CN110065526B - Safety control method and device for train - Google Patents

Safety control method and device for train Download PDF

Info

Publication number
CN110065526B
CN110065526B CN201810064896.8A CN201810064896A CN110065526B CN 110065526 B CN110065526 B CN 110065526B CN 201810064896 A CN201810064896 A CN 201810064896A CN 110065526 B CN110065526 B CN 110065526B
Authority
CN
China
Prior art keywords
target object
command
safety
safety command
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810064896.8A
Other languages
Chinese (zh)
Other versions
CN110065526A (en
Inventor
吴丹丹
王发平
卓开阔
薄云览
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BYD Co Ltd
Original Assignee
BYD Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BYD Co Ltd filed Critical BYD Co Ltd
Priority to CN201810064896.8A priority Critical patent/CN110065526B/en
Publication of CN110065526A publication Critical patent/CN110065526A/en
Application granted granted Critical
Publication of CN110065526B publication Critical patent/CN110065526B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B61RAILWAYS
    • B61LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
    • B61L23/00Control, warning, or like safety means along the route or between vehicles or vehicle trains
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B61RAILWAYS
    • B61LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
    • B61L27/00Central railway traffic control systems; Trackside control; Communication systems specially adapted therefor

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Train Traffic Observation, Control, And Security (AREA)
  • Electric Propulsion And Braking For Vehicles (AREA)

Abstract

The invention provides a safety control method and a safety control device for a train, wherein the method comprises the following steps: receiving a safety command for issuing a target object; extracting the identification of the target object from the safety command, and verifying the identification of the target object; monitoring the safety command input again when the verification passes, if the safety command is monitored, judging whether the verification is the last verification, if so, packaging the received safety command each time and then sending the packaged safety command to the interlocking equipment, if the safety command is consistent, sending the safety command to the target object by the interlocking equipment and executing, and if not, returning to monitor the safety command input again and continuing the next verification process of subsequent operation; if the security command input again is not listened to, the flow ends. The ATS verifies the safety command at least twice, so that the probability of a wrong safety command sent to the interlocking equipment can be reduced, and the situations that a target object executes the wrong safety command and the like can be avoided.

Description

Safety control method and device for train
Technical Field
The invention relates to the technical field of vehicle control, in particular to a safety control method and device for a train.
Background
In a rail transit system, in order to ensure safety of train traveling, when any one of a traffic signal, a switch, and a track section fails, it is necessary to block the failed object. In the prior art, a safety command for blocking a faulty object is input by an operator on an operation interface of an Automatic Train monitoring system (ATS), and the ATS issues the safety command to an interlock device, and accordingly, after receiving the safety command, the interlock device can control the faulty object to execute the safety command, so that a Train is prohibited from entering a faulty area.
However, the safety command is not protected in the prior art, and once the safety command for blocking the faulty object is wrong in the transmission process, the faulty object cannot execute the safety command, so that the train is allowed to enter the faulty area, which may cause a serious accident.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the related art.
Therefore, a first object of the present invention is to provide a safety control method for a train, so as to implement at least two times of verification of an identifier of a target object in a received safety command, thereby reducing a probability of sending a wrong safety command to an interlock device, and avoiding situations such as the target object executing the wrong safety command or the interlock device controlling the wrong target object, thereby ensuring the safety of train driving, and being used for solving a technical problem that a serious accident may occur because the safety command is not protected in the prior art. Furthermore, after receiving the safety command, the interlock device needs to compare whether the safety command is consistent every time, and only when the safety command is consistent, the interlock device sends the safety command to the target object and executes the safety command, so that the situations that the target object executes a wrong safety command or controls a wrong target object by the interlock device and the like can be further avoided. In addition, the ATS verifies the safety command at least twice, the ATS only needs to package the safety command received each time and then sends the safety command to the interlocking equipment, and the interlocking equipment performs consistency comparison, so that the running safety of the train can be ensured, and the information interaction process between the ATS and the interlocking equipment can be simplified.
The second purpose of the invention is to provide a safety control device of a train.
A third object of the invention is to propose a computing technical device.
A fourth object of the invention is to propose a non-transitory computer-readable storage medium.
A fifth object of the invention is to propose a computer program product.
In order to achieve the above object, an embodiment of a first aspect of the present invention provides a safety control method for a train, including:
receiving a safety command for issuing a target object;
extracting the identification of the target object from the safety command, and verifying the identification of the target object;
monitoring the safety command input again when the verification passes, and if the safety command is monitored, judging whether the verification is the last verification; if the safety command input again is not monitored, ending the process;
if the verification is the last time, the safety command received each time is packaged and then sent to interlocking equipment, and the interlocking equipment sends the safety command to the target object and executes the safety command when comparing that the safety command is consistent each time;
if not, returning to monitor the security command input again and continuing the next authentication process by subsequent operations.
According to the safety control method of the train, disclosed by the embodiment of the invention, a safety command for issuing a target object is received; extracting the identification of the target object from the safety command, and verifying the identification of the target object; monitoring a safety command input again when the verification passes, and if the safety command is monitored, judging whether the current verification is the last verification; if the safety command input again is not monitored, the process is ended; if the verification is the last time, the received safety command is packaged and then sent to the interlocking equipment, and the interlocking equipment sends the safety command to the target object and executes the safety command when comparing that the safety command is consistent each time; if not, returning to monitor the security command input again and continuing the next authentication process by subsequent operations. In this embodiment, the ATS verifies the safety command at least twice, so that the probability of the incorrect safety command sent to the interlock device can be reduced, and the situations that the target object executes the incorrect safety command or the interlock device controls the incorrect target object, and the like, can be avoided. Furthermore, after receiving the safety command, the interlock device needs to compare whether the safety command is consistent every time, and only when the safety command is consistent, the interlock device sends the safety command to the target object and executes the safety command, so that the situations that the target object executes a wrong safety command or controls a wrong target object by the interlock device and the like can be further avoided. In addition, the ATS verifies the safety command at least twice, the ATS only needs to package the safety command received each time and then sends the safety command to the interlocking equipment, and the interlocking equipment performs consistency comparison, so that the running safety of the train can be ensured, and the information interaction process between the ATS and the interlocking equipment can be simplified.
In order to achieve the above object, a second aspect of the present invention provides a safety control device for a train, including:
the receiving module is used for receiving a safety command issued to a target object;
the extraction module is used for extracting the identification of the target object from the safety command and verifying the identification of the target object;
the monitoring module is used for monitoring the safety command input again when the verification passes, and if the safety command is monitored, whether the current verification is the last verification is judged; if the safety command input again is not monitored, ending the process;
and the processing module is used for packaging the received safety command each time and then sending the packaged safety command to the interlocking equipment when the last verification is performed, sending the safety command to the target object and executing the safety command when the interlocking equipment compares that the safety command is consistent each time, and returning to monitor the safety command input again and follow-up operation to continue the next verification process when the last verification is not performed.
The safety control device of the train of the embodiment of the invention receives the safety command issued to the target object; extracting the identification of the target object from the safety command, and verifying the identification of the target object; monitoring a safety command input again when the verification passes, and if the safety command is monitored, judging whether the current verification is the last verification; if the safety command input again is not monitored, the process is ended; if the verification is the last time, the received safety command is packaged and then sent to the interlocking equipment, and the interlocking equipment sends the safety command to the target object and executes the safety command when comparing that the safety command is consistent each time; if not, returning to monitor the security command input again and continuing the next authentication process by subsequent operations. In this embodiment, the ATS verifies the safety command at least twice, so that the probability of the incorrect safety command sent to the interlock device can be reduced, and the situations that the target object executes the incorrect safety command or the interlock device controls the incorrect target object, and the like, can be avoided. Furthermore, after receiving the safety command, the interlock device needs to compare whether the safety command is consistent every time, and only when the safety command is consistent, the interlock device sends the safety command to the target object and executes the safety command, so that the situations that the target object executes a wrong safety command or controls a wrong target object by the interlock device and the like can be further avoided. In addition, the ATS verifies the safety command at least twice, the ATS only needs to package the safety command received each time and then sends the safety command to the interlocking equipment, and the interlocking equipment performs consistency comparison, so that the running safety of the train can be ensured, and the information interaction process between the ATS and the interlocking equipment can be simplified.
To achieve the above object, a third embodiment of the present invention provides a computer device, including: a processor and a memory;
the processor reads the executable program code stored in the memory to run a program corresponding to the executable program code, so as to implement the safety control method for a train according to the embodiment of the first aspect of the present invention.
In order to achieve the above object, a fourth aspect of the present invention provides a non-transitory computer-readable storage medium, on which a computer program is stored, wherein the program is configured to implement, when executed by a processor, a safety control method for a train according to an embodiment of the first aspect of the present invention.
In order to achieve the above object, a fifth embodiment of the present invention provides a computer program product, wherein when being executed by an instruction processor, the computer program product implements a safety control method for a train according to the first embodiment of the present invention.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flow chart of a train safety control method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a train safety control method according to a second embodiment of the present invention;
fig. 3 is a schematic flow chart of a train safety control method according to a third embodiment of the present invention;
fig. 4 is a schematic flow chart of a train safety control method according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of a safety control device for a train according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of another train safety control device according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
In the embodiment of the invention, at least twice verification is carried out on the identification of a target object in a received safety command, when the verification is passed, the safety command input again is monitored, when the safety command is monitored and the verification is the last verification, the safety command received each time is packaged and then sent to the interlocking equipment, and the interlocking equipment sends the safety command to the target object and executes the safety command when comparing that the safety command is consistent each time. The safety command is verified at least twice, so that the probability of the wrong safety command sent to the interlocking equipment can be reduced, the situation that the target object executes the wrong safety command or the interlocking equipment controls the wrong target object and the like can be avoided, and the running safety of the train is guaranteed. Furthermore, after receiving the safety command, the interlock device needs to compare whether the safety command is consistent every time, and only when the safety command is consistent, the interlock device sends the safety command to the target object and executes the safety command, so that the situations that the target object executes a wrong safety command or controls a wrong target object by the interlock device and the like can be further avoided. In addition, the ATS verifies the safety command at least twice, the ATS only needs to package the safety command received each time and then sends the safety command to the interlocking equipment, and the interlocking equipment performs consistency comparison, so that the running safety of the train can be ensured, and the information interaction process between the ATS and the interlocking equipment can be simplified.
A train safety control method and apparatus according to an embodiment of the present invention will be described below with reference to the accompanying drawings. Before describing embodiments of the present invention in detail, for ease of understanding, common terminology will be introduced first:
common Cause Failure (CCF) refers to the simultaneous Failure of two or more units in a system due to some Common Cause.
Fig. 1 is a schematic flow chart of a train safety control method according to an embodiment of the present invention.
The execution subject of the embodiment of the invention is ATS.
As shown in fig. 1, the safety control method of the train includes the steps of:
step 101, receiving a security command for issuing a target object.
In the embodiment of the invention, the target object can be a signal machine, a turnout and/or a track section which needs to issue a safety command. The security command may include a command for blocking or unblocking the target object, and any other command for controlling the target object.
Specifically, the operator may select a target object to which a security command is to be issued on a display interface of the ATS, and accordingly, the ATS may receive or detect a selection operation of the operator, and then generate the security command according to the selection operation.
And 102, extracting the identification of the target object from the safety command, and verifying the identification of the target object.
In the embodiment of the present invention, the identifier of the target object is used to uniquely identify the target object, and the identifier of the target object may be, for example, an Identification (ID) of the target object, or any other character information that uniquely identifies the target object, which is not limited herein.
It should be noted that, in order to prevent the interlock device from transmitting a wrong safety command, or in order to prevent an operator from inadvertently transmitting a wrong name of a target object, which results in the interlock device controlling a wrong target object to execute the safety command, in the embodiment of the present invention, the identifier of the target object may be extracted from the safety command, and the identifier of the target object may be verified.
For example, when the operator wants to send a security command to the device a and the security command is used to block or unblock the device a, but the name of the device is mistakenly input due to random failure of hardware, failure of a software program, or negligence of the operator, the security command is changed to be used to block or unblock the device B when the ATS transmits the security command to the ATS control unit through the ATS server. At this time, if the identification of the target object in the safety command is not verified, the ATS control unit sends the safety command to the interlock device, and the interlock device locks or unlocks the control device B. It will be appreciated that the availability of the device B will be affected when the non-faulty device B is blocked, whereas the faulty device a is not blocked, possibly leading to a dangerous accident situation.
In the embodiment of the invention, in order to guarantee the safety of train running, the ATS can verify the identification of the target object in the safety command at least twice.
Specifically, when the ATS receives the security command for the first time, the identifier of the target object may be displayed to the operator through the display interface, and the operator determines whether the target object is an object to which the security command needs to be issued. If so, the verification is passed, at this time, step 103 may be triggered, and if not, the verification is failed, at this time, step 101 may be executed again, and the target object to which the safety command needs to be issued is input again by the operator, or when the verification is failed, a situation that the safety command is triggered by the operator by mistake may occur, at this time, in order to ensure the safety of train operation, the process may be ended, that is, step 107 is executed.
When the ATS receives the security command for a non-first time, the currently input identifier of the target object may be compared with the previously input identifier of the target object, and if the currently input identifier of the target object is consistent with the previously input identifier of the target object, the step 103 may be triggered by verifying the identifier of the target object; if not, the identification of the target object is not verified, and at this time, a fault may occur, so the process may be ended, that is, step 107 is executed, further, when a fault occurs, fault information may also be reported, for example, fault information may be displayed on a display interface of the ATS, so that an operator may take a relevant measure to process the fault.
Step 103, monitoring the security command input again when the verification passes, and judging whether the security command is monitored, if so, executing step 104, otherwise, executing step 107.
Specifically, when the safety command is received for the first time and the verification is passed, the operator may input the safety command again on the display interface of the ATS, and accordingly, the ATS may listen to the safety command input again by the operator. As a possible implementation manner, the ATS may detect a confirmation operation input by an operator through the display interface, and when the confirmation operation is detected, the ATS displays a reminder for re-inputting the safety command through the display interface, so that the operator may re-input the safety command according to the reminder, and accordingly, the ATS may receive the safety command re-input by the operator. For example, the display interface may have an "ok" button, the ATS may detect whether the operator has triggered the "ok" button, and when the ATS detects that the operator has triggered the "ok" button, a reminder to re-enter the security command may be displayed through the display interface, so that the operator may re-enter the security command.
When the safety command is not received for the first time, the prompt for inputting the safety command again can be displayed through the display interface when the identification of the target object is verified, so that the operator can input the safety command again according to the prompt.
Correspondingly, the ATS may monitor a safety command input by an operator, and determine whether the safety command is monitored, if so, perform step 104, otherwise, perform step 107.
Step 104, determining whether the current verification is the last verification, if so, executing step 105, otherwise, executing step 106.
In the embodiment of the present invention, when the ATS monitors the security command, the ATS further needs to determine whether the secondary verification is the last verification, and when the secondary verification is the last verification, step 105 may be triggered, and when the verification is not the last verification, step 106 may be triggered. Specifically, the ATS may count the number of received security commands, and compare the counted number with a preset number. If the counted number of times is the same as the preset number of times, the current verification is the last verification.
And 105, packaging the received safety command each time and then sending the safety command to the interlocking equipment, and sending the safety command to the target object and executing the safety command when the interlocking equipment compares that the safety command is consistent each time.
Optionally, when the verification is the last verification, the ATS control unit may package the received safety command each time and send the packaged safety command to the interlock device, and accordingly, after receiving the packaged data, the interlock device may perform unpacking processing on the packaged data to obtain the safety command received by the ATS each time. It should be noted that, after acquiring the safety command received by the ATS each time, the interlock device may compare whether the safety command is consistent each time, and only if the safety command is consistent, the interlock device sends the safety command to the target object and executes the safety command, so that the target object may be prevented from executing an incorrect safety command or an incorrect target object controlled by the interlock device. And when the two objects are inconsistent, the safety command is not sent to the target object, at this time, in order to guarantee the safety of train running, the interlocking device can report fault information to the ATS, and the ATS can display the fault information on a display interface after receiving the fault information, so that an operator can take relevant measures to process the fault.
Further, in order to ensure the safety of the communication between the ATS and the interlock device, the ATS and the interlock device may communicate using a safety communication protocol.
And step 106, returning to monitor the security command input again and continuing the next verification process by subsequent operations.
Optionally, when the verification is not the last verification, the ATS needs to listen again to the security command input again, i.e. return to step 103 and subsequent steps.
And step 107, ending the process.
In the embodiment of the invention, when the safety command input again is not monitored, the situation that the safety command is triggered by the operator by mistake may occur, and at the moment, the process can be ended in order to ensure the safety of train operation.
It should be noted that, in order to ensure the safety of train running, during each verification process, the operator may cancel the safety command and end the process at any time, for example, a "cancel" button may be provided on the display interface of the ATS, so that the operator may end the process by triggering the "cancel" button.
In the safety control method of the train of the embodiment, a safety command for issuing a target object is received; extracting the identification of the target object from the safety command, and verifying the identification of the target object; monitoring a safety command input again when the verification passes, and if the safety command is monitored, judging whether the current verification is the last verification; if the safety command input again is not monitored, the process is ended; if the verification is the last time, the received safety command is packaged and then sent to the interlocking equipment, and the interlocking equipment sends the safety command to the target object and executes the safety command when comparing that the safety command is consistent each time; if not, returning to monitor the security command input again and continuing the next authentication process by subsequent operations. In this embodiment, the ATS verifies the safety command at least twice, so that the probability of the incorrect safety command sent to the interlock device can be reduced, and the situations that the target object executes the incorrect safety command or the interlock device controls the incorrect target object, and the like, can be avoided. Furthermore, after receiving the safety command, the interlock device needs to compare whether the safety command is consistent every time, and only when the safety command is consistent, the interlock device sends the safety command to the target object and executes the safety command, so that the situations that the target object executes a wrong safety command or controls a wrong target object by the interlock device and the like can be further avoided.
In addition, in the embodiment of the invention, the ATS verifies the safety command at least twice, the ATS only needs to package the safety command received each time and then send the safety command to the interlocking equipment, and the interlocking equipment performs consistency comparison, thereby not only ensuring the running safety of the train, but also simplifying the information interaction process between the ATS and the interlocking equipment.
As a possible implementation manner, referring to fig. 2, on the basis of the embodiment shown in fig. 1, step 105 may specifically include the following sub-steps:
step 1051, receiving the execution result returned by the interlocking device; wherein the execution result is generated after the target object executes the safety command.
In the embodiment of the invention, the target object can generate the execution result after executing the safety command, so that the ATS can judge whether the target equipment is abnormal or not according to the execution result.
For example, when the security command is a command for blocking or unblocking the target object, the target object may generate an execution result after executing the security command, so that the ATS may obtain a state of the target object according to the execution result, and further may determine whether the target device is abnormal according to the state of the target object. The state of the target object may be an locked state or an unlocked state.
Specifically, after the interlock device sends the safety command to the target object and executes the safety command, the target object may return the execution result to the interlock device, and after receiving the execution result, the interlock device may return the execution result to the ATS, and accordingly, the ATS may obtain the execution result returned by the interlock device.
Step 1052, according to the execution result, determining whether the target object is abnormal, if yes, executing step 1053, otherwise, executing step 1056.
Specifically, after the ATS receives the execution result, it may be determined whether the target object is abnormal according to the execution result.
For example, when the security command is used to block or unblock the target object, the ATS may obtain a state of the target object according to the execution result, and may further determine whether the target object is abnormal according to the state of the target object.
Specifically, if the execution result indicates that the state of the target object is the unlocked state, and the security command is used for blocking the target object, it indicates that the target object is abnormal.
And if the execution result indicates that the state of the target object is the unlocking state and the safety command is used for unlocking the target object, indicating that the target object is not abnormal.
And if the execution result indicates that the state of the target object is a blocked state and the security command is used for unlocking the target object, the target object is abnormal.
If the execution result indicates that the state of the target object is a blocking state, and the security command is used for blocking the target object, it indicates that the target object is not abnormal.
Step 1053, obtain the position information of the target object.
Specifically, the interlocking device may acquire the position information of the target object, and then the interlocking device may send the position information of the target object to the ATS server through the ATS control unit, and after receiving the position information of the target object, the ATS server may send the position information of the target object to a display interface of the ATS for display.
And 1054, acquiring the train running to the target object according to the position information.
Optionally, after receiving the location information of the target object, the ATS may send a request message to the train dispatching center according to the location information, where the request message carries the location information of the target object, and the train dispatching center may determine, according to the location information and a running state of the running train, such as a location and a running direction, a train running towards the target object, and then send the train to the ATS.
And 1055, sending alarm information to the train running to the target object, wherein the alarm information carries the identification of the target object.
In the embodiment of the invention, after the ATS acquires the train which is running to the target object, the ATS can send the warning information to the train which is running to the target object, and the warning information carries the identification of the target object, so that a train driver can control the train to stop outside the preset range of the target object after receiving the warning information, and accidents are avoided.
Step 1056, no processing is performed.
According to the train safety control method, the execution result returned by the interlocking device is received, whether the target object is abnormal or not is judged according to the execution result, if the target object is abnormal, warning information is sent to the train running to the target object, and the warning information carries the identification of the target object. Therefore, when the target object is abnormal, the warning information can be sent to the train running to the target object in time, and the train driver can control the train to stop outside the preset range of the target object after receiving the warning information, so that accidents are avoided, and the running safety of the train is further guaranteed.
As a possible implementation manner, in order to ensure the security of information transmission, in the embodiment of the present invention, after the ATS receives the security command, the ATS may perform encoding processing on the security command, for example, an encoding algorithm in the prior art may be used to perform encoding processing on the security command, so as to obtain an encoded security command.
Extracting the identifier of the target object from the security command, which specifically includes: the encoding security command can be decoded by adopting a decoding algorithm corresponding to the encoding algorithm to obtain the security command, so that the identification of the target object can be extracted from the security command.
It should be noted that, when the security command is encoded in the same manner in each authentication process, a common cause failure may occur, so that the security command cannot be detected. Therefore, in the embodiment of the invention, the encoding modes of the security command in each verification process can be different, so that the effectiveness of the security command in the transmission process is improved.
As an example, referring to fig. 3, fig. 3 is a schematic flow chart of a train safety control method according to a third embodiment of the present invention. Fig. 3 illustrates two authentication instances with an ATS for the identification of a target object in a security command. An operator can input a safety command on a display interface of the ATS, after the ATS receives the safety command, the safety command can be encoded by adopting an encoding mode A, then the encoded safety command is sent to the ATS control unit, the ATS control unit decodes the safety command, and the safety command is returned to the display interface of the ATS through the ATS server. Correspondingly, after receiving the safety command, the ATS can display the safety command on a display interface, verify the safety command, judge whether a target object in the safety command is consistent with a target object input by an operator, if not, finish the process, if so, remind the operator to input the safety command again, encode the safety command input by the operator by adopting an encoding mode B, and send the encoded safety command to the ATS control unit. The ATS control unit decodes the coded safety command, compares the two safety commands, and if the identification of the target object input at the time is consistent with the identification of the target object input before, the ATS control unit can package the safety commands received twice through a safety communication protocol and then send the safety commands to the interlocking equipment. And the interlocking device sends the safety command to the target object and executes the safety command when comparing that the safety command is consistent each time. And when the two states are inconsistent, the safety command is not sent to the interlocking device, and further, when the two states are inconsistent, fault information can be displayed on a display interface of the ATS, so that an operator can take relevant measures to process the fault.
It should be noted that, when the operator erroneously triggers a safety command, for example, the operator erroneously triggers a safety command for unlocking a target object, after receiving the erroneously triggered safety command, the interlock device will allow the train to enter the fault area, which may also cause a serious accident. Or when the operator triggers the safety command for blocking the target object by mistake, the interlocking device prohibits the train from entering the fault area after receiving the safety command triggered by mistake, thereby influencing the usability of the target object. Therefore, in the embodiment of the present invention, in order to avoid the above situation, the authentication and authorization may be performed on the operator. The above process is described in detail below with reference to fig. 4.
Fig. 4 is a schematic flow chart of a train safety control method according to a fourth embodiment of the present invention.
As shown in fig. 4, on the basis of the embodiments shown in fig. 1 to 3, before step 101, the safety control method for a train may further include the following steps:
step 201, receiving authentication information input by an operator.
In the embodiment of the present invention, the authentication information input by the operator may be character password information, biometric information, graphic password information, motion information, and the like, which is not limited. The biometric information may be a fingerprint, an iris, a facial phase, DNA, etc., and the motion information includes the motion made by a facial organ, the motion made by a limb, and/or the motion made by a body, and the number and/or frequency of each motion.
Step 202, comparing the received authentication information with the pre-stored authentication information.
In the embodiment of the invention, the pre-stored authentication information is information which is pre-input on a display interface of the ATS by an authorized operator.
Alternatively, the received authentication information may be compared with pre-stored authentication information, so that it may be determined whether the operator who inputs the authentication information is an authorized operator.
Step 203, determining whether the two authentication information are consistent, if yes, executing step 204, otherwise, executing step 205.
Optionally, to avoid triggering the security command by an unauthorized person or to avoid triggering the security command by an authorized person by mistake, in the embodiment of the present invention, it may be determined whether the two authentication information are consistent, and when the two authentication information are consistent, step 204 may be triggered, and when the two authentication information are inconsistent, step 205 may be triggered.
Step 204, through the authentication of the operator.
In the embodiment of the present invention, after the operator is authenticated, the steps in fig. 1 to fig. 3 may be executed.
Step 205, the operator is not authenticated.
In the embodiment of the invention, when the authentication of the operator is not passed, no treatment is required.
In the safety control method of the train of the embodiment, the authentication information input by an operator is received; comparing the received authentication information with prestored authentication information; if the two authentication information are consistent, the operator is authenticated. Therefore, the safety command can be prevented from being triggered by unauthorized personnel, or the safety command can be prevented from being triggered by authorized personnel by mistake, so that the running safety of the train is further guaranteed.
In order to realize the embodiment, the invention further provides a safety control device of the train.
Fig. 5 is a schematic structural diagram of a safety control device for a train according to an embodiment of the present invention.
As shown in fig. 5, the safety control device 100 for a train includes: a receiving module 110, an extracting module 120, a listening module 130, and a processing module 140. Wherein the content of the first and second substances,
the receiving module 110 is configured to receive a security command issued to a target object.
And the extracting module 120 is configured to extract the identifier of the target object from the security command, and verify the identifier of the target object.
The monitoring module 130 is configured to monitor a security command input again when the verification passes, and if the security command is monitored, determine whether the current verification is the last verification; if the security command input again is not listened to, the flow ends.
The processing module 140 is configured to, when the verification is the last time, package the received security command each time and send the packaged security command to the interlock device, the interlock device sends the security command to the target object and executes the security command when the security command is consistent each time, and when the verification is not the last time, returns to monitor the security command input again and continues the next verification process with subsequent operations.
As a possible implementation manner, the processing module 140 is specifically configured to receive an execution result returned by the interlock device; the execution result is generated after the target object executes the safety command; judging whether the target object is abnormal or not according to the execution result; and if the target object is abnormal, sending alarm information to the train which is running to the target object, wherein the alarm information carries the identification of the target object.
Optionally, the processing module 140 is further configured to obtain the position information of the target object before sending the warning information to the train which is traveling towards the target object; and acquiring the train which is travelling to the target object according to the position information.
Further, in a possible implementation manner of the embodiment of the present invention, referring to fig. 6, on the basis of the embodiment shown in fig. 5, the safety control device 100 of the train may further include:
and the encoding module 150 is configured to, after receiving the security command issued to the target object, perform encoding processing on the security command to obtain an encoded security command.
An extraction module 120, specifically configured to decode the encoded security command to obtain a security command; an identification of the target object is extracted from the security command.
As a possible implementation, the security command is encoded differently in each authentication process.
As a possible implementation manner, when receiving the security command for the first time, the extraction module 120 is specifically configured to detect a confirmation operation input by an operator through the display interface; when the confirmation operation is detected, displaying a prompt for inputting the safety command again through the display interface; a security command entered again is received.
As another possible implementation manner, when the security command is not received for the first time, the extraction module 120 is specifically configured to compare the identifier of the target object input for the second time with the identifier of the target object input before; and if the input identifications of the target objects are consistent, passing the verification of the identifications of the target objects.
An authentication module 160 for receiving authentication information input by an operator before receiving a security command for locking or unlocking a target object; comparing the received authentication information with prestored authentication information; if the two authentication information are consistent, the operator is authenticated.
It should be noted that the above explanation of the embodiment of the train safety control method is also applicable to the train safety control device 100 of this embodiment, and is not repeated here.
The safety control device of the train of the embodiment receives a safety command for issuing a target object; extracting the identification of the target object from the safety command, and verifying the identification of the target object; monitoring a safety command input again when the verification passes, and if the safety command is monitored, judging whether the current verification is the last verification; if the safety command input again is not monitored, the process is ended; if the verification is the last time, the received safety command is packaged and then sent to the interlocking equipment, and the interlocking equipment sends the safety command to the target object and executes the safety command when comparing that the safety command is consistent each time; if not, returning to monitor the security command input again and continuing the next authentication process by subsequent operations. In this embodiment, the ATS verifies the safety command at least twice, so that the probability of the incorrect safety command sent to the interlock device can be reduced, and the situations that the target object executes the incorrect safety command or the interlock device controls the incorrect target object, and the like, can be avoided. Furthermore, after receiving the safety command, the interlock device needs to compare whether the safety command is consistent every time, and only when the safety command is consistent, the interlock device sends the safety command to the target object and executes the safety command, so that the situations that the target object executes a wrong safety command or controls a wrong target object by the interlock device and the like can be further avoided. In addition, the ATS verifies the safety command at least twice, the ATS only needs to package the safety command received each time and then sends the safety command to the interlocking equipment, and the interlocking equipment performs consistency comparison, so that the running safety of the train can be ensured, and the information interaction process between the ATS and the interlocking equipment can be simplified.
In order to implement the foregoing embodiment, the present invention further provides a computer device, including: a processor and a memory; wherein the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory, so as to implement the safety control method for a train as set forth in the foregoing embodiment of the present invention.
In order to achieve the above embodiments, the present invention also proposes a non-transitory computer-readable storage medium having a computer program stored thereon, characterized in that the program, when executed by a processor, implements a safety control method of a train as proposed in the foregoing embodiments of the present invention.
In order to implement the foregoing embodiments, the present invention further provides a computer program product, which when executed by an instruction processor in the computer program product implements the safety control method for a train as set forth in the foregoing embodiments of the present invention.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (11)

1. A safety control method for a train, comprising:
receiving a safety command for issuing a target object;
extracting the identification of the target object from the safety command, and verifying the identification of the target object;
monitoring the safety command input again when the verification passes, and if the safety command is monitored, judging whether the verification is the last verification; if the safety command input again is not monitored, ending the process;
if the verification is the last time, the safety command received each time is packaged and then sent to interlocking equipment, and the interlocking equipment sends the safety command to the target object and executes the safety command when comparing that the safety command is consistent each time;
if not, returning to monitor the security command input again and continuing the next authentication process by subsequent operations.
2. The method of claim 1, wherein sending the safety command to an interlock device, the interlock device sending the safety command to the target object and executing when comparing each time the safety command is consistent, comprises:
receiving an execution result returned by the interlocking device; wherein the execution result is generated after the target object executes the safety command;
judging whether the target object is abnormal or not according to the execution result;
and if the target object is abnormal, sending alarm information to the train which is running to the target object, wherein the alarm information carries the identification of the target object.
3. The method of claim 2, wherein prior to issuing the warning message to the train traveling towards the target object, further comprising:
acquiring position information of the target object;
and acquiring the train which runs to the target object according to the position information.
4. The method of claim 1, wherein after receiving the security command for issuing to the target object, the method further comprises:
coding the safety command to obtain a coded safety command;
the extracting the identification of the target object from the security command comprises:
decoding the coded safety command to obtain the safety command;
extracting an identification of the target object from the security command.
5. The method of claim 4, further comprising:
and the security command is coded in a different way in each verification process.
6. The method of claim 5, wherein verifying the identity of the target object when the security command is first received comprises:
displaying the identification of the target object to an operator through a display interface;
the security command input again when the interception verification passes comprises:
detecting the confirmation operation input by the operator through the display interface;
when the confirmation operation is detected, displaying a prompt for inputting the safety command again through the display interface;
receiving the security command input again.
7. The method of claim 6, wherein verifying the identity of the target object when the security command is not first received comprises:
comparing the identification of the target object input at the current time with the identification of the target object input before;
and if the input identifications of the target objects are consistent, passing the verification of the identifications of the target objects.
8. The method according to any one of claims 1 to 7, wherein before receiving the security command for issuing to the target object, the method further comprises:
receiving authentication information input by an operator;
comparing the received authentication information with pre-stored authentication information;
and if the two authentication information are consistent, the operator is authenticated.
9. A safety control device for a train, comprising:
the receiving module is used for receiving a safety command issued to a target object;
the extraction module is used for extracting the identification of the target object from the safety command and verifying the identification of the target object;
the monitoring module is used for monitoring the safety command input again when the verification passes, and if the safety command is monitored, whether the current verification is the last verification is judged; if the safety command is not monitored, ending the process;
and the processing module is used for packaging and sending the received safety command to the interlocking equipment each time when the last verification is performed, sending the safety command to the target object and executing the safety command when the interlocking equipment compares that the safety command is consistent each time, and returning and monitoring the safety command input again and subsequent operation to continue the next verification process when the last verification is not performed.
10. A computer device comprising a processor and a memory;
wherein the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory for implementing the safety control method of a train according to any one of claims 1 to 8.
11. A non-transitory computer-readable storage medium having stored thereon a computer program, characterized in that the program, when executed by a processor, implements a method of safety control of a train according to any one of claims 1 to 8.
CN201810064896.8A 2018-01-23 2018-01-23 Safety control method and device for train Active CN110065526B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810064896.8A CN110065526B (en) 2018-01-23 2018-01-23 Safety control method and device for train

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810064896.8A CN110065526B (en) 2018-01-23 2018-01-23 Safety control method and device for train

Publications (2)

Publication Number Publication Date
CN110065526A CN110065526A (en) 2019-07-30
CN110065526B true CN110065526B (en) 2020-11-06

Family

ID=67365359

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810064896.8A Active CN110065526B (en) 2018-01-23 2018-01-23 Safety control method and device for train

Country Status (1)

Country Link
CN (1) CN110065526B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101643081A (en) * 2009-06-30 2010-02-10 卡斯柯信号有限公司 Control method for controlling function message flow in interlocking way in automatic train monitoring system
JP2014048713A (en) * 2012-08-29 2014-03-17 Nec Personal Computers Ltd Input information authenticating device and program for the same
CN103723167A (en) * 2013-12-16 2014-04-16 北京交控科技有限公司 Point-type train speed limit setting method
CN106050299A (en) * 2016-05-13 2016-10-26 北京煤科天玛自动化科技有限公司 Control system of underground coal mine walking type equipment train
JP2017013578A (en) * 2015-06-30 2017-01-19 株式会社日立製作所 Train operation management system and train operation management method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101643081A (en) * 2009-06-30 2010-02-10 卡斯柯信号有限公司 Control method for controlling function message flow in interlocking way in automatic train monitoring system
JP2014048713A (en) * 2012-08-29 2014-03-17 Nec Personal Computers Ltd Input information authenticating device and program for the same
CN103723167A (en) * 2013-12-16 2014-04-16 北京交控科技有限公司 Point-type train speed limit setting method
JP2017013578A (en) * 2015-06-30 2017-01-19 株式会社日立製作所 Train operation management system and train operation management method
CN106050299A (en) * 2016-05-13 2016-10-26 北京煤科天玛自动化科技有限公司 Control system of underground coal mine walking type equipment train

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ATS系统与PSD进站警示系统接口的实现;李铮 等;《铁道通信信号》;20131231;第49卷;55-57 *
基于时刻表的列车模拟运行的研究与设计;穆亚倩 等;《铁路计算机应用》;20150331;第24卷(第03期);1-5 *

Also Published As

Publication number Publication date
CN110065526A (en) 2019-07-30

Similar Documents

Publication Publication Date Title
CN106515661B (en) A kind of control method and system that pure electric automobile starts without key
US11325586B2 (en) Autonomous driving control device, autonomous mobile vehicle, and autonomous mobile vehicle control system
US20180134521A1 (en) Unlocking key with authorization device
KR101446525B1 (en) System and method for preventing car hacking and a medium having computer readable program for executing the method
KR20160123119A (en) Remote parking control system and control method thereof
CN110843729B (en) Vehicle anti-theft method and system
CN111661039A (en) Vehicle remote starting method and system for remote control parking
KR101617872B1 (en) Alert method and system of fingerprint reader
US9352723B2 (en) Theft prevention device and theft prevention method
US10118592B2 (en) Diagnostic port protection to body control module
JP5977146B2 (en) Electronic key system
US20160152210A1 (en) Method of operating a telematics system, and telematics system
CN109131216A (en) A kind of method and device thereof of vehicle remote control car door lock and starting
CN108482308B (en) Electric vehicle safety control method and device, storage medium and electric vehicle
CN110065526B (en) Safety control method and device for train
CN102407827A (en) Car one-key starting system and control method therefor
US10970950B2 (en) Systems and methods for activating a security action responsive to proximal detection and identification of a wireless device
US10093330B2 (en) Remote locomotive access detection
US10322632B2 (en) Method for controlling a functional component of a transportation vehicle by a medical implant of a user of the transportation vehicle, computer program, control device for a transportation vehicle, and medical implant
US20040246095A1 (en) Security device
JPH09508604A (en) Travel lock device
EP3067246B1 (en) A device and a method for monitoring the operability of a signal connection
RU2752632C1 (en) Layout scheme for protecting the rail vehicle from unauthorized persons' actions
JP3630433B2 (en) Mobility prohibition device with short unlock time
JP6618827B2 (en) Security system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant