Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Modeling and Verification Method for Trusted Attributes of Embedded Software

A technology for embedded software and attribute modeling, applied in software testing/debugging, instrumentation, error detection/correction, etc., to solve problems such as lack of repair operations, compatibility, information interaction barriers, and increased failure rates in the data verification process

Active Publication Date: 2020-10-20
SHANGHAI TECHN INST OF ELECTRONICS & INFORMATION
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, in the development process of various computer programs, automation control programs and other systems, in order to improve the program running speed and data processing efficiency, it is often used to build a general-purpose main program framework as much as possible, and then embed each program in the main program. The subroutines that the class needs to use, although this approach can effectively meet the purpose of improving the program running speed and data processing efficiency, but it is very easy to cause compatibility and information errors between the main program and subroutines, and between subroutines and subroutines. There are obstacles in the interaction ability, which leads to an increase in the failure rate of the program. In order to overcome this problem, the overall design and development of the program is currently in progress. Although the steps of authenticity verification between programs have been introduced, the current program In inter-credibility verification, it is often only a one-way simple data verification calculation, lacking an effective verification process and subsequent repair operations for the data verification process, resulting in poor system operation stability in the current program system to varying degrees , Insufficient system compatibility and expandability, which seriously affects the reliability and stability of the program system operation, so in view of this situation, it is urgent to develop a new trusted verification method for embedded programs to meet the needs of actual use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Modeling and Verification Method for Trusted Attributes of Embedded Software
  • A Modeling and Verification Method for Trusted Attributes of Embedded Software
  • A Modeling and Verification Method for Trusted Attributes of Embedded Software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Such as figure 1 As shown in -4, a method for modeling and verifying trusted attributes of embedded software includes the following steps:

[0031] The first step is to build embedded software subroutines. According to the basic framework of the main operating program and according to the needs of use, compile at least one subroutine that meets the needs of each independent operation, and the independent operation subroutines are connected in parallel with each other. The corresponding interrupt programs are compiled for the operating conditions, and then the independent operating subroutines are embedded into the basic framework of the main operating program through the interrupt program;

[0032] The second step is to establish the trust degree calculation function. After the first step is completed, at least 3 groups of data groups that are directly related to the data in the basic framework of the main running program are selected from each independently running sub...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an embedded software credible property modeling and verification method. The method comprises the six steps of software subprogram construction, credibility calculation function establishment, credibility preliminary association, access credibility evaluation subprogram construction, simulated running and credibility dynamic assessment and correction. The method is simpleand easy to operate and implement, and meanwhile comprehensive detection and correction are performed on the stability and reliability of program running from multiple aspects such as data operation,modeling, simulation, monitoring and dynamic feedback and correction. Therefore, on the one hand, the structure of a main program is effectively simplified, the running speed and data processing capability of the main program are improved, and the extension capability of the main program is effectively improved; and on the other hand, the reliability and flexibility of data interaction between themain program and each subprogram and data interaction among all the subprograms are effectively improved, so that the stability and reliability of program system overall running are effectively improved, and program overall system compatibility and extensibility are effectively improved.

Description

technical field [0001] The invention relates to a method for modeling and verifying trusted attributes of embedded software, which belongs to the field of engine production equipment and technology. Background technique [0002] At present, in the development process of various computer programs, automation control programs and other systems, in order to improve the program running speed and data processing efficiency, it is often used to build a general-purpose main program framework as much as possible, and then embed each program in the main program. The subroutines that the class needs to use, although this approach can effectively meet the purpose of improving the program running speed and data processing efficiency, but it is very easy to cause compatibility and information errors between the main program and subroutines, and between subroutines and subroutines. There are obstacles in the interaction ability, which leads to an increase in the failure rate of the progra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
CPCG06F11/3612
Inventor 邵瑛
Owner SHANGHAI TECHN INST OF ELECTRONICS & INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products