Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Watchdog feeding method for embedded Linux equipment with anti-attack capability and driving module

A watchdog and embedded technology, which is applied in the field of watchdog feeding method and driver module of embedded Linux devices with anti-attack capabilities, can solve the problems of Internet of Things system paralysis, weak anti-attack capabilities, and loss of original functions of equipment, etc. question

Inactive Publication Date: 2020-06-05
ZHEJIANG WELLSUN INTELLIGENT TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are more and more attacks on embedded Linux devices in the Internet of Things. Attacks generally cause the devices to lose their original functions. When a large number of embedded Linux devices are deployed in the Internet of Things system, if the devices are attacked and malfunction, the technical If personnel cannot repair it in time, it will lead to the paralysis of the entire Internet of Things system, and the ability to prevent attacks is weak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Watchdog feeding method for embedded Linux equipment with anti-attack capability and driving module
  • Watchdog feeding method for embedded Linux equipment with anti-attack capability and driving module
  • Watchdog feeding method for embedded Linux equipment with anti-attack capability and driving module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0036] see figure 1 and figure 2 , the present invention provides a method for feeding a dog with an embedded Linux device watchdog with anti-attack capability, comprising:

[0037] S101. Initialize the hardware circuit of the watchdog, obtain the overflow time of the watchdog, and shield the function interface in the driving code.

[0038] Specifically, use the Linux kernel layer to initialize the watchdog hardware circuit, and obtain the overflow time of the watchdog, and simultaneously shield the function interface indirect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a watchdog feeding method for embedded Linux equipment with an anti-attack capability and a driving module. A watchdog comprises an initialization module, a dog feeding sub-module, a sub-module for inquiring whether a dog is fed or not, a dog feeding confirmation command receiving sub-module, a dog feeding confirmation command detection sub-module and an execution sub-module. The method comprises the steps: initializing watchdog hardware circuit, obtaining watchdog overflow time, shielding a function interface in the drive code; obtaining a counting variable and a firsttime interval, carrying out periodic dog feeding operation according to the first time interval, and sending a dog feeding command to an application program or not; and judging whether a dog feedingconfirmation command replied by the application program is received within a set second time interval, judging whether the value of the counting variable exceeds a set overtime number, and resetting and restarting the system by the watchdog when the watchdog overflow time is exceeded, so the anti-attack capability of the embedded Linux equipment in the Internet of Things is improved.

Description

technical field [0001] The invention relates to the technical field of embedded system security, in particular to a watchdog feeding method and a driving module of an embedded Linux device with anti-attack capability. Background technique [0002] With the development of the Internet of Things, the Linux system has become the most widely used operating system in embedded devices. There are more and more attacks on embedded Linux devices in the Internet of Things. Attacks generally cause the devices to lose their original functions. When a large number of embedded Linux devices are deployed in the Internet of Things system, if the devices are attacked and malfunction, the technical If personnel cannot repair it in time, the entire IoT system will be paralyzed, and the attack defense capability will be weak. Contents of the invention [0003] The object of the present invention is to provide a watchdog feeding method and a driver module for an embedded Linux device with ant...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/71G06F11/07
CPCG06F21/71G06F11/0757
Inventor 贾天有任获荣韩伟健邬永强李兆刚章为昆
Owner ZHEJIANG WELLSUN INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products