Methods and articles of manufacture for hosting a safety critical application on an uncontrolled data processing device
First Claim
Patent Images
1. A method for executing instructions with an uncontrolled data processing device (UDPD) to determine whether a safety critical application (SCA) is functioning properly on the UDPD by determining whether the codetext of the SCA is uncorrupted, the method comprising:
- executing instructions with UDPD to calculate, a host integrity check for a codetext of the SCA;
retrieving a corresponding reference host integrity check calculation;
comparing, with the UDPD, the calculated host integrity check and the retrieved corresponding reference host integrity check calculation; and
determining, with the UDPD, whether a change exists in the calculated host integrity check and the reference host integrity check.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and articles of manufacture for hosting a safety critical application on an uncontrolled data processing device are provided. Various combinations of installation, functional, host integrity, coexistence, interoperability, power management, and environment checks are performed at various times to determine if the safety critical application operates properly on the device. The operation of the SCA on the UDPD may be controlled accordingly.
-
Citations
16 Claims
-
1. A method for executing instructions with an uncontrolled data processing device (UDPD) to determine whether a safety critical application (SCA) is functioning properly on the UDPD by determining whether the codetext of the SCA is uncorrupted, the method comprising:
-
executing instructions with UDPD to calculate, a host integrity check for a codetext of the SCA; retrieving a corresponding reference host integrity check calculation; comparing, with the UDPD, the calculated host integrity check and the retrieved corresponding reference host integrity check calculation; and determining, with the UDPD, whether a change exists in the calculated host integrity check and the reference host integrity check. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification