CN114005293B - Method and device for monitoring tampering of conflict table of traffic signal machine - Google Patents

Method and device for monitoring tampering of conflict table of traffic signal machine Download PDF

Info

Publication number
CN114005293B
CN114005293B CN202111643816.2A CN202111643816A CN114005293B CN 114005293 B CN114005293 B CN 114005293B CN 202111643816 A CN202111643816 A CN 202111643816A CN 114005293 B CN114005293 B CN 114005293B
Authority
CN
China
Prior art keywords
traffic signal
data
conflict table
signal machine
conflict
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111643816.2A
Other languages
Chinese (zh)
Other versions
CN114005293A (en
Inventor
还约辉
崔行
薛金良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Guoli Network Security Technology Co ltd
Original Assignee
Zhejiang Guoli Network Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Guoli Network Security Technology Co ltd filed Critical Zhejiang Guoli Network Security Technology Co ltd
Priority to CN202111643816.2A priority Critical patent/CN114005293B/en
Publication of CN114005293A publication Critical patent/CN114005293A/en
Application granted granted Critical
Publication of CN114005293B publication Critical patent/CN114005293B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/09Arrangements for giving variable traffic instructions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/097Supervising of traffic control systems, e.g. by giving an alarm if two crossing streets have green light simultaneously
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles

Abstract

The embodiment of the disclosure provides a method and a device for monitoring tampering of a conflict table of a traffic signal machine, wherein the method for monitoring tampering of the conflict table of the traffic signal machine comprises the following steps: acquiring data information of a traffic signal machine; analyzing data information of the traffic signal machine to obtain a current conflict table used by the traffic signal machine, wherein the current conflict table comprises light group conflict information of the traffic signal machine; comparing the current conflict table with a pre-configured original conflict table; and responding to the situation that the data stored in the current conflict table and the data stored in the original conflict table are not identical, and performing conflict table tampering alarm. According to the technical scheme of the embodiment of the disclosure, the current conflict table is extracted from the current configuration file of the traffic signal machine through the monitoring device, and the state of the conflict table of the traffic signal machine is effectively monitored through the method of comparing the current conflict table with the original conflict table, so that the problem that the conflict table is tampered and related workers cannot monitor the conflict table, and thus a major traffic accident occurs is solved.

Description

Method and device for monitoring tampering of conflict table of traffic signal machine
Technical Field
The technical scheme disclosed by the invention relates to the technical field of the Internet of things, in particular to a method and a device for monitoring tampering of a conflict table of a traffic signal machine.
Background
The signal machine is one of the important components of the urban traffic system of the Internet of things, is mainly used for controlling and managing a road traffic signal lamp, an information display screen, a parking space induction screen and a vehicle detection and velometer, can be connected with a control center platform, and implements regional management and control and traffic optimization. However, with the development of traffic and network security technologies, the existing traffic signal apparatuses have been unable to meet the requirements of traffic security in new situations.
Malicious personnel can destroy or illegally control the traffic signal machine through remote or physical contact and other modes to make traffic disorder, so that the purposes of harming the society, making panic and the like are achieved. Among them, one of the cases of the destruction of the traffic signal is: malicious personnel illegally access the traffic control network through the edge network and modify the conflict list of the traffic signal machine in the city, so that even if the traffic signal lamps at a certain intersection in different directions conflict, the traffic signal machine does not send an alarm to related working personnel, and then the control instruction with a conflict state is sent to the traffic signal machine through remote control, for example, the traffic signal lamps in the whole city are all changed into green, so that serious traffic accidents occur at each traffic intersection, and the city operation is trapped in paralysis.
Since there is no method for monitoring whether the conflict table is tampered, even if malicious personnel tamper with the conflict table in the traffic signal, the related staff cannot detect the abnormality in time, and the traffic accident can inevitably occur under normal conditions.
Disclosure of Invention
In view of this, the embodiments of the present disclosure provide a method and an apparatus for monitoring tampering of a collision table of a traffic signal.
Specifically, the embodiment of the present disclosure is implemented by the following technical solutions:
according to a first aspect of the present disclosure, a collision table tampering monitoring method of a traffic signal machine is provided, the method including:
acquiring data information of a traffic signal machine;
analyzing the data information of the traffic signal machine to obtain a current conflict table used by the traffic signal machine, wherein the current conflict table comprises the lamp group conflict information of the traffic signal machine;
comparing the current conflict table with a pre-configured original conflict table;
and responding to the situation that the data stored in the current conflict table and the data stored in the original conflict table are not identical, and performing conflict table tampering alarm.
According to a second aspect of the present disclosure, there is provided a collision table tampering monitoring device of a traffic signal, the device including:
the acquisition module is used for acquiring data information of the traffic signal machine;
the analysis module is used for analyzing the data information of the traffic signal machine to obtain a current conflict table used by the traffic signal machine, and the current conflict table comprises the lamp group conflict information of the traffic signal machine;
the comparison module is used for comparing the current conflict table with a pre-configured original conflict table;
and the warning module is used for responding that the data stored in the current conflict table and the data stored in the original conflict table are not identical and carrying out conflict table tampering warning.
According to a third aspect of the present disclosure, there is provided a computer readable storage medium storing machine readable instructions which, when invoked and executed by a processor, cause the processor to implement the method of monitoring a collision table of any embodiment of the present disclosure.
According to a fourth aspect of the present disclosure, there is provided an electronic device comprising a communication interface, a processor, a memory, and a bus, wherein the communication interface, the processor, and the memory are connected to each other through the bus; the memory stores machine readable instructions, and the processor executes the method for monitoring the conflict table of any embodiment of the disclosure by calling the machine readable instructions.
According to the method for monitoring tampering of the conflict table of the traffic signal, the monitoring device extracts the current conflict table from the current configuration file of the traffic signal, and the method for comparing the current conflict table with the original conflict table effectively monitors the state of the conflict table of the traffic signal, so that the problem that a major traffic accident occurs because the conflict table in the traffic signal is tampered and related workers cannot monitor the conflict table is solved.
The embodiments of the present disclosure are described in further detail below with reference to the accompanying drawings and embodiments.
Drawings
In order to more clearly illustrate one or more embodiments of the present disclosure or technical solutions in related arts, reference will be made to the following briefly described drawings used in the description of the embodiments or related arts, it should be apparent that the drawings in the following description are only some embodiments described in one or more embodiments of the present disclosure, and that other drawings may be obtained by those skilled in the art without inventive effort from the following drawings:
FIG. 1 is an architectural diagram of a traffic control system provided in accordance with an exemplary embodiment of the present disclosure;
fig. 2 is a flowchart of a collision table tamper monitoring method of a traffic signal provided according to an exemplary embodiment of the present disclosure;
fig. 3 is a flowchart of yet another collision table tampering monitoring method for a traffic signal provided in accordance with an exemplary embodiment of the present disclosure;
fig. 4 is a block diagram of a collision table tamper monitoring device of a traffic signal provided in accordance with an exemplary embodiment of the present disclosure;
fig. 5 is a schematic diagram of a hardware structure of an electronic device according to an exemplary embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The traffic signal machine is widely used in China, but with the rapid development of traffic and network security technologies, the traffic signal machine cannot adapt to the requirements of traffic security in new situations, and malicious persons can destroy or illegally control the traffic signal machine in a remote or physical contact mode, for example, the traffic signal machine cannot give an alarm even if the traffic signal of the whole city is changed into green by using a conflict table of the traffic signal machine, so that each traffic intersection generates a serious traffic accident, and the city operation falls into paralysis.
At present, there is no technical scheme in the prior art that can monitor the collision table of the traffic signal, and the safety monitoring of the collision table of the traffic signal is still in a blank stage.
Based on this, the embodiment of the disclosure provides a method for monitoring tampering of a conflict table of a traffic signal machine, which solves the problem that in the prior art, a conflict table in a traffic signal machine is tampered and cannot be monitored by related workers, so that a major traffic accident occurs.
The collision table tampering monitoring method of the traffic signal machine according to the embodiment of the present disclosure is described in detail below with reference to the drawings.
Fig. 1 is an architecture diagram of a traffic control system according to an exemplary embodiment of the present disclosure, and as shown in fig. 1, the system may include a workstation 11, a zone server 12, a monitoring device 13, a core switch 14, a serial server 15, an optical terminal 16, and a traffic signal 17, where the workstation 11, the zone server 12, the core switch 14, the serial server 15, the optical terminal 16, and the traffic signal 17 are components of an existing traffic control system.
In the embodiment of the present disclosure, the monitoring device 13 is added on the basis of the existing traffic control system, as shown in fig. 1, the monitoring device 13 is accessed to the existing traffic control system regional core switch in a bypass deployment manner, and performs data interaction with the traffic signal machine 17 in a serial communication manner through the serial server 15.
The hardware platform of the monitoring device 13 is a general-purpose server, that is, a server, or a personal PC, a notebook, or the like, but the server is mainly used.
The traffic signal machine 17 body mainly comprises a control box, a power distribution unit and a cabinet.
The control box mainly comprises a 6U rack, and the 6U rack comprises a control board, a phase driving board and a vehicle detector which are connected through a bus.
The power distribution unit comprises a switch, a fuse, a distribution board, a power supply, leakage protection, a lightning protection module and the like.
Devices working in the open air need to have the characteristics of water resistance, pressure resistance and shock resistance, and therefore, the cabinets are mostly made of aluminum alloy. The traffic signal machine can be ensured to operate stably and work continuously for a long time.
It is to be noted that the above description about the structure of the traffic signal is merely illustrative, and in other examples, the traffic signal may have other structures.
The traffic control system shown in fig. 1 is also merely an example of a system to which the monitoring device 13 can be applied, and in many cases, the monitoring device can be applied to a system of other structure as long as it is satisfied that the system can communicate with the traffic signal 17.
Fig. 2 is a flowchart of a collision table tampering monitoring method for a traffic signal according to an exemplary embodiment of the present disclosure. The method may be performed by a monitoring device. As shown in fig. 2, the exemplary embodiment method may include the following processes:
step S201, data information of the traffic signal is acquired.
The data information is stored in a designated memory and a disk area of the traffic signal.
The data information includes a correspondence between each lamp group and an input/output interface of the traffic signal, a correspondence between each lamp group and an intersection, a correspondence between each lamp group and a direction, a time when each lamp group is in red light, green light, yellow flashing, and conflict table information corresponding to the traffic signal.
The lamp groups in four directions of one crossroad are controlled by one traffic signal machine, so that different lamp groups need to correspond to different input and output interfaces of the traffic signal machine, and different lamp groups are conveniently and respectively operated subsequently. Further, since the light groups in four directions at a plurality of intersections can be controlled by one traffic signal, the data information of the traffic signal should include the correspondence between the light groups and the intersections and between the light groups and the directions.
For a group of lights, the time of red, green and yellow flashing can be set by the relevant staff, for example, the time of red light of the traffic lights in the north and south directions of an intersection is 60S, then the time of green light is 30S, and the time of yellow flashing is 20S.
In an alternative example, the data information of the traffic signal may be actively transmitted to the monitoring device by the traffic signal at preset time intervals.
In an optional example, the monitoring device may send a data request instruction to the traffic signal at preset time intervals, and the traffic signal sends the data information to the monitoring device based on the data request instruction after receiving the data request instruction. The time interval may be set manually on the monitoring device by the relevant staff.
In an alternative example, the traffic signal may be a signal supporting communication using ethernet, and since the monitoring device may support communication using ethernet, communication between the monitoring device and the traffic signal may not pass through the serial server. The monitoring device can send a data request instruction to the traffic signal machine through the Ethernet, and after the traffic signal machine receives the data request instruction, the traffic signal machine sends the data information to the monitoring device through the Ethernet based on the data request instruction.
In an alternative example, the traffic signal may be a signal that does not support communication using ethernet, and in this case, the traffic signal and the monitoring device need to communicate through the serial server.
Specifically, as shown in fig. 1, the monitoring device is connected to the serial server through an ethernet, the traffic signal machine is directly connected to the serial server, then the monitoring device may send a data request instruction to the traffic signal machine through a serial communication manner to obtain data information of the traffic signal machine, and after the traffic signal machine obtains the data request instruction, the data information is fed back to the monitoring device based on the data request instruction.
In this example, the monitoring device can actively communicate with the traffic signal machine in a serial communication mode by using a serial protocol, so that the problem of communication protocol compatibility is solved.
Step S202, analyzing the data information of the traffic signal machine to obtain the current conflict list used by the traffic signal machine.
The current conflict table comprises lamp group conflict information of the traffic signal machine, the lamp group conflict information exists in the conflict table in a two-dimensional array mode, and IDs of two lamp groups which may conflict are stored in each two-dimensional array.
For example, the IDs of two possibly conflicting lamp groups stored in the two-dimensional array may be 1 and 2, respectively. As another example, the IDs of two possibly conflicting lamp groups stored in the two-dimensional array may be 4 and 5, respectively. This example is not intended to be limiting.
The conflict list is a configuration file in the traffic signal machine, and the staff can configure the lamp group conflict information of the traffic signal machine in the conflict list. When the traffic signal machine has a fault or the information of the traffic intersection lamp group conflicts due to manual operation, for example, the traffic light in the east-west direction and the traffic light in the south-north direction of one intersection are simultaneously changed into green, namely, the situation of controlling one lamp group recorded in the conflict list of the traffic signal machine at the intersection occurs, the traffic signal machine gives out fault alarm, and simultaneously, the traffic lights at the intersection are all switched into a yellow flashing state, so that the occurrence of serious traffic accidents caused by the information conflict of the lamp groups is avoided.
In an alternative example, the monitoring device may parse the data information of the traffic signal to obtain a current profile of the traffic signal. The current configuration file may include information such as a plurality of address pointers, the current conflict table, and the length of the current conflict table. A pointer pointing to an address storing the current conflict table may be referred to as a first address pointer, a pointer pointing to an address storing a length of the current conflict table may be referred to as a second address pointer, and a pointer pointing to an address storing the second address pointer may be referred to as a third address pointer, where storage addresses of the first address pointer and the third address pointer are fixed and known.
Further, the monitoring device may read the storage address of the current conflict table from the first address pointer. And reading the storage address of the second address pointer from the third address pointer, and reading the length of the current conflict list from the second address pointer. And then, extracting the current conflict table used by the traffic signal machine from the current configuration file according to the read storage address and length of the current conflict table.
In this example, the monitoring device may automatically extract the current conflict table from the current configuration file of the traffic signal machine, so as to facilitate a subsequent operation of comparing the current conflict table with the original conflict table. And because the traffic signal machine is only compared and monitored by the key part of the conflict table, the comparison range is reduced, and the comparison speed and efficiency are improved.
Step S203, comparing the current conflict table with a pre-configured original conflict table.
In an alternative example, the monitoring device may receive a user-uploaded original profile of the traffic signal before acquiring the data information of the traffic signal, and use the original profile as a baseline.
In an alternative example, the original profile of the traffic signal may be uploaded by a user.
In computer terminology, the baseline is a "snapshot" of each artifact version in the project repository over a particular period of time. It may provide a formal standard upon which subsequent work is based and which can only be altered after authorization. After an initial baseline is established, each subsequent change to it will be recorded as a difference until the next baseline is established. In this embodiment, the original configuration file is used as a baseline, that is, the original configuration file is used as a reference for subsequent comparison.
The original configuration file may contain a plurality of address pointers, an original conflict table, and a length of the original conflict table. A pointer to an address storing the original conflict table may be referred to as a fourth address pointer, a pointer to an address storing the length of the original conflict table may be referred to as a fifth address pointer, a pointer to an address storing the fifth address pointer may be referred to as a sixth address pointer, and storage addresses of the fourth address pointer and the sixth address pointer are fixed and known.
Further, the monitoring device may read the storage address of the original conflict table from the fourth address pointer. And reading the storage address of the fifth address pointer from the sixth address pointer, and reading the length of the original conflict table from the fifth address pointer. And then, extracting the original conflict table from the original configuration file according to the storage address and the length of the original conflict table. The original collision table also includes information on the collision of the traffic signal light groups.
And then comparing the lamp group conflict information stored in the current conflict table with the lamp group conflict information stored in the original conflict table.
And step S204, responding to the situation that the data stored in the current conflict table and the data stored in the original conflict table are not identical, and performing conflict table tampering alarm.
The tampering of the conflict table refers to an action that malicious personnel uses a special tool to modify the content of the conflict table through a network or physical contact mode and the like, so that the traffic signal conflict detection function of the traffic signal machine is disabled.
The data stored in the current conflict table and the data stored in the original conflict table are lamp group conflict information stored in the current conflict table and the original conflict table, and when the lamp group conflict information stored in the current conflict table and the lamp group conflict information stored in the original conflict table are not identical, it is indicated that someone tampers with the conflict table of the traffic signal machine, so that the monitoring device immediately sends a warning of tampering of the conflict table.
For example, the lamp group information in the original conflict table is 1, 2 and 3, 4, and the lamp group information in the current conflict table is 1, 3 and 3, 4, that is, the original conflict table is not identical to the lamp group information stored in the current conflict table, and the monitoring device issues the conflict table tampering warning.
In an optional example, the monitoring device may issue an alarm through a prompt box for popping up the collision table tampering on an interface of the monitoring device, and may also issue an alarm through an audio prompt. This example is not particularly limited.
In an alternative example, the lamp group conflict information stored in the current conflict table and the original conflict table may be identical. At this time, it is indicated that no one has tampered with the original collision table, and therefore, the monitoring device may obtain the data information of the traffic signal again after a preset time interval, further analyze the data information of the traffic signal, obtain the current collision table used by the traffic signal, and compare the current collision table with the original collision table serving as the baseline. And if the data stored in the current conflict table and the data stored in the original conflict table are not identical, carrying out conflict table tampering warning, and otherwise, circularly executing the process.
According to the method for monitoring tampering of the conflict table of the traffic signal, the current conflict table is extracted from the current configuration file of the traffic signal through the monitoring device, the state of the conflict table of the traffic signal is effectively monitored through the method for comparing the current conflict table with the original conflict table, and the problem that in the prior art, the conflict table in the traffic signal is tampered, and related workers cannot monitor the conflict table, so that major traffic accidents occur is solved.
Fig. 3 is a flowchart of a collision table tampering monitoring method for a traffic signal according to an exemplary embodiment of the disclosure. In the description of the present embodiment, the same steps as those in any of the foregoing embodiments will be briefly described, and detailed descriptions thereof will be omitted, so that reference may be made to any of the foregoing embodiments. As shown in fig. 3, the embodiment method may include the following processes:
step S301, acquiring an original configuration file of the traffic signal, and extracting to obtain an original conflict table of the traffic signal according to the storage address and the length of the conflict table in the original configuration file.
Step S302, acquiring the data information of the traffic signal machine.
Step S303, analyzing the data information of the traffic signal to obtain the current configuration file of the traffic signal.
In an alternative example, a data-instruction mapping table may be previously constructed, where the data-instruction mapping table includes two parts, namely data and an instruction corresponding to the data, and the instruction is used to control a lamp group state of the traffic signal or to indicate that the traffic signal needs to be processed.
For example, in the data-instruction mapping table, the data may be 0F0F, and the instruction corresponding to the data may be a DFY instruction, meaning closed.
In an alternative example, the DFY command can be used to turn off the red light of the light group.
In another alternative example, the DFY instructions may be used to turn off green lights of the light group.
For another example, the data may be 4EFF and the instruction corresponding to the data may be an RMC instruction, meaning that a parity value is read.
The RMC command may be used to instruct the traffic signal to check whether the data transmitted by the remote host through the serial server or the ethernet is faulty during the transmission process. It should be noted that the description of the data and the instructions corresponding to the data are merely illustrative, and are only for better understanding of the structure of the data-instruction mapping table. For traffic signals produced by different manufacturers, the data in the data-instruction mapping table and the instructions corresponding to the data are different, and specific analysis is required according to specific conditions.
In an optional example, a file may be created in the memory of the monitoring device, and the acquired data information of the traffic signal may be sequentially stored in the file according to the acquisition order. Then, data with fixed length is extracted from the file, and the specific value of the fixed length is determined by the value of the fixed length of the instruction in the instruction set adopted by the traffic signal machine. And each piece of the fixed length data can carry a data label, and the data label is used for indicating whether an instruction corresponding to the fixed length data exists in the pre-constructed data-instruction mapping table or not.
When the extracted data label carried by the data with the fixed length indicates that the instruction corresponding to the data with the fixed length exists in the pre-constructed data-instruction mapping table, searching the corresponding instruction in the pre-constructed data-instruction mapping table according to the data with the fixed length, and writing the instruction into the current configuration file.
When the extracted data label carried by the fixed length data indicates that no instruction corresponding to the fixed length data exists in the pre-constructed data-instruction mapping table, writing the extracted fixed length data into the current configuration file.
For example, when the extracted data is 0F0F, the label carried by the extracted data indicates that there is an instruction corresponding to the data in the pre-constructed data-instruction mapping table, and when the extracted data is 1 or 2, the label carried by the extracted data indicates that there is no instruction corresponding to the data in the pre-constructed data-instruction mapping table.
In this example, the data information acquired from the traffic signal machine can be automatically restored to the current configuration file of the traffic signal machine through the monitoring device, so as to facilitate the subsequent operation of extracting the current conflict list.
And step S304, extracting and obtaining the current conflict table used by the traffic signal according to the storage address and the length of the conflict table in the current configuration file.
Step S305, comparing the current conflict table with the original conflict table, and determining whether the data stored in the current conflict table and the data stored in the original conflict table are completely the same.
If the data stored in the current conflict table is identical to the data stored in the original conflict table, after a preset time interval, step S302 is executed.
If the data stored in the current conflict table and the data stored in the original conflict table are not identical, step S306 is continuously executed.
And step S306, sending a conflict table tampering alarm.
And the conflict table tampering alarm is used for prompting relevant staff that the conflict table of the traffic signal machine has been tampered.
At this point, when the monitoring process is finished, the monitoring device may submit the part of the traffic signal machine where the difference exists between the current conflict table and the original conflict table to a relevant worker for confirmation, and after the confirmation, the monitoring device may return to step S302 to restart the monitoring process.
According to the method for comparing the current conflict table with the original conflict table, the state of the conflict table of the traffic signal machine can be effectively monitored, and when illegal personnel falsify the conflict table is monitored, a conflict table tampering alarm can be rapidly sent out, so that relevant workers are reminded to timely find and block a tampered path and tampering behaviors, major traffic accidents are prevented, and the safety of lives and properties of people is guaranteed.
In order to realize the conflict table tampering monitoring method of the traffic signal machine in any embodiment of the disclosure, the embodiment of the disclosure further provides a conflict table tampering monitoring device of the traffic signal machine. Fig. 4 is a schematic structural diagram of a collision table tampering monitoring device of a traffic signal in an exemplary embodiment of the present disclosure, and as shown in fig. 4, the device for monitoring a collision table may include:
an obtaining module 41, configured to obtain data information of a traffic signal;
the analysis module 42 is configured to analyze data information of the traffic signal to obtain a current collision table used by the traffic signal, where the current collision table includes light group collision information of the traffic signal;
a comparison module 43, configured to compare the current conflict table with a preconfigured original conflict table;
and the warning module 44 is configured to perform a conflict table tampering warning in response to that the data stored in the current conflict table is not identical to the data stored in the original conflict table.
Optionally, the apparatus further comprises:
and the execution module is used for responding that the data stored in the current conflict table and the data stored in the original conflict table are completely the same, executing the operation of obtaining the data information of the traffic signal machine again after a preset time interval, and comparing the current conflict table with the preconfigured original conflict table.
Optionally, when the obtaining module 41 is configured to obtain the data information of the traffic signal, the obtaining module includes:
sending a data request instruction to the traffic signal machine in a serial port communication mode to acquire data information of the traffic signal machine;
and receiving the data information fed back by the traffic signal machine according to the data request instruction.
Optionally, the analyzing module 42, when configured to analyze the data information of the traffic signal to obtain the current collision table used by the traffic signal, includes:
analyzing the data information of the traffic signal machine to obtain a current configuration file of the traffic signal machine;
extracting and obtaining a current conflict table used by the traffic signal machine according to the storage address of the conflict table in the current configuration file and the length of the conflict table;
the analysis module 42 is further configured to extract, based on the obtained original configuration file of the traffic signal, an original collision table used by the traffic signal according to a storage address of the collision table in the original configuration file and a length of the collision table.
Optionally, the analyzing module 42, when configured to analyze the data information of the traffic signal to obtain the current configuration file of the traffic signal, includes:
storing the data information of the traffic signal machine into the monitoring device;
extracting data with fixed length from data information of the traffic signal, wherein the data with fixed length carries a data label which is used for indicating whether an instruction corresponding to the data with fixed length exists in a pre-constructed data-instruction mapping table or not;
in response to the data label indicating that the data-instruction mapping table has an instruction corresponding to the fixed-length data, finding a corresponding instruction in the data-instruction mapping table according to the extracted data, and writing the instruction corresponding to the extracted data into the current configuration file, wherein the instruction is used for controlling the state of a lamp group of the traffic signal machine or indicating the processing required by the traffic signal machine;
in response to the data tag indicating that the data-to-instruction mapping table does not have an instruction corresponding to the fixed length data, writing the extracted data to the current configuration file.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the technical solution of the present disclosure. One of ordinary skill in the art can understand and implement it without inventive effort.
The embodiments of the present disclosure also provide a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the method according to any of the embodiments of the present disclosure.
The embodiment of the present disclosure further provides an electronic device, as shown in fig. 5, the electronic device includes a memory 51 and a processor 52, where the memory 51 is used for storing computer instructions executable on the processor, and the processor 52 is used for implementing the method according to any embodiment of the present disclosure when executing the computer instructions.
Embodiments of the subject matter and the functional operations described in this specification can be implemented in: digital electronic circuitry, tangibly embodied computer software or firmware, computer hardware including the structures disclosed in this specification and their structural equivalents, or a combination of one or more of them. Embodiments of the subject matter described in this specification can be implemented as one or more computer programs, i.e., one or more modules of computer program instructions, encoded on a tangible, non-transitory program carrier for execution by, or to control the operation of, data processing apparatus. Alternatively or additionally, the program instructions may be encoded on an artificially generated propagated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal, that is generated to encode and transmit information to suitable receiver apparatus for execution by the data processing apparatus. The computer storage medium may be a machine-readable storage device, a machine-readable storage substrate, a random or serial access memory device, or a combination of one or more of them.
Computer-readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices (e.g., EPROM, EEPROM, and flash memory devices), magnetic disks (e.g., an internal hard disk or a removable disk), magneto-optical disks, and CD ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments.
While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any invention or of what may be claimed, but rather as descriptions of features specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. In other instances, features described in connection with one embodiment may be implemented as discrete components or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Thus, particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. Further, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some implementations, multitasking and parallel processing may be advantageous.
The above description is only exemplary of the present disclosure and should not be taken as limiting the disclosure, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (10)

1. A method for monitoring tampering of a conflict table of a traffic signal, the method comprising:
acquiring data information of a traffic signal machine;
analyzing the data information of the traffic signal machine to obtain a current conflict table used by the traffic signal machine, wherein the current conflict table comprises the lamp group conflict information of the traffic signal machine;
comparing the current conflict table with a pre-configured original conflict table;
responding to the situation that the data stored in the current conflict table and the data stored in the original conflict table are not identical, and performing conflict table tampering alarm;
the analyzing the data information of the traffic signal to obtain the current conflict list used by the traffic signal comprises the following steps:
analyzing the data information of the traffic signal machine to obtain a current configuration file of the traffic signal machine;
extracting and obtaining a current conflict table used by the traffic signal machine according to the storage address of the conflict table in the current configuration file and the length of the conflict table;
the method further comprises the following steps: and extracting to obtain an original conflict table used by the traffic signal machine according to the storage address of the conflict table in the original configuration file and the length of the conflict table based on the obtained original configuration file of the traffic signal machine.
2. The method of claim 1, further comprising:
and in response to that the data stored in the current conflict table and the data stored in the original conflict table are completely the same, after a preset time interval, executing the operation of obtaining the data information of the traffic signal machine again, and comparing the current conflict table with the preconfigured original conflict table.
3. The method of claim 1, wherein the acquiring data information of the traffic signal comprises:
sending a data request instruction to the traffic signal machine in a serial port communication mode to acquire data information of the traffic signal machine;
and receiving the data information fed back by the traffic signal machine according to the data request instruction.
4. The method of claim 1, wherein the method is performed by a monitoring device,
the analyzing the data information of the traffic signal to obtain the current configuration file of the traffic signal comprises the following steps:
storing the data information of the traffic signal machine into the monitoring device;
extracting data with fixed length from data information of the traffic signal, wherein the data with fixed length carries a data label which is used for indicating whether an instruction corresponding to the data with fixed length exists in a pre-constructed data-instruction mapping table or not;
in response to the data label indicating that the data-instruction mapping table has an instruction corresponding to the fixed-length data, finding a corresponding instruction in the data-instruction mapping table according to the extracted data, and writing the instruction corresponding to the extracted data into the current configuration file, wherein the instruction is used for controlling the state of a lamp group of the traffic signal machine or indicating the processing required by the traffic signal machine;
in response to the data tag indicating that there are no instructions corresponding to the fixed length data in the data-to-instruction mapping table, writing the extracted data to the current configuration file.
5. A conflict table tampering monitoring device for a traffic signal, the device comprising:
the acquisition module is used for acquiring data information of the traffic signal machine;
the analysis module is used for analyzing the data information of the traffic signal machine to obtain a current conflict table used by the traffic signal machine, and the current conflict table comprises the lamp group conflict information of the traffic signal machine;
the comparison module is used for comparing the current conflict table with a pre-configured original conflict table;
the warning module is used for responding that the data stored in the current conflict table and the data stored in the original conflict table are not identical, and performing conflict table tampering warning;
the analysis module, when being used for analyzing the data information of the traffic signal machine and obtaining the current conflict list used by the traffic signal machine, comprises:
analyzing the data information of the traffic signal machine to obtain a current configuration file of the traffic signal machine;
extracting and obtaining a current conflict table used by the traffic signal machine according to the storage address of the conflict table in the current configuration file and the length of the conflict table;
the analysis module is further configured to extract, based on the obtained original configuration file of the traffic signal, an original conflict table used by the traffic signal according to a storage address of a conflict table in the original configuration file and a length of the conflict table.
6. The apparatus of claim 5, further comprising:
and the execution module is used for responding that the data stored in the current conflict table and the data stored in the original conflict table are completely the same, executing the operation of obtaining the data information of the traffic signal machine again after a preset time interval, and comparing the current conflict table with the preconfigured original conflict table.
7. The apparatus of claim 5, wherein the acquiring module, when configured to acquire the data information of the traffic signal, comprises:
sending a data request instruction to the traffic signal machine in a serial port communication mode to acquire the traffic signal machine
Data information of the traffic signal machine;
and receiving the data information fed back by the traffic signal machine according to the data request instruction.
8. The apparatus of claim 5, wherein the parsing module, when being configured to parse the data information of the traffic signal to obtain the current profile of the traffic signal, comprises:
storing the data information of the traffic signal machine into the monitoring device;
extracting data with fixed length from data information of the traffic signal, wherein the data with fixed length carries a data label which is used for indicating whether an instruction corresponding to the data with fixed length exists in a pre-constructed data-instruction mapping table or not;
in response to the data label indicating that the data-instruction mapping table has an instruction corresponding to the fixed-length data, finding a corresponding instruction in the data-instruction mapping table according to the extracted data, and writing the instruction corresponding to the extracted data into the current configuration file, wherein the instruction is used for controlling the state of a lamp group of the traffic signal machine or indicating the processing required by the traffic signal machine;
in response to the data tag indicating that the data-to-instruction mapping table does not have an instruction corresponding to the fixed length data, writing the extracted data to the current configuration file.
9. A computer readable storage medium having stored thereon machine readable instructions which, when invoked and executed by a processor, cause the processor to carry out the method of any of claims 1 to 4.
10. An electronic device is characterized by comprising a communication interface, a processor, a memory and a bus, wherein the communication interface, the processor and the memory are connected with each other through the bus;
the memory having stored therein machine-readable instructions, the processor, by invoking the machine-readable instructions,
performing the method of any one of claims 1 to 4.
CN202111643816.2A 2021-12-30 2021-12-30 Method and device for monitoring tampering of conflict table of traffic signal machine Active CN114005293B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111643816.2A CN114005293B (en) 2021-12-30 2021-12-30 Method and device for monitoring tampering of conflict table of traffic signal machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111643816.2A CN114005293B (en) 2021-12-30 2021-12-30 Method and device for monitoring tampering of conflict table of traffic signal machine

Publications (2)

Publication Number Publication Date
CN114005293A CN114005293A (en) 2022-02-01
CN114005293B true CN114005293B (en) 2022-04-26

Family

ID=79932349

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111643816.2A Active CN114005293B (en) 2021-12-30 2021-12-30 Method and device for monitoring tampering of conflict table of traffic signal machine

Country Status (1)

Country Link
CN (1) CN114005293B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114255602B (en) * 2022-03-01 2022-07-01 浙江国利网安科技有限公司 Safety protection method and device for traffic signal machine

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7378987B2 (en) * 2003-11-21 2008-05-27 Reno A & E Traffic control malfunction management unit with per channel red enable
US8386440B2 (en) * 2005-05-10 2013-02-26 Microsoft Corporation Database corruption recovery systems and methods
CN102890870B (en) * 2012-10-30 2014-06-11 重庆交通大学 Self diagnosis method and device for faults of traffic signal control machine
CN203012970U (en) * 2012-10-30 2013-06-19 重庆交通大学 Traffic signal controller having function of intelligent fault diagnosis
CN107564318A (en) * 2017-08-23 2018-01-09 公安部道路交通安全研究中心 A kind of traffic signal light fault detection and information interaction system
CN112486723B (en) * 2020-11-25 2023-11-07 龙芯中科技术股份有限公司 Data verification method and device, processor and electronic equipment

Also Published As

Publication number Publication date
CN114005293A (en) 2022-02-01

Similar Documents

Publication Publication Date Title
CN111145378B (en) Automatic video inspection system and method for road traffic incident
CN114005293B (en) Method and device for monitoring tampering of conflict table of traffic signal machine
CN105425783A (en) Real vehicle data processing method and system, controller and upper computer
CN102684944A (en) Method and device for detecting intrusion
CN109450669B (en) Abnormity alarming method, device and computer storage medium
CN116155694B (en) Method and device for managing internet of things equipment and readable storage medium
KR20160009287A (en) Black box apparatus for diagnosing error of electronic control unit for vehicle and control method thereof
CN106454847A (en) Method and device for detecting phishing risk of public WiFi
CN102930677B (en) Anti-theft early warning system for electric power distribution room
CN109885605B (en) Urban physical sign index model data preprocessing method
CN111338327A (en) Detection system and method for vehicle central controller
CN103257909A (en) Baseboard management controller (BMC)-based automated testing method and system for light emitting diode (LED)
CN103366576A (en) Vehicle identification code binding system
CN107967805A (en) Based on big data analysis quickly from the method and device of city vehicle
CN114493196A (en) Data analysis method, system, electronic equipment and storage medium
CN203279188U (en) Intrusion detection device for wireless sensor network
CN209462682U (en) A kind of city illumination system and its failure automatic checkout equipment
CN114124884A (en) Local area network IP address abuse detection device and method
CN113890845A (en) PSE (Power supply Enable) test method and device, storage medium and electronic equipment
CN106372312A (en) Tunnel fire-protection monitoring system parametric modeling method
CN109543420B (en) Permission configuration method and device based on sud, electronic equipment and storage medium
KR20210054724A (en) Road traffic site environment integrated control device
CN104835350A (en) Vehicle-mounted electronic police system
CN112084077A (en) Aging test method, device and medium of USB (Universal Serial bus) equipment and USB equipment
CN107705387B (en) Vehicle entering and exiting data processing method and parking lot controller

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant