Security protection method and system for embedded operating system
An operating system and embedded technology, used in computer security devices, digital data protection, platform integrity maintenance, etc., can solve problems such as security loopholes, and achieve the effect of strengthening security protection capabilities
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038]The specific implementation manners of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific implementation manners described here are only used to illustrate and explain the embodiments of the present invention, and are not intended to limit the embodiments of the present invention.
[0039] figure 1 It is a schematic flow chart of the embedded operating system security protection method provided by the embodiment of the present invention, please refer to figure 1 , the security protection method of the embedded operating system may include the following steps:
[0040] Step S110: Load the operating system program package Secure OS onto the on-chip static random access memory SRAM through the secure loading module U-Boot, and start the Secure OS, wherein the U-Boot and the SRAM pass through the security firewall Protect.
[0041] figure 2 is a schematic dia...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


