Patent classifications
G06F8/66
Method and system for securely patching read-only-memory code
A secure read-only-memory (ROM) code patching system includes a processor that is configured to generate first partial cryptographic data based on a ROM patch and a set of secret bits, and authenticate the ROM patch based on a match between the first partial cryptographic data and reference partial cryptographic data of the ROM patch. Upon the authentication of the ROM patch, the processor is further configured to generate an address associated with a set of ROM instructions of a ROM code. Based on a match between the generated address and a ROM patch address of the ROM patch, the processor is further configured to execute a set of patch instructions of the ROM patch that is successfully authenticated instead of the set of ROM instructions, thereby securely patching the ROM code.
Continuous in-place software updates with fault isolation and resiliency
Methods and systems facilitate continuous processing of incoming data while one or more software components are updated and/or are temporarily unavailable. Computing tasks may be divided into idempotent steps with the computational state exchanged between steps saved in a persistent manner. In various embodiments, these steps are assembled into one or more computation pipelines.
PUSHING A FIRMWARE UPDATE PATCH TO A COMPUTING DEVICE VIA AN OUT-OF-BAND PATH
A host computing device includes a host processor, host memory in electronic communication with the host processor, and an auxiliary service controller. The host computing device also includes a communication interface and a messaging interface between the host processor and the auxiliary service controller. A message handler is stored in the host memory. The message handler is executable by the host processor in response to detecting a messaging interface signal on the messaging interface. Execution of the message handler by the host processor causes a firmware update patch to be read from a shared memory region in the auxiliary service controller via the communication interface.
Self-healing learning system for one or more controllers
Disclosed embodiments relate to automatically providing updates to at least one vehicle. Operations may include receiving, at a server remote from the at least one vehicle, Electronic Control Unit (ECU) activity data from the at least one vehicle, the ECU activity data corresponding to actual operation of the ECU in the at least one vehicle; determining, at the server and based on the ECU activity data, a software vulnerability affecting the at least one vehicle, the software vulnerability being determined based on a deviation between the received ECU activity data and expected ECU activity data; identifying, at the server, an ECU software update based on the determined software vulnerability; and sending, from the server, a delta file configured to update software on the ECU with a software update corresponding to the identified ECU software update.
DETECTING ANOMALIES USING REAL-TIME CONTROLLER PROCESSING ACTIVITY
Disclosed embodiments relate to performing updates to Electronic Control Unit (ECU) software while an ECU of a vehicle is operating. Operations may include receiving, at the vehicle while the ECU of the vehicle is operating, a software update file for the ECU software; writing, while the ECU is operating, the software update file into a first memory location in a memory of the ECU while simultaneously executing a code segment of existing code in a second memory location in the memory of the ECU; and updating a plurality of memory addresses associated with the memory of the ECU based on the software update file and without interrupting the execution of the code segment currently being executed in the second memory location in the memory of the ECU.
Non-Volatile Memory Updating Apparatus and Method
A non-volatile memory updating apparatus updates an application code stored in a non-volatile memory and includes a volatile memory storing the application code; and a central processing unit recording the application code recorded in the volatile memory and a booting indicator indicating booting information of the application code in the non-volatile memory.
SYSTEMS AND METHODS FOR PROACTIVELY STAGING PREBOOT FIRMWARE COMPONENTS FOR OFFLINE UPDATE AND REMEDIATION
An information handling system may include a processor, a memory communicatively coupled to the processor, and a basic input/output system (BIOS) communicatively coupled to the processor and comprising a program of executable instructions configured to, when read and executed by the processor: monitor diagnostics information associated with one or more information handling resources of the information handling system, from the diagnostics information, determine whether a trigger point associated with a prescription for initiating a firmware update has been reached, and responsive to the trigger point being reached, perform a remedial action as defined by the prescription.
PROGRAM UPDATE SYSTEM AND VEHICLE MANAGEMENT SERVER
A vehicle management server is configured to transmit, to a vehicle, an update program for updating an existing program of an electronic device mounted on the vehicle. The vehicle management server includes a communicator and a controller. The communicator is configured to communicate with the vehicle. The controller is configured to control an update process. The controller is configured to determine, depending on a type of the update program, whether to present, to a vehicle user, an indication related to the update process for the existing program using the update program, and transmit, when the controller determines to present the indication related to the update process to the vehicle user, information for causing a predetermined information terminal to display the indication related to the update process to the vehicle via the communicator.
Apparatus and method for controlling update of vehicle
An apparatus and a method for controlling firmware update of a vehicle are provided. The apparatus may include a state manager configured to manage state information regarding a plurality of controllers included in the vehicle, a control device configured to determine whether to perform an update based on the state information when an ignition of the vehicle is turned off, and an update manager configured to perform a reprogramming operation on at least one controller of the plurality of controllers depending on whether to perform the update.
Vehicle control apparatus
A vehicle control apparatus including: a storage portion configured to store therein a vehicle control software for controlling a vehicle; a receiving portion configured to receive an update software from an external server; and an updating portion configured to update the vehicle control software stored in the storage portion, to the update software received by the receiving portion. The updating portion is configured to determine whether the vehicle is in a long-time requiring state that requires a long time for making a repair of the vehicle which is needed in case update of the vehicle control software is not successfully completed. The updating portion is configured to execute the update of the vehicle control software when determining that the vehicle is not in the long-time requiring state, and is configured to withhold the update of the vehicle control software when determining that the vehicle is in the long-time requiring state.