CN112767578A - Authorization method, application method, unlocking method, terminal and storage medium - Google Patents
Authorization method, application method, unlocking method, terminal and storage medium Download PDFInfo
- Publication number
- CN112767578A CN112767578A CN202011593582.0A CN202011593582A CN112767578A CN 112767578 A CN112767578 A CN 112767578A CN 202011593582 A CN202011593582 A CN 202011593582A CN 112767578 A CN112767578 A CN 112767578A
- Authority
- CN
- China
- Prior art keywords
- information
- key
- approval
- unlocking
- authorization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 91
- 238000013475 authorization Methods 0.000 title claims abstract description 82
- 238000003860 storage Methods 0.000 title claims abstract description 14
- 238000012423 maintenance Methods 0.000 claims abstract description 58
- 238000004891 communication Methods 0.000 claims description 13
- 238000012544 monitoring process Methods 0.000 claims description 9
- 230000008569 process Effects 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 3
- 238000007726 management method Methods 0.000 description 14
- 230000006870 function Effects 0.000 description 8
- 238000009826 distribution Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000008439 repair process Effects 0.000 description 3
- 239000000463 material Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 235000015170 shellfish Nutrition 0.000 description 2
- 238000007619 statistical method Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000000739 chaotic effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 231100001261 hazardous Toxicity 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses an authorization method, an application method, an unlocking method, a terminal and a storage medium, wherein the authorization method is applied to a power grid maintenance system and is characterized by comprising the following steps: acquiring approval request information from a mobile terminal, wherein the approval request information comprises approval reasons, key information and application permission; carrying out approval according to the approval affair; if the approval is passed, issuing unlocking authorization to a key corresponding to the key information according to the key information and the application authority; the approval result information is sent to the mobile terminal, one-to-one correspondence between the intelligent key and the operating personnel can be realized, the door lock key does not need to be borrowed back and forth, and the working efficiency of the operating personnel is improved.
Description
Technical Field
The invention relates to the technical field of intelligent power equipment, in particular to an authorization method, an application method, an unlocking method, a terminal and a storage medium.
Background
With the increasing complexity of the distribution network structure of the power grid system, more and more power equipment are accessed. Since electrical equipment is hazardous, mechanical locks are required to prevent non-professionals from touching the electrical equipment. When equipment maintenance or repair is carried out, a maintainer needs to carry a key to open a mechanical lock to carry out maintenance or repair of the electrical equipment.
At present, the existing method for managing keys manually is not only easy to make mistakes, but also wastes manual resources, takes time and cost and increases operation cost. When different maintenance personnel need to patrol the same equipment, the returned keys are not arranged in corresponding places in time, and people easily return the keys, but cannot get new keys, and the people run for a plurality of times and wait in line. The key is easy to find and lose. Various chaotic conditions are caused, and the normal working production of the power grid is further influenced, so that the normal operation of the power grid is influenced.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art. Therefore, the invention provides a remote key authorization method, which can realize one-to-one correspondence between intelligent keys and operators without borrowing back and forth door lock keys, and improves the working efficiency of the operators.
According to a first aspect of the present invention, a remote key authorization method is applied to a power grid maintenance system, and is characterized by comprising: acquiring approval request information from a mobile terminal, wherein the approval request information comprises approval reasons, key information and application permission; carrying out approval according to the approval affair; if the approval is passed, issuing unlocking authorization to a key corresponding to the key information according to the key information and the application authority; and sending the approval result information to the mobile terminal.
Some embodiments according to the present invention are characterized in that, after issuing a key authorization to a key corresponding to the key information according to the key information and the application authority, the method further includes: establishing approval filing information according to the approval affair, the key information, the application authority and the unlocking authorization; according to the approval filed information, unlocking information from the lockset is called; and storing the unlocking information to the approval archiving information.
Some embodiments according to the present invention further comprise, after the sending the approval pass information to the mobile terminal: acquiring map information and position information of the key; and establishing graphic monitoring information according to the position information of the key and the application authority.
According to a second aspect of the present invention, a remote key authorization application method is applied to a power grid maintenance mobile terminal, where the power grid maintenance mobile terminal is in communication connection with a power grid maintenance system, and the method includes: sending approval request information to the power grid maintenance system; and acquiring approval result information from the power grid maintenance system.
According to some embodiments of the invention, the obtaining of the approval result information from the power grid maintenance system includes: acquiring whether the examination and approval passes according to the examination and approval result information; and if the power grid maintenance system passes the editing process, the approval request information is edited again to obtain new approval request information, and the new approval request information is sent to the power grid maintenance system.
