FIELD: information security.
SUBSTANCE: technical result is achieved by implementing a method for controlling real-time devices, in which: using a remote computer, transmitting to a computing device, comprising a system-on-a-chip comprising a first and a second computer system, first computer system includes a general-purpose operating system (OS), second computer system includes a real-time operating system (RTOS), request to start a user session in a general-purpose operating system; performing user authentication by means of a general-purpose operating system; using a remote computer, sending configuration data through a general-purpose OS to the RTOS; using the RTOS, converting the configuration data into control commands for the actuator; RTOS interacts with measuring device and/or actuators.
EFFECT: high level of protection of real-time devices, namely in differentiation of access between two computer systems isolated from each other.
31 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
PROGRAMMABLE LOGIC CONTROLLER FOR CONTROLLING REAL-TIME DEVICES | 2024 |
|
RU2825561C1 |
SAFE AUTHENTICATION WITH LOGIN AND PASSWORD IN INTERNET NETWORK USING ADDITIONAL TWO-FACTOR AUTHENTICATION | 2016 |
|
RU2635276C1 |
SYSTEM AND METHOD FOR TARGET INSTALLATION OF CONFIGURED SOFTWARE | 2012 |
|
RU2523113C1 |
SYSTEM AND METHOD FOR DEPLOYING PRECONFIGURED SOFTWARE | 2012 |
|
RU2541935C2 |
TELECOMMUNICATION CHIP-CARD | 2013 |
|
RU2628492C2 |
CONTAINER SOFTWARE FOR VIRUS COPYING FROM ONE ENDPOINT TO ANOTHER | 2012 |
|
RU2733103C2 |
REPORT ON THE LEGITIMATE TERMINATION IN WIRELESS NETWORKS, USING A RELAY TRANSMISSION FOR PUBLIC SAFETY | 2015 |
|
RU2658659C2 |
METHOD FOR CONTROLLING PROTECTED COMMUNICATION LINE IN DYNAMIC NETWORKS | 2001 |
|
RU2297037C2 |
CONTAINERIZED SOFTWARE FOR VIRALLY COPYING FROM ONE ENDPOINT TO ANOTHER | 2012 |
|
RU2604670C2 |
SYSTEM AND METHOD OF PROTECTING AUTOMATED SYSTEMS USING GATEWAY | 2019 |
|
RU2724796C1 |
Authors
Dates
2024-10-14—Published
2024-02-14—Filed