Monitoring method of system monitoring module for safety protection
A system monitoring and security protection technology, applied in hardware monitoring, redundancy in computing, data error detection, response error generation, etc. , Precise effect of safety protection operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] A kind of monitoring method of the system monitoring module that is used for safety protection of this embodiment, refer to figure 1 , including the following monitoring steps:
[0028] S1. Device startup: firstly, start the security protection terminal equipment, and start the system monitoring module in the terminal equipment for security monitoring;
[0029] S2. Underlying hardware and driver detection: enable the system monitoring module to detect the underlying hardware of the device. If the detection finds that the hardware or driver is abnormal, the system will enter the abnormal mode, and at the same time mark the abnormality of the device by lighting up the device warning light;
[0030] S3, start each functional module: in the underlying hardware and driver detection of S2, if the detected hardware and driver are loaded normally, then the system normally starts each functional module to realize the normal operation of the device;
[0031] S4. Cyclic detection...
Embodiment 2
[0039] A kind of monitoring method of the system monitoring module that is used for safety protection of this embodiment, refer to figure 1 , including the following monitoring steps:
[0040] S1. Device startup: firstly, start the security protection terminal equipment, and start the system monitoring module in the terminal equipment for security monitoring;
[0041] S2. Underlying hardware and driver detection: enable the system monitoring module to detect the underlying hardware of the device. If the detection finds that the hardware or driver is abnormal, the system will enter the abnormal mode, and at the same time mark the abnormality of the device by lighting up the device warning light;
[0042] S3, start each functional module: in the underlying hardware and driver detection of S2, if the detected hardware and driver are loaded normally, then the system normally starts each functional module to realize the normal operation of the device;
[0043] S4. Cyclic detection...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