According to some embodiments of the invention, after the obtaining of the approval result information from the power grid maintenance system, the method further comprises: acquiring map information and position information of the key; and acquiring door lock authorization information according to the map information, the position information of the key and the approval result.
According to a third aspect of the present invention, a remote key unlocking method is applied to a remote key, and the smart key is in communication connection with a power grid maintenance system, and includes: obtaining unlocking authorization from the power grid maintenance system; acquiring unlocking authority according to the unlocking authorization; and sending the unlocking authority to the lock so as to open the lock.
According to some embodiments of the invention, after the sending the unlocking right to the lock to open the lock, the method further comprises: acquiring an unlocking record and a locking record; and sending the unlocking record and the locking record to the power grid maintenance system.
An electronic device according to a fourth aspect embodiment of the present invention includes: a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor when executing the program implementing: the remote key authorization method of the first aspect; alternatively, the remote key authorization application method according to the second aspect; alternatively, a remote key unlocking method according to the third aspect.
An electronic device according to an embodiment of the fifth aspect of the present invention, a computer-readable storage medium storing computer-executable instructions for: the remote key authorization method of the first aspect; alternatively, the remote key authorization application method according to the second aspect; alternatively, a remote key unlocking method according to the third aspect.
The remote key authorization method of the embodiment of the invention is based on a power grid maintenance system, and is characterized by comprising the following steps: acquiring approval request information from a mobile terminal, wherein the approval request information comprises approval reasons, key information and application permission; carrying out approval according to the approval affair; if the approval is passed, issuing unlocking authorization to a key corresponding to the key information according to the key information and the application authority; the approval result information is sent to the mobile terminal, one-to-one correspondence between the intelligent key and the operating personnel can be realized, the door lock key does not need to be borrowed back and forth, and the working efficiency of the operating personnel is improved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flow chart of a remote key authorization method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a remote key authorization application method according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of a remote key unlocking method according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present invention, and should not be construed as limiting the present invention.
In the description of the present invention, it should be understood that the orientation or positional relationship referred to in the description of the orientation, such as the upper, lower, front, rear, left, right, etc., is based on the orientation or positional relationship shown in the drawings, and is only for convenience of description and simplification of description, and does not indicate or imply that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus, should not be construed as limiting the present invention.
In the description of the present invention, the meaning of a plurality of means is one or more, the meaning of a plurality of means is two or more, and larger, smaller, larger, etc. are understood as excluding the number, and larger, smaller, inner, etc. are understood as including the number. If the first and second are described for the purpose of distinguishing technical features, they are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated or implicitly indicating the precedence of the technical features indicated.
In the description of the present invention, unless otherwise explicitly limited, terms such as arrangement, installation, connection and the like should be understood in a broad sense, and those skilled in the art can reasonably determine the specific meanings of the above terms in the present invention in combination with the specific contents of the technical solutions.
According to a first aspect of the invention, a remote key authorization method is applied to a power grid maintenance system, and comprises the following steps: acquiring approval request information from a mobile terminal, wherein the approval request information comprises approval reasons, key information and application permission; carrying out approval according to approval reasons; if the approval is passed, issuing unlocking authorization to the key corresponding to the key information according to the key information and the application authority; and sending the approval result information to the mobile terminal.
Fig. 1 is a schematic flow chart of a remote key authorization method according to an embodiment of the present invention, where the remote key authorization method shown in fig. 1 at least includes the following steps: s110: acquiring approval request information from a mobile terminal; s120: carrying out approval according to approval reasons; s130: if the approval is passed, issuing unlocking authorization to the key corresponding to the key information according to the key information and the application authority; s140: and sending the approval result information to the mobile terminal.
S110: and acquiring approval request information from the mobile terminal.
In some embodiments, approval request information from a mobile terminal is obtained. The approval request information comprises approval reasons, key information and application authority.
S120: the approval is performed according to the approval schedule.
In some embodiments, the grid system is approved according to an approval event.
S130: and if the approval is passed, issuing unlocking authorization to the key corresponding to the key information according to the key information and the application authority.
In some embodiments, if the approval is passed, an unlocking authorization is issued to the key corresponding to the key information according to the key information and the application authority. And if the approval is not passed, ending the process.
S140: and sending the approval result information to the mobile terminal.
In some embodiments, the power grid system sends approval result information to the mobile terminal
In some embodiments, after issuing a key authorization to a key corresponding to the key information according to the key information and the application authority, the method further includes: establishing approval filing information according to approval reasons, key information, application authority and unlocking authorization; the unlocking information from the lockset is called according to the approval archived information; and storing the unlocking information into the approval archiving information.
In some embodiments, after sending the approval pass information to the mobile terminal, the method further includes: acquiring map information and position information of a key; and establishing graphic monitoring information according to the position information and the application authority of the key.
In some embodiments, the remote key authorization method proposed by the embodiments of the present invention performs key authorization through narrowband Band Internet of Things (NB-IoT).
In some embodiments, the remote key authorization method provided by the embodiment of the invention realizes real-time connection with the management platform through an intelligent key based on an NB-IoT technology, binds operating personnel and the intelligent keys one by utilizing an information system, and realizes remote unlocking authorization by combining a power distribution network ring main unit and a power distribution room ledger.
In some embodiments, the remote key authorization method provided by the embodiments of the present invention can monitor the position of the key in real time and retrieve the unlocking record of the key. By monitoring the position of the key and the unlocking record, the operation progress can be obtained. The key position and the maintenance and the station position information and the maintenance state information to be maintained can also be displayed on the map.
For example, the door lock authorization page can display authorized personnel of the office switch room for the street of the water shellfish including Zhang three and Li four, wherein Zhang three belongs to the emergency maintenance class of the Luo lake power supply office, and Li four belongs to the emergency maintenance class of the Luo lake power supply office. The unlocking record page can display the unlocking time and the unlocking reason of the office switch room of the water shellfish street. For example, Zhang III opens the door lock in XX minutes and XX seconds when XX circuit patrol is performed in XXXX month and XX day of XX month in XXXXXX year; lie four opened the door lock XX minutes and XX seconds for XX line tours performed in XXXX year, XX month XX day XX. And on the intelligent navigation page, map information can be displayed, and labeling is carried out on the key position and the station to be maintained, wherein the station which has finished maintenance or repair and the station to be maintained are displayed by different marks, and the maintenance state information is displayed.
In some embodiments, the remote key authorization method provided by the embodiment of the invention realizes intelligent positioning of intelligent locks of distribution network switch rooms and switch cabinets by combining map information, and displays basic information and authority of door locks, latest unlocking time and personnel in real time. All the unlocking records automatically record the unlocking positions, the background provides a coordinate modification confirmation function, and the accuracy of the machine account coordinates is improved.
In some embodiments, the remote key authorization method provided by the embodiments of the present invention includes a warehousing process, an authorization process, and an unlocking process. The warehousing process comprises the steps of establishing a key list and a door lock list in a back-end management system after equipment leaves a factory and enters a network.
In some embodiments, the remote key authorization method provided by the embodiments of the present invention includes a background management platform, which is used for providing monitoring, managing and counting functions for the management platform, realizing intelligent information monitoring, mastering the position information of personnel and a door lock in real time, providing a complete information management function, and providing a basis for employee performance and supplier evaluation based on the operation and maintenance data to realize data statistics.
In some embodiments, the remote key authorization method provided by the embodiments of the present invention includes a service application and a statistical analysis function. The service application comprises personnel management, key management, authority management, equipment door lock management and graphical monitoring. Wherein the statistical analysis comprises: personnel unlocking statistics, key unlocking statistics, door lock record statistics, manufacturer model statistics and equipment ledger management.
Fig. 2 is a schematic flow chart of a remote key authorization application method provided in an embodiment of the present invention, where the remote key authorization application method shown in fig. 2 at least includes the following steps: s210: sending approval request information to a power grid maintenance system; s220: and acquiring approval result information from the power grid maintenance system.
S210: and sending the approval request information to a power grid maintenance system.
In some embodiments, the execution terminal of the remote key authorization application method sends approval request information to the grid maintenance system.
S220: and acquiring approval result information from the power grid maintenance system.
In some embodiments, the execution terminal of the remote key authorization application method obtains approval result information from the power grid maintenance system.
In some embodiments, the remote key authorization application method provided by the embodiments of the present invention includes recording authority management, graphic application, an unlocking manner, an unlocking record, and standing book management.
In some embodiments, rights management includes rights application and rights approval. The execution terminal of the remote key authorization application method can set different authorities and respectively execute the authority application and authority approval functions.
According to a second aspect of the present invention, a remote key authorization application method is applied to a power grid maintenance mobile terminal, where the power grid maintenance mobile terminal is in communication connection with a power grid maintenance system, and the method includes: sending approval request information to a power grid maintenance system; and acquiring approval result information from the power grid maintenance system.
