Unlock instant, AI-driven research and patent intelligence for your innovation.

Security protection method and system for embedded operating system

An operating system and embedded technology, used in computer security devices, digital data protection, platform integrity maintenance, etc., can solve problems such as security loopholes, and achieve the effect of strengthening security protection capabilities

Active Publication Date: 2022-03-08
BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY +3
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This dedicated communication link has a security vulnerability that can be exploited by an attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method and system for embedded operating system
  • Security protection method and system for embedded operating system
  • Security protection method and system for embedded operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]The specific implementation manners of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific implementation manners described here are only used to illustrate and explain the embodiments of the present invention, and are not intended to limit the embodiments of the present invention.

[0039] figure 1 It is a schematic flow chart of the embedded operating system security protection method provided by the embodiment of the present invention, please refer to figure 1 , the security protection method of the embedded operating system may include the following steps:

[0040] Step S110: Load the operating system program package Secure OS onto the on-chip static random access memory SRAM through the secure loading module U-Boot, and start the Secure OS, wherein the U-Boot and the SRAM pass through the security firewall Protect.

[0041] figure 2 is a schematic dia...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a security protection method and system for an embedded operating system, which belong to the field of embedded technology. The safe protection method of the embedded operating system includes: loading the operating system program package Secure OS on the on-chip static random access memory SRAM by a safe loading module U-Boot, and starting the Secure OS, wherein the U-Boot and the SRAM is protected by a security firewall; and in the operation stage of the operating system, the security of the operating system and all components in the operating environment of the operating system is protected by the security firewall. In the booting / starting phase and running phase of the operating system, the security protection capability of the embedded operating system is strengthened through a security firewall.

Description

technical field [0001] The invention relates to the field of embedded technology, in particular to a safety protection method and system for an embedded operating system. Background technique [0002] Embedded system refers to a computer system embedded in a mechanical or electrical system, composed of software and hardware, capable of independent operation, specific and real-time. Embedded systems are widely used, involving mechanical control, aerospace, traffic management, environmental engineering and other fields; from small wireless handheld devices to large industrial automation equipment, embedded systems are used. For this reason, it is particularly important to ensure the security of embedded systems. Various security protocols and standards have solved some security problems to a certain extent, but more security performance is subject to the system architecture itself. Only by implementing defense deployment against various attacks within the system can the secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/60G06F21/64
CPCG06F21/575G06F21/602G06F21/64
Inventor 邹华李德建刘昱王于波吴志鹏谭浪
Owner BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY