A high-security computer system based on lockstep and monitoring and its design method

A computer system, high-security technology, applied to the generation of response errors, error detection of redundant data in hardware, etc., can solve the problems of undetectable common mode faults, coarse contrast granularity, undetectable errors, etc., to achieve The effect of solving speed mismatch, reducing time and improving safety

Active Publication Date: 2022-07-08
NORTHWESTERN POLYTECHNICAL UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are also certain problems: there is no comparison operation for the memory read from the same source, and errors caused by memory failures cannot be detected; dual-cores use the same architecture, and common-mode failures that occur probabilistically cannot be detected; only when the system outputs Lockstep, coarser granularity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A high-security computer system based on lockstep and monitoring and its design method
  • A high-security computer system based on lockstep and monitoring and its design method
  • A high-security computer system based on lockstep and monitoring and its design method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0033] In order to make those skilled in the art better understand the present invention, the present invention will be further explained below with reference to the accompanying drawings and in conjunction with the implementation process. It should be noted that the implementation process is only used to explain the invention, and is not used to limit the invention.

[0034] A high-security computer system based on lockstep plus monitoring, comprising a lockstep module and a monitoring module, wherein the lockstep module comprises a No. 1 processor, a No. 2 processor, a No. 1 memory, a No. 2 memory, a processor synchronization device, A memory synchronizing device and a lock-step unit, the monitoring module includes a dissimilar processor that adopts a different instruction set from the lock-step module, a No. 3 memory and a monitoring unit.

[0035]I...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a high-security computer system based on lock-step and monitoring and a design method thereof. When the processor performs a read operation, the dual processors respectively read data from the same address of the two memories and compare them. If the comparison is correct, the data is sent to the corresponding processor. If the comparison is wrong, the fault handling operation is performed; the comparison module for monitoring and lockstep is set up, and the checkpoint output is added to the load. When the checkpoint arrives, the cross comparison is performed. If the comparison is correct, the system is based on operation; if the comparison is incorrect, the troubleshooting operation is performed. The invention realizes fault detection and location at the instruction level, greatly reduces system faults caused by random faults in the memory, improves the detection rate of the dual-processor common-mode faults of the lockstep module, and further improves the safety of the entire system, effectively It solves the problem that the running speed of dissimilar processors does not match, and reduces the busy waiting time of the monitoring unit.

Description

technical field [0001] The invention relates to the field of computer architecture, in particular to a high-security computer system and a design method thereof. Background technique [0002] With the development of computer control technology, automatic control has penetrated into all fields of production and life. In aviation, aerospace and other high safety-critical fields, there are extremely high safety requirements for computer control systems. The traditional method to improve security is to construct a redundant system, in which the failure of a single module does not cause the failure of the entire system. However, while the redundancy system improves the system security, it also increases the system scale and management cost. Therefore, in systems that are relatively sensitive to volume and weight, the redundancy scale cannot be increased indefinitely. [0003] In order to solve the bottleneck problem of the number of redundant systems, lockstep technology is pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/07G06F11/16
Inventor 朱怡安杨淏天李联
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products