I. Introduction
The traditional two-ticket operation method mainly relies on manual filling and auditing, and the limitations of the traditional method gradually appear with the increase in the number of power grid equipment and the complexity of operation. These limitations include cumbersome operation process, high manual error rate, low efficiency and difficulty in real-time monitoring and management. If personal information is not properly protected, either legitimate users may be declined to access the system, or some adversaries can steal the password to access the system [1].