CN102034289A - Graphical programmable security linkage system - Google Patents

Graphical programmable security linkage system Download PDF

Info

Publication number
CN102034289A
CN102034289A CN2010105904413A CN201010590441A CN102034289A CN 102034289 A CN102034289 A CN 102034289A CN 2010105904413 A CN2010105904413 A CN 2010105904413A CN 201010590441 A CN201010590441 A CN 201010590441A CN 102034289 A CN102034289 A CN 102034289A
Authority
CN
China
Prior art keywords
interlock
module
linkage
bytecode
script
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010105904413A
Other languages
Chinese (zh)
Other versions
CN102034289B (en
Inventor
周立功
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Zhiyuan Electronics Co Ltd
Original Assignee
Guangzhou Zhiyuan Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Zhiyuan Electronics Co Ltd filed Critical Guangzhou Zhiyuan Electronics Co Ltd
Priority to CN2010105904413A priority Critical patent/CN102034289B/en
Publication of CN102034289A publication Critical patent/CN102034289A/en
Application granted granted Critical
Publication of CN102034289B publication Critical patent/CN102034289B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Programmable Controllers (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides a graphical programmable security linkage system applied to the field of security and used for setting and executing linkage. The traditional security linkage system includes node linkage and event linkage, wherein the node linkage aims at nodes only and has weak functions; and in the event linkage, the linkage can be triggered by events only, the conditions have no inclusive OR relationship and the functions are limited and not flexible enough. The graphical programmable security linkage system is mainly characterized in that parameters can be set for each pixel by using pixels to express the linkage condition and action, which is simple and direct; the inclusive OR relationship among the pixels can be set by dragging the pixels so as to conveniently express a complex linkage logic relationship, which is flexible and high-efficient; and the graphical programmable security linkage system supports action delayed execution, condition triggering time setting and timer function, thereby having strong functions. The invention also defines a scripting language used by users; the scripting language is popular and easy to understand, is expressive and can be used for describing linkage in a means of expression close to a natural language; and when used for setting extremely complex linkage, the scripting setting is rapider and more flexible.

Description

A kind of graphical security protection linked system able to programme
Technical field
The present invention relates to technical field of security and protection, refer in particular to a kind of patterned security protection linked system able to programme.
Background technology
Along with the competition in market is more and more fierce, the security protection industry is also progressively to scale, standardization development.In numerous security products, video monitoring, gate inhibition, three series products of burglar alarm are most important, any one high-level security protection project, and this three is absolutely necessary.This three is combined, unified management, no matter to engineering merchant's construction, maintenance work, still the use to the user all can reduce complexity greatly, and the performance system is high-level efficiency more.This integrated, integrated also is the megatrend of security protection industry development.
All integrated this three bulk of product of existing many safety-protection system provider, except unified management, the difficult point of integrated security protection maximum is seamless integrated, interlock is captured such as swiping the card, the interlink warning function of swiping the card just needs each subsystem to link mutually, if bad between each subsystem, the result of use of integrated safety-protection system will be cut down greatly in conjunction with getting.In safety-protection system, what subsystems such as video monitoring, gate inhibition, burglar alarm were combined is exactly linked system.Linked system is provided with under various extraneous circumstances trigger, and connecting each other and moving of each subsystem is to be the tie of an organic whole with system in combination.Linked system all comprises software that interlock is set and the hardware device of carrying out interlock.Software is mainly done the setting of interlock and the management of a plurality of interlocks, and hardware device mainly is an access controller, and access controller can remove to control each subsystem when carrying out interlock and make corresponding actions.
In general existing linked system has 2 kinds.A kind of is the node interlock, and this interlock can only be at the node setting, and trigger condition and output action all must be nodes, can only trigger according to the node variable condition, and the function of being finished is very limited.Such as picture " dead card is swiped the card ", conditions such as " illegally opening the door " just can't link by node and realize.
Another kind is the incident interlock of widely using now, this interlock use incident is come trigger action, can finish more multiple trigger condition, but in the interlock incident can only be arranged, between the incident not with or relation, can not express complicated logic, the user must split into the interlock of complexity simple single interlock when interlock is set, strengthened workload.And the software setting interface of tradition interlock all is that parameter (as shown in Figure 3) is set in window control, and expression way is directly perceived inadequately, an interlock once can only be set, inefficiency.
Existing linked system or function are too simple, or use is easy inadequately, therefore need a kind of powerful and succinct method intuitively describe complicated interlock.The security protection linked system a kind of graphical able to programme that the present invention proposes, it is a kind of method that is applied in the safety-security area setting and carries out interlock, graphically be embodied in the native system all conditions and action all is to represent with pel, programmable features is embodied in the DLL (dynamic link library) that native system provides, and the user can be provided with interlock by the mode of compile script program.
Summary of the invention
1. general introduction
The present invention proposes a kind of graphical security protection linked system able to programme.It is characterized in that representing interlock condition and action, interlock is set with the form of pel with the form of pel.Advanced level user also provides the mode with compile script that interlock is set for convenience.
Fig. 1 has represented from drawing the whole implement process of interlock figure to hardware trigger.As shown in Figure 1, native system comprises interlock figure editor module, compiling of instruction module, script editor module, and script compile module, data dump module, bytecode interpreter, interlock condition are checked module and interlock action execution module.Bytecode interpreter wherein, interlock condition check that module and interlock action execution module are the software modules that operates on the access controller.
Fig. 2 has represented the flow process that system uses, the newly-built interlock of user as shown in Figure 2, use interlock figure editor module or script editor module to write the interlock content then, whether the systems inspection content is legal, if it is legal then be converted into bytecode, and store database into, and download to then in the access controller, carry out by access controller.Concrete steps are as described below:
When interlock being set in the pel mode, the user with the newly-built interlock earlier of interlock figure editor module, by pulling or double-click the pel item, is added to editing area with pel earlier, an interlock will have a condition and an action at least, but condition and action all do not have the quantity upper limit.By drag pel be provided with between condition with or relation, thereby realize complicated arbitrarily logic, double-click the parameter that pel can be provided with the conditioned disjunction action.After interlock figure editor module inspection interlock is legal, by the compiling of instruction module interlock is compiled into bytecode, the data dump module stores bytecode database into and downloads to access controller.
For some advanced level user, native system also provides the mode of compile script that interlock is set.With respect to the mode that drags pel,,, use the mode of Script Programming more flexible for those very complicated interlocks are set though compile script is so not easy to be directly perceived.The user can finish writing script at the script editor module, preserves then, and the script compile module will become bytecode with script compile, and the data dump module stores bytecode database into and downloads to access controller.
Bytecode interpreter in the access controller receives bytecode and is converted into the interlock data, the interlock condition checks that module receives the interlock data, and go the inspection condition whether to take place according to these data, the generation if having ready conditions, then carry out corresponding interlock action by interlock action execution module, if there is not condition to take place, then continue to check.
2. module is introduced in detail
Introduce the composition and the working method of each module in the implementation procedure below in detail.
Interlock figure editor module: comprise interlock page management window, toolbar, pel editing area.The page management window that wherein links is a Tree control, and each tree node is exactly an interlock page or leaf, and the user can carry out operations such as additions and deletions change to the interlock page or leaf; Comprised a plurality of conditions and action in the toolbar, the user can be added to editing area with pel by pulling or double-click left mouse button.
The pel editing area is used to draw interlock figure, and the user can drag in editing area, duplicates, and shears, and pastes, and pel operation just now can also be cancelled and recover to the deletion pel.Double-click the pel icon or select the right button attribute menu all can eject the properties dialog of pel, the user can conveniently be provided with the attribute of this pel.The user as long as mouse is rested on a bit of time on this pel, will eject a prompting window if check this primitive attribute, and the inside has been listed as every attribute that has been provided with of this pel, and is clear, and behind the rolling mouse, prompt window can disappear.
Following mask body is introduced the implication of each condition:
◆ incident: refer to can triggering system extraneous movable.Modal have dead card to swipe the card, and door magnetic is opened etc.Incident can be added deletion arbitrarily in native system.
◆ the time period: scope sometime.Such as being provided with sometime in the section, all cards are swiped the card and are not opened the door.Time period can time-division appointed day, can also specify festivals or holidays.
◆ door state: the state of doors.Such as often open, normally closed, the card encryption sign indicating number, card adds APB rule etc.
◆ input node: the node that receives input.Can connect various input equipments on this node.Such as various sensors.
◆ output node: the node of output signal.Can connect various output devices on this node, such as add that relay controls the switch of electric lock.
◆ cloth is withdrawn a garrison: can arrange or cancel warning at various nodes.If arrange warning at certain input node, just deploy troops on garrison duty, when this input node is checked through unusual condition, will links and move so; If cancel warning, just withdraw a garrison, even this input node is checked through unusual condition so, can not remove trigger action yet.
◆ card number: card number condition support card group and card number scope.The card group is exactly that each card number can be specified arbitrarily in the group with the card number grouping, and each group is treated with a certain discrimination.The card number scope then is to specify one group of card that card number is continuous.Do like this can be convenient, flexible the setting interlock of swiping the card and producing at some card number.
◆ comparer: compare certain conditional number of times.Just can open the door for 3 times such as swipe the card in a certain limiting time, at this moment comparer just can use.
◆ timer: limiting certain condition must take place within a certain period of time.Must in 5 seconds, finish for 3 times such as swipe the card.Pressing down is the implication of each action:
◆ output node: output node both can be used as condition, also can be used as action.Such as in the doors interlocking, opening of certain doors triggers closing of another doors, and condition and action all are output nodes here.
◆ the door state: the door state both can be used as condition, also can be used as action.
◆ cloth is withdrawn a garrison: the cloth condition that both can be used as of withdrawing a garrison also can be used as action.
◆ time-delay: i.e. action is carried out in time-delay.Open the door such as swipe the card, can set for swipes the card confirm to pass through after, gate delay was just opened after 20 seconds.
◆ timer: limiting certain action must take place within a certain period of time.
◆ card lost efficacy: this action was lost efficacy card.Open the card reported the loss such as have, found to swipe the card by other people and open the door, system can be when swiping the card is this holding invalid.
◆ card reader display text: can be set in display text on the card reader.After swiping the card, on card reader, show information such as welcome.
◆ send order: an order is set in this action.This order is used to operate the specific serial equipment that user oneself adds, and the user can oneself design and explosion command.System can send to this order user's equipment automatically by serial ports when carrying out interlock.This also is the important embodiment of characteristics able to programme in the native system.
The compiling of instruction module: comprise that interlock figure checks module and modular converter, interlock figure checks that the output of module is connected to modular converter.Interlock figure checks whether the logical relation of module check interlock expression is legal, and whether each pel all has been provided with parameter; Modular converter will be converted to a cover bytecode by the interlock of checking.
Bytecode is irrelevant with particular hardware, is a kind of code of artificial definition.Use the benefit of bytecode to mainly contain two: the one, make things convenient for software transplanting to different types of access controller; The 2nd, explain when carrying out bytecode, need not all script be recompilated once at every turn, save resource.
The compiling of instruction module is gone the interlock of checking that the user has set, if check and pass through, then this interlock is converted to bytecode, and bytecode is issued the data dump module.
The script editor module: the user uses this module compile script.This module provides highlighted key word, capable automatically indentation, and functions such as intelligent prompt can improve input efficiency.
The script compile module: the script compile device carries out the syntax and semantics inspection to the script that the user writes, if by after checking, script is translated as the bytecode of mentioning in the above-mentioned compiling of instruction module, and bytecode is issued the data conversion storage module.
Data dump module: data are transmitted and stored.This module is mainly done two work, and the one, store the bytecode of compiling of instruction module or script editor module output into database; The 2nd, these bytecodes are downloaded to access controller.
After access controller is received the bytecode that the software processes unit sends over, at first explain bytecode, wherein interlock condition, interlock action and the relation of the two is filled in the form that defines by bytecode interpreter.Bytecode interpreter is a finite-state automata based on stack, has used two stacks to do computing, fills in the form of storage interlock according to operation result.Bytecode leaves the code area in, and the intact bytecode of the every explanation of interpreter just reads next bar from the code area, and with the address that a register writes down next bar bytecode, circulation running like this, whole bytecodes are all explained and finished up to the code area.Ensuing work just checks module by the interlock condition and the action execution module that links has been finished.
Interlock condition inspection module is responsible for the inspection of condition, has three kinds of test modes.A kind of is the inspection of flip-over type condition, such as this unexpected incidents of swiping the card can produce an interruption after the system responses, and notice interlock condition inspection module goes to check each condition, if condition meets, just carries out respective action by interlock action execution module.Second kind is the inspection of automatic regular polling state, such as certain interlock is that a state triggers another output node when being in normally open and opens, often opening is a kind of lasting state, therefore can continue the generation of trigger action, so the interlock condition is checked module and can regularly be removed the state of this doors of poll, if condition meets, just go to trigger to carry out and move.The third is quantitative check, this inspection mainly is the interlock that is used in have ready conditions timer or action timer, check that module can go to check condition or action every a period of time, the difference of itself and second kind of inspection is to be to be set by timer running time between inspections.
The execution of interlock action execution module compound action if the interlock condition is checked module check to the generation of having ready conditions, will be called interlock action execution module and carry out corresponding action.If be not checked through the generation of having ready conditions, then continue to check.
3.ACScript script
In the present invention, important innovation part just has been to use script to go to write interlock, and we are with this script called after ACScript (Access Control Script gate inhibition script).ACScirpt is a kind of popular easy-to-use script, provides multiple key word to represent operation common among the gate inhibition, and rich data type type is represented the various device in the gate control system, can describe the interlock content in a kind of mode near natural language.Just introduce data type, key word and the basic syntax of this script below.
ACScript is the language of case sensitive, and first letter of data type all is capitalization, and key word all is a small letter, and the variable name can only be the combination of letter and number, and can not take the lead with numeral.Basic data type is as shown in the table:
Basic data type Explanation
Device Be used to describe hardware control
Door Be used to describe the subset of hardware control
Node Be used for the node under the descriptor equipment, for example, door magnetic, auxiliary input etc.
Card Be used to describe the card that the user uses, a Card object can comprise a plurality of card numbers
The ACScript key word is many, basically common actions in the interlock is all comprised to come in, and makes more horn of plenty of language expression ability like this.All key word is as shown in the table:
Figure BSA00000387220300052
Figure BSA00000387220300061
The grammer of ACScript is very simple, has only several rules.As follows:
1. use alignment and indentation to represent code block.Each interlock all will be placed in the code block that begin and end key word comprised.
2. every row is exactly a code, need not line-end symbol.
3. each initialization of variable all is to use braces, in the bracket is to want initialized content.
4.begin key word will match with the end key word, the if key word will match with end if key word.
Innovation part of the present invention is:
1. described a kind of graphical security protection linked system able to programme is provided with interlock in patterned mode, compares the tradition interlock and just in the window control parameter is set, and is convenient directly perceived.
2. described a kind of graphical security protection linked system able to programme, between the support condition with or the relation, a plurality of interlocks can once be set, reduced workload, improved work efficiency, and between traditional interlock condition not with or relation, once only so that an interlock, inefficiency to be set.
3. described a kind of graphical security protection linked system able to programme supports action delay to carry out, and the condition triggering times is set, and timer etc. are powerful.
4. described a kind of graphical security protection linked system able to programme support in the mode of compile script interlock to be set, and this script is easy-to-understand, uses simply, can realize the function that the user wants flexibly.
Description of drawings
Fig. 1 is a structured flowchart of the present invention
Fig. 2 is program flow diagram of the present invention (not comprising the hardware handles part)
Fig. 3 is the figure that is provided with of traditional linkage technique
Fig. 4 is provided with figure for interlock of the present invention
Fig. 5 is a script editor module surface chart of the present invention
Embodiment
As shown in Figure 2, using first step of the present invention is newly-built interlock.
The user clicks " newly-built " button that is provided with on the interface (as shown in Figure 4), can eject a dialog box, fills interlock page or leaf title on this dialog box, chooses the controller of carrying out interlock, by determining.So new interlock page or leaf has just been built up, and the interlock page management device (Tree control on the left side shown in Figure 4) on the left side, interface can demonstrate newly-built interlock page or leaf node.
At this moment three lines can appear in interlock page or leaf editing area.Article one, be vertical green sub secant, it shows that on this line left side be criteria range, and the right is an operating space; Article one, be the axis of level, it is the condition main axis, is used for placing condition diagram element; Also have a vertical axis on the cut-off rule right side, it is the action main axis, is used for placing the action pel.
Now interlock figure editing process of the present invention is described with a concrete example.
Suppose that there is an important warehouse in certain cause unit, this warehouse is the controller monitoring of 192.168.5.66 by IP, adorned individual cigarette propagated sensation sensor below the controller, the staff enters the warehouse with swiping the card, if cigarette propagated sensation sensor detects the inside dense smoke is arranged, then swipe the card and can not open the door, will set card number now and be respectively two cards of 12345 and 66688 and can swipe the card at door 1 and open the door, this interlock setting up procedure is as follows:
At first find the card number condition in toolbar (toolbar on the right shown in Figure 4) lining on right side, interface, comprised a plurality of conditions and action item in this toolbar, each project all has specific function.The user can click this card number project, also can drag to pel editing area (the picture window of centre shown in Figure 4), and this pel can be positioned on the main axis.
And then pull a card number condition to the clear area of editing area, editing area can generate an axis, is connected to the back of first card number condition, and second card number condition is put on this axis, this show these two conditions be mutually or relation.
Pull a node initial conditions once more to main axis, and then double-click the output node in the toolbar action items, at this moment the output node pel just has been placed on the action axis.
At this time all there is a caution symbol in each pel lower right corner, shows that pel also is not provided with parameter.Double-click two card number pels successively, in pop-up box, fill in 12345 and 66,688 two card numbers successively.Double-click the node input primitive, the node that finds cigarette propagated sensation sensor to be connected in pop-up box is selected alarm condition.In the action output node, select to carry out the controller of action at last, the doors that setting will be opened.After pel set parameter, the caution symbol in the lower right corner will disappear, and showed that pel filled in parameter.
What deserves to be mentioned is that when selecting interlock action implementation controller can select in the gate control system arbitrarily controller to carry out action, the controller that current foundation interlock is selected can send message to other controllers, notify their execution.
By above-mentioned steps, just finished the setting of this interlock.Click the save button on Fig. 4, interlock figure checks that module will go to check the legitimacy of current interlock, if check and do not pass through, program can point out when the interlock of pre-editing also wrong.After inspection was passed through, the compiling of instruction module can be compiled as interlock bytecode and give the data dump module, and the data dump module can store bytecode into database, and downloads to access controller.
It is 12345 or 66688 card when swiping the card that access controller is checked through card number, will go to check whether sensor states is normal, if normal, then removes to open the door in warehouse; If report to the police, then can not remove to open the door in warehouse.
Can certainly interlock be set by the mode of compile script.Click the compile script button on Fig. 4, can eject a window (as Fig. 5), Here it is script editor module.4 buttons are arranged on this window, be respectively newly-built, open, compile, preserve.Middle white space is the code editing area, and the user is input code here, and the bottom is an output area, is used for showing the mistake that occurs in compiling or the preservation process.
The scripted code of this example is:
begin“Linkage2”
Device?dev{“192.168.5.66”}
Node nod=dev.GetNode(“smoke”)
Card c{12345,66688}
if(swipe?c?on?dev.door1)and(not?nod.isAlarm)then
open?dev.door1
end?if
end
After editing area is imported above-mentioned code, put the compiling button among Fig. 5 then, the meeting display result of tabulating below is if compile error can be listed mistake.After the compiling, put the save button among Fig. 5 again, the data dump module will be saved in bytecode database and now be downloaded to access controller.At this moment how the seeds on the left side have also understood a node among Fig. 4, and nodename is exactly Linkage2, shows that you have created an interlock.From top code as can be seen, ACScript is easy-to-understand, uses simple.For advanced level user, when complicated the interlock was set, use ACScirpt can more flexible realization design idea.
Therefore above-mentioned example can not produce limitation just for use-pattern of the present invention is described, the user can do more, more complicated interlock setting.

Claims (3)

1. graphical security protection linked system able to programme, it is characterized in that system checks that by interlock figure editor module, compiling of instruction module, script editor module, script compile module, data dump module, bytecode interpreter, interlock condition module and interlock action execution module form, support is to scheme n-ary form n and the script form of writing is provided with interlock.
2. a kind of graphical security protection linked system able to programme according to claim 1 is characterized in that the job step that use figure n-ary form n is provided with interlock is as follows:
(1) uses the newly-built interlock of interlock figure editor module, drag pel to the pel editing area;
(2) between pel editing area editor pel with or relation, and the pel parameter is set, a plurality of interlocks can once be set;
(3) whether interlock figure editor module inspection interlock is legal, do not conform to rule prompting user's modification;
(4) if legal, then interlock is compiled as bytecode by the compiling of instruction module;
(5) by data dump module stores and download bytecode;
(6) bytecode interpreter receives bytecode and is converted into the interlock data;
(7) interlock condition checks that module receives the interlock data, and checks whether the interlock condition takes place;
(8), then carry out corresponding interlock action by interlock action execution module as the generation of having ready conditions; Then do not continue to check as having.
3. a kind of graphical security protection linked system able to programme according to claim 1 is characterized in that, the job step that the use script form of writing is provided with interlock is as follows:
(1) uses script editor module compile script program and preservation;
(2) the script compile module receives program and compiles it as the bytecode form;
(3) by data dump module stores and download bytecode;
(4) bytecode interpreter receives bytecode and is converted into the interlock data;
(5) interlock condition checks that module receives the interlock data, and checks whether the interlock condition takes place;
(6), then carry out corresponding interlock action by interlock action execution module as the generation of having ready conditions; Then do not continue to check as having.
CN2010105904413A 2010-12-15 2010-12-15 Graphical programmable security linkage system Active CN102034289B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105904413A CN102034289B (en) 2010-12-15 2010-12-15 Graphical programmable security linkage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105904413A CN102034289B (en) 2010-12-15 2010-12-15 Graphical programmable security linkage system

Publications (2)

Publication Number Publication Date
CN102034289A true CN102034289A (en) 2011-04-27
CN102034289B CN102034289B (en) 2013-03-27

Family

ID=43887138

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105904413A Active CN102034289B (en) 2010-12-15 2010-12-15 Graphical programmable security linkage system

Country Status (1)

Country Link
CN (1) CN102034289B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049954A (en) * 2012-12-27 2013-04-17 福州福大自动化科技有限公司 Graphic control strategy configuration method for door control system
CN103390212A (en) * 2013-06-27 2013-11-13 武汉数阵信息集成技术有限公司 Coal mine safety management system and method
CN103744657A (en) * 2013-12-23 2014-04-23 北京恒泰实达科技股份有限公司 Plan linkage application information display system and method
CN103777952A (en) * 2014-01-24 2014-05-07 深圳英飞拓科技股份有限公司 Security and protection matrix method based on macro-programming control
CN104820600A (en) * 2015-05-13 2015-08-05 广州市优泰安防技术有限公司 Security linkage system
CN104820601A (en) * 2015-05-13 2015-08-05 广州市优泰安防技术有限公司 A security and protection linkage method
CN104932330A (en) * 2015-05-13 2015-09-23 广州市优泰安防技术有限公司 Security linkage platform
CN106094779A (en) * 2016-08-30 2016-11-09 成都市卓思德禄智能科技有限公司 Intelligent comprehensive security protection control system
CN106814629A (en) * 2015-11-27 2017-06-09 大唐移动通信设备有限公司 A kind of method and device of control smart home
CN107093242A (en) * 2017-05-09 2017-08-25 广东履安实业有限公司 A kind of system of editable gate inhibition event linkage
CN108334355A (en) * 2017-09-19 2018-07-27 济南汇通远德科技有限公司 A kind of digital factory basic application platform
CN109976286A (en) * 2019-04-25 2019-07-05 南京三宝弘正视觉科技有限公司 Utilize the sensor signal linkage of network and simulation system
CN110908647A (en) * 2019-11-29 2020-03-24 苏州精易会信息技术有限公司 Object variable presenting method, device, terminal and storage medium for building block programming
CN111367613A (en) * 2020-03-18 2020-07-03 杭州和利时自动化有限公司 Event triggering system and method, electronic equipment and storage medium
CN111562910A (en) * 2020-05-08 2020-08-21 上海泛微网络科技股份有限公司 Packaging method and related equipment
CN113553094A (en) * 2020-04-24 2021-10-26 深圳市中兴系统集成技术有限公司 Method for configuring linkage rules of graphical rail transit security and protection integrated platform

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040025048A1 (en) * 2002-05-20 2004-02-05 Porcari Damian O. Method and system for role-based access control to a collaborative online legal workflow tool
CN101141348A (en) * 2007-09-20 2008-03-12 成都方程式电子有限公司 Intelligent domestic system and safety implementing method
CN101419548A (en) * 2007-10-26 2009-04-29 娄健 Programmable scheme auto-generating method for synthesis safety protection command system
CN201535940U (en) * 2009-08-11 2010-07-28 王晓庆 Control device for video linkage monitoring and alarming
CN101794206A (en) * 2010-03-11 2010-08-04 深圳市同洲电子股份有限公司 Method and system for segmenting window

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040025048A1 (en) * 2002-05-20 2004-02-05 Porcari Damian O. Method and system for role-based access control to a collaborative online legal workflow tool
CN101141348A (en) * 2007-09-20 2008-03-12 成都方程式电子有限公司 Intelligent domestic system and safety implementing method
CN101419548A (en) * 2007-10-26 2009-04-29 娄健 Programmable scheme auto-generating method for synthesis safety protection command system
CN201535940U (en) * 2009-08-11 2010-07-28 王晓庆 Control device for video linkage monitoring and alarming
CN101794206A (en) * 2010-03-11 2010-08-04 深圳市同洲电子股份有限公司 Method and system for segmenting window

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049954B (en) * 2012-12-27 2016-04-06 福州福大自动化科技有限公司 The graphical control strategy configuration method of gate control system
CN103049954A (en) * 2012-12-27 2013-04-17 福州福大自动化科技有限公司 Graphic control strategy configuration method for door control system
CN103390212A (en) * 2013-06-27 2013-11-13 武汉数阵信息集成技术有限公司 Coal mine safety management system and method
CN103744657A (en) * 2013-12-23 2014-04-23 北京恒泰实达科技股份有限公司 Plan linkage application information display system and method
CN103744657B (en) * 2013-12-23 2017-08-04 北京恒泰实达科技股份有限公司 The application message display systems and method of a kind of prediction scheme linkage
CN103777952A (en) * 2014-01-24 2014-05-07 深圳英飞拓科技股份有限公司 Security and protection matrix method based on macro-programming control
CN103777952B (en) * 2014-01-24 2017-07-28 深圳英飞拓科技股份有限公司 The method that security protection matrix is controlled based on macroprogramming
CN104820601A (en) * 2015-05-13 2015-08-05 广州市优泰安防技术有限公司 A security and protection linkage method
CN104820600B (en) * 2015-05-13 2018-04-03 广州市优泰安防技术有限公司 A kind of security linkage system
CN104820601B (en) * 2015-05-13 2018-04-06 广州市优泰安防技术有限公司 A kind of security protection interlock method
CN104932330A (en) * 2015-05-13 2015-09-23 广州市优泰安防技术有限公司 Security linkage platform
CN104820600A (en) * 2015-05-13 2015-08-05 广州市优泰安防技术有限公司 Security linkage system
CN104932330B (en) * 2015-05-13 2017-12-29 广州市优泰安防技术有限公司 A kind of security protection linkage platform
CN106814629A (en) * 2015-11-27 2017-06-09 大唐移动通信设备有限公司 A kind of method and device of control smart home
CN106094779A (en) * 2016-08-30 2016-11-09 成都市卓思德禄智能科技有限公司 Intelligent comprehensive security protection control system
CN107093242A (en) * 2017-05-09 2017-08-25 广东履安实业有限公司 A kind of system of editable gate inhibition event linkage
CN108334355A (en) * 2017-09-19 2018-07-27 济南汇通远德科技有限公司 A kind of digital factory basic application platform
CN109976286A (en) * 2019-04-25 2019-07-05 南京三宝弘正视觉科技有限公司 Utilize the sensor signal linkage of network and simulation system
CN110908647A (en) * 2019-11-29 2020-03-24 苏州精易会信息技术有限公司 Object variable presenting method, device, terminal and storage medium for building block programming
CN110908647B (en) * 2019-11-29 2023-10-27 苏州精易会信息技术有限公司 Building block type programmed object variable presenting method, device, terminal and storage medium
CN111367613A (en) * 2020-03-18 2020-07-03 杭州和利时自动化有限公司 Event triggering system and method, electronic equipment and storage medium
CN113553094A (en) * 2020-04-24 2021-10-26 深圳市中兴系统集成技术有限公司 Method for configuring linkage rules of graphical rail transit security and protection integrated platform
CN111562910A (en) * 2020-05-08 2020-08-21 上海泛微网络科技股份有限公司 Packaging method and related equipment

Also Published As

Publication number Publication date
CN102034289B (en) 2013-03-27

Similar Documents

Publication Publication Date Title
CN102034289B (en) Graphical programmable security linkage system
CN105938358B (en) Safety relay config editor
Agrawal et al. Semantic translation of simulink/stateflow models to hybrid automata using graph transformations
Olsen Systems engineering using SDL-92
US11385613B2 (en) Process image within controllers enabling visibility and accessibility of real world objects
CN106383456A (en) A method and a man-machine interface
Cimatti et al. Formal verification of a railway interlocking system using model checking
CN103810233A (en) Content management
CN102460380A (en) Utilizing spreadsheet user interfaces with flowsheets of a cpi simulation system
CN102693127B (en) Data-driven schema for describing and executing management tasks in a graphical user interface
Silva On the history of discrete event systems
US20130198493A1 (en) Systems and methods that facilitate management of add-on instruction generation, selection, and/or monitoring during execution
US20170300305A1 (en) Executable guidance experiences based on implicitly generated guidance models
CN103810232A (en) Content management
CN104503737B (en) Unified modeling platform
Pasquini et al. Modeling safety-critical systems with Z and Petri nets
Berthomieu et al. Model-checking real-time properties of an aircraft landing gear system using fiacre
Wen et al. Using composition trees to model and compare software process
CN104932330B (en) A kind of security protection linkage platform
Bastide et al. Integrating rendering specifications into a formalism for the design of interactive systems
CN110020767A (en) Intervene the automatically coherent property inspection method after the workflow based on BPMN executes manually
CN102915403A (en) Visualization graph edition configuration method for equipment parameters of computer platform
CN104820601B (en) A kind of security protection interlock method
Stoiber et al. Feature unweaving: Refactoring software requirements specifications into software product lines
Wang et al. Component‐Based Formal Modeling of PLC Systems

Legal Events

Date Code Title Description
DD01 Delivery of document by public notice

Addressee: Liu Jing

Document name: Notification of Passing Preliminary Examination of the Application for Invention

C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 2 building, 7 floor, Huang Zhou Industrial Zone, Che Po Road, Guangdong, Guangzhou, Tianhe District 510660, China

Applicant after: GUANGZHOU ZHIYUAN ELECTRONICS Co.,Ltd.

Address before: 2 building, 7 floor, Huang Zhou Industrial Zone, Che Po Road, Guangdong, Guangzhou, Tianhe District 510660, China

Applicant before: GUANGZHOU ZHIYUAN ELECTRONICS Co.,Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: Room 517, 1023 Gaopu Road, Tianhe Software Park, Tianhe District, Guangzhou City, Guangdong Province

Patentee after: GUANGZHOU ZHIYUAN ELECTRONICS Co.,Ltd.

Address before: 510660 2/F, 7 buildings, Chepi Road Huangzhou Industrial Zone, Tianhe District, Guangzhou City, Guangdong Province

Patentee before: GUANGZHOU ZHIYUAN ELECTRONICS Co.,Ltd.

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 510000 room 306, 3rd floor, 43 Sicheng Road, software park, Tianhe District, Guangzhou City, Guangdong Province

Patentee after: GUANGZHOU ZHIYUAN ELECTRONICS Co.,Ltd.

Address before: Room 517, 1023 Gaopu Road, Tianhe Software Park, Tianhe District, Guangzhou City, Guangdong Province

Patentee before: GUANGZHOU ZHIYUAN ELECTRONICS Co.,Ltd.