CN117002569A - Security detection method, electronic device and storage medium - Google Patents

Security detection method, electronic device and storage medium Download PDF

Info

Publication number
CN117002569A
CN117002569A CN202210470908.3A CN202210470908A CN117002569A CN 117002569 A CN117002569 A CN 117002569A CN 202210470908 A CN202210470908 A CN 202210470908A CN 117002569 A CN117002569 A CN 117002569A
Authority
CN
China
Prior art keywords
state
control center
request information
signal
isolation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210470908.3A
Other languages
Chinese (zh)
Inventor
梁鸿煜
谭新艳
张永标
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BYD Co Ltd
Original Assignee
BYD Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BYD Co Ltd filed Critical BYD Co Ltd
Priority to CN202210470908.3A priority Critical patent/CN117002569A/en
Publication of CN117002569A publication Critical patent/CN117002569A/en
Pending legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B61RAILWAYS
    • B61LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
    • B61L27/00Central railway traffic control systems; Trackside control; Communication systems specially adapted therefor
    • B61L27/04Automatic systems, e.g. controlled by train; Change-over to manual control
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B61RAILWAYS
    • B61LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
    • B61L23/00Control, warning or like safety means along the route or between vehicles or trains
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B61RAILWAYS
    • B61LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
    • B61L23/00Control, warning or like safety means along the route or between vehicles or trains
    • B61L23/04Control, warning or like safety means along the route or between vehicles or trains for monitoring the mechanical state of the route
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B61RAILWAYS
    • B61LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
    • B61L27/00Central railway traffic control systems; Trackside control; Communication systems specially adapted therefor
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B61RAILWAYS
    • B61LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
    • B61L27/00Central railway traffic control systems; Trackside control; Communication systems specially adapted therefor
    • B61L27/70Details of trackside communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Train Traffic Observation, Control, And Security (AREA)

Abstract

The present disclosure relates to a security detection method, an electronic device, and a storage medium. The method comprises the following steps: the signal system sends first request information to the control center under the condition that the current state of the target equipment is determined to be a first state, the first request information is used for indicating the control center to output alarm prompt information, the alarm prompt information is used for confirming whether the first state of the target equipment is effective, the first state comprises bypass or isolation, after receiving a first confirmation signal of the control center, second request information is sent to the control center, the second request information is used for indicating the control center to output the alarm prompt information again, and after receiving a second confirmation signal returned by the control center, the first state of the target equipment is determined to be effective. A secondary validation mechanism for bypass and isolation in a rail transit system is provided for bypass or isolated safeguarding and to increase the degree of automation in conducting such safeguarding.

Description

Security detection method, electronic device and storage medium
Technical Field
The disclosure relates to the technical field of traffic, in particular to a security detection method, electronic equipment and a storage medium.
Background
In the prior art, when a signaling system in a rail transit system checks the status of a platform device (e.g., a platform door), there is typically both bypass and isolation status when the platform device fails. Wherein bypass is an operational mode that allows system operations to bypass the checking mechanism to continue normal operation, and isolation is an operational mode that allows system operations to bypass the checking mechanism to continue degraded operation. The bypass and isolation avoid the due checking mechanism of the system, when the platform equipment is in error bypass or isolation, the signal system does not check whether the platform door is closed and locked, in which case if the signal system judges that the train is allowed to start if the departure condition is met, but the platform door is not actually closed, serious potential safety hazard may be brought.
Disclosure of Invention
To overcome the problems in the related art, the present disclosure provides a security detection method, an electronic device, and a storage medium.
According to a first aspect of embodiments of the present disclosure, there is provided a security detection method applied to a signal system, the method including:
under the condition that the current state of the target equipment is determined to be a first state, first request information is sent to a control center, and the first request information is used for indicating the control center to output alarm prompt information; the alarm prompt information is used for confirming whether the first state of the target equipment is valid or not, and the first state comprises bypass or isolation;
Under the condition that a first confirmation signal which is returned by the control center and responds to the first request information is received, second request information is sent to the control center, and the second request information is used for indicating the control center to output the alarm prompt information again;
and under the condition of receiving a secondary confirmation signal returned by the control center and responding to the second request information, determining that the first state of the target equipment is valid.
Optionally, the method further comprises:
and under the condition that a first rejection signal returned by the control center and responding to the first request information is received, determining that the first state of the target equipment is invalid.
Optionally, the method further comprises:
and under the condition that a second rejection signal returned by the control center and responding to the second request information is received, determining that the first state of the target equipment is invalid.
Optionally, the method further comprises:
and after the first state of the target device is determined to be invalid, performing a reset operation on the target device.
Optionally, the signal system is a signal system in a rail transit system, and the target device includes a trackside device or a train device.
According to a second aspect of embodiments of the present disclosure, there is provided a security detection method applied to a control center, the method including:
responding to first request information sent by a signal system, and outputting alarm prompt information; the first request information is sent by the signal system under the condition that the target equipment is determined to be in a first state, and the alarm prompt is used for confirming whether the first state of the target equipment is valid or not, wherein the first state comprises bypass or isolation;
transmitting a first acknowledgement signal to the signal system based on a first acknowledgement result transmitted by a field device that characterizes the first state of the target device as valid;
responding to second request information sent by the signal system, and outputting the alarm prompt information again; the second request information is sent by the signal system under the condition that the first confirmation signal is received;
and transmitting a secondary acknowledgement signal to the signal system based on a second acknowledgement result transmitted by the field device and representing that the first state of the target device is valid, wherein the secondary acknowledgement signal is used for indicating that the signal system determines that the first state of the target device is valid.
Optionally, the field device is a video monitoring device, the target device is located in a detection range of the field device, and the method further includes:
sending a detection instruction to the field device, wherein the detection instruction is used for indicating the field device to remotely confirm the first state of the target device based on a monitoring video;
and receiving the first confirmation result sent by the field device under the condition that the first state of the target device is confirmed to be valid by the field device.
Optionally, the field device is a communication terminal of a crew member, and the method further includes:
and sending a security state check message to the communication terminal, wherein the security state check message is used for indicating the station personnel to confirm the first state of the target equipment.
According to a third aspect of embodiments of the present disclosure, there is provided a security detection device, characterized by being applied to a signal system, the device comprising:
the sending module is used for sending first request information to the control center under the condition that the current state of the target equipment is determined to be a first state, wherein the first request information is used for indicating the control center to output alarm prompt information; the alarm prompt information is used for confirming whether the first state of the target equipment is valid or not, and the first state comprises bypass or isolation;
The sending module is further configured to send second request information to the control center when receiving a first acknowledgement signal returned by the control center and responding to the first request information, where the second request information is used to instruct the control center to output the alarm prompt information again;
and the determining module is used for determining that the first state of the target equipment is valid under the condition of receiving a secondary confirmation signal returned by the control center and responding to the second request information.
Optionally, the sending module is further configured to:
and under the condition that a first rejection signal returned by the control center and responding to the first request information is received, determining that the first state of the target equipment is invalid.
Optionally, the determining module is further configured to:
and under the condition that a second rejection signal returned by the control center and responding to the second request information is received, determining that the first state of the target equipment is invalid.
Optionally, the apparatus further comprises: a reset module;
the reset module is used for resetting the target equipment after the first state of the target equipment is invalid.
Optionally, the signal system is a signal system in a rail transit system, and the target device includes a train device and/or a trackside device in the rail transit system.
According to a fourth aspect of embodiments of the present disclosure, there is provided a safety detection device, which is applied to a control center, the device including:
the output module is used for responding to the first request information sent by the signal system and outputting alarm prompt information; the first request information is sent by the signal system under the condition that the target equipment is determined to be in a first state, and the alarm prompt is used for confirming whether the first state of the target equipment is valid or not, wherein the first state comprises bypass or isolation;
a transmitting module, configured to transmit a first acknowledgement signal to the signal system based on a first acknowledgement result sent by a field device that characterizes the first state of the target device as valid;
the output module is used for responding to the second request information sent by the signal system and outputting the alarm prompt information again; the second request information is sent by the signal system under the condition that the first confirmation signal is received;
The sending module is configured to send a secondary acknowledgement signal to the signal system based on a second acknowledgement result sent by the field device and indicating that the first state of the target device is valid, where the secondary acknowledgement signal is used to instruct the signal system to determine that the first state of the target device is valid.
Optionally, the apparatus further comprises a receiving module;
the sending module is used for sending a detection instruction to the field device, wherein the detection instruction is used for indicating the field device to remotely confirm the first state of the target device based on a monitoring video;
the receiving module is configured to receive the first confirmation result sent by the field device when the field device confirms that the first state of the target device is valid.
Optionally, the sending module is further configured to:
and sending a security state check message to the communication terminal, wherein the security state check message is used for indicating the station personnel to confirm the first state of the target equipment.
According to a fifth aspect of embodiments of the present disclosure, there is provided an electronic device, comprising: a memory having a computer program stored thereon;
A processor; for executing said computer program in said memory to implement the steps of the method of security detection provided by the first aspect of the present disclosure.
According to a sixth aspect of embodiments of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the security detection method provided by the first aspect of the present disclosure.
According to a seventh aspect of embodiments of the present disclosure, there is provided an electronic device, comprising: a memory having a computer program stored thereon;
a processor; for executing said computer program in said memory to implement the steps of the method of security detection provided by the second aspect of the present disclosure.
According to an eighth aspect of embodiments of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the security detection method provided by the second aspect of the present disclosure.
According to the technical scheme, when the current state of the target equipment is determined to be the first state, the signal system sends first request information to the control center, the first request information is used for indicating the control center to output alarm prompt information, the alarm prompt information is used for confirming whether the first state of the target equipment is valid, the first state comprises bypass or isolation, when a first confirmation signal which is returned by the control center and is in response to the first request information is received, second request information is sent to the control center, the second request information is used for indicating the control center to output the alarm prompt information again, and when a second confirmation signal which is returned by the control center and is in response to the second request information is received, the first state of the target equipment is determined to be valid. Through the technical scheme, the secondary confirmation mechanism for the bypass and the isolation in the rail transit system is provided, and is realized through secondary confirmation by the signal system and the control center.
Additional features and advantages of the present disclosure will be set forth in the detailed description which follows.
Drawings
The accompanying drawings are included to provide a further understanding of the disclosure, and are incorporated in and constitute a part of this specification, illustrate the disclosure and together with the description serve to explain, but do not limit the disclosure. In the drawings:
fig. 1 is a flowchart of a security detection method provided in an embodiment of the present disclosure.
Fig. 2 is a flowchart of another security detection method provided by an embodiment of the present disclosure.
Fig. 3 is a flowchart of yet another security detection method provided by an embodiment of the present disclosure.
Fig. 4 is a flowchart of yet another security detection method provided by an embodiment of the present disclosure.
Fig. 5 is a flowchart of yet another security detection method provided by an embodiment of the present disclosure.
Fig. 6 is a flowchart of yet another security detection method provided by an embodiment of the present disclosure.
Fig. 7 is a block diagram of a security detection device 700 provided by an embodiment of the present disclosure.
Fig. 8 is a block diagram of a security detection device 800 provided by an embodiment of the present disclosure.
Fig. 9 is a block diagram of an electronic device 900, according to an example embodiment.
Fig. 10 is a block diagram of another electronic device 1000, shown in accordance with an exemplary embodiment.
Detailed Description
Specific embodiments of the present disclosure are described in detail below with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the disclosure, are not intended to limit the disclosure.
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
The applicant has found that in existing security detection schemes for rail transit systems, system operations can bypass the inspection mechanism when a platform device reports a device bypass or isolation status. For example, when a certain side platform door bypasses, the signal system does not check the state of the side platform door, and the door control operation is normally performed. When a certain platform door is isolated, the signal system does not check the state of the platform door, but performs alignment isolation of train doors on the failed platform door, wherein alignment isolation refers to isolation operation on the doors at the positions corresponding to the platform doors, for example, after a certain platform door fails, the doors corresponding to the platform door are not opened after alignment isolation is performed on the platform door.
Since both bypass and isolation circumvent the system's due checking mechanism, conditions that would otherwise need to be checked need to be guaranteed by other means, such as transfer to manual or transfer to other equipment. But based on the manual inspection mode, on one hand, the full automation degree of the system is reduced, on the other hand, the operation skill requirement of operators is improved, the operation cost is increased, and the inspection accuracy is unstable due to the proficiency and experience difference of the operators, so that the inspection is performed manually, and the higher failure rate exists.
In order to solve the above technical problems, the present disclosure provides a security detection method, an electronic device, and a storage medium. The method provides a confirmation mechanism for bypass and isolation in a rail transit system, and confirms based on interaction of a signal system and a control center. The security detection method provided by the present disclosure is described below.
The technical scheme of the present disclosure will be described in detail with reference to specific embodiments.
Fig. 1 is a flowchart of a security detection method according to an embodiment of the present disclosure, where the method is applied to a signal system, as shown in fig. 1, and the method includes:
In step S101, in the case where it is determined that the current state of the target device is the first state, first request information is sent to the control center, where the first request information is used to instruct the control center to output alarm prompt information, where the alarm prompt information is used to confirm whether the first state of the target device is valid, and the first state includes bypass or isolation.
For example, when the signal system collects status information of the bypass or isolation of the target device, the signal system may not directly determine whether the bypass or isolation is valid, and at this time the signal system may still continue to process as if the target device is not bypassed or isolated. And after receiving the bypass or isolation state of the target equipment, the signal system sends the first request information to the control center, and the control center can output alarm prompt information, such as a primary alarm prompt, on a man-machine operation interface of the control center in a popup window mode based on the received first request information so as to remind a dispatcher of the control center whether the target equipment is allowed to bypass or isolate, so that the dispatcher can confirm the bypass or isolation for the first time.
In one possible implementation, the dispatcher may trigger the control center to send a detection instruction to the field device at the location of the target device, so as to instruct the field device to confirm whether the bypass or isolation state of the target device is valid, and feed back a confirmation result to the control center, where the control center returns a first confirmation signal or rejection signal to the signaling system according to the confirmation result.
Optionally, the signal system is a signal system in a rail transit system, and the signal system may include one or more subsystems of an ATS (Automatic Train Supervision, train automatic monitoring) system, a CI (Computer Interlocking, computer interlock), a VOBC (Vehicle On-board Controller), a ZC (Zone Controller), an OC (Object Controller, target Controller), the target device including a train device in the rail transit system, and/or a trackside device.
By way of example, the target device may be a device that may pose a safety risk in a bypass or isolation state, such as a trackside device that may include a platform door device, a car washer device, a charging stake device, an emergency stop button device, and a train device that may include a train door device, a train escape door, or the like.
In step S102, when a first acknowledgement signal returned by the control center in response to the first request information is received, second request information is sent to the control center, where the second request information is used to instruct the control center to output the alarm prompt information again.
After receiving the first confirmation signal, the signal system can confirm the control center again, send the second request information, and after receiving the second request information, the control center outputs the alarm prompt information again, and the method for outputting the alarm prompt information is the same as the method for outputting the alarm prompt information after receiving the first request information, and the method for feeding back the second confirmation signal and the first confirmation signal by the control center is the same, which can refer to step S101 and is not repeated.
In step S103, in the case of receiving a secondary acknowledgement signal returned by the control center in response to the second request information, it is determined that the first state of the target device is valid.
In the event that the bypass or isolation status of the target device is determined to be valid, the signaling system allows the target device to perform a corresponding operation in accordance with the bypass or isolation status.
Optionally, the method may further include, after step S101: and determining that the first state of the target device is invalid under the condition that a first rejection signal returned by the control center in response to the first request information is received.
Optionally, the method may further include, after step S102: and determining that the first state of the target device is invalid when a second rejection signal returned by the control center in response to the second request information is received.
That is, after the signal system sends the first request information, if the first rejection signal sent by the control center is received, the control center determines that the bypass or isolation state of the target device is invalid, and the first confirmation is not passed, the signal system does not allow the bypass or isolation of the target device. After the signal system sends the second request information, if the second rejection signal sent by the control center is received, the control center determines that the bypass or isolation state of the target device is invalid in the secondary confirmation, and the secondary confirmation does not pass, the signal system does not allow the bypass or isolation of the target device.
Optionally, the method further comprises: after determining that the first state of the target device is invalid, a reset operation is performed on the target device.
Through the technical scheme, the secondary confirmation mechanism for the bypass and the isolation in the rail transit system is provided, and is realized through secondary confirmation by the signal system and the control center.
Fig. 2 is a flowchart of another security detection method provided in an embodiment of the present disclosure, where the method is applied to a control center, as shown in fig. 2, and includes:
in step S201, in response to the first request information sent by the signal system, alarm prompt information is output, where the first request information is sent by the signal system in a case where the target device is determined to be in the first state, and the alarm prompt is used to confirm whether the first state of the target device is valid.
In step S202, a first acknowledgement signal is sent to the signaling system based on a first acknowledgement result sent by the field device that characterizes the first state of the target device as valid.
For example, in one possible implementation manner, the control center may output alarm prompt information, such as a first-level alarm prompt, on a man-machine operation interface of the control center in a popup window manner based on the received first request information, so as to remind a dispatcher of the control center whether to allow the target device to bypass or isolate, so that the dispatcher can perform first confirmation of bypass or isolation.
The dispatcher can trigger the control center to send a detection instruction to the field device at the site of the target device to instruct the field device to confirm whether the bypass or isolation state of the target device is effective or not, and feed back a confirmation result to the control center, and the control center returns a first confirmation signal or rejection signal to the signal system according to the confirmation result.
The field device may be a video monitoring device, such as a CCTV monitoring system, or may be a communication terminal for a crew. The control center can control the CCTV monitoring system to carry out remote confirmation or instruct the station personnel to carry out confirmation through the communication terminal of the station personnel.
In step S203, the alarm prompt information is output again in response to the second request information sent by the signal system, which is sent by the signal system upon receipt of the first acknowledgement signal.
The method for the control center to output the alarm prompt information again based on the second request information by sending the second request information by the signal system can refer to step S103, and will not be described again.
In step S204, a secondary acknowledgement signal is sent to the signaling system indicating that the first state of the target device is valid based on a second acknowledgement result sent by the field device that characterizes the first state of the target device as valid.
And the signal system determines that the first state of the target equipment is effective under the condition of receiving a secondary confirmation signal returned by the control center and responding to the second request information, and allows the target equipment to perform corresponding operation according to the bypass or isolation state under the condition of determining that the bypass or isolation state of the target equipment is effective.
The target device may be a device that may pose a safety risk in a bypass or isolation state, such as a trackside device that may include a platform door device, a car washer device, a charging pile device, an emergency stop button device, and a train device that may include a train door device, a train escape door, or the like.
Through the technical scheme, the secondary confirmation mechanism for the bypass and the isolation in the rail transit system is provided, and is realized through secondary confirmation by the signal system and the control center.
Fig. 3 is a flowchart of yet another security detection method provided by an embodiment of the present disclosure, referring to fig. 3, the method may include the steps of:
in step S301, the signaling system detects a first state of the target device, the first state including bypass or isolation.
In step S302, the signaling system sends first request information to the control center, where the first request information is used to instruct the control center to output alarm prompt information, and the alarm prompt information is used to confirm whether the first state of the target device is valid.
The content in step S101 may be referred to, and will not be described in detail.
In step S303, the control center responds to the first request information sent by the signal system, and outputs alarm prompt information, where the alarm prompt is used to confirm whether the first state of the target device is valid.
The content in step S102 may be referred to, and will not be described in detail.
Step S304, the control center sends a first confirmation signal to the signal system based on a first confirmation result which is sent by the field device and is used for representing that the first state of the target device is valid.
In one embodiment, where the field device is a video monitoring device and the target device is located within the detection range of the field device, step S304 may include:
transmitting a detection instruction to the field device, wherein the detection instruction is used for instructing the field device to remotely confirm the first state of the target device based on a monitoring video;
and receiving the first confirmation result sent by the field device under the condition that the first state of the target device is confirmed to be valid by the field device.
The video monitoring device described above may be, for example, a monitoring device in a CCTV monitoring system, such as a monitoring camera disposed near a target device, which can determine whether a first state of the target device is valid by capturing an image of the target device and performing image analysis.
In another embodiment, in the case where the field device is a communication terminal of a crew member, step S304 may include:
and sending a security state check message to the communication terminal, wherein the security state check message is used for indicating the station personnel to confirm the first state of the target equipment. For example, the communication terminal may be an interphone of a station person, and a dispatcher of the control center may communicate with the station person near the target device through the interphone and instruct the station person to confirm the first state of the target device.
And when the control center determines that the first state of the target equipment is valid based on the monitoring equipment or the communication terminal of the station personnel, a first confirmation signal is sent to the signal system.
In step S305, the signaling system sends second request information to the control center when receiving a first acknowledgement signal returned by the control center and responding to the first request information, where the second request information is used to instruct the control center to output alarm prompt information again.
In step S306, the control system outputs the alarm prompt information again in response to the second request information sent by the signal system.
The method of the signal system sending the second request information and the control center outputting the alarm prompt information again based on the second request information may refer to step S103, which is not described herein.
Step S307, based on the second confirmation result sent by the field device, which characterizes the first state of the target device as valid, sends a secondary confirmation signal to the signal system.
In step S308, the signal system determines that the first state of the target device is valid when receiving the secondary acknowledgement signal returned by the control center in response to the second request information.
Through the steps S301 to S308, the bypass or isolation state of the target device is determined to be valid through the secondary confirmation of the control center, and the signal system allows the target device to perform a corresponding operation according to the bypass or isolation state if it is determined that the bypass or isolation state of the target device is valid.
Alternatively, after step S303, it may further include:
in step S309, the control center sends a first rejection signal to the signaling system based on the third confirmation result sent by the field device, which characterizes that the first state of the target device is invalid.
In step S310, the signaling system determines that the first state of the target device is invalid when receiving a first rejection signal returned by the control center.
Alternatively, after step S306, it may further include:
in step S311, the control center sends a second rejection signal to the signal system based on the fourth confirmation result sent by the field device, which characterizes that the first state of the target device is invalid.
In step S312, the signaling system determines that the first state of the target device is invalid when receiving a second rejection signal returned from the control center.
That is, after the signal system sends the first request information, if the first rejection signal sent by the control center is received, the control center determines that the bypass or isolation state of the target device is invalid, and the first confirmation is not passed, the signal system does not allow the bypass or isolation of the target device. After the signal system sends the second request information, if the second rejection signal sent by the control center is received, the control center determines that the bypass or isolation state of the target device is invalid in the secondary confirmation, and the secondary confirmation does not pass, the signal system does not allow the bypass or isolation of the target device.
After step S310 or step S312, it may further include:
in step S313, after determining that the first state of the target device is invalid, a reset operation is performed on the target device.
It should be noted that the information transmitted between the signal system and the control center, and between the control center and the field device can ensure the correctness of the transmitted information through the safety design of hardware redundancy comparison or the software heterogeneous coding of the two commands.
The hardware redundancy comparison is realized through hardware, for example, two sets of hardware are used for executing a command, for example, a command is issued through man-machine interaction, the command is processed through two CPUs, and the command is output only when the processing results of the two CPUs are consistent; the software heterogeneous code may be obtained by running two software codes on one piece of hardware, for example for: 2+2+2+2=10, may also be represented as 2*5 =10, and if the final running result of the two coding modes is the same, the result will be output, and the accuracy of the system transmission information can be improved by the above mode.
In summary, the above technical solution provides a secondary confirmation mechanism for bypass and isolation in a rail transit system, where the mechanism is implemented by performing secondary confirmation through a signal system and a control center, and compared with the manner of manually confirming the bypass and isolation state in the related art, the present disclosure solves the problems of higher failure rate and low system automation degree existing in relying on manual operation, and achieves the effects of performing safety protection on error bypass or error isolation, effectively avoiding the safety risk after error bypass or error isolation, and reducing the probability of casualties of personnel.
Fig. 4 is a flowchart of another security detection method provided in an embodiment of the disclosure, taking a target device as a platform door as an example, and describing the above security detection method, as shown in fig. 4, the method may include:
step 1, a signal system acquires a door isolation state of a platform door;
step 2, the signal system sends a first door isolation request to the control center;
step 3, the control center returns a first confirmation for the first request of isolation to the signal system;
step 4, the signal system sends a door isolation secondary request to the control center;
step 5, the control center returns a secondary confirmation for the door isolation secondary request to the signal system;
step 6, the signal system determines that the door isolation state of the platform door is valid;
step 7, the signal system allows the platform door to execute alignment isolation, and allows the train to get off.
For example, the first request for gate isolation may refer to the first request information, the first acknowledgement may refer to the first acknowledgement signal, the second request for gate isolation may refer to the second request information, and the second acknowledgement may refer to the second acknowledgement signal. The platform door performs alignment isolation, namely, the vehicle door corresponding to the platform door on the train is not opened.
It should be noted that, for different scenarios, the subsystems of the signal system for executing the security detection method are different, and the security detection method is illustrated below based on different scenarios.
Fig. 5 is a flowchart of another security detection method provided in an embodiment of the present disclosure, taking a target device as a platform door as an example, where the method may apply a vehicle-ground communication signal system platform door to separate a scene, where a subsystem in a signal system for performing the security detection method may include ATS, VOBC, ZC, referring to fig. 5, and the method may include the following steps:
step 1, CI obtains the door isolation state of a platform door;
step 2, CI sends door isolation request to ATS;
step 3, the ATS sends a request to the control center to determine the allowable isolation;
step 4, the control center returns a one-time confirmation permission instruction for the one-time request to the ATS;
step 5, the ATS sends the one-time confirmation permission instruction to the CI;
step 6, the CI sends feedback of the received one-time confirmation permission instruction to the ATS;
step 7, the ATS sends a secondary request to the control center to determine that isolation is allowed;
step 8, the control center returns a secondary confirmation permission instruction for the secondary request to the ATS;
Step 9, the ATS sends a message for agreeing to isolate to the CI;
step 10, CI confirms that the door isolation state of the platform door is valid;
step 11, CI sends effective information of door isolation state to ATS;
step 12, CI sends effective information of door isolation state to VOBC;
step 13, CI sends effective information of door isolation state to ZC;
step 14, vobc allows the platform doors to perform alignment isolation, allowing trains to be launched.
For example, the first request may refer to the first request information, the first acknowledgement permission command may refer to the first acknowledgement signal, the second request may refer to the second request information, and the second acknowledgement permission command may refer to the second acknowledgement signal.
Fig. 6 is a flowchart of another security detection method provided in an embodiment of the present disclosure, taking a target device as a platform door as an example, where the method may apply a vehicle-to-vehicle communication signal system platform door to separate a scene, where a subsystem in a signal system for performing the security detection method may include ATS, VOBC, OC, referring to fig. 6, and the method may include the following steps:
step 1, OC acquires the door isolation state of a platform door;
step 2, the OC sends the gate isolation state to the VOBC;
Step 3, the VOBC sends a door isolation request for the platform door to the ATS;
step 4, the ATS sends a request to the control center to determine the allowable isolation;
step 5, the control center returns a one-time confirmation permission instruction for the one-time request to the ATS;
step 6, the ATS sends a confirmation permission instruction to the VOBC once;
step 7, the VOBC sends feedback of the received one-time confirmation permission instruction to the ATS;
step 8, the ATS sends a secondary request to the control center to determine that isolation is allowed;
step 9, the control center returns a secondary confirmation permission instruction for the secondary request to the ATS;
step 10, the ATS sends a message for agreeing to isolate to the VOBC;
step 11, VOBC determines that the door isolation state of the platform door is valid;
step 12, the VOBC sends a message that the door isolation state is valid to the ATS;
step 13, vobc allows the platform doors to perform alignment isolation, allowing trains to be launched.
For example, the first request may refer to the first request information, the first acknowledgement permission command may refer to the first acknowledgement signal, the second request may refer to the second request information, and the second acknowledgement permission command may refer to the second acknowledgement signal.
Fig. 7 is a block diagram of a security detection device 700 according to an embodiment of the present disclosure, as shown in fig. 3, applied to a signal system, the device 700 includes:
A sending module 701, configured to send, when determining that the current state of the target device is a first state, first request information to a control center, where the first request information is used to instruct the control center to output alarm prompt information; the alarm prompt information is used for confirming whether the first state of the target equipment is valid or not;
the sending module 701 is further configured to send, when receiving a first acknowledgement signal returned by the control center in response to the first request information, second request information to the control center, where the second request information is used to instruct the control center to output the alarm prompt information again;
a determining module 702, configured to determine that the first state of the target device is valid when receiving a secondary acknowledgement signal returned by the control center in response to the second request information.
Optionally, the sending module 701 is further configured to:
and determining that the first state of the target device is invalid under the condition that a first rejection signal returned by the control center in response to the first request information is received.
Optionally, the determining module 702 is further configured to:
and determining that the first state of the target device is invalid when a second rejection signal returned by the control center in response to the second request information is received.
Optionally, the apparatus 700 may further include: a reset module;
the reset module is used for carrying out reset operation on the target equipment after the first state of the target equipment is invalid.
Optionally, the signal system is a signal system in a rail transit system, and the target device comprises a trackside device or a train device.
In summary, the above technical solution provides a secondary confirmation mechanism for bypass and isolation in a rail transit system, where the mechanism is implemented by performing secondary confirmation through a signal system and a control center, and compared with the manner of manually confirming the bypass and isolation state in the related art, the present disclosure solves the problems of higher failure rate and low system automation degree existing in relying on manual operation, and achieves the effects of performing safety protection on error bypass or error isolation, effectively avoiding the safety risk after error bypass or error isolation, and reducing the probability of casualties of personnel.
Fig. 8 is a block diagram of a security detection device 800 according to an embodiment of the present disclosure, as shown in fig. 3, applied to a control center, the device 800 includes:
an output module 801, configured to output alarm prompt information in response to first request information sent by the signal system; the first request information is sent by the signal system under the condition that the target equipment is determined to be in a first state, and the alarm prompt is used for confirming whether the first state of the target equipment is valid or not;
A transmitting module 802, configured to transmit a first acknowledgement signal to the signal system based on a first acknowledgement result sent by the field device that characterizes the first state of the target device as valid;
the output module 802 is configured to respond to the second request information sent by the signal system, and output the alarm prompt information again; the second request information is sent by the signal system under the condition that the first confirmation signal is received;
the sending module is configured to send a secondary acknowledgement signal to the signal system based on a second acknowledgement result sent by the field device and indicating that the first state of the target device is valid, where the secondary acknowledgement signal is used to instruct the signal system to determine that the first state of the target device is valid.
Optionally, the apparatus 800 further comprises a receiving module;
the sending module 802 is configured to send a detection instruction to the field device, where the detection instruction is configured to instruct the field device to remotely confirm the first state of the target device based on a surveillance video;
the receiving module is configured to receive the first confirmation result sent by the field device when the field device confirms that the first state of the target device is valid.
Optionally, the sending module 802 is further configured to:
and sending a security state check message to the communication terminal, wherein the security state check message is used for indicating the station personnel to confirm the first state of the target equipment.
Optionally, the signal system is a signal system in a rail transit system, and the target device comprises a trackside device or a train device.
In summary, the above technical solution provides a secondary confirmation mechanism for bypass and isolation in a rail transit system, where the mechanism is implemented by performing secondary confirmation through a signal system and a control center, and compared with the manner of manually confirming the bypass and isolation state in the related art, the present disclosure solves the problems of higher failure rate and low system automation degree existing in relying on manual operation, and achieves the effects of performing safety protection on error bypass or error isolation, effectively avoiding the safety risk after error bypass or error isolation, and reducing the probability of casualties of personnel.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Fig. 9 is a block diagram of an electronic device 900, according to an example embodiment. As shown in fig. 9, the electronic device 900 may include: processor 901, memory 902. The electronic device 900 may also include one or more of a multimedia component 903, an input/output (I/O) interface 904, and a communication component 905. The electronic device 900 may be a target device, a device in a signaling system, a device in a control center, or a field device as described above.
The processor 901 is configured to control the overall operation of the electronic device 900 to perform all or part of the steps in the security detection method described above. The memory 902 is used to store various types of data to support operations at the electronic device 900, which may include, for example, instructions for any application or method operating on the electronic device 900, as well as application-related data, such as contact data, transceived messages, pictures, audio, video, and so forth. The Memory 902 may be implemented by any type or combination of volatile or nonvolatile Memory devices, such as static random access Memory (Static Random Access Memory, SRAM for short), electrically erasable programmable Read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM for short), erasable programmable Read-Only Memory (Erasable Programmable Read-Only Memory, EPROM for short), programmable Read-Only Memory (Programmable Read-Only Memory, PROM for short), read-Only Memory (ROM for short), magnetic Memory, flash Memory, magnetic disk, or optical disk. The multimedia component 903 may include a screen and audio components. Wherein the screen may be, for example, a touch screen, the audio component being for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may be further stored in the memory 902 or transmitted through the communication component 905. The audio assembly further comprises at least one speaker for outputting audio signals. The I/O interface 904 provides an interface between the processor 901 and other interface modules, which may be a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 905 is used for wired or wireless communication between the electronic device 900 and other devices. Wireless communication, such as Wi-Fi, bluetooth, near field communication (Near Field Communication, NFC for short), 2G, 3G, 4G, NB-IOT, eMTC, or other 5G, etc., or one or a combination of more of them, is not limited herein. The corresponding communication component 905 may thus comprise: wi-Fi module, bluetooth module, NFC module, etc.
In an exemplary embodiment, the electronic device 900 may be implemented by one or more application specific integrated circuits (Application Specific Integrated Circuit, abbreviated as ASIC), digital signal processors (Digital Signal Processor, abbreviated as DSP), digital signal processing devices (Digital Signal Processing Device, abbreviated as DSPD), programmable logic devices (Programmable Logic Device, abbreviated as PLD), field programmable gate arrays (Field Programmable Gate Array, abbreviated as FPGA), controllers, microcontrollers, microprocessors, or other electronic components for performing the security detection methods described above.
In another exemplary embodiment, a computer readable storage medium is also provided, comprising program instructions which, when executed by a processor, implement the steps of the security detection method described above. For example, the computer readable storage medium may be the memory 902 described above including program instructions executable by the processor 901 of the electronic device 900 to perform the security detection method described above.
Fig. 10 is a block diagram of an electronic device 1000, shown in accordance with an exemplary embodiment. For example, the electronic device 1000 may be provided as a server. For example, the electronic device 1000 may be a server in the signal system, a server in a control center, or a server as the field device. Referring to fig. 10, the electronic device 1000 includes a processor 1022, which may be one or more in number, and a memory 1032 for storing computer programs executable by the processor 1022. The computer programs stored in memory 1032 may include one or more modules each corresponding to a set of instructions. Further, processor 1022 may be configured to execute the computer program to perform the security detection methods described above.
In addition, the electronic device 1000 may also include a power component 1026 and a communication component 1050, the power component 1026 may be configured to perform power management of the electronic device 1000, and the communication component 1050 may be configured to enable communication of the electronic device 1000, such as wired or wireless communication. In addition, the electronic device 1000 may also include an input/output (I/O) interface 1058. The electronic device 1000 may operate based on an operating system stored in memory 1032, such as Windows Server, mac OS XTM, unixTM, linuxTM, and the like.
In another exemplary embodiment, a computer readable storage medium is also provided, comprising program instructions which, when executed by a processor, implement the steps of the security detection method described above. For example, the non-transitory computer readable storage medium may be the memory 1032 including program instructions described above that are executable by the processor 1022 of the electronic device 1000 to perform the security detection method described above.
In another exemplary embodiment, a computer program product is also provided, comprising a computer program executable by a programmable apparatus, the computer program having code portions for performing the above-described security detection method when executed by the programmable apparatus.
The preferred embodiments of the present disclosure have been described in detail above with reference to the accompanying drawings, but the present disclosure is not limited to the specific details of the above embodiments, and various simple modifications may be made to the technical solutions of the present disclosure within the scope of the technical concept of the present disclosure, and all the simple modifications belong to the protection scope of the present disclosure.
In addition, the specific features described in the foregoing embodiments may be combined in any suitable manner, and in order to avoid unnecessary repetition, the present disclosure does not further describe various possible combinations.
Moreover, any combination between the various embodiments of the present disclosure is possible as long as it does not depart from the spirit of the present disclosure, which should also be construed as the disclosure of the present disclosure.

Claims (10)

1. A security detection method for use in a signaling system, the method comprising:
under the condition that the current state of the target equipment is determined to be a first state, first request information is sent to a control center, and the first request information is used for indicating the control center to output alarm prompt information; the alarm prompt information is used for confirming whether the first state of the target equipment is valid or not, and the first state comprises bypass or isolation;
Under the condition that a first confirmation signal which is returned by the control center and responds to the first request information is received, second request information is sent to the control center, and the second request information is used for indicating the control center to output the alarm prompt information again;
and under the condition of receiving a secondary confirmation signal returned by the control center and responding to the second request information, determining that the first state of the target equipment is valid.
2. The method according to claim 1, wherein the method further comprises:
and under the condition that a first rejection signal returned by the control center and responding to the first request information is received, determining that the first state of the target equipment is invalid.
3. The method according to claim 1, wherein the method further comprises:
and under the condition that a second rejection signal returned by the control center and responding to the second request information is received, determining that the first state of the target equipment is invalid.
4. A method according to claim 2 or 3, characterized in that the method further comprises:
and after the first state of the target device is determined to be invalid, performing a reset operation on the target device.
5. A method according to any one of claims 1-3, characterized in that the signalling system is a signalling system in a rail transit system, the target equipment comprising trackside equipment or train equipment.
6. A security detection method for use in a control center, the method comprising:
responding to first request information sent by a signal system, and outputting alarm prompt information; the first request information is sent by the signal system under the condition that the target equipment is determined to be in a first state, and the alarm prompt is used for confirming whether the first state of the target equipment is valid or not, wherein the first state comprises bypass or isolation;
transmitting a first acknowledgement signal to the signal system based on a first acknowledgement result transmitted by a field device that characterizes the first state of the target device as valid;
responding to second request information sent by the signal system, and outputting the alarm prompt information again; the second request information is sent by the signal system under the condition that the first confirmation signal is received;
and transmitting a secondary acknowledgement signal to the signal system based on a second acknowledgement result transmitted by the field device and representing that the first state of the target device is valid, wherein the secondary acknowledgement signal is used for indicating that the signal system determines that the first state of the target device is valid.
7. The method of claim 6, wherein the field device is a video monitoring device and the target device is within a detection range of the field device, the method further comprising:
sending a detection instruction to the field device, wherein the detection instruction is used for indicating the field device to remotely confirm the first state of the target device based on a monitoring video;
and receiving the first confirmation result sent by the field device under the condition that the first state of the target device is confirmed to be valid by the field device.
8. The method of claim 6, wherein the field device is a communication terminal of a crew member, the method further comprising:
and sending a security state check message to the communication terminal, wherein the security state check message is used for indicating the station personnel to confirm the first state of the target equipment.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the program when executed by a processor implements the steps of the method according to any of claims 1-5, or the program when executed by a processor implements the steps of the method according to any of claims 6-8.
10. An electronic device, comprising:
a memory having a computer program stored thereon;
a processor for executing the computer program in the memory to carry out the steps of the method of any one of claims 1-5 or for executing the computer program in the memory to carry out the steps of the method of any one of claims 6-8.
CN202210470908.3A 2022-04-28 2022-04-28 Security detection method, electronic device and storage medium Pending CN117002569A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210470908.3A CN117002569A (en) 2022-04-28 2022-04-28 Security detection method, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210470908.3A CN117002569A (en) 2022-04-28 2022-04-28 Security detection method, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN117002569A true CN117002569A (en) 2023-11-07

Family

ID=88562344

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210470908.3A Pending CN117002569A (en) 2022-04-28 2022-04-28 Security detection method, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN117002569A (en)

Similar Documents

Publication Publication Date Title
CN106656310B (en) Unmanned aerial vehicle task execution method and system
CN112744267B (en) Temporary train speed limiting method and device, readable storage medium and electronic equipment
US11155286B1 (en) Passenger communication output control circuit for unmanned metro train
CN102368345B (en) Elevator remote monitoring system
KR20170100422A (en) Apparatus and method for notify emergency of automobile using external terminal
CA2813983C (en) System and method to protect against local control failure using cloud-hosted control system back-up processing
KR20150075224A (en) Apparatus and method for providing of control service
EP3101951A1 (en) Bidirectional redundant mesh networks
CN113721621B (en) Vehicle control method, device, electronic equipment and storage medium
Bester et al. Modeling of reliability and safety at level crossing including in polish railway conditions
CN113482461A (en) Emergency unlocking control method and device and railway vehicle
CN112537312A (en) Method, device and storage medium for remote control of a motor vehicle
CN117002569A (en) Security detection method, electronic device and storage medium
US20220281498A1 (en) Railway vehicle and control method and system therefor, and train control and management system
JP6216857B1 (en) Tide door control device, tidal door control method, and program
CN112537313A (en) Method, device and storage medium for assisting a motor vehicle
WO2024055439A1 (en) Train obstacle information display method and device
CN111433146B (en) Remote monitoring system for elevator
KR102441277B1 (en) System for smart control of platform screen door
KR101666652B1 (en) The monitoring and control system for transportation field which uses wired and wireless networks
US20220404825A1 (en) Method for remotely controlling a robot
KR100644225B1 (en) Telemetering train protector using cbtc
KR101527411B1 (en) Train control system for emergency operation using train wireless transmitting/receiving device
US11433933B2 (en) Ground base device, unmanned operation system, operation system, and unmanned operation method
KR102378242B1 (en) In-vehicle driver and passenger safety service delivery system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination