Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Embedded Module of Safety Mechanism

A security mechanism and embedded technology, applied in computer security devices, instruments, electrical digital data processing, etc., to achieve the effect of improving operating efficiency, good protection effect, and less resource occupation

Active Publication Date: 2018-03-02
BEIHANG UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the security problems of embedded systems are more challenging than those of general-purpose systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Embedded Module of Safety Mechanism
  • An Embedded Module of Safety Mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] see figure 1 , figure 2 As shown, the specific implementation is as follows:

[0023] The present invention is an embedded module with a safety mechanism, which is composed of a monitoring information comparison module, a monitoring information storage module and a hardware safety sub-module. The relationship between the three is: the embedded processor transmits the collected program counter and current instruction value to the monitoring information comparison module, and then processes the data through the monitoring information storage module and the hardware security sub-module.

[0024] figure 1 Describes the overall structure of the safety monitoring mechanism, which mainly includes two parts: offline analysis of the program and real-time dynamic analysis of the program running. The program source code is cross-compiled in the offline analysis stage to generate executable binary code, and extract the required control flow basic block check information and jump instr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embedded module of a novel security mechanism consists of a monitoring information comparison module, a monitoring information storage module and a hardware security sub module. An embedded processor sends a collected program counter and a current instruction value to the monitoring information comparison module, and data is processed by using the monitoring information storage module and the hardware security sub module. During execution of a program, the hardware security sub module reads key parameter information from the monitoring information storage module, and compares the key parameter information with parameter information in a real-time running process of the program; once inconsistency is found, it indicates that the program is attacked, and the hardware security sub module terminates running of the program. The embedded module provided by the present invention can quickly perform searching, reading and comparison on parameter information, consumes less resource and has high security.

Description

Technical field [0001] The invention relates to an embedded module with a safety mechanism. It is a hardware-assisted embedded system safety module. It uses a method supported by pure hardware to combine information generated during program execution with information obtained through offline program analysis in advance. Compare, prevent malicious attacks on the program code from happening. It belongs to the field of embedded system security technology. Background technique [0002] With the development of electronic science and computer technology, more and more embedded devices have entered people's lives, and have gradually played an important role in system automatic control and data storage in many fields. At the same time, more and more applications and more convenient network access make the embedded platform face more and more security challenges. Embedded systems have strict resource constraints in terms of computing power, memory, and energy. The use of virus scanning...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/572
Inventor 王翔沈全能杜培王维克王晓翠
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products