CN113611014A - Five-prevention lock management method based on block chain - Google Patents

Five-prevention lock management method based on block chain Download PDF

Info

Publication number
CN113611014A
CN113611014A CN202110772229.7A CN202110772229A CN113611014A CN 113611014 A CN113611014 A CN 113611014A CN 202110772229 A CN202110772229 A CN 202110772229A CN 113611014 A CN113611014 A CN 113611014A
Authority
CN
China
Prior art keywords
verification code
task
lock
electronic key
execution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110772229.7A
Other languages
Chinese (zh)
Other versions
CN113611014B (en
Inventor
张艳杰
郑勇进
张娟
李宏伟
邓刚
王进考
刘朝阳
王仕韬
王磊
赵笑笑
周博曦
张嵩
李经纬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid of China Technology College
Shandong Electric Power College
Original Assignee
State Grid Corp of China SGCC
State Grid of China Technology College
Shandong Electric Power College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid of China Technology College, Shandong Electric Power College filed Critical State Grid Corp of China SGCC
Priority to CN202110772229.7A priority Critical patent/CN113611014B/en
Publication of CN113611014A publication Critical patent/CN113611014A/en
Application granted granted Critical
Publication of CN113611014B publication Critical patent/CN113611014B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

A five-prevention system management method based on a block chain comprises the following steps: setting a task verification code calculation method and an execution verification code calculation method according to the electronic key ID of the electronic key, and packaging and storing the electronic key ID, the task verification code calculation method and the execution verification code calculation method in the electronic key and the host; the task verification code calculation method comprises the steps of calculating task content data by using a set task calculation formula to obtain a task calculation result, and selecting data with a set length as a task verification code from the task calculation result; the execution verification code calculation method comprises the steps of calculating execution content data by using a set execution calculation formula to obtain an execution calculation result, and selecting data with a set length as an execution verification code in the execution calculation result; and setting a command verification code calculation method and a lock verification code calculation method according to the lock ID, and packaging and storing the lock verification code calculation method, the command verification code calculation method and the lock ID in the lock, the electronic key and the host.

