CN113611014B - Five-prevention lockset management method based on block chain - Google Patents

Five-prevention lockset management method based on block chain Download PDF

Info

Publication number
CN113611014B
CN113611014B CN202110772229.7A CN202110772229A CN113611014B CN 113611014 B CN113611014 B CN 113611014B CN 202110772229 A CN202110772229 A CN 202110772229A CN 113611014 B CN113611014 B CN 113611014B
Authority
CN
China
Prior art keywords
verification code
task
lockset
execution
command
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110772229.7A
Other languages
Chinese (zh)
Other versions
CN113611014A (en
Inventor
张艳杰
郑勇进
张娟
李宏伟
邓刚
王进考
刘朝阳
王仕韬
王磊
赵笑笑
周博曦
张嵩
李经纬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid of China Technology College
Shandong Electric Power College
Original Assignee
State Grid Corp of China SGCC
State Grid of China Technology College
Shandong Electric Power College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid of China Technology College, Shandong Electric Power College filed Critical State Grid Corp of China SGCC
Priority to CN202110772229.7A priority Critical patent/CN113611014B/en
Publication of CN113611014A publication Critical patent/CN113611014A/en
Application granted granted Critical
Publication of CN113611014B publication Critical patent/CN113611014B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

A five-prevention system management method based on a block chain comprises the following steps: setting a task verification code calculation method and an execution verification code calculation method according to an electronic key ID of the electronic key, and packaging and storing the electronic key ID, the task verification code calculation method and the execution verification code calculation method in the electronic key and the host; the task verification code calculation method comprises the steps of calculating task content data by using a set task calculation formula to obtain a task calculation result, and selecting data with a set length from the task calculation result as a task verification code; the execution verification code calculation method comprises the steps of calculating execution content data by using a set execution calculation formula to obtain an execution calculation result, and selecting data with a set length from the execution calculation result as an execution verification code; and according to the lockset ID setting command verification code calculation method and the lock verification code calculation method, packaging and storing the lock verification code calculation method, the command verification code calculation method and the lockset ID in the lockset, the electronic key and the host.

Description

Five-prevention lockset management method based on block chain
Technical Field
The disclosure relates to the technical field of lock control, in particular to a five-prevention lock management method based on a blockchain.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
The five-prevention lock is a lock for high-voltage switch equipment, such as a10 kv high-voltage switch cabinet. The lock forced operation personnel can correctly operate the electrical equipment according to the established safe operation program, thereby avoiding the occurrence of misoperation accidents and fully meeting the five-prevention requirement: (1) prevent the wrong opening and closing of the circuit breaker. The circuit breaker is prevented from being separated and combined by mistake, and the operated equipment can be operated only if the operation instruction corresponds to the operated equipment; (2) preventing the on-load disconnecting switch from being closed. The on-load separating and closing isolating switch is prevented, and the isolating switch cannot be operated in the switching-on state of the circuit breaker, the load switch and the contactor; (3) The grounding wire (grounding switch) is prevented from being hung (closed) by electricity, namely, the grounding wire (grounding switch) is prevented from being hung or the grounding switch is closed only when the breaker (isolating switch) is in a disconnecting state; (4) preventing power transmission with ground wire. Namely, the power transmission with the ground wire is prevented, and the circuit breaker (isolating switch) with the ground wire (grounding switch) is prevented; (5) The compartment can be opened only when the compartment is not electrified.
The five-prevention lock is provided with a padlock and a fixed lockset, and has the function of limiting or not limiting the action states of a switch, a handle and a knife switch of electrical equipment.
The inventor finds that the existing five-prevention lock management method has the following problems:
(1) In the prior art, the operation box of the open-type equipment of the transformer substation and the corresponding padlock are not subjected to literal numbering treatment, and after the operation box is used, a user is easy to make mistakes when locking is restored according to the number, that is, the padlock is misplaced, so that a misplacement interval is easy to be caused;
(2) The operators cannot be identified on line, and the operators are assigned to operate after unlocking by non-current tasks;
(3) After the operation sequence is downloaded into the five-prevention key, an off-line mode is adopted in each unlocking operation step in the operation, when abnormal conditions are encountered and processed in the operation process, a management blind area is entered, an operation log cannot be formed, and because a data encryption means is not adopted, operation record data is possibly refreshed and tampered, so that in the management, comprehensive and accurate operation records are difficult to obtain, and the operation log cannot be used as key evidence in accident tracing;
(4) The five-prevention mechanical padlock is usually unlocked in a button type mechanical transmission mode, the unlocking time can be recorded in a five-prevention key, but the locking time cannot form a time record, and the problem that the operator is forgotten to close the cabinet door cannot be traced. The mechanical padlock key and the electric lock key can be configured independently sometimes, and the padlock key and the electric five-prevention key are carried during operation, so that the operation management burden is increased.
Disclosure of Invention
In order to solve the defects of the prior art, the present disclosure provides a five-prevention lockset management method and system based on a block chain, wherein a task block, a key block, a five-prevention lock block and an equipment block all comprise a verification code, each verification code is respectively stored by at least two independent components, and once the verification code is modified, the verification code is changed, so that the possibility of tampering of five-prevention lock management data is avoided.
In order to achieve the above object, the present invention discloses a five-prevention system management method based on a blockchain, comprising: setting a task verification code calculation method and an execution verification code calculation method according to an electronic key ID of the electronic key, and packaging and storing the electronic key ID, the task verification code calculation method and the execution verification code calculation method in the electronic key and the host; the task verification code calculation method comprises the steps of calculating task content data by using a set task calculation formula to obtain a task calculation result, and selecting data with a set length from the task calculation result as a task verification code; the execution verification code calculation method comprises the steps of calculating execution content data by using a set execution calculation formula to obtain an execution calculation result, and selecting data with a set length from the execution calculation result as an execution verification code; according to the lockset ID setting command verification code calculation method and the lock verification code calculation method, the command verification code calculation method and the lockset ID are packaged and stored in the lockset, the electronic key and the host; the command verification code calculation method comprises the steps of calculating command content data by using a set command calculation formula to obtain a command calculation result, and selecting data with a set length from the command calculation result as a command verification code; the lockset verification code calculation method comprises the steps of calculating lockset content data by using a set lockset calculation formula to obtain a lockset calculation result, and selecting data with a set length from the lockset calculation result as a lockset verification code.
In one embodiment of the present invention, the method further includes setting a device verification code calculation method according to a host ID of the host, packing the host ID and the device verification code calculation method in the host and the server corresponding to the host ID, and the device verification code calculation method includes calculating the device content data with a set device calculation formula to obtain a device calculation result, and selecting the data with the set length as the device verification code in the device calculation result.
In one embodiment of the invention, the task content data comprises a total task number, a subtask number, authority timeliness, an operator ID, a task release time stamp, an electronic key ID and a plurality of subtask contents, wherein the subtask contents comprise a subtask number, an electric element ID, a lockset ID and a precondition;
the command content data comprises operation time and task verification codes;
the execution content data comprises a total task number, all subtask numbers of all subtasks, a command verification code and operation time data;
the lockset content data comprises an execution time stamp, an operator ID and a task number;
the equipment content data comprises a total task number, an operator ID, a subtask number of each subtask, operation time, a lockset ID and operation time, and the corresponding electrical element switch state.
In one embodiment of the present invention, the electronic key stores fingerprint information of a corresponding operator according to an operator ID.
In one embodiment of the invention, the method further comprises: the host computer obtains the task content data, and selects a corresponding task verification code calculation method according to the ID of the electronic key to calculate and obtain a task verification code; packaging task content data and a task verification code to form a task block, and issuing the task block to an electronic key corresponding to the electronic key ID;
in one embodiment of the invention, the electronic key checks whether the task verification code is correct according to the task content data and the task verification code calculation method, and re-acquires the task content data if the task verification code is incorrect; when the electronic key is correct, the electronic key displays or prompts the lockset ID which needs to be opened or closed currently according to the subtask number, the electric element ID or the electronic key ID.
In one embodiment of the invention, a corresponding lock is found according to the lock ID, an electronic key is inserted, and a fingerprint is input; recording operation time if the electronic key verification authority timeliness, the lockset ID, the electric element ID, the operator ID and the precondition are all met, selecting a command verification code calculation method corresponding to the lockset ID by the electronic key, calculating a command verification code according to command data content, packaging the command data content and the command verification code as a command block, storing the command block, transmitting the command block and the secret key to the lockset, and simultaneously recording and finishing subtasks with corresponding numbers; the lockset checks whether the command verification code is correct according to the command data content and the command verification code calculation method, if so, unlocking or locking is executed, an executed receipt is generated to the electronic key, and the lockset stores the command verification code and the operation time as a lockset block and sends the lockset block to the electronic key; all subtasks are completed in turn.
In one embodiment of the invention, after receiving all executed receipts, the electronic key calculates an execution verification code according to execution content data and an execution verification code calculation method, packages the execution content data and the execution verification code as a key block, and stores and transmits the key block to a host; the electronic key is in data connection with the host computer, the host computer checks the execution verification code according to the execution content data and the execution verification code calculation method, after the verification is passed, a clearing command is sent to the electronic key, and the electronic key clears the total task block after receiving the clearing command.
In one embodiment of the invention, the host will calculate a device authentication code from the device content data, the device authentication code calculation method; and the control terminal packages the device content data and the device verification code to form a device block, and uploads the device block, the task block and the key block to the server.
In one embodiment of the invention, the server checks the task verification code according to the task content data and the task verification code calculation method, calculates the execution verification code according to the task block and the execution content data in the key block, calculates the execution verification code according to the execution verification code calculation method, checks the equipment verification code according to the equipment content data and the equipment verification code calculation method, and after all the verification passes, the server packages the total task number and the operation time, the equipment state, the operators and the video information of each subtask to form a cloud block after the video information with set duration before and after the corresponding operation time and the lockset ID are called according to the operation time of each subtask.
Compared with the prior art, the beneficial effects of the present disclosure are:
1. according to the management method and the management system, the task block, the key block, the five-prevention lock block and the equipment block all comprise one verification code, at least two independent components of each verification code are respectively stored, and the number of the verification code is changed once the verification code is modified, so that the possibility of data tampering is avoided.
2. According to the management method and the management system, the server packages the total task number, the operation time of each subtask, the equipment state, the operators and the video information to form the cloud block package, so that later retrieval and reference are facilitated, and the problem that each equipment cannot find related records due to the fact that the memory is full is solved.
3. The management method and the management system verify the ID of the electric element, and prevent accidents caused by misoperation and the problem that the unlocked lock cannot be found due to disordered lockset positions.
4. According to the management method and the management system, the electronic key can be used for switching the mechanical padlock of the operation box and switching on or off the electric lock loop when the control box and the switch cabinet are operated in situ, so that the integrated design of the electric operation loop five-prevention lock computer key and the mechanical five-prevention padlock computer key is realized, and the burden of managing a plurality of keys is saved.
5. According to the management method and the management system, the verification code is utilized to ensure the validity of data, and meanwhile, the storage burden of locks and electronic keys is reduced; the padlock, the fixed lock and the electric lock are authorized, verified and unlocked by the electronic key, so that the communication of the Internet of things is realized, and the monitoring and the data statistics are convenient.
Additional aspects of the disclosure will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the disclosure.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure, illustrate and explain the exemplary embodiments of the disclosure and together with the description serve to explain the disclosure, and do not constitute an undue limitation on the disclosure.
Fig. 1 is a schematic diagram of a first disconnecting switch operation box according to an embodiment of the disclosure.
Fig. 2 is a schematic diagram of a second disconnecting switch operation box according to an embodiment of the disclosure.
Fig. 3 is a schematic diagram of passive padlock control provided by an embodiment of the present disclosure.
Fig. 4 is a schematic diagram of passive lock control provided by an embodiment of the present disclosure.
Fig. 5 is a schematic diagram of electronic key control according to an embodiment of the disclosure.
Fig. 6 is a schematic diagram of electric lock control provided in an embodiment of the present disclosure.
Fig. 7 is a schematic structural diagram of an electronic key according to an embodiment of the disclosure.
Detailed Description
The disclosure is further described below with reference to the drawings and examples.
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the present disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments in accordance with the present disclosure. As used herein, the singular is also intended to include the plural unless the context clearly indicates otherwise, and furthermore, it is to be understood that the terms "comprises" and/or "comprising" when used in this specification are taken to specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof.
Embodiments of the present disclosure and features of embodiments may be combined with each other without conflict.
Examples:
as shown in fig. 1, an embodiment of the present disclosure provides a block chain-based five-prevention lock management system for managing five-prevention locks disposed on electrical equipment of a substation, including: the system comprises a plurality of passive locks (namely five-prevention locks), an electronic key, a sensor for collecting the state of each electrical device, a substation camera, a host (namely a control terminal) and a server.
The electrical equipment is provided with a plurality of electrical elements such as a switch, a knife switch and a breaker trolley which are required to be additionally provided with the five-prevention lock. Each five-prevention lock is respectively provided with a label which is convenient for operators to recognize by naked eyes (in the prior art).
In the embodiment, the five-prevention lock refers to a lock core assembly unlocked in a CN201821978703.1 multi-mode and an intelligent lockset unlocked in a multi-mode, or a U-shaped lock Liang Zhineng glass door lock with a knob structure of CN201920093983.6 adopts an idle passive lock core, a clutch is driven by a motor or an electromagnet to engage a lock core shell and an actuating mechanism, and a plug of an electronic key is inserted into a socket of the idle passive lock core to twist the lock core shell to drive the actuating mechanism to rotate so as to unlock.
The five-prevention lock provided by the embodiment adopts a passive lock and an electric lock, and particularly comprises a fixed lock and a padlock, wherein the fixed lock comprises a door lock and a cabinet lock, the passive lock comprises a passive lock cylinder, an actuating mechanism (a transmission mechanism or an unlocking mechanism), an encryption chip, a controller and an NFC antenna (padlock), and the memory is powered by an electronic key without a power supply.
The NFC labels are arranged at the padlock installation positions of the electric equipment, independent electric element IDs corresponding to the electric elements are recorded on each NFC label, each electric element ID comprises an independent electric element ID composed of a transformer substation number, an electric element number and an electric element type, and the lock is guaranteed to be in an accurate position.
As shown in fig. 1, 2, 3 and 4, the locks refer to an electric lock, an active or passive cabinet lock and an active or passive padlock, and each lock is provided with a controller, an encryption chip and a data interface for adapting a memory to an electronic key.
After unlocking or locking, the padlock of the embodiment is encrypted and calculated into a lockset verification code according to the execution time stamp, the operator ID and the task number, and the lockset verification code is stored as a lockset block, and the specific execution time stamp, the operator ID and the subtask ID are not stored, because the calculation capacity and the memory capacity of the passive lock are limited. For example, the data of the execution time stamp, the operator ID and the task number together is 1kb, and a lock verification code may be 128b, and the lock verification code calculation mode of each passive padlock or passive lock is independent, and may be the data of how many bits before selection after calculation according to a specific formula.
As shown in fig. 5 and 7, the electronic key includes a plug, a controller, a decryption chip, a biometric acquisition (fingerprint sensor), an NFC antenna, and a memory. The electronic key is physically connected with the host through a plug and socket mode or data transmission is carried out through an NFC antenna, because wireless signals are not allowed to be developed in the transformer substation to access the safe I area, and the host is in the safe I area, the electronic key is not suitable for setting a wireless transmission mode such as Bluetooth wifi and the like.
As shown in fig. 6, the electric lock has the function that after the plug of the electronic key is inserted into the interface, the excitation signal is sent to the triode after verification, the output interface supplies power to the relay of the control box, and the output interface is powered off after the key is pulled out.
The host is connected with the server through a network cable; the host acquires the state of each electrical device; the server is responsible for collecting various data of a plurality of substations.
The substation camera is responsible for gathering the video information in the substation, and not every electrical component ID can have video information, and electrical component and camera are not the relation of one-to-one, and it is possible that an electrical component has five cameras to see, perhaps all can not see yet.
For each switching operation step, the operation starting time is the unlocking time, and the operation ending time is the cabinet door locking time. For the abnormal handling behavior in the switching operation process, the switching lock time record is used for calibrating operation behavior tracks of each interval, so that accident handling and management tracing are facilitated. When the five-prevention system has obvious defects such as software program errors, the computer key has a remote authorization unlocking function, and the mechanical and shorting-wire unconditional unlocking key is canceled.
The five-prevention lockset management method comprises a system building process A, a task issuing process B and an execution reporting process C, wherein the processes comprise the following steps:
system building a, comprising:
a101, setting a task verification code calculation method and an execution verification code calculation method according to an electronic key ID of an electronic key, and packaging and storing the electronic key ID, the task verification code calculation method and the execution verification code calculation method in the electronic key, a host and a server; the task verification code calculation method comprises the steps of calculating task content data by using a set task calculation formula to obtain a task calculation result, and selecting data with a set length from the task calculation result as a task verification code; the execution verification code calculation method comprises the steps of calculating execution content data by using a set execution calculation formula to obtain an execution calculation result, and selecting data with a set length from the execution calculation result as an execution verification code; according to the lockset ID setting command verification code calculation method and the lock verification code calculation method, the command verification code calculation method and the lockset ID are packaged and stored in the lockset, the electronic key, the host and the server; the command verification code calculation method comprises the steps of calculating command content data by using a set command calculation formula to obtain a command calculation result, and selecting data with a set length from the command calculation result as a command verification code; the lockset verification code calculation method comprises the steps of calculating lockset content data by using a set lockset calculation formula to obtain a lockset calculation result, and selecting data with a set length from the lockset calculation result as a lockset verification code.
A102, setting a device verification code calculation method according to the host ID of the host, packing and storing the host ID and the device verification code calculation method in the host and the server corresponding to the host ID, wherein the device verification code calculation method comprises the steps of calculating the device content data by using a set device calculation formula to obtain a device calculation result, and selecting the data with the set length from the device calculation result as the device verification code.
The task content data comprises a total task number, the number of subtasks, authority timeliness, an operator ID, a task release time stamp, an electronic key ID and a plurality of subtask contents, wherein the subtask contents comprise the subtask number, an electric element ID, a lockset ID and a precondition; the command content data comprises operation time and task verification codes; the execution content data comprises a total task number, all subtask numbers of all subtasks, a command verification code and operation time data; the lockset content data comprises an execution time stamp, an operator ID and a task number; the equipment content data comprises a total task number, an operator ID, a subtask number of each subtask, operation time, a lockset ID and operation time, and the corresponding electrical element switch state.
And A104, the electronic key stores fingerprint information of a corresponding operator according to the ID of the operator.
Task publishing Process B
B101, an operator creates task content data through a host, wherein the task content data comprises a total task number, the number of subtasks, authority timeliness, an operator ID, a task release timestamp, an electronic key ID and a plurality of subtask contents, and the subtask contents comprise the subtask number, an electric element ID, a lockset ID and a precondition (namely, an operation sequence, if the condition of unlocking a second lock is that the first lock is already locked);
b102, the host acquires task content data, and a corresponding task verification code calculation method is selected according to the ID of the electronic key to calculate and acquire a task verification code; for example, three subtasks, a total of 6 total task fields and 3*5 subtask fields total 21 fields, and the calculated task verification code with the data size of 20kb is 128b.
B103, packaging the task content data and the task verification code to form a task block, and issuing the task block to the electronic key corresponding to the electronic key ID; the method specifically comprises the steps that an electronic key is connected with a host, an operator inputs fingerprints, the host verifies whether an electronic key ID and an operator ID are correct, and if yes, a task block is issued to the electronic key.
B201, the electronic key checks whether the task verification code is correct according to the task content data and the task verification code calculation method, and re-acquires the task content data if the task verification code is incorrect; when the electronic key is correct, the electronic key displays or prompts the lockset ID (plain code) which is required to be opened or closed currently according to the lockset ID of the task content data.
The operator finds out the corresponding lockset according to the lockset ID, inserts a key and inputs a fingerprint;
the electronic key controller verifies whether authority timeliness, lockset ID, electric element ID, operator ID and pre-condition are all met, if yes, the operation time is recorded, the electronic key selects a command verification code calculation method corresponding to the lockset ID, command data content calculates a command verification code, the command data content and the command verification code are packaged as a command block, the command block is stored and then sent to the lockset together with a secret key, and subtasks with corresponding numbers are recorded and completed; the lockset checks the command verification code according to the command data content and the command verification code calculation method, if the command verification code is the command verification code, unlocking or locking is executed, an executed receipt is generated to the electronic key, and the lockset stores the command verification code and the operation time as a lockset block and sends the lockset block to the electronic key; all subtasks are completed in turn.
C101, after receiving all executed receipts, the electronic key calculates an execution verification code according to execution content data and an execution verification code calculation method, packages the execution content data and the execution verification code as a key block, and stores and transmits the key block to a host;
the electronic key is in data connection with the host computer, the host computer checks the execution verification code according to the execution content data and the execution verification code calculation method, after the verification is passed, a clearing command is sent to the electronic key, and the electronic key clears the total task block after receiving the clearing command
C102, the host calculates the equipment verification code according to the equipment content data and the equipment verification code calculation method;
and the control terminal packages the device content data and the device verification code to form a device block, and uploads the device block, the task block and the key block to the server.
And C103, the server checks the task verification code according to the task content data and the task verification code calculation method, calculates the execution verification code according to the execution content data in the task block and the key block and the execution verification code calculation method, checks the equipment verification code according to the equipment content data and the equipment verification code calculation method, and after all the verification passes, the server acquires the video information of the set time length before and after the corresponding operation time according to the operation time and the lock ID of each subtask and packages the total task number and the operation time, the equipment state, the operator and the video information of each subtask to form a cloud block.
The traditional five-prevention lock management system adopts a mode of mechanical lock and computer key; the computer key has no operation time record and no five-prevention lock operation record; the unlocking record can be made, and the locking record can not be made; identity identification cannot be performed in the process of operating the lockset; the log data can not be provided for data management statistical analysis, operation behavior analysis and misoperation accident tracing.
The five-prevention lock management system adopts a mode of 'passive intelligent lock plus electronic key'; the passive intelligent lock has 200 backup records (in the latest time); the electronic key can store 20000 switch lock records; the unlocking record and the locking record can be made; in the unlocking and locking processes, identity identification can be performed; sufficient time log accurate data can be provided for management analysis, and the switch lock records can be provided for security department data management statistical analysis.
It will be apparent to those skilled in the art that embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, magnetic disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored on a computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random access Memory (Random AcceBBMemory, RAM), or the like.
The foregoing description of the preferred embodiments of the present disclosure is provided only and not intended to limit the disclosure so that various modifications and changes may be made to the present disclosure by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present disclosure should be included in the protection scope of the present disclosure.

