CN111562999A - Watchdog data processing method and device based on configurable protection mechanism - Google Patents

Watchdog data processing method and device based on configurable protection mechanism Download PDF

Info

Publication number
CN111562999A
CN111562999A CN202010342614.3A CN202010342614A CN111562999A CN 111562999 A CN111562999 A CN 111562999A CN 202010342614 A CN202010342614 A CN 202010342614A CN 111562999 A CN111562999 A CN 111562999A
Authority
CN
China
Prior art keywords
watchdog
key data
data processing
configuration
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010342614.3A
Other languages
Chinese (zh)
Inventor
甘焱林
许建国
张梦楠
邹福
邱圣辉
曹卫
张善伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anchuang Ecological Technology Shenzhen Co ltd
Original Assignee
Anchuang Ecological Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anchuang Ecological Technology Shenzhen Co ltd filed Critical Anchuang Ecological Technology Shenzhen Co ltd
Priority to CN202010342614.3A priority Critical patent/CN111562999A/en
Publication of CN111562999A publication Critical patent/CN111562999A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0751Error or fault detection not based on redundancy
    • G06F11/0754Error or fault detection not based on redundancy by exceeding limits
    • G06F11/0757Error or fault detection not based on redundancy by exceeding limits by exceeding a time limit, i.e. time-out, e.g. watchdogs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application provides a watchdog data processing method and device based on a configurable protection mechanism, wherein the method comprises the following steps: writing key data into the watchdog protection register and closing the access protection function; acquiring the right of configuring the watchdog, and configuring the watchdog; after the configuration is completed, writing the key data again and opening an access protection function; the method and the device can effectively avoid the false configuration of the watchdog by the user and avoid partial malicious configuration operation.

Description

Watchdog data processing method and device based on configurable protection mechanism
Technical Field
The application relates to the technical field of computers, in particular to a watchdog data processing method and device based on a configurable protection mechanism.
Background
A watchdog, also known as watchdog, is essentially a timer circuit. In IC design, a watchdog ip is generally designed and used to monitor core processing devices, such as general purpose processors or special purpose processors, to prevent these devices from causing system failure due to software and hardware anomalies during the operation of the chip.
In order to avoid that the whole system cannot normally operate and respond to an external instruction due to the fact that software and hardware of the system are abnormal, the watchdog can initiate operation of system reset in self-contained overtime, the system reset can forcibly reset a hung-up processor and related equipment, and sometimes, the whole chip can be directly reset.
If the watchdog has an error or a wrong configuration in the normally operating system, the false reset of the whole system may be caused, and the normal operation of the whole chip and the product may be adversely affected. Therefore, we need to add some protection when designing the IP. The current methods are:
1. adding an always mode, namely the watchdog works all the time after the system is reset and cannot be closed;
2. feeding dogs in a mode of writing a specific value to avoid wrong dog feeding operation;
the inventor finds that, under the two operations in the prior art, other registers inside the watchdog are all open to the system, and malicious configuration of the watchdog cannot be avoided, so that when software performs incorrect configuration on the watchdog, effective protection is not performed on the watchdog, and thus irreversible failure of the system may be caused by an error of the watchdog.
Disclosure of Invention
Aiming at the problems in the prior art, the application provides a watchdog data processing method and device based on a configurable protection mechanism, which can effectively avoid the false configuration of a user on a watchdog and avoid partial malicious configuration operation.
In order to solve at least one of the above problems, the present application provides the following technical solutions:
in a first aspect, the present application provides a watchdog data processing method based on a configurable protection mechanism, including:
writing key data into the watchdog protection register and closing the access protection function;
acquiring the right of configuring the watchdog, and configuring the watchdog;
and after the configuration is completed, writing the key data again and opening the access protection function.
Further, the writing of key data to the watchdog protection register and the closing of the access protection function further includes:
and judging whether the key data is correct or not, if the key data is in error, denying access, and feeding back an abnormal state according to preset configuration.
Further, the rewriting of the key data and the opening of the access protection function further includes:
and judging whether the key data is correct or not, if the key data is in error, denying access, and feeding back an abnormal state according to preset configuration.
Further, still include:
and if the watchdog is configured to be in a dog feeding operation or an interruption clearing operation, directly issuing the right for configuring the watchdog and executing the corresponding operation.
In a second aspect, the present application provides a watchdog data processing apparatus based on a configurable protection mechanism, including:
the key writing module is used for writing key data into the watchdog protection register and closing the access protection function;
the right acquisition module is used for acquiring the right for configuring the watchdog and configuring the watchdog;
and the configuration completion module is used for writing the key data again and opening the access protection function after the configuration is completed.
Further, the key writing module includes:
and the first abnormal feedback unit is used for judging whether the key data is correct or not, refusing access if the key data is in error, and feeding back an abnormal state according to preset configuration.
Further, the configuration completion module includes:
and the second abnormal feedback unit is used for judging whether the key data is correct or not, refusing access if the key data is in error, and feeding back an abnormal state according to preset configuration.
Further, still include:
and the direct execution unit is used for directly issuing the right for configuring the watchdog and executing corresponding operation if the watchdog is configured to be the watchdog feeding operation or the interrupt clearing operation.
In a third aspect, the present application provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the watchdog data processing method based on the configurable protection mechanism when executing the program.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the watchdog data processing method based on a configurable protection mechanism.
According to the technical scheme, the watchdog data processing method and device based on the configurable protection mechanism are provided, and key data are written into the watchdog protection register and the access protection function is closed; acquiring the right of configuring the watchdog, and configuring the watchdog; after the configuration is completed, the key data is written again and the access protection function is opened, and the wrong configuration of the system can be avoided through the identification access process of the access control logic, and meanwhile, the malicious configuration of a non-software system developer can also be avoided. Meanwhile, through the logic, the watchdog can identify the configured state, data updating in the configuration stage is avoided, information refreshing in an IP (Internet protocol) in the configuration data updating process is avoided, and the risk of error of the internal logic of the watchdog is further reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a watchdog data processing method based on a configurable protection mechanism in an embodiment of the present application;
FIG. 2 is a block diagram of a watchdog data processing apparatus based on a configurable protection mechanism according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Considering that other registers inside the watchdog in the prior art are all open to the system and cannot avoid malicious configuration of the watchdog, so that when software performs error configuration on the watchdog, the watchdog is not effectively protected, and the problem of system irreversible failure possibly caused by the error of the watchdog is solved, the application provides a watchdog data processing method and device based on a configurable protection mechanism, and key data are written into a watchdog protection register and an access protection function is closed; acquiring the right of configuring the watchdog, and configuring the watchdog; after the configuration is completed, the key data is written again and the access protection function is opened, and the wrong configuration of the system can be avoided through the identification access process of the access control logic, and meanwhile, the malicious configuration of a non-software system developer can also be avoided. Meanwhile, through the logic, the watchdog can identify the configured state, data updating in the configuration stage is avoided, information refreshing in an IP (Internet protocol) in the configuration data updating process is avoided, and the risk of error of the internal logic of the watchdog is further reduced.
In order to effectively avoid the user from performing false configuration on the watchdog and avoid a part of malicious configuration operations, the present application provides an embodiment of a watchdog data processing method based on a configurable protection mechanism, and referring to fig. 1, the watchdog data processing method based on the configurable protection mechanism specifically includes the following contents:
step S101: writing key data into the watchdog protection register and closing the access protection function;
step S102: acquiring the right of configuring the watchdog, and configuring the watchdog;
step S103: and after the configuration is completed, writing the key data again and opening the access protection function.
As can be seen from the above description, the watchdog data processing method based on the configurable protection mechanism provided in the embodiment of the present application can write key data into the watchdog protection register and close the access protection function; acquiring the right of configuring the watchdog, and configuring the watchdog; after the configuration is completed, the key data is written again and the access protection function is opened, and the wrong configuration of the system can be avoided through the identification access process of the access control logic, and meanwhile, the malicious configuration of a non-software system developer can also be avoided. Meanwhile, through the logic, the watchdog can identify the configured state, data updating in the configuration stage is avoided, information refreshing in an IP (Internet protocol) in the configuration data updating process is avoided, and the risk of error of the internal logic of the watchdog is further reduced.
In an embodiment of the watchdog data processing method based on the configurable protection mechanism, the step S101 may further specifically include the following:
and judging whether the key data is correct or not, if the key data is in error, denying access, and feeding back an abnormal state according to preset configuration.
Optionally, on the chip, when the Watchdog needs to be configured, the access protection needs to be closed correctly by writing specific data (i.e. a key) into the Watchdog protection register, and when the data is written incorrectly, the access is denied, and an exception state (configurable: interrupt, bus exception, system reset, no feedback) can be fed back to the system according to the configuration.
In an embodiment of the watchdog data processing method based on the configurable protection mechanism, the step S103 may further include the following steps:
and judging whether the key data is correct or not, if the key data is in error, denying access, and feeding back an abnormal state according to preset configuration.
Optionally, after the configuration is completed, the access protection function can be opened again; at this time, if the abnormal access occurs again, the Watchdog feeds back the abnormal state to the system according to the configuration.
In an embodiment of the watchdog data processing method based on the configurable protection mechanism, the following may be specifically included:
and if the watchdog is configured to be in a dog feeding operation or an interruption clearing operation, directly issuing the right for configuring the watchdog and executing the corresponding operation.
Optionally, in order to maintain compatibility, the dog feeding operation and the interrupt clearing operation are not limited by the access protection logic, and the correct dog feeding and interrupt clearing operations can be directly performed.
In order to effectively avoid the user from performing an incorrect configuration on the watchdog and from performing a partial malicious configuration operation, the present application provides an embodiment of a configurable protection mechanism-based watchdog data processing apparatus for implementing all or part of the contents of the configurable protection mechanism-based watchdog data processing method, and referring to fig. 2, the configurable protection mechanism-based watchdog data processing apparatus specifically includes the following contents:
a key writing module 10, configured to write key data into the watchdog protection register and close the access protection function;
an authority obtaining module 20, configured to obtain an authority for configuring the watchdog, and configure the watchdog;
and a configuration completion module 30, configured to write the key data again and open the access protection function after the configuration is completed.
As can be seen from the foregoing description, the watchdog data processing apparatus based on the configurable protection mechanism according to the embodiment of the present application can write key data into the watchdog protection register and close the access protection function; acquiring the right of configuring the watchdog, and configuring the watchdog; after the configuration is completed, the key data is written again and the access protection function is opened, and the wrong configuration of the system can be avoided through the identification access process of the access control logic, and meanwhile, the malicious configuration of a non-software system developer can also be avoided. Meanwhile, through the logic, the watchdog can identify the configured state, data updating in the configuration stage is avoided, information refreshing in an IP (Internet protocol) in the configuration data updating process is avoided, and the risk of error of the internal logic of the watchdog is further reduced.
In an embodiment of the watchdog data processing apparatus based on configurable protection mechanism of the present application, the key writing module 10 includes:
and the first abnormal feedback unit is used for judging whether the key data is correct or not, refusing access if the key data is in error, and feeding back an abnormal state according to preset configuration.
In an embodiment of the watchdog data processing apparatus based on the configurable protection mechanism of the present application, the configuration completion module 30 includes:
and the second abnormal feedback unit is used for judging whether the key data is correct or not, refusing access if the key data is in error, and feeding back an abnormal state according to preset configuration.
In an embodiment of the watchdog data processing apparatus based on the configurable protection mechanism, the following is further specifically included:
and the direct execution unit is used for directly issuing the right for configuring the watchdog and executing corresponding operation if the watchdog is configured to be the watchdog feeding operation or the interrupt clearing operation.
In terms of hardware, in order to effectively avoid the user from performing an incorrect configuration on the watchdog and from performing a partial malicious configuration operation, the present application provides an embodiment of an electronic device for implementing all or part of the contents in the configurable protection mechanism-based watchdog data processing method, where the electronic device specifically includes the following contents:
a processor (processor), a memory (memory), a communication Interface (Communications Interface), and a bus; the processor, the memory and the communication interface complete mutual communication through the bus; the communication interface is used for realizing information transmission between the watchdog data processing device based on the configurable protection mechanism and relevant equipment such as a core service system, a user terminal, a relevant database and the like; the logic controller may be a desktop computer, a tablet computer, a mobile terminal, and the like, but the embodiment is not limited thereto. In this embodiment, the logic controller may refer to an embodiment of the watchdog data processing method based on the configurable protection mechanism and an embodiment of the watchdog data processing apparatus based on the configurable protection mechanism in the embodiment for implementation, and the contents thereof are incorporated herein, and repeated details are not repeated.
It is understood that the user terminal may include a smart phone, a tablet electronic device, a network set-top box, a portable computer, a desktop computer, a Personal Digital Assistant (PDA), an in-vehicle device, a smart wearable device, and the like. Wherein, intelligence wearing equipment can include intelligent glasses, intelligent wrist-watch, intelligent bracelet etc..
In practical applications, part of the watchdog data processing method based on the configurable protection mechanism may be executed on the electronic device side as described in the above, or all operations may be completed in the client device. The selection may be specifically performed according to the processing capability of the client device, the limitation of the user usage scenario, and the like. This is not a limitation of the present application. The client device may further include a processor if all operations are performed in the client device.
The client device may have a communication module (i.e., a communication unit), and may be communicatively connected to a remote server to implement data transmission with the server. The server may include a server on the task scheduling center side, and in other implementation scenarios, the server may also include a server on an intermediate platform, for example, a server on a third-party server platform that is communicatively linked to the task scheduling center server. The server may include a single computer device, or may include a server cluster formed by a plurality of servers, or a server structure of a distributed apparatus.
Fig. 3 is a schematic block diagram of a system configuration of an electronic device 9600 according to an embodiment of the present application. As shown in fig. 3, the electronic device 9600 can include a central processor 9100 and a memory 9140; the memory 9140 is coupled to the central processor 9100. Notably, this FIG. 3 is exemplary; other types of structures may also be used in addition to or in place of the structure to implement telecommunications or other functions.
In one embodiment, the watchdog data processing method function based on the configurable protection mechanism may be integrated into the central processor 9100. The central processor 9100 may be configured to control as follows:
step S101: writing key data into the watchdog protection register and closing the access protection function;
step S102: acquiring the right of configuring the watchdog, and configuring the watchdog;
step S103: and after the configuration is completed, writing the key data again and opening the access protection function.
As can be seen from the above description, in the electronic device provided in the embodiment of the present application, key data is written into the watchdog protection register, and the access protection function is closed; acquiring the right of configuring the watchdog, and configuring the watchdog; after the configuration is completed, the key data is written again and the access protection function is opened, and the wrong configuration of the system can be avoided through the identification access process of the access control logic, and meanwhile, the malicious configuration of a non-software system developer can also be avoided. Meanwhile, through the logic, the watchdog can identify the configured state, data updating in the configuration stage is avoided, information refreshing in an IP (Internet protocol) in the configuration data updating process is avoided, and the risk of error of the internal logic of the watchdog is further reduced.
In another embodiment, the watchdog data processing apparatus based on the configurable protection mechanism may be configured separately from the central processor 9100, for example, the watchdog data processing apparatus based on the configurable protection mechanism may be configured as a chip connected to the central processor 9100, and the watchdog data processing method based on the configurable protection mechanism may be controlled by the central processor to implement the function.
As shown in fig. 3, the electronic device 9600 may further include: a communication module 9110, an input unit 9120, an audio processor 9130, a display 9160, and a power supply 9170. It is noted that the electronic device 9600 also does not necessarily include all of the components shown in fig. 3; further, the electronic device 9600 may further include components not shown in fig. 3, which may be referred to in the art.
As shown in fig. 3, a central processor 9100, sometimes referred to as a controller or operational control, can include a microprocessor or other processor device and/or logic device, which central processor 9100 receives input and controls the operation of the various components of the electronic device 9600.
The memory 9140 can be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 9100 can execute the program stored in the memory 9140 to realize information storage or processing, or the like.
The input unit 9120 provides input to the central processor 9100. The input unit 9120 is, for example, a key or a touch input device. Power supply 9170 is used to provide power to electronic device 9600. The display 9160 is used for displaying display objects such as images and characters. The display may be, for example, an LCD display, but is not limited thereto.
The memory 9140 can be a solid state memory, e.g., Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 9140 could also be some other type of device. Memory 9140 includes a buffer memory 9141 (sometimes referred to as a buffer). The memory 9140 may include an application/function storage portion 9142, the application/function storage portion 9142 being used for storing application programs and function programs or for executing a flow of operations of the electronic device 9600 by the central processor 9100.
The memory 9140 can also include a data store 9143, the data store 9143 being used to store data, such as contacts, digital data, pictures, sounds, and/or any other data used by an electronic device. The driver storage portion 9144 of the memory 9140 may include various drivers for the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging applications, contact book applications, etc.).
The communication module 9110 is a transmitter/receiver 9110 that transmits and receives signals via an antenna 9111. The communication module (transmitter/receiver) 9110 is coupled to the central processor 9100 to provide input signals and receive output signals, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 9110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 9110 is also coupled to a speaker 9131 and a microphone 9132 via an audio processor 9130 to provide audio output via the speaker 9131 and receive audio input from the microphone 9132, thereby implementing ordinary telecommunications functions. The audio processor 9130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor 9130 is also coupled to the central processor 9100, thereby enabling recording locally through the microphone 9132 and enabling locally stored sounds to be played through the speaker 9131.
The embodiment of the present application further provides a computer-readable storage medium capable of implementing all steps in the watchdog data processing method based on the configurable protection mechanism, where the execution subject in the above embodiment is a server or a client, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the computer program implements all steps of the watchdog data processing method based on the configurable protection mechanism, where the execution subject in the above embodiment is a server or a client, for example, when the processor executes the computer program, the processor implements the following steps:
step S101: writing key data into the watchdog protection register and closing the access protection function;
step S102: acquiring the right of configuring the watchdog, and configuring the watchdog;
step S103: and after the configuration is completed, writing the key data again and opening the access protection function.
As can be seen from the foregoing description, in the computer-readable storage medium provided in the embodiment of the present application, key data is written into the watchdog protection register, and the access protection function is turned off; acquiring the right of configuring the watchdog, and configuring the watchdog; after the configuration is completed, the key data is written again and the access protection function is opened, and the wrong configuration of the system can be avoided through the identification access process of the access control logic, and meanwhile, the malicious configuration of a non-software system developer can also be avoided. Meanwhile, through the logic, the watchdog can identify the configured state, data updating in the configuration stage is avoided, information refreshing in an IP (Internet protocol) in the configuration data updating process is avoided, and the risk of error of the internal logic of the watchdog is further reduced.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A watchdog data processing method based on a configurable protection mechanism is characterized by comprising the following steps:
writing key data into the watchdog protection register and closing the access protection function;
acquiring the right of configuring the watchdog, and configuring the watchdog;
and after the configuration is completed, writing the key data again and opening the access protection function.
2. The watchdog data processing method based on configurable protection mechanism according to claim 1, wherein the writing of key data to the watchdog protection register and the closing of the access protection function further comprises:
and judging whether the key data is correct or not, if the key data is in error, denying access, and feeding back an abnormal state according to preset configuration.
3. The watchdog data processing method based on configurable protection mechanism according to claim 1, wherein the rewriting of the key data and opening of the access protection function further comprises:
and judging whether the key data is correct or not, if the key data is in error, denying access, and feeding back an abnormal state according to preset configuration.
4. The watchdog data processing method based on configurable protection mechanism of claim 1, further comprising:
and if the watchdog is configured to be in a dog feeding operation or an interruption clearing operation, directly issuing the right for configuring the watchdog and executing the corresponding operation.
5. A watchdog data processing apparatus based on a configurable protection mechanism, comprising:
the key writing module is used for writing key data into the watchdog protection register and closing the access protection function;
the right acquisition module is used for acquiring the right for configuring the watchdog and configuring the watchdog;
and the configuration completion module is used for writing the key data again and opening the access protection function after the configuration is completed.
6. The watchdog data processing apparatus based on configurable protection mechanism of claim 5, wherein the key writing module comprises:
and the first abnormal feedback unit is used for judging whether the key data is correct or not, refusing access if the key data is in error, and feeding back an abnormal state according to preset configuration.
7. The watchdog data processing apparatus according to claim 5, wherein the configuration completion module comprises:
and the second abnormal feedback unit is used for judging whether the key data is correct or not, refusing access if the key data is in error, and feeding back an abnormal state according to preset configuration.
8. The watchdog data processing apparatus based on configurable protection mechanism of claim 5, further comprising:
and the direct execution unit is used for directly issuing the right for configuring the watchdog and executing corresponding operation if the watchdog is configured to be the watchdog feeding operation or the interrupt clearing operation.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the configurable protection mechanism based watchdog data processing method according to any one of claims 1 to 4 when executing the program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the configurable protection mechanism based watchdog data processing method of any one of claims 1 to 4.
CN202010342614.3A 2020-04-27 2020-04-27 Watchdog data processing method and device based on configurable protection mechanism Pending CN111562999A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010342614.3A CN111562999A (en) 2020-04-27 2020-04-27 Watchdog data processing method and device based on configurable protection mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010342614.3A CN111562999A (en) 2020-04-27 2020-04-27 Watchdog data processing method and device based on configurable protection mechanism

Publications (1)

Publication Number Publication Date
CN111562999A true CN111562999A (en) 2020-08-21

Family

ID=72073316

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010342614.3A Pending CN111562999A (en) 2020-04-27 2020-04-27 Watchdog data processing method and device based on configurable protection mechanism

Country Status (1)

Country Link
CN (1) CN111562999A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5559992A (en) * 1993-01-11 1996-09-24 Ascom Autelca Ag Apparatus and method for protecting data in a memory address range
JP2002133767A (en) * 2000-10-20 2002-05-10 Sony Corp Data reproducing device, data recording device, data reproducing method, data recording method, and program offering medium
CN1423203A (en) * 2001-12-05 2003-06-11 武汉瑞达电子有限公司 Safety computer with information safety management unit
CN104156642A (en) * 2014-07-22 2014-11-19 杭州晟元芯片技术有限公司 Security password input system and method based on security touch screen control chip
CN108985104A (en) * 2018-07-20 2018-12-11 南昌黑鲨科技有限公司 The encryption method and intelligent terminal of intelligent terminal
CN110990853A (en) * 2019-11-29 2020-04-10 天津市滨海新区信息技术创新中心 Dynamic heterogeneous redundant data access protection method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5559992A (en) * 1993-01-11 1996-09-24 Ascom Autelca Ag Apparatus and method for protecting data in a memory address range
JP2002133767A (en) * 2000-10-20 2002-05-10 Sony Corp Data reproducing device, data recording device, data reproducing method, data recording method, and program offering medium
CN1423203A (en) * 2001-12-05 2003-06-11 武汉瑞达电子有限公司 Safety computer with information safety management unit
CN104156642A (en) * 2014-07-22 2014-11-19 杭州晟元芯片技术有限公司 Security password input system and method based on security touch screen control chip
CN108985104A (en) * 2018-07-20 2018-12-11 南昌黑鲨科技有限公司 The encryption method and intelligent terminal of intelligent terminal
CN110990853A (en) * 2019-11-29 2020-04-10 天津市滨海新区信息技术创新中心 Dynamic heterogeneous redundant data access protection method and device

Similar Documents

Publication Publication Date Title
CN111786885A (en) Distributed full-link gray level routing method and device
CN110908875B (en) Inspection method and device based on operation terminal
US11409975B2 (en) Passive near field communication (NFC) device, method and system
CN110764881A (en) Distributed system background retry method and device
CN113157345A (en) Automatic starting method and device for front-end engineering
CN111445331A (en) Transaction matching method and device
CN113342330A (en) Front-end engineering generation method and device
CN112559158A (en) Micro-service timing task scheduling method and device
CN107135471B (en) Data transmission method and mobile terminal
CN113050985A (en) Front-end engineering dependence automatic registration method and device
CN111930624A (en) Test link message data processing method and device
CN111443945B (en) Component code modification method and device
CN111562999A (en) Watchdog data processing method and device based on configurable protection mechanism
CN111338905A (en) Application node data processing method and device
CN107292142B (en) Business operation processing method, business operation processing device and business terminal
CN115422584A (en) Data deformation method and device
CN115099930A (en) Financial business data processing method and device
CN113434423A (en) Interface test method and device
CN113094048A (en) Data display rule determining method, display method, device, equipment and medium
CN113535558A (en) Software version transmission method and device
CN113626086A (en) Multi-core processor starting method and device based on shared starting space
CN111953847A (en) Client message risk reminding method, device and system
CN113034291A (en) Method and device for exporting fund transaction processing result
CN113420266A (en) Computer system integrated software protection method and device
CN115563137A (en) Stationary point data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination