Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Two-out-of-three secure data processing and arbitration method combined with hardware and software and device thereof

A security data and arbitration method technology, applied in the field of three-out-two security data processing and arbitration, can solve problems such as implementation difficulties, increase development costs, and design complex arbitration logic circuits, so as to reduce development difficulties and costs, and ensure accuracy and reliability. Reliability, effect of reducing logic complexity

Active Publication Date: 2017-06-06
CASCO SIGNAL
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1) Some two-out-of-three systems adopt a full software arbitration method, which completely depends on the computing power of the computer, the real-time performance of the arbitration is not good enough, and the accuracy of the arbitration result is not high
[0005] 2) All-software arbitration has particularly high security requirements for software design, and the processing of arbitration results cannot fully meet the security requirements of two-out-of-three safety computers, especially in systems with a safety integrity level of SIL4;
[0006] 3) Some two-out-of-three systems adopt an all-hardware arbitration method, which requires the design of complex arbitration logic circuits, which is difficult to implement and increases development costs;
[0007] 4) The all-hardware arbitration method has relatively high security requirements for the arbiter, and the arbiter is prone to single-point failure, which makes the arbiter invalid
[0008] 5) In many three-out-of-two systems, the hardware or software design of the three channels are the same, which cannot effectively avoid the common mode failure between each channel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-out-of-three secure data processing and arbitration method combined with hardware and software and device thereof
  • Two-out-of-three secure data processing and arbitration method combined with hardware and software and device thereof
  • Two-out-of-three secure data processing and arbitration method combined with hardware and software and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0051] like figure 1 As shown, a three-out safe data processing and arbitration method combining software and hardware, the method includes two three-out operations, which are the three-out two operations on the system state of the data processing module and the output data of the output module The two out of three operation, the two out of three operation on the system state is completed by the software arbitration module, and the two out of three operation on the output data is completed by the hardware arbitration module.

[0052] like figure 2 As shown, the method includes the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a two-out-of-three secure data processing and arbitration method combined with hardware and software and its device. The method includes two out-of-three operations, which are two out-of-three operations on the system state of the data processing module and two out-of-three operations on the output module. Two out of three operations on the output data, the two out of three operations on the system state are completed by the software arbitration module, and the two out of three operations on the output data are completed by the hardware arbitration module; the device includes a first channel, The second channel, the third channel and the hardware arbitration module, the three channels respectively include corresponding main processors and hardware comparators, the three main processors are connected in pairs, and are respectively connected to the hardware comparators of their corresponding channels, the three hardware The comparators are respectively connected with the hardware arbitration module. Compared with the prior art, the invention has the advantages of high efficiency, reliability and the like.

Description

technical field [0001] The invention relates to a two-out-of-three safe computer system, in particular to a two-out-of-three safe data processing and arbitration method and device thereof combining software and hardware. Background technique [0002] The three out of two safety computer system used in the rail transit industry has three calculation channels, each of which performs logic operations on the received data, and then outputs the results of logic operations to external devices. The output data of the three channels needs to be kept at all times Consistency, in order to maintain the consistency of the output data of the three channels, it is necessary to conduct a majority vote on the output data of the three channels, and if the channel with inconsistent data is found, the channel will be removed from the system. [0003] In the current two-out-of-three security computer system, in order to ensure the consistency of the output data of the three channels, some arbit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 张磊徐军汪明新周宇恒房增华陈庆安郭丽晓
Owner CASCO SIGNAL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products