Claims (4)

1. A five-prevention lockset management method based on a block chain is characterized by comprising the following steps of: comprising the following steps:
setting a task verification code calculation method and an execution verification code calculation method according to an electronic key ID of the electronic key, and packaging and storing the electronic key ID, the task verification code calculation method and the execution verification code calculation method in the electronic key, a host and a server; the task verification code calculation method comprises the steps of calculating task content data by using a set task calculation formula to obtain a task calculation result, and selecting data with a set length from the task calculation result as a task verification code; the execution verification code calculation method comprises the steps of calculating execution content data by using a set execution calculation formula to obtain an execution calculation result, and selecting data with a set length from the execution calculation result as an execution verification code;
according to the lockset ID setting command verification code calculation method and the lockset verification code calculation method, the command verification code calculation method and the lockset ID are packaged and stored in a lockset, an electronic key, a host and a server; the command verification code calculation method comprises the steps of calculating command content data by using a set command calculation formula to obtain a command calculation result, and selecting data with a set length from the command calculation result as a command verification code; the lockset verification code calculation method comprises the steps of calculating lockset content data by using a set lockset calculation formula to obtain a lockset calculation result, and selecting data with a set length from the lockset calculation result as a lockset verification code;
the method comprises the steps of calculating equipment content data by using a set equipment calculation formula to obtain an equipment calculation result, and selecting data with a set length from the equipment calculation result as equipment verification codes;
the task content data comprises a total task number, the number of subtasks, authority timeliness, an operator ID, a task release time stamp, an electronic key ID and a plurality of subtask contents, wherein the subtask contents comprise the subtask number, an electric element ID, a lockset ID and a precondition;
the command content data comprises operation time and task verification codes;
the execution content data comprises a total task number, all subtask numbers of all subtasks, a command verification code and operation time data;
the lockset content data comprises an execution time stamp, an operator ID and a task number;
the equipment content data comprises a total task number, an operator ID, a subtask number of each subtask, operation time, a lockset ID and an operation time, and the corresponding electrical element switch state;
the electronic key stores fingerprint information of a corresponding operator according to the ID of the operator;
the method further comprises the steps of: the host computer obtains the task content data, and selects a corresponding task verification code calculation method according to the ID of the electronic key to calculate and obtain a task verification code; packaging task content data and a task verification code to form a task block, and issuing the task block to an electronic key corresponding to the electronic key ID;
the electronic key checks whether the task verification code is correct according to the task content data and the task verification code calculation method, and the task content data is acquired again if the task verification code is incorrect; when the electronic key is correct, displaying or prompting the lockset ID which is required to be opened or closed currently according to the subtask number, the electric element ID or the electronic key ID;
finding a corresponding lock according to the lock ID, inserting an electronic key, and inputting a fingerprint; recording operation time if the electronic key verification authority timeliness, the lockset ID, the electric element ID, the operator ID and the precondition are all met, selecting a command verification code calculation method corresponding to the lockset ID by the electronic key, calculating a command verification code according to command data content, packaging the command data content and the command verification code as a command block, storing the command block, transmitting the command block and the secret key to the lockset, and simultaneously recording and finishing subtasks with corresponding numbers; the lockset checks whether the command verification code is correct according to the command data content and the command verification code calculation method, if so, unlocking or locking is executed, an executed receipt is generated to the electronic key, and the lockset stores the command verification code and the operation time as a lockset block and sends the lockset block to the electronic key; all subtasks are completed in turn.
2. The blockchain-based five-prevention lock management method of claim 1, wherein:
after receiving all executed receipts, the electronic key calculates an execution verification code according to execution content data and an execution verification code calculation method, packages the execution content data and the execution verification code as a key block, stores the key block and transmits the key block to a host;
the electronic key is in data connection with the host computer, the host computer checks the execution verification code according to the execution content data and the execution verification code calculation method, after the verification is passed, a clearing command is sent to the electronic key, and the electronic key clears the total task block after receiving the clearing command.
3. The blockchain-based five-prevention lock management method of claim 2, wherein:
the host calculates the equipment verification code according to the equipment content data and the equipment verification code calculation method;
and the control terminal packages the device content data and the device verification code to form a device block, and uploads the device block, the task block and the key block to the server.
4. The blockchain-based five-prevention lock management method of claim 3, wherein:
the server checks the task verification code according to the task content data and the task verification code calculation method, calculates the execution verification code according to the execution content data in the task block and the key block and the execution verification code calculation method, checks the equipment verification code according to the equipment content data and the equipment verification code calculation method, and packages the total task number, the operation time, the equipment state, the operators and the video information of each subtask to form a cloud block after the video information of a set time length before and after the corresponding operation time is called according to the operation time and the lockset ID of each subtask after all the verification codes pass.
CN202110772229.7A 2021-07-08 2021-07-08 Five-prevention lockset management method based on block chain Active CN113611014B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110772229.7A CN113611014B (en) 2021-07-08 2021-07-08 Five-prevention lockset management method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110772229.7A CN113611014B (en) 2021-07-08 2021-07-08 Five-prevention lockset management method based on block chain

Publications (2)

Publication Number Publication Date
CN113611014A CN113611014A (en) 2021-11-05
CN113611014B true CN113611014B (en) 2023-07-21

Family

ID=78304206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110772229.7A Active CN113611014B (en) 2021-07-08 2021-07-08 Five-prevention lockset management method based on block chain

Country Status (1)

Country Link
CN (1) CN113611014B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018032374A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Encrypted storage system for block chain and method using same
WO2018133832A1 (en) * 2017-01-21 2018-07-26 云丁网络技术(北京)有限公司 Unlocking method for intelligent door lock, mobile terminal, intelligent door lock and cloud server
CN109961292A (en) * 2019-03-22 2019-07-02 杭州复杂美科技有限公司 Block chain identifying code application method, equipment and storage medium
CN110674772A (en) * 2019-09-29 2020-01-10 国家电网有限公司技术学院分公司 Intelligent safety control auxiliary system and method for electric power operation site

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100407217C (en) * 2005-01-26 2008-07-30 陈驰 Anti-faking and authentication method for bill using identifying code
CN103281340B (en) * 2013-06-26 2016-12-28 百度在线网络技术(北京)有限公司 2 D code verification method, system, client, issue and cloud server
CN105450402A (en) * 2014-06-26 2016-03-30 优视科技有限公司 Method, device and system for inputting combined-type image verification code
CN105224414B (en) * 2015-09-25 2018-01-19 北京奇虎科技有限公司 For the method for calibration and device of the code for realizing business task
CN207424963U (en) * 2017-08-22 2018-05-29 海南电网有限责任公司三亚供电局 A kind of substation's lockset safety management system
CN109272613B (en) * 2018-08-27 2021-08-27 深圳市便易通科技有限公司 Sensor and video linked Internet of things safety electronic access control system
US11189117B2 (en) * 2019-01-30 2021-11-30 Zhuhai Unitech Power Technology Co., Ltd. Method and system for controlling a smart lock
CN111010381B (en) * 2019-12-06 2022-04-22 趣派(海南)信息科技有限公司 Cross-chain-based identity authentication method and system
CN111106671B (en) * 2019-12-16 2024-01-30 国网安徽省电力有限公司宿州供电公司 Five-prevention management control method and system for substation coded lock
CN112311806B (en) * 2020-11-08 2022-09-20 浙江有数数智科技有限公司 Method for generating geographic information authentication verification code
CN112699987B (en) * 2020-12-17 2022-07-05 郑勇进 Method and system for monitoring work task by using lock

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018032374A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Encrypted storage system for block chain and method using same
WO2018133832A1 (en) * 2017-01-21 2018-07-26 云丁网络技术(北京)有限公司 Unlocking method for intelligent door lock, mobile terminal, intelligent door lock and cloud server
CN109961292A (en) * 2019-03-22 2019-07-02 杭州复杂美科技有限公司 Block chain identifying code application method, equipment and storage medium
CN110674772A (en) * 2019-09-29 2020-01-10 国家电网有限公司技术学院分公司 Intelligent safety control auxiliary system and method for electric power operation site

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
智能钥匙管理系统在瀑布沟水电站的应用;张康;汪百花;;新型工业化(第07期);全文 *
论变电站微机五防闭锁装置常见问题及验收;翟敬民;能源与节能(第7期);98-100 *

Also Published As

Publication number Publication date
CN113611014A (en) 2021-11-05

Similar Documents

Publication Publication Date Title
CN107704739A (en) Microcomputer anti-error operating system and method, anti-error main frame with listed function, Intelligent key, intelligent lock
CN105447936A (en) Offline intelligent lock monitoring system
CN111106671B (en) Five-prevention management control method and system for substation coded lock
CN108321930A (en) A kind of sequence control system and method
CN111293784A (en) Temporary power utilization system for construction site
CN205787685U (en) Managing and control system for job safety
US9423780B2 (en) Handheld device for preventing misoperations in an electric power system
US8972236B2 (en) Method and apparatus for performing real-time, in-the-field switching-order simulation for an electric power system
CN207731273U (en) Microcomputer anti-error operating system with listed function and anti-error host, Intelligent key, intelligent lock
CN103168458A (en) Method for managing keys in a manipulation-proof manner
CN107346109A (en) Managing and control system and method for job safety
CN103366431A (en) Management system and method for lockset of distribution network equipment
US9477211B2 (en) Apparatus for controlling the operation of a machine, locking insert for such an apparatus, and associated method of operation
CN105446202B (en) A kind of anti-control system of substation five
CN105550826A (en) Security isolation anti-misoperation system
CN108512313A (en) A kind of power distribution network temporary grounding wire management system and control method
CN107452118A (en) A kind of microcomputer anti-error operating system and method based on Bluetooth communication
CN110988421A (en) Intelligent safety protection device and system applied to electric energy metering mechanism
CN106504370B (en) Plant stand security management and control system and control method
CN204946135U (en) Plant stand security management and control system
CN113611014B (en) Five-prevention lockset management method based on block chain
CN205177078U (en) Power metering box cabinet intelligent management system
CN113593082B (en) Five-prevention lockset management method and system based on blockchain
CN111243131A (en) Method and device for unlocking lock, storage medium and processor
CN110516908A (en) A kind of operation management-control method applied to industry spot

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant