Failure determination system

Information

  • Patent Grant
  • 8375243
  • Patent Number
    8,375,243
  • Date Filed
    Friday, July 22, 2011
    14 years ago
  • Date Issued
    Tuesday, February 12, 2013
    12 years ago
Abstract
A system-failure determination system fo a vehicle, made up of processors linked together that control or monitor the systems of a vehicle, that includes critical and non-critical applications that generate data. Certain data from the critical applications would be useful for the reconstruction of a system failure or for the reconstruction of an accident; and configuring an executive to monitor and store data for later recovery to determine cause.
Description
BACKGROUND OF THE INVENTION

Java is a robust, object-oriented programming language expressly designed for use in the distributed environment of the Internet. Java can be used to create complete applications that may run on a single computer or be distributed among servers and clients in a network. A source program in Java is compiled into byte code, which can be run anywhere in a network on a server or a client that has a Java virtual machine (JVM).


A JVM describes software that is nothing more than an interface between the compiled byte code and the microprocessor or hardware platform that actually performs the program's instructions. Thus, the JVM makes it possible for Java application programs to be built that can run on any platform without having to be rewritten or recompiled by the programmer for each separate platform.


Jini is a distributed system based on the idea of federating groups of users and the resources required by those users. Resources can be implemented either as hardware devices, software programs, or a combination of the two. The Jini system extends the Java application environment from a single virtual machine to a network of machines. The Java application environment provides a good computing platform for distributed computing because both code and data can move from machine to machine. The Jini infrastructure provides mechanisms for devices, services, and users to join and detach from a network. Jini systems are more dynamic than is currently possible in networked groups where configuring a network is a centralized function done by hand.


However, the Java/Jini approach is not without its disadvantages. Both Java and Jini are free, open source applications. The Java application environment is not designed for controlling messaging between different machines. For example, the Java application is not concerned about the protocols between different hardware platforms. Jini has some built-in security that allows code to be downloaded and run from different machines in confidence. However, this limited security is insufficient for environments where it is necessary to further restrict code sharing or operation sharing among selected devices in a secure embedded system.


SUMMARY OF THE INVENTION

The present invention allows construction of a secure, real-time operating system from a portable language such as Java that appears to be a Java virtual machine from a top perspective but provides a secure operating system from a bottom perspective. This allows portable languages, such as Java, to be used for secure embedded multiprocessor environments.


The foregoing and other objects, features and advantages of the invention will become more readily apparent from the following detailed description of a preferred embodiment of the invention which proceeds with reference to the accompanying drawings.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a diagram showing a java stack with an additional Secure Real-time Executive (SRE) layer.



FIG. 2 is a diagram of a multiprocessor system that runs multiple Java Virtual Machines that each include a SRE.



FIG. 3 is a detailed diagram of the managers in the SRE.



FIG. 4 is a block diagram of how the SRE manages a multiprocessor system.



FIG. 5 is a block diagram showing how a task manager in the SRE operates the multiprocessor system in a lock-step mode.





DETAILED DESCRIPTION

A java application stack includes a Java layer 5 for running any one of multiple different applications. In one example, the applications are related to different vehicle operations such as Infrared (IR) and radar sensor control and monitoring, vehicle brake control, vehicle audio and video control, environmental control, driver assistance control, etc. A Java Virtual Machine (JVM) layer 16 provides the hardware independent platform for running the Java applications 5. A Jini layer 12 provides some limited security for the Java applications that run on different machines. However, the Jini layer 12 does not provide the necessary reconfiguration and security management necessary for a distributed real-time multiprocessor system.


A Secure Real-time Executive (SRE) 14 provides an extension to the JVM 16 and allows Java to run on different processors for real-time applications. The SRE 20 manages messaging, security, critical data, file I/O multiprocessor task control and watchdog tasks in the Java environment as described below. The JVM 16, Jini 12 and SRE 14 can all be implemented in the same JVM 10, However, for explanation purposes, the JVM 10 and the SRE 14 will be shown as separate elements.



FIG. 2 shows a system 15 that includes multiple processors 16, 18, 20, 22 and 24. Each processor includes one or more JVMs 10 that run different Java applications. For example, processor 16 includes one Java application 28 that controls a vehicle security system and another Java application 26 that controls the vehicles antilock brakes. A processor 18 includes a Sava application 30 that controls audio sources in the vehicle, Other processors 20 and 22 may run different threads 32A and 32B for the same sensor fusion Java application 32 that monitors different IR sensors. Another thread 32C on processor 24 monitors a radar sensor for the sensor fusion Java application 32.


The SRE 14 runs below the JVMs 10 in each processor and control tasks, messaging, security, etc. For example, the Java application 26 controls vehicle braking according to the sensor data collected by the sensor fusion Java application 32. The SRE 14 in one example prevents unauthorized data from being loaded into the processor 16 that runs brake control application 26. The SRE 14 also prevents other Java applications that are allowed to be loaded into processor 16 from disrupting critical braking operations, or taking priority over the braking operations, performed by Java application 26,


For example, the SRE 14 may prevent noncritical vehicle applications, such as audio control, from being loaded onto processor 16. In another example, noncritical operations, such as security control application 28, are allowed to be loaded onto processor 16. However, the SRE 14 assigns the security messages low priority values that will only be processed when there are no braking tasks in application 26 that require processing by processor 16.


The SRE 14 allows any variety of real-time, mission critical, nonreal-time and nonmission critical Java applications to be loaded onto the multiprocessor system 15, The SRE 14 then automatically manages the different types of applications and messages to ensure that the critical vehicle applications are not corrupted and processed with the necessary priority. The SRE 14 is secure software that cannot be manipulated by other Java applications.


The SRE 14 provides priority preemption on a message scale across the entire system 15 and priority preemption on a task scale across the entire system 15, So the SRE 14 controls how the JVMs 10 talk to each other and controls how the JVMs 10 are started or initiated to perform tasks. The SRE 14 allows programmers to write applications using Java in a safe and secure real time environment, Thus, viruses can be prevented by SRE 14 from infiltrating the system 15.


While the explanation uses Java as one example of a programming environment where SRE 14 can be implemented, it should be understood that the SRE 14 can be integrated into any variety of different programming environments that may run in the same or different systems 15. For example, SRE 14 can be integrated into an Application Programmers Interface (API) for use with any programming language such as C++.



FIG. 3 shows the different functions that are performed by the SRE 20. Any combination of the functions described below can be provided in the SRE 20. A message manager 50 controls the order messages are received and transmitted by the different Java applications. A security manager 52 controls what data and messages are allowed to be received or transmitted by different Java applications. A critical data manager 54 controls what data is archived by the different Java applications.


A data manager 56 controls what data is allowed to be transferred between different processors. A task manager 58 controls the order tasks are performed by the different JVMs. A reconfiguration manager 60 monitors the operation of the different processors in the system and reassigns or reconfigures Java applications and Java threads to different processors according to what processors have failed or what new processors and applications have been configured into system 15.


The message manager 50 partially corresponds to the priority manager 44 shown in FIG. 2 of U.S. Pat. No. 6,629,033, issued Sep. 30, 2003, the critical data manager 52 partially corresponds with the logging manager 44 shown in FIG. 2 of the '033 patent, and the security manager 54 at least partially corresponds with the security manager 40 shown in the '033 patent. The data manager 56 at least partially corresponds with the date manager 42 shown in FIG. 2 of U.S. Pat. No. 7,146,260 issued Dec. 5, 2006, the task manager 58 partially corresponds to the device manager 46 shown in FIG. 2 of the '260 patent, and the configuration manager 60 at least partially corresponds to the configuration manager 44 shown in FIG. 2 of the '260 patent. The descriptions of how the different manager 50-60 operate similarly to the corresponding manager in the '033 and '260 patents are herein incorporated by reference and are therefore not described in further detail.


However, some specific tasks performed by the managers 50-60 are described below in further detail.



FIG. 4 shows in more detail how the SRE 14 operates, One of the operations performed by the task manager 58 is to control when different tasks are initiated on different processors. For example, a first Global Positioning System (GPS) thread 62 is running on a JVM in a processor 80. Another sensor fusion thread 64 is running on a different processor 82. Block 74 represents the Java Virtual Machine operating in each of processors 80 and 82. A master JVM 74 may run on either processor 80, processor 82 or on some other processor.


The task manager 58 sends an initiation command 66 to the GPS thread 62 to obtain location data. The task manager 58 then directs the obtained GPS data 68 through a link to the sensor fusion thread 64 for subsequent processing of GPS data 68. The link may be any bus, such as a PCI bus, serial link such as a Universal Serial Bus, a wireless link such as blue tooth or IEEE 802.11, or a network link such as Ethernet, etc.


The configuration manager 60 acts as a watchdog to make sure that the GPS thread 62 and the sensor fusion thread 64 are each running correctly. In one example, separate configuration managers 60 in each processor 80 and 82 sends out periodic signals to the other configuration managers 60 in the other processors, Any one of the configuration managers 60 can detect a processor or application failure by not receiving the periodic “ok” signals from any one of the other processors for some period of time, If a failure is detected, then a particular master configuration manager 60 in one of the processors determines where the task in the failed processor is going to be reloaded. If the master configuration manager 60 dies, then some conventional priority scheme, such as round robin, is used to select another configuration master.


If a failure is detected, say in the processor 82 that is currently performing the sensor fusion thread 64, a message is sent from the configuration manager 60 notifying the task manager 58 which processor is reassigned the sensor fusion thread. In this example, another sensor fusion thread 76 in processor 84 is configured by the configuration manager 60.


The critical data manager 52 manages the retention of any critical data 72 that was previously generated by the sensor fusion thread 64. For example, the critical data manager 54 automatically stores certain data and state information that was currently being used in the sensor fusion thread 64. The critical data may include GPS readings for the last 10 minutes, sensor data obtained from sensors in other processors in the vehicle over the last 10 minutes. The critical data may also include any processed data generated by the sensor fusion thread 64 that identifies any critical vehicle conditions.


The critical data manager 52 also determines which data to archive generally for vehicle maintenance and accident reconstruction purposes. The configuration manager 60 directs the critical data 72 to the new sensor fusion thread 76. The task manager 74 then redirects any new GPS data obtained by the GPS thread 78 to the new sensor fusion thread 76 and controls sensor fusion tasks from application 76. Thus, the configuration manager 60 and the task manager 58 dynamically control how different Java threads are initialized, distributed and activated on different processors.


The message manager 50 determines the priority of sent and received messages. If the data transmitted and received by the sensor fusion thread 76 is higher priority than other data transmitted and received on the processor 84, then the sensor fusion data will be given priority over the other data. The task manager 58 controls the priority that the sensor fusion thread 76 is giving by processor 84. If the sensor fusion thread 76 has higher priority than, for example, an audio application that is also being run by processor 84, then the sensor fusion thread 76 will be performed before the audio application,


The SRE 14 can be implemented in any system that needs to be operated in a secure environment. For example, network servers or multiprocessors operating in a home environment. The multiprocessors in home appliances, such as washer and dryers, home computers, home security systems, home heating systems, can be networked together and operate Java applications. The SRE 14 prevents these multiple processors and the software that controls these processors from being corrupted by unauthorized software and also allows the applications on these different processors to operate as one integrated system,


The SRE 14 is a controlled trusted computing based that is not accessible by non-authorized application programmers and anyone in the general public. Therefore, the SRE 14 prevents hacking or unauthorized control and access to the processors in the vehicle.


Task Controlled Applications

Debugging is a problem with multiprocessor systems. The task manager 58 allows the Java applications to be run in a lock-step mode to more effectively identify problems in the multiprocessor system 15.



FIG. 5 shows a path 90 taken by a vehicle 92. In one application, the position of the vehicle 92 is sampled every second t1, t2, t3, t4, etc. The position of the vehicle 92 is sampled by a GPS receiver in vehicle 92 that reads a longitudinal and latitudinal position from a GPS satellite. The UPS receiver is controlled by the GPS thread 62 that receives the GPS data and then sends the GPS data to a sensor fusion thread 64 that may run on the same or a different processor in the vehicle 92. The sensor fusion thread 64 can perform any one of many different tasks based on the GPS data. For example, the sensor fusion thread 64 may update a map that is currently being displayed to the driver of vehicle 92 or generate a warning signal to the vehicle driver.


For each sample period tN, the task manager 58 sends a request 94 to the GPS thread 62 to obtain CPS data. The task manager 58 uses a clock 96 as a reference for identifying each one second sample period. Each time a second passes according to clock 96, the task manager 58 sends out the request 94 that wakes up the GPS thread 62 to go read. the GPS data from the GPS satellite. Once the GPS data has been received, the GPS thread 62 passes the GPS data 96 to the sensor fusion thread 64. The GPS thread 62 then goes back into an idle mode until it receives another activation command from the task manager 58.


The task manager 58 can control when the CPS thread 62 is woken up. Instead of the GPS thread 62 being free running, the GPS thread 62 is operating according to a perceived time controlled by the task manager 58. The task manager 58 may send the activation request 94 to the GPS thread 62 once every second during normal sensor fusion operation. When the system is in a debug mode, however, the task manager 58 may only send one activation command 94. This allows the other operations performed by the system 89 to be monitored and determine how the single sampling of GPS data 96 propagates through system 89. The task manager 58 may also delay or disable task initiation to other threads, so that the processing of the GPS data 96 can be isolated.


The task manager 58 can isolate any state in the overall system 89, such as the state of system 89 after a first GPS reading by GPS thread 62 or the state of system 89 after the thirty second GPS reading by GPS thread 62 by controlling when and how often activation commands 94 are sent to GPS thread 62. In a similar manner, the task manager 58 can control when other tasks are performed by the system 89, such as when the sensor fusion thread 64 is activated.


Thus, the task manager 58 controls when Java applications are activated effectively running the overall system 89 in a lock-step mode. The task manager 58 can control the initiation of multiple tasks at the same time. This allows the task manager to control what parameters and operations are performed and used by the different Java threads so that different states in the multiprocessor system 89 can be detected and monitored more effectively.


One application for the task controlled applications is for accident reconstruction. The critical data manager 52 (FIG. 3) may save different vehicle parameters from a vehicle that has been in an accident. For example, sensor data, brake data, speed data, etc. The task manager 58 can feed the saved data into the different Java applications in a lock-step mode to determine how each Java thread processes the saved data. This can then be used to identify any failures that may have occurred in the system 89.


The system described above can use dedicated processor systems, micro controllers, programmable logic devices, or microprocessors that perform some or all of the communication operations. Some of the operations described above may be implemented in software and other operations may be implemented in hardware.


For the sake of convenience, the operations are described as various interconnected functional blocks or distinct software modules. This is not necessary, however, and there may be cases where these functional blocks or modules are equivalently aggregated into a single logic device, program or operation with unclear boundaries. In any event, the functional blocks and software modules or described features can be implemented by themselves, or in combination with other operations in either hardware or software.


Having described and illustrated the principles of the invention in a preferred embodiment thereof, it should be apparent that the invention may be modified in arrangement and detail without departing from such principles. Claim is made to all modifications and variation coming within the spirit and scope of the following claims.

Claims
  • 1. A vehicle failure determination system comprising: modular processors linked over a network for operating different vehicle applications that control or monitor associated critical and non-critical vehicle operations;critical data associated with critical operations, wherein the critical data associated with at least one critical operation is related to at least one of sensor data, brake data, speed data, engine data and GPS data;an executive configured to operate in at least one of the processors, wherein the executive is configured to: identify and save into memory the critical data, wherein the critical data identified and stored into memory is saved in a lock-step mode to determine how each process thread was executed in the linked modular processors, and wherein the lock-step mode is determined by at least one of a system clock, a system watchdog timer, a message manager, a critical data manager, a security manager, and a data manager;operate a task manager to determine at least one of a potential system failure or system failure that has occurred in at least one critical operation and how each process thread saved into the memory in the lock-step mode identifies the failure.
  • 2. The failure determination system of claim 1 wherein the network is at least one of wireless and wired links.
  • 3. The failure determination system of claim 1 wherein the different vehicle applications include at least one of safety critical, mission critical and non-critical applications.
  • 4. The failure determination system of claim 3 wherein the safety critical application includes at least one of driver assistance control, vehicle maintenance and accident reconstruction.
  • 5. The failure determination system of claim 3 wherein the mission critical applications include at least one of car braking, car airbag deployment, car sensor monitoring, object detection operations, car audio processing, system diagnostics, GPS data, and driving operations.
  • 6. The failure determination system of claim 1 wherein the sensor data includes at least one of infrared, radar, and video.
  • 7. The failure determination system of claim 1 wherein the executive is secure and runs in a real-time operation, wherein the real-time operation pertains to applications in which the computer must respond as rapidly as required by the user or necessitated by the process being controlled.
  • 8. The failure determination system of claim 1 wherein the task manager is used to reconstruct an accident.
  • 9. The failure determination system of claim 1 wherein the memory is non-volatile.
  • 10. A method of determining a system failure including: operating different vehicle applications on modular processors linked over a network that control or monitor associated critical and non-critical vehicle operations;monitoring critical data associated with critical operations, wherein the critical data associated with at least one critical operation is related to at least one of sensor data, brake data, speed data, engine data and GPS data;operating an executive configured in at least one of the linked processors, wherein the executive is configured to:identify and save into memory the critical data, wherein the critical data identified and stored into memory is saved in a lock-step mode to determine how each process thread was executed in the linked modular processors, and wherein the lock-step mode is determined by at least one of a system clock, a system watchdog timer, message manager, a critical data manager, a security manager and a data manager;operate a task manager to determine at least one of a potential system failure or system failure that has occurred in at least one critical operation and how each process thread saved into the memory in the lock-step mode identifies the failure.
  • 11. The failure determination system of claim 10 wherein the network is one of wireless and wired links.
  • 12. The failure determination system of claim 10 wherein the different vehicle applications include at least one of safety critical, mission critical and non-critical applications.
  • 13. The failure determination system of claim 10 wherein the safety critical application includes at least one of driver assistance control, vehicle maintenance, and accident reconstruction.
  • 14. The failure determination system of claim 10 wherein the sensor data includes at least one of infrared, radar, and video.
  • 15. The failure determination system of claim 10 wherein the executive is secure and runs in a real-time operation, wherein the real-time operation pertains to applications in which the computer must respond as rapidly as required by the user or necessitated by the process being controlled.
  • 16. The failure determination system of claim 10 wherein the task manager is used to reconstruct an accident.
  • 17. The failure determination system of claim 10 wherein the memory is non-volatile.
Parent Case Info

This application is a continuation of U.S. patent application Ser. No. 12/851,488, filed Aug. 5, 2010 U.S. Pat. No. 8,020,028 entitled: AN APPLICATION MANAGEMENT SYSTEM FOR MOBILE DEVICES (As Amended), which is a continuation of U.S. patent application Ser. No. 11/616,650, filed Dec. 27, 2006 entitled: METHOD FOR MULTI-TASKING MULTIPLE JAVA VIRTUAL MACHINES IN A SECURE ENVIRONMENT, now U.S. Pat. No. 7,793,136, issued Sep. 7, 2010, which is a continuation of Ser. No. 10/132,886, filed on Apr. 24, 2002, now U.S. Pat. No. 7,178,049 issued Feb. 13, 2007 entitled: METHOD FOR MULTI-TASKING MULTIPLE JAVA VIRTUAL MACHINES IN A SECURE ENVIRONMENT, which are both incorporated by referenced in their entirety. This application incorporates by reference U.S. patent application Ser. No. 09/841,753, filed Apr. 24, 2001 entitled: OPEN COMMUNICATION SYSTEM FOR REAL-TIME MULTIPROCESSOR APPLICATIONS, now U.S. Pat. No. 6,629,033, issued Sep. 30, 2003, and U.S. patent application Ser. No. 09/841,915, filed Apr. 24, 2001 entitled: METHOD AND APPARATUS FOR DYNAMIC CONFIGURATION OF MULTIPROCESSOR SYSTEM, now U.S. Pat. No. 7,146,260 issued Dec. 5, 2006.

US Referenced Citations (298)
Number Name Date Kind
2995318 Cocharo Aug 1961 A
3812468 Wollum et al. May 1974 A
4303978 Shaw Dec 1981 A
4528563 Takeuchi Jul 1985 A
4558460 Tanaka Dec 1985 A
4591976 Webber May 1986 A
4735274 Good et al. Apr 1988 A
4829434 Karmel May 1989 A
4835537 Manion May 1989 A
4907159 Mauge Mar 1990 A
4931930 Shyu et al. Jun 1990 A
5008678 Herman Apr 1991 A
5027432 Skala Jun 1991 A
5031330 Stuart Jul 1991 A
5045937 Myrick Sep 1991 A
5111401 Everett, Jr. May 1992 A
5115245 Wen May 1992 A
5243640 Hadley et al. Sep 1993 A
5245909 Corrigan Sep 1993 A
5287199 Zoccolillo Feb 1994 A
5303297 Hillis Apr 1994 A
5339086 DeLuca Aug 1994 A
5341301 Shirai Aug 1994 A
5438361 Coleman Aug 1995 A
5471214 Faibish Nov 1995 A
5485892 Fujita Jan 1996 A
5506963 Ducateau Apr 1996 A
5532706 Reinhardt Jul 1996 A
5552773 Kuhnert Sep 1996 A
5555503 Kyrtsos et al. Sep 1996 A
5572201 Graham Nov 1996 A
5579219 Mori et al. Nov 1996 A
5581462 Rogers Dec 1996 A
5585798 Yoshioka Dec 1996 A
5617085 Tsutsumi Apr 1997 A
5646612 Byon Jul 1997 A
5661811 Huemann et al. Aug 1997 A
5742141 Czekaj Apr 1998 A
5749060 Graf May 1998 A
5751211 Shirai May 1998 A
5754123 Nashif et al. May 1998 A
5761320 Farinelli Jun 1998 A
5786998 Neeson Jul 1998 A
5787246 Lichtman Jul 1998 A
5794164 Beckert et al. Aug 1998 A
5872508 Taoka Feb 1999 A
5898392 Bambini Apr 1999 A
5907293 Tognazzini May 1999 A
5915214 Reece Jun 1999 A
5943427 Massie Aug 1999 A
5948040 DeLorme et al. Sep 1999 A
5951620 Ahrens et al. Sep 1999 A
5956016 Kuenzner et al. Sep 1999 A
5956250 Gudat et al. Sep 1999 A
5957985 Wong Sep 1999 A
5959536 Chambers Sep 1999 A
5963092 VanZalinge Oct 1999 A
5964822 Alland Oct 1999 A
5966658 Kennedy, III Oct 1999 A
5969598 Kimura Oct 1999 A
5974554 Oh Oct 1999 A
5977906 Ameen Nov 1999 A
5983092 Whinnett Nov 1999 A
5983161 Lemelson Nov 1999 A
6009330 Kennedy, III Dec 1999 A
6009403 Sato Dec 1999 A
6028537 Suman Feb 2000 A
6028548 Farmer Feb 2000 A
6032089 Buckely Feb 2000 A
6037860 Zander et al. Mar 2000 A
6052632 Iihoshi Apr 2000 A
6054950 Fontana Apr 2000 A
6060989 Gehlot May 2000 A
6061002 Weber et al. May 2000 A
6061709 Bronte May 2000 A
6075467 Ninagawa Jun 2000 A
6097285 Curtin Aug 2000 A
6097314 Desens et al. Aug 2000 A
6128608 Barnhill Oct 2000 A
6144336 Preston Nov 2000 A
6148261 Obradovich Nov 2000 A
6150961 Alewine Nov 2000 A
6154123 Kleinberg Nov 2000 A
6161071 Shuman Dec 2000 A
6163711 Juntunen Dec 2000 A
6166627 Reeley Dec 2000 A
6167253 Farris Dec 2000 A
6169894 McCormick Jan 2001 B1
6175728 Mitama Jan 2001 B1
6175782 Obradovich Jan 2001 B1
6181922 Iwai Jan 2001 B1
6181994 Colson Jan 2001 B1
6182006 Meek Jan 2001 B1
6185491 Gray Feb 2001 B1
6195760 Chung et al. Feb 2001 B1
6198996 Berstis Mar 2001 B1
6202027 Alland Mar 2001 B1
6203366 Muller Mar 2001 B1
6204804 Andersson Mar 2001 B1
6226389 Lemelson, III May 2001 B1
6233468 Chen May 2001 B1
6236652 Preston May 2001 B1
6240365 Bunn May 2001 B1
6243450 Jansen Jun 2001 B1
6243645 Moteki et al. Jun 2001 B1
6247079 Papa et al. Jun 2001 B1
6252544 Hoffberg Jun 2001 B1
6275231 Obradovich Aug 2001 B1
D448366 Youngers Sep 2001 S
6292109 Murano Sep 2001 B1
6292747 Amro Sep 2001 B1
6294987 Matsuda Sep 2001 B1
6297732 Hsu Oct 2001 B2
6298302 Walgers Oct 2001 B2
6314326 Fuchu Nov 2001 B1
6321344 Fenchel Nov 2001 B1
6326903 Gross Dec 2001 B1
6327536 Tsuji Dec 2001 B1
6362748 Huang Mar 2002 B1
6370449 Razavi et al. Apr 2002 B1
6374286 Gee Apr 2002 B1
6377860 Gray Apr 2002 B1
6382897 Mattio May 2002 B2
6389340 Rayner May 2002 B1
6401029 Kubota Jun 2002 B1
6405132 Breed Jun 2002 B1
6408174 Steijer Jun 2002 B1
6417782 Darnall Jul 2002 B1
6421429 Merritt Jul 2002 B1
6429789 Kiridena Aug 2002 B1
6429812 Hoffberg Aug 2002 B1
6430164 Jones Aug 2002 B1
6433679 Schmid Aug 2002 B1
6442485 Evans Aug 2002 B2
6445308 Koike Sep 2002 B1
6449541 Goldberg et al. Sep 2002 B1
6452484 Drori Sep 2002 B1
6463373 Suganuma Oct 2002 B2
6484080 Breed Nov 2002 B2
6487717 Brunemann et al. Nov 2002 B1
6493338 Preston Dec 2002 B1
6496107 Himmelstein Dec 2002 B1
6496117 Gutta Dec 2002 B2
6496689 Keller Dec 2002 B1
6505100 Stuempfle Jan 2003 B1
6515595 Obradovich Feb 2003 B1
6522875 Dowling Feb 2003 B1
6526335 Treyz et al. Feb 2003 B1
6542812 Obradovich et al. Apr 2003 B1
6559773 Berry May 2003 B1
6567069 Bontrager et al. May 2003 B1
6571136 Staiger May 2003 B1
6574734 Colson et al. Jun 2003 B1
6584403 Bunn Jun 2003 B2
D479228 Sakaguchi et al. Sep 2003 S
6614349 Proctor et al. Sep 2003 B1
6615137 Lutter Sep 2003 B2
6616071 Kitamura Sep 2003 B2
6622083 Knockeart Sep 2003 B1
6629033 Preston Sep 2003 B2
6641087 Nelson Nov 2003 B1
6647270 Himmelstein Nov 2003 B1
6647328 Walker Nov 2003 B2
6670912 Honda Dec 2003 B2
6675081 Shuman Jan 2004 B2
6678892 Lavelle et al. Jan 2004 B1
6681121 Preston Jan 2004 B1
6690681 Preston Feb 2004 B1
6707421 Drury et al. Mar 2004 B1
6708100 Russell Mar 2004 B2
6714139 Saito Mar 2004 B2
6718187 Takagi et al. Apr 2004 B1
6725031 Watler Apr 2004 B2
6734799 Munch May 2004 B2
6738697 Breed May 2004 B2
6748278 Maymudes et al. Jun 2004 B1
6765495 Dunning et al. Jul 2004 B1
6771208 Lutter Aug 2004 B2
6771629 Preston Aug 2004 B1
6778073 Lutter Aug 2004 B2
6778924 Hanse Aug 2004 B2
6782315 Lu Aug 2004 B2
6785551 Richard Aug 2004 B1
6792351 Lutter Sep 2004 B2
6799092 Lu Sep 2004 B2
6816458 Kroon Nov 2004 B1
6876642 Adams Apr 2005 B1
6892230 Gu et al. May 2005 B1
6895238 Newell May 2005 B2
6895240 Laursen May 2005 B2
6901057 Rune May 2005 B2
6906619 Williams Jun 2005 B2
6920129 Preston Jul 2005 B2
6925368 Funkhouser et al. Aug 2005 B2
6937732 Ohmura Aug 2005 B2
6952155 Himmelstein Oct 2005 B2
6972669 Saito Dec 2005 B2
6973030 Pecen Dec 2005 B2
6980092 Turnbull Dec 2005 B2
6993511 Himmelstein Jan 2006 B2
7000469 Foxlin Feb 2006 B2
7006950 Greiffenhagen Feb 2006 B1
7024363 Comerford Apr 2006 B1
7079993 Stephenson Jul 2006 B2
7085710 Beckert et al. Aug 2006 B1
7089206 Martin Aug 2006 B2
7092723 Himmelstein Aug 2006 B2
7103646 Suzuki Sep 2006 B1
7120129 Ayyagari Oct 2006 B2
7123926 Himmelstein Oct 2006 B2
7146260 Preston Dec 2006 B2
7151768 Preston Dec 2006 B2
7158842 Ohmura Jan 2007 B2
7158956 Himmelstein Jan 2007 B1
7164662 Preston Jan 2007 B2
7171189 Bianconi Jan 2007 B2
7178049 Lutter Feb 2007 B2
7187947 White Mar 2007 B1
7206305 Preston Apr 2007 B2
7207042 Smith Apr 2007 B2
7215965 Fournier et al. May 2007 B2
7216347 Harrison et al. May 2007 B1
7221669 Preston May 2007 B2
7239949 Lu Jul 2007 B2
7249266 Margalit Jul 2007 B2
7257426 Witkowski Aug 2007 B1
7263332 Nelson Aug 2007 B1
7269188 Smith Sep 2007 B2
7272637 Himmelstein Sep 2007 B1
7274988 Mukaiyama Sep 2007 B2
7277693 Chen Oct 2007 B2
7283567 Preston Oct 2007 B2
7283904 Benjamin Oct 2007 B2
7286522 Preston Oct 2007 B2
7317696 Preston Jan 2008 B2
7343160 Morton Mar 2008 B2
7375728 Donath May 2008 B2
7379707 DiFonzo May 2008 B2
7411982 Smith Aug 2008 B2
7418476 Salesky Aug 2008 B2
7450955 Himmelstein Nov 2008 B2
7484008 Gelvin Jan 2009 B1
7493645 Tranchina Feb 2009 B1
7506020 Ellis Mar 2009 B2
7508810 Moinzadeh Mar 2009 B2
7509134 Fournier et al. Mar 2009 B2
7587370 Himmelstein Sep 2009 B2
7594000 Himmelstein Sep 2009 B2
7596391 Himmelstein Sep 2009 B2
7599715 Himmelstein Oct 2009 B2
7610331 Genske Oct 2009 B1
7614055 Buskens et al. Nov 2009 B2
7664315 Woodfill Feb 2010 B2
7733853 Moinzadeh et al. Jun 2010 B2
7747281 Preston Jun 2010 B2
7793136 Lutter Sep 2010 B2
7848763 Fournier et al. Dec 2010 B2
7924934 Birmingham Apr 2011 B2
7966111 Moinzadeh et al. Jun 2011 B2
7979095 Birmingham Jul 2011 B2
7983310 Hirano et al. Jul 2011 B2
8014942 Moinzadeh et al. Sep 2011 B2
8020028 Lutter Sep 2011 B1
8036201 Moinzadeh et al. Oct 2011 B2
8036600 Garrett et al. Oct 2011 B2
8068792 Preston Nov 2011 B2
8108092 Phillips et al. Jan 2012 B2
20010009855 L'Anson Jul 2001 A1
20020012329 Atkinson Jan 2002 A1
20020022927 Lemelson et al. Feb 2002 A1
20020070852 Trauner Jun 2002 A1
20020085043 Ribak Jul 2002 A1
20020095501 Chiloyan et al. Jul 2002 A1
20020098878 Mooney et al. Jul 2002 A1
20020105423 Rast Aug 2002 A1
20020123325 Cooper Sep 2002 A1
20020144010 Younis Oct 2002 A1
20020144079 Willis et al. Oct 2002 A1
20030060188 Gidron Mar 2003 A1
20030158614 Friel Aug 2003 A1
20030212996 Wolzien Nov 2003 A1
20040162064 Himmelstein Aug 2004 A1
20040164228 Fogg Aug 2004 A1
20050009506 Smolentzov Jan 2005 A1
20050070221 Upton Mar 2005 A1
20050130656 Chen Jun 2005 A1
20050153654 Anderson Jul 2005 A1
20050251328 Merwe et al. Nov 2005 A1
20050260984 Karabinis Nov 2005 A1
20050275505 Himmelstein Dec 2005 A1
20050278712 Buskens et al. Dec 2005 A1
20060293829 Cornwell et al. Dec 2006 A1
20070115868 Chen May 2007 A1
20070115897 Chen May 2007 A1
20070260372 Langer et al. Nov 2007 A1
20070260373 Langer et al. Nov 2007 A1
20080092140 Doninger et al. Apr 2008 A1
20090090592 Mordukhovich et al. Apr 2009 A1
Foreign Referenced Citations (24)
Number Date Country
3125161 Jan 1983 DE
4237987 May 1994 DE
19647283 May 1997 DE
19922608 Nov 2000 DE
19931161 Jan 2001 DE
0355490 Feb 1990 EP
0 441 576 Aug 1991 EP
0473866 Mar 1992 EP
0 841 648 May 1998 EP
0841648 May 1998 EP
1 355 128 Oct 2003 EP
10-076115 Oct 1999 JP
2000207691 Jul 2000 JP
1995-0017619 Jul 1995 KR
1999-021740 Mar 1999 KR
WO9624229 Aug 1996 WO
WO9908436 Feb 1999 WO
WO9957662 Nov 1999 WO
WO9965183 Dec 1999 WO
WO 0029948 May 2000 WO
WO0040038 Jul 2000 WO
WO0130061 Apr 2001 WO
WO0158110 Aug 2001 WO
WO03033092 Apr 2003 WO
Non-Patent Literature Citations (79)
Entry
A. Das, R. Fierro, V. Kumar, J. Ostrowski, J. Spletzer, and C. Taylor, “A Framework for Vision Based Formation Control”, IEEE Transactions on Robotics and Automation, vol. 18, Nov. 5, 2001, pp. 1-13.
Ada 95 Transition Support—Lessons Learned, Sections 3, 4, and 5, CACI, Inc.—Federal, Nov. 15, 1996, 14 pages.
AMIC. Architecture specification release 1, 2001; 35 pages.
Bluetooth Doc; Advance Audio Distribution Profile Specification; Adopted version 1.0; dated May 22, 2003; 75 pages.
Bluetooth Doc; Audio/Video Remote Control Profile; Version 1.0 Adopted; dated May 22, 2003; 52 pages.
Bluetooth Hands-free Profile 1.5 Nov. 25, 2005.
Bluetooth Specification version 1.1; Feb. 22, 2001; 452 pages.
Boeing News Release, “Boeing Demonstrates JSF Avionics Multi-Sensor Fusion”, Seattle, WA, May 9, 2000, pp. 1-2.
Boeing Statement, “Chairman and CEO Phil Condit on the JSF Decision”, Washington, D.C., Oct. 26, 2001, pp. 1-2.
Counterair: The Cutting Edge, Ch. 2 “The Evolutionary Trajectory The Fighter Pilot-Here to Stay?” AF2025 v3c8-2, Dec. 1996, pp. 1-7.
Counterair: The Cutting Edge, Ch. 4 “The Virtual Trajectory Air Superiority without an “Air” Force?” AF2025 v3c8-4, Dec. 1996, pp. 1-12.
Embedded Bluetooth Migrates to Lisbon and Seattle; 11 pages; Jan. 23, 2008.
Green Hills Software, Inc., “The AdaMULTI 2000 Integrated Development Environment,” Copyright 2002, printed Jul. 9, 2002; 7 pages.
H. Chung, L. Ojeda, and J. Borenstein, “Sensor Fusion for Mobile Robot Dead-reckoning with a Precision-calibrated Fiber Optic Gyroscope”, 2001 IEEE International Conference on Robotics and Automation, Seoul, Korea, May 21-26, 2001, pp. 1-6.
Hitachi Automated Highway System (AHS), Automotive Products, Hitachi, Ltd., Copyright 1994-2002, 8 pages.
IEEE Standard for Information Technology—POSIX Based Supercomputing Application Environment Profile; Jun. 14, 1995, 72 pages.
ISIS Project: Sensor Fusion, Linkoping University Division of Automatic Control and Communication Systems in cooperation with SAAB (Dynamics and Aircraft), 2001, 18 pages.
J. Takezaki, N. Ueki, T. Minowa, H. Kondoh, “Support System for Safe Driving—A Step Toward Its Autonomous Driving--”, Hitachi Review, vol. 49, Nov. 3, 2000, pp. 1-8.
Joint Strike Fighter Terrain Database, ets-news.com “Simulator Solutions” 2002, 3 pages.
Luttge, Karsten; “E-Charging API: Outsource Charging to a Payment Service Provider”; IEEE; 2001 (pp. 216-222).
M. Chantler, G. Russel, and R. Dunbar, “Probabilistic Sensor Fusion for Reliable Workspace Sensing”, Fourth IARP workshop on Underwater Robotics, Genoa, Nov. 1992, pp. 1-14.
MSRC Redacted Proposal, 3.0 Architecture Development, Aug. 29, 2002; pp. 1-43.
MyGig User Guide; Mar. 11, 2008.
Powerpoint Presentation by Robert Allen—Boeing Phantom Works entitled “Real-Time Embedded Avionics System Security and COTS Operating Systems”, Open Group Real-Time Forum, Jul. 18, 2001, 16 pages.
Product description of Raytheon Electronic Systems (ES), Copyright 2002, pp. 1-2.
Product description of Raytheon RT Secure, “Development Environment”, Copyright 2001, pp. 1-2.
Product description of Raytheon RT Secure, “Embedded Hard Real-Time Secure Operating System”, Copyright 2000, pp. 1-2.
Product description of Raytheon RT Secure, Copyright 2001, pp. 1-2.
S.G. Goodridge, “Multimedia Sensor Fusion for Intelligent Camera Control and Human-Computer Interaction”, Dissertation submitted to the Graduate Faculty of North Carolina State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical Engineering, Raleigh, NC, 1997, pp. 1-5.
Specification of the Bluetooth System v1.0.B; Dec. 1, 1999.
Specification of the Bluetooth System v1.1; Feb. 22, 2001.
TNO FEL Annual Review 1998: Quality works, Observation Systems Division; “The Whole is More Than the Sum of its Parts”; 16 pages.
Vehicle Dynamics Lab, University of California, Berkeley, funded by BMW, current members: D. Caveney and B. Feldman, “Adaptive Cruise Control”, at least as early as 2002, printed Jul. 2, 2002; 17 pages.
Stirling A: “Mobile Multimedia platforms” Vehicular Technology Conference Fall 2000. IEEE VTS Fall VTC2000. 52nd Vehicular Technology Conference (Cat. No. 00CH37152).
Nusser R. et al.: “Bluetooth-based wireless connectivity in an automotive environment” Vehicular Technology Conference Fall 2000. IEEE VTS Fall VTC2000 52nd Vehicular Technology Conference (Cat. No. 00CH37152).
Martins E F V et al. “design of an OS9 operating system extension for a message-passing multiprocessor” Microprocessors and Microsystems, IPC Business Press LT. London, BG, vol. 21, No. 9, Apr. 1, 1998, pp. 533-543.
Gutierrez Garcia JJ et al. “Minimizing the effects of jitter in distributed hard real-time systems” Journal of Systems Architecture, Elsevier Science Publishers BV., Amsterdam, NL, vol. 41, No. 6/7. Dec. 15, 1996, pp. 431-447.
International Search Report for PCT/US02/020402; Mailing date Apr. 3, 2003.
International Search Report for PCT/US02/020403; Mailing date Jan. 27, 2003.
International Search Report for PCT/US02/016364; Mailing date Feb. 14, 2003.
International Search Report for PCT/US02/016371; Mailing date Aug. 18, 2003.
Stolowitz Ford Cowger LLP Listing of Related Cases Oct. 18, 2011.
Robert Bosch GmbH, “CAN Specification, Version 2.0,” Sep. 1991.
Wang, Z. et al. “A Message Priority Assignment Algorithm for CAN-based Networks,” in CSC '92 Proceedings of the 1992 ACM Annual Conference on Communications, Mar. 1992.
Fay-Wolfe, et al., “Real-Time CORBA,” IEEE Transactions on Parallel and Distributed Systems, vol. 11, Issue 10 (Oct. 2000).
Rene Nusser and Rodolfo Mann Pelz, “Bluetooth-based Wireless Connectivity in an Automotive Environment,” IEEE pp. 1935-1942, Vehicular Technology Conference, 2000.
Husein et al., “A Priority Based Service Algorithm for Use in Time-Critical and Integrated Services Networks,” Proceedings of IEEE Singapore International Conference, vol. 1, pp. 93-97, 1993.
Release 1 Specification Set from the Automotive Multimedia Interface Collaboration (AMI-C), Jan. 2001.
Open Services Gateway Initiative (OSGi) Service Gateway Specification Release 1.0, May 2000.
Ellis, S. M. , “Dynamic Software Reconfiguration for Fault-Tolerant Real-Time Avionic Systems,” Microprocessor and Microsystems, Proceedings of the 1996 Avionics Conference and Exhibition, vol. 21, issue 1, pp. 29-39, Jul. 1997.
Peter Walzer, and Hans-Wilhelm Grove, “Integrated Research Volkswagen (IRVW) Futura,” Passenger Car Meeting and Exposition, Dearborn, Michigan, Sep. 17-20, 1990.
Specification vol. 1, Specification of the Bluetooth System, Version 1.1, Feb. 22, 2001.
Bluetooth ESDP for UPnP, prepared by Arun Ayyagan, Jan. 31, 2001.
Nace, W. & Koopman, P., “A Product Family Based Approach to Graceful Degradation,” Proceedings of Dipes 2000, International IFIP WG 10.3/WG 10.4/ WG 10.5 Workshop on, Distributed and Parallel Embedded Systems, Paderborn University, Germany, Oct. 18-19, 2000.
Meredith Beveridge, “M.S. Project Report, Jini on the Control Area Network (CAN): A Case Study in Portability Failure”, Department of Electrical and Computer Engineering, Carnegie Mellon University, Phil Koopman- advisor, Mar. 2001.
Universal Serial Bus Specification, Revision 1.1, Compaq, Intel, Microsoft and NEC, Sep. 23, 1998.
Universal Serial Bus Specification , Revision 2.0, Compaq, Hewlett-Packard, Intel, Lucent, Microsoft, NEC and Philips, Apr. 27, 2000.
Tindell, Ken, et al, “A CAN Communications Concept with Guaranteed Message Latencies”, Oct. 1998.
Robinson, Ralph L., “An Open Versus Closed Architecture for Multimedia Systems,” Proceedings of the 2000 International Congress on Transportation Electronics, pp. 445450, Oct. 2000.
Y. Chubachi and H. Okagaki , “The Development of Traffic Information System Using AutoPC,” Proceedings of the 2000 International Congress on Transportation Electronics, pp. 81-88, Oct. 2000.
USBlyzer, “Brief Overview of USB History”.
M. Tchorowski and J. Mate, “Avionics and Automotive bandwagon flying together on the infotronics Highway,” Proceedings of the 1998 International Congress on Transportation Electronics, pp. 351-354, Oct. 1998.
Fout, Tom, “Universal Plug and Play in Windows XP,” Jul. 1, 2001.
Yen, H.W., et al., “Information Security and Integrity in Network Vehicle,” Proceedings of the 1998 International Congress on Transportation Electronics, pp. 319-323, Oct. 1998.
Minagawa, Shoichi, et al, “Open Architectural Car Multimedia Platform,” Proceedings of the 1998 International Congress on Transportation Electronics, pp. 198-194 Oct. 1998.
Kanemitsu, Dean et al. “Productivitys Next Dimension—The Mobile Office Computing Platform,” Proceedings of the 2000 International Congress on Transportation Electronics, pp. 159-165, Oct. 2000.
Bhaskaran, Parvathy, “Reinventing the Car Radio for the Internet-the iRadio™,” Proceedings of the 2000, International Congress on Transportation Electronics, pp. 147-153, Oct. 2000.
Buckley, Stephen, et al., “The Car as a Peripheral-Adapting a Portable Computer to a Vehicle Intranet,” Proceedings of the 1998 International Congress on Transportation Electronics, pp. 211-217, Oct. 1998.
Arnold, Ken, et al., “The Jini Specification,” Publisher Addison-Wesley, 1999.
Powers, Chuck, et al., Today's Electronics in Todays Vehicles, Proceedings of the 1998 International Congress on Transportation Electronics, pp. 195-200, Oct. 1998.
Vaught, Mark A., “Phone-Activated Auto-Muting Circuit,” Jan. 1990.
Clarion Co. Ltd., “Clarion AutoPC 310C Owner's Manual,” 1998.
Clarion, “2002 Clarion Product Catalog Car Audio, Multimedia, Marine, and Security Retail Products,” 2002.
Clarion Co., Ltd., “Joyride Quick Reference Guide,” 2000-2001.
Joyride, Windows CE System Software User's Manual , 1999-2001.
Lind, R., et al., “The Network Vehicle- A Glimpse into the Future of Mobile Multi-Media,” IEEE AES Systems Magazine, Sep. 1999.
First Amended Complaint and Answer from Eagle Harbor Holdings, LLC, and Mediustech, LLC, v. Ford Motor Company, Washington Western District Court, Case No. 3:11-CV-05503-BHS, Case filed: Jun. 30, 2011.
Exhibits and Modules from Eagle Harbor Holdings, LLC, and Mediustech, LLC, v. Ford Motor Company, Washington Western District Court, Case No. 3:11-CV-05503-BHS, Case filed: Jun. 30, 2011.
Stolowitz Ford Cowger LLP, Listing of Related Cases, Jun. 14, 2012.
Continuations (3)
Number Date Country
Parent 12851488 Aug 2010 US
Child 13188856 US
Parent 11616650 Dec 2006 US
Child 12851488 US
Parent 10132886 Apr 2002 US
Child 11616650 US