Five-prevention lock management method and system based on block chain

文档序号:192865 发布日期:2021-11-02 浏览:25次 中文

阅读说明:本技术 一种基于区块链的五防锁具管理方法及系统 (Five-prevention lock management method and system based on block chain ) 是由 张艳杰 郑勇进 张娟 李宏伟 邓刚 陈海涛 傅浙川 赵卫阳 毛振东 王仕韬 刘朝 于 2021-05-14 设计创作,主要内容包括:本公开提供了一种基于区块链的五防锁具管理方法及系统,构建了任务区块、钥匙区块、五防锁区块和设备区块,且任务区块、钥匙区块、五防锁区块和设备区块都包含一个验证码,每一个验证码至少有两个独立部件分别储存,一旦修改就造成了验证码的编号改变,因此避免了五防锁管理数据篡改的可能;服务器将总任务编号、每一个子任务的操作时间、设备状态、操作人员、视频信息打包形成云端区块打包,方便后期调取查阅,也避免了各个设备因存储器满了就无法找到相关记录的问题。(The task block, the key block, the five-prevention lock block and the equipment block all comprise a verification code, each verification code comprises at least two independent parts which are respectively stored, and once the verification codes are modified, the serial number of the verification codes is changed, so that the possibility of tampering the five-prevention lock management data is avoided; the server packs the total task number, the operating time of each subtask, the equipment state, the operating personnel and the video information to form a cloud block pack, so that later-stage calling and looking up are facilitated, and the problem that relevant records cannot be found due to the fact that the storage of each equipment is full is also avoided.)

1. A five-prevention lock management method based on a block chain is characterized by comprising the following steps: the method comprises the following steps:

acquiring total task content, wherein the total task content at least comprises an electronic key identification code and a plurality of subtask contents, and the subtask contents at least comprise a subtask number and an electrical element identification code;

carrying out encryption calculation on the total task content data to obtain a task verification code;

packaging the total task content and the task verification code to form a task block, and issuing the task block to the electronic key corresponding to the identification code;

the electronic key checks whether the total task content is correct according to the task verification code, and if the total task content is incorrect, the electronic key acquires the total task content again;

when the content of the total task is correct, the electronic key displays or prompts the number of the lock which needs to be unlocked currently according to the subtask number, the electrical element identification code or the electronic key identification code, and unlocking control is performed according to the number of the lock which needs to be unlocked currently.

2. The block chain-based five-prevention lock management method of claim 1, wherein:

the total task content further comprises a total task number, a subtask number, authority timeliness, an operator identification code, a first timestamp and an electronic key identification code; the subtask content further includes a lock number, a lock identification code, and a precondition.

3. The block chain-based five-prevention lock management method of claim 2, wherein:

finding out a corresponding passive lock according to the lock number, inserting an electronic key, and recording a fingerprint;

if the electronic key verifies that the authority timeliness, the lock identification code, the electrical element identification code, the operator identification code and the precondition are all met, recording the operation time, and calculating the operation verification code by the electronic key according to the operation time and the task verification code;

the electronic key packs the operation time and the operation verification code as an operation block, and sends the operation block and the operation verification code to the passive lock after storage, and simultaneously records and completes the subtasks with corresponding numbers;

the passive lock checks whether the operation verification code is correct, if so, the lock is unlocked, and the operation verification code and the operation time are stored as a five-prevention lock block;

and completing all subtasks in sequence.

4. The block chain-based five-prevention lock management method according to claim 3, wherein:

after all subtasks are completed, the electronic key calculates the total task number, the subtask numbers of all subtasks, the operation verification code and the operation time data to form a key verification code, and then packs the total task number, the lock identification code, the task verification code, the subtask numbers, the operation verification code, the operation time and the key verification code to be stored as a key block.

5. The block chain-based five-prevention lock management method of claim 4, wherein:

the electronic key is in data connection with the control terminal, the fingerprint is recorded, the key block is sent to the control terminal if the fingerprint is recorded and the fingerprint passes verification, the control terminal sends a receipt to the electronic key after the key verification code passes verification, and the electronic key clears the general task block.

6. The block chain-based five-prevention lock management method according to claim 5, wherein:

encrypting and calculating the switch states of the electric elements corresponding to the total task number, the operator identification code, the subtask number of each subtask, the operation time, the lockset identification code and the operation time into an equipment verification code;

and the control terminal packs the total task number, the operator identification code, the subtask number of each subtask, the operation time, the lockset identification code, the switch state of the electric element corresponding to the operation time and the equipment verification code to form an equipment block and uploads the equipment block to the server.

7. The block chain-based five-prevention lock management method of claim 6, wherein:

after the server checks the equipment block, the server calls corresponding video information in a set time range according to the operation time of each subtask and the lock identification code and packs the total task number, the operation time of each subtask, the equipment state, the operators and the video information to form a cloud block.

8. The utility model provides a five prevent tool to lock management system based on block chain which characterized in that:

the method comprises the following steps: the electronic key is in communication connection with the control terminal;

the control terminal generates the total task content, which comprises the following steps: the system comprises a general task number, a subtask number, authority timeliness, an operator identification code, a first timestamp, an electronic key identification code and a plurality of subtask contents, wherein the subtask contents comprise a subtask number, an electrical element identification code, a lock number, a lockset identification code and a preposed condition;

the control terminal carries out encryption calculation on the total task content data to obtain a task verification code;

the control terminal packs the total task content and the task verification code to form a task block and issues the task block to the electronic key corresponding to the identification code;

the electronic key checks whether the total task content is correct or not according to the task verification code, if so, the entry is successful, otherwise, the entry is unsuccessful;

and the electronic key displays or prompts the number of the lock which needs to be unlocked currently according to the subtask number, the electrical element identification code or the electronic key identification code.

9. The blockchain-based five-prevention lock management system of claim 8, wherein:

also comprises at least one five-prevention lock;

finding out a corresponding passive lock according to the lock number, inserting an electronic key, and recording a fingerprint;

if the electronic key verifies that the authority timeliness, the lock identification code, the electrical element identification code, the operator identification code and the precondition are all met, recording the operation time, and calculating the operation verification code by the electronic key according to the operation time and the task verification code;

the electronic key packs the operation time and the operation verification code as an operation block, and sends the operation block and the operation verification code to the passive lock after storage, and simultaneously records and completes the subtasks with corresponding numbers;

the passive lock checks whether the operation verification code is correct, if so, the lock is unlocked, and the operation verification code and the operation time are stored as a five-prevention lock block;

after all subtasks are completed, the electronic key calculates the total task number, the subtask numbers of all subtasks, the operation verification code and the operation time data to form a key verification code, and then packs the total task number, the lock identification code, the task verification code, the subtask numbers, the operation verification code, the operation time and the key verification code to be stored as a key block;

the electronic key is in data connection with the control terminal, a fingerprint is recorded, if the fingerprint is verified, the key block is sent to the control terminal, the control terminal sends a receipt to the electronic key after the verification of the key verification code is passed, and the electronic key clears the general task block;

and encrypting and calculating the total task number, the operator identification code, the subtask number of each subtask, the operation time, the lock identification code and the operation time corresponding to the switch state of the electrical element into an equipment verification code.

10. The blockchain-based five-prevention lock management system of claim 9, wherein:

the control terminal is in communication connection with the server;

the control terminal packs the total task number, the operator identification code, the subtask number of each subtask, the operation time, the lockset identification code, the switch state of the electric element corresponding to the operation time and the equipment verification code to form an equipment block and uploads the equipment block to the server;

after the server checks the equipment block, the server calls corresponding video information in a set time range according to the operation time of each subtask and the lock identification code and packs the total task number, the operation time of each subtask, the equipment state, the operators and the video information to form a cloud block.

Technical Field

The disclosure relates to the technical field of lock control, in particular to a block chain-based five-prevention lock management method and system.

Background

The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.

The five-prevention lock is a lock for high-voltage switchgear, such as a 10kv high-voltage switchgear. This lock forces the operation personnel to carry out exact operation to electrical equipment according to established safe operation procedure to avoid the emergence of maloperation accident, fully satisfy "five prevent" requirement: (1) and the circuit breaker is prevented from being opened and closed by mistake. The circuit breaker is prevented from being wrongly opened and closed, and the operated equipment can be operated only if the operation instruction corresponds to the operating equipment; (2) prevent the isolating switch from being switched on and off under load. Namely, the isolating switch can not be operated when the breaker, the load switch and the contactor are in a closing state; (3) the grounding wire (grounding switch) is prevented from being hung (closed) in a charged state, namely the grounding wire (grounding switch) is prevented from being hung or closed only in the brake-off state of the circuit breaker (isolating switch); (4) preventing power transmission with ground. Namely, the power transmission with the ground wire is prevented, and the circuit breaker (isolating switch) with the ground wire (grounding switch) is prevented from being closed; (5) prevent the mistake and go into electrified interval, prevent promptly that the mistake from going into electrified interval, only when the compartment is uncharged, could open the door and get into the compartment.

The five-prevention lock has two types of padlock and fixed lockset, and is used for limiting or not limiting the action states of a switch, a handle and a knife switch of electrical equipment.

The inventor finds that the conventional five-prevention lock management method has the following problems:

(1) in the prior art, the character numbering processing is not carried out on the open equipment operation box of the transformer substation and a corresponding padlock, and a user easily makes mistakes when the lock is recovered according to the number after the use is finished, namely, the wrong position of the padlock is easily caused to cause wrong intervals;

(2) the method comprises the following steps that online identification cannot be carried out on operators, and the situation that the operators are not appointed by the current task to operate after unlocking exists;

(3) after the operation sequence is downloaded to the five-prevention key, an off-line mode is adopted in each unlocking operation step in the operation, when an abnormal condition is met and processed in the operation process, the operation enters a management blind area, an operation log cannot be formed, and due to the fact that a data encryption means is not adopted, operation record data are possibly refreshed and tampered, so that comprehensive and accurate operation records are difficult to obtain in the management, and the operation record data cannot be used as key evidences during accident tracing;

(4) the five-prevention mechanical padlock usually adopts a button type mechanical transmission mode to unlock, the unlocking time can be generally recorded in a five-prevention key, but the locking time cannot form a time record, and the problem that the closing of an operation box cabinet door is forgotten cannot be traced. The keys of the mechanical padlock key and the electric lock are sometimes independently configured, and the padlock key and the electric five-prevention key need to be carried during operation, so that the operation management burden is increased.

Disclosure of Invention

In order to solve the defects of the prior art, the disclosure provides a five-prevention lock management method and a five-prevention lock management system based on a block chain.

In order to achieve the purpose, the following technical scheme is adopted in the disclosure:

the first aspect of the disclosure provides a five-prevention lock management method based on a block chain.

A five-prevention lock management method based on a block chain comprises the following processes:

acquiring total task content, wherein the total task content at least comprises an electronic key identification code and a plurality of subtask contents, and the subtask contents at least comprise a subtask number and an electrical element identification code;

carrying out encryption calculation on the total task content data to obtain a task verification code;

packaging the total task content and the task verification code to form a task block, and issuing the task block to the electronic key corresponding to the identification code;

the electronic key checks whether the total task content is correct according to the task verification code, and if the total task content is incorrect, the electronic key acquires the total task content again;

when the content of the total task is correct, the electronic key displays or prompts the number of the lock which needs to be unlocked currently according to the subtask number, the electrical element identification code or the electronic key identification code, and unlocking control is performed according to the number of the lock which needs to be unlocked currently.

Further, the total task content further comprises a total task number, a subtask number, authority timeliness, an operator identification code, a first timestamp and an electronic key identification code; the subtask content further includes a lock number, a lock identification code, and a precondition.

Furthermore, a corresponding passive lock is found according to the lock number, an electronic key is inserted, and a fingerprint is recorded;

if the electronic key verifies that the authority timeliness, the lock identification code, the electrical element identification code, the operator identification code and the precondition are all met, recording the operation time, and calculating the operation verification code by the electronic key according to the operation time and the task verification code;

the electronic key packs the operation time and the operation verification code as an operation block, and sends the operation block and the operation verification code to the passive lock after storage, and simultaneously records and completes the subtasks with corresponding numbers;

the passive lock checks whether the operation verification code is correct, if so, the lock is unlocked, and the operation verification code and the operation time are stored as a five-prevention lock block;

and completing all subtasks in sequence.

Furthermore, after all subtasks are completed, the electronic key calculates the total task number, the subtask numbers of all subtasks, the operation verification code and the operation time data to form a key verification code, and then packs the total task number, the lock identification code, the task verification code, the subtask numbers, the operation verification code, the operation time and the key verification code to be stored as a key block.

Furthermore, the electronic key is in data connection with the control terminal, the fingerprint is recorded, the key block is sent to the control terminal if the fingerprint is recorded and the fingerprint passes verification, the control terminal sends a receipt to the electronic key after the key verification code passes verification, and the electronic key clears the general task block.

Further, the switch states of the electric elements corresponding to the total task number, the operator identification code, the subtask number, the operation time, the lockset identification code and the operation time of each subtask are encrypted and calculated into equipment verification codes;

and the control terminal packs the total task number, the operator identification code, the subtask number of each subtask, the operation time, the lockset identification code, the switch state of the electric element corresponding to the operation time and the equipment verification code to form an equipment block and uploads the equipment block to the server.

Furthermore, after the server checks the equipment block, the server calls the corresponding video information in the set time range according to the operation time of each subtask and the lock identification code, and packs the total task number, the operation time of each subtask, the equipment state, the operators and the video information to form a cloud block.

The second aspect of the disclosure provides a five-prevention lock management system based on a block chain.

A five-prevention lock management system based on a block chain comprises: the electronic key is in communication connection with the control terminal;

the control terminal generates the total task content, which comprises the following steps: the system comprises a general task number, a subtask number, authority timeliness, an operator identification code, a first timestamp, an electronic key identification code and a plurality of subtask contents, wherein the subtask contents comprise a subtask number, an electrical element identification code, a lock number, a lockset identification code and a preposed condition;

the control terminal carries out encryption calculation on the total task content data to obtain a task verification code;

the control terminal packs the total task content and the task verification code to form a task block and issues the task block to the electronic key corresponding to the identification code;

the electronic key checks whether the total task content is correct or not according to the task verification code, if so, the entry is successful, otherwise, the entry is unsuccessful;

and the electronic key displays or prompts the number of the lock which needs to be unlocked currently according to the subtask number, the electrical element identification code or the electronic key identification code.

Furthermore, the anti-theft lock also comprises at least one five-prevention lock;

finding out a corresponding passive lock according to the lock number, inserting an electronic key, and recording a fingerprint;

if the electronic key verifies that the authority timeliness, the lock identification code, the electrical element identification code, the operator identification code and the precondition are all met, recording the operation time, and calculating the operation verification code by the electronic key according to the operation time and the task verification code;

the electronic key packs the operation time and the operation verification code as an operation block, and sends the operation block and the operation verification code to the passive lock after storage, and simultaneously records and completes the subtasks with corresponding numbers;

the passive lock checks whether the operation verification code is correct, if so, the lock is unlocked, and the operation verification code and the operation time are stored as a five-prevention lock block;

after all subtasks are completed, the electronic key calculates the total task number, the subtask numbers of all subtasks, the operation verification code and the operation time data to form a key verification code, and then packs the total task number, the lock identification code, the task verification code, the subtask numbers, the operation verification code, the operation time and the key verification code to be stored as a key block;

the electronic key is in data connection with the control terminal, a fingerprint is recorded, if the fingerprint is verified, the key block is sent to the control terminal, the control terminal sends a receipt to the electronic key after the verification of the key verification code is passed, and the electronic key clears the general task block;

and encrypting and calculating the total task number, the operator identification code, the subtask number of each subtask, the operation time, the lock identification code and the operation time corresponding to the switch state of the electrical element into an equipment verification code.

Furthermore, the system also comprises a server, wherein the control terminal is in communication connection with the server;

the control terminal packs the total task number, the operator identification code, the subtask number of each subtask, the operation time, the lockset identification code, the switch state of the electric element corresponding to the operation time and the equipment verification code to form an equipment block and uploads the equipment block to the server;

after the server checks the equipment block, the server calls corresponding video information in a set time range according to the operation time of each subtask and the lock identification code and packs the total task number, the operation time of each subtask, the equipment state, the operators and the video information to form a cloud block.

Compared with the prior art, the beneficial effect of this disclosure is:

1. according to the management method and the management system, the task block, the key block, the five anti-lock block and the equipment block all comprise one verification code, each verification code is stored in at least two independent parts respectively, and the serial number of the verification code is changed once the verification code is modified, so that the possibility of data tampering is avoided.

2. According to the management method and the management system, the server packs the total task number, the operation time of each subtask, the equipment state, the operator and the video information to form a cloud block pack, so that later calling and looking up are facilitated, and the problem that relevant records cannot be found out due to the fact that the storage of each equipment is full is also avoided.

3. The management method and the management system verify the ID of the electrical element, and prevent accidents caused by operation errors and the problem that an unlocked lock cannot be found due to disordered lock positions.

4. According to the management method and the management system, the electronic key can be used for opening and closing the mechanical padlock of the operation box, and can be used for connecting or disconnecting the electric lock loop when the control cabinet and the switch cabinet are operated in place, so that the integrated design of the five-prevention padlock computer key of the electric operation loop and the five-prevention padlock computer key of the mechanical is realized, and the burden of managing a plurality of keys is saved.

5. According to the management method and the management system, the validity of data is ensured by using the verification code, and meanwhile, the storage burden of a lockset and an electronic key is reduced; padlock, fixed lock and electric lock all utilize the electron key to authorize, verify, unblank, have realized thing networking communication, convenient control, data statistics.

Advantages of additional aspects of the disclosure will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the disclosure.

Drawings

The accompanying drawings, which are included to provide a further understanding of the disclosure, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure and are not to limit the disclosure.

Fig. 1 is a schematic view of a first isolation switch operation box provided in the embodiment of the present disclosure.

Fig. 2 is a schematic view of a second isolation switch operation box provided in the embodiment of the disclosure.

Fig. 3 is a schematic diagram of a passive padlock control provided by an embodiment of the present disclosure.

Fig. 4 is a schematic diagram of a passive lock control provided by an embodiment of the present disclosure.

Fig. 5 is a schematic diagram of an electronic key control provided in the embodiment of the present disclosure.

Fig. 6 is a schematic view of an electric lock control provided in an embodiment of the present disclosure.

Fig. 7 is a schematic structural diagram of an electronic key according to an embodiment of the present disclosure.

Detailed Description

The present disclosure is further described with reference to the following drawings and examples.

It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs.

It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present disclosure. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.

The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.

Example (b):

as shown in fig. 1, an embodiment of the present disclosure provides a five-prevention lock management system based on a block chain, for managing a five-prevention lock disposed on electrical equipment of a substation, including: the system comprises a plurality of passive locks (namely five-prevention locks), an electronic key, a sensor for acquiring the state of each electrical device, a transformer substation camera, a host (namely a control terminal) and a server.

The electrical equipment is provided with a plurality of electrical elements which need to be additionally provided with five anti-locking devices, such as a switch, a knife switch and a breaker trolley. Each five-prevention lock is provided with a label (prior art) which is convenient for the naked eye identification of an operator.

In the embodiment, the five-prevention lock refers to a CN201821978703.1 multi-mode unlocking lock cylinder assembly and a multi-mode unlocking intelligent lock, or a CN 201920093983.6U-shaped lock beam intelligent glass door lock adopts an idle passive lock cylinder, a motor or an electromagnet drives a clutch to engage a lock cylinder shell and an actuating mechanism, and a plug of an electronic key is inserted into a socket of the idle passive lock cylinder to twist the lock cylinder shell to drive the actuating mechanism to rotate to realize unlocking.

The five prevent that the lock that this embodiment provided selects for use passive tool to lock and electric lock, specifically including fixed tool to lock and padlock, fixed tool to lock includes lock, cabinet lock, and the passive lock includes passive lock core, actuating mechanism (drive mechanism or release mechanism), encryption chip, controller, NFC antenna (the padlock has), and the memory, passive lock core self do not take the power and are supplied power by the electron key.

The electric equipment is equipped with the NFC label at the padlock installation department, and every NFC label record has the independent electric elements ID that corresponds electric elements, and electric elements ID contains the independent electric elements ID that transformer substation's serial number, electric elements serial number, electric element type are constituteed, ensures that the tool to lock is in accurate position.

As shown in fig. 1, 2, 3 and 4, both passive padlocks and passive locks have controllers, motors, power interfaces, encryption chips, and memories. The padlock of the embodiment is encrypted and calculated into a lock verification code according to the time stamp, the operator ID and the task number after unlocking or locking, and the lock verification code is stored as a five-prevention lock block, and the specific time stamp, the operator ID and the subtask ID are not stored, because the calculation capacity and the memory capacity of the passive lock are limited.

For example, the data of the time stamp, the operator ID and the task number are 1kb together, one lock verification code can be 128b, and the lock verification code of each passive padlock or passive lock is calculated independently, which can be data of the number of selected front bits after calculation of a specific formula.

As shown in fig. 5 and 7, the electronic key includes a plug, a controller, a decryption chip, a biometric sensor (fingerprint sensor), an NFC antenna, and a memory. The electronic key is physically connected with the host machine through a plug and a socket or is in data transmission through an NFC antenna, development of wireless signals is not allowed in the transformer substation to access the safety I area, and the host machine is located in the safety I area.

As shown in fig. 6, the electric lock is used for generating an excitation signal to the triode after verification after the plug of the electronic key is inserted into the interface, the output interface supplies power to the relay of the control cubicle, and the output interface is powered off after the key is pulled out.

The host is connected with the server through a network cable; the host acquires the state of each electrical device; the server is responsible for collecting various data of a plurality of substations.

The transformer substation camera is responsible for collecting video information in the transformer substation, and not every electrical element ID can have video information, and electrical element and camera are not the one-to-one correspondence, and it is possible that one electrical element has five cameras to see, also can all not see.

For each switching operation step, the operation starting time is the unlocking time, and the operation ending time is the door locking time. For the abnormal handling behavior in the switching operation process, the switching locking time record is used for calibrating the operation behavior track of each interval, so that the accident handling and management tracing are facilitated. When obvious defects such as software program errors and the like occur in the five-prevention system, the computer key has a remote authorization unlocking function, and mechanical and short-circuit unconditional unlocking keys are cancelled.

The five-prevention lock management method comprises the following processes:

s101, an operator creates a total task content through a host, wherein the total task content comprises a total task number, a subtask number, authority timeliness, an operator ID, a first timestamp, an electronic key ID and a plurality of subtask contents, and the subtask contents comprise a subtask number, an electrical element ID, a lock number, a lockset ID and a prepositive condition (namely an operation sequence, if a second lock is unlocked, the first lock is locked);

s102, the host machine carries out encryption calculation on the total task content data to obtain a task verification code; for example, three subtasks, a total of 21 fields including 6 total task fields and 3 x 5 subtask fields, and a size of 128b for a calculated task validation code having a data size of 20 kb.

S103, the host packs the total task content and the task verification codes to form task blocks and issues the task blocks to the electronic key corresponding to the ID of the electronic key, specifically, the electronic key is connected with the host, an operator inputs a fingerprint, the host verifies whether the ID of the electronic key and the ID of the operator are correct, and if yes, the task blocks are issued to the electronic key.

S201, the electronic key checks whether the total task content is correct according to the task verification code, if so, the electronic key prompts that the entry is successful, otherwise, the electronic key prompts that the entry is unsuccessful;

s202, the electronic key is provided with a display screen, and displays the number (plain code) of the lock which needs to be unlocked currently according to the sequence of the subtask numbers, the ID of the electrical element or the ID of the electronic key;

s203, an operator finds a corresponding passive lock according to the lock number, inserts a key and inputs a fingerprint;

s204, the electronic key controller verifies whether authority timeliness, a lock ID, an electric element ID, an operator ID and a precondition are met, if yes, operation time is recorded, and the electronic key controller calculates an operation verification code according to the operation time and the task verification code;

s205, the electronic key packs the operation time and the operation verification code to be used as an operation block, and then sends the operation block and the operation block to the passive lock together with the secret key, and meanwhile records and completes subtasks corresponding to the numbers;

s206, the passive lock checks whether the operation verification code is correct, if so, unlocking is carried out, and the operation verification code and the operation time are stored as a five-prevention lock block;

s207, repeating the steps S202-S205, and completing all subtasks in sequence;

s208, after all subtasks are completed, the electronic key calculates the total task number, the subtask numbers of all subtasks, the operation verification code and the operation time data to form a key verification code, and then packs the total task number, the lockset ID, the task verification code, the subtask numbers, the operation verification code, the operation time and the key verification code to be stored as a key block;

s209, the electronic key is in data connection with the host, an operator inputs a fingerprint and sends the key block to the host if the fingerprint is verified to be passed, the host sends a receipt to the electronic key after the key verification code is verified to be passed, and the electronic key clears the general task block;

s301, the host encrypts and calculates the total task number, the operator ID, the subtask number of each subtask, the operation time, the lock ID and the electric element switch state corresponding to the operation time into an equipment verification code, and the host packs the total task number, the operator ID, the subtask number of each subtask, the operation time, the lock ID and the electric element switch state corresponding to the operation time and the equipment verification code to form an equipment block and uploads the equipment block to the server;

s302, after the server checks the equipment block, the server calls corresponding video information in a set time range according to the operation time and the lock ID of each subtask and packs the total task number, the operation time, the equipment state, the operators and the video information of each subtask to form a cloud block.

The traditional five-prevention lock management system adopts a mode of 'mechanical lock + computer key'; the computer key has no operation time record and no five-prevention lock operation record; the unlocking record can be made, and the locking record can not be made; the identity cannot be identified in the process of operating the lockset; the method can not provide enough time log data for data management statistical analysis, operation behavior analysis and misoperation accident tracing.

The five-prevention lock management system adopts a mode of 'passive intelligent lock + electronic key'; the passive intelligent lock has 200 backup records (within the latest time); 20000 switch lock records can be stored in the electronic key; the record of unlocking and locking can be made; during unlocking and locking, identity recognition can be carried out; the system can provide enough time log accurate data for management and analysis, and the locking and unlocking records can be provided for data management statistical analysis of a safety supervision department.

As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.

The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.

The above description is only a preferred embodiment of the present disclosure and is not intended to limit the present disclosure, and various modifications and changes may be made to the present disclosure by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present disclosure should be included in the protection scope of the present disclosure.

14页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种基于WiFi识别的车辆解锁方法及系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!