CN116503984A - Unattended personnel monitoring system of transformer substation - Google Patents

Unattended personnel monitoring system of transformer substation Download PDF

Info

Publication number
CN116503984A
CN116503984A CN202310548592.XA CN202310548592A CN116503984A CN 116503984 A CN116503984 A CN 116503984A CN 202310548592 A CN202310548592 A CN 202310548592A CN 116503984 A CN116503984 A CN 116503984A
Authority
CN
China
Prior art keywords
equipment
data
subsystem
locking
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310548592.XA
Other languages
Chinese (zh)
Inventor
张海辉
黄美军
陈飞
黄华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangxi Huisheng Power Technology Co ltd
Original Assignee
Jiangxi Huisheng Power Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi Huisheng Power Technology Co ltd filed Critical Jiangxi Huisheng Power Technology Co ltd
Priority to CN202310548592.XA priority Critical patent/CN116503984A/en
Publication of CN116503984A publication Critical patent/CN116503984A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063114Status monitoring or status determination for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Theoretical Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Human Computer Interaction (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)

Abstract

The invention discloses a transformer substation unmanned personnel monitoring system, which comprises: the entrance guard verification subsystem is used for collecting and uploading identity information data of a transformer substation entering person and executing entrance guard opening work; the equipment locking subsystem is used for operating and locking the transformer substation equipment, monitoring the working state of the transformer substation equipment during the period that an entering person enters the transformer substation, generating equipment monitoring data and uploading the equipment monitoring data; the background monitoring center receives and processes the data uploaded by the access control verification subsystem and the equipment locking subsystem; the access control verification subsystem is used for sending feedback information to the access control verification subsystem; the device locking subsystem is used for sending device unlocking information to the device locking subsystem; the method and the device are used for alarming abnormal data of non-maintenance substation equipment, and by adopting the scheme of the invention, manual verification is replaced, so that the labor cost is saved, illegal operation of the equipment is avoided, the continuous and stable work of the substation is ensured, and the stability of power supply is ensured.

