CN111680978A - Unlocking key authorization method, using method and returning method - Google Patents

Unlocking key authorization method, using method and returning method Download PDF

Info

Publication number
CN111680978A
CN111680978A CN202010498897.0A CN202010498897A CN111680978A CN 111680978 A CN111680978 A CN 111680978A CN 202010498897 A CN202010498897 A CN 202010498897A CN 111680978 A CN111680978 A CN 111680978A
Authority
CN
China
Prior art keywords
unlocking
key
information
authorization
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010498897.0A
Other languages
Chinese (zh)
Inventor
王靖晖
黄建林
王慧强
黄爱军
靳彩云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changyuan Contron Power Security Technology Co Ltd
Original Assignee
Changyuan Contron Power Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changyuan Contron Power Security Technology Co Ltd filed Critical Changyuan Contron Power Security Technology Co Ltd
Priority to CN202010498897.0A priority Critical patent/CN111680978A/en
Publication of CN111680978A publication Critical patent/CN111680978A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Tourism & Hospitality (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Water Supply & Treatment (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an unlocking key authorization method, a using method and a returning method; the unlocking key authorization method comprises the following steps: s11, filling in an unlocking key authorization application content on the key management machine, and then entering an unlocking key authorization application channel from the key management machine through the mobile terminal; s12, performing monitoring confirmation at the mobile terminal; s13, submitting the unlocking key authorization application to a cloud server through the mobile terminal; and S14, the cloud server judges whether to carry out key authorization or not by combining the application content. The invention introduces a monitoring confirmation mechanism, adopts on-site confirmation of a guardian, realizes the monitoring confirmation mechanism of authorization application, unlocking use and return of the unlocking key, effectively solves the problems of uncontrollable unlocking key authorization, uncontrolled unlocking use and uncontrollable unlocking record, effectively prevents misoperation, improves the management level of the unlocking key and can ensure safe and stable operation of a power grid.

Description

Unlocking key authorization method, using method and returning method
Technical Field
The invention relates to the field of anti-misoperation locking, in particular to an unlocking key authorization method, an unlocking key use method and an unlocking key return method.
Background
The microcomputer anti-misoperation locking device is one of the most widely applied electrical anti-misoperation measures of the current power system, and plays an important role in guaranteeing the safety production of the power system. Management of the unlocking key is an important work in power supply enterprises, and is related to not only equipment safety of the power enterprises but also personal safety of operators.
Therefore, regulations such as "safety management regulations for preventing electrical misoperation", eighteen major measures against grid accidents ", issued by national grid corporation, and" electrical operation guide "issued by southern grid corporation make clear regulations on the management of unlocking keys: when the unlocking tool (key) is used, corresponding safety measures are taken after the consent of a person in charge of the transformer substation or a long working hour of the power plant (leader of a transformer operation department), and the unlocking tool is used and recorded under the supervision of a specially-assigned person.
In the management of a power grid enterprise, when the error-proof locking device of the microcomputer of the transformer substation breaks down or needs emergency unlocking, the operation can be carried out by using an unlocking key so as to ensure the safe and stable operation of the power grid. The intelligent key management system can accurately record the date and time of the user for taking or returning the unlocking key and the type and reason of the unlocking key, and simplifies the complex workload of manual management work records while standardizing the management level. However, after the field operator obtains the unlocking key through normal authorization, if no guardian supervises the use condition of the unlocking key, phenomena of unlocking field equipment at will, uncontrolled unlocking operation and the like may exist, and meanwhile, no unlocking record exists, so that hidden danger is brought to safe and stable operation of a power grid.
Disclosure of Invention
The first purpose of the invention is to provide an unlocking key authorization method, which solves the problem that the unlocking key authorization cannot be monitored; the first purpose of the invention is realized by adopting the following technical scheme:
an unlock key authorization method, comprising the steps of:
s11, filling in an unlocking key authorization application content on the key management machine, and then entering an unlocking key authorization application channel from the key management machine through the mobile terminal;
s12, the mobile terminal acquires guardian information and judges whether the acquired guardian information has a monitoring authority; if the monitoring authority exists, the next step is carried out; if the monitoring authority does not exist, the step is executed again;
s13, submitting the unlocking key authorization application to a cloud server through the mobile terminal;
s14, the cloud server judges whether to carry out key authorization or not by combining the application content; if the key is authorized, an unlocking key can be obtained from the key management machine; if not, the unlocking key cannot be obtained from the key management machine, and the unlocking key authorization application is ended.
The unlocking key authorization method introduces a guardian monitoring mechanism, and effectively solves the problem that the unlocking key authorization is unsupervised; when an operator wants to provide an unlocking key authorization application, the unlocking key authorization application is sent to the cloud server for key authorization processing only after the guardian confirms authorization, and therefore the problem that the unlocking key authorization supervision is not in place is solved.
Specifically, in step S14, if authorized, the cloud server sends an authorization instruction to the key management machine, and directly obtains an unlocking key from the unlocking key management machine;
or the cloud server sends an authorization code to the key management machine and the mobile terminal, the key management machine judges that the input authorization code is compared with the received authorization code by inputting the authorization code in the key management machine, and if the input authorization code is matched with the received authorization code, an unlocking key can be obtained; if not, the unlocking key cannot be acquired;
or, in step S13, when submitting the request for authorization of the unlock key, the key management machine automatically generates a local authorization code; in step S14, if authorized, the cloud server sends the local authorization code to the mobile terminal, where the authorization code received by the mobile terminal is referred to as a receive authorization code; inputting the receiving authorization code at the key management machine, and judging whether the receiving authorization code is matched with the local authorization code or not by the key management machine, if so, acquiring an unlocking key; if not, the unlocking key cannot be obtained.
Further, step S11 is preceded by a step of registering the key management machine.
In the further technical scheme, an operator needs to log in a key management machine which wants to acquire an unlocking key, and subsequent unlocking key authorization application is carried out after the identity of the operator is confirmed; thereby avoiding other personnel applying for unlocking the key at will.
Specifically, the step of logging in the key management machine specifically includes logging in the key management machine by one or more of swiping a card, biometric identification technology, and a password.
Specifically, step S11 specifically includes filling in the content of an unlocking key authorization application on the key management machine, and then the key management machine generates an application channel carrier, and the mobile terminal enters the channel of the unlocking key authorization application through the application channel carrier.
In a specific embodiment, the application channel carrier in step S11 refers to an application two-dimensional code, and the mobile terminal scans the application two-dimensional code to enter the channel for which the unlocking key authorizes the application.
Specifically, the application content comprises: information of the key management machine, information of the applied unlocking key, application reason, application time and information of the equipment to be unlocked.
Specifically, the step S12 includes the mobile terminal acquiring guardian information through biometric identification technology and/or hardhat image identification, comparing the acquired guardian information with the information of the guardian of the task in a preset guardian database for confirmation, and if the acquired guardian information matches the information of the guardian of the task in the guardian database, determining that the acquired guardian information has the guardian authority of the task, and executing the next step; if the collected guardian information does not match the information in the guardian database, it is determined that the collected guardian information does not have the monitoring authority of the task, and step S12 needs to be executed again.
The second purpose of the invention is to provide an unlocking key using method, which solves the problem that the lock unlocking by using the unlocking key cannot be monitored; the second purpose of the invention is realized by adopting the following technical scheme:
a method of using an unlocking key, comprising the steps of:
s21, acquiring information of the lockset to be unlocked through the mobile terminal;
s22, the mobile terminal confirms whether the lockset is a lockset to be unlocked which is applied in advance, and if so, the next step is carried out; if not, go to step S21;
s23, the mobile terminal acquires guardian information and judges whether the acquired guardian information has the monitoring authority of the task; if the monitoring authority of the task is possessed, the next step is carried out; if the monitoring authority of the task does not exist, the step is executed again;
and S24, unlocking the lock by an unlocking key.
Similarly, the unlocking key using method introduces a guardian monitoring mechanism, and effectively solves the problem that the unlocking of the lock is unsupervised by using the unlocking key; firstly, a guardian is required to arrive at the site, secondly, the guardian confirms whether the lockset to be unlocked is subjected to unlocking application, and only when the lockset is subjected to the unlocking application, the guardian can carry out authorization confirmation; when the guardian confirms the unlocking application, the operator can unlock the lock; therefore, the problem of random unlocking after acquiring the unlocking key is solved.
Further, after the unlocking operation of step S24, performing a confirmation operation on the mobile terminal, and then generating an unlocking record by the mobile terminal;
or after the unlocking operation in step S24, automatically storing an unlocking record in the unlocking key, and transmitting the unlocking record back to the mobile terminal by the smart key.
In the further technical scheme, when the used unlocking key is an emergency unlocking key (such as a mechanical key), since the emergency unlocking key does not have the function of recording the unlocking record, at the moment, if an operator acquires the key, the emergency unlocking key can be unlocked randomly without any unlocking record, so that the use condition of the emergency unlocking key cannot be controlled; according to the further technical scheme, each time the lock is unlocked, an unlocking record is generated on the mobile terminal, and the time of the unlocking record is the time of acquiring guardian information in the step S23.
In the further technical scheme, when the used unlocking key is an intelligent unlocking key, the unlocking key can automatically record an unlocking record once when unlocking of one lockset is executed; when a certain lock is unlocked for multiple times, the unlocking time is the time for unlocking for the first time or the last time (which can be specified by self and generally focuses on the time for unlocking the lock for the first time). Of course, if the unlocking key is the intelligent unlocking key, the unlocking records of the intelligent unlocking key can be manually stored according to each record in an emergency unlocking key mode, and the intelligent unlocking key is only inconvenient to apply.
According to the further technical scheme, the unlocking record can be traced, the management level of the unlocking key can be improved, and the safe and stable operation of the power grid can be guaranteed.
Specifically, step S21 includes scanning, by the mobile terminal, a lock two-dimensional code of the lock on site to obtain information of the lock; or, manually inputting a lock code to the mobile terminal to acquire the information of the lock.
Further, the method further includes the step of sending an unlocking instruction to the unlocking key by the mobile terminal after the step S23 and before the step S24.
When the key is unlocked, the intelligent key can execute unlocking only after acquiring the unlocking instruction through monitoring confirmation, so that misoperation is further prevented.
Specifically, the information of the lock comprises a lock RFID code value and a lock name.
The third purpose of the invention is to provide an unlocking key returning method, which solves the problem that unlocking records are not traceable; the third purpose of the invention is realized by adopting the following technical scheme:
an unlocking key returning method is used for returning the unlocking key after all locks are unlocked by applying the unlocking key using method of the second purpose; the method for returning the unlocking key is characterized by comprising the following steps:
s41, the unlocking record is transmitted back to a cloud service database through the application of the mobile terminal;
s42, the mobile terminal acquires guardian information and judges whether the acquired guardian information has a monitoring authority; if the monitoring authority exists, the next step is carried out; if the monitoring authority does not exist, the step is executed again;
s43, transmitting the unlocking record back to the cloud service database; after receiving the unlocking record, the cloud service database sends feedback information to the key management machine;
s44, the key management machine judges whether the unlocking record of the unlocking key is successfully returned according to the feedback information, and if the unlocking record of the unlocking key is successfully returned, the key is allowed to be returned; and if the return transmission is unsuccessful, alarming.
According to the invention, the returning of the unlocking key is also controlled after the unlocking key is used, so that the key can be returned only after the unlocking record is uploaded successfully, the problem that the unlocking record is not traceable is solved, the occurrence of misoperation is effectively prevented, the management level of the unlocking key can be improved, and the safe and stable operation of a power grid can be ensured; and a guardian monitoring mechanism is introduced, so that the problem of unattended operation of the return unlocking key is effectively solved.
Further, the feedback information includes an unlocking key number;
step S44 specifically includes: the key management machine and the unlocking key acquire the number of the unlocking key to be returned through contactless communication; or, manually inputting an unlocking key number to be returned on the key management machine; or, selecting an unlocking key number to be returned on the key management machine;
the unlocking key management machine judges whether the unlocking key with the number finishes unlocking data return according to the feedback information; if the return is successful, allowing the key to be returned; if the backhaul is not successful, an alarm is raised and step S41 is re-executed.
Drawings
Fig. 1 is a block diagram of a key management system according to an embodiment of the present invention;
fig. 2 is a flowchart of an unlocking key authorization method according to a second embodiment of the present invention;
fig. 3 is a flowchart of a method for using an emergency unlocking key according to a third embodiment of the present invention;
fig. 4 is a flowchart of a method for using a smart key according to a fourth embodiment of the present invention;
fig. 5 is a flowchart of an unlocking key returning method according to a fifth embodiment of the present invention.
Detailed Description
In order to more clearly understand the technical scheme of the invention, the invention is further explained by combining the drawings and the specific embodiments.
It is noted that, unless otherwise indicated, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
Example one
With reference to fig. 1, the present embodiment provides a key management system, which includes a management terminal, a key management machine, an unlocking key, a mobile terminal, a cloud server, and a locking lockset; the cloud server is internally provided with a cloud service database; the unlocking key comprises an intelligent key and an emergency unlocking key; the management terminal, the key management machine, the mobile terminal and the cloud server are connected through a network, the key management machine and the unlocking key are physically connected, the mobile terminal and the intelligent key are connected through wireless communication, and the unlocking key and the locking lockset are physically connected.
The management terminal is in wireless communication with the cloud server and is mainly used for managing and checking data such as users, sites, equipment and records. The key management system is mainly used for generating an unlocking application channel, an unlocking task, unlocking key authorization, unlocking record confirmation, unlocking key management and the like. The unlocking key comprises an emergency unlocking key and an intelligent key, is used for unlocking the field equipment locking lockset and can record unlocking operation and transmit back; the emergency unlocking key can be a mechanical unlocking key and is used for unlocking in an emergency; the intelligent unlocking key can interact with the mobile terminal. The mobile terminal is used for filling in an unlocking application, monitoring identity confirmation, unlocking authorization and the like; of course, in some embodiments, the unlocking request may be filled in on the key management machine. The cloud server provides various service interfaces for the mobile terminal and the key management machine, and the cloud service database is used for storing all relevant data of the system such as users, equipment and records, and comprises a special database for user identity confirmation. Lockout locks are used to force lockout of a field device having a unique identification code therein.
Example two
With reference to the first embodiment and fig. 2, the present embodiment provides an unlocking key authorization method, including the following steps:
s10: the operator logs in the key manager.
Specifically, the operator logs in the key management machine through one or more modes of card swiping, biometric identification technology and passwords.
And S11, filling the content of the unlocking key authorization application on the key management machine, and then entering a channel of the unlocking key authorization application from the key management machine through the mobile terminal.
Specifically, an operator proposes an unlocking key authorization application in the key management machine and fills the unlocking key authorization application, then the key management machine generates an application two-dimensional code, and the application two-dimensional code is scanned by a mobile terminal to enter an unlocking key authorization application channel; wherein, the application content of the application of the unlocking key authorization comprises: information of a key management machine, information of an unlocking key, application reason, application time and information of equipment to be unlocked.
S12, the mobile terminal acquires guardian information and judges whether the acquired guardian information has a monitoring authority; if the monitoring authority exists, the next step is carried out; if the monitoring authority is not available, the step is executed again.
Specifically, the mobile terminal acquires guardian information through a biological identification technology and/or a safety helmet image identification, compares the information with information in a preset guardian database for confirmation, and judges that the acquired guardian information has a monitoring authority if the acquired guardian information is matched with the information in the guardian database; and if the collected guardian information is not matched with the information of the guardian database, judging that the collected guardian information has no monitoring authority.
And if the guardian has the monitoring authority, the next step is carried out, otherwise, the identity of the guardian needs to be confirmed again.
And S13, submitting the unlocking key authorization application to a cloud server through the mobile terminal.
S14, the cloud server judges whether to carry out key authorization or not by combining the application content; if the key is authorized, the cloud server sends authorization information, and an unlocking key can be obtained from the key management machine; if not, the unlocking key cannot be obtained from the key management machine, and the unlocking key authorization application is ended.
The authorization information may be an authorization instruction or an authorization code.
Specifically, in this embodiment, when the request for authorization of the unlocking key is submitted, the key management machine automatically generates a local authorization code, the cloud server sends the local authorization code to the mobile terminal, at this time, an authorization code received by the mobile terminal is called a receiving authorization code, and by inputting the receiving authorization code (i.e., authorization information) in the key management machine, the key management machine determines that the input receiving authorization code is compared with the local authorization code, and if the input receiving authorization code is matched with the local authorization code, the unlocking key may be obtained; if not, the unlocking key cannot be obtained.
In other embodiments, the cloud server (authorizer) receives and audits the unlocking key authorization application, and the cloud server sends an authorization instruction (i.e., authorization information) to the key management machine after the audit, so that the unlocking key can be directly obtained from the unlocking key management machine.
In another embodiment, the cloud server sends an authorization code (i.e., authorization information) to the key management machine and the mobile terminal, and by inputting the authorization code in the key management machine, the key management machine determines that the input authorization code is compared with the received authorization code sent by the cloud server, and if the input authorization code is matched with the received authorization code, the unlocking key can be obtained; if not, the unlocking key cannot be obtained.
EXAMPLE III
Combining the above embodiment with fig. 3; after the operator acquires the unlocking key, the lockset of each unlocking device is sequentially unlocked according to the information of the devices to be unlocked in the authorization application acquired by the mobile terminal. The embodiment provides a method for unlocking by using an emergency unlocking key (for example, a mechanical unlocking key), which specifically includes the following steps:
s20, selecting an authorized application through the mobile terminal; the authorization application described herein is the authorization application for the unlocking key authorized in the second embodiment;
s21, acquiring information of the lockset to be unlocked through the mobile terminal;
the method comprises the steps of scanning a field through a mobile terminal, obtaining lock two-dimensional codes of a lock, obtaining information of the lock, wherein the lock information of the lock comprises lock RFID code values and lock names.
S22, the mobile terminal confirms whether the lockset is a lockset to be unlocked which is applied in advance (namely whether the lockset is authorized and can be unlocked is judged), and if so, the next step is carried out; if not, re-executing step S21;
s23, the mobile terminal acquires guardian information and judges whether the acquired guardian information has a monitoring authority; if the monitoring authority exists, the next step is carried out; if the monitoring authority is not available, the step is executed again.
Specifically, the mobile terminal acquires guardian information through a biological identification technology and/or a safety helmet image identification, compares the information with information in a preset guardian database for confirmation, and judges that the acquired guardian information has a monitoring authority if the acquired guardian information is matched with the information in the guardian database; and if the collected guardian information is not matched with the information of the guardian database, judging that the collected guardian information has no monitoring authority.
S24, unlocking the lock by an emergency unlocking key;
s25, completing unlocking operation, completing confirmation operation on the mobile terminal, and then generating an unlocking record by the mobile terminal; wherein the unlocking operation time is the time for the guardian to confirm completion on site.
After the unlocking of one lock is completed, the operator continues the unlocking operation of the next lock according to the steps S21-S25 until the unlocking operations of all the devices are completed, and the corresponding number of device unlocking operation records are recorded. And the unlocking record on the mobile terminal is transmitted back to the cloud service database of the cloud server.
Example four
With reference to the above embodiments and fig. 4, the present embodiment provides a method for using a smart key;
the method specifically comprises the following steps:
s30, selecting an authorized application through the mobile terminal; the authorization application described herein is the authorization application for the unlocking key authorized in the second embodiment;
s31, acquiring information of the lockset to be unlocked through the mobile terminal;
the method comprises the steps of scanning a field through a mobile terminal, obtaining lock two-dimensional codes of a lock, obtaining information of the lock, wherein the lock information of the lock comprises lock RFID code values and lock names.
S32, the mobile terminal confirms whether the lockset is a lockset to be unlocked which is applied in advance, and if so, the next step is carried out; if not, re-executing step S31;
s33, the mobile terminal acquires guardian information and judges whether the acquired guardian information has a monitoring authority; if the monitoring authority exists, the next step is carried out; if the monitoring authority is not available, the step is executed again.
Specifically, the mobile terminal acquires guardian information through a biological identification technology and/or a safety helmet image identification, compares the information with information in a preset guardian database for confirmation, and judges that the acquired guardian information has a monitoring authority if the acquired guardian information is matched with the information in the guardian database; and if the collected guardian information is not matched with the information of the guardian database, judging that the collected guardian information has no monitoring authority.
S34, the mobile terminal sends an unlocking instruction to the intelligent key; the intelligent key executes unlocking operation, the unlocking operation is completed, the intelligent key automatically generates unlocking records, and the unlocking records are automatically transmitted back to the mobile terminal; the unlocking operation time is unlocking execution time, and when one lock executes multiple unlocking operations, the unlocking operation recording time is first unlocking operation time.
After the unlocking of one lock is completed, the operator continues the unlocking operation of the next lock according to the steps S31-S34 until the unlocking operations of all the devices are completed, and the corresponding number of device unlocking operation records are recorded.
EXAMPLE five
Combining the various embodiments described above with FIG. 5; after the unlocking key completes the unlocking operation of all the devices (or locks), the key return is needed; the embodiment provides a method for returning an unlocking key, which specifically comprises the following steps:
s41, the unlocking record is transmitted back to a cloud service database through the application of the mobile terminal;
s42, the mobile terminal acquires guardian information and judges whether the acquired guardian information has a monitoring authority; if the monitoring authority exists, the next step is carried out; if the monitoring authority is not available, the step is executed again.
Specifically, the mobile terminal acquires guardian information through a biological identification technology and/or a safety helmet image identification, compares the information with information in a preset guardian database for confirmation, and judges that the acquired guardian information has a monitoring authority if the acquired guardian information is matched with the information in the guardian database; and if the collected guardian information is not matched with the information of the guardian database, judging that the collected guardian information has no monitoring authority.
S43, transmitting the unlocking record back to the cloud service database; after receiving the unlocking record, the cloud service database sends feedback information to the key management machine; the feedback information includes an unlock key number.
S44, the key management machine judges whether the unlocking record of the unlocking key is successfully returned according to the feedback information, and if the unlocking record of the unlocking key is successfully returned, the key is allowed to be returned; and if the return transmission is unsuccessful, alarming.
Specifically, the key management machine and the unlocking key acquire the number of the unlocking key to be returned through contactless communication; or, manually inputting an unlocking key number to be returned on the key management machine; or, selecting an unlocking key number to be returned on the key management machine; the unlocking key management machine judges whether the unlocking key with the number finishes unlocking data return according to the feedback information; if the return is successful, allowing the key to be returned; if the backhaul is not successful, an alarm is issued and step S41 needs to be re-executed.
The key management system of the invention introduces a monitoring confirmation mechanism, and in the process of authorized application of the unlocking key, a guardian is required to arrive at the site, so that the application of the unlocking key is confirmed on one hand, and the site unlocking operation of an operator is monitored on the other hand. In the operation process of the unlocking key, a guardian is required to confirm on site, and the mobile terminal can send an authorization instruction to the unlocking key to unlock the on-site locking lockset. In the process of returning the unlocking record, the unlocking operation record can be returned only by the mobile terminal after the confirmation of the guardian.
By adopting the on-site biological recognition technology of the guardian, the guardian confirmation mechanism for authorization application, unlocking use and return of the unlocking key is realized, the problems of uncontrollable unlocking key authorization, uncontrolled unlocking use and uncontrollable unlocking record are effectively solved, misoperation is effectively prevented, the management level of the unlocking key can be improved, and the safe and stable operation of a power grid can be guaranteed.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made without departing from the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (10)

1. An unlock key authorization method, comprising the steps of:
s11, filling in an unlocking key authorization application content on the key management machine, and then entering an unlocking key authorization application channel from the key management machine through the mobile terminal;
s12, the mobile terminal acquires guardian information and judges whether the acquired guardian information has a monitoring authority; if the monitoring authority exists, the next step is carried out; if the monitoring authority does not exist, the step is executed again;
s13, submitting the unlocking key authorization application to a cloud server through the mobile terminal;
s14, the cloud server judges whether to carry out key authorization or not by combining the application content; if the key is authorized, an unlocking key can be obtained from the key management machine; if not, the unlocking key cannot be obtained from the key management machine, and the unlocking key authorization application is ended.
2. The unlock key authorization method of claim 1,
in step S14, if authorized, the cloud server sends an authorization instruction to the key management machine, and directly obtains an unlocking key from the unlocking key management machine;
or the cloud server sends an authorization code to the key management machine and the mobile terminal, the key management machine judges that the input authorization code is compared with the received authorization code by inputting the authorization code in the key management machine, and if the input authorization code is matched with the received authorization code, an unlocking key can be obtained; if not, the unlocking key cannot be acquired;
or, in step S13, when the request for authorization of the unlocking key is submitted, the key management machine automatically generates a local authorization code and sends the local authorization code to the cloud server; in step S14, if authorized, the cloud server sends the local authorization code to the mobile terminal, where the authorization code received by the mobile terminal is referred to as a receive authorization code; inputting the receiving authorization code at the key management machine, and judging whether the local authorization code is matched with the receiving authorization code or not by the key management machine, if so, acquiring an unlocking key; if not, the unlocking key cannot be obtained.
3. The unlock key authorization method of claim 1,
step S11 specifically includes that after filling in the content of the request for authorization of the unlocking key on the key management machine, the key management machine generates a request channel carrier, and the mobile terminal enters the channel requested for authorization of the unlocking key through the request channel carrier.
4. The method of any one of claims 1 to 3, wherein the application includes: information of the key management machine, information of the applied unlocking key, application reason, application time and information of the equipment to be unlocked.
5. The unlocking key authorization method according to any one of claims 1 to 3, wherein the step S12 specifically includes that the mobile terminal acquires guardian information through biometric identification technology and/or helmet image identification, and compares the acquired guardian information with information in a preset guardian database for confirmation, if the acquired guardian information is matched with the information in the guardian database, the acquired guardian information is judged to have a monitoring authority, and the next step can be executed; if the collected guardian information does not match the information in the guardian database, it is determined that the collected guardian information does not have the monitoring authority, and step S12 needs to be executed again.
6. An unlocking key using method is characterized by comprising the following steps:
s21, acquiring information of the lockset to be unlocked through the mobile terminal;
s22, the mobile terminal confirms whether the lockset is a lockset to be unlocked which is applied in advance, and if so, the next step is carried out; if not, go to step S21;
s23, the mobile terminal acquires guardian information and judges whether the acquired guardian information has a monitoring authority; if the monitoring authority exists, the next step is carried out; if the monitoring authority does not exist, the step is executed again;
and S24, unlocking the lock by an unlocking key.
7. The method of claim 6, wherein the unlocking operation of step S24 is followed by a confirmation operation performed by the mobile terminal, and the mobile terminal generates an unlocking record;
or after the unlocking operation in step S24, automatically storing an unlocking record in the smart key, and transmitting the unlocking record back to the mobile terminal by the smart key.
8. The method for using the unlocking key of claim 6 or 7, wherein the information of the lock includes a lock RFID code value, a lock name; step S21 specifically comprises the steps of scanning a lock two-dimensional code of the lock on site through a mobile terminal to obtain information of the lock; or, manually inputting a lock code to the mobile terminal to acquire the information of the lock.
9. An unlocking key returning method, which is used for returning the unlocking key after unlocking all locks by applying the using method of the unlocking key of any one of claims 6-8; the method for returning the unlocking key is characterized by comprising the following steps:
s41, the unlocking record is transmitted back to a cloud service database through the application of the mobile terminal;
s42, the mobile terminal acquires guardian information and judges whether the acquired guardian information has a monitoring authority; if the monitoring authority exists, the next step is carried out; if the monitoring authority does not exist, the step is executed again;
s43, transmitting the unlocking record back to the cloud service database; after receiving the unlocking record, the cloud service database sends feedback information to the key management machine;
s44, the key management machine judges whether the unlocking record of the unlocking key is successfully returned according to the feedback information, and if the unlocking record of the unlocking key is successfully returned, the key is allowed to be returned; and if the return transmission is unsuccessful, alarming.
10. The unlock key return method of claim 9,
the feedback information comprises an unlocking key number;
step S44 specifically includes: the key management machine and the unlocking key acquire the number of the unlocking key to be returned through contactless communication; or, manually inputting an unlocking key number to be returned on the key management machine; or, selecting an unlocking key number to be returned on the key management machine;
the unlocking key management machine judges whether the unlocking key with the number finishes unlocking data return according to the feedback information; if the return is successful, allowing the key to be returned; if the backhaul is not successful, an alarm is raised and step S41 is re-executed.
CN202010498897.0A 2020-06-04 2020-06-04 Unlocking key authorization method, using method and returning method Pending CN111680978A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010498897.0A CN111680978A (en) 2020-06-04 2020-06-04 Unlocking key authorization method, using method and returning method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010498897.0A CN111680978A (en) 2020-06-04 2020-06-04 Unlocking key authorization method, using method and returning method

Publications (1)

Publication Number Publication Date
CN111680978A true CN111680978A (en) 2020-09-18

Family

ID=72434600

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010498897.0A Pending CN111680978A (en) 2020-06-04 2020-06-04 Unlocking key authorization method, using method and returning method

Country Status (1)

Country Link
CN (1) CN111680978A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112435408A (en) * 2020-11-24 2021-03-02 深圳蓄能发电有限公司 Operation key management machine based on thing networking
CN112785756A (en) * 2020-12-24 2021-05-11 广东电网有限责任公司电力科学研究院 Anti-misoperation locking management system, method, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201242684Y (en) * 2008-07-04 2009-05-20 珠海优特电力科技股份有限公司 Electronic operational ticket hand-held set
JP2016079644A (en) * 2014-10-15 2016-05-16 株式会社Photosynth Electronic lock system, unlocking method, and terminal device
CN108460870A (en) * 2018-02-08 2018-08-28 珠海优特电力科技股份有限公司 intelligent unlocking method and system
CN110189441A (en) * 2019-05-28 2019-08-30 国网河南省电力公司焦作供电公司 Intelligent substation's unlock key management machine operating system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201242684Y (en) * 2008-07-04 2009-05-20 珠海优特电力科技股份有限公司 Electronic operational ticket hand-held set
JP2016079644A (en) * 2014-10-15 2016-05-16 株式会社Photosynth Electronic lock system, unlocking method, and terminal device
CN108460870A (en) * 2018-02-08 2018-08-28 珠海优特电力科技股份有限公司 intelligent unlocking method and system
CN110189441A (en) * 2019-05-28 2019-08-30 国网河南省电力公司焦作供电公司 Intelligent substation's unlock key management machine operating system and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112435408A (en) * 2020-11-24 2021-03-02 深圳蓄能发电有限公司 Operation key management machine based on thing networking
CN112785756A (en) * 2020-12-24 2021-05-11 广东电网有限责任公司电力科学研究院 Anti-misoperation locking management system, method, equipment and storage medium
CN112785756B (en) * 2020-12-24 2023-12-29 广东电网有限责任公司电力科学研究院 Anti-misoperation locking management system, method, equipment and storage medium

Similar Documents

Publication Publication Date Title
US10262486B2 (en) Systems and methods for remote access rights and verification
EP2192560B1 (en) Access control
CN104167040A (en) Remote control method and system of electronic lock
CN111680978A (en) Unlocking key authorization method, using method and returning method
US11403380B2 (en) Method for managing fingerprint and system thereof
CN110930561B (en) Control method and device of intelligent lock
CN112702413B (en) Intelligent escort cash box system, control method, computer equipment and storage medium
CN110348545B (en) AR intelligent operation ticket method and device based on ERP system
CN101298817A (en) Lock body control device and method thereof
CN111340987A (en) Internet of things door lock communication method, device and system and computer storage medium
CN111815820A (en) Unlocking method based on substation relay security room intelligent lock system
CN116542765B (en) Vehicle management method and related equipment
CN111696233A (en) Low-power-consumption intelligent lock system with NBIOT (network-based input/output) Internet of things function and unlocking method
CN108460870B (en) Intelligent unlocking method and system
CN104933798A (en) Power plant safety management system and method based on two-dimensional code and electronic key
CN113793434A (en) Offline biological lock, coded lock system, opening and closing method and storage medium
CN113160476A (en) Intelligent key management system and method for transformer substation
CN112277878A (en) Keyless entry system
CN111445605A (en) Unlocking key authorized unlocking method and device and storage medium
CN112687032B (en) Method and system for monitoring work task by using mechanical lock
KR102500228B1 (en) Isolation locking system using network
CN112785756B (en) Anti-misoperation locking management system, method, equipment and storage medium
CN111027932B (en) Security management method for intelligent work ticket
CN117336100B (en) Data processing method and device based on escort service multiparty flattened communication
CN116052308A (en) Intelligent five-prevention unlocking system of transformer substation based on two-dimension code authorization and implementation method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200918