Monitor processor authentication key for critical data
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-003/00
G06F-005/00
G06F-013/00
G06F-012/00
G06F-013/14
G06F-013/38
출원번호
UP-0595579
(2006-11-08)
등록번호
US-7809863
(2010-10-26)
발명자
/ 주소
Beutler, Arthur D.
Gronhovd, Larry E.
Kriebs, Kevin L.
출원인 / 주소
Honeywell International Inc.
대리인 / 주소
Ingrassia Fisher & Lorenz, P.C.
인용정보
피인용 횟수 :
3인용 특허 :
8
초록▼
A command generating and monitoring system includes a command processor configured to determine a command data set from a command input. A monitoring processor is coupled to the command processor and is configured to generate an authentication key by comparing the command data set received from the
A command generating and monitoring system includes a command processor configured to determine a command data set from a command input. A monitoring processor is coupled to the command processor and is configured to generate an authentication key by comparing the command data set received from the command processor to a comparison command data set generated by the monitoring processor. A data bus is coupled to the command processor and the monitoring processor. The data bus is configured to receive the command data set and the authentication key for retrieval by a consuming device.
대표청구항▼
The invention claimed is: 1. A command generating and monitoring system comprising: a command processor configured to receive a command input and determine a first command data set based on the command input; a first monitoring processor coupled to the command processor and configured to: receive t
The invention claimed is: 1. A command generating and monitoring system comprising: a command processor configured to receive a command input and determine a first command data set based on the command input; a first monitoring processor coupled to the command processor and configured to: receive the command input, determine a second command data set based on the command input, receive the first command data set, compare the first command data set and the second command data set, determine if the first command data set is identical to the second command data set, generate a first authentication key based on the comparison, wherein, the first authentication key is a valid first authentication key if the first command data set is identical to the second command data set, and the first authentication key is an invalid first authentication key if the first command data set is not identical to the second command data set; and a data bus coupled to the command processor and the first monitoring processor, the data bus configured to receive the first command data set and either the valid first authentication key or the invalid first authentication key for retrieval by a consuming device. 2. The system of claim 1 further comprising a first data bus interface coupled to the command processor and a second data bus interface coupled to the first monitoring processor, the first data bus interface and the second data bus interface configured to place the first command data set and the first authentication key on the data bus for retrieval by the consuming device during a set time slot. 3. The system of claim 2 wherein the first authentication key is a cyclic redundancy check (CRC) and wherein inconsistency between the CRC and the first command data set is indicative of a divergence between the command processor and the first monitor processor, a failure in the first data bus interface, a failure in the second data bus interface or a failure of the data bus. 4. The system of claim 1, further comprising an I/O controller coupled to the command processor and the first monitoring processor, the I/O controller configured to assemble a message comprising the first command data set and the first authentication key. 5. The system of claim 4 wherein the command processor comprises a first processor lane operating in a lockstep manner with a second processor lane, the first processor lane configured to generate a first set of command data and the second processor lane configured to generate a second set of command data, wherein the first set of command data is received by the I/O controller and the second set of command data is received by the first monitoring processor, the first monitoring processor configured to generate the first authentication key by comparing the second set of command data with the second command data set generated by the first monitoring processor. 6. The system of claim 5 wherein the authentication key is a cyclic redundancy check (CRC) based on the second set of command data and wherein an inconsistency between the second set of command data and the CRC is indicative of either a divergence between the first processor lane and the second processor lane, a divergence between the command processor and the first monitor processor, a failure in a first data bus interface coupled between the command processor and the data bus, a failure in a second data bus interface coupled between the first monitor processor and the data bus, or a failure of the data bus. 7. The system of claim 1 further comprising a second monitoring processor coupled to the command processor, the second monitoring processor configured to generate a second authentication key, and wherein the data bus network is configured to deliver the first command data set and the first and second authentication keys to the consuming device. 8. The system of claim 7 wherein the consuming device is configured to discard the first command data set if the first and second authentication keys are indicative of a failure of a match between the first command data set from the first command processor and the second command data set generated by the second command processor. 9. A method for verifying processor generated commands comprising: receiving a command input at a command processor; generating a first command data set at the command processor based on the command input; receiving the first command data set at a first monitoring processor; receiving the command input at the first monitoring processor; generating a second command data set at the first monitoring processor based on the command input; comparing the first command data set and the second command data set at the first monitoring processor; determining if the first command data set is identical to the second command data set, generating a first authentication key at the first monitoring processor indicative of a valid match between the first command data set and the second command data set based on the comparison of the first command data set and the second command data set, wherein, the first authentication key is a valid first authentication key if the first command data set is identical to the second command data set, and the first authentication key is an invalid first authentication key if the first command data set is not identical to the second command data set; and transmitting the first command data set and either the valid first authentication key or the invalid first authentication key to a consuming device via a data bus coupled to the command processor and the first monitoring processor. 10. The method of claim 9 further comprising placing the first command data set and the first authentication key on the data bus for retrieval by the consuming device during a set time slot. 11. The method of claim 10 wherein the step of generating the first authentication key further comprises generating a cyclic redundancy check (CRC) and wherein an inconsistency between the CRC and the first command data set is indicative of a divergence between the command processor and the first monitor processor, a failure in a first data bus interface coupled between the command processor and the data bus, a failure in a second data bus interface coupled between the monitor processor and the data bus, or a failure of the data bus. 12. The method of claim 9 further comprising assembling a message at an I/O controller, the message comprising the first command data set and the first authentication key. 13. The method of claim 9 wherein the step of generating the first command data set further comprises: generating a first set of command data using a first processor lane of the command processor; generating a second set of command data using a second processor lane of the command processor; generating the first authentication key at the monitoring processor using the second set of command data; and sending the first set of command data and the first authentication key to the data bus. 14. The method of claim 9 further comprising: receiving the first command data set at a second monitoring processor; receiving the command input at the second monitoring processor; generating a third command data set at the second monitoring processor based on the command input; comparing the first command data set and the third command data set at the second monitoring processor; generating a second authentication key at the second monitoring processor indicative of a valid match between the first command data set and the third command data set based on the comparison of the first command data set and the third command data set; and transmitting the first command data set, the first authentication key and the second authentication key to the consuming device via the data bus. 15. The method of claim 14 further comprising the step of discarding the first command data set if the first and second authentication keys are indicative of a failure of a match between the first command data set from the command processor and the second command data set generated by the first monitoring processor and a failure of a match between the first command data set from the command processor and the third command data set generated by the second monitoring processor. 16. The method of claim 9 wherein the command processor is a first command/monitoring processor, the method further comprising: receiving the first command data set at a second command/monitoring processor; receiving the command input at the second command/monitoring processor; generating a third command data set at the second command/monitoring processor based on the command input; comparing the first command data set and the third command data set at the second command/monitoring processor; generating a second authentication key based on the comparison of the first command data set and the third data set at the second command/monitoring processor indicative of a valid match between the first command data set and the third command data set based on the comparison of the first command data set and the third command data set; receiving the third command data set at the first monitoring processor; comparing the second command data set and the third command data set at the first monitoring processor; generating a third authentication key based on the comparison of the second command data set and the third data set at the first monitoring processor indicative of a valid match between the second command data set and the third command data set based on the comparison of the second command data set and the third command data set; receiving the third command data set at the first command/monitoring processor; comparing the first command data set and the third command data set at the first command/monitoring processor; and generating a fourth authentication key based on the comparison of the first command data set and the third data set at the first command/monitoring processor indicative of a valid match between the first command data set and the third command data set based on the comparison of the first command data set and the third command data set. 17. The method of claim 16 further comprising: assembling a first message comprising the first command data set, the second authentication key, and the third authentication key; assembling a second message comprising the third command data set, the first authentication key and the fourth authentication key; and transmitting the first and second message to the consuming device. 18. A command generating and monitoring system comprising: a first command/monitoring processor configured to receive a command input and generate a first command data set based the command input; a second command/monitoring processor coupled to the first command/monitoring processor, the second command/monitoring processor configured to: receive the command input, determine a second command data set based on the command input, receive the first command data set, compare the first command data set and the second command data set determine if the first command data set is identical to the second command data set, and generate a first authentication key based on the comparison of the first command data set and the second command data set, wherein, the first authentication key is a valid first authentication key if the first command data set is identical to the second command data set, and the first authentication key is an invalid first authentication key if the first command data set is not identical to the second command data set; and a monitoring processor coupled to the first command/monitoring processor and the second command/monitoring processor, the monitoring processor configured to: receive the command input, determine a third command data set based on the command input, receive the first command data set, compare the first command data set and the third command data set, generate a second authentication key based on the comparison of the first command data set and the third command data set, receive the second command data set, compare the second command data set and the third command data set, and generate a third authentication key based on the comparison of the second command data set and the third command data set. 19. The command generating and monitoring system of claim 18, wherein the first command/monitoring processor is further configured to: receive the second command data set, compare the first command data set and the second command data set, and generate a fourth authentication key based on the comparison of the first command data set and the second command data set. 20. The command generating and monitoring system of claim 19, further comprising an I/O controller coupled to the first command/monitoring processor, the second command/monitoring processor, and the monitoring processor, the I/O controller configured to: assemble a message comprising the first command data set, the second command data set, the first authentication key, the second authentication key, the third authentication key, and the fourth authentication key; and transmit said message to a consuming device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (8)
Huon Pierre J. (Saint Laurent du Var FRX) Jachimcsyk Philippe (Saint Jeannet FRX) Barucchi Gerard (Villeneuve Loubet FRX) Calvignac Jean (La Gaude FRX) Verplanken Fabrice (Cagnes sur Mer FRX), Apparatus for generating and checking the error correction codes of messages in a message switching system.
Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Hollis Lloyd L. (Cary NC) Lennon Richard E. (Woodstock NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Oseas J, Cryptographic communication security for multiple domain networks.
Yossifor Oded (22422 Anza Ave. Torrance CA 90505) Brown ; III. Sanford M. (301 Via Mesa Grande Redondo Beach CA 90277), Secured data transmission and error recovery mechanism in cordless telephones.
John Archibald, Fitzgerald; Schneider, John Keith; Tamagno, David; Lundblade, Laurence Geoffrey, Managing latency and power in a heterogeneous distributed biometric authentication hardware.
John Archibald, Fitzgerald; Schneider, John Keith; Tamagno, David; Lundblade, Laurence Geoffrey, Managing latency and power in a heterogeneous distributed biometric authentication hardware.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.