G06F8/656

Systems and methods of software load verification
11562073 · 2023-01-24 · ·

A system configured to perform software load verification. The system includes a memory, a network interface, and a processor. The memory is configured to store first data indicating expected load events. The network interface is configured to receive load verification data and a cryptographic signature from a software update target device. The load verification data is descriptive of particular load events related to loading software at the software update target device. The processor is configured to authenticate that the load verification data is received from the software update target device based on the cryptographic signature. The processor is also configured to, responsive to authenticating that the load verification data is received from the software update target device, performing a comparison of the particular load events and the expected load events. The processor is further configured to perform a response action based on results of the comparison.

Systems and methods of software load verification
11562073 · 2023-01-24 · ·

A system configured to perform software load verification. The system includes a memory, a network interface, and a processor. The memory is configured to store first data indicating expected load events. The network interface is configured to receive load verification data and a cryptographic signature from a software update target device. The load verification data is descriptive of particular load events related to loading software at the software update target device. The processor is configured to authenticate that the load verification data is received from the software update target device based on the cryptographic signature. The processor is also configured to, responsive to authenticating that the load verification data is received from the software update target device, performing a comparison of the particular load events and the expected load events. The processor is further configured to perform a response action based on results of the comparison.

Program update system and vehicle management server

A vehicle management server is configured to transmit, to a vehicle, an update program for updating an existing program of an electronic device mounted on the vehicle. The vehicle management server includes a communicator and a controller. The communicator is configured to communicate with the vehicle. The controller is configured to control an update process. The controller is configured to determine, depending on a type of the update program, whether to present, to a vehicle user, an indication related to the update process for the existing program using the update program, and transmit, when the controller determines to present the indication related to the update process to the vehicle user, information for causing a predetermined information terminal to display the indication related to the update process to the vehicle via the communicator.

Program update system and vehicle management server

A vehicle management server is configured to transmit, to a vehicle, an update program for updating an existing program of an electronic device mounted on the vehicle. The vehicle management server includes a communicator and a controller. The communicator is configured to communicate with the vehicle. The controller is configured to control an update process. The controller is configured to determine, depending on a type of the update program, whether to present, to a vehicle user, an indication related to the update process for the existing program using the update program, and transmit, when the controller determines to present the indication related to the update process to the vehicle user, information for causing a predetermined information terminal to display the indication related to the update process to the vehicle via the communicator.

METHOD FOR IMPLEMENTING LINUX KERNEL HOT PATCH, ELECTRONIC DEVICE, AND COMPUTER READABLE MEDIUM
20230016250 · 2023-01-19 ·

A method for implementing LINUX kernel hot patch, an electronic device and a computer readable medium, the method includes: modifying header instruction code of a patched function in an atomic operation mode, and jumping directly or indirectly from a patched function address to a patching function address to activate a patching function. The method for implementing LINUX kernel hot patch can achieve the activation of the patching function without restarting the LINUX system.

METHOD FOR IMPLEMENTING LINUX KERNEL HOT PATCH, ELECTRONIC DEVICE, AND COMPUTER READABLE MEDIUM
20230016250 · 2023-01-19 ·

A method for implementing LINUX kernel hot patch, an electronic device and a computer readable medium, the method includes: modifying header instruction code of a patched function in an atomic operation mode, and jumping directly or indirectly from a patched function address to a patching function address to activate a patching function. The method for implementing LINUX kernel hot patch can achieve the activation of the patching function without restarting the LINUX system.

IMPLEMENTING CHANGES MADE TO SOURCE CODE OF RELOADABLE TYPES AT RUNTIME
20230019235 · 2023-01-19 · ·

Systems and methods for implementing changes made to source code of a program at runtime are provided. In particular, a computing device may execute the source code in a runtime environment and detect changes made to the source code at runtime in the runtime environment. In response to detecting the changes, the computing device may determine if the changes were made to a type in the source code identified as reloadable. In response to determining that the changes were made to the type in the source code identified as reloadable, the computing device may create a new version of the type and perform implementation of the changes to the source code at runtime using the new version of the type.

IMPLEMENTING CHANGES MADE TO SOURCE CODE OF RELOADABLE TYPES AT RUNTIME
20230019235 · 2023-01-19 · ·

Systems and methods for implementing changes made to source code of a program at runtime are provided. In particular, a computing device may execute the source code in a runtime environment and detect changes made to the source code at runtime in the runtime environment. In response to detecting the changes, the computing device may determine if the changes were made to a type in the source code identified as reloadable. In response to determining that the changes were made to the type in the source code identified as reloadable, the computing device may create a new version of the type and perform implementation of the changes to the source code at runtime using the new version of the type.

ROLL BACK OF DATA DELTA UPDATES
20230221950 · 2023-07-13 · ·

Disclosed embodiments relate to adjusting vehicle Electronic Control Unit (ECU) software versions. Operations may include receiving a prompt to adjust an ECU of a vehicle from executing a first version of ECU software to a second version of ECU software; configuring, in response to the prompt and based on a delta file corresponding to the second version of ECU software, the second version of ECU software on the ECU in the vehicle for execution; and configuring, in response to the prompt, the first version of ECU software on the ECU in the vehicle to become non-executable.

ROLL BACK OF DATA DELTA UPDATES
20230221950 · 2023-07-13 · ·

Disclosed embodiments relate to adjusting vehicle Electronic Control Unit (ECU) software versions. Operations may include receiving a prompt to adjust an ECU of a vehicle from executing a first version of ECU software to a second version of ECU software; configuring, in response to the prompt and based on a delta file corresponding to the second version of ECU software, the second version of ECU software on the ECU in the vehicle for execution; and configuring, in response to the prompt, the first version of ECU software on the ECU in the vehicle to become non-executable.