Method for building embedded secure operation systems for electric control
A security operating system and operating system technology, applied in the field of computer software and hardware design, can solve problems such as the inability to meet the security requirements of the power field and the limited security protection capability of the embedded operating system, and achieve the effect of improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0012] The embedded safety operating system building method for power control of the present invention, described method comprises the following steps:
[0013] The first step is to introduce a security mechanism for the embedded operating system. In the general embedded operating system design, due to the limited hardware resources and the characteristics of application requirements, the design of security is often seldom considered; but as embedded The wide application of the system, especially the development of network technology, makes the security of the embedded system increasingly threatened; based on the B-level standard, the target system is designed;
[0014] The second step is to explore the development method of the embedded security operating system. There is a big difference between the general operating system and the embedded operating system. Therefore, in the process of designing and developing the embedded security operating system, the general security Ins...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More