Description

Unattended personnel monitoring system of transformer substation
Technical Field
The invention relates to the technical field of substation monitoring, in particular to an unmanned on duty personnel monitoring system of a substation.
Background
With the development of production technology, the requirements of various industries on power supply are also higher and higher, so that in order to ensure stable and reliable power supply, not only are careful inspection and maintenance performed on various power supply equipment in a power grid, but also effective monitoring must be performed on the safety of a transformer substation in which the power supply equipment is arranged.
The existing transformer substation monitoring system performs identity verification on personnel entering the transformer substation by arranging an identity recognition system at the substation of the transformer substation, the conventional recognition system adopts the modes of face recognition, fingerprint recognition or employee pass cards and the like, the face recognition and the fingerprint recognition are relatively safe, but the possibility of being stolen still exists, the flexibility is poor, even if an access control system is adopted, the personnel on duty are still required, and the condition of the transformer substation site cannot be fed back to a monitoring center in time. In the existing unattended system (patent application number: 201410425935.4) of the transformer substation, in the process of verifying the identity of an entering person, a monitoring person of a monitoring center is still required to verify the authentication information of the entering person, so that not only is the labor cost required to participate in the authentication increased, but also the rigid requirement of entering the transformer substation is indirectly improved (the two types of workers of the entering person and the monitoring person are required to be simultaneously in working positions to be realized), if the maintenance work is carried out late at night, at least one monitoring person is required to carry out the authentication for the maintenance person, the working content of the non-maintenance worker of the transformer substation is increased, and the complete unattended operation cannot be achieved.
Meanwhile, after a maintenance person enters the transformer substation, after other passing staff not qualified for overhauling the equipment enter the transformer substation together as an entering person, the behavior of the other staff not qualified for overhauling the equipment cannot be truly restrained, if the staff not qualified for overhauling the equipment operates or damages the non-maintenance equipment, the maintenance person and the monitoring center cannot be timely perceived, and the prevention cannot be achieved.
How to carry out unmanned on duty to the transformer substation, verify the entering person's identity, restrict the passman's action, effectively monitor the non-maintenance equipment state of transformer substation, be the urgent problem that needs to be solved of the person of skill in the art.
Disclosure of Invention
The invention aims to solve the problems that the existing transformer substation monitoring system cannot be completely unattended and cannot limit the operation of transformer substation equipment, and provides the transformer substation unattended personnel monitoring system.
The unattended personnel monitoring system of the transformer substation comprises:
the entrance guard verification subsystem is used for collecting and uploading identity information data of a transformer substation entering person and executing entrance guard opening work;
the equipment locking subsystem is used for operating and locking the transformer substation equipment, monitoring the working state of the transformer substation equipment during the period that an entering person enters the transformer substation, generating equipment monitoring data and uploading the equipment monitoring data;
the background monitoring center receives and processes the data uploaded by the access control verification subsystem and the equipment locking subsystem; the access control verification subsystem is used for sending feedback information to the access control verification subsystem; the device locking subsystem is used for sending device unlocking information to the device locking subsystem; and the alarm device is used for alarming abnormal data of the non-maintenance substation equipment.
Optionally, the access verification subsystem includes:
the information acquisition module is used for acquiring identity information data of an entering person and generating the identity information data;
the access control wireless communication module is used for carrying out wireless information interaction with the background monitoring center;
and the entrance guard control module is used for executing the opening work of the entrance guard according to the feedback information of the background monitoring center.
Optionally, the device locking subsystem includes:
the equipment monitoring module monitors working states of substation equipment and generates equipment monitoring data;
the equipment wireless communication module is used for carrying out wireless information interaction with the background monitoring center;
and the equipment locking module is used for operating and locking the substation equipment and unlocking the corresponding substation equipment according to unlocking information of the background monitoring center.
Optionally, the device monitoring module is internally provided with a unique identification code, the background monitoring center pre-stores the unique identification codes of all the device monitoring modules and the position information data of the monitored substation devices, the background monitoring center identifies the device locking subsystem through the unique identification codes and determines the monitored substation device position information,
wherein each equipment locking subsystem is respectively matched with one transformer substation equipment.
Optionally, the monitoring system further includes an access terminal, where the access terminal is configured to upload reservation identity information data, maintenance substation equipment number data, and access time interval data to the background monitoring center.
Optionally, the background monitoring center includes:
the background wireless communication module is used for carrying out wireless information interaction with the access control verification subsystem, the equipment locking subsystem and the access terminal;
the storage is used for storing unique identification codes of all equipment locking subsystems in the transformer substation;
the data processing module is used for sending feedback information to the access control verification subsystem according to the data information uploaded by the access control terminal; transmitting unlocking information to the equipment locking subsystem; the device locking subsystem is used for identifying the device locking subsystem and judging whether the device monitoring data are abnormal or not;
and the alarm module alarms according to the abnormal result judged by the data processing module.
Optionally, the data processing module matches the identity information data uploaded by the entrance guard verification subsystem and the time data uploaded by the entrance guard verification subsystem according to the reservation identity information data and the entering time interval data uploaded by the entrance guard terminal, and if the matching is successful, the data processing module sends feedback information to the entrance guard verification subsystem; if the match fails, not as a result,
The entrance guard verification subsystem can trigger the opening work of the entrance guard verification subsystem according to the feedback information.
Optionally, the data processing module sends unlocking information to the corresponding equipment locking subsystem according to the maintenance substation equipment number data uploaded by the access terminal, and the background monitoring center sends the unlocking information after the access verification subsystem triggers the access opening work.
Optionally, after the entrance guard verification subsystem executes the entrance guard opening work, the equipment locking subsystem synchronously starts to monitor the working state of the non-maintenance substation equipment, the equipment locking subsystem records the working state of the non-maintenance substation equipment at the initial time and continuously uploads the equipment monitoring data in real time, and the background monitoring center identifies the equipment monitoring data and alarms after abnormal work setting is identified.
Optionally, the access control verification subsystem is further used for collecting departure information of an entering person and uploading the departure information to a middle background processing center for storage, the background processing center sends full-member locking information to the equipment locking subsystem, and all the equipment locking subsystems are restored to an operation locking state for substation equipment.
Through the technical scheme, the access control system of the transformer substation is automatically judged through the access control verification subsystem, monitoring personnel are not required to audit an entering person in the whole process, labor cost is saved, operation locking is performed on transformer substation equipment, other peer personnel are prevented from operating non-maintenance transformer substation equipment, the transformer substation can continuously and stably work, and the stability of power supply is ensured.
Additional features and advantages of embodiments of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings are included to provide a further understanding of embodiments of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain, without limitation, the embodiments of the invention. In the drawings:
fig. 1 is a block diagram of the system of the present invention.
Detailed Description
The following describes the detailed implementation of the embodiments of the present invention with reference to the drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the invention, are not intended to limit the invention.
As shown in fig. 1, the unattended monitoring system of the transformer substation comprises:
The entrance guard verification subsystem is used for collecting and uploading identity information data of a transformer substation entering person and executing entrance guard opening work;
the equipment locking subsystem is used for operating and locking the transformer substation equipment, monitoring the working state of the transformer substation equipment during the period that an entering person enters the transformer substation, generating equipment monitoring data and uploading the equipment monitoring data;
the background monitoring center receives and processes the data uploaded by the access control verification subsystem and the equipment locking subsystem; the access control verification subsystem is used for sending feedback information to the access control verification subsystem; the device locking subsystem is used for sending device unlocking information to the device locking subsystem; and the alarm device is used for alarming abnormal data of the non-maintenance substation equipment.
According to the invention, the unattended operation of the transformer substation access control is realized through the access control verification subsystem, the transformer substation access control can interact with an entering person and verify information, the access control is opened under the condition that the identity information of the entering person is correct, a mode that a monitoring person is required to manually verify the information of the entering person in the traditional access control is replaced, and the all-weather unattended operation is realized, so that the identity verification work of the entering person can be normally performed; the equipment locking subsystem is used for locking the transformer substation equipment and monitoring the working state after entering the transformer substation by the equipment locking subsystem, so that unrelated operation of workers on non-maintenance transformer substation equipment can be substantially avoided, meanwhile, in order to avoid violent damage to the locking capacity of related facilities of the equipment locking subsystem and further illegal operation, the working state of the non-maintenance equipment is monitored, when abnormality occurs, the condition that the equipment locking subsystem corresponding to the transformer substation equipment is damaged can be judged, the transformer substation equipment is artificially changed and set, timely alarm is needed, and the workers make related emergency means to stop illegal actions; the data is processed through a background monitoring center, related information is sent to an access control verification subsystem and an equipment locking subsystem, and meanwhile, the monitoring center is used as an alarm terminal for alarming substation equipment in an abnormal state.
The principle of an access control verification subsystem:
the entrance guard verification subsystem collects identity information data of transformer substation entrants and uploads the identity information data. The identity information can be verified by means of face recognition, fingerprint recognition, employee pass cards and the like.
The subsystem executes the entrance guard opening work according to the verification result, namely, controls the opening and closing states of the transformer substation entrance guard according to whether the verification is passed or not.
The effect is as follows: through verifying the identity of the entrant, only the person with legal authority can enter the transformer substation, so that the safety is improved, and the potential risk is reduced.
Device locking subsystem principle:
the equipment locking subsystem performs operation locking on the substation equipment, so that only maintenance personnel with legal rights can operate the equipment.
The subsystem monitors the working state of the substation equipment, generates equipment monitoring data and uploads the equipment monitoring data to the background monitoring center.
The effect is as follows: through equipment locking and monitoring, operation of non-maintenance personnel on equipment is limited, integrity and safety of the equipment are protected, meanwhile, the state of the equipment is monitored in real time, abnormal conditions are found in advance, and corresponding measures are taken.
Background monitoring center principle:
and the background monitoring center receives the data uploaded by the access control verification subsystem and the equipment locking subsystem, and processes and analyzes the data.
The monitoring center sends feedback information to the access verification subsystem to inform the verification result, such as opening or refusing access permission.
Meanwhile, the monitoring center is also communicated with the equipment locking subsystem to send equipment unlocking information, so that legal personnel can unlock the equipment.
The monitoring center is also responsible for alarming abnormal data of the non-maintenance substation equipment and timely informing related personnel to handle abnormal conditions.
The effect is as follows: through centralized data processing and feedback, the monitoring center can rapidly respond and process verification results, equipment operation states and abnormal conditions, and the safety and monitoring effect of the system are improved.
In summary, the substation unattended monitoring system realizes the verification of the identity of the entrant, the operation locking and monitoring of the equipment and the alarm of abnormal conditions through the cooperative work of the access control verification, the equipment locking and the background monitoring center. Such a system architecture may improve the security of the substation, the protection of the equipment and the operational efficiency. Through the access control verification subsystem, only legal maintenance personnel can enter the transformer substation, and the entry of unauthorized personnel and potential safety hazards are prevented. The equipment locking subsystem ensures that only authorized servicers can operate the equipment, avoiding misoperation and potential equipment damage risks of non-servicers. The background monitoring center processes and analyzes the data, timely feeds back verification results, equipment operation states and abnormal conditions, so that the problems can be rapidly processed and solved, and the protection and operation efficiency of the equipment are improved.
By application of the system, the following effects can be achieved:
and (3) safety is improved: the legal identity verification and equipment operation locking mechanism ensures that only authorized personnel can enter the substation and the operation equipment, and prevents the entry of unauthorized personnel and potential security risks.
And (3) protecting equipment: the equipment locking mechanism limits the operation of equipment by non-maintenance personnel, avoids the risks of misoperation and equipment damage, and protects the integrity and reliability of the equipment.
The operation efficiency is improved: the system monitors the state of the equipment in real time, discovers abnormal conditions in time, can rapidly process and solve the problems, and improves the running efficiency and reliability of the equipment.
And (3) abnormal alarm: the monitoring center alarms abnormal data of non-maintenance equipment, and timely informs related personnel to process the abnormal data, so that potential faults and losses are reduced.
In summary, the unattended monitoring system of the transformer substation realizes the verification of the identity of an entering person, the operation locking and monitoring of equipment and the alarming of abnormal conditions through the cooperative work of the access control verification, the equipment locking and the background monitoring center, thereby improving the safety of the transformer substation, the protection of the equipment and the operation efficiency.
Specifically, the access verification subsystem includes:
The information acquisition module is used for acquiring identity information data of an entering person and generating the identity information data;
the access control wireless communication module is used for carrying out wireless information interaction with the background monitoring center;
and the entrance guard control module is used for executing the opening work of the entrance guard according to the feedback information of the background monitoring center.
The information acquisition module is used for completing the acquisition of identity information, the information acquisition module interacts with the background monitoring center through the access control wireless communication module, and the access control module is used for executing the opening work of the access control according to feedback information sent by the background monitoring center. By verifying the identity information of the entrant, the entrance of non-substation staff is avoided.
The components and the working principle of the access control verification subsystem are as follows:
and the information acquisition module is used for: the information acquisition module is responsible for acquiring identity information of an entering person and generating identity information data. The method can acquire the identity information of the entrant through face recognition, fingerprint recognition or staff pass cards and the like, and convert the identity information into a recognizable data form.
Entrance guard wireless communication module: the access control wireless communication module is used for carrying out wireless information interaction with the background monitoring center. The method establishes connection with the background monitoring center through a wireless communication technology (such as Wi-Fi, bluetooth and the like), sends acquired identity information data to the background monitoring center, and receives feedback information of the background monitoring center.
The access control module: and the entrance guard control module executes the opening work of the entrance guard according to the feedback information of the background monitoring center. The method receives the instruction sent by the background monitoring center, controls the on-off state of the access control system according to the instruction, and ensures that only personnel subjected to identity verification can enter the transformer substation.
The implementation mode of the access control verification subsystem is as follows:
and an information acquisition module is arranged at the entrance of the transformer substation and used for acquiring identity information of the entering person.
The information acquisition module transmits the acquired identity information data to the background monitoring center through the access control wireless communication module.
The background monitoring center verifies and processes the received identity information data, and generates feedback information according to the verification result.
The background monitoring center sends feedback information to the access control module through the access control wireless communication module.
And the entrance guard control module executes the opening work of the entrance guard according to the feedback information of the background monitoring center, and allows the personnel with legal identity to enter the transformer substation.
Through the steps, the entrance guard verification subsystem can collect and verify the identity of the entrant, and the on-off state of the entrance guard system is controlled according to the feedback information of the background monitoring center. In this way, it is ensured that only personnel with identity verification can enter the substation, avoiding the entry of unauthorized personnel and potential security risks.
Specifically, the device locking subsystem includes:
the equipment monitoring module monitors the working state of the substation equipment and generates equipment monitoring data;
the equipment wireless communication module is used for carrying out wireless information interaction with the background monitoring center;
and the equipment locking module is used for operating and locking the substation equipment and unlocking the corresponding substation equipment according to unlocking information of the background monitoring center.
Recording the current working state of the transformer substation equipment when the equipment monitoring module is started, and monitoring for a long time by taking the current working state as a standard, wherein the specific monitoring time is consistent with the time of an entering person in the transformer substation, and when the entering person enters or leaves the transformer substation equipment monitoring module, the working of the entering person is started or stopped along with the entering person; the device wireless communication module is used for carrying out interaction of data information with the background monitoring center, and when an entering person enters or leaves the transformer substation, the background monitoring center sends corresponding start-stop working instruction information to the device wireless communication module; the equipment locking module performs operation locking on the substation equipment under the condition that unlocking information is not received, related setting or operation behaviors cannot be performed manually, the equipment locking module can be a program setting mode with invalid operation in practical application, and can also be a mode for physically locking the substation equipment, and the purpose of the two modes is to achieve the purpose that the substation equipment cannot be normally operated.
