Two-out-of-three security computer platform based on cloud computing

A security computer and cloud computing technology, applied in the direction of calculation, generation of response errors, and redundancy in hardware for data error detection, etc. , to achieve the effect of easy migration and deployment

Pending Publication Date: 2021-07-16
BEIJING JIAOTONG UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1) The increase in the cost of the number of boards or hosts caused by the redundant design concept
[0007] Germany's SIEMENS SICAS system based on a three-out-of-two structure and French Thales' SelTrac system based on a three-out-of-two structure both include safety computers based on redundant design concepts, and the multi-channel redundant design will inevitably cause boards or hosts to The number has doubled, resulting in a complete set of security computer equipment occupying one or more cabinets
[0008] 2) The board and software are bound, hardware and software failures can lead to the failure of the safety computer function
The physical failure of each module increases the probability of failure of the secure computer function
[0010] 3) Maintenance and replacement cause interruption of application services
[0011] Secure computer platform hardware has a certain mean time between failures, i.e., a finite useful life
Once the equipment fails or the hardware is aging, the time required for maintenance and updating will inevitably cause some functions of the security computer to fail, resulting in the interruption of application services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-out-of-three security computer platform based on cloud computing
  • Two-out-of-three security computer platform based on cloud computing
  • Two-out-of-three security computer platform based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0052] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be understoo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a two-out-of-three security computer platform based on cloud computing. The platform comprises a cloud management center, a service node, a security computer virtualization container and a physical infrastructure from top to bottom; and the number of the cloud management center is one, the service nodes are hosts, the cloud management center carries out signaling and data communication with the three hosts, the hosts correspond to the security computer virtualization containers one to one, the security computer virtualization containers correspond to the physical infrastructures one to one, the hosts carry out data communication with the corresponding security computer virtualization containers, and a secure computer virtualization container is in data communication with a corresponding physical infrastructure. The application and operation environment is packaged in a containerization mode, light in weight and easy to migrate and deploy; the distributed cloud management center realizes real-time monitoring, resource scheduling, platform self-diagnosis, immediate fault recovery and inheriting of historical variables and state data on lower-layer physical service nodes; and the platform provides basic functions of the 2-out-of-3 secure computer and can also be used for developing peripheral applications.

Description

technical field [0001] The invention relates to the technical field of secure computers, in particular to a cloud computing-based 3 out of 2 secure computer platform. Background technique [0002] Security computer technology is involved in rail transportation, aerospace and other fields. This technology is used to ensure the correctness of equipment or application input, output, and intermediate state, and multi-mode redundancy is often used. [0003] In the field of rail transit, both ground equipment and on-board equipment are composed of safety computers. When the equipment causes an emergency failure due to physical reasons or other reasons, it is necessary to design another system or emergency treatment plan to record the failure status in time and restore the safety of the equipment, that is, the fail-safe principle must be followed: the system state can lead to safety when a failure occurs. [0004] In terms of architecture design, the internal architecture of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/20G06F11/16
CPCG06F11/203G06F11/2028G06F11/2035G06F11/1675G06F11/165G06F11/1633
Inventor 唐涛朱力李松王悉王洪伟
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products