Description

Five-prevention lock management method based on block chain
Technical Field
The disclosure relates to the technical field of lock control, in particular to a five-prevention lock management method based on a block chain.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
The five-prevention lock is a lock for high-voltage switchgear, such as a10 kv high-voltage switchgear. This lock forces the operation personnel to carry out exact operation to electrical equipment according to established safe operation procedure to avoid the emergence of maloperation accident, fully satisfy "five prevent" requirement: (1) and the circuit breaker is prevented from being opened and closed by mistake. The circuit breaker is prevented from being wrongly opened and closed, and the operated equipment can be operated only if the operation instruction corresponds to the operating equipment; (2) prevent the isolating switch from being switched on and off under load. Namely, the isolating switch can not be operated when the breaker, the load switch and the contactor are in a closing state; (3) the grounding wire (grounding switch) is prevented from being hung (closed) in a charged state, namely the grounding wire (grounding switch) is prevented from being hung or closed only in the brake-off state of the circuit breaker (isolating switch); (4) preventing power transmission with ground. Namely, the power transmission with the ground wire is prevented, and the circuit breaker (isolating switch) with the ground wire (grounding switch) is prevented from being closed; (5) prevent the mistake and go into electrified interval, prevent promptly that the mistake from going into electrified interval, only when the compartment is uncharged, could open the door and get into the compartment.
The five-prevention lock has two types of padlock and fixed lockset, and is used for limiting or not limiting the action states of a switch, a handle and a knife switch of electrical equipment.
The inventor finds that the conventional five-prevention lock management method has the following problems:
(1) in the prior art, the character numbering processing is not carried out on the open equipment operation box of the transformer substation and a corresponding padlock, and a user easily makes mistakes when the lock is recovered according to the number after the use is finished, namely, the wrong position of the padlock is easily caused to cause wrong intervals;
(2) the method comprises the following steps that online identification cannot be carried out on operators, and the situation that the operators are not appointed by the current task to operate after unlocking exists;
(3) after the operation sequence is downloaded to the five-prevention key, an off-line mode is adopted in each unlocking operation step in the operation, when an abnormal condition is met and processed in the operation process, the operation enters a management blind area, an operation log cannot be formed, and due to the fact that a data encryption means is not adopted, operation record data are possibly refreshed and tampered, so that comprehensive and accurate operation records are difficult to obtain in the management, and the operation record data cannot be used as key evidences during accident tracing;
(4) the five-prevention mechanical padlock usually adopts a button type mechanical transmission mode to unlock, the unlocking time can be generally recorded in a five-prevention key, but the locking time cannot form a time record, and the problem that the closing of an operation box cabinet door is forgotten cannot be traced. The keys of the mechanical padlock key and the electric lock are sometimes independently configured, and the padlock key and the electric five-prevention key need to be carried during operation, so that the operation management burden is increased.
Disclosure of Invention
In order to solve the defects of the prior art, the disclosure provides a five-prevention lock management method and a five-prevention lock management system based on a block chain.
In order to achieve the purpose, the invention discloses a five-prevention system management method based on a block chain, which comprises the following steps: setting a task verification code calculation method and an execution verification code calculation method according to the electronic key ID of the electronic key, and packaging and storing the electronic key ID, the task verification code calculation method and the execution verification code calculation method in the electronic key and the host; the task verification code calculation method comprises the steps of calculating task content data by using a set task calculation formula to obtain a task calculation result, and selecting data with a set length as a task verification code from the task calculation result; the execution verification code calculation method comprises the steps of calculating execution content data by using a set execution calculation formula to obtain an execution calculation result, and selecting data with a set length as an execution verification code in the execution calculation result; setting a command verification code calculation method and a lock verification code calculation method according to the lock ID, and packaging and storing the lock verification code calculation method, the command verification code calculation method and the lock ID in a lock, an electronic key and a host; the command verification code calculation method comprises the steps of calculating command content data by using a set command calculation formula to obtain a command calculation result, and selecting data with a set length as a command verification code from the command calculation result; the lock verification code calculation method comprises the steps of calculating content data of a lock by using a set lock calculation formula to obtain a lock calculation result, and selecting data with a set length from the lock calculation result as a lock verification code.
In one embodiment of the invention, the method further comprises setting a device authentication code calculation method according to the host ID of the host, and packaging and storing the host ID and the device authentication code calculation method in the host and the server corresponding to the host ID, wherein the device authentication code calculation method comprises calculating the device content data by using a set device calculation formula to obtain a device calculation result, and selecting data with a set length as the device authentication code in the device calculation result.
In one embodiment of the invention, the task content data comprises a total task number, a subtask number, authority timeliness, an operator ID, a task issuing timestamp, an electronic key ID and a plurality of subtask contents, wherein the subtask contents comprise a subtask number, an electrical element ID, a lock ID and a precondition;
the command content data comprises operation time and a task verification code;
the execution content data comprises a total task number, subtask numbers of all subtasks, a command verification code and operation time data;
the lockset content data comprises an execution timestamp, an operator ID and a task number;
the device content data comprises a total task number, an operator ID, a subtask number of each subtask, operation time, a lock ID and an electric element switch state corresponding to the operation time.
In one embodiment of the invention, the electronic key stores fingerprint information corresponding to the operator according to the operator ID.
In one embodiment of the invention, the method further comprises: the host computer obtains task content data, and selects a corresponding task verification code calculation method according to the ID of the electronic key to calculate and obtain a task verification code; packaging the task content data and the task verification code to form a task block, and issuing the task block to an electronic key corresponding to the ID of the electronic key;
in one embodiment of the invention, the electronic key checks whether the task verification code is correct according to the task content data and the task verification code calculation method, and if the task verification code is incorrect, the electronic key acquires the task content data again; and when the lock ID is correct, the electronic key displays or prompts the lock ID needing to be opened or closed at present according to the subtask number, the electrical element ID or the electronic key ID.
In one embodiment of the invention, a corresponding lock is found according to the ID of the lock, an electronic key is inserted, and a fingerprint is recorded; the electronic key verifies whether the authority aging, the lock ID, the electrical element ID, the operator ID and the precondition are met, if yes, the operation time is recorded, the electronic key selects a command verification code calculation method corresponding to the lock ID and a command data content calculation command verification code, the command data content and the command verification code are packaged to be used as a command block, the command block is stored and then sent to the lock together with a secret key, and meanwhile, the subtasks corresponding to the number are recorded and completed; the lockset checks whether the command verification code is correct or not according to the command data content and the command verification code calculation method, if so, unlocking or locking is executed, an executed receipt is generated for the electronic key, and the lockset stores the command verification code and the operation time as a lockset block and sends the lockset block to the electronic key; and completing all subtasks in sequence.
In one embodiment of the invention, after the electronic key receives all the executed receipts, the electronic key calculates the execution verification code according to the execution content data and the execution verification code calculation method, packs the execution content data and the execution verification code as a key block, stores the key block and sends the key block to the host; the electronic key is in data connection with the host, the host verifies the execution verification code according to the execution content data and the execution verification code calculation method, the host sends a clearing command to the electronic key after the verification is passed, and the electronic key clears the total task block after receiving the clearing command.
In one embodiment of the invention, the host will calculate the device authentication code based on the device content data, the device authentication code calculation method; and the control terminal packages the equipment content data and the equipment verification code into an equipment block, and uploads the equipment block, the task block and the key block to the server.
In an embodiment of the invention, the server checks the task verification code according to the task content data and the task verification code calculation method, calculates the execution verification code according to the execution content data and the execution verification code calculation method in the task block and the key block, verifies the equipment verification code according to the equipment content data and the equipment verification code calculation method, and packs the total task number and the operation time, the equipment state, the operator and the video information of each subtask into the cloud block after the server calls the video information with set time length before and after the corresponding operation time according to the operation time and the lock ID of each subtask after all the verifications are passed.
Compared with the prior art, the beneficial effect of this disclosure is:
1. according to the management method and the management system, the task block, the key block, the five anti-lock block and the equipment block all comprise one verification code, each verification code is stored in at least two independent parts respectively, and the serial number of the verification code is changed once the verification code is modified, so that the possibility of data tampering is avoided.
2. According to the management method and the management system, the server packs the total task number, the operation time of each subtask, the equipment state, the operator and the video information to form a cloud block pack, so that later calling and looking up are facilitated, and the problem that relevant records cannot be found out due to the fact that the storage of each equipment is full is also avoided.
3. The management method and the management system verify the ID of the electrical element, and prevent accidents caused by operation errors and the problem that an unlocked lock cannot be found due to disordered lock positions.
4. According to the management method and the management system, the electronic key can be used for opening and closing the mechanical padlock of the operation box, and can be used for connecting or disconnecting the electric lock loop when the control cabinet and the switch cabinet are operated in place, so that the integrated design of the five-prevention padlock computer key of the electric operation loop and the five-prevention padlock computer key of the mechanical is realized, and the burden of managing a plurality of keys is saved.
5. According to the management method and the management system, the validity of data is ensured by using the verification code, and meanwhile, the storage burden of a lockset and an electronic key is reduced; padlock, fixed lock and electric lock all utilize the electron key to authorize, verify, unblank, have realized thing networking communication, convenient control, data statistics.
Advantages of additional aspects of the disclosure will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the disclosure.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure and are not to limit the disclosure.
Fig. 1 is a schematic view of a first isolation switch operation box provided in the embodiment of the present disclosure.
Fig. 2 is a schematic view of a second isolation switch operation box provided in the embodiment of the disclosure.
Fig. 3 is a schematic diagram of a passive padlock control provided by an embodiment of the present disclosure.
Fig. 4 is a schematic diagram of a passive lock control provided by an embodiment of the present disclosure.
Fig. 5 is a schematic diagram of an electronic key control provided in the embodiment of the present disclosure.
Fig. 6 is a schematic view of an electric lock control provided in an embodiment of the present disclosure.
Fig. 7 is a schematic structural diagram of an electronic key according to an embodiment of the present disclosure.
Detailed Description
The present disclosure is further described with reference to the following drawings and examples.
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present disclosure. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
Example (b):