The components and working principle of the equipment locking subsystem are as follows:
and the equipment monitoring module: the equipment monitoring module is responsible for monitoring the working state of the substation equipment and generating equipment monitoring data. The device can monitor the working state, the operation parameters and the like of the equipment and record the current working state as a reference standard.
Device wireless communication module: the equipment wireless communication module is used for carrying out wireless information interaction with the background monitoring center. The method establishes connection with the background monitoring center through a wireless communication technology, sends equipment monitoring data to the background monitoring center, and receives instruction information of the background monitoring center.
And a device locking module: the equipment locking module is used for operating and locking the substation equipment and unlocking the corresponding substation equipment according to unlocking information of the background monitoring center. The locking state of the equipment can be controlled according to the received instruction information, so that unauthorized personnel can not operate the equipment.
The embodiment of the device locking subsystem is as follows:
the equipment monitoring module records the current working state of the transformer substation equipment when the transformer substation equipment is started, continuously monitors the working state of the equipment, and keeps the monitoring time consistent with the time of an entering person in the transformer substation.
The equipment wireless communication module sends the equipment monitoring data to the background monitoring center in a wireless communication mode, and receives instruction information sent by the background monitoring center.
The background monitoring center analyzes and processes the received equipment monitoring data and sends corresponding instruction information for starting or stopping work according to the needs.
And the equipment locking module is used for operating and locking the substation equipment under the condition that unlocking information is not received, so that unauthorized personnel are prevented from setting or operating the equipment.
The equipment locking module can adopt a program setting mode or a physical locking mode in practical application so as to ensure that the substation equipment cannot be normally operated.
Through the steps, the equipment locking subsystem can monitor the working state of the substation equipment, and lock and unlock the equipment according to the instruction information of the background monitoring center. Thus, unauthorized personnel can be prevented from operating the equipment, and the safety and the integrity of the equipment are protected.
Specifically, the device monitoring module is internally provided with a unique identification code, the background monitoring center pre-stores the unique identification codes of all the device monitoring modules and the position information data of the monitored substation devices, the background monitoring center identifies the device locking subsystem through the unique identification codes and determines the position information of the monitored substation devices,
Wherein each equipment locking subsystem is respectively matched with one transformer substation equipment.
The unique identification code is a 64-bit code in practical application, and is matched through a background monitoring center, so that when a certain transformer substation equipment is abnormal, the unique identification code can be accurately positioned, and a worker can make corresponding measures in time.
The device monitoring module is internally provided with unique identification codes, and the background monitoring center pre-stores the unique identification codes of all the device monitoring modules and the position information data of the monitored substation devices, so that the identification of the device locking subsystem and the determination of the position information of the corresponding substation devices can be realized.
The specific implementation mode is as follows:
the equipment monitoring module is internally provided with a unique identification code: each equipment monitoring module is provided with a unique identification code for distinguishing different equipment monitoring modules. This code may be a unique string or number of 64 bits in length to ensure uniqueness.
The background monitoring center stores coding and position information data: the background monitoring center pre-stores unique identification codes of all equipment monitoring modules and position information data of monitored substation equipment. These data may be stored in a background database for subsequent identification and localization.
Matching and positioning of unique identification codes: when the equipment locking subsystem communicates with the background monitoring center, the equipment locking subsystem can send the unique identification code of the equipment locking subsystem to the background monitoring center. And the background monitoring center matches the received identification codes according to the pre-stored data and determines the position information of the monitored substation equipment.
Through the steps, the background monitoring center can accurately identify the equipment locking subsystem and determine the position information of the monitored substation equipment. Therefore, when abnormality or alarm occurs, the background monitoring center can accurately position the specific position of the problem equipment according to the unique identification code of the equipment, so that staff can timely take corresponding measures.
The principle of the mode is that the corresponding relation between the equipment and the background monitoring center is established through the unique identification code, so that the accurate identification and the positioning of the equipment are realized. The method can improve the accuracy and the response speed of equipment monitoring, ensure that proper measures can be quickly taken when abnormal conditions occur, and ensure the safe and stable operation of substation equipment.
Specifically, the monitoring system further comprises an access terminal, and the access terminal is used for uploading reservation identity information data, maintenance substation equipment number data and access time interval data to the background monitoring center.
The access terminal can be an intelligent electronic device such as a mobile phone or a fixed terminal, in practical application, an access reservation of a related transformer substation is required to be initiated on the access terminal by an access person, the access reservation comprises reservation identity information data of the access person, maintenance transformer substation equipment number data required to be operated during access and access time interval data, the system only opens preset information content, the corresponding access control can be released in a specified time interval, and the specified identity access person can be unlocked through verification and specified maintenance transformer substation equipment.
The access terminal is an important component in the monitoring system and is used for uploading reservation identity information data, maintenance substation equipment number data and access time interval data to the background monitoring center.
The specific implementation mode is as follows:
uploading function of the access terminal: the access terminal can be intelligent electronic equipment such as a smart phone or a fixed terminal, and the access terminal can upload reservation identity information data, maintenance substation equipment number data needing to be operated and access time interval data to the background monitoring center. Such data may be uploaded by means of an application or web page, etc.
Reservation operation of the entrant: in practical application, an entering person needs to initiate an entering reservation of a relevant transformer substation on an entering person terminal. The entrant fills in the identity information of the reservation, selects the number of the maintenance substation equipment needing to be operated and enters the time interval. The system can verify and match preset information content, ensure that only the entrants with specified identities are in a specified time interval, and only specified maintenance substation equipment can be operated.
And (3) processing by a background monitoring center: and the background monitoring center receives and processes the reservation information uploaded by the terminal of the entering person. It will verify the identity information of the subscription, check the legitimacy of the selected device number, and communicate with the device locking subsystem to unlock the corresponding device. Only if the verification is passed, the background monitoring center sends feedback information to the terminal of the entering person, and the entering person is allowed to enter the transformer substation in a specified time interval.
Through the steps, the terminal of the entering person realizes the functions of uploading reservation identity information data, maintaining substation equipment number data and entering time interval data to the background monitoring center. In this way, the system can accurately control the identity verification and equipment locking of the entrant, ensure that only the appointed identity entrant in the reserved time interval can pass the verification and release the locking of the corresponding equipment.
The principle of the mode is that the verification and the matching of reservation identity information and equipment numbers are realized through the information interaction between the terminal of the entering person and a background monitoring center, so that only the entering person with legal identity can enter the transformer substation and the locking of corresponding equipment is released. The method improves the accuracy of the identity of the entrant and the control capability of the system on the equipment, thereby ensuring the safe operation of the transformer substation and the protection of the equipment.
Specifically, the background monitoring center includes:
the background wireless communication module is used for carrying out wireless information interaction with the access control verification subsystem, the equipment locking subsystem and the access terminal;
the memory is used for storing unique identification codes of all equipment locking subsystems in the transformer substation;
the data processing module is used for sending feedback information to the entrance guard verification subsystem according to the data information uploaded by the entrance terminal by the main control module; transmitting unlocking information to the equipment locking subsystem; the device locking subsystem is used for identifying the device locking subsystem and judging whether the device monitoring data are abnormal or not;
and the alarm module alarms according to the abnormal result judged by the data processing module.
The data processing module processes and stores the uploaded information, the comparison processing of the uploaded data is realized through the data processing module, and the traditional manual verification is replaced by adopting a system automatic verification mode, so that the manpower resource requirement is reduced.
The background monitoring center is a core component of the substation unmanned guard monitoring system and comprises a background wireless communication module, a memory, a data processing module and an alarm module.
The specific implementation mode is as follows:
background wireless communication module: and the background wireless communication module performs wireless information interaction with the access control verification subsystem, the equipment locking subsystem and the access terminal. It is responsible for receiving and transmitting relevant information and ensuring smooth communication between the subsystems.
A memory: the memory is used for storing unique identification codes of all equipment locking subsystems in the transformer substation. These codes are used to identify the device locking subsystem and match the device location information to enable accurate localization of the problem device in the event of an anomaly.
And a data processing module: the data processing module is a main control module of the background monitoring center and processes according to the data information uploaded by the terminal of the entering person. The system sends feedback information to the access control verification subsystem to confirm the identity verification result of the entering person. At the same time, it sends unlocking information to the device locking subsystem, indicating unlocking of the corresponding device. In addition, the data processing module is also responsible for identifying the equipment locking subsystem and judging whether the equipment monitoring data has abnormality or not.
And an alarm module: and the alarm module alarms according to the judgment result of the data processing module. If the conditions such as abnormal monitoring data or identity verification failure of the equipment are found, the alarm module triggers corresponding alarms so as to take measures in time for processing.
The background monitoring center can receive, process and store information from each subsystem and the terminal of the entrant through the cooperative work of the background wireless communication module, the memory, the data processing module and the alarm module. The method can compare and process the uploaded data, and replaces the traditional manual verification by adopting a system automatic verification mode, so that the requirement on human resources is reduced.
The principle of the mode is that the background monitoring center is used as a center for data processing and control, so that information interaction and processing of the access control verification subsystem, the equipment locking subsystem and the access terminal are realized. The method can improve the efficiency and accuracy of data processing, give an alarm in time to process abnormal conditions, and ensure the safe operation of substation equipment and the timely processing of the abnormal conditions.
Specifically, the data processing module matches the identity information data uploaded by the entrance guard verification subsystem and the time data uploaded by the entrance guard verification subsystem according to the reserved identity information data and the entering time interval data uploaded by the entrance guard terminal, and if the matching is successful, the data processing module sends feedback information to the entrance guard verification subsystem; if the match fails, not as a result,
The entrance guard verification subsystem can trigger the entrance guard of the entrance guard verification subsystem to open according to the feedback information.
The data processing module firstly judges whether the time data corresponding to the entry time interval data and the uploaded identity information data are matched or not, if the time data are not in the pre-designated entry time interval range, the data processing module judges that the matching is failed, when judging that the time data corresponding to the identity information data are in the pre-designated entry time interval range, the data processing module further matches the identity information data with the reserved identity information data, and if judging that the data are matched, the data processing module sends feedback information; if the failure occurs, the failure is not taken as the result.
The data processing module is used for matching the reservation identity information data and the entry time interval data uploaded by the entry terminal, and the identity information data and the uploaded time data uploaded by the access verification subsystem. The specific implementation mode is as follows:
data matching: the data processing module firstly judges whether the time data corresponding to the time interval entering data and the uploaded identity information data are matched or not. If the entering time interval data is not in the pre-designated time range, namely does not accord with the specified entering time period, the matching is failed and is not used.
Identity information matching: if the time data corresponding to the uploaded identity information data in the time interval is in a pre-designated time range, the data processing module further matches the identity information data with the reserved identity information data. If the identity information data and the reserved identity information data are successfully matched, namely the identity verification is passed, the data processing module sends feedback information to the access verification subsystem.
The feedback information triggers the entrance guard: and the entrance guard verification subsystem triggers the opening work of the entrance guard according to the feedback information sent by the data processing module. If the identity verification is passed, the access verification subsystem performs an access opening operation, and allows an entering person to enter the transformer substation.
The principle of the method is that the data processing module is used for matching and verifying the data uploaded by the access control verification subsystem and the access terminal, so that the access terminal is ensured to meet the requirements of reservation identity and access time. If the matching is successful, namely the identity information and time of the entering person meet the requirements, the data processing module sends feedback information to the entrance guard verification subsystem to trigger the opening work of the entrance guard. Therefore, only authenticated personnel can enter the transformer substation within a specified time, and safety and accuracy are improved.
Through the mode, the data processing module can timely verify the identity and time of the entrant, so that only people meeting the conditions can enter the transformer substation, and the effect and accuracy of access control verification are improved. Meanwhile, the load of the access control verification subsystem is reduced by the mode, so that the access control verification subsystem only needs to execute the operation of opening the access control, and the response speed and the working efficiency of the system are improved.
Specifically, the data processing module sends unlocking information to the corresponding equipment locking subsystem according to the maintenance substation equipment number data uploaded by the access terminal, wherein after the access verification subsystem triggers the access opening work, the background monitoring center sends the unlocking information.
The data processing module only unlocks the substation equipment corresponding to the pre-uploaded maintenance substation equipment number, that is, the substation equipment with the pre-assigned equipment number can be operated, and other equipment is locked, so that the phenomenon that other substation equipment is operated under the condition that maintenance personnel cannot find the equipment, and the stable operation of the substation equipment is affected is avoided.
And the data processing module is matched with the equipment number uploaded in advance according to the maintenance substation equipment number data uploaded by the access terminal. The specific implementation mode is as follows:
Data matching: and the data processing module matches the maintenance substation equipment number data uploaded by the access terminal with the equipment number uploaded in advance. The data processing module triggers an unlocking operation only when the service substation equipment number matches the pre-assigned equipment number successfully.
Unlocking information transmission: and after receiving the successfully matched serial number data of the maintenance substation equipment, the background monitoring center sends unlocking information to the corresponding equipment locking subsystem. This means that only the substation equipment corresponding to the pre-assigned equipment number can be unlocked, and the other equipment is still in a locked state.
Device locking: and the equipment locking module is used for operating and locking all substation equipment with equipment numbers which are not pre-designated under the condition that the unlocking information is not received. In this way, only substation equipment matched with the pre-designated equipment number can be unlocked, and other equipment cannot perform relevant setting or operation behaviors.
In this way, the data processing module only performs unlocking operation on the pre-designated equipment number according to the maintenance substation equipment number data uploaded by the access terminal. Therefore, the operation of other substation equipment can be avoided under the condition that the maintenance personnel cannot perceive, and the stable operation and the safety of the substation equipment are ensured.
The principle of the method is that the data processing module is used for matching and verifying the number data of the maintenance substation equipment, and only the equipment number which is successfully matched can trigger the transmission of unlocking information, so that only the substation equipment with the pre-designated equipment number can operate. Therefore, unauthorized operation of equipment by non-maintenance personnel can be effectively prevented, and stable operation of substation equipment is ensured.
Specifically, after the entrance guard verification subsystem executes entrance guard opening work, the equipment locking subsystem synchronously starts to monitor the working state of the non-maintenance substation equipment, the equipment locking subsystem records the working state of the non-maintenance substation equipment at the initial time and continuously uploads equipment monitoring data in real time, and the background monitoring center identifies the equipment monitoring data and alarms after abnormal work setting is identified.
In order to reduce unnecessary data generated by the equipment locking subsystem under the condition of not manually entering the transformer substation, the data processing burden of a background monitoring center is increased, the working state of transformer substation equipment is monitored only after an entering person enters the transformer substation, and the transformer substation is required to be monitored.
After the access control verification subsystem executes the access control opening work, the equipment locking subsystem starts to monitor the working state of the non-maintenance substation equipment, and the specific implementation mode is as follows:
initial state record: and after the access control verification subsystem triggers the access control opening work, the equipment locking subsystem records the initial working state of the non-maintenance substation equipment. These initial states include operating parameters of the device, operating conditions, etc.
Uploading real-time data: the equipment locking subsystem continuously uploads the equipment monitoring data to the background monitoring center in real time. These data reflect the operating state changes of the non-maintenance substation equipment.
Abnormality identification and alarm: the background monitoring center identifies and analyzes the equipment monitoring data, and when abnormal working state setting is identified, an alarm mechanism is triggered. These anomalies may include equipment failure, abnormal operation, and the like.
In order to reduce unnecessary data volume and background processing burden, the working state of the substation equipment is monitored only after entering the transformer substation equipment. This means that real-time monitoring data of the device is only recorded and uploaded when an entry into the substation is made. Furthermore, the present solution is mainly concerned with monitoring of the entrances, since the substations are often already equipped with conventional equipment monitoring systems, which are already capable of performing the necessary monitoring of the environment and the operating state of the substation equipment.
The principle of the scheme is that the working state of non-maintenance substation equipment is monitored in real time through the equipment locking subsystem, and data is uploaded to a background monitoring center for analysis and identification. Therefore, abnormal working states can be found in time, an alarm mechanism is triggered, and safe operation of substation equipment is ensured.
The specific implementation mode is that the equipment locking subsystem records the initial state and continuously uploads real-time data, and the background monitoring center analyzes and abnormally identifies the data to realize monitoring of non-maintenance substation equipment. The scheme has the effects of improving the monitoring capability of the working state of the transformer substation equipment, ensuring the stable operation of the equipment, and alarming in time when abnormality occurs so as to ensure the safety of the transformer substation.
Specifically, the access control verification subsystem is also used for collecting the leaving information of the entrant and uploading the leaving information to a background processing center for storage, the background processing center sends the full-member locking information to the equipment locking subsystem, and all the equipment locking subsystems are restored to the operation locking state of the substation equipment.
The entrance guard verification subsystem collects corresponding leaving information when an entering person leaves, the entrance guard verification subsystem uploads data, locking information is sent to the equipment locking subsystem through the background processing center, all transformer substation equipment is locked again, and the transformer substation equipment waits for the next opening.
The entrance guard verification subsystem collects corresponding leaving information when an entering person leaves, uploads the information to the background processing center for storage, and triggers subsequent operation, and the specific implementation mode is as follows:
leaving information collection: the entrance guard verification subsystem collects corresponding departure information, such as departure time, departure position and the like, when an entering person leaves the substation.
Uploading and storing data: and the access control verification subsystem uploads the collected leaving information to a background processing center for storage and processing. The background processing center will correlate and analyze this information with other data.
And (3) sending locking information: the background processing center sends full-member locking information to the device locking subsystem. This means that all the device locking subsystems will receive this information and, on command, lock the substation devices again, i.e. restore all the devices to the locked state.
Through the mode, the access control verification subsystem can collect corresponding leaving information when an entering person leaves, and upload the information to a background processing center for storage and subsequent operation. And the background processing center sends full-member locking information to the equipment locking subsystem according to the collected information, so that all the equipment is ensured to be in an operation locking state and wait for the next opening.
The principle of the scheme is that the exit information is collected through the access verification subsystem and uploaded to the background processing center, and the background processing center triggers the whole person locking operation according to the information. This ensures that after the entry leaves, all devices are re-locked to prevent unauthorized operation.
The specific implementation mode is that the entrance guard verification subsystem collects and uploads leaving information when an entering person leaves, and the background processing center sends a locking instruction to the equipment locking subsystem according to the collected information, so that full-member locking of substation equipment is achieved. The scheme has the effects that all equipment is in an operation locking state under the condition that no entrant exists, and the safety and stability of substation equipment are guaranteed.
The unattended monitoring system of the transformer substation based on the invention further comprises the following components in practical application:
multiple identity verification: other identity verification technologies, such as iris recognition, voiceprint recognition and the like, are introduced besides the conventional modes of face recognition, fingerprint recognition or employee pass cards and the like, so that the accuracy and the safety of identity verification are improved.
Intelligent perception technology: intelligent sensing technology such as cameras, sound sensors and the like is introduced to monitor the internal environment of the transformer substation in real time. When abnormal conditions such as unauthorized entrances, equipment damage and the like are detected, the system can give an alarm in time and automatically take corresponding safety measures.
Intelligent early warning and decision support: and through data analysis and machine learning algorithms, substation operation data, entering person behavior data and environment data are monitored and analyzed in real time, potential safety risks are predicted, and decision support is provided. The system can automatically adjust the early warning level according to the change trend and abnormal condition of the data and provide corresponding advice and guidance for staff.
Innovation of wireless communication technology: and by utilizing a wireless communication technology, such as the Internet of things, 5G and the like, the high-efficiency communication and data sharing among all subsystems in the transformer substation are realized, and the response speed and the reliability of the system are improved. Meanwhile, the introduction of cloud computing, edge computing and other technologies can be considered, partial data processing and decision pushing to the edge equipment can be realized, and dependence on a background processing center is reduced.
Further enhancing data security: in the system design, the security of identity information, equipment data and communication data is protected by adopting an encryption technology, so that the credibility and the protection capability of the system are ensured. Meanwhile, a perfect access authority management mechanism is established, so that only authorized personnel can acquire and operate related data and equipment.
Strengthening remote monitoring capability: and the remote real-time monitoring and operation of the internal condition of the transformer substation are realized by using modern remote monitoring technologies, such as a video monitoring system and a remote operation control system. The monitoring center can remotely access the video picture and the equipment state of the transformer substation through a network, and timely discover and process abnormal conditions.
Through the content, the unattended monitoring system of the transformer substation can be more perfect and efficient. The innovative measures further improve the safety, reliability and intelligence level of the system, and realize comprehensive monitoring and management of the transformer substation environment and equipment. In particular, these measures may bring about the following effects:
strengthening safety protection: through multiple identity verification and intelligent perception technologies, the system can accurately identify the identity of an entering person and timely discover abnormal behaviors. Meanwhile, through the cooperation of the equipment locking subsystem and the equipment monitoring module, the working state of the substation equipment can be monitored in real time, safety risks such as equipment faults and abnormal operation can be found in time, and corresponding measures are taken to solve the problems.
And the working efficiency is improved: by adopting an automatic identity verification and equipment operation locking mechanism, the requirement of manual intervention is reduced, and the manpower resource and time cost are saved. Meanwhile, through analysis and decision support of the data processing module, the staff can arrange maintenance work more scientifically, and the working efficiency and maintenance quality are improved.
Real-time monitoring and early warning: through real-time data acquisition and processing, the system can comprehensively monitor the working states of the transformer substation environment and equipment. Once an abnormal situation is found, such as unauthorized access, equipment damage and the like, the system immediately sends out an early warning signal and sends alarm information to related personnel so as to take countermeasures in time and ensure the safe operation of the transformer substation.
Data analysis and optimization: through the data processing module of the background monitoring center, a large amount of data is analyzed and mined, and potential problems and optimization opportunities can be found. The system can collect and analyze behavior data, equipment working data and the like of the entrant, and provides more comprehensive reference and decision basis for operation management of the transformer substation.
Remote monitoring and operation: by introducing remote monitoring and operation technology, a worker can remotely access real-time data and video pictures of the transformer substation at any time, and can comprehensively monitor and operate the transformer substation wherever the worker is. The monitoring center personnel can timely respond and process various problems, and the remote management capability of the transformer substation is improved.
In a word, through these measures, the unmanned guard monitoring system of the transformer substation can realize comprehensive monitoring, safety protection and remote management to the environment and equipment of the transformer substation, improve the operation efficiency and safety of the transformer substation, provide better working conditions and decision support for the staff, and ensure the stable operation of the transformer substation.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.

