Method for realizing configurable secure communication protocol
A technology for secure communication and communication protocol, applied in the field of configurable secure communication protocol implementation, which can solve the problem of large workload caused by developers
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] The present invention will be described in detail below in conjunction with the accompanying drawings, and the features of the present invention will be further revealed in the following detailed description.
[0034] figure 1 It is a structural diagram of the urban rail CBTC signal system. like figure 1 As shown in , the automatic train supervision system (Automatic Train Supervision, referred to as ATS) communicates with multiple computer interlocking (Computer Interlocking, referred to as CI) systems, multiple zone controllers (ZoneController, referred to as ZC), and multiple Automatic Train Protection (ATP for short) / Automatic Train Operation (ATO for short) in-vehicle equipment communication ground coupling. As an example, figure 1 The middle ATS is connected to 5 CI interlocks (for example, CI interlock 1, ..., CI interlock 5). The five CI interlocks can be physically or logically distributed into two zones, and controlled by corresponding zone controllers (eg...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


