Embedded type software security memory management method

A memory management and embedded system technology, applied in the field of computer software memory management, can solve the problems of not being able to allocate memory slices, less memory usage, and no debris collection method, and achieve the effect of efficient dynamic memory management

Active Publication Date: 2013-06-26
XIAN GALAXY POWER INTELLIGENT ELECTRIC
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to meet more and more complex functional requirements in embedded systems, object-oriented programming technology has been paid more and more attention; however, the superior experience brought by many object-oriented features of object-oriented programming technology to designers requires a large number of dynamic creation of objects However, a large number of dynamic creation and release of object instances will often bring a lot of memory fragmentation to the memory management in the system; often the total memory usage is not much, but the required memory slices cannot be allocated; directly based on the address The memory access method of the indicator, in which case there is no effective garbage collection method to avoid system crashes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded type software security memory management method
  • Embedded type software security memory management method
  • Embedded type software security memory management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Such as figure 1 As shown, a method for secure memory management of embedded software includes: fixed access identifiers are fixed addresses and constants defined in the embedded software, which are constants that do not change during code running.

[0029] The memory management method based on fixed access identifiers is a set of algorithms for managing memory slices. These algorithms allocate memory slices in the memory pool and manage them through index tables. Client code uses fixed access identifiers to apply, access and release and so on.

[0030] Memory pool, statically allocated storage space in RAM, is used to store memory slices allocated to client codes.

[0031] Index table, statically allocated storage space in RAM, used to store memory slice index.

[0032] The memory pool is a piece of storage space statically allocated in the embedded system RAM, and its size is pre-configured during programming of the embedded software. The memory slices that need to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to a computer software memory management method, and particularly relates to an embedded type software security memory management method in an industry real-time automatic device. The computer software memory management method comprises a memory pool, an index table, and a group of algorithms used for completing the management of memory chips, wherein the memory pool is used for storing the memory chips for distributing customer codes in the storage spaces distributed in a random access memory (RAM) in a static state, the index table is used for storing the index of each memory chip in the storage spaces distributed in the RAM in a static state and, the algorithms distribute the memory chips in the memory pool and carry out management through the index table, and the customer codes adopt fixed accessing marks to carry out operations, such as application, accessing and release.

Description

technical field [0001] The invention belongs to a computer software memory management method, in particular to a memory management method of embedded software in an industrial real-time automation device. Background technique [0002] Computer software programming is inseparable from memory management. Usually, memory management algorithms are provided by the operating system; application software inevitably allocates, releases and uses memory segments frequently during operation, and the access security control of memory segments and memory A large number of space fragments formed during the allocation and release of fragments are usually an important cause of system instability. In modern embedded systems, the functions of embedded software are becoming more and more complex, especially with the widespread use of object-oriented technology, the traditional static memory allocation mode can no longer meet the algorithm requirements in the software programming process. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/06
Inventor 卫荣平
Owner XIAN GALAXY POWER INTELLIGENT ELECTRIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products