operation end; the power-off authority control method comprises the following steps: step 1: a user initiates a remote power-off request through a user operation end; at the moment, the user operation end initiates double-person permission verification according to a preset program; step 2: verifying the verification information of the operator A; and step 3: verifying the verification information of the operator B; and 4, step 4: and if the operator A and the operator B are judged to have the authority, executing the power-off action, and if the operator A and/or the operator B are judged not to have the authority, not executing the power-off action. According to the method, power is cut off after double verification, so that the problems that a power circuit is maliciously cut off in an intelligent power system and the like are solved.

Description

Remote control method and device for electricity utilization loop
Technical Field
The present invention relates to power-off methods, and more particularly, to a method and apparatus for remotely controlling an electric circuit.
Background
The intelligent power utilization system is an intelligent service system which digitalizes the traditional power utilization mode and realizes Internet of things. Along with the access of the power utilization circuit to the Internet, remote connection, power failure and other operations can be realized, great convenience is brought to life and work of people, but risks exist, once an intelligent power utilization system is illegally invaded, the power utilization circuit can be illegally cut off, and serious damage can be caused in special places such as hospitals, banks and the like.
Disclosure of Invention
The invention provides a remote control method and a remote control device for a power utilization loop.
The technical scheme of the invention is realized as follows:
a remote control method for an electric loop comprises the following steps:
constructing a power failure authority control method according to the power utilization management post and the power failure authority, and constructing a power failure verification system according to the power failure authority control method; the power failure verification system is connected with the remote power utilization loop through the Internet and is provided with a user operation end;
the power-off authority control method comprises the following steps:
step 1: a user initiates a remote power-off request through a user operation end; at the moment, the user operation end initiates double-person permission verification according to a preset program;
step 2: the operator A inputs verification information, the power-off verification system judges whether verification is successful, and if the verification is successful, the operator B is required to input the verification information; if the verification is unsuccessful, the verification information is required to be input again;
and step 3: the operator B inputs verification information, the power failure verification system judges whether the verification is successful, and if the verification is successful, whether the operator A and the operator B have the authority is judged; if the verification is not successful, the verification information is required to be input again;
and 4, step 4: and if the operator A and the operator B are judged to have the authority, executing the power-off action, and if the operator A and/or the operator B are judged not to have the authority, not executing the power-off action.
Further, the power failure verification system comprises a server and a user side arranged on the power utilization circuit, wherein the user side comprises a verification information identification terminal.
Further, the method for verifying whether the power failure verification system verifies information is matched comprises the following steps: and after the operator inputs the verification information, the verification information identification terminal transmits the verification information to the server, the server decrypts and judges whether the verification information identification terminal is matched with the power utilization loop, and then the verification information is compared with the information stored in the database to judge whether the verification information is correct.
Further, the authentication information is encrypted by an encryption program before being transmitted to the server.
Further, the verification information identification terminal is a fingerprint machine or a face recognition machine.
Furthermore, the power utilization loop is connected with an intelligent air switch, and the intelligent air switch is connected to the Internet.
Further, the user operation end is provided with a Web page.
Further, the power utilization management posts and the power utilization authority comprise:
an administrator having authority to input authentication information of the operator a;
the leader has the authority to input the verification information of the operator B.
Compared with the prior art, the power utilization loop cutting method provided by the embodiment of the invention has the following advantages:
through constructing the power-off verification system, the double-post verification is adopted, the double-post verification is required to pass, and the power-off can be realized only after the double-post verification has the corresponding authority, so that the loss caused by the malicious power-off of the power circuit is avoided.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate exemplary embodiments of the invention and together with the description serve to explain the principles of the invention.
FIG. 1 is a schematic flow diagram of a method for remote control of a power utilization circuit of the present invention;
FIG. 2 is a schematic diagram of the topology of the outage verification system of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and embodiments. It is to be understood that the specific embodiments described herein are for purposes of illustration only and are not to be construed as limitations of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
In addition, the embodiments of the present invention and the features of the embodiments may be combined with each other without conflict. The present invention will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
The embodiment provides a remote control method of an electric loop;
referring to fig. 1, the cutting method includes the steps of:
constructing a power failure authority control method according to the power utilization management post and the power failure authority, and constructing a power failure verification system according to the power failure authority control method; the power failure verification system is connected with the remote power utilization loop through the Internet and is provided with a user operation end;
the power-off authority control method comprises the following steps:
step 1: a user initiates a remote power-off request through a user operation end; at the moment, the user operation end initiates double-person permission verification according to a preset program;
step 2: the operator A inputs verification information, the power-off verification system judges whether verification is successful, and if the verification is successful, the operator B is required to input the verification information; if the verification is not successful, the verification information is required to be input again;
and 3, step 3: the operator B inputs verification information, the power-off verification system judges whether the verification is successful, and if the verification is successful, whether the operator A and the operator B have the authority is judged; if the verification is unsuccessful, the verification information is required to be input again;
and 4, step 4: and if the operator A and the operator B are judged to have the authority, executing the power-off action, and if the operator A and/or the operator B are judged not to have the authority, not executing the power-off action.
Referring to fig. 2, the power-off verification system includes a device access service layer, a public service layer, a Web backend and a Web frontend;
in step 2, after the operator A passes the verification, the equipment access service layer uploads the verification result to a public service layer, the public service layer informs a Web back end, and the Web back end controls a Web front end to display the verification passing and prompts the next step of the verification of an operator B;
in step 3, after the operator B passes the verification, the equipment access service layer uploads the verification result to a public service layer, the public service layer notifies a Web back end, and the Web back end controls the Web front end to display that the verification passes and simultaneously issues a control instruction to the public service layer;
in step 4, the public service layer judges whether the operator a and the operator B have the authority.
In this embodiment, the power failure verification system includes a server and a user side disposed in the power utilization circuit, where the user side includes a verification information identification terminal. The verification information identification terminal is a fingerprint machine or a face recognition machine. The user side can also be a smart phone of a user, verification information is input in a mode of receiving a mobile phone verification code for verification, the user operation side is provided with a Web page, and the mobile phone verification code can be input through the Web page.
In this embodiment, the method for verifying whether the power failure verification system verifies information is matched includes: and after the operator inputs the verification information, the verification information identification terminal transmits the verification information to the server, the server decrypts and judges whether the verification information identification terminal is matched with the power utilization loop, and then the verification information is compared with the information stored in the database to judge whether the verification information is correct. Whether the verification information identification terminal is matched with the power utilization loop is judged through lines, the possibility that a hacker steals user verification information or simulates the user verification information to cheat the power failure verification system after the intelligent power utilization system is invaded is avoided from hardware, and safety is improved.
In order to ensure the security of the authentication, the authentication information is encrypted by an encryption program before being transmitted to the server.
In this embodiment, the power utilization loop is connected with an intelligent air switch, and the intelligent air switch is connected to the internet.
In this embodiment, the power consumption management post and the power consumption authority include:
an administrator having a right to input authentication information of the operator a;
the leader has the authority to input the verification information of the operator B.
It will be understood by those skilled in the art that the foregoing embodiments are merely for clarity of description and are not intended to limit the scope of the invention. Other variations or modifications may occur to those skilled in the art, which are based on the above-described invention, and which are still within the scope of the invention.

Claims (8)

1. A remote control method for an electric circuit is characterized by comprising the following steps:
constructing a power failure authority control method according to the power utilization management post and the power failure authority, and constructing a power failure verification system according to the power failure authority control method; the power-off verification system is connected with the remote power utilization loop through the Internet and is provided with a user operation end;
the power-off authority control method comprises the following steps:
step 1: a user initiates a remote power-off request through a user operation end; at the moment, the user operation end initiates double-person permission verification according to a preset program;
step 2: the operator A inputs verification information, the power-off verification system judges whether verification is successful, and if the verification is successful, the operator B is required to input the verification information; if the verification is unsuccessful, the verification information is required to be input again;
and step 3: the operator B inputs verification information, the power-off verification system judges whether the verification is successful, and if the verification is successful, whether the operator A and the operator B have the authority is judged; if the verification is unsuccessful, the verification information is required to be input again;
and 4, step 4: if the operator A and the operator B are judged to have the authority, executing a power-off action, and if the operator A and/or the operator B are judged not to have the authority, not executing the power-off operation;
the power failure verification system comprises a device access service layer, a public service layer, a Web back end and a Web front end;
in step 2, after the operator A passes the verification, the equipment access service layer uploads the verification result to a public service layer, the public service layer notifies a Web back end, and the Web back end controls a Web front end to display that the verification passes and prompts the operator B to enter the next step for verification;
in step 3, after the operator B passes the verification, the equipment access service layer uploads the verification result to a public service layer, the public service layer notifies a Web back end, and the Web back end controls the Web front end to display that the verification passes and simultaneously issues a control instruction to the public service layer;
in step 4, the public service layer judges whether the operator A and the operator B have the authority.
2. The method as claimed in claim 1, wherein the power failure verification system comprises a server and a user end installed on the power utilization circuit, and the user end comprises a verification information identification terminal.
3. The method of claim 2, wherein the method for verifying the matching of the power failure verification system verification information comprises: and after the operator inputs the verification information, the verification information identification terminal transmits the verification information to the server, the server decrypts and judges whether the verification information identification terminal is matched with the power utilization loop, and then the verification information is compared with the information stored in the database to judge whether the verification information is correct.
4. A method as claimed in claim 3, wherein the authentication information is encrypted by an encryption program before being transmitted to the server.
5. The remote control method for electric loop according to claim 2, wherein said authentication information recognition terminal is a fingerprint machine or a face recognition machine.
6. A method for remotely controlling an electric power utilization loop according to any one of claims 1-5, wherein an intelligent air switch is connected to the electric power utilization loop, and the intelligent air switch is connected to the Internet.
7. A method for remote control of a power consuming circuit according to any of claims 1 to 5, wherein the user operating terminal has a Web page.
8. A method for remotely controlling a power utilization circuit as claimed in any one of claims 1 to 5, wherein the power utilization management post and authority includes:
an administrator having authority to input authentication information of the operator a;
the leader has the authority to input the verification information of the operator B.
CN202010193577.4A 2020-03-18 2020-03-18 Remote control method and device for electricity utilization loop Active CN111385364B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010193577.4A CN111385364B (en) 2020-03-18 2020-03-18 Remote control method and device for electricity utilization loop

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010193577.4A CN111385364B (en) 2020-03-18 2020-03-18 Remote control method and device for electricity utilization loop

Publications (2)

Publication Number Publication Date
CN111385364A CN111385364A (en) 2020-07-07
CN111385364B true CN111385364B (en) 2022-10-21

Family

ID=71221631

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010193577.4A Active CN111385364B (en) 2020-03-18 2020-03-18 Remote control method and device for electricity utilization loop

Country Status (1)

Country Link
CN (1) CN111385364B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09258854A (en) * 1996-03-19 1997-10-03 Hitachi Ltd Power source turn-off control system by software
CN101447692A (en) * 2008-12-29 2009-06-03 沧州供电公司 Safe and reliable scheduling operation device in an unattended transformer station
CN110109525A (en) * 2019-04-19 2019-08-09 深圳市国鑫恒宇科技有限公司 A kind of method of long-range control mainboard power-off

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4361041B2 (en) * 2005-09-01 2009-11-11 株式会社エヌ・ティ・ティ・ドコモ Mobile terminal device and security management method thereof
CN101197053B (en) * 2007-12-20 2011-06-22 烟台三环科技有限公司 GSM wireless remote fingerprint gate guard control system and computer remote control method
CN101540095B (en) * 2009-04-16 2010-12-29 上海交通大学 Mobile-network-based system for remotely controlling turning on and turning off of home appliances by cell phone
CN103729922A (en) * 2013-12-30 2014-04-16 北京瑞福临科技有限公司 Double-wing type security terminal desk and controlling system thereof
CN106783440A (en) * 2017-01-03 2017-05-31 国网江苏省电力公司电力科学研究院 A kind of intelligent miniature breaker and its integrated electric energy metrical and remote interaction system
CN108492410A (en) * 2018-03-12 2018-09-04 雅砻江流域水电开发有限公司 A kind of Intelligent locking system based on more people control
CN110223431A (en) * 2019-06-24 2019-09-10 浙江泰科力合科技有限公司 A kind of intelligence boot system and its working method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09258854A (en) * 1996-03-19 1997-10-03 Hitachi Ltd Power source turn-off control system by software
CN101447692A (en) * 2008-12-29 2009-06-03 沧州供电公司 Safe and reliable scheduling operation device in an unattended transformer station
CN110109525A (en) * 2019-04-19 2019-08-09 深圳市国鑫恒宇科技有限公司 A kind of method of long-range control mainboard power-off

Also Published As

Publication number Publication date
CN111385364A (en) 2020-07-07

Similar Documents

Publication Publication Date Title
CN105303664A (en) Intelligent access control system based on two dimensional code technology and control method thereof
CN109002875B (en) Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
US10229291B2 (en) Method and system for cryptographically enabling and disabling lockouts for critical operations in a smart grid network
CN104504796A (en) Intelligent machine room access control opening method and system based on wireless network
CN103414881A (en) Method for fast configuring remote video monitoring system
EP2544397B1 (en) Method and communication device for accessing to devices in security
CN109523662B (en) Identity verification electricity taking method, electricity taking device, access control method and device
CN110035071A (en) A kind of long-range double factor mutual authentication method, client and server-side towards industrial control system
CN102255109A (en) Authentication method for mobile terminal battery, and mobile terminal thereof
CN103839160B (en) A kind of network trading digital signature method and device
CN105574967A (en) Intelligent access control system and operation method thereof
CN110796220B (en) Public transportation-based identification code sending system
CN103905194A (en) Identity traceability authentication method and system
CN109902462A (en) A kind of unified identity authentication method towards power scheduling control system
CN105608349A (en) Terminal mode switching method and apparatus as well as terminal
CN113674455A (en) Intelligent door lock remote control method, device, system, equipment and storage medium
CN113378135B (en) Method for inquiring and verifying privacy data of computer
CN111385364B (en) Remote control method and device for electricity utilization loop
CN106710049A (en) Holographic door control system and control method
CN111435389A (en) Power distribution terminal operation and maintenance tool safety protection system
CN109326018B (en) Authentication method, device and system for preventing lock from being copied and electronic key
KR101333006B1 (en) System and method of confirming a login
WO2019205357A1 (en) Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
CN104852904B (en) A kind of Server remote method for restarting applied based on cell phone application and Encrypted short message ceases
CN102693506B (en) Device and method for supporting operation of mobile traction business process

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant