Abstract:
An audio interruption and buffering playback system includes a primary audio source for reproducing primary audio content and a secondary audio source for reproducing secondary audio content. A processing device detects an interruption event that includes the secondary audio source reproducing secondary audio content having priority over the primary audio source. The processor mutes the output of the primary audio content in response to the interruption event. A buffer buffers the audio content from the primary audio source during the interruption event. The buffered audio content is reproduced by the processor to the user at an accelerated playback speed following the interruption event.
Abstract:
A method and apparatus is provided for validating a plurality of variable data transmitted in an automobile, comprising generating a control copy and a redundant copy of the variable data, calculating a pre-transmittal cross-check measure using the redundant copy of the variable data, and generating a transmittal message using the control copy of the data and the pre-transmittal cross-check measure.
Abstract:
Methods and apparatus are provided for determining the duration a motor vehicle engine may operate while operator authorization is verified in response to an ignition request. In one embodiment the method includes the steps of decrementing a pre-authorization timer from a first predetermined time limit and a maximum authorization timer from a second predetermined time limit in response to the ignition request. Also upon receipt of the ignition request an authorization process is initiated. Decrementing of the pre-authorization timer is halted in response to active operation of the starter motor of the motor vehicle, and operation of the motor vehicle is inhibited if either the pre-authorization timer or the maximum authorization timer decrements to zero before completion of the authorization operation.
Abstract:
A system and method for verifying that operating software and calibration files are present and valid after a bootloader flashes the files into the memory on a vehicle ECU before allowing the operating software to execute. The ECU memory defines a memory segment for the operating software and the calibration files. A software manifest is provided in a memory slot before the operating software segment in the memory. Likewise, a calibration manifest is provided in a memory slot before the calibration segment in the ECU memory. After the software has been flashed into the ECU memory, a software flag is set in the software manifest memory slot and each time a calibration file is flashed, a calibration flag for the particular calibration file is set in the calibration manifest.
Abstract:
A system and method for validating a software file to be installed into a controller. The method includes preparing the software file including assigning a software version code to the software file, assigning a security version code to the software file, and signing the software file with the software file version code and the security version code. The signed software file is presented to the controller for installing on the controller and the controller verifies the software file signature to determine if the software file is valid and the security version code is valid. The controller allows the software file to be installed in the controller if both the signed software file is valid and the security version code is valid.
Abstract:
A method for providing digital signatures for authenticating the source and content of binary files which are flash programmed into automotive embedded controllers. A piece of electronic content is digitally signed on a signing server by creating a hash value and encrypting it using the signer's private key. The content file and digital signature files are then delivered using one of several alternative approaches to a programming tool, which in turn loads the content and signature files onto the controller on which the content will execute. The controller verifies the content by decrypting the signature file to restore the hash value, and comparing the decrypted hash value to a hash value calculated from the content itself. Multiple signature files for a piece of content are supported.
Abstract:
A system and method for implementing cross-network synchronization of nodes on a vehicle bus includes periodically sampling a notion of time from a first network, transmitting a message from the first network to a node on a second network, wherein the message includes the notion of time, and updating a local clock on the second network node based on the notion of time in the message.
Abstract:
A vehicle control module for controlling an actuator unit in response to an input having a first processor, a first communication link coupled to the first processor, and a second processor coupled to the first processor via the first communication link. The first processor is configured to generate a first value based on the input, transmit the first value to the actuator unit, and receive a second value from the actuator unit based on a data received by the actuator unit from the first processor. The first communication link is configured to transfer the input and the second value to the second processor. The second processor is configured to determine a third value based on the input, and verify the first value based on a comparison of the second value with the third value.
Abstract:
A system and method for implementing cross-network synchronization of nodes on a vehicle bus includes periodically sampling a notion of time from a first network, transmitting a message from the first network to a node on a second network, wherein the message includes the notion of time, and updating a local clock on the second network node based on the notion of time in the message.
Abstract:
A system and method for by-passing a security code to allow developmental software to be installed on a production controller without having to authenticate the software. The method includes requesting information from the controller and creating an information ticket in the controller in response to the request that identifies the controller. The information ticket is sent to a secure server that creates an authorization ticket that identifies the controller from the information ticket and creates a security code for the ticket. The authorization ticket is presented to the controller and if the security code is verified by the controller, the controller allows the developmental software to be installed.