CN113593082A - Five-prevention lock management method and system based on block chain - Google Patents

Five-prevention lock management method and system based on block chain Download PDF

Info

Publication number
CN113593082A
CN113593082A CN202110528156.7A CN202110528156A CN113593082A CN 113593082 A CN113593082 A CN 113593082A CN 202110528156 A CN202110528156 A CN 202110528156A CN 113593082 A CN113593082 A CN 113593082A
Authority
CN
China
Prior art keywords
lock
block
subtask
electronic key
identification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110528156.7A
Other languages
Chinese (zh)
Other versions
CN113593082B (en
Inventor
张艳杰
郑勇进
张娟
李宏伟
邓刚
陈海涛
傅浙川
赵卫阳
毛振东
王仕韬
刘朝阳
王磊
周博曦
张嵩
李经纬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid of China Technology College
Shandong Electric Power College
Original Assignee
State Grid Corp of China SGCC
State Grid of China Technology College
Shandong Electric Power College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid of China Technology College, Shandong Electric Power College filed Critical State Grid Corp of China SGCC
Priority to CN202110528156.7A priority Critical patent/CN113593082B/en
Publication of CN113593082A publication Critical patent/CN113593082A/en
Application granted granted Critical
Publication of CN113593082B publication Critical patent/CN113593082B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The task block, the key block, the five-prevention lock block and the equipment block all comprise a verification code, each verification code comprises at least two independent parts which are respectively stored, and once the verification codes are modified, the serial number of the verification codes is changed, so that the possibility of tampering the five-prevention lock management data is avoided; the server packs the total task number, the operating time of each subtask, the equipment state, the operating personnel and the video information to form a cloud block pack, so that later-stage calling and looking up are facilitated, and the problem that relevant records cannot be found due to the fact that the storage of each equipment is full is also avoided.

Description

Five-prevention lock management method and system based on block chain
Technical Field
The disclosure relates to the technical field of lock control, in particular to a block chain-based five-prevention lock management method and system.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
The five-prevention lock is a lock for high-voltage switchgear, such as a 10kv high-voltage switchgear. This lock forces the operation personnel to carry out exact operation to electrical equipment according to established safe operation procedure to avoid the emergence of maloperation accident, fully satisfy "five prevent" requirement: (1) and the circuit breaker is prevented from being opened and closed by mistake. The circuit breaker is prevented from being wrongly opened and closed, and the operated equipment can be operated only if the operation instruction corresponds to the operating equipment; (2) prevent the isolating switch from being switched on and off under load. Namely, the isolating switch can not be operated when the breaker, the load switch and the contactor are in a closing state; (3) the grounding wire (grounding switch) is prevented from being hung (closed) in a charged state, namely the grounding wire (grounding switch) is prevented from being hung or closed only in the brake-off state of the circuit breaker (isolating switch); (4) preventing power transmission with ground. Namely, the power transmission with the ground wire is prevented, and the circuit breaker (isolating switch) with the ground wire (grounding switch) is prevented from being closed; (5) prevent the mistake and go into electrified interval, prevent promptly that the mistake from going into electrified interval, only when the compartment is uncharged, could open the door and get into the compartment.
The five-prevention lock has two types of padlock and fixed lockset, and is used for limiting or not limiting the action states of a switch, a handle and a knife switch of electrical equipment.
The inventor finds that the conventional five-prevention lock management method has the following problems:
(1) in the prior art, the character numbering processing is not carried out on the open equipment operation box of the transformer substation and a corresponding padlock, and a user easily makes mistakes when the lock is recovered according to the number after the use is finished, namely, the wrong position of the padlock is easily caused to cause wrong intervals;
(2) the method comprises the following steps that online identification cannot be carried out on operators, and the situation that the operators are not appointed by the current task to operate after unlocking exists;
(3) after the operation sequence is downloaded to the five-prevention key, an off-line mode is adopted in each unlocking operation step in the operation, when an abnormal condition is met and processed in the operation process, the operation enters a management blind area, an operation log cannot be formed, and due to the fact that a data encryption means is not adopted, operation record data are possibly refreshed and tampered, so that comprehensive and accurate operation records are difficult to obtain in the management, and the operation record data cannot be used as key evidences during accident tracing;
(4) the five-prevention mechanical padlock usually adopts a button type mechanical transmission mode to unlock, the unlocking time can be generally recorded in a five-prevention key, but the locking time cannot form a time record, and the problem that the closing of an operation box cabinet door is forgotten cannot be traced. The keys of the mechanical padlock key and the electric lock are sometimes independently configured, and the padlock key and the electric five-prevention key need to be carried during operation, so that the operation management burden is increased.
Disclosure of Invention
In order to solve the defects of the prior art, the disclosure provides a five-prevention lock management method and a five-prevention lock management system based on a block chain.
In order to achieve the purpose, the following technical scheme is adopted in the disclosure:
the first aspect of the disclosure provides a five-prevention lock management method based on a block chain.
A five-prevention lock management method based on a block chain comprises the following processes:
acquiring total task content, wherein the total task content at least comprises an electronic key identification code and a plurality of subtask contents, and the subtask contents at least comprise a subtask number and an electrical element identification code;
carrying out encryption calculation on the total task content data to obtain a task verification code;
packaging the total task content and the task verification code to form a task block, and issuing the task block to the electronic key corresponding to the identification code;
the electronic key checks whether the total task content is correct according to the task verification code, and if the total task content is incorrect, the electronic key acquires the total task content again;
when the content of the total task is correct, the electronic key displays or prompts the number of the lock which needs to be unlocked currently according to the subtask number, the electrical element identification code or the electronic key identification code, and unlocking control is performed according to the number of the lock which needs to be unlocked currently.
Further, the total task content further comprises a total task number, a subtask number, authority timeliness, an operator identification code, a first timestamp and an electronic key identification code; the subtask content further includes a lock number, a lock identification code, and a precondition.
Furthermore, a corresponding passive lock is found according to the lock number, an electronic key is inserted, and a fingerprint is recorded;
if the electronic key verifies that the authority timeliness, the lock identification code, the electrical element identification code, the operator identification code and the precondition are all met, recording the operation time, and calculating the operation verification code by the electronic key according to the operation time and the task verification code;
the electronic key packs the operation time and the operation verification code as an operation block, and sends the operation block and the operation verification code to the passive lock after storage, and simultaneously records and completes the subtasks with corresponding numbers;
the passive lock checks whether the operation verification code is correct, if so, the lock is unlocked, and the operation verification code and the operation time are stored as a five-prevention lock block;
and completing all subtasks in sequence.
Furthermore, after all subtasks are completed, the electronic key calculates the total task number, the subtask numbers of all subtasks, the operation verification code and the operation time data to form a key verification code, and then packs the total task number, the lock identification code, the task verification code, the subtask numbers, the operation verification code, the operation time and the key verification code to be stored as a key block.
Furthermore, the electronic key is in data connection with the control terminal, the fingerprint is recorded, the key block is sent to the control terminal if the fingerprint is recorded and the fingerprint passes verification, the control terminal sends a receipt to the electronic key after the key verification code passes verification, and the electronic key clears the general task block.
Further, the switch states of the electric elements corresponding to the total task number, the operator identification code, the subtask number, the operation time, the lockset identification code and the operation time of each subtask are encrypted and calculated into equipment verification codes;
and the control terminal packs the total task number, the operator identification code, the subtask number of each subtask, the operation time, the lockset identification code, the switch state of the electric element corresponding to the operation time and the equipment verification code to form an equipment block and uploads the equipment block to the server.
Furthermore, after the server checks the equipment block, the server calls the corresponding video information in the set time range according to the operation time of each subtask and the lock identification code, and packs the total task number, the operation time of each subtask, the equipment state, the operators and the video information to form a cloud block.
The second aspect of the disclosure provides a five-prevention lock management system based on a block chain.
A five-prevention lock management system based on a block chain comprises: the electronic key is in communication connection with the control terminal;
the control terminal generates the total task content, which comprises the following steps: the system comprises a general task number, a subtask number, authority timeliness, an operator identification code, a first timestamp, an electronic key identification code and a plurality of subtask contents, wherein the subtask contents comprise a subtask number, an electrical element identification code, a lock number, a lockset identification code and a preposed condition;
the control terminal carries out encryption calculation on the total task content data to obtain a task verification code;
the control terminal packs the total task content and the task verification code to form a task block and issues the task block to the electronic key corresponding to the identification code;
the electronic key checks whether the total task content is correct or not according to the task verification code, if so, the entry is successful, otherwise, the entry is unsuccessful;
and the electronic key displays or prompts the number of the lock which needs to be unlocked currently according to the subtask number, the electrical element identification code or the electronic key identification code.
Furthermore, the anti-theft lock also comprises at least one five-prevention lock;
finding out a corresponding passive lock according to the lock number, inserting an electronic key, and recording a fingerprint;
if the electronic key verifies that the authority timeliness, the lock identification code, the electrical element identification code, the operator identification code and the precondition are all met, recording the operation time, and calculating the operation verification code by the electronic key according to the operation time and the task verification code;
the electronic key packs the operation time and the operation verification code as an operation block, and sends the operation block and the operation verification code to the passive lock after storage, and simultaneously records and completes the subtasks with corresponding numbers;
the passive lock checks whether the operation verification code is correct, if so, the lock is unlocked, and the operation verification code and the operation time are stored as a five-prevention lock block;
after all subtasks are completed, the electronic key calculates the total task number, the subtask numbers of all subtasks, the operation verification code and the operation time data to form a key verification code, and then packs the total task number, the lock identification code, the task verification code, the subtask numbers, the operation verification code, the operation time and the key verification code to be stored as a key block;
the electronic key is in data connection with the control terminal, a fingerprint is recorded, if the fingerprint is verified, the key block is sent to the control terminal, the control terminal sends a receipt to the electronic key after the verification of the key verification code is passed, and the electronic key clears the general task block;
and encrypting and calculating the total task number, the operator identification code, the subtask number of each subtask, the operation time, the lock identification code and the operation time corresponding to the switch state of the electrical element into an equipment verification code.
Furthermore, the system also comprises a server, wherein the control terminal is in communication connection with the server;
the control terminal packs the total task number, the operator identification code, the subtask number of each subtask, the operation time, the lockset identification code, the switch state of the electric element corresponding to the operation time and the equipment verification code to form an equipment block and uploads the equipment block to the server;
after the server checks the equipment block, the server calls corresponding video information in a set time range according to the operation time of each subtask and the lock identification code and packs the total task number, the operation time of each subtask, the equipment state, the operators and the video information to form a cloud block.
Compared with the prior art, the beneficial effect of this disclosure is:
1. according to the management method and the management system, the task block, the key block, the five anti-lock block and the equipment block all comprise one verification code, each verification code is stored in at least two independent parts respectively, and the serial number of the verification code is changed once the verification code is modified, so that the possibility of data tampering is avoided.
2. According to the management method and the management system, the server packs the total task number, the operation time of each subtask, the equipment state, the operator and the video information to form a cloud block pack, so that later calling and looking up are facilitated, and the problem that relevant records cannot be found out due to the fact that the storage of each equipment is full is also avoided.
3. The management method and the management system verify the ID of the electrical element, and prevent accidents caused by operation errors and the problem that an unlocked lock cannot be found due to disordered lock positions.
4. According to the management method and the management system, the electronic key can be used for opening and closing the mechanical padlock of the operation box, and can be used for connecting or disconnecting the electric lock loop when the control cabinet and the switch cabinet are operated in place, so that the integrated design of the five-prevention padlock computer key of the electric operation loop and the five-prevention padlock computer key of the mechanical is realized, and the burden of managing a plurality of keys is saved.
5. According to the management method and the management system, the validity of data is ensured by using the verification code, and meanwhile, the storage burden of a lockset and an electronic key is reduced; padlock, fixed lock and electric lock all utilize the electron key to authorize, verify, unblank, have realized thing networking communication, convenient control, data statistics.
Advantages of additional aspects of the disclosure will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the disclosure.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure and are not to limit the disclosure.
Fig. 1 is a schematic view of a first isolation switch operation box provided in the embodiment of the present disclosure.
Fig. 2 is a schematic view of a second isolation switch operation box provided in the embodiment of the disclosure.
Fig. 3 is a schematic diagram of a passive padlock control provided by an embodiment of the present disclosure.
Fig. 4 is a schematic diagram of a passive lock control provided by an embodiment of the present disclosure.
Fig. 5 is a schematic diagram of an electronic key control provided in the embodiment of the present disclosure.
Fig. 6 is a schematic view of an electric lock control provided in an embodiment of the present disclosure.
Fig. 7 is a schematic structural diagram of an electronic key according to an embodiment of the present disclosure.
Detailed Description
The present disclosure is further described with reference to the following drawings and examples.
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present disclosure. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
Example (b):
as shown in fig. 1, an embodiment of the present disclosure provides a five-prevention lock management system based on a block chain, for managing a five-prevention lock disposed on electrical equipment of a substation, including: the system comprises a plurality of passive locks (namely five-prevention locks), an electronic key, a sensor for acquiring the state of each electrical device, a transformer substation camera, a host (namely a control terminal) and a server.
The electrical equipment is provided with a plurality of electrical elements which need to be additionally provided with five anti-locking devices, such as a switch, a knife switch and a breaker trolley. Each five-prevention lock is provided with a label (prior art) which is convenient for the naked eye identification of an operator.
In the embodiment, the five-prevention lock refers to a CN201821978703.1 multi-mode unlocking lock cylinder assembly and a multi-mode unlocking intelligent lock, or a CN 201920093983.6U-shaped lock beam intelligent glass door lock adopts an idle passive lock cylinder, a motor or an electromagnet drives a clutch to engage a lock cylinder shell and an actuating mechanism, and a plug of an electronic key is inserted into a socket of the idle passive lock cylinder to twist the lock cylinder shell to drive the actuating mechanism to rotate to realize unlocking.
The five prevent that the lock that this embodiment provided selects for use passive tool to lock and electric lock, specifically including fixed tool to lock and padlock, fixed tool to lock includes lock, cabinet lock, and the passive lock includes passive lock core, actuating mechanism (drive mechanism or release mechanism), encryption chip, controller, NFC antenna (the padlock has), and the memory, passive lock core self do not take the power and are supplied power by the electron key.
The electric equipment is equipped with the NFC label at the padlock installation department, and every NFC label record has the independent electric elements ID that corresponds electric elements, and electric elements ID contains the independent electric elements ID that transformer substation's serial number, electric elements serial number, electric element type are constituteed, ensures that the tool to lock is in accurate position.
As shown in fig. 1, 2, 3 and 4, both passive padlocks and passive locks have controllers, motors, power interfaces, encryption chips, and memories. The padlock of the embodiment is encrypted and calculated into a lock verification code according to the time stamp, the operator ID and the task number after unlocking or locking, and the lock verification code is stored as a five-prevention lock block, and the specific time stamp, the operator ID and the subtask ID are not stored, because the calculation capacity and the memory capacity of the passive lock are limited.
For example, the data of the time stamp, the operator ID and the task number are 1kb together, one lock verification code can be 128b, and the lock verification code of each passive padlock or passive lock is calculated independently, which can be data of the number of selected front bits after calculation of a specific formula.
As shown in fig. 5 and 7, the electronic key includes a plug, a controller, a decryption chip, a biometric sensor (fingerprint sensor), an NFC antenna, and a memory. The electronic key is physically connected with the host machine through a plug and a socket or is in data transmission through an NFC antenna, development of wireless signals is not allowed in the transformer substation to access the safety I area, and the host machine is located in the safety I area.
As shown in fig. 6, the electric lock is used for generating an excitation signal to the triode after verification after the plug of the electronic key is inserted into the interface, the output interface supplies power to the relay of the control cubicle, and the output interface is powered off after the key is pulled out.
The host is connected with the server through a network cable; the host acquires the state of each electrical device; the server is responsible for collecting various data of a plurality of substations.
The transformer substation camera is responsible for collecting video information in the transformer substation, and not every electrical element ID can have video information, and electrical element and camera are not the one-to-one correspondence, and it is possible that one electrical element has five cameras to see, also can all not see.
For each switching operation step, the operation starting time is the unlocking time, and the operation ending time is the door locking time. For the abnormal handling behavior in the switching operation process, the switching locking time record is used for calibrating the operation behavior track of each interval, so that the accident handling and management tracing are facilitated. When obvious defects such as software program errors and the like occur in the five-prevention system, the computer key has a remote authorization unlocking function, and mechanical and short-circuit unconditional unlocking keys are cancelled.
The five-prevention lock management method comprises the following processes:
s101, an operator creates a total task content through a host, wherein the total task content comprises a total task number, a subtask number, authority timeliness, an operator ID, a first timestamp, an electronic key ID and a plurality of subtask contents, and the subtask contents comprise a subtask number, an electrical element ID, a lock number, a lockset ID and a prepositive condition (namely an operation sequence, if a second lock is unlocked, the first lock is locked);
s102, the host machine carries out encryption calculation on the total task content data to obtain a task verification code; for example, three subtasks, a total of 21 fields including 6 total task fields and 3 x 5 subtask fields, and a size of 128b for a calculated task validation code having a data size of 20 kb.
S103, the host packs the total task content and the task verification codes to form task blocks and issues the task blocks to the electronic key corresponding to the ID of the electronic key, specifically, the electronic key is connected with the host, an operator inputs a fingerprint, the host verifies whether the ID of the electronic key and the ID of the operator are correct, and if yes, the task blocks are issued to the electronic key.
S201, the electronic key checks whether the total task content is correct according to the task verification code, if so, the electronic key prompts that the entry is successful, otherwise, the electronic key prompts that the entry is unsuccessful;
s202, the electronic key is provided with a display screen, and displays the number (plain code) of the lock which needs to be unlocked currently according to the sequence of the subtask numbers, the ID of the electrical element or the ID of the electronic key;
s203, an operator finds a corresponding passive lock according to the lock number, inserts a key and inputs a fingerprint;
s204, the electronic key controller verifies whether authority timeliness, a lock ID, an electric element ID, an operator ID and a precondition are met, if yes, operation time is recorded, and the electronic key controller calculates an operation verification code according to the operation time and the task verification code;
s205, the electronic key packs the operation time and the operation verification code to be used as an operation block, and then sends the operation block and the operation block to the passive lock together with the secret key, and meanwhile records and completes subtasks corresponding to the numbers;
s206, the passive lock checks whether the operation verification code is correct, if so, unlocking is carried out, and the operation verification code and the operation time are stored as a five-prevention lock block;
s207, repeating the steps S202-S205, and completing all subtasks in sequence;
s208, after all subtasks are completed, the electronic key calculates the total task number, the subtask numbers of all subtasks, the operation verification code and the operation time data to form a key verification code, and then packs the total task number, the lockset ID, the task verification code, the subtask numbers, the operation verification code, the operation time and the key verification code to be stored as a key block;
s209, the electronic key is in data connection with the host, an operator inputs a fingerprint and sends the key block to the host if the fingerprint is verified to be passed, the host sends a receipt to the electronic key after the key verification code is verified to be passed, and the electronic key clears the general task block;
s301, the host encrypts and calculates the total task number, the operator ID, the subtask number of each subtask, the operation time, the lock ID and the electric element switch state corresponding to the operation time into an equipment verification code, and the host packs the total task number, the operator ID, the subtask number of each subtask, the operation time, the lock ID and the electric element switch state corresponding to the operation time and the equipment verification code to form an equipment block and uploads the equipment block to the server;
s302, after the server checks the equipment block, the server calls corresponding video information in a set time range according to the operation time and the lock ID of each subtask and packs the total task number, the operation time, the equipment state, the operators and the video information of each subtask to form a cloud block.
The traditional five-prevention lock management system adopts a mode of 'mechanical lock + computer key'; the computer key has no operation time record and no five-prevention lock operation record; the unlocking record can be made, and the locking record can not be made; the identity cannot be identified in the process of operating the lockset; the method can not provide enough time log data for data management statistical analysis, operation behavior analysis and misoperation accident tracing.
The five-prevention lock management system adopts a mode of 'passive intelligent lock + electronic key'; the passive intelligent lock has 200 backup records (within the latest time); 20000 switch lock records can be stored in the electronic key; the record of unlocking and locking can be made; during unlocking and locking, identity recognition can be carried out; the system can provide enough time log accurate data for management and analysis, and the locking and unlocking records can be provided for data management statistical analysis of a safety supervision department.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above description is only a preferred embodiment of the present disclosure and is not intended to limit the present disclosure, and various modifications and changes may be made to the present disclosure by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present disclosure should be included in the protection scope of the present disclosure.

Claims (10)

1. A five-prevention lock management method based on a block chain is characterized by comprising the following steps: the method comprises the following steps:
acquiring total task content, wherein the total task content at least comprises an electronic key identification code and a plurality of subtask contents, and the subtask contents at least comprise a subtask number and an electrical element identification code;
carrying out encryption calculation on the total task content data to obtain a task verification code;
packaging the total task content and the task verification code to form a task block, and issuing the task block to the electronic key corresponding to the identification code;
the electronic key checks whether the total task content is correct according to the task verification code, and if the total task content is incorrect, the electronic key acquires the total task content again;
when the content of the total task is correct, the electronic key displays or prompts the number of the lock which needs to be unlocked currently according to the subtask number, the electrical element identification code or the electronic key identification code, and unlocking control is performed according to the number of the lock which needs to be unlocked currently.
2. The block chain-based five-prevention lock management method of claim 1, wherein:
the total task content further comprises a total task number, a subtask number, authority timeliness, an operator identification code, a first timestamp and an electronic key identification code; the subtask content further includes a lock number, a lock identification code, and a precondition.
3. The block chain-based five-prevention lock management method of claim 2, wherein:
finding out a corresponding passive lock according to the lock number, inserting an electronic key, and recording a fingerprint;
if the electronic key verifies that the authority timeliness, the lock identification code, the electrical element identification code, the operator identification code and the precondition are all met, recording the operation time, and calculating the operation verification code by the electronic key according to the operation time and the task verification code;
the electronic key packs the operation time and the operation verification code as an operation block, and sends the operation block and the operation verification code to the passive lock after storage, and simultaneously records and completes the subtasks with corresponding numbers;
the passive lock checks whether the operation verification code is correct, if so, the lock is unlocked, and the operation verification code and the operation time are stored as a five-prevention lock block;
and completing all subtasks in sequence.
4. The block chain-based five-prevention lock management method according to claim 3, wherein:
after all subtasks are completed, the electronic key calculates the total task number, the subtask numbers of all subtasks, the operation verification code and the operation time data to form a key verification code, and then packs the total task number, the lock identification code, the task verification code, the subtask numbers, the operation verification code, the operation time and the key verification code to be stored as a key block.
5. The block chain-based five-prevention lock management method of claim 4, wherein:
the electronic key is in data connection with the control terminal, the fingerprint is recorded, the key block is sent to the control terminal if the fingerprint is recorded and the fingerprint passes verification, the control terminal sends a receipt to the electronic key after the key verification code passes verification, and the electronic key clears the general task block.
6. The block chain-based five-prevention lock management method according to claim 5, wherein:
encrypting and calculating the switch states of the electric elements corresponding to the total task number, the operator identification code, the subtask number of each subtask, the operation time, the lockset identification code and the operation time into an equipment verification code;
and the control terminal packs the total task number, the operator identification code, the subtask number of each subtask, the operation time, the lockset identification code, the switch state of the electric element corresponding to the operation time and the equipment verification code to form an equipment block and uploads the equipment block to the server.
7. The block chain-based five-prevention lock management method of claim 6, wherein:
after the server checks the equipment block, the server calls corresponding video information in a set time range according to the operation time of each subtask and the lock identification code and packs the total task number, the operation time of each subtask, the equipment state, the operators and the video information to form a cloud block.
8. The utility model provides a five prevent tool to lock management system based on block chain which characterized in that:
the method comprises the following steps: the electronic key is in communication connection with the control terminal;
the control terminal generates the total task content, which comprises the following steps: the system comprises a general task number, a subtask number, authority timeliness, an operator identification code, a first timestamp, an electronic key identification code and a plurality of subtask contents, wherein the subtask contents comprise a subtask number, an electrical element identification code, a lock number, a lockset identification code and a preposed condition;
the control terminal carries out encryption calculation on the total task content data to obtain a task verification code;
the control terminal packs the total task content and the task verification code to form a task block and issues the task block to the electronic key corresponding to the identification code;
the electronic key checks whether the total task content is correct or not according to the task verification code, if so, the entry is successful, otherwise, the entry is unsuccessful;
and the electronic key displays or prompts the number of the lock which needs to be unlocked currently according to the subtask number, the electrical element identification code or the electronic key identification code.
9. The blockchain-based five-prevention lock management system of claim 8, wherein:
also comprises at least one five-prevention lock;
finding out a corresponding passive lock according to the lock number, inserting an electronic key, and recording a fingerprint;
if the electronic key verifies that the authority timeliness, the lock identification code, the electrical element identification code, the operator identification code and the precondition are all met, recording the operation time, and calculating the operation verification code by the electronic key according to the operation time and the task verification code;
the electronic key packs the operation time and the operation verification code as an operation block, and sends the operation block and the operation verification code to the passive lock after storage, and simultaneously records and completes the subtasks with corresponding numbers;
the passive lock checks whether the operation verification code is correct, if so, the lock is unlocked, and the operation verification code and the operation time are stored as a five-prevention lock block;
after all subtasks are completed, the electronic key calculates the total task number, the subtask numbers of all subtasks, the operation verification code and the operation time data to form a key verification code, and then packs the total task number, the lock identification code, the task verification code, the subtask numbers, the operation verification code, the operation time and the key verification code to be stored as a key block;
the electronic key is in data connection with the control terminal, a fingerprint is recorded, if the fingerprint is verified, the key block is sent to the control terminal, the control terminal sends a receipt to the electronic key after the verification of the key verification code is passed, and the electronic key clears the general task block;
and encrypting and calculating the total task number, the operator identification code, the subtask number of each subtask, the operation time, the lock identification code and the operation time corresponding to the switch state of the electrical element into an equipment verification code.
10. The blockchain-based five-prevention lock management system of claim 9, wherein:
the control terminal is in communication connection with the server;
the control terminal packs the total task number, the operator identification code, the subtask number of each subtask, the operation time, the lockset identification code, the switch state of the electric element corresponding to the operation time and the equipment verification code to form an equipment block and uploads the equipment block to the server;
after the server checks the equipment block, the server calls corresponding video information in a set time range according to the operation time of each subtask and the lock identification code and packs the total task number, the operation time of each subtask, the equipment state, the operators and the video information to form a cloud block.
CN202110528156.7A 2021-05-14 2021-05-14 Five-prevention lockset management method and system based on blockchain Active CN113593082B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110528156.7A CN113593082B (en) 2021-05-14 2021-05-14 Five-prevention lockset management method and system based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110528156.7A CN113593082B (en) 2021-05-14 2021-05-14 Five-prevention lockset management method and system based on blockchain

Publications (2)

Publication Number Publication Date
CN113593082A true CN113593082A (en) 2021-11-02
CN113593082B CN113593082B (en) 2023-05-23

Family

ID=78243404

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110528156.7A Active CN113593082B (en) 2021-05-14 2021-05-14 Five-prevention lockset management method and system based on blockchain

Country Status (1)

Country Link
CN (1) CN113593082B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006101169A1 (en) * 2005-03-23 2006-09-28 Ihc Corp. Authentication system
CN103281340A (en) * 2013-06-26 2013-09-04 百度在线网络技术(北京)有限公司 Method, system, client-side, releasing server and cloud server for two-dimension code verification
CN103544758A (en) * 2013-11-14 2014-01-29 国家电网公司 Lock control management system and method for transformer substation
CN204537279U (en) * 2015-04-28 2015-08-05 重庆顺利科技有限公司 Guest system
CN105303657A (en) * 2015-09-30 2016-02-03 长园共创电力安全技术股份有限公司 Management method for lock control system of work site
CN107195027A (en) * 2017-04-20 2017-09-22 国网内蒙古东部电力有限公司赤峰供电公司 The secondary fool proof locking method of electrical equipment and system
CN107680212A (en) * 2017-09-25 2018-02-09 国网江苏省电力公司常州供电公司 A kind of anti-smart lock authority checking method of power distribution network outdoor equipment five
CN207424963U (en) * 2017-08-22 2018-05-29 海南电网有限责任公司三亚供电局 A kind of substation's lockset safety management system
CN109272613A (en) * 2018-08-27 2019-01-25 深圳市便易通科技有限公司 A kind of Internet of Things safe electronic access control system of sensor and video interlink
CN109961292A (en) * 2019-03-22 2019-07-02 杭州复杂美科技有限公司 Block chain identifying code application method, equipment and storage medium
CN110192228A (en) * 2017-01-09 2019-08-30 云丁网络技术(北京)有限公司 A kind of generation method and its system of the off-line verification code based on intelligent door lock system
CN111555247A (en) * 2020-04-24 2020-08-18 广东电网有限责任公司东莞供电局 Switching operation control method, device, equipment and medium for power equipment
CN112699987A (en) * 2020-12-17 2021-04-23 郑勇进 Method and system for monitoring work task by using lock

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006101169A1 (en) * 2005-03-23 2006-09-28 Ihc Corp. Authentication system
CN103281340A (en) * 2013-06-26 2013-09-04 百度在线网络技术(北京)有限公司 Method, system, client-side, releasing server and cloud server for two-dimension code verification
CN103544758A (en) * 2013-11-14 2014-01-29 国家电网公司 Lock control management system and method for transformer substation
CN204537279U (en) * 2015-04-28 2015-08-05 重庆顺利科技有限公司 Guest system
CN105303657A (en) * 2015-09-30 2016-02-03 长园共创电力安全技术股份有限公司 Management method for lock control system of work site
CN110192228A (en) * 2017-01-09 2019-08-30 云丁网络技术(北京)有限公司 A kind of generation method and its system of the off-line verification code based on intelligent door lock system
CN107195027A (en) * 2017-04-20 2017-09-22 国网内蒙古东部电力有限公司赤峰供电公司 The secondary fool proof locking method of electrical equipment and system
CN207424963U (en) * 2017-08-22 2018-05-29 海南电网有限责任公司三亚供电局 A kind of substation's lockset safety management system
CN107680212A (en) * 2017-09-25 2018-02-09 国网江苏省电力公司常州供电公司 A kind of anti-smart lock authority checking method of power distribution network outdoor equipment five
CN109272613A (en) * 2018-08-27 2019-01-25 深圳市便易通科技有限公司 A kind of Internet of Things safe electronic access control system of sensor and video interlink
CN109961292A (en) * 2019-03-22 2019-07-02 杭州复杂美科技有限公司 Block chain identifying code application method, equipment and storage medium
CN111555247A (en) * 2020-04-24 2020-08-18 广东电网有限责任公司东莞供电局 Switching operation control method, device, equipment and medium for power equipment
CN112699987A (en) * 2020-12-17 2021-04-23 郑勇进 Method and system for monitoring work task by using lock

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
汤淳: "" 基于Android的新一代五防钥匙软件系统"", 《中国优秀硕士学位论文全文数据库 工程科技Ⅱ辑》 *

Also Published As

Publication number Publication date
CN113593082B (en) 2023-05-23

Similar Documents

Publication Publication Date Title
CN102521905B (en) Intelligent access control system of transformer substation and control method thereof
CN107704739A (en) Microcomputer anti-error operating system and method, anti-error main frame with listed function, Intelligent key, intelligent lock
CN105447936A (en) Offline intelligent lock monitoring system
CN106710051A (en) Management control system and method for preventing error operations of electrical secondary equipment
CN202362855U (en) Intelligent access control system for transformer substation
CN106934886B (en) A kind of setting of dynamic puzzle-lock OTC key and update method
CN104318650A (en) Dynamic coded lock management and control system
CN105550826A (en) Security isolation anti-misoperation system
CN109146321A (en) Upkeep operation security control method and system
CN107659572A (en) Intelligent and safe managing and control system based on information fusion
CN205787685U (en) Managing and control system for job safety
CN107346109A (en) Managing and control system and method for job safety
CN103366431A (en) Management system and method for lockset of distribution network equipment
CN214154147U (en) Intelligent anti-misoperation system for switching operation
CN207731273U (en) Microcomputer anti-error operating system with listed function and anti-error host, Intelligent key, intelligent lock
CN110988421B (en) Intelligent safety protection device and system applied to electric energy metering mechanism
CN104680634A (en) Maintenance isolation locking system and method
CN105446202B (en) A kind of anti-control system of substation five
CN107452118A (en) A kind of microcomputer anti-error operating system and method based on Bluetooth communication
CN204946135U (en) Plant stand security management and control system
CN205177078U (en) Power metering box cabinet intelligent management system
CN111236105B (en) Parking space lock management method, device and system and parking space lock
CN109461235B (en) Electricity testing unlocking method
CN106504370A (en) Plant stand security management and control system and control method
CN110516908A (en) A kind of operation management-control method applied to industry spot

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant