Double CPU protection information shared system and information processing method based on double port RAM
A technology for protecting information and sharing systems, applied in the field of hardware systems, can solve problems such as large space occupied by computing programs, less program space, and device inheritance limitations, so as to reduce research and development costs and production costs, smooth the development process, and shorten the development cycle Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0021] Example 1
[0022] When the dual-CPU protection information sharing system based on dual-port RAM in this embodiment is used in a situation where real-time requirements for protection information are very high and reliability requirements are not high, the specific working process is shown in FIG. 3 . The information providing system (such as the system CPUA) stores the protection information group Z in the dual-port RAM chip U in real time during the 600Hz or 1200Hz periodic interruption; the information using system (such as the system CPUB) uses any protection information in the protection information group Z When X is on, the information will be read from the dual-port RAM chip U, and the algorithm with strong anti-interference ability will be used for protection calculation, which satisfies the information sharing between the two CPUs and ensures the real-time performance of the information. .
Example Embodiment
[0023] Example 2
[0024] This embodiment is a technical solution formed by further analysis and changes on the basis of Embodiment 1, and is used for situations where the real-time performance and reliability requirements of the protection information group are very high, and the specific working process is shown in FIG. 4 . The system CPUA stores the protection information group Z in the dual-port RAM chip U in real time during the 600Hz or 1200Hz periodic interruption, and redundantly stores the protection information group three times in the adjacent area of the dual-port RAM chip; the system CPUB is using the protection information group. When any protection information X in the information group Z is used, the protection calculation is performed using the result obtained after the protection information X and the corresponding three redundant information are "ANDed", so as to ensure that the protection information X is incorrect and the information will not cause system...
Example Embodiment
[0026] Example 3
[0027]This embodiment is a technical solution formed by further changes on the basis of the above embodiments, and is used to protect the situation where the real-time performance of information is not high and the reliability is very important. The specific working process is shown in FIG. 5 . When the system starts or the protection information is modified, the system CPUA stores the protection information group Z in the dual-port RAM chip U, and stores its inverse code and XOR code in an adjacent area. When the system CPUB uses any protection information X in the protection information group Z, it checks the inverse code and XOR code of the protection information X. If the check is correct, it will continue to run. If the check is incorrect, the system CPUB will The use of the protection information X is automatically stopped, and the reliability flag F is set to inform the system CPUA. The system CPUA uses two methods to check the reliability of the pro...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap