Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for implementing network five defending locking system of transforming plant without person on duty

A five-proof locking and substation technology, applied in the transmission system, information technology support system, circuit, etc., can solve the problems that information cannot be shared, data security cannot be guaranteed, and operation information and data cannot be shared.

Inactive Publication Date: 2009-03-25
STATE GRID CORP OF CHINA +1
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above-mentioned system data is stored on a single machine, the data security cannot be guaranteed, and it is impossible to realize the sharing of some important operation information data; since the five-proof locking systems of different manufacturers are adopted between the substations, the technical realization of each system is different from that of other substations. The communication standards are different, and the information cannot be shared; since the development of the five-proof application is based on different graphic data formats, there are multiple primary wiring diagrams of substations within the scope of the power supply company, and the graphic formats are inconsistent, which will inevitably lead to duplication of graphic data entry, leading to data inconsistencies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing network five defending locking system of transforming plant without person on duty
  • Method for implementing network five defending locking system of transforming plant without person on duty
  • Method for implementing network five defending locking system of transforming plant without person on duty

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The method of realizing the networked five-proof locking system of unattended substation is as follows:

[0026] (1) Establishing a system network (see figure 1 ):

[0027] The system network is composed of production control zone I dedicated network, production zone III network, and management information zone network; the production control zone I zone dedicated network and production zone III network are unidirectionally connected through the forward physical isolator 7; the production zone III network and The management information area network is unidirectionally connected through a firewall 4; the special network in the production control I area is composed of a master station, a sub-station, a production control I area network 42, and a file sending server 8, and the master station and each sub-station pass through the production control I area. Network 42 two-way connection; described production III area network is made up of production III area network 41, fil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for realizing an unattended substation networking five-defense block system, which specifically comprises the following steps: 1. establishing a system network; 2. and establishing a system interface: (1) establishing a graphic display and processing COM module; (2) adopting FTP documents to upload or download to keep the graphic data synchronization mainly by the method of transferring local graphic data; (3) and establishing standard communication stipulations between the five-defense block system and the computer key. The invention has the beneficial effects that a networking five-defense block management platform is established to realize five-defense block function; the unity of once wiring diagram graphic data and the information sharing between an electric transmission and transformation geographical information system and the five-defense block system substation are realized; and the download and pass back of the computer key data between the five-defense block system and a plurality of manufacturers is realized based on the standard communication stipulations between the five-defense block system and the computer key.

Description

technical field [0001] The invention relates to a method for realizing a networked five-proof locking system of an unattended substation. Background technique [0002] At present, in the public five-proof locking system, such as Zhenjiang Power Supply Company's AAN-2000 network-type anti-mistake centralized control system, based on microcomputers and industrial-grade single-chip microcomputers, the primary system diagram of the substation and the anti-malfunction of all electrical equipment The misoperation rule library software is the core, which is composed of two parts: the substation end misoperation prevention system and the monitoring center anti misoperation workstation. The real-time position control and picking of the field equipment are completed by the distributed controller through the CAN bus. The distributed controller controls the locks in a star connection mode, and the master controller sends or receives data information to the distributed controller, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H02J13/00H01H9/20H04L29/08G06F9/44G06F17/50
CPCY02E60/76Y04S40/22Y02E60/00
Inventor 赵立刚张贺伟刘平杜丽萍焦剑王玉贞张颖孙红燕
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products