Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure storage method and system suitable for embedded real-time operating system

A real-time operating system and embedded system technology, applied in the computer field, can solve the problems of embedded real-time systems that cannot meet performance requirements, affect system performance, and low portability, so as to improve development efficiency, high flexibility, and reduce development cost effect

Pending Publication Date: 2020-02-21
上海华元创信软件有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This mode needs to rely on the implementation of the file system. For file systems of different formats, the portability is not high, and the encryption and decryption of the entire file system is a heavy burden on the system, which affects system performance. It cannot be applied to embedded systems with high performance requirements. real time system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure storage method and system suitable for embedded real-time operating system
  • Secure storage method and system suitable for embedded real-time operating system
  • Secure storage method and system suitable for embedded real-time operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0065] Take an embedded real-time operating system whose storage device is a SATA hard disk and whose file system is FAT as an example. Users or applications first configure secure storage parameters, including bearer device information (SATA), storage capacity (such as 10M), number of virtual disks, encryption and decryption algorithms (such as DES), key specifications, etc. Add the secure storage into the embedded operating system, start the system, and initialize the secure storage module for the first time.

[0066] During the initial initialization, parameter checks or system resource checks will be performed. If the parameters are illegal, the free capacity of the bearer device is insufficient or cannot be accessed, the creation of the secure storage area will fail, otherwise the creation will succeed. After the virtual disk is successfully created, register it with the I / O subsystem as a block device, write basic information, keys and other security information, and mou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secure storage method and system suitable for an embedded real-time operating system. The method comprises the steps that a file is created in a file system of the embedded system, the created file is abstracted into a virtual disk, the file serves as a storage entity of the virtual disk, the virtual disk is registered to an I / O subsystem of an operating system, and a safestorage area is finally formed after safety information injection, formatting, file system mounting and other processing are conducted; files or data written into the secure storage area are stored into the virtual disk after being encrypted according to the mapping relation between the secure storage area and the virtual disk; through the mapping relationship between the secure storage area andthe virtual disk, the read secure storage area file or data is taken out from the virtual disk and is obtained after decryption processing; and the secure storage area is cancelled, the virtual disk is deleted and the physical space is released. According to the method, the information security of the embedded real-time operating system is improved, the portability is better, the development costcan be reduced, and the development efficiency is improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a safe storage method and system suitable for an embedded real-time operating system. Background technique [0002] Embedded operating systems have developed rapidly in recent years and are widely used. More and more important information is stored in embedded systems, and the issue of information security is particularly important. If important information is not protected, huge losses may be caused in the event of loss of storage devices, illegal attacks or other situations. [0003] The data storage function of the embedded operating system itself does not have security. When users and applications access data, they read and write files by calling the standard C library or the file operation interface of the I / O subsystem. The operating system passes through the file system and I / O system, and finally calls the device driver for data access. The hardware control layer Prov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F16/188G06F16/13G06F16/16
CPCG06F21/6218G06F16/188G06F16/13G06F16/162
Inventor 钱晨艾婧媚李双全邱明
Owner 上海华元创信软件有限公司