In some embodiments, obtaining approval result information from the grid maintenance system comprises: acquiring whether the examination and approval pass or not according to the examination and approval result information; and if the information does not pass the verification request, re-editing the verification request information to acquire new verification request information, and sending the new verification request information to the power grid maintenance system.
In some embodiments, after obtaining the approval result information from the power grid maintenance system, the method further includes: acquiring map information and position information of a key; and acquiring the door lock authorization information according to the map information, the position information of the key and the approval result.
In some embodiments, the graphical application includes map navigation and ambient information alerts. The execution terminal of the remote key authorization application method can provide navigation information and perform a navigation function according to a station to be maintained and a key position. When the emergency information appears near the execution terminal, peripheral information reminding is performed.
In some embodiments, the unlocking modes include code-scanning unlocking and bluetooth unlocking. Code scanning unlocking can be directly carried out by applying an execution terminal of a remote key authorization application method. The bluetooth unlocking can send the authorization to the key end for authorization.
In some embodiments, ledger management includes ledger information and panoramic monitoring. The execution terminal can check the standing book information and the panoramic monitoring.
Fig. 3 is a schematic flow chart of a remote key unlocking method according to an embodiment of the present invention, where the remote key unlocking method shown in fig. 3 at least includes the following steps: s310: acquiring unlocking authorization from a power grid maintenance system; s320: obtaining unlocking authority according to unlocking authorization; s330: and sending unlocking authority to the lock to unlock the lock.
S310: and acquiring unlocking authorization from a power grid maintenance system.
In some embodiments, the key is provided with a communication module, supports communication protocols such as bluetooth, 4G and 5G, IoT, completes locking operation through bluetooth and mobile APP communication, and realizes authority control and data uploading functions through communication modes such as 4G and 5G, IoT.
S320: and obtaining unlocking authority according to the unlocking authorization.
In some embodiments, the key obtains the unlocking authority of the corresponding lock according to the unlocking authorization.
S330: and sending unlocking authority to the lock to unlock the lock.
In some embodiments, the lockset adopts single-wire communication, after a key is inserted into the mechanical lock, the key is authenticated after being connected with the intelligent passive lockset through a single contact point, and if the authentication is passed, the driving motor completes unlocking.
According to a third aspect of the present invention, a remote key unlocking method is applied to a remote key, where a smart key is in communication connection with a power grid maintenance system, and includes: acquiring unlocking authorization from a power grid maintenance system; obtaining unlocking authority according to unlocking authorization; and sending unlocking authority to the lock to unlock the lock.
In some embodiments, after sending the unlocking right to the lock to open the lock, the method further comprises: acquiring an unlocking record and a locking record; and sending the unlocking record and the locking record to a power grid maintenance system.
In some embodiments, the electronic key may be charged using the miniUSB port. Meanwhile, the emergency charging device is also provided with a hand generator for emergency charging.
An electronic device according to a fourth aspect embodiment of the present invention includes: a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor when executing the program implementing: a remote key authorization method as in the first aspect; alternatively, the remote key authorization application method of the second aspect; alternatively, a remote key unlocking method according to the third aspect.
An electronic device according to an embodiment of the fifth aspect of the present invention, a computer-readable storage medium storing computer-executable instructions for: a remote key authorization method as in the first aspect; alternatively, the remote key authorization application method of the second aspect; alternatively, a remote key unlocking method according to the third aspect.
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention.
The above-described embodiments of the apparatus are merely illustrative, wherein the units illustrated as separate components may or may not be physically separate, i.e. may be located in one place, or may also be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
One of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an illustrative embodiment," "an example," "a specific example," or "some examples" or the like mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
Claims (10)
1. A remote key authorization method is applied to a power grid maintenance system and is characterized by comprising the following steps:
acquiring approval request information from a mobile terminal, wherein the approval request information comprises approval reasons, key information and application permission;
carrying out approval according to the approval affair;
if the approval is passed, issuing unlocking authorization to a key corresponding to the key information according to the key information and the application authority;
and sending the approval result information to the mobile terminal.
2. The remote key authorization method according to claim 1, wherein after issuing a key authorization to a key corresponding to the key information according to the key information and the application authority, the method further comprises:
establishing approval filing information according to the approval affair, the key information, the application authority and the unlocking authorization;
according to the approval filed information, unlocking information from the lockset is called;
and storing the unlocking information to the approval archiving information.
3. The remote key authorization method according to any one of claims 1 or 2, further comprising, after the sending an approval pass message to the mobile terminal:
acquiring map information and position information of the key;
and establishing graphic monitoring information according to the position information of the key and the application authority.
4. A remote key authorization application method is applied to a power grid maintenance mobile terminal, the power grid maintenance mobile terminal is in communication connection with a power grid maintenance system, and the method is characterized by comprising the following steps:
sending approval request information to the power grid maintenance system;
and acquiring approval result information from the power grid maintenance system.
5. The remote key authorization application method according to claim 4, wherein the obtaining of approval result information from the grid maintenance system comprises:
acquiring whether the examination and approval passes according to the examination and approval result information;
and if the power grid maintenance system passes the editing process, the approval request information is edited again to obtain new approval request information, and the new approval request information is sent to the power grid maintenance system.
6. The remote key authorization application method according to any one of claims 4 or 5, characterized by further comprising, after the obtaining of the approval result information from the power grid maintenance system:
acquiring map information and position information of the key;
and acquiring door lock authorization information according to the map information, the position information of the key and the approval result.
7. A remote key unlocking method is applied to a remote key, the remote key is in communication connection with a power grid maintenance system, and the method is characterized by comprising the following steps:
obtaining unlocking authorization from the power grid maintenance system;
acquiring unlocking authority according to the unlocking authorization;
and sending the unlocking authority to the lock so as to open the lock.
8. The remote key unlocking method according to claim 7, further comprising, after said transmitting said unlocking right to the lock to open said lock:
acquiring an unlocking record and a locking record;
and sending the unlocking record and the locking record to the power grid maintenance system.
9. An electronic device, comprising: a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor when executing the program implementing:
the remote key authorization method according to any one of claims 1 to 3;
alternatively, the first and second electrodes may be,
the remote key authorization application method according to any one of claims 4 to 6;
alternatively, the first and second electrodes may be,
the remote key unlocking method according to any one of claims 7 to 8.
10. A computer-readable storage medium storing computer-executable instructions for:
the remote key authorization method according to any one of claims 1 to 3;
alternatively, the first and second electrodes may be,
the remote key authorization application method according to any one of claims 4 to 6;
alternatively, the first and second electrodes may be,
the remote key unlocking method according to any one of claims 7 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011593582.0A CN112767578A (en) | 2020-12-29 | 2020-12-29 | Authorization method, application method, unlocking method, terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011593582.0A CN112767578A (en) | 2020-12-29 | 2020-12-29 | Authorization method, application method, unlocking method, terminal and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112767578A true CN112767578A (en) | 2021-05-07 |
Family
ID=75695964
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011593582.0A Pending CN112767578A (en) | 2020-12-29 | 2020-12-29 | Authorization method, application method, unlocking method, terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112767578A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114197968A (en) * | 2021-12-14 | 2022-03-18 | 南方电网深圳数字电网研究院有限公司 | Intelligent key use monitoring method and device |
CN114283509A (en) * | 2021-12-28 | 2022-04-05 | 国网上海市电力公司 | Intelligent management and control system for transformer substation |
CN114708116A (en) * | 2022-03-11 | 2022-07-05 | 哈尔滨圣昌科技开发有限公司 | Pipe network monitoring intelligent processing system |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104266641A (en) * | 2014-10-10 | 2015-01-07 | 国家电网公司 | Intelligent navigation control method for five-prevention lock of transformer substation |
CN104281136A (en) * | 2014-10-10 | 2015-01-14 | 国家电网公司 | Five-prevention lock intelligent navigation control system for transformer substation |
CN104484925A (en) * | 2014-12-08 | 2015-04-01 | 重庆桦哲科技有限公司 | Intelligent lock control system |
CN106683251A (en) * | 2017-01-22 | 2017-05-17 | 四川安能能源技术有限公司 | Management control system of intelligent electric control lock for machine room |
CN107240179A (en) * | 2017-06-08 | 2017-10-10 | 电子科技大学 | A kind of base station Intelligent entrance guard management system |
CN109191616A (en) * | 2017-07-07 | 2019-01-11 | 安徽德诺科技股份公司 | intelligent lock system |
CN109636981A (en) * | 2018-12-17 | 2019-04-16 | 广东电网有限责任公司 | A kind of visual intelligent distribution lock control system and its working method |
CN109685483A (en) * | 2019-01-31 | 2019-04-26 | 张义青 | Key management system and key management method |
CN111210549A (en) * | 2020-01-09 | 2020-05-29 | 江苏航天大为科技股份有限公司 | Key management method, device and system |
CN111667618A (en) * | 2020-06-16 | 2020-09-15 | 杭州三泽科技有限公司 | Intelligent management system and management method for power screen cabinet lock |
CN111734222A (en) * | 2020-07-02 | 2020-10-02 | 北京兰德华电子技术有限公司 | Intelligent key cabinet |
-
2020
- 2020-12-29 CN CN202011593582.0A patent/CN112767578A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104266641A (en) * | 2014-10-10 | 2015-01-07 | 国家电网公司 | Intelligent navigation control method for five-prevention lock of transformer substation |
CN104281136A (en) * | 2014-10-10 | 2015-01-14 | 国家电网公司 | Five-prevention lock intelligent navigation control system for transformer substation |
CN104484925A (en) * | 2014-12-08 | 2015-04-01 | 重庆桦哲科技有限公司 | Intelligent lock control system |
CN106683251A (en) * | 2017-01-22 | 2017-05-17 | 四川安能能源技术有限公司 | Management control system of intelligent electric control lock for machine room |
CN107240179A (en) * | 2017-06-08 | 2017-10-10 | 电子科技大学 | A kind of base station Intelligent entrance guard management system |
CN109191616A (en) * | 2017-07-07 | 2019-01-11 | 安徽德诺科技股份公司 | intelligent lock system |
CN109636981A (en) * | 2018-12-17 | 2019-04-16 | 广东电网有限责任公司 | A kind of visual intelligent distribution lock control system and its working method |
CN109685483A (en) * | 2019-01-31 | 2019-04-26 | 张义青 | Key management system and key management method |
CN111210549A (en) * | 2020-01-09 | 2020-05-29 | 江苏航天大为科技股份有限公司 | Key management method, device and system |
CN111667618A (en) * | 2020-06-16 | 2020-09-15 | 杭州三泽科技有限公司 | Intelligent management system and management method for power screen cabinet lock |
CN111734222A (en) * | 2020-07-02 | 2020-10-02 | 北京兰德华电子技术有限公司 | Intelligent key cabinet |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114197968A (en) * | 2021-12-14 | 2022-03-18 | 南方电网深圳数字电网研究院有限公司 | Intelligent key use monitoring method and device |
CN114283509A (en) * | 2021-12-28 | 2022-04-05 | 国网上海市电力公司 | Intelligent management and control system for transformer substation |
CN114708116A (en) * | 2022-03-11 | 2022-07-05 | 哈尔滨圣昌科技开发有限公司 | Pipe network monitoring intelligent processing system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112767578A (en) | Authorization method, application method, unlocking method, terminal and storage medium | |
CN103489291B (en) | A kind of integrated safety-protection system of comprehensive intelligent wireless | |
JP5259794B2 (en) | Parking lot intelligence fee collection system and method | |
CN104635701A (en) | Intelligent optical cable joint box management platform based on Internet of things technology | |
CN104036348A (en) | Electronic mobile operation order system | |
CN105096392B (en) | A kind of parking fee collective system method, background server, roadside unit and system | |
CN102289850A (en) | Preordering, access and safe monitoring comprehensive management system of parking lot | |
CN110008676A (en) | A kind of personnel's multidimensional challenge and true identity discrimination system and method | |
CN104217288A (en) | Security management device and system for community comprehensive grid | |
CN104240342A (en) | Access control method and device | |
CN106127369A (en) | A kind of round-the-clock show window integrated management system of laboratory instruments and method thereof | |
CN202771586U (en) | Omni-directional wireless intelligent integrated security system | |
CN101271624B (en) | Parking position management system based on personal identity string code authentication | |
CN103745513A (en) | Intelligent key system | |
CN104240013A (en) | Door access control method and door access control platform | |
CN104240014A (en) | Door access control method and door access control platform | |
US20140337172A1 (en) | Fuel distribution network | |
CN202183127U (en) | Integrated management system of parking space reservation and car parking as well as security monitoring of parking lot | |
CN111784880A (en) | Intelligent passive inspection lock management system | |
KR101666531B1 (en) | Patrol and vehicles management system | |
CN103841283A (en) | Rapid police-sending security system | |
CN108573557A (en) | The application method of seal protecting box and seal protecting box | |
CN107170054A (en) | A kind of wireless intelligent remote controls berth lock | |
CN206672257U (en) | A kind of key management cabinet based on internet | |
CN113012329A (en) | Intelligent entrance guard identification alarm system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210507 |