Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for recovering anomaly of application program in embedded system

An embedded system and application technology, which is applied in the direction of response error generation, redundant data error detection in calculation, etc., can solve the problems of poor reliability of application programs, and achieve the effect of avoiding separate installation

Active Publication Date: 2015-02-11
STATE GRID CORP OF CHINA +3
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide an abnormal recovery method and device for embedded system applications, in order to solve the problem of poor reliability of applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for recovering anomaly of application program in embedded system
  • Method and device for recovering anomaly of application program in embedded system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] Such as figure 2 Be the concrete flowchart of embodiment 1, method of the present invention comprises the steps:

[0027] Step 1: After the kernel is started, the embedded system checks whether the application upgrade program exists. If the application upgrade program exists, replace the backup program 2 with the backup program 1, then delete the backup program 1, and replace the current application program with the application upgrade program. Then delete the application upgrade program, and then execute the application program and monitoring program; if the application upgrade program does not exist, directly execute the application program and monitoring program;

[0028] Step 2: After the application program is started, the application program performs initialization and self-test. If the self-test judgment of the application program is abnormal, the application program enters the process of waiting for the program to resume, and the process communication port with...

Embodiment 2

[0041] Embodiment 2 is actually a simplification of Embodiment 1: without upgrading, that is, when the application upgrade program is not involved, after the embedded system kernel starts, if the application program data in the non-volatile memory is damaged, the application The program will fail to run, or run self-test failure, or process communication interaction failure. After the monitoring program finds the failure, the application program can be restored from the backup program 1 or backup program 2, and the system can be resumed after the system is reset. When restoring the application program from backup program 1 or backup program 2, the corresponding backup program will be deleted, so as to avoid damage to the backup program and repeated recovery operations, resulting in repeated restarts and non-volatile memory failure.

[0042] Backup program 1 is automatically copied by the currently running application program if the backup program 1 does not exist after the moni...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a device for recovering anomaly of an application program in an embedded system. The method comprises the following steps: 1) after kernel startup of the embedded system, executing the application program and a monitoring program; 2) detecting a failure by the monitoring program, and after finding the failure, recovering the application program from a first backup program; when the application program is recovered from the first backup program, deleting the first backup program, wherein the first backup program is generated by copying the current correctly-running application program if the first backup program does not exist after the monitoring program judges that the current application program can normally run. After the kernel startup of the embedded system, if application program data in a nonvolatile memory is destroyed, the application program cannot run or can generate a running self-detection failure or a process communication interaction failure, and after the monitoring program finds the failure, the application program can be recovered from the backup program, and after the system is reset, the system can resume running.

Description

technical field [0001] The invention relates to an abnormal recovery method and device for application program backup in an embedded system. Background technique [0002] Embedded systems are widely used in various personal consumer products, home display terminals, and industrial control terminals because of their platform-based architecture, rich development resources, and easy debugging. In actual use, the application functions of embedded systems often need to be upgraded and improved according to customer needs, or the application programs need to be modified in various debugging, testing, and maintenance. The Chinese invention patent "A Method for Safe Remote Upgrade of Embedded Linux System Software" (application number: 201110209990.6) introduces a method for safe upgrade of embedded system application software. This method controls the upgrade process by setting the upgrade flag, and can restore the system when an upgrade error is found. The specific process is as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/14
Inventor 庞浩杨帆熊章学张涛张锦春马清忠王盈盈林向阳冯海舟徐景涛
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products