CN104820601A - A security and protection linkage method - Google Patents

A security and protection linkage method Download PDF

Info

Publication number
CN104820601A
CN104820601A CN201510244301.3A CN201510244301A CN104820601A CN 104820601 A CN104820601 A CN 104820601A CN 201510244301 A CN201510244301 A CN 201510244301A CN 104820601 A CN104820601 A CN 104820601A
Authority
CN
China
Prior art keywords
instance
parameter
trigger instance
action
trigger
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510244301.3A
Other languages
Chinese (zh)
Other versions
CN104820601B (en
Inventor
张帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anti-Technology Co Ltd In Excellent Tai'an Guangzhou
Original Assignee
Anti-Technology Co Ltd In Excellent Tai'an Guangzhou
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anti-Technology Co Ltd In Excellent Tai'an Guangzhou filed Critical Anti-Technology Co Ltd In Excellent Tai'an Guangzhou
Priority to CN201510244301.3A priority Critical patent/CN104820601B/en
Publication of CN104820601A publication Critical patent/CN104820601A/en
Application granted granted Critical
Publication of CN104820601B publication Critical patent/CN104820601B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to a security and protection linkage method. The security and protection linkage method comprises the following steps: step S1 of executing plug-in registration; step S2 of selecting respective plug-in types, which specifically comprises selecting a trigger type and an action type; step S3 of creating instances, which comprises creating a trigger instance and an action instance; step S4 of setting parameters, which comprises setting a trigger parameter and an action parameter; and step S5 of establishing linkage, which specifically comprises establishing a linkage relationship between the trigger instance and the action instance. Compared with the prior art, the security and protection linkage method enables the instances in plug-ins to be corresponding to respective controllers in the form of plug-ins; and creates the instances inside the plug-ins by loading the plug-ins. At this point, a user only needs association selection of the trigger instance and the action instance without executing complex programming and an association creation process. However, due to extensibility of the plug-in itself, the user can increase and reduce the respective plug-in according to specific requirement.

Description

A kind of security protection interlock method
Technical field
The present invention relates to the security protection interlock method that a kind of security protection interlock method, particularly a kind of simple and convenient user operation, processing speed are fast.
Background technology
Existing safety-protection system generally comprises: closed monitor system, guard against theft and alarm system, building conversational system, parking factory management system, community card system, infrared perimeter alarm system, fence, patrol system, work attendance gate control system, safety anti-theft apparatus house system, electronics examination field system, intelligent door lock etc.And wherein the development of security and guard technology is just towards digitizing, networking, integrated, intelligentized future development, core content is wherein exactly that the system of security protection is towards integrated future development.So-called system integration, mainly comprises two aspects: hardware system integration, and software system integration.
Described front end hardware integrally turns to: supervisory system front end integration mean the integration of multiple technologies, embedded framework, be suitable for and adaptability is stronger and the integration of different detecting devices output.Access module between hardware directly determines the quick reaction of its expandability and information transmission.
Described software system integration turns to: monitoring software system makes to realize seamless link between other each subsystem in video monitoring system and gate inhibition and warning system thus achieve to manage in the enterprising line pipe of unified operating platform and control, user is operated more simple, convenient.
And wherein, how video monitoring, gate inhibition, warning system and other subsystems carry out organically combining and unified management is key to the issue.In safety-protection system, what combined by the subsystems such as video monitoring, gate inhibition, burglar alarm is exactly linked system.Linked system is provided with under various extraneous circumstance triggers, connecting each other and action of subsystems, is be the tie of an organic whole by system in combination.Linked system all comprises the software arranging interlock and the hardware device performing interlock, wherein, software mainly does the management of setting and the multiple interlock linked, and hardware device is access controller mainly, can go to control subsystems and make corresponding actions when access controller performs interlock.
In general traditional safety-protection system has 2 kinds.One is node interlock; Described node interlock refers to the timing node when certain event completes, as the timing node that next event triggers.This interlock can only for Node configuration, and trigger condition and output action must be all nodes, and can only trigger according to node variable condition, the function completed is very limited.Such as picture " dead card is swiped the card ", conditions such as " illegally opening the door " just cannot be linked by node and realize.
Another kind is the event interlock widely used now; Described event interlock refers to when a certain event occurs, and it is as another trigger conditions.This interlock use case carrys out trigger action, more multiple trigger condition can be completed, but an event can only be had in an interlock, the relation of "AND" and "or" is not had between event, complicated logic can not be expressed, therefore the interlock of complexity must be split into simple single interlock when arranging interlock by user, increases workload.In addition, the software design patterns interface of tradition interlock is all parameters in window control, and expression way is directly perceived not, once can only arrange an interlock, inefficiency.
For the defect in the problems referred to above and conventional art, publication number is the patent of invention of CN 102034289A, provides a kind of graphical programmable security linkage system.Refer to Fig. 1, it is the structured flowchart of the graphical programmable security linkage system of prior art.This system is made up of the figure editor module that links, compiling of instruction module, script editor module, script compile module, data dump module, bytecode interpreter, interlock condition check module and linkage action execution module, supports to scheme n-ary form n and script edit form arranges interlock.
Please refer to Fig. 2, its interlock program flow diagram being the graphical programmable security linkage system shown in Fig. 1.
Described a kind of graphical programmable security linkage system, the job step that use figure n-ary form n arranges interlock is as follows:
(1) use the newly-built interlock of interlock figure editor module, drag pel to pel editing area;
(2) between pel editing area editor pel with or relation, and pel parameter is set, can multiple interlock be once set;
(3) whether the figure editor module inspection interlock that links is legal, do not conform to rule prompting user amendment;
(4) if legal, then by compiling of instruction module, interlock is compiled as bytecode;
(5) by data dump module stores and download bytecode;
(6) bytecode interpreter receives bytecode and is converted into interlock data;
(7) condition check module that links receives interlock data, and checks whether interlock condition occurs;
(8) as generation of having ready conditions, then corresponding linkage action is performed by linkage action execution module; As checked without then continuing.
From above-mentioned disclosed technical scheme, prior art, by graphical interlock or script edit form, makes when arranging interlock more directly perceived and simple.Meanwhile, the form of script edit can also be supported, realize the function required for user flexibly.Compared to the mode that traditional window is arranged, it is more flexible on interlock is arranged.
But unavoidably also there is following technological deficiency in prior art:
(1) disclosed in prior art linkage platform, its deflection hardware control programming, can not utilize existing IP network, the various terminal control units that centralized management distribution is disposed.Also the equipment just participating in linking for fixing needs when the setting that links carries out separately the setting of linkage action, inconvenience very.
And along with the progressively development of video monitoring system, existing simulation monitoring technology and management mode have been difficult to meet the application demand that scale constantly expands, existing system lacks concentrated, effective way to manage mostly, effectively can not realize the information resources share of network, there is no the synthetic security system platform of the service-oriented forming response fast, greatly constrain the effect of video monitoring in social safety is taken precautions against.
(2) in prior art when the interlock of to formulate needs according to actual needs, need operator to possess corresponding program capability, corresponding operation can be realized.Such as, when using interlock graphics edition, need to understand the logical relation between corresponding pel; Or, when using Scripting Edition, more need operator to possess the ability of corresponding programming.Therefore, it is higher to the requirement of user, has some limitations.
(3) security linkage system that provides of prior art, needs by first there being compiling of instruction module first to compile it as corresponding bytecode, then by corresponding bytecode interpreter, this bytecode is converted to interlock data, then carry out performing corresponding interlock.Like this, need compilation process and the decode procedure of long period, and may need repeatedly to be debugged by operating personnel.Not easy in operation, the required time that system performs is longer.
In sum, for the defect that above-mentioned prior art also exists, now need to provide a kind of various terminal control units can managed distribution concentratedly and dispose, and security protection interlock method simple to operate.
Summary of the invention
The invention reside in the shortcoming and deficiency that overcome prior art, provide a kind of security protection interlock method simple to operate, and it can manage the various terminal control units of distribution deployment concentratedly.
The present invention is realized by following technical scheme: a kind of security protection interlock method, and it comprises the following steps:
Step S1: carry out plug-in unit registration;
Step S2: select corresponding plug-in unit classification; Specifically comprise: select to trigger classification and action classification;
Step S3: create example, it comprises: create trigger instance and create action example;
Step S4: parameters, it comprises: arrange trigger parameter and action parameter;
Step S5: set up interlock, it is specially: set up the interaction relation between trigger instance and action example.
Compared to prior art, the present invention by the form of plug-in unit, by corresponding controllers corresponding for the example in each plug-in unit; By loading of plug-in, create the example of plug-in unit inside.Now, user only needs trigger instance and action example to carry out associating selection, without the need to carrying out complicated programming and associating constructive process.And due to the extensibility of plug-in unit itself, it according to concrete needs, can increase or reduce corresponding plug-in unit.Such as, when needing to associate for a new controller, only needing the plug-in unit corresponding to this controller to load, just can complete follow-up association.So, succinctly convenient in use, also facilitate the increase of controller.In addition, when performing association, only needing interlock engine according to concrete incidence relation, sending corresponding instruction to controller, just can perform corresponding operation, this association code need not be saved in controller.So, the processing speed of security protection linkage platform can be accelerated.
As a further improvement on the present invention, specifically comprise in described step 1: first module found or gather, carrying out module loading, forming corresponding graphical interfaces.By interface load-on module, the interface form that convenient loading is different, can change different operation interfaces according to the operating habit of user.
As a further improvement on the present invention, step S6 is gone back: the trigger instance set up linking and action example store.By trigger instance is preserved with associating of action example, can directly call when facilitating user to use next time.
As a further improvement on the present invention, in described step S3, create trigger instance and comprise the single trigger instance of establishment and compound trigger instance; Described compound trigger instance, sets up logical relation by least two single trigger instance and is formed; Described action example comprises individual part example and composite move example; Described composite move example comprises at least two individual part examples, has timing between described individual part example.By single instance and composition example, be convenient to set up multiple incidence relation, more convenient.
As a further improvement on the present invention, in described step S5, when setting up interlock, set up the incidence relation of trigger instance and action example by the mode directly mapped; Described direct mapping mode is: the parameter of trigger instance mapped directly in action example, comprise single trigger instance is mapped to individual part example, single trigger instance maps to composite move example, compound trigger instance maps to individual part example, and compound trigger instance maps to composite move example.For single parameter, can be associated by the mode directly mapped.
As a further improvement on the present invention, in described step S5, when setting up interlock, also set up the incidence relation of trigger instance and action example by parameter extraction mode; Described parameter extraction mode is: extract trigger instance Parameter and Action instance parameter, and trigger instance parameter be associated with action instance parameter, realize the interlock of trigger instance and action example; It comprises and extracting the parameter of single trigger instance, individual part example, compound trigger instance and composite move example respectively, and associates between two, realizes the interlock between trigger instance and action example.For there being multiple parameter situation, first extracting parameter can be passed through, the more corresponding incidence relation between execution parameter.
As a further improvement on the present invention, in described step S5, when setting up interlock, also set up the incidence relation of trigger instance and action example by Parameter Switch mode; Described Parameter Switch mode is: the parameter of trigger instance changed, and is sent to action example, realizes the interlock of trigger instance and action example.When Parameter Switch is carried out for needs, Parameter Switch can be carried out by parameter conversion unit.
As a further improvement on the present invention, in described step S5, when setting up interlock, also set up the incidence relation of trigger instance and action example by Parameter Programming mode; Described Parameter Programming mode is: programme to the parameter of trigger instance, and exports result to action example, realizes the interlock of trigger instance and action example.By parameter being programmed, realize more intelligent operation.
As a further improvement on the present invention, in step sl, described plug-in unit carries out plug-in unit registration by the mode of local loading or local injection or remote login.
As a further improvement on the present invention, described plug-in unit comprises an accessing points and ability functional description; Described accessing points is for accessing and the controller corresponding to this plug-in unit; Described ability functional description, the function that this plug-in unit defines is sent to controller by described accessing points by it.By specifying the internal form of this plug-in unit, as long as meet the plug-in unit of this form, just can be read by linkage platform, being convenient to follow-up interlock and setting up.
In sum, security protection linkage platform provided by the present invention, possesses following advantage:
1, compared to prior art, the present invention by the form of plug-in unit, by corresponding controllers corresponding for the example in each plug-in unit; By loading of plug-in, create the example of plug-in unit inside.Now, user only needs trigger instance and action example to carry out associating selection, without the need to carrying out complicated programming and associating constructive process.And due to the extensibility of plug-in unit itself, it according to concrete needs, can increase or reduce corresponding plug-in unit.Such as, when needing to associate for a new controller, only needing the plug-in unit corresponding to this controller to load, just can complete follow-up association.So, succinctly convenient in use, also facilitate the increase of controller.In addition, when performing association, only needing interlock engine according to concrete incidence relation, sending corresponding instruction to controller, just can perform corresponding operation, this association code need not be saved in controller.So, the processing speed of security protection linkage platform can be accelerated.
2, the example that the present invention creates comprises single-instance and composition example.For composition example, multiple single-instance can be set up the logical relation of "AND" "or" " non-", realize more function.
3, present invention also offers four kinds of different modes be associated, making user have more operating space when selecting.
4, the present invention carries out specification to plug-in unit inner content, is convenient to security protection linkage platform and reads loading, can be carried out the foundation of plug-in unit by developer or user.
In order to understand better and implement, describe the present invention in detail below in conjunction with accompanying drawing.
Accompanying drawing explanation
Fig. 1 is the structured flowchart of the graphical programmable security linkage system of prior art.
Fig. 2 is the interlock program flow diagram of the graphical programmable security linkage system of prior art.
Fig. 3 is the operation steps process flow diagram of security protection linkage platform of the present invention.
The connection block diagram of Fig. 4 security protection linkage platform of the present invention.
Fig. 5 is the internal relations schematic diagram of plug-in unit of the present invention.
Fig. 6 is the connection block diagram of instantiation module of the present invention.
Fig. 7 is the connection diagram that module is set up in interlock of the present invention.
Fig. 8 is the connection block diagram that module is set up in interlock of the present invention.
Fig. 9 is the schematic diagram that trigger instance of the present invention is associated with action example.
Figure 10 is the incidence relation schematic diagram that the smoke transducer of embodiment 1 and gate inhibition's action directly map.
Figure 11 is the schematic diagram that the smoke transducer of embodiment 2 and access controller are associated.
Figure 12 is the schematic diagram that embodiment 3 sets up direct mapping association relation.
Figure 13 is the schematic diagram of the incidence relation of embodiment 3 extracting parameter.
Figure 14 is the trigger instance of the smoke transducer of the present embodiment 4 and the schematic diagram associated between composite move example.
Figure 15 be in this example 5 trigger instance and action example associate schematic diagram.
Figure 16 be in this example 6 trigger instance and action example associate schematic diagram.
Embodiment
Refer to Fig. 3, it is the flow chart of steps of security protection interlock method of the present invention.Security protection interlock method of the present invention, it comprises the following steps:
Step S1: carry out plug-in unit registration; Specifically comprise: first module found and gather, carrying out module loading; On the interactive interface of linkage platform, form corresponding graphical interfaces.
Step S2: select corresponding plug-in unit classification; Specifically comprise: select to trigger classification and action classification;
Step S3: create example; Specifically comprise: create trigger instance and create action example; Wherein, single trigger instance or compound trigger instance can be created when creating trigger instance; When creating action example, composite move example can be created.
Described compound trigger instance, sets up logical relation by least two single trigger instance and is formed; Described action example comprises individual part example and composite move example; Described composite move example comprises at least two individual part examples, has timing between described individual part example.
Step S4: parameters; It specifically comprises: arrange trigger parameter and action parameter.
Step S5: set up interlock; It specifically comprises: can by directly mapping, data extract, the mode of Parameter Switch and Parameter Programming, set up the interaction relation between trigger instance and action example.
Described direct mapping mode is: the parameter of trigger instance mapped directly in action example, comprise single trigger instance is mapped to individual part example, single trigger instance maps to composite move example, compound trigger instance maps to individual part example, and compound trigger instance maps to composite move example.
Described parameter extraction mode is: extract trigger instance Parameter and Action instance parameter, and trigger instance parameter be associated with action instance parameter, realize the interlock of trigger instance and action example; It comprises and extracting the parameter of single trigger instance, individual part example, compound trigger instance and composite move example respectively, and associates between two, realizes the interlock between trigger instance and action example.
Described Parameter Switch mode is: the parameter of trigger instance changed, and is sent to action example, realizes the interlock of trigger instance and action example.
Described Parameter Programming mode is: programme to the parameter of trigger instance, and exports result to action example, realizes the interlock of trigger instance and action example.
Step S6: the trigger instance set up linking and action example store.By trigger instance is preserved with associating of action example, can directly call when facilitating user to use next time.
In addition, the present invention also provides a kind of linkage platform for realizing above-mentioned security protection interlock method.Refer to Fig. 4, it is the connection block diagram of security protection linkage platform of the present invention.The present invention relates to a kind of security protection linkage platform, comprise acquisition module 1, interlock engine 2, instantiation module 3, link and set up module 4, interface load-on module 5 and data memory module 6.
Described acquisition module 1, for gathering plug-in unit; Concrete, described plug-in unit is injected by local loading or this locality or the mode of remote login is connected with described acquisition module.
Please refer to Fig. 5, it is the internal relations schematic diagram of plug-in unit of the present invention.Wherein, described plug-in unit comprises an accessing points and ability functional description; Described accessing points is for accessing and the controller corresponding to this plug-in unit; Described ability functional description, the function that this plug-in unit defines is sent to controller by described accessing points by it.
Described interlock engine 2, for loading of plug-in, and is sent to instantiation module;
Described instantiation module 3, for by this plug-in unit instantiation, forms trigger instance and action example respectively;
Please refer to Fig. 6, it is the connection block diagram of instantiation module of the present invention.Further, described instantiation module creation trigger instance comprises single trigger instance and compound trigger instance; Described compound trigger instance, sets up logical relation by least two single trigger instance and is formed; Described action example comprises individual part example and composite move example; Described composite move example comprises at least two individual part examples, has timing between described individual part example.
Please refer to Fig. 7, it is the connection diagram that module is set up in interlock of the present invention.Module 4 is set up in described interlock, for setting up interlock to trigger instance and action example.
Please refer to Fig. 8 and Fig. 9, it is respectively interlock of the present invention and sets up the schematic diagram that the connection block diagram of module and trigger instance be associated with action example.
Further, described interlock is set up module and is comprised a map unit, data extracting unit, parameter conversion unit and programming unit.
Described map unit, for the parameter of trigger instance is mapped directly in action example, comprise single trigger instance is mapped to individual part example, single trigger instance maps to composite move example, compound trigger instance maps to individual part example, and compound trigger instance maps to composite move example.In addition, if do not have parameter between trigger instance and action example, then directly to be mapped by printenv, be associated relation.
Described data extracting unit, trigger instance parameter for extracting trigger instance Parameter and Action instance parameter, and is associated with action instance parameter by it, realizes the interlock of trigger instance and action example; It comprises and extracting the parameter of single trigger instance, individual part example, compound trigger instance and composite move example respectively, and associates between two, realizes the interlock between trigger instance and action example.
Described parameter conversion unit, it for the parameter of trigger instance being changed, and is sent to action example, realizes the interlock of trigger instance and action example.
Described programming unit, it for programming to the parameter of trigger instance, and exports result to action example, realizes the interlock of trigger instance and action example.
Further, described interface load-on module 5, it generates the operation interface of described linkage platform for loading.
Further, described data memory module 6, it is for having stored trigger instance and the action example of interlock.
Compared to prior art, the present invention by the form of plug-in unit, by corresponding controllers corresponding for the example in each plug-in unit; By loading of plug-in, create the example of plug-in unit inside.Now, user only needs trigger instance and action example to carry out associating selection, without the need to carrying out complicated programming and associating constructive process.And due to the extensibility of plug-in unit itself, it according to concrete needs, can increase or reduce corresponding plug-in unit.Such as, when needing to associate for a new controller, only needing the plug-in unit corresponding to this controller to load, just can complete follow-up association.So, succinctly convenient in use, also facilitate the increase of controller.In addition, when performing association, only needing interlock engine according to concrete incidence relation, sending corresponding instruction to controller, just can perform corresponding operation, this association code need not be saved in controller.So, the processing speed of security protection linkage platform can be accelerated.
Further, example creation module of the present invention, comprises single-instance and composition example.For composition example, multiple single-instance can be set up the logical relation of "AND" "or" " non-", realize more function.
Further, present invention also offers four kinds of different modes be associated, making user have more operating space when selecting.
Further, the present invention carries out specification to plug-in unit inner content, is convenient to security protection linkage platform and reads loading, can be carried out the foundation of plug-in unit by developer or user.
Below by way of concrete example, security protection linkage platform of the present invention and security protection interlock method are described.
embodiment 1
Now hypothesis needs to set up the association between a smoke transducer and gate inhibition, and the function of specific implementation is: when smoke transducer senses smog, and access controller control gate keeps closed condition, namely now cannot open the door, also cannot by enabling of swiping the card.
Concrete operation is as follows:
Step 1: registration plug-in unit; Be specially: the plug-in unit of smoke transducer and the plug-in unit of access controller are registered, load by the plug-in unit of described smoke transducer and the plug-in unit of access controller, and show on the interactive interface of linkage platform.
Step 2: select classification; Be specially: the smoke transducer that selection will control on interactive interface and access controller;
Step 3: create example; Be specially: create the trigger instance of smoke transducer and create the action example of access controller.
Step 4: parameters; Be specially: to the parameter that smoke transducer is arranged be: whether smog detected, corresponding smokescope value can be set; To the optimum configurations of access controller be: control gate keeps closed condition and door capable of being opened two kinds of action parameters.
Step 5: be associated relation; Be specially: respectively the incidence relation directly mapped is set up in two actions of two of smoke transducer parameters and gate inhibition.Refer to Figure 10, it is the incidence relation schematic diagram that smoke transducer and gate inhibition's action directly map.Wherein, when smoke transducer is detected smog, close with access controller control gate, set up direct mapping relations; When smoke transducer is not detected smog, open with access controller control gate, set up direct mapping relations.
embodiment 2
The present embodiment is roughly the same with embodiment 1, and its difference is: in steps of 5, during the relation that is associated, be specially:
Use the form of advance parameter, smoke transducer and access controller are associated relation.Refer to Figure 11, it is the schematic diagram that the smoke transducer of the present embodiment and access controller are associated.First respectively the trigger parameter of smoke transducer and the action parameter of access controller are extracted, more corresponding incidence relation is set up to its parameter.Such as, in the present embodiment this smoke transducer is detected that the parameter of smog and access controller control gate keep the action parameter of closing to be associated; This smoke transducer is not detected the action parameter that the parameter of smog and access controller control gate are opened is associated.
embodiment 3
The difference of the present embodiment and embodiment 1 is: the present embodiment, when judging whether to trigger, increases the judgement to temperature.Namely when having judged whether smog, judge whether temperature reaches threshold value, if so, then control gate is closed simultaneously; If not, control gate is opened.Concrete step is as follows:
Step 1: registration plug-in unit; Be specially: the plug-in unit of the plug-in unit of smoke transducer, temperature sensor plug-in unit and access controller is registered, plug-in unit by the plug-in unit of described smoke transducer, temperature sensor plug-in unit and access controller loads, and shows on the interactive interface of linkage platform.
Step 2: select classification; Be specially: on interactive interface, select smoke transducer, temperature sensor and the access controller that will control;
Step 3: create example; Be specially: first create the trigger instance of smoke transducer, create the action example of the trigger instance of temperature sensor and establishment access controller; Then at establishment compound trigger instance, the trigger instance of smoke transducer trigger instance and temperature sensor is set up "AND" logical relation.
Step 4: parameters; Be specially: to the parameter that smoke transducer is arranged be: whether smog detected, corresponding smokescope value can be set; To temperature sensor parameters be: the temperature of set temperature sensor alarm; To the optimum configurations of access controller be: control gate keeps closed condition and door capable of being opened two kinds of action parameters.
Step 5: be associated relation; Be specially: be associated compound trigger instance with gate inhibition's action example relation.Refer to Figure 12 and 13, it is respectively the schematic diagram of the incidence relation setting up direct mapping association relation and extracting parameter.In the present embodiment, specifically can set up direct mapping association relation, also can be to be associated relation by the mode of extracting parameter.
embodiment 4
The difference of the present embodiment and embodiment 1 is: described when setting up action example, also comprises the action example of a water spray controller.Namely when smog being detected, first access control is closed, then controls water spray.Concrete step is:
Step 1: registration plug-in unit; Be specially: the plug-in unit of the plug-in unit of smoke transducer, the plug-in unit of access controller and water spray controller is registered, plug-in unit by the plug-in unit of described smoke transducer, the plug-in unit of access controller and water spray controller loads, and shows on the interactive interface of linkage platform.
Step 2: select classification; Be specially: on interactive interface, select smoke transducer, access controller and the water spray controller that will control;
Step 3: create example; Be specially: the trigger instance and the action example of establishment access controller, the action example of water spray controller that create smoke transducer; Create composite move example again, this action example first performs gate inhibition's action, performs water spray action again.
Step 4: parameters; Be specially: to the parameter that smoke transducer is arranged be: whether smog detected, corresponding smokescope value can be set; To the optimum configurations of access controller be: control gate keeps closed condition and door capable of being opened two kinds of action parameters; To the optimum configurations of water spray controller be: water spray and the two kinds of actions of closedown water spray.
Step 5: be associated relation; Be specially: be associated the trigger instance of smoke transducer with composite move example relation.Refer to Figure 14, it is the trigger instance of the smoke transducer of the present embodiment and the schematic diagram associated between composite move example.In the present embodiment, between described trigger instance and composite move example, can set up direct mapping relations, also can be associated by parameter extraction, it is consistent with the method adopted in above-described embodiment, therefore does not repeat.
embodiment 5
The difference of the present embodiment and embodiment 1 is: when setting up power example, and also comprise an action example, control system generation mail or information are to subscriber terminal equipment.Concrete steps are:
Step 1: registration plug-in unit; Be specially: the plug-in unit of smoke transducer, the plug-in unit of access controller and information transmit control device plug-in unit are registered, plug-in unit by the plug-in unit of described smoke transducer, the plug-in unit of access controller and information transmit control device loads, and shows on the interactive interface of linkage platform.
Step 2: select classification; Be specially: on interactive interface, select smoke transducer, access controller and the information transmit control device that will control;
Step 3: create example; Be specially: create the trigger instance of smoke transducer and create the action example of access controller, the action example of information transmit control device.
Step 4: parameters; Be specially: to the parameter that smoke transducer is arranged be: whether smog detected, corresponding smokescope value can be set; To the optimum configurations of access controller be: control gate keeps closed condition and door capable of being opened two kinds of action parameters; To the optimum configurations of information transmit control device be: transmission information and do not send information two kinds of actions.
Step 5: be associated relation; Be specially: be associated the trigger instance of smoke transducer with gate inhibition's action example and information sending action example relation respectively.Refer to Figure 15, its be in this example trigger instance and action example associate schematic diagram.
In the present embodiment, between the trigger instance of smoke transducer and gate inhibition's action example, can pass through the mode of directly mapping or parameter extraction, be associated relation.And the trigger instance of smoke transducer and information sending action example, be associated by Parameter Switch mode.Concrete is converted to, and when smoke transducer is detected smog, is converted to information " transmission fire ", is sent in subscriber terminal equipment by information transmit control device.
embodiment 6
In the present embodiment, roughly the same with the step of embodiment 5, its difference is: in the information that information transmit control device sends, add smokescope value now.Its key distinction in steps of 5, is specially:
Set up smog trigger instance and send associating of example with gate inhibition's action example with information.Refer to Figure 16, its be in this example trigger instance and action example associate schematic diagram.
In the present embodiment, between the trigger instance of smoke transducer and gate inhibition's action example, can pass through the mode of directly mapping or parameter extraction, be associated relation.And the trigger instance of smoke transducer and information sending action example, be associated by Parameter Switch mode and the mode of carrying out programming.Concrete is converted to, and when smoke transducer is detected smog, is converted to information " send fire, its smokescope value is a% ", wherein, a% is replaced into current smokescope value.This information is sent in subscriber terminal equipment by information transmit control device.
The present invention is not limited to above-mentioned embodiment, if do not depart from the spirit and scope of the present invention to various change of the present invention or distortion, if these are changed and distortion belongs within claim of the present invention and equivalent technologies scope, then the present invention is also intended to comprise these changes and distortion.

Claims (10)

1. a security protection interlock method, is characterized in that: comprise the following steps:
Step S1: carry out plug-in unit registration;
Step S2: select corresponding plug-in unit classification; Specifically comprise: select to trigger classification and action classification;
Step S3: create example, it comprises: create trigger instance and create action example;
Step S4: parameters, it comprises: arrange trigger parameter and action parameter;
Step S5: set up interlock, it is specially: set up the interaction relation between trigger instance and action example.
2. security protection interlock method according to claim 1, is characterized in that: specifically comprise in described step 1: first find module and gather, carrying out module loading, forms corresponding graphical interfaces.
3. security protection interlock method according to claim 1, is characterized in that: also step S6: the trigger instance set up linking and action example store.
4. security protection interlock method according to claim 1, is characterized in that: in described step S3, creates trigger instance and comprises and create single trigger instance and compound trigger instance; Described compound trigger instance, sets up logical relation by least two single trigger instance and is formed; Described action example comprises individual part example and composite move example; Described composite move example comprises at least two individual part examples, has timing between described individual part example.
5. security protection interlock method according to claim 4, is characterized in that: in described step S5, when setting up interlock, is set up the incidence relation of trigger instance and action example by the mode directly mapped; Described direct mapping mode is: the parameter of trigger instance mapped directly in action example, comprise single trigger instance is mapped to individual part example, single trigger instance maps to composite move example, compound trigger instance maps to individual part example, and compound trigger instance maps to composite move example.
6. security protection interlock method according to claim 5, is characterized in that: in described step S5, when setting up interlock, is also set up the incidence relation of trigger instance and action example by parameter extraction mode; Described parameter extraction mode is: extract trigger instance Parameter and Action instance parameter, and trigger instance parameter be associated with action instance parameter, realize the interlock of trigger instance and action example; It comprises and extracting the parameter of single trigger instance, individual part example, compound trigger instance and composite move example respectively, and associates between two, realizes the interlock between trigger instance and action example.
7. security protection interlock method according to claim 6, is characterized in that: in described step S5, when setting up interlock, is also set up the incidence relation of trigger instance and action example by Parameter Switch mode; Described Parameter Switch mode is: the parameter of trigger instance changed, and is sent to action example, realizes the interlock of trigger instance and action example.
8. security protection interlock method according to claim 7, is characterized in that: in described step S5, when setting up interlock, is also set up the incidence relation of trigger instance and action example by Parameter Programming mode; Described Parameter Programming mode is: programme to the parameter of trigger instance, and exports result to action example, realizes the interlock of trigger instance and action example.
9. security protection interlock method according to claim 1, is characterized in that: in step sl, and described plug-in unit is loaded by local or locally injected or the mode of remote login carries out plug-in unit registration.
10. security protection interlock method according to claim 9, is characterized in that: described plug-in unit comprises an accessing points and ability functional description; Described accessing points is for accessing and the controller corresponding to this plug-in unit; Described ability functional description, the function that this plug-in unit defines is sent to controller by described accessing points by it.
CN201510244301.3A 2015-05-13 2015-05-13 A kind of security protection interlock method Active CN104820601B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510244301.3A CN104820601B (en) 2015-05-13 2015-05-13 A kind of security protection interlock method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510244301.3A CN104820601B (en) 2015-05-13 2015-05-13 A kind of security protection interlock method

Publications (2)

Publication Number Publication Date
CN104820601A true CN104820601A (en) 2015-08-05
CN104820601B CN104820601B (en) 2018-04-06

Family

ID=53730905

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510244301.3A Active CN104820601B (en) 2015-05-13 2015-05-13 A kind of security protection interlock method

Country Status (1)

Country Link
CN (1) CN104820601B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106094779A (en) * 2016-08-30 2016-11-09 成都市卓思德禄智能科技有限公司 Intelligent comprehensive security protection control system
CN108696592A (en) * 2018-05-16 2018-10-23 郑州云海信息技术有限公司 A kind of design method of inter-linked controlling method based on MDC, system and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003102722A2 (en) * 2002-05-01 2003-12-11 Bea Systems, Inc. Collaborative business plug-in framework
CN102034289A (en) * 2010-12-15 2011-04-27 广州致远电子有限公司 Graphical programmable security linkage system
CN103116968A (en) * 2012-11-19 2013-05-22 佳都新太科技股份有限公司 Method based on graphical alarm process custom
CN104122842A (en) * 2013-04-23 2014-10-29 北京计算机技术及应用研究所 Intelligent monitoring method and system based on prison event

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003102722A2 (en) * 2002-05-01 2003-12-11 Bea Systems, Inc. Collaborative business plug-in framework
CN102034289A (en) * 2010-12-15 2011-04-27 广州致远电子有限公司 Graphical programmable security linkage system
CN103116968A (en) * 2012-11-19 2013-05-22 佳都新太科技股份有限公司 Method based on graphical alarm process custom
CN104122842A (en) * 2013-04-23 2014-10-29 北京计算机技术及应用研究所 Intelligent monitoring method and system based on prison event

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
沈一卓: "数字化监狱综合安防平台管理系统的研究和实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106094779A (en) * 2016-08-30 2016-11-09 成都市卓思德禄智能科技有限公司 Intelligent comprehensive security protection control system
CN108696592A (en) * 2018-05-16 2018-10-23 郑州云海信息技术有限公司 A kind of design method of inter-linked controlling method based on MDC, system and system

Also Published As

Publication number Publication date
CN104820601B (en) 2018-04-06

Similar Documents

Publication Publication Date Title
CN102034289B (en) Graphical programmable security linkage system
Fovino et al. Modbus/DNP3 state-based intrusion detection system
CN102834818B (en) There is the integrating security system of parallel processing architecture
Groher et al. XWeave: models and aspects in concert
CN107567604A (en) It is used for the method and system of the process control of equipment in the Machine To Machine network based on OPC UA
CN104157060B (en) A kind of transmission of gate inhibition's data and management method
CN104766007B (en) A kind of method that the fast quick-recovery of sandbox is realized based on file system filter driver
CN102985915A (en) Control system user interface
CN103744424B (en) Field device logic control test method
CN104932330A (en) Security linkage platform
Fernandez et al. Designing secure SCADA systems using security patterns
CN107680209A (en) A kind of indoor and outdoor security protection coordinated control system
US20200120163A1 (en) Managing data and personification of iot devices in multiple networks
CN107154090A (en) Access control method and system based on mobile terminal authentication and location aware
CN103117993A (en) Methods, apparatus, and articles of manufacture to provide firewalls for process control systems
CN104820601A (en) A security and protection linkage method
CN107187968A (en) Elevator control method and system based on mobile terminal authentication and location aware
CN105681388A (en) Visualization system and method based on cloud Internet of Things monitoring
CN104820600A (en) Security linkage system
CN110049111A (en) A kind of industrial control system teleinstruction control method based on block chain technology
US20220191227A1 (en) User behavorial analytics for security anomaly detection in industrial control systems
CN107179696A (en) Room control method and system based on mobile terminal authentication and location aware
CN107070901A (en) A kind of integral developer's platform of intelligence community class software and hardware
CN110113204A (en) A method of realizing application program management on intelligent gateway
Zhao et al. Discrete control for smart environments through a generic finite-state-models-based infrastructure

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant