CN117492804A - Customized operating system based on information creation environment - Google Patents

Customized operating system based on information creation environment Download PDF

Info

Publication number
CN117492804A
CN117492804A CN202311093361.0A CN202311093361A CN117492804A CN 117492804 A CN117492804 A CN 117492804A CN 202311093361 A CN202311093361 A CN 202311093361A CN 117492804 A CN117492804 A CN 117492804A
Authority
CN
China
Prior art keywords
operating system
layer
tools
kernel
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311093361.0A
Other languages
Chinese (zh)
Inventor
孙思清
石光银
蔡卫卫
高传集
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Cloud Information Technology Co Ltd
Original Assignee
Inspur Cloud Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Cloud Information Technology Co Ltd filed Critical Inspur Cloud Information Technology Co Ltd
Priority to CN202311093361.0A priority Critical patent/CN117492804A/en
Publication of CN117492804A publication Critical patent/CN117492804A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • G06F8/44Encoding
    • G06F8/443Optimisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5011Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
    • G06F9/5016Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals the resource being the memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides a customized operating system based on a credit-created environment, which belongs to the field of credit-created operating systems and provides compiling optimization and maintenance updating capacity of a kernel layer component; customizing a compiling core layer component, and supporting parameter tuning of a core layer; supporting compatibility authentication of a system application layer; the functions of user safety authentication, operation audit and the like are supported, and the safety reinforcement and guarantee capability is improved.

Description

Customized operating system based on information creation environment
Technical Field
The invention relates to the field of a credit-invasive operating system, in particular to a customized operating system based on a credit-invasive environment.
Background
The created industry, i.e. the information technology application innovation industry, is to construct a domestic information technology software and hardware infrastructure system and a full-period ecological system by applying pulling, thereby solving the problem that key links of core technology are limited by people.
While the credit and debit industry is greatly developed, novel infrastructure construction represented by cloud computing is developed well, and the novel infrastructure construction is continuously and deeply developed, so that an industrial foundation is built for the credit and debit industry, and a large number of solutions are provided for the novel infrastructure by the credit and debit industry. The demand for safe, reliable, autonomous and controllable information creation cloud construction is becoming more common, and the demand for cloud service class is also becoming higher.
The created operation system is a problem which needs to be solved in the created industry, is a key ring in the cloud computing technology, and is a problem how to self-research the created operation system.
Disclosure of Invention
In order to solve the technical problems, the invention provides a customized operating system based on a credit-invasive environment. Realizing a credit-invasive operating system product and providing the compiling optimization and maintenance updating capacity of a kernel layer component; customizing a compiling core layer component, and supporting parameter tuning of a core layer; supporting compatibility authentication of a system application layer; the functions of user safety authentication, operation audit and the like are supported, and the safety reinforcement and guarantee capability is improved. By the self-grinding belief creating operation system, the localization rate of the cloud computing platform is effectively improved, the belief creating capability is improved, the cost of cloud platform products is effectively reduced, and the competitiveness of the cloud platform is enhanced.
The technical scheme of the invention is as follows:
a customized operating system based on a creation environment, comprising:
the kernel layer provides compiling optimization and maintenance updating capability for the kernel layer components, and the customized operating system kernel provides service;
the core layer provides a compiling core layer component, and a customized operating system starts running and uses core software playing a key role;
the system application layer supports component compatibility authentication, expands the kernel layer and provides various general software used by users and applications;
the security reinforcement part supports user security reinforcement, adjusts system parameters and supports user authentication, security operation audit, security library and vulnerability scanning and repairing functions.
Further, the method comprises the steps of,
supporting the service provided by the kernel of the operating system comprises the following steps: kernel-related process scheduling, memory management, storage/networking, hardware driving, compilation optimization, maintenance and updating.
The process scheduling is carried out, the state conversion of the process is completed, the state parameters of the process are recorded, and the process scheduling is composed of a traffic control program and a process scheduling program;
the memory management is that an operating system divides and dynamically allocates a memory space;
and customizing the service of the kernel of the credit-creating operating system by compiling, optimizing, maintaining and updating the kernel layer component.
Further, the method comprises the steps of,
the core layer refers to core software that plays a key role in operating system boot operation and use, and includes: custom compilation, parameter tuning, core command line tools, compilation debugging tools, startup tools, glibc libraries, package management tools.
The core layer functions include:
creating programs, providing various tools and services, including editing programs and debugging programs, helping users program and generate source programs;
executing program, loading user program and data into main memory, preparing for operation and starting execution; when program compiling or executing is abnormal, an abnormal report is needed and the abnormal is properly processed;
data I/O, when a program requires data on an I/O device during execution, the program may request services of the operating system via I/O commands. The operating system does not allow the user to directly control the I/O device, but allows the user to realize I/O control and read/write data in a simple manner;
information access, the file system enables users to establish, read, write, modify and delete files according to file names, and when multi-user access is designed or files are shared, an operating system should provide an information protection mechanism;
communication services, where one process exchanges information with another process, typically occurs in two situations, one between processes executing on the same computer; and secondly, communication between processes executing on different computers connected together by a network. The process communication can be realized by a shared memory method, and also can be realized by message transmission;
error detection and handling, the operating system is able to capture and handle errors and anomalies caused by various hardware or software, and to handle these problems, reporting in time when necessary.
Core layer services are provided for the signal-wound operating system by customizing the compiling core layer components.
Further, the method comprises the steps of,
the system application layer is used for expanding the kernel layer and providing various general software used by users and applications, including monitoring tools, network tools, time services, log services, text processing tools, development manuals, picture libraries, network RPC, bluetooth, high-level programming languages, databases and middleware.
By supporting compatibility authentication of the credit and debit database and the message middleware, credit and debit localization capability of the whole system application layer is provided.
Further, the method comprises the steps of,
the security vulnerability scanning automatically detects vulnerability of a system, equipment and application, and helps enterprises or organizations to detect, scan and improve risk hidden dangers faced by an information system;
detecting the system configuration, system structure and attribute of a specific device;
performing security assessment and vulnerability detection;
providing vulnerability patching and patch management;
by developing security vulnerability scanning and security audit scanning tools and matching with user service requirements, security scanning services are carried out on the systems and networks in the evaluation range in a remote scanning mode on the network layer, the operating system layer and the application layer, so that risks are avoided.
The invention has the beneficial effects that
By the method, the system and the device, the product of the credit-created operating system is realized, and the compiling optimization and maintenance updating capacity of the kernel layer assembly is provided; customizing a compiling core layer component, and supporting parameter tuning of a core layer; supporting compatibility authentication of a system application layer; the functions of user safety authentication, operation audit and the like are supported, and the safety reinforcement and guarantee capability is improved. By the self-grinding belief creating operation system, the localization rate of the cloud computing platform is effectively improved, the belief creating capability is improved, the cost of cloud platform products is effectively reduced, and the competitiveness of the cloud platform is enhanced.
Drawings
Fig. 1 is a block diagram of the operation of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments, and all other embodiments obtained by those skilled in the art without making any inventive effort based on the embodiments of the present invention are within the scope of protection of the present invention.
The invention provides a customized operating system based on a credit-created environment, which is developed and provided with compiling optimization and maintenance updating capability of a kernel layer component; customizing a compiling core layer component, and supporting parameter tuning of a core layer; supporting compatibility authentication of a system application layer; the functions of user safety authentication, operation audit and the like are supported, and the safety reinforcement and guarantee capability is improved.
Kernel layer service:
supporting the service provided by the kernel of the operating system comprises the following steps: kernel related process scheduling, memory management, storage/network, hardware driving, compiling optimization, maintenance updating and other modules.
The process scheduling is the core of the operating system, completes the state transition of the process, records the state parameters of the process, is a transfer station of all the processes, and consists of a traffic control program and a process scheduling program.
Memory management is one of the most important and complex contents in operating system design, and although computer hardware is rapidly developing and memory capacity is continuously increasing, it is still impossible to put all programs and data required by all user processes and systems into main memory, so the operating system must reasonably divide and effectively dynamically allocate memory space.
And customizing the service of the kernel of the credit-creating operating system by compiling, optimizing, maintaining and updating the kernel layer component.
Core layer service:
the kernel layer of the operating system refers to kernel software that plays a key role in operating system startup, running and use, such as: custom compilation, parameter tuning, core command line tools, compilation debugging tools, startup tools, glibc libraries, package management tools, and the like.
Programs are created that provide various tools and services, including editors and debuggers, to assist users in programming and generating source programs.
And executing the program, loading the user program and the data into the main memory, preparing for the operation of the user program and the data, and starting the execution. When an exception occurs in program compilation or execution, there should be an exception report and the exception handled properly.
Data I/O, when a program requires data on an I/O device during execution, the program may request services of the operating system via I/O commands. The operating system does not allow the user to directly control the I/O device, but allows the user to implement I/O control and read and write data in a simple manner.
The file system allows users to establish, read, write, modify and delete files according to file names, and the operating system should provide an information protection mechanism when designing multi-user access or sharing files.
Communication services, in many cases where one process exchanges information with another process, typically occur in two situations, one communication between processes executing on the same computer; and secondly, communication between processes executing on different computers connected together by a network. The process communication can be realized by a shared memory method or by message transmission.
Error detection and handling, the operating system can capture and handle errors and anomalies caused by various hardware or software and handle these problems appropriately, reporting to the operator or user in time when necessary.
Core layer services are provided for the signal-wound operating system by customizing the compiling core layer components.
System application layer services:
the operating system application layer is used for expanding the kernel layer and providing various general software used by users and applications, such as: monitoring tools, networking tools, time services, log services, text processing tools, development manuals, photo libraries, network RPCs, bluetooth, high-level programming languages, databases, middleware, etc.
By supporting compatibility authentication of components such as a credit database, message middleware and the like, credit localization capability of an application layer of the whole system is provided.
And (3) safety reinforcement:
the security reinforcement supports adjustment of system parameters, and supports functions of user authentication, security operation audit, security library, vulnerability scanning repair and the like.
The security vulnerability scanning automatically detects vulnerability of a system, equipment and application, and helps enterprises or organizations to detect, scan and improve risk hidden dangers faced by an information system; detecting the system configuration, system structure and attribute of a specific device; performing security assessment and vulnerability detection; providing vulnerability patching and patch management; is a basic technical means for enterprises and organizations to measure and audit compliance of information systems.
By developing security vulnerability scanning and security audit scanning tools and matching with user service requirements, security scanning services are carried out on systems and networks in the evaluation range in a remote scanning mode on the network layer, the operating system layer, the application layer and the like, so that risks are avoided.
The foregoing description is only illustrative of the preferred embodiments of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention are included in the protection scope of the present invention.

Claims (9)

1. A customized operating system based on a credit-creating environment is characterized in that,
comprising the following steps:
the kernel layer provides compiling optimization and maintenance updating capability for the kernel layer components, and the customized operating system kernel provides service;
the core layer provides a compiling core layer component, and a customized operating system starts running and uses core software playing a key role;
the system application layer supports component compatibility authentication, expands the kernel layer and provides various general software used by users and applications;
the security reinforcement part supports user security reinforcement, adjusts system parameters and supports user authentication, security operation audit, security library and vulnerability scanning and repairing functions.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
supporting the service provided by the kernel of the operating system comprises the following steps: kernel-related process scheduling, memory management, storage/networking, hardware driving, compilation optimization, maintenance and updating.
3. The method of claim 2, wherein the step of determining the position of the substrate comprises,
the process scheduling is carried out, the state conversion of the process is completed, the state parameters of the process are recorded, and the process scheduling is composed of a traffic control program and a process scheduling program;
the memory management is that an operating system divides and dynamically allocates a memory space;
and customizing the service of the kernel of the credit-creating operating system by compiling, optimizing, maintaining and updating the kernel layer component.
4. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the core layer refers to core software that plays a key role in operating system boot operation and use, and includes: custom compilation, parameter tuning, core command line tools, compilation debugging tools, startup tools, glibc libraries, package management tools.
5. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the core layer functions include:
creating programs, providing various tools and services, including editing programs and debugging programs, helping users program and generate source programs;
executing program, loading user program and data into main memory, preparing for operation and starting execution; when program compiling or executing is abnormal, an abnormal report is needed and the abnormal is properly processed;
data I/O, when a program requires data on an I/O device during execution, the program may request services of the operating system via I/O commands. The operating system does not allow the user to directly control the I/O device, but allows the user to realize I/O control and read/write data in a simple manner;
information access, the file system enables users to establish, read, write, modify and delete files according to file names, and when multi-user access is designed or files are shared, an operating system should provide an information protection mechanism;
communication services, where one process exchanges information with another process, typically occurs in two situations, one between processes executing on the same computer; secondly, communication is carried out between processes executed on different computers connected together by a network; the process communication can be realized by a shared memory method, and also can be realized by message transmission;
error detection and handling, the operating system can capture and handle errors and anomalies caused by various hardware or software, and handle these problems, reporting in time when necessary;
core layer services are provided for the signal-wound operating system by customizing the compiling core layer components.
6. The system of claim 1, wherein the system further comprises a controller configured to control the controller,
the system application layer is used for expanding the kernel layer and providing various general software used by users and applications, including monitoring tools, network tools, time services, log services, text processing tools, development manuals, picture libraries, network RPC, bluetooth, high-level programming languages, databases and middleware.
7. The system of claim 6, wherein the system further comprises a controller configured to control the controller,
by supporting compatibility authentication of the credit and debit database and the message middleware, credit and debit localization capability of the whole system application layer is provided.
8. The system of claim 1, wherein the system further comprises a controller configured to control the controller,
the security vulnerability scanning automatically detects vulnerability of a system, equipment and application, and helps enterprises or organizations to detect, scan and improve risk hidden dangers faced by an information system;
detecting the system configuration, system structure and attribute of a specific device;
performing security assessment and vulnerability detection;
vulnerability patching and patch management are provided.
9. The system of claim 8, wherein the system further comprises a controller configured to control the controller,
by developing security vulnerability scanning and security audit scanning tools and matching with user service requirements, security scanning services are carried out on the systems and networks in the evaluation range in a remote scanning mode on the network layer, the operating system layer and the application layer, so that risks are avoided.
CN202311093361.0A 2023-08-29 2023-08-29 Customized operating system based on information creation environment Pending CN117492804A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311093361.0A CN117492804A (en) 2023-08-29 2023-08-29 Customized operating system based on information creation environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311093361.0A CN117492804A (en) 2023-08-29 2023-08-29 Customized operating system based on information creation environment

Publications (1)

Publication Number Publication Date
CN117492804A true CN117492804A (en) 2024-02-02

Family

ID=89681635

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311093361.0A Pending CN117492804A (en) 2023-08-29 2023-08-29 Customized operating system based on information creation environment

Country Status (1)

Country Link
CN (1) CN117492804A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118069232A (en) * 2024-04-19 2024-05-24 浪潮云信息技术股份公司 Method and device for constructing cloud computing information creation operating system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118069232A (en) * 2024-04-19 2024-05-24 浪潮云信息技术股份公司 Method and device for constructing cloud computing information creation operating system

Similar Documents

Publication Publication Date Title
US11789715B2 (en) Systems and methods for transformation of reporting schema
US11822906B2 (en) Industrial programming development with a converted industrial control program
WO2022160707A1 (en) Human-machine interaction method and apparatus combined with rpa and ai, and storage medium and electronic device
CN103336705B (en) Automatic transcoding between script process and Workflow system and semantic self adaptation
US20230280992A1 (en) Industrial automation smart object inheritance
KR20190122815A (en) Method and system for off-line data transfer via machine-readable code
CN102609279A (en) Application execution in a restricted application execution environment
KR102684495B1 (en) A transaction processing method, a device, an equipment, a program and a medium of ethereum virtual machine
US11526954B2 (en) User interface and smart contract interaction model for generating user interface representations
CN117492804A (en) Customized operating system based on information creation environment
CA2607537A1 (en) Software engineering system and method for self-adaptive dynamic software components
CN113127050B (en) Application resource packaging process monitoring method, device, equipment and medium
CN111209001A (en) Method, system, equipment and medium for batch generation of APKs of android channels
US12061901B2 (en) Documentation enforcement during compilation
CN112379969A (en) Continuous integrated delivery method based on containerized application and related equipment
EP4137937A1 (en) Industrial automation project library cross sharing
CN114816361A (en) Method, device, equipment, medium and program product for generating splicing project
US10176011B2 (en) Automatically generating and executing a service operation implementation for executing a task
GB2602344A (en) A telecom enterprise management system and computer implemented method of generating same
US20230152790A1 (en) System model smart object configuration
CN117311718A (en) Domestic GIS application development method and system
EP3005087A1 (en) Declarative configuration elements
CN111338940A (en) Code processing method, device and system
CN114968819A (en) Code quality problem detection and repair method for micro-service continuous integration
US20220292457A1 (en) Industrial automation smart object inheritance break and singleton creation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination