The Design and Implementation of Security Mechanism of Embedded Dependable Computer
|School||Harbin Institute of Technology|
|Course||Computer Science and Technology|
|Keywords||Dependable computing Security Security co-process module TMS320VC5416|
As computer systems are widely used in the high dependability-critical fields such as aerospace, military and industry, the dependability of the computer system is becoming increasingly important. Now the designing and implementation technique of dependable computer is one of the most important research fields. The research on security, one of the important characters of dependable computer, is becoming increasingly important.In this paper the designing and implementation technique of dependable computer is firstly introduced. Then the security requirements of embedded dependable computer are analyzed. The security mechanism of embedded dependable computer is analyzed and designed. The security co-process module is added to the traditional architecture of embedded computer system. The architecture of the security co-process module is designed. By hardware and software cooperation the security mechanism is implemented.TMS320VC5416 is selected as the processer of the security co-process card. Sharing memory is selected as the way of communication between co-process card and host platform. Then the hardware of the security co-process module is particularly designed and implemented. Then system management software of the card is designed and implemented. The security card driver on S3C44B0X platform is implemented. The security co-process card provides the security related commands for the host platform. Finally this paper gives a test on the security co-process module. The implementation of security co-process module satisfies the requirements of embedded dependable computer system and also makes contribution to the implementation of security enhanced system software and security enhanced anplication software of embedded dependable computer system.