Claims (10)

1. Unmanned personnel monitored control system of transformer substation, its characterized in that includes:
the entrance guard verification subsystem is used for collecting and uploading identity information data of a transformer substation entering person and executing entrance guard opening work;
The equipment locking subsystem is used for operating and locking the transformer substation equipment, monitoring the working state of the transformer substation equipment during the period that an entering person enters the transformer substation, generating equipment monitoring data and uploading the equipment monitoring data;
the background monitoring center receives and processes the data uploaded by the access control verification subsystem and the equipment locking subsystem; the access control verification subsystem is used for sending feedback information to the access control verification subsystem; the device locking subsystem is used for sending device unlocking information to the device locking subsystem; and the alarm device is used for alarming abnormal data of the non-maintenance substation equipment.
2. The substation unmanned attendant monitoring system of claim 1, wherein the access verification subsystem comprises:
the information acquisition module is used for acquiring identity information data of an entering person and generating the identity information data;
the access control wireless communication module is used for carrying out wireless information interaction with the background monitoring center;
and the entrance guard control module is used for executing the opening work of the entrance guard according to the feedback information of the background monitoring center.
3. The unmanned substation personnel monitoring system of claim 1, wherein the equipment locking subsystem comprises:
The equipment monitoring module monitors working states of substation equipment and generates equipment monitoring data;
the equipment wireless communication module is used for carrying out wireless information interaction with the background monitoring center;
and the equipment locking module is used for operating and locking the substation equipment and unlocking the corresponding substation equipment according to unlocking information of the background monitoring center.
4. The unattended operation personnel monitoring system of a transformer substation according to claim 3, wherein the equipment monitoring module is internally provided with a unique identification code, the background monitoring center pre-stores the unique identification codes of all the equipment monitoring modules and the position information data of the monitored transformer substation equipment, the background monitoring center identifies the equipment locking subsystem through the unique identification codes and determines the monitored transformer substation equipment position information,
wherein each equipment locking subsystem is respectively matched with one transformer substation equipment.
5. The unmanned substation personnel monitoring system of claim 4, further comprising an ingress terminal for uploading reservation identity information data, maintenance substation equipment number data, and ingress time interval data to the background monitoring center.
6. The unmanned substation personnel monitoring system of claim 5, wherein the background monitoring center comprises:
the background wireless communication module is used for carrying out wireless information interaction with the access control verification subsystem, the equipment locking subsystem and the access terminal;
the storage is used for storing unique identification codes of all equipment locking subsystems in the transformer substation;
the data processing module is used for sending feedback information to the access control verification subsystem according to the data information uploaded by the access control terminal; transmitting unlocking information to the equipment locking subsystem; the device locking subsystem is used for identifying the device locking subsystem and judging whether the device monitoring data are abnormal or not;
and the alarm module alarms according to the abnormal result judged by the data processing module.
7. The unattended operation personnel monitoring system of a transformer substation according to claim 6, wherein the data processing module matches the identity information data uploaded by the entrance guard verification subsystem and the time data uploaded by the entrance guard verification subsystem according to the reservation identity information data and the entering time interval data uploaded by the entrance guard terminal, and if the matching is successful, the data processing module sends feedback information to the entrance guard verification subsystem; if the match fails, not as a result,
The entrance guard verification subsystem can trigger the opening work of the entrance guard verification subsystem according to the feedback information.
8. The unattended operation personnel monitoring system of the transformer substation according to claim 6, wherein the data processing module sends unlocking information to the corresponding equipment locking subsystem according to maintenance transformer substation equipment number data uploaded by the access terminal, and the background monitoring center sends the unlocking information after the access verification subsystem triggers the access opening operation.
9. The unattended operation personnel monitoring system of a transformer substation according to claim 1, wherein after the entrance guard verification subsystem executes entrance guard opening work, the equipment locking subsystem synchronously starts to monitor the working state of non-maintenance transformer substation equipment, the equipment locking subsystem records the working state of the non-maintenance transformer substation equipment at the initial time and continuously uploads equipment monitoring data in real time, and the background monitoring center identifies the equipment monitoring data and alarms after abnormal working setting is identified.
10. The unattended substation personnel monitoring system according to claim 1, wherein the access verification subsystem is further configured to collect departure information of an entering person and upload the departure information to a background processing center for storage, the background processing center sends full-personnel locking information to the equipment locking subsystem, and all the equipment locking subsystems are restored to an operation locking state for substation equipment.
CN202310548592.XA 2023-05-16 2023-05-16 Unattended personnel monitoring system of transformer substation Pending CN116503984A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310548592.XA CN116503984A (en) 2023-05-16 2023-05-16 Unattended personnel monitoring system of transformer substation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310548592.XA CN116503984A (en) 2023-05-16 2023-05-16 Unattended personnel monitoring system of transformer substation

Publications (1)

Publication Number Publication Date
CN116503984A true CN116503984A (en) 2023-07-28

Family

ID=87320145

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310548592.XA Pending CN116503984A (en) 2023-05-16 2023-05-16 Unattended personnel monitoring system of transformer substation

Country Status (1)

Country Link
CN (1) CN116503984A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117148802A (en) * 2023-10-27 2023-12-01 广州汇通国信科技有限公司 Unmanned workshop intelligent supervision system of power plant based on artificial intelligence

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117148802A (en) * 2023-10-27 2023-12-01 广州汇通国信科技有限公司 Unmanned workshop intelligent supervision system of power plant based on artificial intelligence
CN117148802B (en) * 2023-10-27 2024-03-22 广州汇通国信科技有限公司 Unmanned workshop intelligent supervision system of power plant based on artificial intelligence

Similar Documents

Publication Publication Date Title
CN202018687U (en) Unattended system for coffer
CN116503984A (en) Unattended personnel monitoring system of transformer substation
CN105405186A (en) Security and protection management method and security and protection management device
US9355278B2 (en) Server chassis physical security enforcement
CN113506394B (en) Remote permission system and remote permission method based on substation operation control
KR101850682B1 (en) Integrated access control system based on video analysis
CN116506579A (en) Data server monitoring method and monitoring system
CN112381435A (en) Gridding directional pushing management method for dynamic risk in hydropower station operation process
CN103443008B (en) There is the entrance watch-dog of at least one image unit
KR101134454B1 (en) System for preventing disaster of construction in the field
US20200050757A1 (en) Action monitoring apparatus, system, and method
WO2023116250A1 (en) Vehicle maintenance method and system
CN112287313A (en) Device authentication system and method
CN114553474B (en) Access control permission control method and device based on Internet of things
CN112991600B (en) Method, device, system and equipment for enabling vehicle to leave parking lot
CN114142383B (en) Misoperation preventing method in distribution network process
KR101576242B1 (en) Security management system and method for server accessible by temporarily authorized worker
WO2016147177A1 (en) System and method for managing identity information stored in a cloud server
JP3630455B2 (en) Centralized monitoring system, terminal device and coping card
EP3649584A1 (en) Method for verifying an operator in a security system
KR20030008895A (en) Entrance management system and method thereof
JP2009009397A (en) User authentication system
CN112015158B (en) Vehicle gateway control system and method and vehicle
JP2022137959A (en) Entrance monitoring device, entrance monitoring system and entrance monitoring program
CN117914889A (en) Safety protection system and method for energy isolation operation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination