CN113548557B - Method for protecting elevator network abnormality and computer-readable storage medium - Google Patents
Method for protecting elevator network abnormality and computer-readable storage medium Download PDFInfo
- Publication number
- CN113548557B CN113548557B CN202110815073.6A CN202110815073A CN113548557B CN 113548557 B CN113548557 B CN 113548557B CN 202110815073 A CN202110815073 A CN 202110815073A CN 113548557 B CN113548557 B CN 113548557B
- Authority
- CN
- China
- Prior art keywords
- elevator
- network
- control instruction
- type
- mode switching
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B66—HOISTING; LIFTING; HAULING
- B66B—ELEVATORS; ESCALATORS OR MOVING WALKWAYS
- B66B1/00—Control systems of elevators in general
- B66B1/34—Details, e.g. call counting devices, data transmission from car to control system, devices giving information to the control system
- B66B1/3415—Control system configuration and the data transmission or communication within the control system
- B66B1/3446—Data transmission or communication within the control system
- B66B1/3461—Data transmission or communication within the control system between the elevator control system and remote or mobile stations
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B66—HOISTING; LIFTING; HAULING
- B66B—ELEVATORS; ESCALATORS OR MOVING WALKWAYS
- B66B5/00—Applications of checking, fault-correcting, or safety devices in elevators
- B66B5/02—Applications of checking, fault-correcting, or safety devices in elevators responsive to abnormal operating conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. HOUSING, HOUSE APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B50/00—Energy efficient technologies in elevators, escalators and moving walkways, e.g. energy saving or recuperation technologies
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Automation & Control Theory (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Maintenance And Inspection Apparatuses For Elevators (AREA)
Abstract
The invention discloses a protection method for elevator network abnormity and a computer readable storage medium, which are applied to an elevator, wherein the elevator is connected with a cloud server in real time, and the elevator executes elevator control operation based on a real-time control instruction of the cloud server, and the method comprises the following steps: judging whether a protection mode switching control instruction of the cloud server is acquired; under the condition that the protection mode switching control instruction is obtained, obtaining the instruction type of the protection mode switching control instruction; and executing corresponding protection mode switching operation based on the instruction type. The communication state between the cloud server and the elevator is monitored in real time, and corresponding protective measures are executed according to the abnormal type of the communication state, so that the operation safety of the elevator is effectively improved, the stability and the reliability of network communication between the elevator and the cloud server are guaranteed, the normal operation of the elevator is effectively protected, and the personal safety of passengers is guaranteed.
Description
Technical Field
The invention relates to the technical field of elevator communication, in particular to a protection method for elevator network abnormity and a computer readable storage medium.
Background
As the competition of the conventional elevator is increased, the cost of the conventional elevator is closer to the limit of the cost, so that how to further optimize the production and manufacturing cost of the elevator and further improve the use safety of the elevator becomes a difficult problem.
In order to solve the technical problems, technicians provide an elevator control system based on an information physical system, the elevator control system is connected with each elevator in real time through a cloud server, and each elevator is controlled to perform control operation through a real-time control instruction of the cloud server.
However, in the practical application process, because the normal operation of the elevator system based on the cyber-physical system depends on the real-time control instruction of the cloud server, once the elevator is subjected to network attack or network hijack, the communication between the elevator and the cloud server is interrupted, and further the abnormal elevator stopping of the elevator or even safety accidents are caused, so that the use safety of the elevator is greatly reduced.
Disclosure of Invention
In order to solve the technical problems in the prior art, embodiments of the present invention provide a method for protecting an elevator network from abnormality, which effectively improves the operation safety of an elevator, ensures the stability and reliability of network communication between the elevator and a cloud server, realizes effective protection of normal operation of the elevator, and ensures the personal safety of passengers by monitoring the communication state between the cloud server and the elevator in real time and executing corresponding protection measures according to the abnormality type of the communication state.
In order to achieve the above object, an embodiment of the present invention provides a method for protecting an elevator network anomaly, which is applied to an elevator, wherein the elevator is connected with a cloud server in real time, and the elevator executes an elevator control operation based on a real-time control instruction of the cloud server, and the method includes: judging whether a protection mode switching control instruction of the cloud server is acquired; under the condition that the protection mode switching control instruction is obtained, obtaining the instruction type of the protection mode switching control instruction; and executing corresponding protection mode switching operation based on the instruction type.
Preferably, the executing the corresponding protection mode switching operation based on the instruction type includes: executing communication resetting operation under the condition that the instruction type is a network hijack type; judging whether the communication resetting operation is executed; under the condition that the communication resetting operation cannot be executed and completed, switching the current working mode into an offline control mode; and under the condition that the instruction type is network attack or the execution of the communication resetting operation is completed, switching the current working mode into a hidden communication mode.
Preferably, the method further comprises: after the current working mode is switched to a hidden communication mode, monitoring whether a broadcast control instruction sent from the cloud server exists in a network; in the presence of the broadcast control command, performing a corresponding elevator control operation based on the broadcast control command; and acquiring and feeding back the execution result of the elevator control operation.
Preferably, the method further comprises: performing a security verification operation on the broadcast control command prior to performing a corresponding elevator control operation based on the broadcast control command; judging whether the broadcast control instruction is a legal control instruction or not; and if the broadcast control command is a legal control command, executing corresponding elevator control operation based on the broadcast control command.
Preferably, the method further comprises: after the protection mode switching operation is executed, judging whether a mode recovery control instruction of the cloud server is acquired; and under the condition of acquiring the mode recovery control instruction, switching the current working mode into a normal working mode.
Correspondingly, the embodiment of the invention also provides a protection method for the elevator network abnormity, which is applied to a cloud server, the cloud server is connected with an elevator in real time, the elevator executes elevator control operation based on the real-time control instruction of the cloud server, and the method comprises the following steps: monitoring the network communication state with the elevator in real time; acquiring an abnormal type under the condition that the network communication state is abnormal; and generating and sending a corresponding protection mode switching control instruction under the condition that the abnormal type accords with a preset type.
Preferably, the preset types include a network hijack type and a network attack type, and the generating and sending a corresponding protection mode switching control instruction when the abnormal type meets the preset type includes: generating a protection mode switching control instruction corresponding to the network hijacking type under the condition that the abnormal type is the network hijacking type, wherein the protection mode switching control instruction comprises a network hijacking mark; and under the condition that the abnormal type is the network attack type, generating a protection mode switching control instruction corresponding to the network attack type, wherein the protection mode switching control instruction comprises a network attack mark.
Preferably, the method further comprises: judging whether the elevator executes the protection mode switching control command or not; generating a broadcast control command corresponding to the elevator when the elevator executes the protection mode switching control command; and executing broadcast operation on the broadcast control instruction according to a preset broadcast rule.
Preferably, the method further comprises: after generating and sending a corresponding protection mode switching control instruction, monitoring whether the network communication state is recovered to a normal state in real time; and generating and sending a mode recovery control instruction under the condition that the network communication state is recovered to a normal state.
In another aspect, an embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the method provided by the embodiment of the present invention.
Through the technical scheme provided by the invention, the invention at least has the following technical effects:
in the communication process, the network communication state between the cloud server and the elevator is monitored in real time, and once network abnormality occurs, corresponding protection measures are immediately taken according to the abnormal type, so that the operation safety of the elevator is effectively protected, and the stability and reliability of network communication are guaranteed;
on the other hand, when network attack or network hijacking is received, the elevator is set to be in a hidden communication mode, so that the elevator is hidden in the network to avoid being attacked by an attack means in the network, thereby realizing network protection of the elevator, ensuring real-time communication between the elevator and the cloud server, and ensuring normal operation of the elevator.
Additional features and advantages of embodiments of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the embodiments of the invention without limiting the embodiments of the invention. In the drawings:
fig. 1 is a flow chart of a specific implementation of a protection method for an elevator network anomaly according to an embodiment of the present invention;
fig. 2 is a flowchart of a specific implementation of the protection mode switching operation in the protection method for the elevator network anomaly according to the embodiment of the present invention;
fig. 3 is a flow chart of a specific implementation of a method for protecting an elevator network from an abnormality according to another embodiment of the present invention.
Detailed Description
The following detailed description of embodiments of the invention refers to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating embodiments of the invention, are given by way of illustration and explanation only, not limitation.
The terms "system" and "network" in embodiments of the invention may be used interchangeably. The "plurality" means two or more, and in view of this, the "plurality" may also be understood as "at least two" in the embodiments of the present invention. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" generally indicates that the preceding and following related objects are in an "or" relationship, unless otherwise specified. In addition, it should be understood that the terms first, second, etc. in the description of the embodiments of the invention are used for distinguishing between the descriptions and are not intended to indicate or imply relative importance or order to be construed.
The background of the invention is first described below.
In the prior art, elevators are usually operated off-line, so each elevator must be provided with a main control board with an elevator control function and a corresponding main control box, and for the case of parallel connection of a plurality of elevators, an additional group control board and a corresponding electrical structure are required to be configured. As the elevator industry becomes more competitive, the manufacturing costs of elevators are continually compressed, and in existing elevator systems, the costs of elevators have reached their cost limits.
In order to further reduce the cost of the elevator system, technicians provide an elevator system based on an information physical system, in the elevator system, each elevator is connected with a cloud server in real time through a network communication technology, corresponding elevator control operation is executed through a real-time control command of the cloud server, correspondingly, each elevator feeds back corresponding elevator sensing information to the cloud server in real time, and on the basis, the elevator system on site does not need to be provided with an additional main control board, a group control board and a corresponding electric control box or an electric control circuit.
However, in an actual application process, the normal operation of the elevator system depends on normal network communication between the elevator and the cloud server, and once the elevator is subjected to communication attack, the elevator cannot normally operate, for example, the elevator is subjected to network attack or network hijacking, the elevator cannot normally acquire real-time control information of the cloud server, and cannot normally operate, and even serious safety accidents are caused.
In order to solve the above technical problem, please refer to fig. 1, an embodiment of the present invention provides a protection method for an elevator network anomaly, which is applied to an elevator, the elevator is connected with a cloud server in real time, the elevator executes an elevator control operation based on a real-time control instruction of the cloud server, and the method includes:
s10) judging whether a protection mode switching control instruction of the cloud server is acquired;
s20) acquiring the instruction type of the protection mode switching control instruction under the condition of acquiring the protection mode switching control instruction;
s30) executing corresponding protection mode switching operation based on the instruction type.
In a possible implementation mode, in order to effectively protect the normal operation of the elevator and ensure that the communication between the elevator and the cloud server is normal, the cloud server monitors the network communication state with the elevator in real time, for example, at a certain time, the cloud server monitors that the network communication state with a certain elevator is abnormal, and therefore the abnormal type of the abnormality is immediately acquired. For example, after simple failure recognition or troubleshooting is performed, the cloud server determines that the network communication state is abnormal to normal network fluctuation, and thus does not perform a network protection operation. In another embodiment, the cloud server monitors that the network communication state between the cloud server and one elevator is abnormal, and the corresponding abnormal type accords with the preset type, so that the corresponding protection mode switching control command is immediately generated and sent to the corresponding elevator to control the elevator to immediately execute the network protection operation.
In the actual operation process of the elevator, whether a protection mode switching control instruction from a cloud server is obtained or not is judged in real time, if the protection mode switching control instruction is obtained, a corresponding instruction type is obtained, and protection mode switching operation corresponding to the instruction type is immediately executed.
In the embodiment of the invention, the communication state between the cloud server and the elevator is monitored in real time, once the network communication abnormity is found, the abnormity or fault is immediately checked, and under the condition that the abnormity is determined to accord with the preset abnormity type, the elevator is immediately controlled to execute the protection mode switching operation so as to force the elevator to enter the protection mode to protect the normal operation of the elevator or protect the network communication between the elevator and the cloud server, so that the operation safety of the elevator is effectively improved, and the normal and stable network communication between the elevator and the cloud server is ensured.
Referring to fig. 2, in the embodiment of the present invention, the executing the corresponding protection mode switching operation based on the instruction type includes:
s31) executing communication resetting operation under the condition that the instruction type is a network hijack type;
s32) judging whether the execution of the communication resetting operation is finished;
s33) under the condition that the communication resetting operation cannot be executed and completed, switching the current working mode into an offline control mode;
s34) switching the current working mode into a hidden communication mode under the condition that the instruction type is network attack or the execution of the communication resetting operation is completed.
In an embodiment of the present invention, the abnormal type of the network communication state anomaly includes, but is not limited to, a network attack and a network hijacking, and in a possible implementation, the cloud server immediately identifies the abnormal type after monitoring that the network communication state anomaly is detected, for example, in an embodiment, if the cloud server monitors that the abnormal type is the network hijacking, the cloud server immediately generates a corresponding protection mode switching control instruction, for example, generates a protection mode switching control instruction including a network hijacking flag.
After the elevator receives the protection mode switching control instruction, firstly extracting a mark therein, for example, in the embodiment of the present invention, the elevator receives the protection mode switching control instruction with the instruction type of network hijacking, so that a communication resetting operation is performed first, for example, all network communication parameters are reset to initial parameters, and whether the communication resetting operation is performed or not is determined, for example, in one embodiment, the elevator determines that the network communication parameters cannot be reset, that is, the communication resetting operation cannot be performed, so that the current working mode is switched to an off-line control mode, the network communication connection with the outside is disconnected, for example, in the off-line control mode, the elevator automatically stops at the nearest landing and stops running, and simultaneously, the elevator or the cloud server sends corresponding alarm information to a corresponding maintenance person to prompt the maintenance person to go to the site immediately for fault processing.
In another embodiment, the elevator determines that the communication resetting operation is completed, so that the current working mode is immediately switched to the hidden communication mode, for example, in the hidden communication mode, the network address of the elevator is hidden in the network, and meanwhile, the corresponding elevator sensing information is not actively sent to the cloud server, but the network communication information of the cloud server is passively received to continue the elevator control operation.
In the embodiment of the invention, after the elevator is determined to suffer network attack or network hijack, the elevator is immediately controlled to execute the corresponding protective measures, so that the normal operation or normal communication of the elevator is protected, and once the elevator cannot execute the protective measures, the elevator is immediately controlled to disconnect the network communication with the outside and enter an off-line control mode, so that the operation safety of the elevator is further protected.
In an embodiment of the present invention, the method further includes: after the current working mode is switched to a hidden communication mode, monitoring whether a broadcast control instruction sent from the cloud server exists in a network; in the presence of the broadcast control command, performing a corresponding elevator control operation based on the broadcast control command; and acquiring and feeding back the execution result of the elevator control operation.
Further, in an embodiment of the present invention, the method further includes: performing a security verification operation on the broadcast control command prior to performing a corresponding elevator control operation based on the broadcast control command; judging whether the broadcast control instruction is a legal control instruction or not; and if the broadcast control command is a legal control command, executing corresponding elevator control operation based on the broadcast control command.
In a possible embodiment, after sending a corresponding protection mode switching control instruction to an elevator, the cloud server monitors in real time whether the elevator executes the protection mode switching control instruction, and if it is determined that the elevator executes the protection mode switching control instruction, it is determined that the elevator has entered a hidden communication mode, and at this time, a broadcast control instruction corresponding to the elevator is generated, for example, the broadcast control instruction is broadcast and propagated in a current network route in a broadcast form according to a preset broadcast rule, for example, the preset broadcast rule may be a broadcast rule such as an encrypted broadcast, an address broadcast, and an address-less broadcast, and is not limited herein. Correspondingly, after the elevator enters the hidden communication mode, whether a broadcast control command sent from the cloud server exists in the network is monitored in real time, for example, at a certain moment, the elevator monitors that the broadcast control command belonging to the elevator exists in the network, so that the broadcast control command is immediately analyzed and corresponding elevator control operation is executed, and after the elevator control operation is executed, a corresponding execution result can be obtained through the sensor and fed back to the cloud server.
In order to ensure the safety and the legality of the broadcast control command, after the broadcast control command is analyzed, a safety verification operation is further executed, for example, the broadcast control command is decrypted according to a preset key, whether the decrypted broadcast control command is a correct control command or not is judged, if yes, the broadcast control command is determined to be a legal control command, and at the moment, a corresponding elevator control operation is executed according to the broadcast control command.
In the embodiment of the invention, after the elevator is determined to suffer from network attack or network hijack, the elevator is controlled to firstly carry out network recovery or network reset, and immediately enter the hidden network mode after the network is reset, so that the attack or network hijack on the elevator network in the network environment is effectively relieved, the normal communication between the elevator and the cloud server is protected, the normal operation of the elevator is ensured, and the safety of the elevator is improved.
In an embodiment of the present invention, the method further includes: after the protection mode switching operation is executed, judging whether a mode recovery control instruction of the cloud server is acquired; and under the condition of acquiring the mode recovery control instruction, switching the current working mode into a normal working mode.
In a possible implementation manner, the cloud server sends the protection mode switching control command, and in the case of performing normal communication with the elevator in the protection mode, monitors whether the network communication state with the elevator is recovered to the normal state in real time, and immediately sends a corresponding mode recovery control command to the elevator after determining that the network communication state with the elevator is recovered to the normal state. When the elevator is in the protection mode, for example, in the process of communicating with the cloud server in the hidden communication mode, whether a mode recovery control instruction of the cloud server is acquired is judged, for example, at a certain moment, the elevator receives the mode recovery control instruction sent by the cloud server, so that the current network communication state can be determined to be recovered to be normal, and the current working mode is switched to the normal mode.
In the embodiment of the invention, the cloud server monitors the network communication state communicated with the elevator in real time and controls the elevator to enter the corresponding protection mode or remove the protection mode according to the network communication state, so that the network protection of the elevator is realized, the operation safety of the elevator is effectively improved, and the personal safety of passengers is guaranteed.
Referring to fig. 3, based on the same inventive concept, an embodiment of the present invention provides a protection method for an elevator network anomaly, which is applied to a cloud server, where the cloud server is connected to an elevator in real time, and the elevator performs an elevator control operation based on a real-time control instruction of the cloud server, where the method includes:
s10) monitoring the network communication state of the elevator in real time;
s20) acquiring an abnormal type under the condition that the network communication state is abnormal;
s30) generating and sending a corresponding protection mode switching control instruction under the condition that the abnormal type accords with the preset type.
In this embodiment of the present invention, the preset types include a network hijacking type and a network attack type, and generating and sending a corresponding protection mode switching control instruction when the exception type matches the preset type includes: generating a protection mode switching control instruction corresponding to the network hijack type under the condition that the abnormal type is the network hijack type, wherein the protection mode switching control instruction comprises a network hijack mark; and generating a protection mode switching control instruction corresponding to the network attack type under the condition that the abnormal type is the network attack type, wherein the protection mode switching control instruction comprises a network attack mark.
In an embodiment of the present invention, the method further comprises: judging whether the elevator executes the protection mode switching control instruction or not; generating a broadcast control command corresponding to the elevator when the elevator executes the protection mode switching control command; and executing broadcast operation on the broadcast control instruction according to a preset broadcast rule.
In an embodiment of the present invention, the method further comprises: after generating and sending a corresponding protection mode switching control instruction, monitoring whether the network communication state is recovered to a normal state in real time; and generating and sending a mode recovery control instruction when the network communication state is recovered to a normal state.
Further, the embodiment of the present invention also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the method according to the embodiment of the present invention.
Although the embodiments of the present invention have been described in detail with reference to the accompanying drawings, the embodiments of the present invention are not limited to the details of the above embodiments, and various simple modifications can be made to the technical solutions of the embodiments of the present invention within the technical idea of the embodiments of the present invention, and the simple modifications all belong to the protection scope of the embodiments of the present invention.
It should be noted that the various features described in the above embodiments may be combined in any suitable manner without departing from the scope of the invention. In order to avoid unnecessary repetition, the embodiments of the present invention do not describe every possible combination.
Those skilled in the art will understand that all or part of the steps in the method according to the above embodiments may be implemented by a program, which is stored in a storage medium and includes several instructions to enable a single chip, a chip, or a processor (processor) to execute all or part of the steps in the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In addition, any combination of various different implementation manners of the embodiments of the present invention is also possible, and the embodiments of the present invention should be considered as disclosed in the embodiments of the present invention as long as the combination does not depart from the spirit of the embodiments of the present invention.
Claims (8)
1. A protection method for elevator network abnormity is applied to an elevator, and is characterized in that the elevator is connected with a cloud server in real time, the elevator executes elevator control operation based on a real-time control command of the cloud server, and the method comprises the following steps:
judging whether a protection mode switching control instruction of the cloud server is acquired;
under the condition that the protection mode switching control instruction is obtained, obtaining the instruction type of the protection mode switching control instruction;
executing corresponding protection mode switching operation based on the instruction type;
the executing of the corresponding protection mode switching operation based on the instruction type includes:
executing communication resetting operation under the condition that the instruction type is a network hijack type;
judging whether the communication resetting operation is executed;
under the condition that the communication resetting operation cannot be executed and completed, switching the current working mode into an offline control mode;
and under the condition that the instruction type is network attack or the execution of the communication resetting operation is completed, switching the current working mode into a hidden communication mode.
2. The method of claim 1, further comprising:
after the current working mode is switched to a hidden communication mode, monitoring whether a broadcast control instruction sent from the cloud server exists in a network;
in the presence of the broadcast control command, performing a corresponding elevator control operation based on the broadcast control command;
and acquiring and feeding back the execution result of the elevator control operation.
3. The method of claim 2, further comprising:
performing a security validation operation on the broadcast control command prior to performing a corresponding elevator control operation based on the broadcast control command;
judging whether the broadcast control instruction is a legal control instruction or not;
and if the broadcast control command is a legal control command, executing corresponding elevator control operation based on the broadcast control command.
4. The method of claim 1, further comprising:
after the protection mode switching operation is executed, judging whether a mode recovery control instruction of the cloud server is acquired;
and under the condition of acquiring the mode recovery control instruction, switching the current working mode into a normal working mode.
5. A protection method for elevator network abnormity is applied to a cloud server, and is characterized in that the cloud server is connected with an elevator in real time, the elevator executes elevator control operation based on a real-time control command of the cloud server, and the method comprises the following steps:
monitoring the network communication state with the elevator in real time;
acquiring an abnormal type under the condition that the network communication state is abnormal;
generating and sending a corresponding protection mode switching control instruction under the condition that the abnormal type accords with a preset type;
the method further comprises the following steps:
judging whether the elevator executes the protection mode switching control instruction or not;
generating a broadcast control command corresponding to the elevator when the elevator executes the protection mode switching control command;
and executing broadcast operation on the broadcast control instruction according to a preset broadcast rule.
6. The method according to claim 5, wherein the preset types include a network hijacking type and a network attack type, and the generating and sending a corresponding protection mode switching control instruction when the exception type matches the preset type includes:
generating a protection mode switching control instruction corresponding to the network hijack type under the condition that the abnormal type is the network hijack type, wherein the protection mode switching control instruction comprises a network hijack mark;
and generating a protection mode switching control instruction corresponding to the network attack type under the condition that the abnormal type is the network attack type, wherein the protection mode switching control instruction comprises a network attack mark.
7. The method of claim 5, further comprising:
after generating and sending a corresponding protection mode switching control instruction, monitoring whether the network communication state is recovered to a normal state in real time;
and generating and sending a mode recovery control instruction when the network communication state is recovered to a normal state.
8. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method of any one of claims 1 to 4 or 5 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110815073.6A CN113548557B (en) | 2021-07-19 | 2021-07-19 | Method for protecting elevator network abnormality and computer-readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110815073.6A CN113548557B (en) | 2021-07-19 | 2021-07-19 | Method for protecting elevator network abnormality and computer-readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113548557A CN113548557A (en) | 2021-10-26 |
CN113548557B true CN113548557B (en) | 2023-03-24 |
Family
ID=78132135
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110815073.6A Active CN113548557B (en) | 2021-07-19 | 2021-07-19 | Method for protecting elevator network abnormality and computer-readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113548557B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003212446A (en) * | 2002-01-23 | 2003-07-30 | Hitachi Ltd | Method and device for controlling elevator |
CN108147266A (en) * | 2017-08-14 | 2018-06-12 | 上海三菱电梯有限公司 | Passenger conveyor system standby mode control device |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4380710B2 (en) * | 2007-02-26 | 2009-12-09 | 沖電気工業株式会社 | Traffic anomaly detection system, traffic information observation device, and traffic information observation program |
EP2243738A1 (en) * | 2009-04-24 | 2010-10-27 | Inventio AG | Method for communicating with a lift assembly |
MX355619B (en) * | 2012-09-25 | 2018-04-25 | Inventio Ag | Method for restoring a safety system for an elevator installation. |
KR102392472B1 (en) * | 2015-09-24 | 2022-04-29 | 삼성전자 주식회사 | Method and apparatus for managing of a network hub in wireless communication system |
EP3487224A1 (en) * | 2016-08-12 | 2019-05-22 | Huawei Technologies Co., Ltd. | Method for switching signal transmission mode, base station and terminal device |
EP3700850B1 (en) * | 2017-10-27 | 2021-12-01 | Inventio AG | Security system for building-connected passenger transport system |
WO2019160600A1 (en) * | 2018-02-14 | 2019-08-22 | Hrl Laboratories, Llc | System and method for side-channel based detection of cyber-attack |
CN109150888B (en) * | 2018-09-03 | 2021-02-05 | 浙江远望信息股份有限公司 | Method for controlling working mode of network security module through physical switch |
WO2020079312A1 (en) * | 2018-10-16 | 2020-04-23 | Kone Corporation | Method of controlling segregation of transportation infrastructure data within a shared data network |
US11170314B2 (en) * | 2018-10-22 | 2021-11-09 | General Electric Company | Detection and protection against mode switching attacks in cyber-physical systems |
JP6597867B2 (en) * | 2018-10-31 | 2019-10-30 | 三菱電機株式会社 | Elevator system |
CN112938708B (en) * | 2021-02-05 | 2022-08-09 | 广州广日电梯工业有限公司 | Elevator safety control system, safety control method and safety control device |
-
2021
- 2021-07-19 CN CN202110815073.6A patent/CN113548557B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003212446A (en) * | 2002-01-23 | 2003-07-30 | Hitachi Ltd | Method and device for controlling elevator |
CN108147266A (en) * | 2017-08-14 | 2018-06-12 | 上海三菱电梯有限公司 | Passenger conveyor system standby mode control device |
Also Published As
Publication number | Publication date |
---|---|
CN113548557A (en) | 2021-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10875502B2 (en) | Monitoring and modifying motor vehicle functions in a motor vehicle | |
US9471770B2 (en) | Method and control unit for recognizing manipulations on a vehicle network | |
CN107508831B (en) | Bus-based intrusion detection method | |
US10956567B2 (en) | Control device, integrated industrial system, and control method thereof | |
JP6723955B2 (en) | Information processing apparatus and abnormality coping method | |
US10819742B2 (en) | Integrated industrial system and control method thereof | |
CN111147437B (en) | Attributing bus disconnect attacks based on erroneous frames | |
CN104850093A (en) | Method for monitoring security in an automation network, and automation network | |
CN108711459A (en) | A kind of diversified protective device for fast reactor | |
WO2018146028A1 (en) | Method for detecting a manipulation on a respective data network of at least one motor vehicle, and server apparatus | |
CN113548557B (en) | Method for protecting elevator network abnormality and computer-readable storage medium | |
CN113557482A (en) | Controller system | |
CN110995840B (en) | Remote terminal anti-dismantling control method suitable for excavator | |
CN109132737B (en) | Detection method and detection device for elevator external call | |
JP2017191958A (en) | Redundancy management system, redundancy switching method, and redundancy switching program | |
CN113518949A (en) | Controller system | |
CN111443623A (en) | Safety protection device and method based on vehicle CAN bus structure | |
CN113901478B (en) | Communication security verification method, device, equipment and storage medium | |
CN107728503A (en) | For monitoring, controlling or adjusting the method and embedded system of machine | |
CN116500434A (en) | Method for detecting network attack of breaker control equipment, method for identifying tripping reason, equipment, readable medium and electronic equipment | |
CN113233269B (en) | Method and device for diagnosing attack on elevator network | |
CN113225231B (en) | Network evaluation method for elevator and network evaluation device for elevator | |
US20240249624A1 (en) | Safety management system and autonomous control system | |
CN110834055A (en) | Equipment safety protection method and device and punch control system | |
CN110700951A (en) | Flameout control system, emergency stop alarm method and flameout control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |