Unattended substation network access control security system solution

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

1. Introduction

With the great development of the electric power industry, a large number of unattended substations and computer rooms have been constructed. Due to the large number of unattended substations, the safety of equipment, operation and maintenance of their equipment requires a lot of manpower, time, capital, operation and maintenance personnel, and The management center lacks timely information communication and coordination, often resulting in many drawbacks such as untimely operation and maintenance, and cannot achieve the goal of safety, high efficiency, and low operation and maintenance costs for unmanned substations.

The application of networked access control, alarm, monitoring and security systems will greatly improve the real-time monitoring capabilities of unattended substations, the management capabilities of access rights, the automatic storage of data, and the level of problem analysis, improve the efficiency of operation and maintenance, and greatly reduce costs.

The core members of Digitalor have more than 30 years of professional experience in the electronic security industry. The company has independently developed the Digitalor 2006SuperGroup network access control system through long-term cooperation with domestic and international first-class enterprises and customers. The system effectively solves the needs of cross-regional, cross-international corporate organizations, and access control and management for collaborative control and management of entrances and exits.

2. Unattended substation network access control system:

Unattended substations have high requirements for safety monitoring and real-time performance. This article will introduce the implementation of network access control through technical means to solve the problem of safety monitoring, ensure the safety of unattended substations, and be able to understand various situations in the substation in real time. Each unattended substation is monitored and alarmed to improve work efficiency and reduce costs.

In order to meet the management needs of power grid companies for unattended substations, in view of the wide distribution of unattended substations and high security requirements, this system adopts a professional-level network access security controller that supports local area networks and wide area networks. The product supports 200,000 maintenance personnel, and the system supports almost unlimited access control points and alarm monitoring point devices. As the device communication adopts TCP/IP mode, all data packets are encrypted with SSL financial-grade encryption technology, and data security reaches international advanced standards.

In the centralized control center of the power grid company, first build an access security management center, and use the existing wide area network to perform unified information management on the access control and safety of the substations distributed in each substation; each substation at the next level is constructed as a separate control The basic unit can realize the remote control of the site by the local control and centralized control center; thousands of unattended substations and a security centralized control center will form a complete information management and control system. The management information of each local (regional) power supply bureau will be uploaded to the grid company as needed, which can facilitate remote monitoring and operation management.

The unattended substation access control networking solution includes: main station (SQL database, switch, headquarters management client), substation (access controller), WAN/VPN, remote data viewing and other components.Figure one

620)this.style.width=620;” border=0>

Unattended substation unit control includes (controller, card reader, exit button, electric control lock, door sensor, etc.) as shown in Figure 2

620)this.style.width=620;” border=0>

3. Functions and characteristics of the unattended substation network access control system:

1. The system has strong capacity scalability

From one unattended station to hundreds or thousands of unattended stations, data transmission and access control to unattended substations can be carried out on a global scale, and multiple communication servers and database servers can be operated at the same time for data synchronization and data synchronization. Transmission, balance the network load, thereby effectively avoiding the problem of server paralysis due to too many connections to a single server.

2. Powerful and detailed authority management

Pyramid authority management method can delegate authority level by level and restrict level by level. Management can be refined from department to individual, from controller to a door point, all can not be achieved, effectively solving the problem of authority. For example, the substation centralized control center can monitor the time, location, and name of the substation personnel (such as the daily entry and exit of the management operation team), can manually control the opening and closing of the substation door, and can issue cards with different permissions to different workers. Proximity cards with different permissions open different doors and enter different equipment areas (such as remotely opening and closing doors for operation and maintenance personnel, etc.). The permissions of each card can be changed at any time to prevent the lost card from being used by others.

The system can also control and manage the actions of personnel in the relevant areas of the building, and solve the problems of traditional security guards such as human negligence, loss of keys, theft, and duplication. Each user holds independent information, can establish or cancel its use right through the software system, increase or decrease the use right, and provide a guarantee for preventing intrusion from normal channels. In addition, the system can also realize the clear limitation of personnel authority, whether it is internal or external personnel, through the authority setting, clearly define the scope of free entry and exit, and record it for inquiries. This greatly relieves the pressure of personnel management and can achieve the effect of saving manpower while improving safety.

3. High confidentiality

The data transmission of the system adopts SSL encryption, which can ensure that the transmitted information will not be tampered with or deciphered in the network, and the storage of important data is also encrypted.

4. High reliability

This system is a distributed multi-layer network modular structure system composed of intelligent network controllers. It uses field controllers and is close to the control point. All distributed controllers work autonomously on the same hierarchical bus. When a controller fails At that time, the entire system will not be affected. This system fully embodies the design ideas of centralized management and distributed control, reduces risks and increases reliability.

5. Perfect way to open the door

(1) In the general security level management area of ​​the substation: you can choose to open the door with a single card, which is simple and easy to operate;
(2) In the high-security management area: you can choose any number of cards to open the door, this method is that multiple authorized people can all swipe the cards to open the door, without specifying which staff authorized to use the card at the same time The door can be opened by being present;
(3) In management areas with high security levels and special management requirements: you can choose to specify multiple card opening methods. This opening method requires not only the presence of a specified number of cardholders, but also the presence of designated cardholders at the same time. Open, increase the safety factor;
(4) In special management areas with high security levels and high management requirements: you can choose to open the door in a combination of departments, which requires not only authorized cardholders, but also cardholders from different departments must be present at the same time. Open this door, which can prevent a certain department from wanting to open this door for operation without going through other important departments, avoiding many violations and management troubles.

6. Several new functions have been added for the normal inspection of staff

(1) Two-way card reading function: When the staff needs to enter the substation for related operations, and other personnel need to have a basis for checking the entering staff, then use the two-way card reading function to clearly record the entry The entry and exit time and other information of personnel can be recorded in detail in the system. This function avoids the collection of detailed information such as the entry and exit time of the staff in the substation;
(2) Unclosed door reminder function: When any door is opened for more than a specified time (0-255 seconds can be set) and is not closed or falsely locked, the management host will alarm to prompt the door to close. This function can prevent unauthorized personnel from entering the substation and working The personnel can quickly close the door according to the alarm of the management host, so as to avoid unnecessary man-made or natural losses when the substation personnel neglect to close the door or false lock after entering;
(3) Emergency door closing and alarm function: When an alarm occurs, press the emergency door closing button in the substation to achieve forced locking of the two doors at the same time, so that both the inside and outside of the door cannot be opened. At the same time, report to the Public Security Bureau or the relevant Personnel report to the police; when the staff enters the substation, if an illegal intruder is found, the emergency lock button can be activated in time to close the illegal intruder in the substation. Even if the illegal intruder has an accomplice outside, the door cannot be opened to prevent the illegal intruder Rescued, the system has already reported to the Public Security Bureau or relevant personnel while locking the door to prevent illegal intruders from continuing their crimes and bring illegal intruders to justice;
(4) Forced door opening alarm function: When criminals want to enter the substation for theft or sabotage by threatening the staff, the staff only need to open the door with the duress password to open the door, and the system will send an alarm signal to the monitoring center at the same time as the door is opened. Lights, etc.) in order to scare off criminals or bring criminals to justice through public security personnel;
(5) Intelligent management: The management computer manages the authority, time of entry and exit, and entry mode of the staff entering and exiting the unattended substation, which is safe and convenient; the management computer can monitor the entry and exit of the substation and the corresponding events in real time, and store the corresponding data at the same time For inquiries;
(6) A variety of identification systems: support non-contact IC card identification system, biometric system (such as: fingerprint, iris, palm recognition, etc.); when the substation staff need to enter the substation to check the scene, you can choose non-contact IC Card recognition system to open the gate, or biometric system to open the gate, the substation manager can choose systems with different security levels. Biometric identification systems are generally higher than non-contact IC card identification systems, because a person’s fingerprint, iris, palm shape, etc. are unique, and only an authorized person can open the door, and the IC may cause the person to lose it. Those who can’t get in by themselves but pick up the card can easily enter, which requires different identification systems according to the different security levels of the substation;
(7) Multi-card opening function: In important areas, the system can set the multi-card opening mode. When opening a door, multiple people are required to effectively identify the identity within the specified time before the door can be opened; the system can set 2 to 8 people to be present at the same time to open the door. The application place of this function is a place with a high security level. For example, if a person in the data center wants to enter to modify the data, he must wait for 2-8 authorized persons to be present at the same time to enter, otherwise the door cannot be opened for data and other information Make changes, etc.
In addition, high reliability and high security also meet the needs of unattended substations. All interfaces of the controller have interface protection circuits to effectively protect the interface circuit; all contacts of the relay have contact protectors to ensure that the relay will not damage the contacts under frequent and long-term operations; the controller is equipped with a hardware electronic dog monitor, Make sure that the controller will not crash when it is working.

Four, system advantages

1. This system is a multi-level modular structure composed of decentralized intelligent controllers. It adopts field controllers and is close to the control point. All distributed controllers work autonomously on the same hierarchical bus. When a controller fails At that time, the entire system will not be affected. It fully embodies the design ideas of centralized management and distributed control, reduces risks and increases reliability. The system is based on the conceptual design of the community, which can fully meet the requirements for the number of access points and other control points. There are almost no restrictions on the controllers and access control points that can be controlled by an access control system based on a local area network.
2. The system has real-time “plug and play” and online self-checking functions. For typical failures in the system, the central workstation will prompt with sound signals and text warnings. When the communication between the system center and the controller is interrupted due to a fault, the controllers at each point can work independently, and a certain amount of information can be recorded in the controller.
3. The controller has a strong communication capability based on TCP/IP local area network, so that each independent controller can use the ready-made computer local area network for data communication, increasing the flexibility of system management.
4. The communication interface of the controller provides the RJ45 standard interface, which can be connected with other systems to become a subsystem. In addition, the system can also open the necessary communication protocols for higher-level integration. The system considers leaving redundant input and output interfaces to facilitate future system expansion, and even if these reserved points are not enough, the modular structure of this system can easily add equipment to meet larger-scale expansion.

The application of the network access control system for remote monitoring is of great significance. It can realize remote centralized monitoring and control of unattended substations. While obtaining data information and equipment operation conditions, it can also obtain on-site security conditions so that the staff can be accurate Obtain the on-site status and the location of the accident and fault, and truly realize remote monitoring of unattended substations.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare