A bypass-based security monitoring method for resource-constrained terminal equipment
A terminal equipment and resource-limited technology, which is applied in the field of safety monitoring of resource-limited terminal equipment based on bypass, can solve problems such as resource limitation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0029] like figure 1 As shown, this embodiment provides a bypass-based resource-limited terminal device security monitoring method, including:
[0030] Step 1: abstractly express the terminal device D as a functional body composed of different functional blocks v connected. Functional block v refers to the basic functional module with actual physical, logical or cognitive meaning, and its meaning is the function it can realize. For terminal equipment, the meaning of function block is its design function. For example, the function of the sensor is perception, the function of the amplifier is signal amplification, the function of the filter is signal filtering, and the function of the CPU is program calculation, etc.
[0031] Step 2: Since the realization of the functions of the terminal equipment involves different forms at the same time, such as software and hardware, different functional blocks are further divided into physical domains D according to their existing forms p...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
