Lanaosheng core technology sharing - safety protection technology for electrical sockets (safety metering sockets)

1.Technical background _

The safety protection technology of electric sockets is mainly aimed at the process of connecting and disconnecting (that is, plugging and unplugging) electric loads from electric sockets to solve the problems of transient abnormality monitoring and safety protection . This technology involves the field of Internet of Things intelligent hardware equipment and measurement and control technology, especially the technical field of power signal monitoring and power safety monitoring.

With the rapid development of technologies such as wireless communications, intelligent Internet of Things, and monitoring and control, smart socket products, as a kind of intelligent hardware device, are increasingly appearing in usage scenarios such as homes, hotels, offices, industrial environments, and personal carry. Smart sockets bring many conveniences to users, such as wireless connection, remote switch, timing management and power status monitoring.

However, compared with ordinary (non-smart) sockets, the safety of smart sockets is not sufficiently guaranteed; how to use intelligent data processing technology to bring convenience to users while also improving safety and energy efficiency management. Multiple benefits are the technical key to the further popularization of smart socket products.

As a distributed power connection node, the electrical socket needs to perform frequent plugging and unplugging operations when the power load equipment is connected in and out. This is a problem for both dynamic association and binding relationship management and power safety. Is a very important link.

The electrical socket serves as a power monitoring node to monitor the power consumption period and power status of the electrical equipment, and can carry out safety warning and protection monitoring according to the plan; the system can conduct online statistics based on real-time monitoring data and segmented recording data, providing users with Provide online visual monitoring and information services based on management decision-making for improving the overall efficiency of power consumption.

The comprehensive utilization efficiency of electric energy is mainly reflected in safety, energy saving and economy. With the development of intelligent technology of the Internet of Things, power monitoring and safety monitoring management are not only oriented to power production, transmission, and distribution links, but also need to cover the entire power consumption process of distributed power nodes more broadly and deeply, based on the user-wide Monitor and monitor power load objects and terminal equipment in different power consumption scenarios.

 

2.2 Existing similar technologies have the following shortcomings in the safety protection of electrical sockets:

1) Security protection lacks pertinence and suitability for load objects: Although abnormal conditions or plans are set up through hardware or software to handle abnormal responses (such as alarms, disconnecting loads, etc.), the abnormal monitoring variables and application scope (such as abnormal Alarm, overload protection, leakage protection, etc.) lack of matching verification and performance correlation for the currently connected power load objects, resulting in a lack of pertinence of the exception response processing to the load objects.

2) Lack of security protection for the transient process of access and disconnection: The security protection of the existing technology is mainly aimed at the operation process of the electrical load, but there is a lack of more targeted action for the transient process of access (plugging and unplugging) of the load object. effective protection. For load hot plugging in special industrial environments, in order to prevent arc, special arc protection technology with an overly complex structure and extremely high cost has to be adopted.

3) Security protection lacks relevance to the target scenario: When power monitoring is performed based on the Internet of Things edge network, when the on-site environment is monitored by distributed power monitoring nodes (and uploaded to the upper host), multiple power monitoring nodes each act as Relatively independent target monitoring nodes lack necessary collaborative services, including collaborative sensing and monitoring, collaborative data processing, collaborative communication and collaborative protection; and there is a lack of collaborative dynamic adjustment of power monitoring strategies and plans for different target scenario states.

4) The balance issue between real-time and stability: Safety protection of abnormal power consumption through transient abnormal response of power signal monitoring is of great significance to improving power safety; however, existing technology has not solved it well The balance issue between the real-time performance and stability of the transient protection.

Therefore, how to use electrical sockets to be safer when connecting/disconnecting electrical loads, how to monitor electric energy based on the characteristics of electrical load objects, and how to obtain rapid response and safety protection when transient abnormalities occur have become technical issues that need to be solved urgently.

2. About the safety protection technology of Lanaosheng electrical socket (safety metering socket technology)

2.1 Technical problems solved by Lanaosheng safety metering socket technology

The technical problem to be solved by this technology is that when the power supply port of the electric socket is not connected to the electric load, it maintains a safe protection state for the electric load access, so as to improve the transient stability of the electric load object. Security; when it is detected that a load object is connected, it is verified whether the load access status meets the security matching conditions, which not only improves the security of the load object during the transient state, but also determines the load object's operating process according to the characteristics of the load object and the Status monitoring, abnormal response processing and security protection are more targeted and suitable.

2.2 Problems with defects in similar competing technologies (→see above)

3.Technical solutions

3.1 Overview

First, when the power supply port of the electric socket is not connected to the electric load, it maintains the security protection state for the electric load access. The method includes the following steps: when detecting and identifying the access of a load object, verifying the load connection Whether the entering state meets the safe matching conditions; if and only if the state meets the safe matching conditions, the power supply port is allowed to be switched to the normal power supply circuit; otherwise, when the electrical load is detected to be disconnected, all power supply ports are allowed to switch to the normal power supply circuit. The power supply port is switched to the safety protection loop.

3.2 Main technical characteristics

1) Access identification: Optionally, the safety protection state is a state in which the electric load is tentatively detected through the safety protection loop to determine whether the electric load is connected and whether it meets the safety matching. condition.

2) Protection loop: The safety protection loop refers to a loop that receives a safety detection signal when the electrical load is connected to the power supply port, including one or a combination of the following methods: 1) safety voltage, 2) high resistance and weak signal, 3) Transient abnormality protection.

3) Load matching: The safe matching conditions include object matching verification of load characteristic parameters for the connected electrical load: by detecting the load characteristic parameters, it is determined whether it is a normal load access within the set matching range. Troubleshoot abnormal load and/or abnormal access.

4) Object identification: The electric socket, as an electric energy monitoring node, performs object matching verification on the object identification signal sent by the object identification tag bound to the electric load object to determine whether it meets the safety matching conditions.

5) Transient protection: The safety protection includes transient abnormality protection based on critical abnormal response: the electrical socket is used as a target monitoring node, and through real-time tracking processing and critical feedback monitoring, when a certain power signal state variable is transient When the impact amount reaches or exceeds the preset reference value or rating value, the transient abnormality protection is triggered on the power supply circuit in advance.

Secondly, a safety protection device for an electric socket based on this technology. The device is included in the electric socket so that the power supply port maintains access to the load object when the power supply port is not connected by the electric load. In the safety protection state, the device includes the following modules: loop signal coupling module: performs signal coupling on different loops to connect or disconnect the load object; safety monitoring control module: when it is detected that a load object is connected, Verify whether the load access status meets the safety matching conditions, and output the corresponding switching control signal; the loop switching execution module: switches the power supply port to the safety protection loop or the normal power supply loop according to the switching control signal.

6) Signal coupling: The loop signal coupling module includes signal coupling between the normal power supply loop and the safety protection loop, and obtains the coupling signal through a reusable access coupling unit in a direct or indirect pre-coupling manner. , input the coupling signal to the safety monitoring control module.

7) Safety monitoring: The safety monitoring control module includes a signal front-end processing module. The signal front-end processing module is based on the signal coupling adjustment unit and/or the critical feedback monitoring unit to obtain the power signal collection information corresponding to the current power load.

8) Object matching: The security monitoring control module also includes a target monitoring processing module, which verifies whether the load access status meets the security matching conditions based on the object matching verification unit.

 

4.Technical effects

4.1 Technical issues solved

According to this technology, the wireless cooperative sensing node receives the trigger state beacon with higher activity sent by the front sensing node, thereby improving the trigger response speed and reliability; it performs state transition identification based on the extracted trigger state identifier, thereby It improves the judgment efficiency of trigger response and avoids invalid repeated response processing; through scene state analysis method selection and data reuse, higher analysis calculation efficiency is obtained, so that when the scene state jumps, the scene trigger response can be obtained quickly. Therefore, compared with the existing technology, this technology has significantly improved the collaborative sensing service in the edge domain of wireless Internet of Things in terms of trigger response speed, wireless interoperability efficiency, sensing service capability and flexibility.

4.2 Technical effects

This technology solves the problems of collaboration, reliability and flexibility of the wireless scene sensing process through the interoperability mechanism of wireless trigger response. It has the beneficial effects of fast trigger response, normal low power consumption and high analysis and processing efficiency, which is specifically reflected in The following aspects:

1) Fast trigger response and high reliability: During the triggering transient, the front-end sensing node sends trigger status beacons with higher activity and higher-priority wireless transmission data, so that the collaborative sensing node can quickly , Reliably obtain pre-trigger response;

2) Normal low power consumption and reduced wireless interference: after the triggering transient, the front-end sensing node turns off the triggering state based on smooth response reception or time effect; in the non-triggering state (normal), the status beacon is inactive or ultra-low The power consumption state is conducive to normal low power consumption and reduces wireless interference and channel resource occupation;

3) Save the data processing power of collaborative sensing and improve the efficiency of analysis and calculation: avoid repeated processing of the same pre-trigger through state transition recognition; reduce unnecessary processing through the selection of scene state analysis methods (reuse, iteration and superposition) Analyze computing power overhead;

3) According to sensitivity priority, monitoring data processing efficiency is high: priority processing and uploading according to sensitive status changes; reducing (or non-prioritizing) unnecessary data redundancy (already uploaded without valid status changes), for the real-time location of the target object , status change monitoring and data upload processing, with higher collaborative data processing efficiency;

4) Relevance and flexibility of scene state: Based on the analysis of multiple target state variables according to data structures or functions, the scene state analysis and trigger response are more relevant and transitive (including from local to whole, time accumulation) and flexibility (such as priority, scene trigger conditions, etc.) and combined judgment for multiple scenes;

5) Network equipment resources are highly reusable: collaborative sensing nodes can be a service role, and sensing nodes of different topology types (such as target, relay or center) in the edge domain can dynamically reuse roles (based on time-sharing switching or configuration); not only dedicated wireless network service nodes (gateways, base stations), but also other application nodes (smart sockets, smart lighting nodes, power monitoring nodes) can be used as collaborative sensing nodes;

6) Good collaboration and strong coverage: Collaborative sensing nodes provide collaborative services to surrounding target sensing nodes based on pre-sensing triggers and task mechanisms; according to the scene state analysis algorithm, different priorities and effective persistence are provided for different pre-triggers Variable tracking calculation of the device;

7) Collaborative service capabilities of application-oriented edge collaborative computing: Collaborative sensing nodes not only provide wireless network communication services, but also provide collaborative data processing for edge collaborative computing for sensing monitoring applications (such as positioning tracking, energy monitoring, lighting control) Service capabilities;

8) Strong collaborative and concurrent service capabilities: Collaborative sensing nodes provide concurrent services to target object devices through target multi-selection information, and can simultaneously control several front-end sensing nodes as object devices, including synchronous multi-selection control, collaborative synchronization response, and status feedback monitoring and other processes, with higher data process management efficiency;

9) Convenient network configuration: The wireless scene awareness system is established by a certain wireless management node (such as mobile phone, computer, gateway) by initiating multi-mode wireless distribution network; through synchronized network distribution, automatic multi-selection matching, network installation and configuration are simple Flexible, fully automatic network distribution;

10) Network self-healing ability and high stability: Multi-node collaborative service data transmission is an elastic data path, with dynamic balance, selectivity and redundancy, better network self-healing ability, and thus higher Stability, reliability and offline (disconnected) processing capability.

Guess you like

Origin blog.csdn.net/almsound/article/details/130625517