Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control system, security check method and embedded system

A technology for embedded systems and control systems, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as scalability limitations of embedded systems, and achieve the effect of security

Inactive Publication Date: 2011-04-20
SOCLE TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the methods of previous technologies will limit the scalability of embedded systems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control system, security check method and embedded system
  • Control system, security check method and embedded system
  • Control system, security check method and embedded system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the above and other objects, features and advantages of the present invention more comprehensible, preferred embodiments are exemplified below and described in detail with accompanying drawings.

[0018] Please refer to figure 1 , figure 1 It is a structural diagram of the embedded system of the present invention.

[0019] The embedded system 1 of the present invention includes a control system 10 , an In System Programming (ISP) module 20 and an external storage module 30 , which are electrically connected to each other. The control system 10 is structured using a System On Chip (SOC), a Multi-chip Package (MCP) or a System In Package (SIP), but the present invention does not This is not the limit. The control system 10 includes a processing module 11 , a first storage module 12 , a second storage module 13 and a third storage module 14 , which are electrically connected to each other. If the control system 10 is a SoC, the processing module 11 , t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a control system, a security check method and an embedded system. The control system is used for the embedded system to execute the security check method. The control system comprises a processing module and a first storage module, and the first storage module is electrically connected with the processing module and is used for storing a preloading code and a first security key, wherein when the control system is connected with a programming module in the system, the processing module utilizes the preloading code to read a first application program of the programming module in the system so as to judge whether the first application program conforms to the first security key; if yes, then a second application program of the programming module in the system is executed to establish an internal program and a second security key. The invention can realize the security of the embedded system without limiting the expansibility of the embedded system applying the control system and the security check method.

Description

technical field [0001] The invention relates to a control system and a safety inspection method, in particular to a control system and a safety inspection method suitable for an embedded system. Background technique [0002] In today's life, embedded systems have been widely designed and applied in various occasions, such as automatic teller machine (Automatic Teller Machine, ATM) system or personal digital assistant (Personal Digital Assistant, PDA) system. In order to save manufacturing costs, a control system applicable to various embedded systems has been developed in the prior art. With different interfaces and application programs, the control system can become an embedded system for different purposes. [0003] Since the control system is applicable to various interfaces and application programs, a security checking method is needed to protect the control system from being damaged by unknown interfaces or application programs. [0004] In order to avoid the above de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/57
Inventor 陈少平陈麟树
Owner SOCLE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products