Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification method for software upgrading of a security-critical system

A technology of system software and verification method, which is applied in the field of verification of safety-critical system software upgrades, to alleviate the contradiction of limited on-site test time and ensure quality

Active Publication Date: 2019-06-21
SHANGHAI ELECTRIC THALES TRANSPORTATION AUTOMATION SYST CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a verification method for safety-critical system software upgrades, which solves the contradiction between the limited time for on-site debugging of the operation system and the time requirements for on-site debugging of system software upgrades

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method for software upgrading of a security-critical system
  • Verification method for software upgrading of a security-critical system
  • Verification method for software upgrading of a security-critical system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described below in conjunction with accompanying drawing.

[0033] Redundancy provides system availability, that is, both systems A and B can perform the same task and achieve the same function. Under normal circumstances, system A works, and system B is always ready to take over from system A, but does not participate in the execution of the task. Once system A fails, system B immediately receives tasks to ensure that the system continues to operate normally.

[0034] The purpose of verification is to alleviate the security hazards caused by random failures. For the same task, arrange unit A1 and unit A2 with the same function to do it independently at the same time. After finishing, use the results calculated by units A1 and A2 to vote, and adopt the principle of minority obeying the majority. The measure of randomness is probability. From the perspective of probability, the probability of random failure of multiple units at th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verification method for software upgrading of a security-critical system. The verification method comprises the steps of expanding at least one newly-added computing unit from the hardware level; loading existing software into an existing computing unit in the redundancy unit, and loading to-be-upgraded software into a newly-added computing unit; enabling each existing calculation unit and the newly added calculation unit to perform calculation based on the same input; determining actual output according to the operation result of each existing calculation unit; comparing the operation result of the newly added calculation unit with the operation result of each existing calculation unit or the existing voting result generated by each operation result, and recording a comparison log; identifying expected behavior change of the existing software offline.According to the expected behavior change and the comparison log, judging whether the behavior of the newly-added computing unit conforms to the expectation or not. Therefore, the contradiction between the field debugging limited time of the operation system and the field debugging time requirement of systemsoftware upgrading is solved.

Description

technical field [0001] The invention relates to the field of software, in particular to a verification method for software upgrades of safety-critical systems of rail transit. Background technique [0002] Safety-related safety-critical systems have a zero-tolerance requirement for system failures, especially safety-related failures. The most important mission of a safety-critical system is to eliminate system failures. The source of system faults can be random failures caused by hardware random failures and systematic failures caused by system design or system implementation errors. [0003] For systemic failures, the current mainstream method is to control them through systems engineering and mathematical models. Systemic failures are difficult to eradicate for two main reasons: [0004] 1) There are differences between the system model and the real world. The process of building a model is a simplification of the real world under a specific perspective. [0005] 2) I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/14G06F8/658G06F11/36
Inventor 黄雷
Owner SHANGHAI ELECTRIC THALES TRANSPORTATION AUTOMATION SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products