as shown in fig. 1, an embodiment of the present disclosure provides a five-prevention lock management system based on a block chain, for managing a five-prevention lock disposed on electrical equipment of a substation, including: the system comprises a plurality of passive locks (namely five-prevention locks), an electronic key, a sensor for acquiring the state of each electrical device, a transformer substation camera, a host (namely a control terminal) and a server.
The electrical equipment is provided with a plurality of electrical elements which need to be additionally provided with five anti-locking devices, such as a switch, a knife switch and a breaker trolley. Each five-prevention lock is provided with a label (prior art) which is convenient for the naked eye identification of an operator.
In the embodiment, the five-prevention lock refers to a CN201821978703.1 multi-mode unlocking lock cylinder assembly and a multi-mode unlocking intelligent lock, or a CN 201920093983.6U-shaped lock beam intelligent glass door lock adopts an idle passive lock cylinder, a motor or an electromagnet drives a clutch to engage a lock cylinder shell and an actuating mechanism, and a plug of an electronic key is inserted into a socket of the idle passive lock cylinder to twist the lock cylinder shell to drive the actuating mechanism to rotate to realize unlocking.
The five prevent that the lock that this embodiment provided selects for use passive tool to lock and electric lock, specifically including fixed tool to lock and padlock, fixed tool to lock includes lock, cabinet lock, and the passive lock includes passive lock core, actuating mechanism (drive mechanism or release mechanism), encryption chip, controller, NFC antenna (the padlock has), and the memory, passive lock core self do not take the power and are supplied power by the electron key.
The electric equipment is equipped with the NFC label at the padlock installation department, and every NFC label record has the independent electric elements ID that corresponds electric elements, and electric elements ID contains the independent electric elements ID that transformer substation's serial number, electric elements serial number, electric element type are constituteed, ensures that the tool to lock is in accurate position.
As shown in fig. 1, 2, 3 and 4, the lock is an electric lock, an active or passive cabinet lock, an active or passive padlock, and each lock has a controller, an encryption chip, a memory and a data interface adapted to an electronic key.
The padlock of this embodiment is encrypted and calculated into a lock verification code according to the execution timestamp, the operator ID, the task number after unlocking or locking, and is stored as the lock block, but does not store the specific execution timestamp, the operator ID, the subtask ID, because the computing power and the memory capacity of the passive lock are limited. For example, the data of the execution timestamp, the operator ID and the task number are 1kb, one lock verification code can be 128b, and the lock verification code of each passive padlock or passive lock is calculated independently, which can be data of the number of selected previous bits after calculation by a specific formula.
As shown in fig. 5 and 7, the electronic key includes a plug, a controller, a decryption chip, a biometric sensor (fingerprint sensor), an NFC antenna, and a memory. The electronic key and the host are physically connected in a plug and socket mode or are in data transmission through an NFC antenna, and due to the fact that development of a wireless signal is not allowed in a transformer substation to access a safety I area, the host is located in the safety I area, and therefore the electronic key is not suitable for setting a wireless transmission mode with the same length as Bluetooth wifi.
As shown in fig. 6, the electric lock is used for generating an excitation signal to the triode after verification after the plug of the electronic key is inserted into the interface, the output interface supplies power to the relay of the control cubicle, and the output interface is powered off after the key is pulled out.
The host is connected with the server through a network cable; the host acquires the state of each electrical device; the server is responsible for collecting various data of a plurality of substations.
The transformer substation camera is responsible for collecting video information in the transformer substation, and not every electrical element ID can have video information, and electrical element and camera are not the one-to-one correspondence, and it is possible that one electrical element has five cameras to see, also can all not see.
For each switching operation step, the operation starting time is the unlocking time, and the operation ending time is the door locking time. For the abnormal handling behavior in the switching operation process, the switching locking time record is used for calibrating the operation behavior track of each interval, so that the accident handling and management tracing are facilitated. When obvious defects such as software program errors and the like occur in the five-prevention system, the computer key has a remote authorization unlocking function, and mechanical and short-circuit unconditional unlocking keys are cancelled.
The five-prevention lockset management method comprises the following processes of a system building process A, a task issuing process B and an execution report C:
system set up a, comprising:
a101, setting a task verification code calculation method and an execution verification code calculation method according to an electronic key ID of the electronic key, and packaging and storing the electronic key ID, the task verification code calculation method and the execution verification code calculation method in the electronic key, a host and a server; the task verification code calculation method comprises the steps of calculating task content data by using a set task calculation formula to obtain a task calculation result, and selecting data with a set length as a task verification code from the task calculation result; the execution verification code calculation method comprises the steps of calculating execution content data by using a set execution calculation formula to obtain an execution calculation result, and selecting data with a set length as an execution verification code in the execution calculation result; setting a command verification code calculation method and a lock verification code calculation method according to the lock ID, and packaging and storing the lock verification code calculation method, the command verification code calculation method and the lock ID in a lock, an electronic key, a host and a server; the command verification code calculation method comprises the steps of calculating command content data by using a set command calculation formula to obtain a command calculation result, and selecting data with a set length as a command verification code from the command calculation result; the lock verification code calculation method comprises the steps of calculating content data of a lock by using a set lock calculation formula to obtain a lock calculation result, and selecting data with a set length from the lock calculation result as a lock verification code.
A102, setting a device authentication code calculation method according to a host ID of the host, and packaging and storing the host ID and the device authentication code calculation method in the host and a server corresponding to the host ID, wherein the device authentication code calculation method comprises the steps of calculating device content data by using a set device calculation formula to obtain a device calculation result, and selecting data with a set length as a device authentication code in the device calculation result.
The task content data comprises a total task number, a subtask number, authority timeliness, an operator ID, a task issuing timestamp, an electronic key ID and a plurality of subtask contents, wherein the subtask contents comprise a subtask number, an electrical element ID, a lockset ID and preconditions; the command content data comprises operation time and a task verification code; the execution content data comprises a total task number, subtask numbers of all subtasks, a command verification code and operation time data; the lockset content data comprises an execution timestamp, an operator ID and a task number; the device content data comprises a total task number, an operator ID, a subtask number of each subtask, operation time, a lock ID and an electric element switch state corresponding to the operation time.
And A104, the electronic key stores fingerprint information of the corresponding operator according to the ID of the operator.
Task issuing Process B
B101, an operator creates task content data through a host, wherein the task content data comprises a total task number, a subtask number, authority timeliness, an operator ID, a task issuing timestamp, an electronic key ID and a plurality of subtask contents, and the subtask contents comprise a subtask number, an electrical element ID, a lockset ID and a prepositive condition (namely an operation sequence, if a second lock is unlocked, a first lock is locked);
b102, the host computer obtains task content data, and a corresponding task verification code calculation method is selected according to the ID of the electronic key to calculate and obtain a task verification code; for example, three subtasks, a total of 21 fields including 6 total task fields and 3 x 5 subtask fields, and a size of 128b for a calculated task validation code having a data size of 20 kb.
B103, packaging the task content data and the task verification code to form a task block, and issuing the task block to the electronic key corresponding to the electronic key ID; the method specifically comprises the steps that the electronic key is connected with a host, an operator inputs a fingerprint, the host verifies whether the ID of the electronic key and the ID of the operator are correct, and if yes, a task block is issued to the electronic key.
B201, the electronic key checks whether the task verification code is correct according to the task content data and the task verification code calculation method, and if the task verification code is incorrect, the electronic key acquires the task content data again; and when the task content data is correct, the electronic key displays or prompts the ID (plain code) of the lock which needs to be opened or closed at present according to the ID of the lock of the task content data.
An operator finds a corresponding lock according to the ID of the lock, inserts a key and inputs a fingerprint;
the electronic key controller verifies whether the authority aging, the lock ID, the electric element ID, the operator ID and the precondition are all met, if yes, the operation time is recorded, the electronic key selects a command verification code calculation method corresponding to the lock ID, the command data content calculates a command verification code, the command data content and the command verification code are packaged to be used as a command block, the command block is stored and then sent to the lock together with the secret key, and meanwhile, the subtasks corresponding to the number are recorded and completed; the lockset checks the command verification code according to the command data content and the command verification code calculation method, if the command verification code is checked, unlocking or locking is executed, an executed receipt is generated for the electronic key, and the lockset stores the command verification code and the operation time as a lockset block and sends the lockset block to the electronic key; and completing all subtasks in sequence.
C101, after the electronic key receives all the executed receipts, the electronic key calculates an execution verification code according to the execution content data and the execution verification code calculation method, packages the execution content data and the execution verification code as a key block, stores the key block and sends the key block to the host;
the electronic key is in data connection with the host, the host verifies the execution verification code according to the execution content data and the execution verification code calculation method, the host sends a clearing command to the electronic key after the verification is passed, and the electronic key clears the total task block after receiving the clearing command
C102, the host computer calculates the equipment verification code according to the equipment content data and the equipment verification code calculation method;
and the control terminal packages the equipment content data and the equipment verification code into an equipment block, and uploads the equipment block, the task block and the key block to the server.
C103, the server checks the task verification code according to the task content data and the task verification code calculation method, calculates the execution verification code according to the execution content data and the execution verification code calculation method in the task block and the key block, verifies the equipment verification code according to the equipment content data and the equipment verification code calculation method, and packs the total task number, the operation time of each subtask, the equipment state, the operator and the video information into a cloud block after the server calls the video information with set time length before and after the corresponding operation time according to the operation time of each subtask and the lock ID after all verification is passed.
The traditional five-prevention lock management system adopts a mode of 'mechanical lock + computer key'; the computer key has no operation time record and no five-prevention lock operation record; the unlocking record can be made, and the locking record can not be made; the identity cannot be identified in the process of operating the lockset; the method can not provide enough time log data for data management statistical analysis, operation behavior analysis and misoperation accident tracing.
The five-prevention lock management system adopts a mode of 'passive intelligent lock + electronic key'; the passive intelligent lock has 200 backup records (within the latest time); 20000 switch lock records can be stored in the electronic key; the record of unlocking and locking can be made; during unlocking and locking, identity recognition can be carried out; the system can provide enough time log accurate data for management and analysis, and the locking and unlocking records can be provided for data management statistical analysis of a safety supervision department.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above description is only a preferred embodiment of the present disclosure and is not intended to limit the present disclosure, and various modifications and changes may be made to the present disclosure by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present disclosure should be included in the protection scope of the present disclosure.

Claims (10)

1. A five-prevention system management method based on a block chain is characterized in that: the method comprises the following steps:
setting a task verification code calculation method and an execution verification code calculation method according to the electronic key ID of the electronic key, and packaging and storing the electronic key ID, the task verification code calculation method and the execution verification code calculation method in the electronic key, the host and the server; the task verification code calculation method comprises the steps of calculating task content data by using a set task calculation formula to obtain a task calculation result, and selecting data with a set length as a task verification code from the task calculation result; the execution verification code calculation method comprises the steps of calculating execution content data by using a set execution calculation formula to obtain an execution calculation result, and selecting data with a set length as an execution verification code in the execution calculation result;
setting a command verification code calculation method and a lock verification code calculation method according to the lock ID, and packaging and storing the lock verification code calculation method, the command verification code calculation method and the lock ID in a lock, an electronic key, a host and a server; the command verification code calculation method comprises the steps of calculating command content data by using a set command calculation formula to obtain a command calculation result, and selecting data with a set length as a command verification code from the command calculation result; the lock verification code calculation method comprises the steps of calculating content data of a lock by using a set lock calculation formula to obtain a lock calculation result, and selecting data with a set length from the lock calculation result as a lock verification code.
2. The block chain-based five-prevention lock management method of claim 1, wherein: the equipment verification code calculation method comprises the steps of calculating the content data of the equipment by using a set equipment calculation formula to obtain an equipment calculation result, and selecting the data with the set length as the equipment verification code in the equipment calculation result.
3. The block chain-based five-prevention lock management method of claim 2, wherein:
the task content data comprises a total task number, a subtask number, authority timeliness, an operator ID, a task issuing timestamp, an electronic key ID and a plurality of subtask contents, wherein the subtask contents comprise a subtask number, an electrical element ID, a lockset ID and preconditions;
the command content data comprises operation time and a task verification code;
the execution content data comprises a total task number, subtask numbers of all subtasks, a command verification code and operation time data;
the lockset content data comprises an execution timestamp, an operator ID and a task number;
the device content data comprises a total task number, an operator ID, a subtask number of each subtask, operation time, a lock ID and an electric element switch state corresponding to the operation time.
4. The block chain-based five-prevention lock management method according to claim 3, wherein:
the electronic key stores fingerprint information corresponding to the operator according to the operator ID.
5. The block chain-based five-prevention lock management method of claim 4, wherein:
the method further comprises the following steps: the host computer obtains task content data, and selects a corresponding task verification code calculation method according to the ID of the electronic key to calculate and obtain a task verification code; and packaging the task content data and the task verification code to form a task block, and issuing the task block to the electronic key corresponding to the electronic key ID.
6. The block chain-based five-prevention lock management method according to claim 5, wherein:
the electronic key checks whether the task verification code is correct or not according to the task content data and the task verification code calculation method, and if the task verification code is incorrect, the electronic key acquires the task content data again; and when the lock ID is correct, the electronic key displays or prompts the lock ID needing to be opened or closed at present according to the subtask number, the electrical element ID or the electronic key ID.
7. The block chain-based five-prevention lock management method of claim 6, wherein:
finding a corresponding lock according to the ID of the lock, inserting an electronic key, and recording a fingerprint; the electronic key verifies whether the authority aging, the lock ID, the electrical element ID, the operator ID and the precondition are met, if yes, the operation time is recorded, the electronic key selects a command verification code calculation method corresponding to the lock ID and a command data content calculation command verification code, the command data content and the command verification code are packaged to be used as a command block, the command block is stored and then sent to the lock together with a secret key, and meanwhile, the subtasks corresponding to the number are recorded and completed; the lockset checks whether the command verification code is correct or not according to the command data content and the command verification code calculation method, if so, unlocking or locking is executed, an executed receipt is generated for the electronic key, and the lockset stores the command verification code and the operation time as a lockset block and sends the lockset block to the electronic key; and completing all subtasks in sequence.
8. The block chain-based five-prevention lock management method of claim 7, wherein:
after the electronic key receives all the executed receipts, the electronic key calculates an execution verification code according to the execution content data and the execution verification code calculation method, packs the execution content data and the execution verification code as a key block, stores the key block and sends the key block to the host;
the electronic key is in data connection with the host, the host verifies the execution verification code according to the execution content data and the execution verification code calculation method, the host sends a clearing command to the electronic key after the verification is passed, and the electronic key clears the total task block after receiving the clearing command.
9. The block chain-based five-prevention lock management method of claim 8, wherein:
the host computer calculates the equipment verification code according to the equipment content data and the equipment verification code calculation method;
and the control terminal packages the equipment content data and the equipment verification code into an equipment block, and uploads the equipment block, the task block and the key block to the server.
10. The block chain-based five-prevention lock management method of claim 9, wherein:
the server checks the task verification code according to the task content data and the task verification code calculation method, calculates the execution verification code according to the execution content data and the execution verification code calculation method in the task block and the key block, verifies the equipment verification code according to the equipment content data and the equipment verification code calculation method, and packs the total task number, the operation time of each subtask, the equipment state, the operator and the video information into a cloud block after the server calls the video information with set duration before and after the corresponding operation time according to the operation time of each subtask and the lock ID after all verification passes.
CN202110772229.7A 2021-07-08 2021-07-08 Five-prevention lockset management method based on block chain Active CN113611014B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110772229.7A CN113611014B (en) 2021-07-08 2021-07-08 Five-prevention lockset management method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110772229.7A CN113611014B (en) 2021-07-08 2021-07-08 Five-prevention lockset management method based on block chain

Publications (2)

Publication Number Publication Date
CN113611014A true CN113611014A (en) 2021-11-05
CN113611014B CN113611014B (en) 2023-07-21

Family

ID=78304206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110772229.7A Active CN113611014B (en) 2021-07-08 2021-07-08 Five-prevention lockset management method based on block chain

Country Status (1)

Country Link
CN (1) CN113611014B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1811789A (en) * 2005-01-26 2006-08-02 陈驰 Anti-faking and authentication method for bill using identifying code
CN103281340A (en) * 2013-06-26 2013-09-04 百度在线网络技术(北京)有限公司 Method, system, client-side, releasing server and cloud server for two-dimension code verification
CN105224414A (en) * 2015-09-25 2016-01-06 北京奇虎科技有限公司 For realizing method of calibration and the device of the code of business task
CN105450402A (en) * 2014-06-26 2016-03-30 优视科技有限公司 Method, device and system for inputting combined-type image verification code
WO2018032374A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Encrypted storage system for block chain and method using same
CN207424963U (en) * 2017-08-22 2018-05-29 海南电网有限责任公司三亚供电局 A kind of substation's lockset safety management system
WO2018133832A1 (en) * 2017-01-21 2018-07-26 云丁网络技术(北京)有限公司 Unlocking method for intelligent door lock, mobile terminal, intelligent door lock and cloud server
CN109272613A (en) * 2018-08-27 2019-01-25 深圳市便易通科技有限公司 A kind of Internet of Things safe electronic access control system of sensor and video interlink
CN109961292A (en) * 2019-03-22 2019-07-02 杭州复杂美科技有限公司 Block chain identifying code application method, equipment and storage medium
CN110674772A (en) * 2019-09-29 2020-01-10 国家电网有限公司技术学院分公司 Intelligent safety control auxiliary system and method for electric power operation site
CN111010381A (en) * 2019-12-06 2020-04-14 趣派(海南)信息科技有限公司 Cross-chain-based identity authentication method and system
CN111106671A (en) * 2019-12-16 2020-05-05 国网安徽省电力有限公司宿州供电公司 Five-prevention management control method and system for transformer substation coded lock
US20200242863A1 (en) * 2019-01-30 2020-07-30 Zhuhai Unitech Power Technology Co., Ltd. Method and system for controlling a smart lock
CN112311806A (en) * 2020-11-08 2021-02-02 杭州有数金融信息服务有限公司 Method for generating geographic information authentication verification code
CN112699987A (en) * 2020-12-17 2021-04-23 郑勇进 Method and system for monitoring work task by using lock

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1811789A (en) * 2005-01-26 2006-08-02 陈驰 Anti-faking and authentication method for bill using identifying code
CN103281340A (en) * 2013-06-26 2013-09-04 百度在线网络技术(北京)有限公司 Method, system, client-side, releasing server and cloud server for two-dimension code verification
CN105450402A (en) * 2014-06-26 2016-03-30 优视科技有限公司 Method, device and system for inputting combined-type image verification code
CN105224414A (en) * 2015-09-25 2016-01-06 北京奇虎科技有限公司 For realizing method of calibration and the device of the code of business task
WO2018032374A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Encrypted storage system for block chain and method using same
WO2018133832A1 (en) * 2017-01-21 2018-07-26 云丁网络技术(北京)有限公司 Unlocking method for intelligent door lock, mobile terminal, intelligent door lock and cloud server
CN207424963U (en) * 2017-08-22 2018-05-29 海南电网有限责任公司三亚供电局 A kind of substation's lockset safety management system
CN109272613A (en) * 2018-08-27 2019-01-25 深圳市便易通科技有限公司 A kind of Internet of Things safe electronic access control system of sensor and video interlink
US20200242863A1 (en) * 2019-01-30 2020-07-30 Zhuhai Unitech Power Technology Co., Ltd. Method and system for controlling a smart lock
CN109961292A (en) * 2019-03-22 2019-07-02 杭州复杂美科技有限公司 Block chain identifying code application method, equipment and storage medium
CN110674772A (en) * 2019-09-29 2020-01-10 国家电网有限公司技术学院分公司 Intelligent safety control auxiliary system and method for electric power operation site
CN111010381A (en) * 2019-12-06 2020-04-14 趣派(海南)信息科技有限公司 Cross-chain-based identity authentication method and system
CN111106671A (en) * 2019-12-16 2020-05-05 国网安徽省电力有限公司宿州供电公司 Five-prevention management control method and system for transformer substation coded lock
CN112311806A (en) * 2020-11-08 2021-02-02 杭州有数金融信息服务有限公司 Method for generating geographic information authentication verification code
CN112699987A (en) * 2020-12-17 2021-04-23 郑勇进 Method and system for monitoring work task by using lock

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张康;汪百花;: "智能钥匙管理系统在瀑布沟水电站的应用", 新型工业化, no. 07 *
翟敬民: "论变电站微机五防闭锁装置常见问题及验收", 能源与节能, no. 7, pages 98 - 100 *

Also Published As

Publication number Publication date
CN113611014B (en) 2023-07-21

Similar Documents

Publication Publication Date Title
CN107704739A (en) Microcomputer anti-error operating system and method, anti-error main frame with listed function, Intelligent key, intelligent lock
CN102521905B (en) Intelligent access control system of transformer substation and control method thereof
CN105447936A (en) Offline intelligent lock monitoring system
KR20070061515A (en) Safety system and method
CN111106671B (en) Five-prevention management control method and system for substation coded lock
CN205787685U (en) Managing and control system for job safety
CN106710051A (en) Management control system and method for preventing error operations of electrical secondary equipment
CN107659572A (en) Intelligent and safe managing and control system based on information fusion
CN109146321A (en) Upkeep operation security control method and system
CN107346109A (en) Managing and control system and method for job safety
CN207731273U (en) Microcomputer anti-error operating system with listed function and anti-error host, Intelligent key, intelligent lock
KR102343969B1 (en) Safety device for a battery contactor in an electric vehicle
CN105550826A (en) Security isolation anti-misoperation system
CN105446202B (en) A kind of anti-control system of substation five
CN108512313A (en) A kind of power distribution network temporary grounding wire management system and control method
CN107452118A (en) A kind of microcomputer anti-error operating system and method based on Bluetooth communication
CN103366431A (en) Management system and method for lockset of distribution network equipment
CN104680634A (en) Maintenance isolation locking system and method
CN106023379A (en) Work order management-based intelligent lockset system for wiring terminal box
CN106504370B (en) Plant stand security management and control system and control method
CN204946135U (en) Plant stand security management and control system
CN205177078U (en) Power metering box cabinet intelligent management system
CN113611014A (en) Five-prevention lock management method based on block chain
CN111243131A (en) Method and device for unlocking lock, storage medium and processor
CN113593082A (en) Five-prevention lock management method and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant