Provide conditions for each device that needs to be locked to be equipped with a lock with a unique code, and the computer key confirms the name of the device based on the code. When the operator simulates a rehearsal on the five-proof host, the five-proof system software will make a five-proof judgment on each step of the operation based on the logical locking relationship of the equipment and the actual status of the equipment, issue warnings for incorrect operations and explain the reasons for the errors. Only operations that comply with the five defense principles can generate an executable operation ticket, and the operation ticket is forwarded to the computer key through the multi-function adapter. When the operator carries out the actual switching operation with the computer key, he must strictly follow the equipment currently designated by the computer key to perform the operation. If the current operation is not completed, the next operation cannot be performed. If the code is collected at the wrong interval, the computer key will think that the operation is wrong. It will not only prohibit the user's operation and display the wrong location, but also issue a voice alarm and black box record for the wrong operation. After the entire operation ticket operation is completed, the user places the computer key on the multi-function adapter, and the completed operation or unfinished operation or attempted misoperation record will be returned to the five-proof host for storage. The time or completion status of each operation can be checked at any time.
The switching operation process of all locking equipment is under the strict supervision of the five-proof host computer and computer keys. The operators are forced to perform the switching operation according to the correct operation ticket in the simulation preview, thereby completing the purpose of the five-proof locking.
Product Features
The locking function is complete and it has a variety of locking methods such as hard locking and soft locking. Hard locking refers to the forced locking of equipment by installing various locks and accessories. Hard locking can not only lock circuit breakers, isolating switches, and grounding switches, but also temporary grounding wires, network doors, cabinet doors, etc. Soft lockout refers to the software lockout of device operations. Soft locking can make five-proof judgments on the operation of the monitoring system and prevent false locking. In addition to meeting the basic five-proof blocking function, this product can also block complex switching operations such as bypass bus charging, reverse bus operation, and line-side power testing.
Installation, maintenance, and use are easy and flexible. The circuit breaker can be locked with electrical coding or software. The electrically operated isolating switch can be locked with electrical coding, and other isolating switches can also be locked with hanging coding lock or software. , grounding knife gates and other equipment should be locked with hanging coded locks or intelligent air defense locks. The workload of on-site installation and maintenance is greatly reduced. All switch coded locks, electric coded locks, hanging coded locks or intelligent air defense locks are operated by a computer key. Each step of the operation has detailed prompts on the computer key. Even if the power is lost, the memory will not be lost (the data after the power is lost) Can be maintained for more than one year).
The operation method is consistent with the actual operation on site. The new locking device has multiple invoicing functions such as pre-stored tickets, typical tickets, manual tickets, smart tickets, etc., and also provides five-proof locking under special circumstances such as maintenance operations and accident handling (intelligent unlocking). In operation mode, the system has the function of five-proof system accident recall (black box), and also has optional components, such as equipment inspection and operation function modules.
Simple operation, reliable and concise operation process, and friendly software interface make it convenient for operators to learn and use.
Good compatibility can achieve system integration with monitoring systems from many
manufacturers such as Xuji, Nari, Nanzi, Dongfang Electronics, Beijing Sifang, etc. Can directly read remote signals from the monitoring system or. The five-proof system provides multiple protocols, multiple interface methods, and flexible matching with the integrated system.
Product parameter description
Main technical indicators of the product
Product configuration and introduction
1. Single station locking
Scope of application: substations, power plants, and unit-owned power plants .
Configuration (Insert the configuration picture here)
Five-proof host, five-proof system software, computer key, multi-function adapter, locks and related accessories
Implementation of functions
Microcomputer five-proof Simulation preview
Microcomputer five-proof locking operation
Primary wiring diagram design
Communication with or monitoring system (optional)
Intelligent operation ticket system (optional)
Equipment Inspection system (optional)
Microcomputer five-proof blocking multi-channel parallel operation
2. Centralized control station blocking
Scope of application When the user needs to conduct unified centralized control of the switching operations of multiple substations , and it is hoped that the number of anti-accidental locking devices should be as small as possible. It is best that one set can complete the switching operation and locking of multiple stations. The centralized control station version of the five-proof operating system can meet the user's requirements with a good cost performance. , and in the future, users can easily incorporate more substations that need to be locked into the centralized control station system with only a small investment.
Configuration (Insert the configuration picture here)
Anti-error host, laptop computer, hub, multi-function adapter, computer key lock and related accessories
Implementation functions
The main station has all The sub-station's microcomputer anti-accidental locking function
satisfies users' centralized invoicing and decentralized operations and local invoicing and local operation. Can realize multi-station parallel operation
( ) Both the main station and sub-stations have online automatic alignment function
( ) Equipped with intelligent operation ticket system (optional)
( ) Equipped with training, drills and learning Function
( ) Communication with or monitoring system (optional)
( ) Special operation modes such as maintenance operations, accident handling, and inspection operations (optional)