Spatial alternation based train control system movement authority safety protection method
A technology for train safety protection and mobile authorization, which is applied to the control system of the operation center, railway signal and safety, railway car body components, etc. Unable to park, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] The mobile authorization security protection method of the train control system proposed in the embodiment of the present invention describes the indispensable track section information description in the MA calculation process by relying on the space transformation related theory, and realizes the security protection function of the MA through the security protection algorithm.
[0057] The embodiment of the present invention proposes a mobile authorization security protection algorithm based on space transformation. The schematic diagram of the implementation principle of the security protection algorithm is as follows: figure 1 As shown, the present invention realizes the MA safety protection algorithm module inside the ZC (Zone Comtroller, regional controller) system, and the input data of the ZC system includes basic information such as train data and line data needed for MA calculation, and the train control algorithm generates Original MA, train speed and braking...
Embodiment 2
[0103] The test was carried out according to the actual station layout of the Yizhuang Line, and the results proved that the protection method can protect the security of the train movement authorization, and the experimental results did not cause state explosion, and the calculation time can meet the actual system use.
[0104] On the basis of the original station data of Yizhuang Line, 5000 faults are randomly injected into 5000 infrastructure, original MA and train parameters through fault injection. These faults cover various situations that may occur in the train control system. Experiments show that the above algorithm can be used to protect the security of mobile authorization.
[0105] During the experiment, a total of 48 main routes in both directions were considered for testing. Table 2 lists the infrastructure elements contained in each route. The number of states and running time under different numbers of trains are counted to prove that the proposed security prot...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


