HARDWARE-BASED SENSOR ANALYSIS
20230229549 · 2023-07-20
Inventors
Cpc classification
H04Q9/00
ELECTRICITY
H04Q2209/823
ELECTRICITY
G06F11/0733
PHYSICS
International classification
Abstract
A method of monitoring messages from a sensor using an integrated circuit is provided. The messages include data measured by that sensor. The method includes reading a first message from interconnect circuitry of the integrated circuit. The interconnect circuitry connects the sensor to one or more core devices configured to process the messages. A first hash value is calculated for the first message. The first hash value is compared to one or more prior hash values stored in a hash store. Each prior hash value of the one or more prior hash values corresponds to a message that was read from the interconnect circuitry prior to the first message. A corrective action is performed when a difference between the first hash value and at least one of the prior hash values stored in the hash store is below a predetermined threshold.
Claims
1. A method of monitoring messages from a sensor using an integrated circuit, the messages comprising data measured by the sensor, the method comprising: reading a first message from interconnect circuitry of the integrated circuit, the interconnect circuitry connecting the sensor to one or more core devices configured to process the messages; calculating a first hash value for the first message; comparing the first hash value to one or more prior hash values stored in a hash store, each prior hash value of the one or more prior hash values corresponding to a message that was read from the interconnect circuitry prior to the first message; and performing a corrective action when a difference between the first hash value and at least one of the prior hash values stored in the hash store is below a predetermined threshold.
2. The method of claim 1, further comprising storing the first hash value in the hash store.
3. The method of claim 2, wherein the first hash value is stored in the hash store simultaneously with the comparison of the first hash value to the one or more prior hash values.
4. The method of claim 1, further comprising buffering the first message before the first message is read by the one or more core devices.
5. The method of claim 4, wherein a size of a buffer corresponds to a number of data values that are used to calculate a data hash comprising the first hash value.
6. The method of claim 1, further comprising: comparing the first hash value to a number M of prior hash values; and performing a corrective action when the difference between the first hash value and P prior hash values is below the predetermined threshold, where 1<P<M.
7. The method of claim 6, further comprising deriving a confidence value corresponding to the P prior hash values for which the difference between the first hash value and each value of the P prior hash values is below the predetermined threshold.
8. The method of claim 6, wherein M is dynamically configurable.
9. The method of claim 1, further comprising performing a corrective action when the first hash value is the same as at least one of the prior hash values stored in the hash store.
10. The method of claim 1, further comprising: calculating a plurality of hash values for the first message, each hash value of the plurality of hash values representing a portion of the first message; and comparing each hash value of the plurality of hash values for the first message to one or more prior hash values that correspond to the portion of the first message.
11. The method of claim 10, wherein the plurality of hash values calculated for the first message represent overlapping portions of the first message.
12. The method of claim 10, wherein the plurality of hash values calculated for the first message represent non-overlapping portions of the first message.
13. The method of claim 1, wherein the interconnect circuitry further connects the sensor to a memory, and the memory stores messages transmitted by the sensor.
14. The method of claim 1, wherein the corrective action comprises informing a user that the sensor data is not reliable, disactivating components of the integrated circuit that depend on data obtained from the sensor, activating a mechanism configured to repair the sensor, or any combination thereof.
15. The method of claim 1, wherein the corrective action comprises outputting an alert signal to another component of the integrated circuit.
16. The method of claim 1, wherein the corrective action comprises outputting a hardware event, outputting an interrupt signal, or outputting a message to an external core device.
17. The method of claim 1, wherein the sensor is an image sensor, and each message that is read from the interconnect circuitry is a frame that is captured by the image sensor.
18. The method of claim 1, wherein the integrated circuit is a system on chip.
19. The method of claim 1, wherein the interconnect circuitry is a data bus.
20. An integrated circuit chip for monitoring messages from a sensor, the messages comprising data measured by the sensor, the integrated circuit chip comprising: interconnect circuitry connecting the sensor to a core device configured to process the messages; a monitoring device configured to read a first message of the messages from the interconnect circuitry; a hash store configured to store a plurality of prior hash values, each hash value of the plurality of prior hash values corresponding to a message that was read from the interconnect circuitry prior to the first message; and a processor configured to: calculate a first hash value for the first message; and compare the first hash value to one or more prior hash values of the plurality of prior hash values stored in the hash store; wherein the integrated circuit is configured to perform a corrective action when a difference between the first hash value and at least one prior hash value of the plurality of prior hash values stored in the hash store is below a predetermined threshold.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
DETAILED DESCRIPTION
[0034]
[0035]
[0036]
[0037] As well as the sensor 202, the SoC 100 is also connected to a memory 204. The sensor 202 is therefore connected to the memory 204 by the SoC 100. In
[0038] As with
[0039] Master devices are devices that initiate traffic, such as read/write requests in a network. Examples of master devices are processors such as a digital signal processor (DSP), video processor, applications processor, central processor unit (CPU), and graphics processor unit (GPU). Any programmable processor may be a master device. Other examples of master devices are those with direct memory access (DMA) capability, such as conventional DMAs for moving data from one location to another, autonomous coprocessors with DMA capability (e.g., an encryption engine), and peripherals with DMA capability (e.g., an Ethernet controller).
[0040] Slave devices are devices that respond to the commands of the master devices. Examples of slave devices are on-chip memories, memory controllers for off-chip memories (e.g., DRAM), and peripheral units.
[0041] The topology of the interconnect circuitry 206 is SoC dependent. For example, the topology of the interconnect circuitry 206 may include any one or combination of the following types of network to transport communications around the system circuitry: a bus network, a ring network, a tree network, or a mesh network. In one example, the interconnect circuitry is a data bus.
[0042] As mentioned above, the core devices 208, 210, 212 of system circuitry 102 are configured to process data messages recorded by the sensor 202. The core devices 208, 210, 212 perform this data processing using suitable system software. In order for the data messages to be processed, the data messages are first written to the memory 204. In other words, once the data messages have been written to the memory 204, the data messages may be read by one or more core devices 208, 210, 212 for processing. The data may be processed by software included within the one or more core devices 208, 210, 212 by comparing a recently obtained data value to prior data values that are stored in the memory 204. In one example, a similarity between the data values obtained from consecutive data messages indicates the occurrence of a sensor failure. In other words, the sensor 202 may record recurring data values where the conditions in the system within which the sensor is implemented are changing. In the example where the sensor 202 is an image sensor, the detection of recurring data values that are recorded by the sensor may indicate that the image sensor includes a defective, or stuck, pixel.
[0043] A disadvantage of using system circuitry 102 to process data messages recorded by the sensor 202 is that it results in a significant time delay from the failure of a sensor to the detection of this failure. In other words, the sensor data is to be written into memory 204 before the sensor data may be read and processed by the software included within the core devices 208, 210, 212. The time taken to store and process data messages may be on the order of tens of milliseconds to hundreds of milliseconds. This is too slow for some integrated systems, which require faster failure detection mechanisms to allow a suitable amount of time for a reaction to a sensor failure to be implemented.
[0044] In order to provide a faster method of monitoring data messages recorded by the sensor 202, monitoring circuitry 104 includes one or more monitoring devices 214, 216, 218. The monitoring devices 214, 216, 218 are connected to interconnect circuitry 206. The monitoring devices 214, 216, 218 are configured to read data messages from the interconnect circuitry 206. The data messages from the interconnect circuitry 206 are messages that have been transmitted by the sensor 202 across the interconnect circuitry 206 before the messages arrive at the memory 204. These data messages are read by the core devices 208, 210, 212 without extracting the data messages from the interconnect circuitry 206. Instead of the system software that is used by the core devices 208, 210, 212, the monitoring devices 214, 216, 218 are configured to read and subsequently process data messages using an arrangement of hardware components.
[0045] The monitoring devices 214, 216, 218 may be configured to selectively read only data messages that have been transmitted by the sensor 202. In other words, the monitoring devices 214, 216, 218 may be configured to filter out all messages that are not data messages from the sensor, and that are transmitted across the interconnect circuitry 206, if such messages are present. The monitoring devices 214, 216, 218 are further configured to read these data messages autonomously, without any software intervention. In one example, messages transmitted across the interconnect circuitry 206 may be accompanied by a flag identifying the module from which the messages have been transmitted. The monitoring devices 214, 216, 218 may be configured to filter out messages that are not data messages transmitted by the sensor 202 by observing this identification flag. In other words, the monitoring devices 214, 216, 218 may selectively read only data messages including a flag identifying the sensor 202 as the module from which the data messages have been transmitted. In another example, the messages transmitted across the interconnect circuitry 206 are accompanied by a flag indicating the module to which the messages are to be written. The monitoring devices 214, 216, 218 may therefore selectively read only data messages including a flag identifying an address within the memory 204 to which the data messages are to be written.
[0046] Although in
[0047] In addition to the interconnect circuitry 206, the monitoring devices 214, 216, 218 are connected to an output module 220. The output module 220 is configured to perform a corrective action if the one or more monitoring devices 214, 216, 218 determine that the data values included within the data messages are indicative of a sensor failure. In other words, the monitoring devices 214, 216, 218 are configured to instruct the output module 220 to perform a corrective action if the monitoring devices 214, 216, 218 determine that the data values included within the data messages are indicative of a sensor failure. In
[0048]
[0049] The processor 302 of monitoring device 214 is configured to calculate a first hash value for a first message that is received from the interconnect circuitry 102. The hash store 304 is a memory storage that is configured to store a plurality of prior hash values, where each stored hash value corresponds to a message that was read from the interconnect circuitry prior to the first message. The processor 302 is further configured to compare the at least one hash value that has been calculated for the first message to one or more of the prior hash values stored in the hash store 304. If processor 302 determines that the difference between the first hash value and at least one of the prior hash values stored in the hash store is below a predetermined threshold that is identified by the processor 302, the processor outputs a signal to the communicator 306. On receiving this signal, the communicator 306 is then configured to instruct an output module 220 connected to the integrated circuit to perform a corrective action.
[0050] The processor 302 of the monitoring device 214 further includes a data buffer 308 that is connected to a hash calculator 310. In addition to the data buffer 308, the hash calculator 310 is connected to both a current hash selector 312 and a comparator 314. Both the current hash selector 312 and the comparator 314 are connected to the hash store 304. The comparator 314 is further connected to the communicator 306.
[0051] The data buffer 308 is configured to receive data messages that are read from the interconnect circuitry 206, and to store those received data messages for a short period of time. The data buffer 308 then transfers the received data messages to the hash calculator 310. As has been summarized above, a first data message that is received by the data buffer 308 is a data message that has been read from the interconnect circuitry 206 before that data message has been received by and written to the memory 204 connected to the integrated circuit chip 100. Thus, the data buffer 308 receives a first data message before that data message is read from the memory 204 by the one or more core devices 208, 210, 212.
[0052] The data buffer 308 may be of a predetermined size. In one example, the size of the data buffer 308 is the same as the size of the data messages that are received by that buffer. In other words, the size of the data buffer 308 is the same as the size of a first message received by the buffer. The data buffer 308 is therefore configured to store only a data message recorded at one clock cycle. In an alternative example, the size of the data buffer 308 is the size of only a subset of data values that are included within the first data message. In this alternative example, the size of the buffer corresponds to the size of the hash that is calculated by the hash calculator 310. The data buffer 308 is therefore configured to store only a subset of data values included within one data message at any one clock cycle. The hash size is described in further detail below.
[0053] The hash calculator 310 is configured to calculate one or more data hash for each data message that is received from the data buffer 308. Each data hash includes a hash value that represents the data values from the message used to calculate that hash. It has been mentioned above that each data message that is received from the data buffer 308 includes one or more distinct data values. Each data message may therefore include a plurality of data values. In one example, the hash calculator 310 is configured to calculate one data hash for all of the data values of a received data message. In an alternative example, the hash calculator 310 is configured to calculate a plurality of data hashes for each received data message. In this alternative example, for a first data message, each hash value is calculated for a subset of data values of that data message. The subset may include one or more data values from the first data message. In other words, each hash value that is calculated for the first data message represents a portion of that data message.
[0054] Each data hash that is calculated by the hash calculator 310 is of a predefined hash size, where the hash size indicates the number of data values that are used to calculate that hash. The hash size is configurable by an operator of the integrated circuit chip. In one example, the hash size is configurable by the operator at the instantiation time of the integrated circuit chip 100. In an alternative example, the hash size is configurable dynamically. In other words, the hash size is configurable during operation of the integrated circuit chip 100.
[0055] In an example where the sensor is an image sensor, each data message that is read from the interconnect circuitry 206 is an image frame. Each data value of a given message may therefore be a pixel of an image frame. Thus, in one example, the hash calculator 310 is configured to calculate a data hash for all of the pixels of a first image frame. In an alternative example, the hash calculator 310 is configured to calculate a data hash for each of a defined subset of pixels of the first image frame.
[0056] In the example in which the hash calculator 310 is configured to calculate more than one data hash for each data message received from the data buffer 308, the hash calculator 310 may use the data values of a data message to form either a rolling or a non-overlapping input to form these hash values. A rolling input is one in which there is a significant overlap in the data values that are used to calculate consecutive hashes. In other words, the hashes calculated for each data message represent overlapping subsets of data, or portions, of that message. An example of a set of data hashes obtained from rolling inputs is demonstrated as follows:
H.sub.1=ƒ(X.sub.1,X.sub.2 . . . X.sub.N)
H.sub.2=ƒ(X.sub.2,X.sub.3 . . . X.sub.N+1)
H.sub.3=ƒ(X.sub.3,X.sub.4 . . . X.sub.N+2)
[0057] In the above demonstration, H.sub.1, H.sub.2, and H.sub.3 are each indicative of a value of a data hash obtained from a subset of data values X.sub.1, X.sub.2 . . . X.sub.N+2 in a first data message Y.sub.1. In the example provided above, the inputs to data hash H.sub.1 and data hash H.sub.2 differ by 1 data value. Similarly, the inputs to data hash H.sub.2 and data hash H.sub.3 differ by 1 data value. In alternative examples, the inputs between consecutive data hashes may differ by a greater number of data values.
[0058] A non-overlapping input is one in which there is no overlap between the data values that are used to form consecutive hash values. In other words, hash values calculated for each data message represent non-overlapping portions of that message. An example of a set of data hashes obtained from non-overlapping inputs is demonstrated as follows:
H.sub.1=ƒ(X.sub.1,X.sub.2 . . . X.sub.N)
H.sub.2=ƒ(x.sub.N+1,X.sub.N+2 . . . X.sub.2N)
H.sub.3=ƒ(X.sub.2N+1,X.sub.2N+2,X.sub.3N)
[0059] In the above demonstration, H.sub.1, H.sub.2, and H.sub.3 are each indicative of a value of a data hash obtained from a subset of data values X.sub.1, X.sub.2 . . . X.sub.3N in a first data message Y.sub.1.
[0060] The hash store 304 is a memory store that is configured to store a plurality of prior hash values that have been calculated by the hash calculator 310 prior to the receipt of a first data message. The hash store 304 includes a plurality of entries 316, 318, 320 for storing prior hash values calculated by the hash calculator 310.
[0061] Each prior hash value that is stored in the hash store 304 corresponds to a data message that has been read by the monitoring device 214 from the interconnect 102 prior to a first data message that is received by the data buffer 308. For each hash value that is calculated for the first data message, the hash store stores prior hash values that have been calculated for the same subset of data values as the subset of data values that have been used to calculate the one or more hash values for a data message, but for a prior clock cycle. For example, a first data message that is recorded by the sensor 202 for a first clock cycle, T, may be represented by the reference Y.sub.1, T. A first hash value that is calculated from that first data message by the hash calculator 310 may be represented by the reference H.sub.1, T. The entries 316, 318, 320 may therefore store prior hash values corresponding to data messages Y.sub.1, T−1, Y.sub.1, T−2 . . . Y.sub.1, T−N that have been recorded prior to the first data message Y.sub.1, T These hash values may be represented as H.sub.1, T−1, H.sub.1, T−2 . . . H.sub.1, T−N. For example, a first prior hash value H.sub.1, T−1 may be stored in first entry 316. The hash store may store hash values for any number of prior clock cycles in which data has been received.
[0062] Note that, in an alternative example, a first hash value H.sub.1, T may be calculated by the hash calculator 310 for only a subset of data values X.sub.1, T, X.sub.2, T . . . X.sub.N, T included within the first message Y.sub.1, T.
[0063] Once a first hash value H.sub.1, T for a first data message Y.sub.1, T has been calculated by the hash calculator 310, the first hash value H.sub.1, T for a first data message Y.sub.1, T is transmitted to both the current hash selector 312 and the comparator 314. The current hash selector 312 is configured to receive a hash value for a data hash that has been calculated by the hash calculator 310, and to use that hash value to look up corresponding prior hash values that are stored in the hash store 304. A corresponding prior hash value is a hash value that has been calculated for the subset of data used to form the first data message or portion of the first data message that has been used to calculate the first hash value, but for a different prior window (e.g., for a first hash value H.sub.1, T that is calculated for a first data message Y.sub.1, T, the corresponding prior hash values are H.sub.1, T−1, H.sub.1, T−2, and so on). In other words, the one or more prior hash values H.sub.1, T−1, H.sub.1, T−2, etc. are prior hash values that correspond to the first message Y.sub.1, T that is used to generate the first hash H.sub.1, T. Once the corresponding prior hash values in the hash store 304 have been identified, those values are transmitted to the comparator 314.
[0064] The comparator 314 is connected to both the hash store 304 and the hash calculator 310. The comparator is thus configured to receive both the first hash values H.sub.1, T calculated by the hash calculator 310, and the corresponding prior hash values from the hash store 304. The comparator 314 is further configured to compare the first hash value H.sub.1, T received from the hash calculator 310 with one or more corresponding prior hash values stored in the hash store 304. If a first hash value H.sub.1, T represents a hash value for a first data message Y.sub.1,T for a first clock cycle T, then that hash value will first be compared against prior hash value H.sub.1, T−1. H.sub.1, T may then be compared against prior hash value H.sub.1, T−2, until H.sub.1, T−M, where M is the total number of prior hash values to be compared against first hash value H.sub.1, T. The number of prior hash values, M, that are compared to the first hash value is configurable by an operator of the integrated circuit chip. In one example, M is configurable at the instantiation time of the integrated circuit chip 100. In an alternative example, M is dynamically configurable. In other words, M is configurable during operation of the integrated circuit chip 100.
[0065] The comparator 314 is configured to compare the difference in the hash value of the first data hash H.sub.1, T and each prior hash value H.sub.1, T−2 . . . H.sub.1, T−M to a predetermined threshold value W.sub.1. The value of the predetermined threshold may be stored in the monitoring device 214. In one example, the value of the predetermined threshold is stored in an additional memory of the monitoring device (not shown). This additional memory may alternatively be included within the hash store 304, or in a memory of the comparator 314. Further, the predetermined threshold may be stored at an alternative location within the processor 302, or the monitoring device 214 in general. The comparator 314 is further configured to determine whether the difference between the first hash value H.sub.1,T and at least one of the prior hash values H.sub.1,T−2 . . . H.sub.1,T−M stored in the hash store is below the predetermined threshold W.sub.1. In other words, the comparator is configured to determine whether |H.sub.1−H.sub.1, T−Z|<W.sub.1, where Z=1, 2 . . . M.
[0066] In one example, the monitoring device 214 is configured to perform a corrective action if it is determined that the difference between the first hash value H.sub.1, T and one prior hash value is below the predetermined threshold W.sub.1. In this example, the first hash value is compared to only the hash value that immediately precedes that hash value. If |H.sub.1−H.sub.1, T−1|<T.sub.1, a corrective action is performed.
[0067] In an alternative example, the monitoring device 214 is configured to perform a corrective action if it is determined that the difference between the first hash value H.sub.1, T and a plurality of prior hash values is below the predetermined threshold W.sub.1. In this example, the number of prior hash values P for which the difference between the first hash value and each prior hash value is below the predetermined threshold is predefined by the monitoring device 214. This number of prior hash values P is defined as a fraction of M, where M is the total number of prior hash values to be compared against first hash value H.sub.1, T by the comparator 314. Thus, 1<P<M. As an example, P may be equal to M/2. So, if the number of prior hash values for which |H.sub.1−(H.sub.1, T−Z)|<W.sub.1 is greater than M/2, a corrective action is performed.
[0068] If it is determined that the difference between the first hash value H.sub.1,T and at least one of the prior hash values stored in the hash store 304, as defined above, is below the predetermined threshold W.sub.1, the comparator 314 outputs a signal to communicator 306. The communicator 306 is configured to communicate with one or more output modules 220 that are external to the monitoring device 214. The communicator 306 is therefore responsible for transmitting instructions to the output modules. The instructions are indicative of a corrective action that is to be performed by the system.
[0069] The corrective action that is instructed by the communicator 306 may include one or more of the following actions: informing a user that the sensor data is not reliable; disactivating components of the integrated circuit 100 that depend on data obtained from the sensor 202; activating a mechanism that is configured to repair the sensor 202; outputting an alert signal to another component of the integrated circuit 100; outputting a hardware event; outputting an interrupt signal; and outputting a message to an external core device 208, 210, 212.
[0070] The current hash selector 312 is further configured to insert the first hash value H.sub.1, T into the hash store 304. Once inserted into the hash store 304, the first hash value becomes a prior hash value. That prior hash value may then be used for comparison to future hash values that are calculated from incoming data messages read from the interconnect circuitry 206. In one example, the first hash value H.sub.1, T is inserted into the hash store by the current hash selector 312 whilst the first hash value H.sub.1, T is being compared to corresponding prior hash values by the comparator 314. In other words, the comparison of the first hash value H.sub.1, T to the corresponding prior hash values and the storing of that hash value in the hash store 304 occur simultaneously. In an alternative example, the first hash value H.sub.1, T is stored in the hash store after the first hash value H.sub.1, T has been processed by the comparator 314. In other words, the comparison and storing of a first hash value may happen either within the same clock cycle, or within consecutive clock cycles.
[0071] The integrated circuit chip illustrated in
[0072]
[0073] The interconnect circuitry of system circuitry 102, as illustrated in
[0074] The SoC interconnect 414 is connected to core devices 406, 408, 410, 418, 420, the sensor controller 416, and the memory controller 412. The SoC interconnect 414 is therefore responsible for transferring data messages between the sensor 402 (e.g., via the sensor controller 416), the memory 404, and the core devices 406, 408, 410, 418, 420. The topology of the SoC interconnect is SoC dependent but may include any one or combination of the following types of network to transport communications around the system circuitry: a bus network, a ring network, a tree network, or a mesh network. In one example, the SoC interconnect 414 is a data bus.
[0075] Both the system circuitry 102 and the monitoring circuitry 104 illustrated in
[0076] The analytics CPU is connected to the one or more monitoring devices 422, 424, 426 by a message engine 428 and an internal communicator 430. The message engine 428 connects all components of the monitoring circuitry together and is configured to transmit messages between these components. As with the SoC interconnect 414, the topology of the message engine is SoC dependent but may include any one or combination of the following types of network to transport communications around the system circuitry: a bus network, a ring network, a tree network, or a mesh network. In one example, the message engine 428 is a data bus. The internal communicator 430 is configured to relay messages between the analytics CPU and the message engine 428.
[0077] Output module 436 is an external debugger. The external debugger 436 is used to resolve defects or problems within the integrated circuit chip 100 or surrounding system that is responsible for the sensor failure. Tactics used by the external debugger 436 may include interactive debugging, control flow analysis, unit testing, integration testing, log file analysis, monitoring at the application or system level, memory dumps, and/or profiling. The external debugger 436 is connected to the message engine 428 by an external communicator 434. The external communicator 434 is configured to relay messages between the external debugger 436 and the message engine 428.
[0078]
[0079] At act 504, the hash calculator 310 of processor 302 of the monitoring device 214 calculates a first data hash, with hash value H.sub.1, T, for the first data message Y.sub.1, T. As summarized above, the first hash value H.sub.1, T may represent all of the data values that are in a received data message or may alternatively represent only a subset of data values included within that data message. Once the first hash value H.sub.1, T has been calculated, that hash value is transmitted to the current hash selector 312. The current hash selector 312 uses the first hash value H.sub.1, T to look up corresponding prior hash values that are stored in the hash store 304. Those corresponding prior hash values are read from the hash store 304 by the comparator 314.
[0080] At act 506, the comparator 314 compares the first hash value H.sub.1, T to one or more prior hash values H.sub.1, T−1 . . . H.sub.1, T−M stored in a hash store 304. As described above, each prior hash value stored in the hash store corresponds to a data message that was read from the interconnect circuitry 206 prior to the first data message. In one example, the first hash value is compared to only one prior hash value H.sub.1, T−1. In an alternative example, the first hash value is compared to a plurality of consecutive prior hash values H.sub.1, T−1 to H.sub.1, T−M. The difference between the first hash value H.sub.1, T and the one or more prior hash values H.sub.1, T−1 . . . H.sub.1, T−M is then compared to a predetermined threshold that is stored within the monitoring device 214.
[0081] At act 508, the comparator 314 compares the difference between the first hash value H.sub.1, T and the one or more prior hash values H.sub.1, T−1, H.sub.1, T−2 . . . H.sub.1, T−M to the predetermined threshold W.sub.1. If the comparator 314 determines that the difference between the first hash value and at least one of the one or more prior hash values is less than the predetermined threshold W.sub.1, the method proceeds to act 510 at which the communicator 306 instructs an output module 220 of the integrated circuit to perform a corrective action. In response to this instruction, the output module 220 performs a corrective action. If the comparator 314 determines that the difference between the first hash value and the one of the one or more prior hash values is not less than the predetermined threshold W.sub.1 (e.g., that the difference is greater than or equal to W.sub.1), then no instruction is transmitted by the communicator 306. Thus, the one or more output modules 220 does not perform a corrective action. The method instead skips act 510 and proceeds to act 512.
[0082] At act 510, if the comparator 314 determines that the difference between the first hash value and at least one of the prior hash values is below the predetermined threshold, then the comparator outputs a signal to the communicator 306. On receiving this signal, the communicator 306 instructs the performance of a corrective action. In other words, the communicator 306 transmits one or more instructions to one or more modules that are external to the monitoring device 214. The instructions are indicative of a corrective action that is to be performed by the system.
[0083] At act 512, the first hash value H.sub.1, T is stored in the hash store 304. The first hash value therefore becomes a prior hash value and may be compared to subsequent incoming hash values to determine whether these subsequent hash values indicate the occurrence of a sensor failure. The method then proceeds to act 514, where Y.sub.1, T is replaced with Y.sub.1, T+1 as an input to act 502. In other words, a data message that is recorded by the sensor at a subsequent clock cycle to the clock cycle at which Y.sub.1, T is recorded is received by the data buffer 308. The subsequent data message Y.sub.1,T+1, is used by the hash calculator 310 to calculate a new hash value H.sub.1,T+1 at act 504, and that new hash value is compared to prior hash values H.sub.1,T, H.sub.1,T−1, H.sub.1,T−2 . . . H.sub.1,T−M, and so on.
[0084] The method illustrated in
[0085] Acts 602 to 604 of
[0086] At act 608, the comparator 314 compares the difference between the first hash value H.sub.1, T and a prior hash value H.sub.1, T−z, where Z=1, 2 . . . M. If the comparator 314 determines that H.sub.1, T is equal to H.sub.1,T−Z, or in other words whether |H.sub.1, T−H.sub.1,T−Z|=0, the method proceeds to act 610, at which the communicator 306 instructs an output module 220 of the integrated circuit to perform a corrective action. In response to this instruction, the output module 220 performs a corrective action. If the comparator 314 determines that H.sub.1, T is not equal to H.sub.1,T−Z, or in other words that |H.sub.1, T−H.sub.1,T−Z|>0, then no instruction is transmitted by the communicator 306. Thus, the one or more output modules 220 do not perform a corrective action. The method instead skips act 610 and proceeds to act 612.
[0087] Acts 610 to 614 of
[0088] As mentioned above, in one example, the comparator 314 determines whether the difference between the first hash value and each prior hash value for a predetermined number of prior hash values P has been met, where P is defined as a fraction of M. M is the total number of prior hash values to be compared against first hash value H.sub.1,T by the comparator 314. In a further implementation of this example, the comparator 314 may compare the number of prior hash values for which |H.sub.1−H.sub.1, T−Z|<W.sub.1 to a plurality of predefined numbers of hash values P.sub.1, P.sub.2 . . . P.sub.N. Each predefined number P.sub.1 corresponds to a confidence value indicating how certain the monitoring device is that a sensor failure has occurred. In other words, the comparator 314 may derive a first predefined number P.sub.1, where P.sub.1=M/2. So, if the number of prior hash values for which |H.sub.1−H.sub.1, T−Z|<W.sub.1 is greater than P.sub.1, the comparator may determine that it is “very confident” that a sensor failure has occurred. The comparator 314 may further derive a second predefined number P.sub.2, where P.sub.2=M/4. So, if the number of prior hash values for which −H.sub.1−H.sub.1, T−Z|<W.sub.1 is less than P.sub.1 but greater than P.sub.2, the comparator 314 may determine that it is “somewhat confident” that a sensor failure has occurred. The comparator 314 may have access to any amount of predefined numbers P.sub.1, P.sub.2 . . . P.sub.N, where each predefined number is associated with a confidence value that indicates a different likelihood that a sensor failure has occurred. The predefined numbers and corresponding confidence levels may be stored in a memory within the monitoring device 214.
[0089] As has been mentioned above, in one example, the sensor that is connected to the integrated circuit chip is a camera, and each data message that is read by the one or more monitoring devices of the integrated circuit chip is an image frame that has been captured for a first clock cycle T. In this example, the integrated circuit chip, and, for example, the one or more monitoring devices, may be used to monitor the occurrence of stuck pixels in a frame. In other words, if the comparator 314 of the processor 302 of monitor 214 determines that the difference between the first hash value H.sub.1 and at least one corresponding prior hash value H.sub.1,T−1, H.sub.1,T−2 etc. stored in the hash store is below a predetermined threshold W.sub.1, that determination indicates that the portion of the frame that has been used to calculate H.sub.1 includes stuck pixels.
[0090] In one implementation of the example in which the sensor is a camera, the integrated circuit chip described above may be inserted into a vehicle, such as an autonomous vehicle. In this example, the one or more output modules 220 include a car safety controller. The one or more corrective actions that may be instructed by the communicator 306 of a monitoring device 214 may therefore include the following: notifying an operator of the vehicle that the camera view is not reliable; disactivating car subsystems that depend on camera assistance for their operation; activating a camera washer that may remove dirt from the camera that has resulted in the failure; and/or informing the car safety controller of the failure, so that the safety controller can determine a specific action to take.
[0091] While in one example the sensor is an image sensor, any type of sensor that is capable of recording continuous data may alternatively be connected to the integrated circuit chip. Examples of alternative sensors from which messages may be monitored include temperature sensors, proximity sensors, accelerometers, pressure sensors, flow sensors, humidity sensors, or touch sensors. For example, the sensor may be a thermostat, and the integrated circuit chip may be used to monitor the temperature recorded by the thermostat.
[0092] The systems and methods described herein provide for a significant reduction in the amount of time taken to identify the failure of a sensor when compared to corresponding systems that rely on software implementation. In other words, the calculation and comparison of hash values by the monitoring devices may be performed in only a few hardware clock cycles. Once a sensor failure has been identified by one or more monitoring devices, those devices may provide that a suitable output module is instructed to perform a corrective action using a low latency mechanism, to further reduce time delays.
[0093] The SoC described is suitably incorporated within a computing-based device. The computing-based device may be an electronic device. Suitably, the computing-based device includes one or more processors for processing computer executable instructions to control operation of the device in order to implement the methods described herein. The computer executable instructions may be provided using any computer-readable media (e.g., non-transitory computer-readable storage media) such as a memory. Some of the methods described herein may be performed by software in machine readable form on a tangible storage medium. Software may be provided at the computing-based device to implement the some of the methods described herein.
[0094] The above description describes the system circuitry and monitoring circuitry as being included on the same SoC. In an alternative implementation, the system circuitry and monitoring circuitry are included across two or more integrated circuit chips of an MCM. In an MCM, the integrated circuit chips are typically stacked or located adjacently on an interposer substrate. Some system circuitry may be located on one integrated circuit chip and other system circuitry located on a different integrated circuit chip of the MCM. Similarly, the monitoring circuitry may be distributed across more than one integrated circuit chip of the MCM. Thus, the method and apparatus described above in the context of a SoC also apply in the context of an MCM.
[0095] Each individual feature described in isolation herein and any combination of two or more such features, to the extent that such features or combinations are capable of being carried out based on the present specification as a whole in the light of the common general knowledge of a person skilled in the art, irrespective of whether such features or combinations of features solve any problems disclosed herein, and without limitation to the scope of the claims, are provided. Aspects of the present invention may consist of any such individual feature or combination of features. In view of the foregoing description, it will be evident to a person skilled in the art that various modifications may be made within the scope of the invention.
[0096] The elements and features recited in the appended claims may be combined in different ways to produce new claims that likewise fall within the scope of the present invention. Thus, whereas the dependent claims appended below depend from only a single independent or dependent claim, it is to be understood that these dependent claims may, alternatively, be made to depend in the alternative from any preceding or following claim, whether independent or dependent. Such new combinations are to be understood as forming a part of the present specification.
[0097] While the present invention has been described above by reference to various embodiments, it should be understood that many changes and modifications can be made to the described embodiments. It is therefore intended that the foregoing description be regarded as illustrative rather than limiting, and that it be understood that all equivalents and/or combinations of embodiments are intended to be included in this description.