Access control device having three operating systems

An access control device and access device technology, which is applied in the direction of data error detection and response error generation, can solve the problems of a single operating system, the system is not running smoothly, and access control cannot be performed. The effect of ensuring reliable operation

Inactive Publication Date: 2015-07-01
CHENGDU SHUANGAOYANG TECH
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing access control equipment only supports a single operating system. After working for a long time, the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control device having three operating systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0012] See figure 1 , is a schematic structural diagram of an access control device with three operating systems according to an embodiment of the present invention. The access control device 10 in this embodiment is used to control the resource access device 20's access to the resource providing device 30 for accessing the resources provided by the resource providing device 30 . The access control device 10 includes a first virtual machine 11 , a second virt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access control device having three operating systems. The access control device comprises a first virtual machine, a second virtual machine, a third virtual machine and a system switching unit. An embedded system is running on the first virtual machine; a first backup system is running on the second virtual machine; and a second backup system is running on the third virtual machine. The first virtual machine is used for carrying out a normal system state. The second virtual machine and the third virtual machine are used for carrying out backup system states. The system switching unit is used for monitoring the states of the first virtual machine, the second virtual machine and the third virtual machine; and the system switching unit selects one virtual machine from the second virtual machine and the third virtual machine to carry out a dynamic switch with the first virtual machine when it is monitored that the first virtual machine is crashed, so as to take place of the normal system state of the first virtual machine; and the other one of the second virtual machine and the third virtual machine is utilized for recovering the first virtual machine into the backup system state. The access control device having the three operating systems is able to keep controlling the access when the operating system is crashed.

Description

technical field [0001] The invention relates to the technical field of access control, in particular to an access control device with three operating systems. Background technique [0002] Currently, many users can use one and the same device at the same time. For example, user A can use a terminal to access a device owned by user A, and another user B can also access the device owned by user A. In situations where a user lends a device to another person over the network, security is a primary concern. When the resource providing device storing resources is allowed to be accessed from the resource accessing device through the network so that the resource accessing device can use the resource of the resource providing device, there is a case where the resource is used by a third party without the owner of the resource providing device knowing. possibility of unauthorized access. Therefore, an access control device is required to control the resource access to the resource ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/14
Inventor 罗春
Owner CHENGDU SHUANGAOYANG TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products