CN104318165A - Tailorable safety real-time embedded operating system - Google Patents

Tailorable safety real-time embedded operating system Download PDF

Info

Publication number
CN104318165A
CN104318165A CN201410616851.9A CN201410616851A CN104318165A CN 104318165 A CN104318165 A CN 104318165A CN 201410616851 A CN201410616851 A CN 201410616851A CN 104318165 A CN104318165 A CN 104318165A
Authority
CN
China
Prior art keywords
task
module
operating system
management module
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410616851.9A
Other languages
Chinese (zh)
Inventor
何宗彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Binhong Technology Co., Ltd.
Original Assignee
何宗彬
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 何宗彬 filed Critical 何宗彬
Priority to CN201410616851.9A priority Critical patent/CN104318165A/en
Publication of CN104318165A publication Critical patent/CN104318165A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention relates to a tailorable safety real-time embedded operating system. The system comprises a task management module, an interrupt management module, a memory management module, a message management module, an event management module, a semaphore module, an error management module, a timing management module, an application module, a file system module, a protocol stack module, an adaptive package component module and a display interface module, wherein the task management module, the interrupt management module, the error management module and the memory management module are tailorable parts in the operating system, and each of the other modules can be statically added or deleted according to application requirements. The operating system solves the problems of real-time property, safety and tailorability in design of the embedded operating system.

Description

A kind of can the real-time security embedded OS of cutting
Technical field
The present invention relates to a kind of can the real-time security embedded OS of cutting, belong to computer systems technology field.
Background technology
Embedded OS is widely used in all kinds of microprocessor, for whole soft and hardware Resourse Distribute, task scheduling, message distribution, commissioning, interface display etc. of whole embedded system.Embedded OS is at consumer electronic product, as mobile phone, TV, smart machine, and industrial equipment is even seen everywhere in military equipment and instrument, and along with the raising of electronics complexity and integrated level, the application of embedded OS can be more general.
The design of embedded OS, solve following technical matters:
1. real-time
The real-time of embedded OS, refers to that the operation of system has very strong determinacy on the one hand, must complete specific task, otherwise may have abnormal generation at the time point limited.Refer to that on the other hand to occur to event from event very short by the time responded, also namely operating system can make instant reaction to event.
2. security
The security threat of embedded OS is mainly from three aspects: the first distorting illegally to code; It two is robustness of operating system self, as the process of stack overflow, abnormal process and recovery, deadlock etc.; It three is operating system abilities to exception catching.
3. can cutting
Due to the diversity of embedded chip and embedded product, embedded OS must have the Scalability of height, thus can adapt to different application scenarioss.
At present, most typical embedded system generally forms by the mode of such as Fig. 1, the integrated circuit modules that it is core that the hardware of the bottom refers to the concrete chip of certain money or processor; Operating system is scheduler and the manager of whole embedded system; To drive and internet adapter software to provide to upper strata and chip and the relevant special interface of peripheral circuit thereof; Application layer software based on operating system and drive and internet adapter software achieve concrete sector application.Embedded real-time operating system main in the market has RTLinux, uc/OS, Vxworks, QNX, pSOS, OS/9, VRTX, eCOS etc.。
The present invention proposes a kind of typical embedded OS, solve face in Design of Embedded Operating System real-time, security and Scalability problem.
Summary of the invention
Provided by the invention a kind of can the real-time security embedded OS of cutting, it comprises task management module, interrupt management module, memory management module, message managing module, event manager module, semaphore module, fault management modules, time control module, application module, file system module, protocol stack module, adaptive package assembling module and display interface module, it is characterized in that, described task management module, interrupt management module, fault management modules, can not cutting part in operating system with memory management module, other modules all can need to carry out static interpolation or deletion according to described application module.
Further, as preferably, described task management module can the most basic unit be task in the real-time security embedded OS of cutting at this, and by the task management of operating system, multiple task concurrent running, alternately obtains CPU time;
Described interrupt management module makes external event responding and forwarding the administration module that user program starts execution to;
Described memory management module adopts the memory management mechanism of fixed memory block size, supports dynamic assigning memory, provides message internal memory pool managing mechanism;
Described message managing module is that each task comprises interrupt task or priority tasks, all have oneself a message queue, each task want by send message and another task and carry out communicating or synchronous before, first the task ID of object task need be known, then using the task ID of this object task as one of parameter, call as operating system provides the system sending message, message is sent in the message queue being specific to object task;
In described event manager module, event depends on task to be existed, the event flag of 32 bits is comprised in the control module of each task, each bit represents an event, the definition of high-order 16bit is retained by operating system inside, the content of low level 16bit is defined by the user, and a task can send one or more event to another task, needs the task ID of specifying object task during transmission;
Described semaphore module is used for the synchronous or mutual exclusion between task, but can not data be transmitted, semaphore is the entity existed independent of task, and each semaphore has oneself independently control structure, and the control structure of semaphore can be distributed by system when creating semaphore from Installed System Memory pond;
Described fault management modules can be overflowed and check the legitimacy of the opportunity of calling of the legitimacy of system call parameter, system call, caller, task stack, and to the reason of upper strata application report mistake;
Described time control module by being combined with the timing mechanism of hardware, for whole operating system provide the overall situation timing base;
The various requirement that described file system module stores for meeting data in system, and described file system is not placed in the kernel portion of operating system, but as the optional components of operating system;
Described protocol stack module shielding common protocol stack realize details, provide unified calling interface to developer;
Described adaptive package assembling module is used for providing unified routine call interface to original different operating system;
Described display interface module makes operating system export to user and show relevant information.
Further, as preferably, described can the real-time security embedded OS of cutting adopt based on event trigger can preemption scheduling design, when event occurs each time, go the highest task of searching system medium priority to perform by scheduler, ensure that the task that priority is the highest can meet with a response in the very first time.
Further, as preferably, described event comprises external interrupt, sends semaphore, sends message, timing is overflowed, initiatively switch, customer incident.
Further, as preferably, described the real-time security embedded OS of cutting independent stack design and centralized error handle mode can be adopted;
Described independent stack design is specially each task oneself independently task control block (TCB) and storehouse, is all the memory block distributed from Installed System Memory pond;
Further, as preferably, described centralized error handle mode refers to that all mistakes all can be taken over by operating system, and by the unified process of operating system, when mistake process certain application in occur after, apply and to dish out mistake to operating system nucleus, taken over by the error handling module of operating system, record and report error code, error reason information, then determine whether that returning application continues to perform according to the fatal error being whether a system, if there occurs a fatal error, then system will be taken over by error handling module completely, application can not be returned again perform.
Further, as preferably, described the real-time security embedded OS of cutting also can to comprise stack overflow and detect, at the bottom of the stack of the storehouse of each task, there is a fritter internal memory as the overflow checking mark of this task, when storehouse initialization, overflow indicator is initialized to a fixing numerical value, when the task switch that each generation is relevant to this task, comprise from another task switch to this task, from this task switch to other task, the value of this overflow indicator is checked by operating system, if changed, then report a fatal error to operating system, otherwise switch normally.
The frame design method of a kind of typical embedded OS that the present invention proposes, solve face in Design of Embedded Operating System real-time, security and Scalability problem.
Accompanying drawing explanation
Fig. 1 is typical embedded system composition.
Fig. 2 is the framework of embedded OS of the present invention.
Fig. 3 is Time Slice Circular Scheduling of the present invention.
Fig. 4 is the bit map of the priority fast query based on replacement response of the present invention.
Fig. 5 is independent storehouse diagram.
Fig. 6 is distributed error handle figure.
Fig. 7 is centralized error handle.
Fig. 8 is stack overflow detection figure.
Embodiment
The framework of the embedded OS designed by the present invention is as shown in Figure 2: it comprises task management module, interrupt management module, memory management module, message managing module, event manager module, semaphore module, fault management modules, time control module, application module, file system module, protocol stack module, adaptive package assembling module and display interface module, it is characterized in that, described task management module, interrupt management module, fault management modules, can not cutting part in operating system with memory management module, other modules all can carry out static interpolation or deletion according to the needs of application module.
Wherein, being described below to modules:
Task management: unit the most basic in embedded OS is task, by the task management of operating system, multiple task concurrent running, alternately obtains CPU time.
Interrupt management: external event is made and responds and forward the administration module that user program starts execution to.
Memory management: memory management module have employed the memory management mechanism of fixed memory block size, supports dynamic assigning memory, provides message internal memory pool managing mechanism.
Message management: each task (interrupt task or priority tasks) has oneself a message queue, each task want by send message and another task and carry out communicating or synchronous before, first the task ID of object task must be known, then using the task ID of this object task as one of parameter, the system call of the transmission message that call operation system provides is sent to message in the message queue being specific to object task.
Incident management: event depends on task to be existed, and comprise the event flag of 32 bits in the control module of each task, each bit represents an event.The definition of high-order 16bit is retained by operating system inside, and the content of low level 16bit is defined by the user.A task can send one or more event to another task, needs the task ID of specifying object task during transmission.
Semaphore: semaphore is a kind of intertask communication mainly for the protection of shared resource mechanism, it may be used for the synchronous or mutual exclusion between task, but can not transmit data.Semaphore is the entity existed independent of task, and each semaphore has oneself independently control structure, and the control structure of semaphore can be distributed by system when creating semaphore from Installed System Memory pond.
Mismanage: this module can check the legitimacy of the opportunity of calling of the legitimacy of system call parameter, system call, caller, task stack spilling etc., and to the reason of upper strata application report mistake.
Time control: this module by being combined with the timing mechanism of hardware, for whole operating system provide the overall situation timing base.
File system: this module is mainly used in meeting the various requirement that in system, data store.Different from the operating system of Linux mono-class, in the present invention, file system is not placed in the kernel portion of operating system, but as the optional components of operating system.
Protocol stack: this module shield common protocol stack realize details, provide unified calling interface to developer, make developer more can be absorbed in the exploitation of application itself.
Adaptive package assembling: this module is mainly used in providing unified routine call interface to original different operating system, thus accelerate the transplanting speed of user.
Display interface: make operating system export to user and show relevant information, as the Presentation Function on LCD.
The realization of operating system real-time provided by the invention is specially:
The principal element affecting embedded OS real-time has: task scheduling time, interrupt task response time.
Gordian technique for the task scheduling time has: the scheduling mechanism seized triggered based on event, based in the system of round-robin, each task temporally sheet gets the processor time, even if for mission critical distributes more timeslice, but still can not ensure that mission critical is responded timely, as shown in Figure 3.
The present invention adopts can design by preemption scheduling based on event triggering, in event occurs each time, go the highest task of searching system medium priority to perform by scheduler, thus ensure that the task that priority is the highest, namely mission critical can meet with a response to the very first time.Possible event has: external interrupt, transmission semaphore, transmission message, timing are overflowed, active switching, customer incident etc.The present invention is only based on the priority fast query of replacement response.Under the prerequisite taking into full account embedded OS complexity and scale, 32 task priorities can realize systemic-function completely.The present invention uses the replacement response of 32 bits to represent the task priority being in ready state, Bit31 set represents super objective priority 31 has task to be in ready state, Bit0 set represents minimum task priority 0 has task to be in ready state, and replacement response as shown in Figure 4.This replacement response is simply effective, only needs with signless 32 integer representations in the implementation, adds the operational order that collects fast, achieve task switch fast in systems in which.
For the realization of operating system security of the present invention, gordian technique for operating system security has: independent stack design, in the present invention, each task has oneself independently task control block (TCB) and storehouse, and they are all the memory blocks distributed from Installed System Memory pond, as shown in Figure 5.In addition, the present invention adopts centralized error handle mode, and embedded OS generally adopts distributed error handle mode, and namely in the entire system, where mistake occurs, and just where processes, as shown in Figure 6.And in the present invention, all mistakes all can be taken over by operating system, and by the unified process of operating system, as shown in Figure 7.
When mistake process certain application in occur after, apply and to dish out mistake to operating system nucleus, taken over by the error handling module of operating system, according to the fatal error being whether a system, record and report the information such as error code, error reason, then determines whether that returning application continues to perform.If there occurs a fatal error, then system will be taken over by error handling module completely, can not return application again and perform.This centralized error handling mechanism, makes the mistake of operating system be more prone to location, enhances the security of operating system.
In addition, the present invention adopts stack overflow to detect, and at the bottom of the stack of the storehouse of each task, has a fritter internal memory as the overflow checking mark of this task, as shown in Figure 8.When storehouse initialization, overflow indicator is initialized to a fixing numerical value, when the task switch that each generation is relevant to this task, comprise from another task switch to this task, from this task switch to other task, checked the value of this overflow indicator by operating system, if changed, then report a fatal error to operating system, otherwise switch normally.
For the realization of operating system Scalability of the present invention, as can be seen from the framework of Fig. 2 embedded OS, embedded operation in the present invention is made up of multiple module, wherein, task management, interrupt management, mismanage, memory management are can not cutting part in operating system, and other module all can need carry out static interpolation or deletion according to application.In the present invention, the realization of Scalability mainly realizes based on the compiling configuration file of an operating system Support Library.In configuration file, indicate whether to support a certain function with compiling macro, as:
#define OS_SUPPORT_FS 1
By supporting document system in the Support Library then generated in compiling, otherwise not supporting document systemic-function.
Above embodiment is only for illustration of the present invention; and be not limitation of the present invention; the those of ordinary skill of relevant technical field; without departing from the spirit and scope of the present invention; can also make a variety of changes and modification; therefore all equivalent technical schemes also belong to category of the present invention, and scope of patent protection of the present invention should be defined by the claims.

Claims (6)

1. one kind can the real-time security embedded OS of cutting, it comprises task management module, interrupt management module, memory management module, message managing module, event manager module, semaphore module, fault management modules, time control module, application module, file system module, protocol stack module, adaptive package assembling module and display interface module, it is characterized in that, described task management module, interrupt management module, fault management modules, can not cutting part in operating system with memory management module, other modules all can need to carry out static interpolation or deletion according to described application module.
2. according to claim 1 a kind of can the real-time security embedded OS of cutting, it is characterized in that, described task management module can the most basic unit be task in the real-time security embedded OS of cutting at this, by the task management of operating system, multiple task concurrent running, alternately obtains CPU time;
Described interrupt management module makes external event responding and forwarding the administration module that user program starts execution to;
Described memory management module adopts the memory management mechanism of fixed memory block size, supports dynamic assigning memory, provides message internal memory pool managing mechanism;
Described message managing module is that each task comprises interrupt task or priority tasks, all have oneself a message queue, each task want by send message and another task and carry out communicating or synchronous before, first the task ID of object task need be known, then using the task ID of this object task as one of parameter, call as operating system provides the system sending message, message is sent in the message queue being specific to object task;
In described event manager module, event depends on task to be existed, the event flag of 32 bits is comprised in the control module of each task, each bit represents an event, the definition of high-order 16bit is retained by operating system inside, the content of low level 16bit is defined by the user, and a task can send one or more event to another task, needs the task ID of specifying object task during transmission;
Described semaphore module is used for the synchronous or mutual exclusion between task, but can not data be transmitted, semaphore is the entity existed independent of task, and each semaphore has oneself independently control structure, and the control structure of semaphore can be distributed by system when creating semaphore from Installed System Memory pond;
Described fault management modules can be overflowed and check the legitimacy of the opportunity of calling of the legitimacy of system call parameter, system call, caller, task stack, and to the reason of upper strata application report mistake;
Described time control module by being combined with the timing mechanism of hardware, for whole operating system provide the overall situation timing base;
The various requirement that described file system module stores for meeting data in system, and described file system is not placed in the kernel portion of operating system, but as the optional components of operating system;
Described protocol stack module shielding common protocol stack realize details, provide unified calling interface to developer;
Described adaptive package assembling module is used for providing unified routine call interface to original different operating system;
Described display interface module makes operating system export to user and show relevant information.
3. according to claim 1 a kind of can the real-time security embedded OS of cutting, it is characterized in that, described can the real-time security embedded OS of cutting adopt based on event trigger can preemption scheduling design, when event occurs each time, go the highest task of searching system medium priority to perform by scheduler, ensure that the task that priority is the highest can meet with a response in the very first time.
4. according to claim 3 a kind of can the real-time security embedded OS of cutting, it is characterized in that, described event comprises external interrupt, sends semaphore, sends message, timing is overflowed, initiatively switch, customer incident.
5. according to claim 2 a kind of can the real-time security embedded OS of cutting, it is characterized in that, described the real-time security embedded OS of cutting can adopt independent stack design and centralized error handle mode;
Described independent stack design is specially each task oneself independently task control block (TCB) and storehouse, is all the memory block distributed from Installed System Memory pond;
Described centralized error handle mode refers to that all mistakes all can be taken over by operating system, and by the unified process of operating system, when mistake process certain application in occur after, apply and to dish out mistake to operating system nucleus, taken over by the error handling module of operating system, record and report error code, error reason information, then determine whether that returning application continues to perform according to the fatal error being whether a system, if there occurs a fatal error, then system will be taken over by error handling module completely, can not return application again and perform.
6. according to claim 5 a kind of can the real-time security embedded OS of cutting, it is characterized in that, described the real-time security embedded OS of cutting also can to comprise stack overflow and detect, at the bottom of the stack of the storehouse of each task, there is a fritter internal memory as the overflow checking mark of this task, when storehouse initialization, overflow indicator is initialized to a fixing numerical value, when the task switch that each generation is relevant to this task, comprise from another task switch to this task, from this task switch to other task, the value of this overflow indicator is checked by operating system, if changed, then report a fatal error to operating system, otherwise switch normally.
CN201410616851.9A 2014-11-05 2014-11-05 Tailorable safety real-time embedded operating system Pending CN104318165A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410616851.9A CN104318165A (en) 2014-11-05 2014-11-05 Tailorable safety real-time embedded operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410616851.9A CN104318165A (en) 2014-11-05 2014-11-05 Tailorable safety real-time embedded operating system

Publications (1)

Publication Number Publication Date
CN104318165A true CN104318165A (en) 2015-01-28

Family

ID=52373396

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410616851.9A Pending CN104318165A (en) 2014-11-05 2014-11-05 Tailorable safety real-time embedded operating system

Country Status (1)

Country Link
CN (1) CN104318165A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106339297A (en) * 2016-09-14 2017-01-18 郑州云海信息技术有限公司 Method and system for warning failures of storage system in real time
CN109819674A (en) * 2017-09-21 2019-05-28 深圳市汇顶科技股份有限公司 Computer storage medium, embedded dispatching method and system
CN111241537A (en) * 2019-12-23 2020-06-05 北京元心科技有限公司 Task stack overflow detection method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060063270A (en) * 2004-12-07 2006-06-12 한국전자통신연구원 Apparatus and method for configuring linux kernel and application program
CN1312605C (en) * 2003-08-18 2007-04-25 刘恒春 Network control platfom in embedded type modular construction based on communication under multiple protocols
US20070101424A1 (en) * 2005-07-25 2007-05-03 Nec Laboratories America, Inc. Apparatus and Method for Improving Security of a Bus Based System Through Communication Architecture Enhancements
CN102662670A (en) * 2012-04-05 2012-09-12 林添孝 Implementation method of scene type kernel-free embedded real-time operating system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1312605C (en) * 2003-08-18 2007-04-25 刘恒春 Network control platfom in embedded type modular construction based on communication under multiple protocols
KR20060063270A (en) * 2004-12-07 2006-06-12 한국전자통신연구원 Apparatus and method for configuring linux kernel and application program
US20070101424A1 (en) * 2005-07-25 2007-05-03 Nec Laboratories America, Inc. Apparatus and Method for Improving Security of a Bus Based System Through Communication Architecture Enhancements
CN102662670A (en) * 2012-04-05 2012-09-12 林添孝 Implementation method of scene type kernel-free embedded real-time operating system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
唐平: "AUTOSAR OS的设计与实现以及向TMS470移植", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
罗炜: "嵌入式实时操作***关键技术的研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
胡晓辉: "嵌入式***开发平台—核心层的设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106339297A (en) * 2016-09-14 2017-01-18 郑州云海信息技术有限公司 Method and system for warning failures of storage system in real time
CN106339297B (en) * 2016-09-14 2020-10-02 郑州云海信息技术有限公司 Method and system for real-time alarming of storage system fault
CN109819674A (en) * 2017-09-21 2019-05-28 深圳市汇顶科技股份有限公司 Computer storage medium, embedded dispatching method and system
CN109819674B (en) * 2017-09-21 2022-04-26 深圳市汇顶科技股份有限公司 Computer storage medium, embedded scheduling method and system
CN111241537A (en) * 2019-12-23 2020-06-05 北京元心科技有限公司 Task stack overflow detection method and system

Similar Documents

Publication Publication Date Title
JP6383518B2 (en) Virtual machine monitor and virtual machine monitor scheduling method
CN109565515B (en) System, apparatus, and process for dynamic tenant fabric adjustment in a distributed resource management system
US9298484B2 (en) Encapsulation of an application for virtualization
CN104205109B (en) The worker process of continuation and elasticity
EP3183651B1 (en) Equitable sharing of system resources in workflow execution
CN103493010A (en) Cross-environment event notification
JP7170768B2 (en) Development machine operation task processing method, electronic device, computer readable storage medium and computer program
CN102262564A (en) Thread pool structure of video monitoring platform system and realizing method
GB2496027A (en) Event prediction and preemptive action for a networked computing environment
CN104102548A (en) Task resource scheduling processing method and task resource scheduling processing system
CN112104723A (en) Multi-cluster data processing system and method
CN104318165A (en) Tailorable safety real-time embedded operating system
CN116088716B (en) Window management method and terminal equipment
Guan et al. A multi-layered scheme for distributed simulations on the cloud environment
CN115686805A (en) GPU resource sharing method and device, and GPU resource sharing scheduling method and device
CN113010265A (en) Pod scheduling method, scheduler, memory plug-in and system
CN114625533A (en) Distributed task scheduling method and device, electronic equipment and storage medium
CN101971144A (en) System resource influenced staged shutdown
US10642713B1 (en) Object-based monitoring and remediation system
US10061676B2 (en) Remotely located timing method and device for a processing unit in an information processing system
CN109445959A (en) A kind of sensing data processing real time operating system
CN111209079A (en) Scheduling method, device and medium based on Roc processor
CN110941503A (en) Fault processing method and device and electronic equipment
CN109343976A (en) A kind of single task real-time Message Passing operating system
Friedrich et al. A Review of Operating System Infrastructure for Real-Time Embedded Software

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
DD01 Delivery of document by public notice

Addressee: He Zongbin

Document name: Notification of Publication and of Entering the Substantive Examination Stage of the Application for Invention

ASS Succession or assignment of patent right

Owner name: CHENGDU BINHONG TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: HE ZONGBIN

Effective date: 20150407

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20150407

Address after: Jintai high tech Zone of Chengdu City, Sichuan province 610041 No. 18 Building No. 2403 Taiyue 5

Applicant after: Chengdu Binhong Technology Co., Ltd.

Address before: High tech Zone Jintai Road Chengdu City, Sichuan province 610041 Taiyue 5 Building No. 2403 No. 18

Applicant before: He Zongbin

DD01 Delivery of document by public notice

Addressee: He Zongbin

Document name: Notification that Application Deemed not to be Proposed

DD01 Delivery of document by public notice

Addressee: He Zongbin

Document name: Notification of Passing Examination on Formalities

DD01 Delivery of document by public notice

Addressee: Chengdu Binhong Technology Co., Ltd.

Document name: Notification of Passing Examination on Formalities

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150128