Language selection

Search

Patent 2360040 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2360040
(54) English Title: METHOD FOR SECURE ACCESS TO AT LEAST ONE VARIABLE IN A PREEMPTIVELY MULTITASKING-CONTROLLED PROCESSOR SYSTEM
(54) French Title: PROCEDE D'ACCES SECURISE A AU MOINS UNE VARIABLE DANS UN SYSTEME DE PROCESSEUR COMMANDE EN MODE MULTITACHE PREAMPTIF
Status: Deemed Abandoned and Beyond the Period of Reinstatement - Pending Response to Notice of Disregarded Communication
Bibliographic Data
(51) International Patent Classification (IPC):
  • G06F 9/46 (2006.01)
(72) Inventors :
  • SPITZ, GERHARD (Germany)
(73) Owners :
  • SIEMENS AKTIENGESELLSCHAFT
(71) Applicants :
  • SIEMENS AKTIENGESELLSCHAFT (Germany)
(74) Agent: SMART & BIGGAR LP
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 2000-01-11
(87) Open to Public Inspection: 2000-08-03
Examination requested: 2005-01-04
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/DE2000/000077
(87) International Publication Number: WO 2000045236
(85) National Entry: 2001-07-27

(30) Application Priority Data:
Application No. Country/Territory Date
199 03 599.7 (Germany) 1999-01-29

Abstracts

English Abstract


In an access status memory (ZSE1), the accessing task (T1) inputs blocking
data (SI) before a current access to at least one variable. In addition, task
change data (WI) planned by the task scheduler (BST) during the protected
current access is inputted into the access status memory (ZSE1) with the aid
of said task scheduler (BST). At the end of the current access, a release
information (FI) is inputted into the access status memory (ZSE1) and the
delayed task change (TWA) is executed by the currently accessing task (T1)
once the task change data (WI) has been inputted.


French Abstract

Selon l'invention, dans une mémoire d'états d'accès (ZSE1) une information de blocage (SI) est introduite avant un accès actuel à au moins une variable, par la tâche (T1) demandant l'accès. En outre, lors d'un changement de tâche (TWA) prévu par un planificateur de tâches (BST) pendant l'accès sécurisé actuel, une information de changement de tâche (WI) est introduite dans la mémoire d'états d'accès (ZSE1) avec l'aide dudit planificateur. A la fin de l'accès actuel, une information de libération (FI) est introduite dans la mémoire d'états d'accès (ZSE1) et, lorsque l'information de changement de tâche (WI) est introduite, le changement de tâche (TWA) temporisé est lancé par la tâche (T1) procédant actuellement à l'accès.

Claims

Note: Claims are shown in the official language in which they were submitted.


-12-
Claims
1. A method for secure access (gz) to at least one
variable in a preemptively multitasking-controlled
processor system, a task scheduler (BST) being provided
for processing the tasks (T1, T2),
in which an access status memory (ZSE1) is provided
- into which a blocking information item (SI) is
input by the accessing task (T1) before a current
access (gz) to at least one variable,
- in which when there is a task change (TW) intended
by the task scheduler (BST) during the current
access (gz), the task scheduler (BST) checks the
access status memory (ZSE1) for an input blocking
information item (SI) and when the blocking
information item (SI) is input the task scheduler
(BST) delays the intended task change (TWA) and a
task change information item (WI) is input using
said blocking information item (SI), and
- into which a release information item (FI) is
input by the currently accessing task (T1) at the
end of the current access (gz), and when a task
change information item (WI) is input the intended
task change (TWA) is initiated by the currently
accessing task (TI).
2. The method as claimed in claim 1, characterized
in that in addition to inputting the task change
information item (WI) a time monitoring system (TM)
with a time period comprising at least the duration of
the secure access (gz) is activated, and that the
current access (gx) is terminated after the expiry of
the defined time period.
3. The method as claimed in claim 2, characterized
in that at the end of the secure access (gz) and before
the inputting of the release information item (FI) the
contents of the access status memory (ZSE) are checked
so that when a

-13-
task change information item (W1) is present the
activated time monitoring system (TM) is deactivated
and a technical operating information item which
initiates the intended task change is transmitted to
the task scheduler (RST) by the currently accessing
task (T1).
4. The method as claimed in one of claims 1 to 3,
characterized in that the contents of the access status
memory (ZSE1) are overwritten by the inputting of an
information item (SI, WI, FI), into the access status
memory (ZSE1).
5. The method as claimed in one of claims 1 to 4,
characterized in that the blocking information item
(SI), the task change information item (WI) and the
enable information item (FI) are formed by at least one
single bit information item,
6. The method as claimed in one of claims 1 to 5,
characterized in that a variable is represented either
by a variable of a software module which is stored in a
memory unit or by a hardware-related setting
information item which is stored in a hardware
register.

Description

Note: Descriptions are shown in the official language in which they were submitted.


07!27!01 13 ~ 36 FAg BELL BLIYh & LCI~h LLC IQ 002
' ' CA 02360040 2001-07-27
~rR ~~ f 1129
~asrr.iption
Mat hod for secure z~c:c:ess to at leapt one variable ;n a
preemptively multitask~nc~-controlled proces5ut system
In exioting and future ~ nf~~crmation process.i.ilc~ systems,
for example rJC,'°t''.aVlldl computero, software objp~i'.~ -
usually aloo ref~rred to as processes - are dtic3 will be
administered usiry Lhe operating 3yatem in such a way
that the hardware syst-am, in particular Ll~a process
processing device wluich is provided in the information
procoosing syst~sm, for example the Y~ucassor, is
utilized unifoi~utly with the aim of high overall
efficiency. In this way, the software mCC~ules which arc
assigned to elm processor by the opexating system -
usually also referred t-.h as tasks - are processed by
the processo,c~. Here, special operating sysi:ams, for
e~amp7.c Windows 95, era provided f~t~ l:lze information
processinq sy5l.~suw which have a monoproe~ssor, i.P. the
information procag:ai ng system has ~j u5L one proce3~or,
said operai.i~lc~ systems aloo permitting m~.~ i r.i -user
operation or m»ltiple-process opet~dLian on a
monoproceasuL - see in this r~a,pect in particular '
"llrchitektur von that ri PbsSystemen" [At~c:l~itecture of
~5 uperatinq Systems], II. Wettorst~in,_ Hansar Studien
Biicher [publishinr~ house]. 1984. f~i~. :r4 et scq. The
operating muc~e which is required for than mulLiple~
process oreral~i on of a procer~aCL is known in the
speciali5l. field under the term "multirrnr~ramming" or
else "multita~ki ng" . lIl t111S way, during the execution
of d l.ask the information proeQSSinr~ system can also
carry out a f»ri:her LBSk 9uCh ds Llle reading of data
f~cmu a storage medium of the information proCeSSiny
system nr for example the dia~ldying of data on a dz~ta
viewing station in a "quasipara11a1" tashion.
furZhermOre, d distinction io made b~twePn

07/27/01 13: 3B FAg __ BEL~,"BOYD & LOYD LLC. ~~ 403
CA 02360040 2001-07-27
c;R H~ Y 1129
- 1a -
"cooperative" and "p~bemptive" multitasking. In the
ca~c of "cooperative" m»1 ti.taskiriQ. each itidlvidual
currently executed l.d~k itself determine, according to
requirements, the time pRriod for which it takes up the
processor, i.e. i.lue

47.~27/O1 19 ~ 96 FAZ, . , BELL BOYL~ & LOYIt LL~' Ii~l OOd
CA 02360040 2001-07-27
GR 99 P 1129
currently twtmimg task decides on tho time when the
processor is relaa~~cJ for the processinq UL Lurtl~Cr
tasks. In t,lie case of "preemptive" multitasking, a task
of the operating syst.~m, known in the specialia ~ ri~sld
as "SC;ti~suler", or even "tack ochoduler" interrupts thR
currently ex~cuted task attar a predefined or as5lyu~~1
time periu~i has finished, i.c. the tim~ when the
proeessor is assigned an~3 released 1s de'~ermluea using
the ~a5k 5~l~eduler.
In nrc~~r to execute a function Ct elm operating
Sys~mu, i.e. for example an operating system task s~.mh
as thr~ task srhPduler, a Special operatlty mule of the
piwu~s3or for protecting tho data of the operating
system task is prnaiciPd which is known a5 supervi,~or or
ke~ul~l mode - sae in particular Andr~w S. Tanenha»m,
"BstriebssystPma - h;nrwurf and Realislei~uy" [Operating
Systems - Design and Implomentation] part 1, Prenti~s~-
Hall Tnf-.c?rnational, 1990. pp 31/32 , Tv clo this, the
~~wc;r~'sor is switched ov~cr using a supervisor call from
a user mode i nto the supervisor mode and l.Z»s cunt~:ol of
Llze processor io thuo transfers~d to the orarafiing
system or ii-g tasks. In Contrast with the supeLVisor
mode, not all instructions are acceptable in i-hR u9er
mode, int-c~r a~lia, in the user mode tyre u5~a of input and
output inatructiono and of ~somm special instrmri~ions is
prohibited. L7.kewise, in the uSr~L modo the acce3o to
all the data i3 gonerally not possible, i_P. for
PxampiP the data of the operatiticl SysCem can neither be
s:ead nor amended for non-operating system tasks-
Specifically in the c;a5c~ of information
processing oyotems which act accor~li ng to the
m"1 t i is sking principle, variak~l~s~ yr blocks of
variable3 which are accessed during the processing of a
t.agk must be protec;Lea a4ainst competing aeee~~ee, for
example by forthor tasks- This wnSUres that: for
example, the errors uu~:urring during dual cimultan~ous
variable ,access cannot lead to any blockages of fuLl.tiei
tasks or of the e~l~i~~

07/27/01 13~37 FAg__ BELL BnyD & LOYD LLC IQ 008
CA 02360040 2001-07-27
GR 99 P 1129
information processing system. Such a protection
mechanism is dPRrriht~d belOW using the fV.~'tuult~tivri
"SGCUr~d dc;c:e~s" tv at least one variable, and the tQrm
variably can rAfRr here both to a varidk~le of a
Soll.waie module which is stored in a m~mory unit and tn
a hardware-relatPrl ~~tting information item w~iiul~ is
stored iri a hardware register. Such secured accessR~
fr~qu~ntly take rlana when specific problciu~ are posed,
for example in information systems which are used tn
contrr~l rea 1 i-.i mP systems but must slay d~:c:ess data
whicri cam Lc a~clministrated, and are of short duration
in comparison i-n 1-.he average time period 't,~e~w~en two
suc:c:c~ssive tank change3 . Consequently, the probahi 1 i i-.y
of a task change during a secure access is very lvw,
k~u~ cannot at all be exvludod.
The implementation of a "sevuz~c access" by a
LaSk can be carried out using rrarious rrnta~t.i~n
mechanicm~. This includes, inter alld, llw setting of a
~d5k change inhibit in order to avoid a cnmrei-ing
access by a further task to the vdi~ldLles which are
being accessed by the task currently running On the
grocessnr. To do this, before the varad.)Jlrs to b~ read
are accessed u3ing a supervisor call, thA prnr.PSSOr is
switched wPr. into the supervisor rnOde dll~l the netting
2J of a task change inhibit is reqLtestpd firm the
vnRr~ting system in order to cLL~in exclusive access
Lur the processor, and thus also for the c~e:Sired.
variahlc~, for the currently acce55iug task. Then, the
p~uc;es5or is switched back into the user mr~r_iA and the
dRSirPd access to the variable c;dl be secured by the
previou3ly interrupted task, i.e. withrnW interruption.
After terminat~.on of the sec;ut~e access by the currently
running tank, it is necessary tn ~hanc~P 3f~a1.11 3.hto 'the
4»pervisor mode by rct~am of a supervisor call and for
the torah changQ inhibit to be ra:~~t by 'the operatlnq
system in said rtLUC.Ie. In order tv further proc~ss the
torah which is currently tn ha processed,

07/27/01 13:37 F~--,. BELL BOYD & LOYD LLC ~d4A6
CA 02360040 2001-07-27
GR 99 P 1129
- 4 -
l.tie (JtUl:hlIS.9V1 15 then changed back into the user mode
and the times monitoring activated during tree s~sLLing of
t,lm l.aak change inhibit i3 deactivated in ordor to
avoid thp processor being blocked rug an
indeterminately long time.
A .fmrt.ha~r method of implementing a ~~~:uzo
au~~~s i5 used in the 3ynchroni~ation of tasks, i.e.
the coordination of a plurality of Ld,'ks which
alL~inc~tely accede the procccoor, in order to avoid the
confli~t~ which occur in the multitaskitty j«use. Here,
the semaphore technique is frequently used for the
synrhrnni~ation of 'Che individual tasks. A~~:ording to
its mathematical-theoretical definition, a sema~hnrP is
an integral, non-negative variable assculdt.ed with a
l~ queue. IIere, the initial value of the semaphore dafi»Ps
how many t~Rkg can be located sljuullaneuusly in a
secured section controlled by a somaphore_ The d'»~a»P
rn»fiains the tasks which wait for ~l~e secuxed section
to be entered. To do this, a semaphore is checked anc~
mnrli f'i pd by the currently running l.ask in order to
implement the secure aaaess to a variable by mP~ns of
an un;ni-.prruptible read/wriLe cycle. It, Lur c~ample,
thi3 semaphore io greater than zero, it is cta~ra~mPnted
and i-hw gPCUre access to the deslred v~ar~.able is
2r subsequently aarricd out by the currently r~.~nning task.
Tt the semaphore is already eduai to zero, the ta3k
which reque3to a secure access is changed intq the
waiting state and the 5elua~kmi~s variable is not
changed. At the and of th~ secure ar_.cess r.n r_he
at) variable, it is checked whether tasks ar~ waiting on
thi3 ~cmaphore, and if appropriate, nnP of the tasks
Located in the waiting state is activated, i.e. the
proccacor is assigned. If there is nn i-.agk waiting on
the semaphore. Lh~ s~um~rhore i5 incremented again by
35 mcana of an uninterruptiblP .rPa~l/write cycle. These
uninterruptlk~le ~~sad/write cycles to the semaphore
variabl~ can either be iznplamRntPd, in 3 way similar i.u

O,Z/27/01 13 ~ 3'~ FA.g BELL BOYD & L~IYD LLC IQ t147
' CA 02360040 2001-07-27
GR 99 P 1129
_ 4~ _
Llze method o~ the task chango inhibit, by a supervisor
~a11 end the subsequent handling by l.tle upcrating
system or in the user modc with epeaial

07/27/01 13 ~. 39 FAg BELL BOYD & LOYL~ LLr.. IQ 02i
i
s
a
~i
,GR 99 P 1129
_ 5 ~ii
support by the processor hardware anrl ~,r~c:aa:5cr hus
t~ard~ua~e. Hraie Lou, time moriitoring, whose function
consists in avoiding the prc~cP~ssn.r, hAi ng h1 cr_kPd for a
1U11C~t'L l.haii average time, i5 provided fox the duration
cf the 9eourr~ aw:ras:~ _
Im ~lre previously de5c~ribed implemontation3 of
a s~acure ar_.ra~s t~ vari ~h1 Pq, '~a plurality of operating
IILUC~C ~:lldlit~~3 including the associated technical
operating task ~rn~R~~ing or special support by
lO processor hardware and pros~asor buo hardware are
necessary ~iurin~ a~rh ,~r_r.Pgs, i.e. secure accesses to
variables increase the loading on tho procegeor or
raquiro ar~ditiona.l ann ~par.i ~1 l~~y supporting hardware.
The object on which 'the invention io based
rnnRi~tR in improving the implementatian of a secure
y
access to at least one variable in a precmptivcly
muftita~king-ncntrcLlPd processor system. The object is
achieved by means of the fcaturco of patont claim 1.
Tha PQ9Pnti.al aspect of the method according to
the invention is that an aceaoa otatua mQmory is
nrovina~l in a preemptively: multitasking-con~.cwlled
processor system for 3eeure ~accoca to at least onQ
variable, into which access status memory a blockliic~
information i.t~m is input by the accessing task b~foro
a current access 'CO at least one variable. Furthermore,
when thcrc is n task change int~ndod by the task
scheduler during the current access, the task sermaule~~
check3 the aaoeaa status memory for a blocking
intnrmatinn item which has been input and when the
blocking information itom has bean input the task
scheduler delays the intended task change. >rludlly, the
teak change information atom i.a input into tho access
status memory usin~t said blocking informs l.lcm i Lr~w. At
the cnd o~ tho current sac~ss, a release information
item is input into the acc:G~S ~~aLua memory by the
currently accessing task (T1); 2n~1 whwn ~ task change
information item is icyu~
AMENDED SAGE
CA 02360040 2001-07-27

07/27/01 13 ~ 39 FAX BELL BOYD & ~ ~IYD LL~' td 422
. '
.GA '39 P 1129 i
- 6 -
the roquoated task change i,s irnitiated by the currently
accessing task (L1). The use ~of an additional accc~s
ctatu~ memory has the advantage that the Swir.ahinQ over
of the processor ittLc elm supervisor mode, which, for
example, is necessary with tliR task changing inhibit
method, and the subsequ~ul. Gxdcuticrn of an operating
oy~tcm task are dispensed with, an~1 ~ c:onsiderable
dynamic reliev.~uy ut the leading on the prooeaaor is
thus achieved, especially since ~ProrP accesses to
variables oc;uur v~ty frequently when certain problems
which occur during the orerati~n ~fi an information
processing aysLE3llt dtl5°lS. Iiz addition, the inputting of
the blocking informat i nn i 1-.Pm, the task change
information item vi' L1-ie release information item
r~quiros only a few ma~hina in9tructions and is Lhus
easy La implement in terms of programming technology.
Furthermore, in the mathcci according to the invention,
j,tl C:UIIL~~st to the semaphore ~tcahniquc, no additional.
hardware supgort in thA farm bt processor hardware or
ZO rJ.IUC:~55UZ Lus hardware is nec~asary, which leads to a
cost-effective irnplAmPntation ,of the secure access Lc
variables which is net tied to apeeific hardwar~.
Furthermore, W.~ring 1-.hP secure access the accessing
task .LS advantageously not interrupted by a tack change
which is intendarl by a further task, and in addil,lcn
Lhe intended task change io snot reject~d but rather
delayed so that afi-.ar the evaluation. of the task chance
lmr~L~nation item at the end of the secure access the
intended task chanr~R r.~n he directly retrieved Ly the
Lark scheduler.
turther essential aspect of ~lr~s umthod
according to the invention ~ic that in addition to
ingz~i:ti ng the task change information lletu a time
monitoring 3ywtcm with s, time period comer;aing at
last the duration of the secure ac:c:ess is activated,
and that the current access :is terminata~l otter the
pxpiry of the defined l.l~m N~siioa - claim 2. The time
AMENDED PAGE
CA 02360040 2001-07-27

4T/2T/4i i3 ~ 39 F.4g BELL BOYD & ~~ 4YD LLr_. IQ 423
GR 99 P 1129
- 63 -
uwili~c:ming system in the mothod according t~ the
inv~ntinn i ~s advan'Gageously hot c~a~s~~a7.ly activated
du~~iu~ tha initializatior~ of a'~ s~cure access h»t. rather
only when there is a task ch~.nqe imL~nd~d during the
current acce~3, and
.;
i
AMFNDE~ ~IYHtJ~
' .i
CA 02360040 2001-07-27

-_ 07/27/01
13: 39 FA7C
~._ BELL
B41YD & ILOYD
LLG td 02d
i
~I
' ~ ;
~GR 99 P 1129
_ ,I _ i~
I~
i
the dynamic loading, which is
i~usually nac-.Pgsary during
the use nfi the already krmwmvethods,
for oxampl~
SleittdptluZe teohniquE or the
setting of ~ task Charige
inhibit-, is thus dispensed lith.
Thi3 lcad~ to an
additional dynamic roliQVinr~j~
of the load on Laic
information processing systew
~t tl-~e processor.
, I
According to a furtheri i refi nament o~ the mettrCd
accordinr~ i-n the iriventiori, e c:ur~temts of the access
tl~
a~dl.us memory arc check~d a ~ the any of the secure
i
re the i iutting of the r~loase
b
f
y
o
e
accass and
iufo~:mation item ao that when l task change information
i
itam is present Lhe ac~ivaLed; ~time monitoring system is
deactivated and a t~ehnieal o rarafii.ng iri~ormal.iur~ item
i '
whi nh initiates the inl.el~cicdiask change is transmitted
t
1~ to the took scheduler by the
~rrently acCessinc~ ~dsk -
rlaim a. The CheCklnq UG LlZui'
contents of th~ access
status memory advantagoouqJyll
PnsurCS that. directly
2ttRr termination ut the ~ocurc
access, the task
scheduler is informed abo~~t
the intended tank change
9f1 which is in,dicaLec3 Ly the tas~C
change information i t.Pm,
i on o~ l.lie technical
~r
indi c-
t th
h
i
. .
e
t
ou
because w
nppratiric~ informativ~l item ch indicates the intPn~lR~l
whl~
task change th~ task srhR~lo r Would riot cas'ry out the
I e~
riR I ayed task Change. xustead,;lthe intended task chanr~A
25 would bo carri~d out at the ti me at which t)ae c:uZrently
accessing task is interruptc~ ~ by th~ task s~-hRduler,
i.c. the ~.ntendvd task rhanlq~ e would be u~rrmcesaarily
i
delayed beyC~l~t the time periodof th~ secure 2n~~gs.
Further advantac~PCUS ' ~e~inements ur the method
:iU according t~ l.ne invention ca xi be found in thR further
claims.
The tuel.Zlu~l according ~~to the invention wi I1 be
explain~d in mnra detail b ,~lOW wilt ~efvrence to 3
i
figure. '
I.
AMJ;NUJrU;I PAGE
CA 02360040 2001-07-27

07/27!01 13' 98 FA7C BELL BnYi~ & LOYD LLC Id p19
CA 02360040 2001-07-27
~Ft 99 P 1129
- R -
In 1:'iqure 1, a first and a occond us~r task T'I ,
T2 and an operating sy~tPm task tiST are represented by
way of example ac:c:~~dilzg to their procoseing ovQr time
by th~ processor of an information proeer55irrg system
which ac:t~ according to the pre~mptive molt; t~.a9king
method. Furthermore, ~ 9npervisor mode SM and a user
mode UM of Llm processor and the associated taskq are
indicated by two sPp~rate areas. Hire, in the
supervisor jLLUCl't.~' sM the operating cyst~m task BST, 1 at:er
also called s~hPduler ox task scamciuler D3T, i3
represented toi processing by the procmssor, and in the
user mode a firm-. and a second user ldsk T1, T2 for tho
prcvessing by the processor are illustrat.ad by Way of
~YamplQ_ A task which ~.s Currently in the waiting
stale - frrr example in particular thQ operating system
task BST at the time zero in figuL~~ 1, and the 3ccond
user ~ld5k T2 - is indicated using a hr~k~n line
designated by 13ST 8rid T2, and et c;uirently e~ecutcd
task - Llr~ first user tank Tl at the timR Pro in
FigurQ 1 - i ~ i.ndicazed by an unlat~ukem line designatod
Ly T1.
zn order to represent ~ltm Liming sequenec of
the method according to the invention of a secure
aceQSS 7z tn ~t least one variable, a time aacis t is
p~uvidod on which a first, second, third, tourth and
fifth time tl, t2, t2', t3, t3' arc mark~d.
Fuztha~-more, a momory unit SEl with an access status
mam~ry unit GSE1 at the rust, third and fourth time
l1, t2', t3 is illuotrated, information relating to l.lm
first, currently running ld~k T7. being input in the
memory unit ZSE1, and the memory can be implemented,
for Rxample, a9 part of a v~la~ile memory. Aaaording to
the method according to the i.nvwni:ion, inter alia, d
b.Wc~.ki ng iriformatlvu item SI, a ta3k chang~ information
item WI and a rolaase informai~.i nn item FI Can be lyut
into Lhe access status memory unit ZSEl whir~h ig
aasignod to th~ first, r»rrently running user task T1.

47/27/41 13 ~ 38 FA7C BELL Bf~YD & LOYD LLC IQ Oid
~. _. ,
CA 02360040 2001-07-27
c;H 99 F 112s
Furthermore, Lhe duration of a oocur~ access r~z
to at least onQ 'vari ah1 P by the first uses' L.ask T1,
Which eXtendS r~'um the first time t1 to th~ fourth timR
t3, is illustrated_ At the time Zero, tW Lirst user
'Cask T1 i~ already currently assigned to the prcr.PSSOr
and the second user i-.~ s k '1'2 and the opera Lir~g system
task BST aiw in the waiting Mate. At the first- time
tl, the first user task 'I' I initialises a Secure acces3
to aL least elm variable, i.c. the blocking information
item SZ is inr»i-. into the aCCeSS stdLu~ memory unit
ZSE1 (tl) key the first u3cr task T1 instead ni~ the
r~laase infnrm~fiion item FI which ie input into it.
Then, Llue first, currently e.~ecuted user task T1 i8 in
3n uninterruptible axPC:ution state and c;acs thus access.
the desitwsl variables in a oocured fashion.
At a later., gPaond time 1.2, a task change
request TtnTA is indicated sac 3 result, for Pxamp I P, of
an external Pvent bE, for exartyle the presence of
extermdl messages or ac 3 result of the t.imP period
which 1R aR~igned to the first user Cask T1 by the tack
Sul~~eduler DST being exc~eded and the currently
executed, first user Lask Tl is Llien changed into a
quasi-waiting state wx by the task sched,~1 ~r B5'f. '!'hen.
before the task scheduler BST inii.ldles a task chango
Tw otter the task change r~quast TWR hay hPPn received,
said i-.~gk scheduler BST cliec:ks the contents of the
ac;ur~ss status memory unit ZSE1 (t2' ) - Tt a blocking
information item SI relating Lu a third time t2' is
input in the acces3 memory unit ZSE1(tW ') for the
currently axPCUted, first user Lask T1, the requested
Ldsk change TWA i~ delay~d by the t~!ak scheduler 85T
and ins'tRaci of the bloCkinq lut~rmation SI a task
change informotion item WI is i np»1-. into the acce5a3
stat,m memory unlL Z3E1(t2'~. Then, the first,
3~ currently cxeauted user task T1 is further proc:c~ssed
and the quasi-waiLiy state wz i3 thus terminated a~~in
by the task sch~dulwr BST . 'I'hP first usew l.ask T1 can
thus

07/27/41 13 ~ 38 FAg BELL BOYtt & LOYD LLr_. IQ 415
CA 02360040 2001-07-27
VH 99 p 1129
_ 1
Carry on Ltitt ,secure acces3 (gz) for thQ de~i red
variables withnW it being forced l.v release the
proCeSSOr by Lhe task scheduler HST. In addition, at
the third time t~', the task scheduler BST activates a
time mcillCoring system TM in order to avoid the
processor being blr~rka~l by the secure access gz of the
first uset~ ~d'k T1 for an unaacoptably long time.
At the end r_,t trtP secure access c~z - indicated
by way ct example in Figuro 1 as the fourth time
t3 - the cnntRnts Ot the aCCe55 SldLus memory unit
ZSEl(L3) are firstly eheo)sod for th~ presancp of a task
changQ information item Wr. IL nu task chango
inr~rjudtion item WI hac boen input in the a~~PSS status
memory unit ZSF1 (t:i) , the currently dc;cdc~sing, first
user ~d'k T1 inputs the releas~ information item fI
in>stgad of the present blockirl~t lrifurmation item SI,
and l.he secure acccac gx ie thus terminat.e~.d, i.e, the
currently accessing. first uset task T1 can then b~
iiil.ei.cupted again. The currently acc~sssind, first user
task T1 r_.an then access the pt~cc:rsssol until the task
5clm~luler DST provides fox a task chanc~R TW, i.e. the
time of use ~f the processor which is assigned to tho
titst user task T1 by tho task scha~ltller J35'1' has
expired or ~ task change request TWA is indicated to
l,lw task scheduler HST by an external AvPnt 1';E.
I t . on the c l.~ld~ hand, a tae k change
ir~formation item WT is input, a task ~h~nge request 2WA
is rli rPCaly indicated to l.tm teak scheduler BST - as
Illustrated in Figure 1 - ao that, attar r.he procesaitiy
of the agsociazed technical uYcrating task3, it can be
used to carry out a task change TW. In addition, Ltie
re)aa4e! information ~.tem Fr is input into the accmss
status memory unit ZSE1(t3) by the first user task T1
instead of the iyuL task change information item WT
and after the s~cure access c~~ has been termirm~~~l the
time monitoring ~y~~em TM is deactivated. Furthermore,
the ta3lt scheduler BST which is exevuLes in the
supervisor mode SM

07127101 13 ~ 3$ FAZ BELL BOYD & LOY11 LLC I~ 01B
CA 02360040 2001-07-27
'GR 99 P 1129
- 11 -
extxact5 Ltxc~ ,proaeasor from the first uc~ar tack T1 any)
changes .it to tha wai.tinQ State.
Theu, in the time period between the fourth anc~
the fifth times t3, t:i~ , i:he technical o~e~~dLinr~ tasks
whic;ti die provided by thc~ task aah~duler BST fnr a task
change TW are prn~Pgsed within the sup~rvisvr mode,
i.e. d task change TW is carried out by the ~~Prating
cystam. For the pxPautiori of'the 5~c:und user task T2
whlcal Lhe processor has 3asignad at that ~~ri~.i c:ular
time, the prcaPSSOr is switched over into the user modo
and l.lie ~e~::vnd user task T2 can thus be assigneri t.~ the
processor start~.i ng t=om the fifth time L3' .

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Application Not Reinstated by Deadline 2008-01-11
Time Limit for Reversal Expired 2008-01-11
Deemed Abandoned - Failure to Respond to Maintenance Fee Notice 2007-01-11
Letter Sent 2005-01-17
Request for Examination Received 2005-01-04
All Requirements for Examination Determined Compliant 2005-01-04
Request for Examination Requirements Determined Compliant 2005-01-04
Inactive: Cover page published 2001-12-13
Inactive: First IPC assigned 2001-11-19
Letter Sent 2001-11-19
Inactive: Notice - National entry - No RFE 2001-11-19
Application Received - PCT 2001-11-07
Application Published (Open to Public Inspection) 2000-08-03

Abandonment History

Abandonment Date Reason Reinstatement Date
2007-01-11

Maintenance Fee

The last payment was received on 2005-12-08

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Fee History

Fee Type Anniversary Year Due Date Paid Date
Basic national fee - standard 2001-07-27
Registration of a document 2001-07-27
MF (application, 2nd anniv.) - standard 02 2002-01-11 2001-12-13
MF (application, 3rd anniv.) - standard 03 2003-01-13 2002-12-11
MF (application, 4th anniv.) - standard 04 2004-01-12 2003-12-09
MF (application, 5th anniv.) - standard 05 2005-01-11 2004-12-15
Request for examination - standard 2005-01-04
MF (application, 6th anniv.) - standard 06 2006-01-11 2005-12-08
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
SIEMENS AKTIENGESELLSCHAFT
Past Owners on Record
GERHARD SPITZ
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative drawing 2001-11-22 1 8
Abstract 2001-07-27 1 23
Description 2001-07-27 14 574
Drawings 2001-07-27 1 19
Claims 2001-07-27 2 81
Cover Page 2001-12-13 1 41
Reminder of maintenance fee due 2001-11-19 1 112
Notice of National Entry 2001-11-19 1 195
Courtesy - Certificate of registration (related document(s)) 2001-11-19 1 113
Reminder - Request for Examination 2004-09-14 1 121
Acknowledgement of Request for Examination 2005-01-17 1 176
Courtesy - Abandonment Letter (Maintenance Fee) 2007-03-08 1 175
PCT 2001-07-27 5 169
PCT 2001-07-28 6 274
PCT 2001-07-28 6 235