Unlock instant, AI-driven research and patent intelligence for your innovation.

A data access control method and system

A technology for data access and control methods, applied in the direction of input/output to record carriers, etc., can solve problems such as poor security, achieve the effect of reducing work load, improving security and continuity, and ensuring safety

Active Publication Date: 2016-04-13
CHINA ACADEMY OF RAILWAY SCI CORP LTD +3
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this technical solution, the local database module is set on the client side of the system, and the data redundancy protection adopted by the core database has poor security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data access control method and system
  • A data access control method and system
  • A data access control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] figure 1 This is a flowchart of a data access control method provided by an embodiment of the present invention, and the method includes:

[0024] Step 101: Determine whether the database server is working normally. According to the status information obtained from the database server and the data synchronization module, it is determined whether the database server is working normally; if the data server is working normally, go to step 102; otherwise, go to step 103.

[0025] Step 102: Perform data access to the database server according to the access instruction sent by the dispatch terminal module. Specifically: the dispatching terminal module is converted into a special encrypted information packet according to the special security protocol of the dispatching concentration, and information is exchanged with the application server through the TCP / IP protocol, and the access instructions from the dispatching terminal module are converted into ADO data access to realize the ...

Embodiment 2

[0030] In order to introduce the present invention more specifically, the following is attached figure 2 The present invention will be further described.

[0031] In the embodiment of the present invention, corresponding to the three working states of the database server of the scheduling centralized system: normal, failure and recovery, the system is designed with three working modes: normal operating mode, standby operating mode and recovery operating mode.

[0032] 1. Normal operation mode

[0033] On the one hand, in the normal operation mode, the database server is working normally, and the dispatching terminal module needs to access the following data: adding, deleting, and modifying the number of trains in operation; the adjustment of the train plan in terms of stations, sections and time; the actual train operation Status records; train marshalling information; station storage information; notes on section and station special information; editing of dispatch orders and recor...

Embodiment 3

[0051] image 3 It is a schematic diagram of a data access system provided by an embodiment of the present invention, including: a dispatch terminal module 30, a database server 31, a standby database server 32, a data synchronization module 33, and an application server 34;

[0052] The dispatch terminal module 30 is configured to send an access instruction to the application server;

[0053] The database server 31 is configured to store operating data related to the access instructions sent by the dispatch terminal module;

[0054] The standby database server 32 is configured to store operating data related to the access instruction sent by the dispatch terminal module;

[0055] The application server 34 is used for judging whether the database server is working normally; if the database server is working normally, data access is performed on the database server according to the access instruction sent by the dispatch terminal module; if the database server If a failure occurs, dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a control method for data access. The control method for the data access is characterized in that whether a database server works normally is judged; if the database server works normally, the data access is conducted on the database server according to access orders sent by a dispatching terminal module; and if the database server does not work normally, whether a standby database server works normally is judged, and if the standby database server works normally, the data access is conducted on the standby database server according to access orders sent by the dispatching terminal module. By adoption of the control method, safe access of core data is realized, efficiency of dispatching command work is improved, and a rail traffic command system is provided with safety guarantee.

Description

Technical field [0001] The invention relates to an urban rail transit system, in particular to a data access control method and system. Background technique [0002] The CTC (CentralizedTrafficControlSystem, dispatching centralized control system) in the urban rail transit system is mainly used to realize the supervision and control of the train operation, and assist the dispatcher to manage the whole line of trains. It plays a role in improving the efficiency of rail transit and ensuring the safety of operation. An extremely important role. [0003] In order to safely and reliably realize the supervision and control function of train operation, the CTC system must require real-time and safe storage and information sharing of the core train operation plan, actual, and dispatch command data used in the dispatch command. Once a failure occurs, the entire dispatch command system will be paralyzed. , Dispatchers will return to the original working mode of manual paper and pen recordin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/06
Inventor 应志鹏袁志明许伟张涛宋鹏飞魏博
Owner CHINA ACADEMY OF RAILWAY SCI CORP LTD