Vehicles and mobile applications are increasingly reliant on computing devices distributed around the vehicle to perform electronic control functions. Modern passenger vehicles, as an example, routinely have over 100 separate electronic control devices distributed around the vehicle. These devices cooperate and communicate with each other to perform various vehicle functions. Previously known systems generally connect devices on networks that are organized around particular vehicle functions. The result is that various networks are distributed extensively around the vehicle, with multiple connection paths that result in considerably more hardware (e.g., cables and routing devices) than is necessary to just connect the devices. Vehicles increasingly face high design costs to integrate all of the connections, and security risks from the multiple networks of various types on the vehicle that provide potential access points. Due to the reliance on electronic devices, which is only expected to increase, and the growing capability of vehicles to act autonomously and provide increasing capabilities for the electronic devices, the consequences of a security breach or other security issues on vehicles are increasing. Further, there are a range of devices and capabilities, from modern electronics that can communicate on high speed networks using modern communications, to simple electronics that utilize older networks that can be based on very simple protocols or industry standards.
Thus, vehicles have a patchwork of networks having varying security capabilities, multiple overlapping communication paths based on vehicle function, and consequent difficulties in designing, monitoring, or updating the various networks or the devices thereon.
Embodiments herein provide for systems and processes to implement a zonal architecture for vehicles to improve operational capability, reduce risk, reduce costs, and increase the security of the network for the vehicle. Embodiments here provide a convenient and capable interface to rapidly reconfigure the network, including during runtime, to respond to network events such as a capability loss or security risk. Embodiments herein further include creating and implementing functions for the vehicle in a service oriented architecture, allowing users to create and roll out content for features while focusing on the capability and performance of the features, and without requiring knowledge of complex network interactions and end point locations, duties, or capabilities.
Certain embodiments herein provide a powerful user interface to design, implement, and monitor network performance for a vehicle, leveraging the zonal architecture and tools to manage cross-network communications in a seamless manner for the user.
Embodiments herein solve a number of challenges in previously known systems, including simplifying network design, implementation, and integration, reducing security risks, and broadening the range of contributors with various expertise to contribute features and capabilities to the vehicle. Further, embodiments herein allow for the rapid implementation and confirmation of reconfiguring the network and implementing features, without requiring significant vehicle operating risks or downtime.
The disclosure and the following detailed description of certain embodiments thereof may be understood by reference to the following figures:
Without limitation to any other aspect of the present disclosure, aspects of the disclosure herein provide an implementation of a zoned network architecture on a vehicle, where each zone includes a portion of end points on the vehicle, and where each zone may include multiple network types, for example with some end points communicating on a CAN network architecture, and other end points communicating on an ethernet architecture, LIN architecture, or the like. The utilization of a zoned architecture provides for a number of benefits over previously known systems, for example allowing for end points to communicatively couple to a network and other devices based upon physical location, rather than a function of the end point, reducing the length of runs for electrical connections, allowing for redundancy of connectivity options (e.g., to accommodate loss of connectivity infrastructure due to wear, failures, vehicle damage, or the like) for end points, increasing network control and security, allowing for greater options in controller distribution (e.g., reducing the number of controllers required, allowing for inter-controller redundancy), and dynamic configuration of vehicle applications, connectivity between end points, data collection operations, and/or data provision options (e.g., making data available from an end point to any other end point).
Example embodiments utilize a policy to implement security, authorization, and/or configuration options. For example, a policy may include a data structure defining which end points are allowed to request data, which end points are allowed to provide data, the priority related to end points, the configuration of data (e.g., units, sampling rate, latency, priority, resolution, etc.) related to end points, or the like. In certain embodiments, a policy is a file or other data structure that can be updated dynamically, allowing changes to the configuration without requiring a change in firmware, change in software, or the like, allowing for a dynamic update without requiring a shutdown, increasing the risk of an incomplete update that may disable the controller, or the like.
Certain aspects of the present disclosure include various operations to control communications in a vehicle network environment, including providing communications between devices or end points on different network zones and/or different network types, providing for control without requiring specific knowledge of the communicator of the actual addresses or locations of other devices on the network, the utilization of a policy or configuration file to update network control parameters, and the like. Additionally, certain aspects of the present disclosure include controlling communications between a vehicle device and an external device, in either direction. Additionally, certain aspects of the present disclosure include adjusting the routing of communications on a network, whether between separate devices on the network, or between a device on the network and an external device. Without limitation to any aspect of the present disclosure, some tools that can be utilized to tactically implement certain operations herein, in combination with the present disclosure, and descriptions that can enhance understanding of some of the terminology used herein (e.g., policy, end point, external device, network protocol, network type, etc.) can be found in one or more of the following U.S. Patents or Patent Applications: US application 17/027,167, filed 21 Sep. 2020, and entitled SYSTEM, METHOD, AND APPARATUS TO SUPPORT MIXED NETWORK COMMUNICATIONS ON A VEHICLE; U.S. application Ser. No. 17/027,187, filed 21 Sep. 2020, and entitled SYSTEM, METHOD, AND APPARATUS TO EXTRA VEHICLE COMMUNICATIONS CONTROL; U.S. application Ser. No. 17/195,589, filed 8 Mar. 2021, and entitled SYSTEM, METHOD, AND APPARATUS FOR MANAGING VEHICLE DATA COLLECTION; and U.S. application Ser. No. 17/833,614, filed 6 Jun. 2022, and entitled SYSTEM, METHOD, AND APPARATUS FOR MANAGING VEHICLE DATA COLLECTION, each of which is incorporated herein by reference in the entirety for all purposes. Embodiments throughout the present disclosure may be embodied, at least in part, utilizing controllers, circuits, components, processors, and/or operations such as those set forth in one or more of the foregoing patents or patent applications. For example, operations to manage intra-network and/or inter-network communications on a vehicle, including adjusting the management based on changes to a policy or the like, may utilize embodiments as set forth in application '167; operations to manage communications between any end point and external devices, including adjusting the managing based on changes to a policy or the like, may utilize embodiments as set forth in application '187; operations to manage data collection operations, including adjusting data collection, formatting, and/or configuration of data, data life cycle management, and communication of collected data, may utilize embodiments as set forth in application '589; and/or operations to implement, execute, and otherwise manage automated vehicle operations, including operations that can be implemented without software or firmware updates being required, may utilize embodiments as set forth in application '614.
Certain aspect of the present disclosure are set forth as a controller, a circuit, a computing device, a processor, an electronic computing unit (ECU), a manager (e.g., reference
Various embodiments herein are presented as procedures, methods, or other operational descriptions to perform certain actions embodying aspects of the disclosure. Such operations will be referenced as a “procedure” in the remainder of this paragraph. Any such procedure may be varied in the order of operations, performed as a cyclical or repeated operation (where relevant, and in whole or part), operations described may be divided into parts, and/or operations may be combined (in whole or part). In certain embodiments, procedures may be performed, in whole or part, by any hardware devices as set forth throughout the present disclosure, including by any circuit, controller, computing device, etc., having the capability to perform operations of the example procedures.
Without limitation to any other aspect of the present disclosure, embodiments herein provide for a system and procedures to implement a zonal network architecture on a vehicle to improve the reliability, installed cost, operating cost, operational performance, and/or ability to avoid or mitigate risks, failures, or degradation of the network and consequent effects on the vehicle mission.
Referencing
The example system 5000 further includes a network management controller 5002. The example network management controller 5002 includes a zone implementation circuit 5004 that interprets a zoned architecture communication scheme 5014, a zone manager command circuit 5006 that interprets a zone manager command description 5016 for each of the zone managers in response to the zoned architecture communication scheme 5014, and a zone execution circuit 5008 that provides the corresponding zone manager command description 5016 to each of the zone managers. For example, the zoned architecture communication scheme 5014 may be embodied as part of a policy passed to the network management controller 5002, such as by an external device, that defines various aspects of managing network communications on the vehicle, and between zones on the vehicle.
Some of the communication management may apply to different end points on different zones, and the specific arrangement may not be known to the user creating the policy (e.g., an employee of the vehicle manufacturer). In the example, the zone manager commend circuit 5006 determines the responsibilities of each zone manager to be responsive to the zoned architecture communication scheme 5014, and determines the zone manager command descriptions 5016 to implement the portions of the zoned architecture communication scheme 5014 that are relevant to that particular zone manager, for example based on the end points (e.g., sensors, actuators, controllers, etc.), flows, functions, applications, or the like that are serviced by or embodied on the zone. The zone execution circuit 5008 then distributes the zone manager command descriptions 5016 to the various zone managers. The utilization of a local version of the zone manager command description 5016, for example as a local configuration file, by individual zone managers allows the system to implement an update of the zone communication control immediately after a start up of the vehicle, and/or even allows an update during runtime operations, depending upon the desired behavior of the system and/or the type of change in the zone manager command description 5016 updates.
Embodiments herein thereby allow a user with specific expertise, for example in risk management or failure analysis, to configure the zoned architecture communication scheme 5014 according to their expertise, without requiring that they understand the specific arrangement of end points and control responsibilities on the vehicle. Accordingly, embodiments of the present disclosure improve outcomes, for example allowing the system to be built by appropriate experts to optimize the risk profile of the network, and also by reducing the development time and turnaround time to roll out improvements. Further, embodiments of the present disclosure reduce costs by allowing zones to cooperate and hand off data seamlessly without loss to (and typically with improvement to) security or communication capability.
One consequence of the zonal architecture arrangements herein, which allow for the zonal architecture to be arranged for various purposes (e.g., system cost, system reliability, provision for redundancy, etc.) apart from the function of the end points on the zone, is that for many vehicle functions the supporting end points will be distributed across more than one zone. The utilization of the zone manager command description 5016 allows those end points to seamlessly cooperate to perform the underlying vehicle function, while having consistent implementation for those end points with regard to communication latency, applicable security, data quality, and the like. Previously known systems group network zones, where separate zones are present at all, on the functions of the vehicle (e.g., a network providing communication between powertrain components), to enforce security of communications with the hardware layer (e.g., provision of separate Public and Private CANs), or based upon the responsible party (e.g., a electric motor supplier) for particular end points. Thus, previously known systems result in expensive and redundant hardware layers, for example where multiple parallel network cables traverse the same extensive regions of the vehicle, and expose multiple systems to all of the risks distributed around the vehicle. Embodiments of the present disclosure significantly reduce the costs of the overall network support, with planned management for risk, redundancy, application of security, and the like, and that can be built with a selected combination, based on the priorities of the designer, of enhanced capability, reduced risk, reduced cost, and enhanced security.
In the example of
The network topology description may include any aspects of a network topology as set forth throughout the present disclosure. Referencing
An example zone implementation circuit 5004 interprets the zoned architecture communication scheme 5014 in response to a policy provided by an external device. An example policy is a configuration file for network communications on the vehicle, for example allowing the zone manager command descriptions 5016 to be updated, at least for certain embodiments or update operations, without making a change to base software for the vehicle, reducing risks of an incomplete update (which may disable the vehicle entirely) and reducing the operational impact of the update (e.g., without requiring a shutdown, pause in operational capability, and/or dedicated servicing operation). An example zone manager command circuit parses the policy, including a configuration file, to determine the zone manager command descriptions 5016. In certain embodiments, the zone manager command descriptions 5016 are embodied as a local configuration file communicated to, and utilized by, the corresponding zone managers. In certain embodiments, the zone manager command descriptions 5016 are embodied as an update to the local configuration file for one or more zone managers, and the zone execution circuit 5008 provides the corresponding zone manager command description 5016 to each of the zone managers by updating the local configuration file for the relevant zone managers.
Referencing
An example network management controller 5002 further includes a hardware redundancy implementation circuit 5010 that supports implementation of a hardware redundancy scheme. An example hardware redundancy implementation circuit 5010 determine that a hardware off-nominal event 5018 has occurred (e.g., an end point, network zone, zone manager, etc. has lost communication and/or is experiencing degraded performance), and adjusts at least one of the zone manager command descriptions 5016 in response to the hardware off-nominal event 5018. For example, a system 5000 may have a defined redundancy scheme where if a zone manager A fails, then zone manager B changes operations to fulfill, at least in part, the duties of zone manager A. The available hardware redundancy for a given system 5000 depends on the zone arrangement and connectivity, and further upon the planning for the hardware failure in question, as reflected in the zoned architecture communication scheme 5014. In a further example, an end point Z on zone A may perform a certain vehicle function which is unavailable if zone manager A fails. The response may depend upon the type of failure, for example if zone manager B can communicate with the end point Z, then the zone manager B can simply perform the network control duties previously performed by zone manager A, and full system capability is likely to remain available. However, if the failure of zone manager A removes all communication to zone A, then the response may include migrating control responsibilities from zone A to end points on other zones of the vehicle, and zone manager B can be configured to further notify end points that perform substitute operations to replace the functions of end point Z. In certain embodiments, other changes may also be implemented, for example to account for the different network traffic patterns and the like, which may affect more than just zone B, and accordingly the zone manager command description 5016 changes for a zone A manager failure may extend further than just an update to the duties of zone manager B. In certain embodiments, the lost functions may be replaced completely, for example where another end point in the system is fully capable to replace all operations of end point Z. In certain embodiments, the lost functions may be replaced in part, for example a less capable end point may perform some critical functions of end point Z, allowing continued operation which may be degraded. In certain embodiments, the functionality replacement may be very limited, but still could be important, for example allowing the vehicle to continue operation in a limp-home mode to allow the operator to move the vehicle to a safe location, and/or allowing some functionality such as a battery disconnect operation otherwise performed by end point Z, which is limited and even mission disabling, but could be important in a catastrophic failure situation (e.g., an accident with the vehicle that disables significant portions of the overall network hardware layers). The utilization of the hardware off-nominal event 5018 and updates to the zone manager command descriptions 5016 allows for a layered response to various hardware failures, while preserving as many vehicle operations as possible, with as little impact to the operator as possible.
An example network management controller 5002 includes a control redundancy implementation circuit 5012 that determines a control off-nominal event 5020 has occurred, and adjusts the zone manager command description 5016 in response to the control off-nominal event 5020. For example, if an end point controller fails in the system, hardware connectivity to the zone and to other end points may still be present, but the functions performed by that end point will otherwise be lost. In the example, the control off-nominal event 5020 adjusts the zone manage commands 5016 to move the responsibilities of the lost control function to another end point (or end points) on the vehicle. In certain embodiments, the control off-nominal event 5020 may be a degradation of performance, suspect performance (e.g., a stuck or slow responding value), and/or a control off-nominal event 5020 determined by a fault code or diagnostic operation. The considerations for the control off-nominal event 5020 are otherwise similar to the considerations for the hardware off-nominal event 5018, where various end points, zone managers, and network zones may be affected by the response operations. It will be understood that some events may not be easily classified as a hardware event or a control event. The operations described herein apply generally to off-nominal events regardless of the specific reason for the event, and the specific terminology using hardware events and control events is utilized for clarity in describing specific operations. The terminology utilized is not limiting, and off-nominal events can be addressed even where the true cause or classification of the event may not be known.
Referencing
An example vehicle network performance description 5702 includes a latency valuc 5704, for example a maximum or minimum allowed latency, an average latency description, a latency trajectory or duty cycle (e.g., to describe burst behavior, etc.). In certain embodiments, the latency value 5704 may be considered for various end points, flows, features, applications, or the like, and/or between specific end points, network zones, etc. An example vehicle network performance description 5702 includes a bandwidth value 5706, for example describing a bandwidth for one or more zones that is to be preserved, achieved, that can be utilized, etc. In certain embodiments, the bandwidth value 5706 is related to a zone or an end point. An example vehicle network performance description 5702 includes a hardware redundancy description 5708, including for example hardware aspects of the network that should have back-up operations available, and/or acceptable capability descriptions for those back-up operations. An example vehicle network performance description 5702 includes a control redundancy description 5710, including for example control aspects of the network and/or end points thereof that should have back-up operations available, and/or acceptable capability descriptions for those back-up operations.
The example procedure 5300 further includes an operation 5304 to determine a zonal architecture value in response to the vehicle network performance description 5702, and a vehicle performance network impact description 5802 (reference
An example vehicle performance network impact description 5802 includes an installed hardware cost value 5804, which can include any cost type consideration of the zonal architecture value being considered. Example hardware cost values 5804 include aspects such as: a hardware physical cost (e.g., cost of controllers, zone managers, cables, connectors, shielding, etc. to physically implement the zonal architecture value); a physical footprint of the installation (e.g., how much space, weight, number and type of integration interfaces such as brackets, routing, integration difficulty and/or sensitivity, testing requirements to confirm the installation, etc.); a control cost of the installation (e.g., engineering work required to code the solution, testing cost to confirm any code works as planned, bandwidth utilization to implement the solution, processor utilization to implement the solution, memory utilization to implement the solution, etc.; these can consider any base controls changes to the vehicle, for example by combining end points and/or changing the way vehicle controls operate, and/or zone manager operations); and/or the service cost of the installation (e.g., impacts on service procedures and/or physical access to parts of the vehicle that are affected by the installation, ability to replace components, any testing or confirmation procedures driven into service procedures by the installation, sophistication of service tools to perform service procedures that may be affected by the installation, etc.). The installed hardware cost value 5804 may be considered, generally, as a “cost” portion of a given zonal architecture value, for example utilized in an optimization routine to determine acceptable, improved, and/or optimized zonal architecture value.
An example vehicle performance network impact description 5802 includes a mission capability description 5806, for example a description of the ability for the considered zonal architecture value to meet the performance criteria for basic vehicle operation throughout the defined space, for example at all normal operating conditions, ambient conditions, and the like. An example vehicle performance network impact description 5802 includes a redundancy capability description 5808, including a description of the ability for the considered zonal architecture value to meet the hardware and/or control redundancy descriptions. An example vehicle performance network impact description 5802 includes a reliability description 5810, including a description of the likely impact of the considered zonal architecture value on reliability factors, for example estimating maintenance schedules, failure rates and costs, downtime costs, etc. These estimates may be based on the temperature, vibration, EMI, and/or water intrusion elements relevant to the vehicle, and can be dependent on the physical routing of network cables, position and environment of network components (e.g., zone mangers), and selected physical components such as cable types, shielding utilized, connector types, cooling parameters (e.g., fins, size, and power utilization of controllers, etc.).
The operation 5304 to determine a zonal architecture value in response to the vehicle network performance description 5702, and a vehicle performance network impact description 5802 can include any decision algorithm or optimization routing understood in the art, for example utilizing the vehicle network performance description 5702 parameters generally as a “benefit” function, and the vehicle performance network impact description 5802 parameters generally as a “cost” function. In certain embodiments, the vehicle network performance description 5702 is entered by a user and/or determined from a specification for the vehicle, and the vehicle performance network impact description 5802 is determined in response to the network routing layout, the network topology, the position of network components, the zoned architecture communication scheme, and information known about the vehicle and likely operating environment. In certain embodiments, an initial zonal architecture value is utilized as a starting point, which might be: a design entered by the user, a design from a previous model year for the vehicle, a design from a similar vehicle, and/or a simple baseline design used as a general starting point. In certain embodiments, operation of the procedure 5300, and/or of similar design procedures set forth in the present disclosure (e.g., and without limitation, procedures set forth in and/or supported by embodiments in
The example procedure 5300 further includes an operation 5306 to integrate a multi-zone network on a vehicle in response to the zonal architecture value. Referencing
Referencing
Referencing
Referencing
Without limitation to any other aspect of the present disclosure, embodiments herein provide for a system and procedures to implement a zonal network architecture on a vehicle to avoid or mitigate physical system risks, for example due to environmental issues such as temperature, vibration, electro-magnetic interference (EMI), road splash (or water intrusion generally), or the like. Additionally or alternatively, the setup and configuration of a zonal network architecture on the vehicle can avoid negative consequences and/or improve outcomes of the system relative to failure modes, including any failure mode of interest, such as loss of a network component (e.g., an end point failure, loss of communication, loss of a cable, etc.), physical damage to the vehicle that may impact the network (e.g., damage due to an accident, improper hookup of a towing vehicle, damage to cables during a service event, electrical damage to the vehicle, etc.).
Again referencing
The example procedure 6400 further includes an operation 6404 to apply the vehicle network risk description 6502 to a current proposed zonal architecture value, and determine the vehicle performance network impact description. For example, in operation 6404 the criteria from the failure mode description 6514 are compared to determine the degradation of the vehicle network performance in light of the failure mode, and that degraded performance is compared to the acceptable performance level.
The example procedure 6400 includes an operation 6406 to determine whether performance criteria for the zonal architecture value have converged. For example, if a selected number of adjustments to the zonal architecture value have not resulted in improved performance relative to the vehicle network risk description, and/or the rate of improvement has fallen below a threshold, then the operation 6406 may be determined as YES. In certain embodiments, for example where the performance relative to the vehicle network risk description is acceptable, the operation 6406 may still be determined as YES even if further improvements may be available, or even if further improvements are likely to be available. In certain embodiments, performance relative to the vehicle network risk description may be enforced to be an improvement, or at least not a degradation, relative to a baseline (e.g., a previous model year of the vehicle), for example to ensure that continuous improvement is being pursued. In certain embodiments, the operation 6406 may utilize a full optimization routine, and/or may include a cost analysis where the performance relative to the vehicle network risk description is used as a threshold for convergence, and the cost is minimized, improved relative to a baseline, and/or held to a not-to-exceed threshold as a part of operation 6406.
In response to operation 6406 determining YES, the procedure 6400 includes operation 6408 to utilize the current proposed zonal architecture value as the zonal architecture value. In response to operation 6406 determining NO, the procedure 6400 incudes operation 6410 to adjust the zonal architecture value based on performance shortfalls and/or improvement opportunities relative to the vehicle network risk description and/or a cost analysis. After operation 6410 to adjust the proposed zonal architecture value, the procedure 6400 returns to operation 6404. In certain embodiments, for example after a number of iterations of operation 6410, and/or after a design space has been sufficiently explored (e.g., the main reasonable network topologies have been considered, etc.) without convergence, the procedure 6400 may determine to exit, for example providing a notification of operating parameters (e.g., zonal architecture values attempted, best results, gap indications that prevented convergence, etc.), for example to allow the user to consider whether some constraint can be relaxed and/or whether a cost limit might need to be adjusted.
The procedure 6400 includes operation 6402 to determine the vehicle network risk description, and convergence operation 6406 determined according to performance against the vehicle network risk description. In certain embodiments, procedure 6400 may utilize a vehicle network performance description as the determined value in 6402, and for determining the convergence operation 6406, for example to select a zonal architecture value to enhance performance criteria rather than, or in addition to, the risk criteria of the vehicle network risk description. Similarly, the procedure 6400 may utilize a vehicle performance network impact description as the determined value in 6402, and for determining the convergence operation 6406, for example to select a zonal architecture value to enhance cost criteria rather than, or in addition to, the risk criteria of the vehicle network risk description. Additionally or alternatively, procedure 6400 can be operated on multiple vehicle classes at the same time, similar to operations described in
An example system 5000 includes the selected zone architecture as a star arrangement (e.g., reference
An example system 5000 includes the selected zone architecture as a star arrangement with four total zones, including the central zone, two forward zone each communicatively coupled to the central zone, and a rearward zone communicatively coupled to the central zone (e.g., reference
An example system 5000 includes the selected zone architecture as a mesh arrangement having four total zones, including the central zone (in the example, the central zone is the zone associated with a central zone manager 302 having responsibilities thereof, and is not related to the geometric position of the central zone), two forward zones, and one rearward zone, wherein each of the four zones is communicatively coupled to all of the other zones (e.g., reference
An example system 5000 includes the selected zone architecture as a ring arrangement having a ring arrangement with four total zones, with the zones communicatively coupled, in order, as follows: a central zone having a central zone manager (in the example, the central zone again does not need to be, but could be, a geometrically centrally located zone), coupled to a first forward zone, the first forward zone coupled to a second forward zone, the second forward zone coupled to a rearward zone, and the rearward zone communicatively coupled to the central zone (e.g., reference
An example system 5000 includes the selected zone architecture as a two node topology, where one of the two nodes is a central zone (e.g., reference
An example system 5000 includes the selected zone architecture including at least one of the plurality of zones provided as a virtual network zone. Without limitation to any other aspect of the present disclosure, the utilization of one or more virtual network zones provides for an additional degree of freedom in the configuration space for available zonal architecture values. It will be seen that utilizing a virtual network zone reduces the hardware cost value in most cases, assuming that an appropriately positioned hardware based network zone is present on the vehicle that is capable to manage additional communication load from the messages on the virtual network zone without hardware modifications (e.g., higher grade cables, network communication devices, shielding requirements, etc.). However, there will be some tradeoffs within the design space, for example due to increased traffic and risk on the hardware based network zone that is then servicing two logical network zones of the vehicle, which may increase risks associated with a failure related to that zone, and which may reduce the redundancy options available to respond to certain failure modes or risks. The availability of the extra degree of freedom by considering virtual network zones will improve outcomes of convergence operations and/or overall performance against risk-based, cost-based, or performance-based convergence criteria, although the utilization of a virtual network zone may not be selected for a given vehicle or vehicle class.
Referencing
Without limitation to any other aspect of the present disclosure, embodiments herein provide for a system and procedures to implement a zonal network architecture on a vehicle to avoid or mitigate system risks involving the loss or degradation of a network control component, for example allowing for the selection and/or migration of control responsibility for the zonal network.
Referencing
The example system 6700 includes a network management controller 5002 include a zone implementation circuit 5004 that interprets a zoned architecture communication scheme 5014, a zone manager command circuit 5006 that interprets a zone manager command description 5016 for each of the zone managers in response to the zoned architecture communication scheme 5014, and a zone execution circuit 5008 that provides the corresponding zone manager command description 5016 to each of the zone managers. The example system 6700 includes each zone manager responsive to the corresponding zone manager command description 5016 to control communications between end points of the corresponding network zone and end points of at least one other zone of the network zones. An example system 6700 includes the network management controller 5002 positioned, at least in part, on the central zone manager.
An example zoned architecture communication scheme 5014 includes a central zone manager succession scheme, which may include information such as which central zone manager off-nominal conditions 6702 indicate that the central zone manager duties should be moved to another zone controller, and which of the central zone manager duties should be included in the move. For example, in certain embodiments the central zone manager may have duties such as: operating as the zone manager for the central zone; distributing zone manager command descriptions 5016 to the other zone managers; maintaining a service register and/or managing publication and enrollment of a service-oriented-architecture (SOA, e.g., reference
An example zone execution circuit 5008 determines the off-nominal condition for the central zone manager 6702, and migrates central zone manager duties to another zone manager (e.g., by providing zone manager migration commands 6704 to the successor zone(s)) in response to the central zone manager succession scheme. In certain embodiments, operations to provide the zone manager migration commands 6704 may instead be performed by the hardware redundancy implementation circuit 5010 or the control redundancy implementation circuit 5012.
Referencing
In certain embodiments, the network topology description includes a communicative coupling arrangement of the network zones. Example and non-limiting network topology descriptions include the communicative coupling arrangement as a star arrangement, as a mesh arrangement, and/or as a ring arrangement. It will be understood that, in pure star arrangement (e.g., where there are no back-up connections between zones, for example an unused or lightly used back-up connection where, in operation, the multi-zone network operates logically as a star arrangement even if there are additional hardware connections), if the central zone manager is also the hub zone of the star arrangement, then a loss of the central zone manager would prevent migration of most duties of the central zone manager, since the network zones would become isolated. In certain embodiments, even where the network zones become isolated, some operations of the vehicle may be possible, depending upon the redundancy plans for the system, and the ability of the independent zones to operate without any cross-network communications using those redundancy plans. If another zone manager acts as the hub zone of the star arrangement, then a loss of the central zone manager in the star arrangement would allow migration of duties of the central zone manager.
Referencing
Referencing
Without limitation to any other aspect of the present disclosure, embodiments herein provide for a system and procedures to implement a zonal network architecture on a vehicle to enhance the security of the system, including providing for the ability to physically or logically segregate critical end points or communications from non-critical end points, to provide enhanced capabilities and greater control of features to more parties involved with the vehicle (e.g., owners, dealers, fleet managers, service personnel) while still preserving communication security and capability of the network to manage critical communications for the mission functions of the vehicle. Further, security responsibilities can be distributed, allowing for rapid updates, immediate response to changes, and the like, while preserving the simplicity and security of centralized control.
Again referencing
An example system 5000 includes the zone implementation circuit 5004 interpreting a zoned architecture communication scheme update (e.g., as a new zoned architecture communication scheme 5014), where the zone manager command circuit 5006 further interprets the zone manager command description 5016 for each of the zone managers in response to the updated zoned architecture communication scheme 5014, and where the zone execution circuit 5008 provides the corresponding updated zone manager command description 5016 to each of the zone managers. In certain embodiments, the zone execution circuit 5008 provides the corresponding updated zone manager command description 5016 during run-time operations (e.g., as soon as the zoned architecture communication scheme update is received). In certain embodiments, the updated zone manager command descriptions 5016 are implemented immediately, for example where the updated zone manager command descriptions 5016 as a configuration file without software changes, and where the operations represented within the updated zone manager command descriptions 5016 allow for runtime changes. In certain embodiments, the updated zone manager command descriptions 5016 include a flag indicated whether they should be implemented immediately or on the next vehicle start event, where that flag may be provided as a part of the zoned architecture communication scheme 5014, and/or may be determined by the zone manager command circuit 5006 (e.g., by screening for certain types of changes that indicate that an immediate runtime change should not be implemented). Where the updated zone manager command descriptions 5016 are implemented on a subsequent startup event, the operations of the system 5000 still facilitate case and speed of updates relative to previously known systems, as each zone manager already has the appropriate commands available for immediate implementation.
Referencing
Referencing
Referencing
Example and non-limiting connectivity schemes 7402 include one or more of: a communication rate value 7404 (e.g., data rates, including burst rates and/or time averaged rates, allowed between network zones); a communication protocol value 7406 (e.g., communication protocols to be applied or followed for the message between zones); a sampling rate value 7408 (e.g., the message rate to be utilized, and/or the dynamics to be reflected in the data, which can be adjusted with up-sampling or down-sampling operations, for example providing a 20 msec vehicle speed value to a limited capability end point on a CAN that expects 20 msec data and does not have the capability to parse time data from a message); a communication header value 7410 (e.g., the form, size, and content of header information for the message); a communication metadata value 7412 (e.g., metadata form, size, and content for the message); a communication unit value 7414 (e.g., the units, such as SI units, American engineering units, etc., and/or the scaling of unitless data, for example for fixed point data; in certain embodiments the byte depth and/or type of the data may be specified in the connectivity scheme 7402); a communication encapsulation description 7416 (e.g., specifying whether communications should be encapsulated, for example preserving an original CAN message within an ethernet message, to allow CAN-CAN communications over an intervening network, to preserve original metadata in the message for monitoring or later analysis, etc.); and/or a communication time stamp description 7418 (e.g., the size, position, and format of time stamps, the utilization of PTP time stamp, the preservation or elimination of any local time stamp previously associated with the message, etc.).
Referencing
Referencing
Referencing
Without limitation to any other aspect of the present disclosure, embodiments herein provide for a system and procedures to implement a zonal network architecture to simplify and enhance network communications control in the zonal network architecture. For example, systems and procedures herein provide embodiments that allow end points on distinct zones, with different communication payloads, metadata, device capability, and the like to communicate in a secure manner that is operable and easily configured in view of the additional complexity of a zoned network environment. Systems and procedures herein protect the capability of the zonal network architecture to perform critical functions and to support flexible additional functions, for example by balancing the loads and utilization of network components such as backbones and zone controllers.
Referencing
Referencing
Referencing
Referencing
Referencing
Without limitation to any other aspect of the present disclosure, embodiments herein provide for a system and procedures to implement a zonal network architecture to simplify and enhance network communications control in the zonal network architecture. For example, systems and procedures herein provide embodiments that enforce the selected security and permissions scheme for the network, without requiring the user to have full knowledge of all end points on the network, and/or the locations of all data within the network. Further, embodiments herein allow a user to create or adjust the security and permissions scheme for the entire zonal network through simple operations with a single access point, and to adjust mitigation plans such as redundancy implementation and/or succession of responsibility through simple operations with that single access point.
Referencing
An example system 8800 includes the service management controller 8802 positioned, at least in part, on a central zone manager of the zone managers. An example central zone manager is directly communicatively coupled to each one of the other zone managers. An example system 8800 includes the network management controller 8804 positioned, at least in part, on the central manager.
Referencing
Referencing
An example service publication circuit 8810 exposes the service(s) 9002 by listing the service register 8902 in a data structure provided to the requestor source, for example a requestor source may request a listing of services 9002, and/or may be periodically provided a list of services 9002. The data structure provided to the requestor source is based on the service register 8902, but will be limited to services that the requestor source has permissions to view and/or to subscribe to, and/or services 9002 that are likely to be of interest to the requestor source.
An example service publication circuit 8810 exposes the service(s) 9002 by listing the service 9002 in a known location (e.g., a memory location accessible to actors on the network). In certain embodiments, a number of data structures with service listings may be provided, for example based on common permissions classes of actors on the network. For example a first permissions class may allow access to a first table, for example listing only services that access low security data or functions, and a second permissions class may allow access to a second table, for example listing services that access more sensitive data or functions. There may be any number of permissions classes. In certain embodiments, a service listing may be created in response to a request, with services filtered according to the overall permission scheme applicable to the requestor source. A requestor source may be any actor on the system (e.g., an end point, an application, a flow, a controller, etc.), and/or may include actors off the system (e.g., a user interacting with an external device, such as tool in the cloud, or a service tool in communication with the vehicle, that requests a service providing data or allowing functions to be accessed by the user), and will similarly be limited by the appropriate permission scheme applicable to the user, the external device, and/or the tool being utilized to request the service. In certain embodiments, a service provider could be an external device, for example allowing on-vehicle actors to access data, processing functionality, or any other service aspect that is provided by the external device (again subject to publication and other permissions applicable to the external device).
An example service publication circuit 8810 interprets a service publication request 8906 for a new service from a new service provider (e.g., a provider of the new service, which may be a new requestor source or a requestor source publishing a new service), determines a new service description in response to the service publication request 8906 and the new service provider (e.g., determined from data fields in the service publication request 8906, and/or interpreted from the operations performed by the service), and maintains the service register 8902 by adding the new service 9002 as one of the services in the register.
An example service publication circuit 8810 further adds the new service to the service register 8902 in response to a permissions value associated with the new service provider, for example denying the request, adding the service to the service register 8902 but not publishing the service, and/or by making appropriate entries in a permissions field of the service register 8902 (e.g., specifying permissions for visibility and/or enrollment of the service).
An example service publication circuit 8810 maintains the service register 8902 by removing a service from the plurality of services in response to a service publication request 8906, which may include deleting the associated entry from the service register 8902, adjusting the service register entry so the service is no longer visible or published, and/or setting an inactive flag in an associated entry from the service register 8902 (e.g., thereby allowing for tracking of services that have been available, and/or simplifying the process to turn the service back on at a later time).
An example service publication circuit 8810 maintains the service register by deprecating a service from the services in the service register in response to a service publication request 8906 (e.g., where the service publication request 8906 is a request to stop publishing the service). As used herein, deprecating a service allows the service to continue to be utilized by enrollee actors that were enrolled at the time of deprecation, but does not allow new requestors to see or utilize the service 9002, and blocks further enrollments for the service. The deprecation operation allows services to be grandfathered out of the system as enrollees stop using the service 9002. As used herein, making a service 9002 inactive does not necessarily remove the enrollment status of requestors, but the service 9002 will not be utilized unless and until the service is reactivated.
An example service publication circuit 8810 further maintains the service register 8902 by removing a service from the available services in response to determining that at least one aspect of the service is no longer available (e.g., an end point used by the service is no longer present, service enrollees are no longer receiving the benefit of the service, and/or the service provider appears unresponsive to the service 9002). In certain embodiments, removing the service from the available services includes setting an inactive flag, and/or deleting the entry for the service 9002 from the service register 8902.
Once a service is active, an enrollee may engage the service actively or passively, depending upon the nature and configuration of the service. For example, utilizing the service 9002 may involve passively receiving data, which may be sent from the service provider directly to enrollees as data communications, and/or the data may be sent to the service management controller 8802 for storage in a location accessible to enrollees at a time of need or convenience. In another example, the service may involve a call from the enrollee, for example passing data parameters that inform the service—for example a number that is passed to the service provider and a value of the function is returned after the call, parameters for an actuator setting requested by the enrollee, and/or a data block for processing (e.g., a stream of data values on which the processing of the service is performed). In certain embodiments, the service register 8902 stores the service call formatting and information, which is then available to the enrollee for utilizing the service 9002.
In certain embodiments, a service permissions description includes a service publication permission, a service subscription permission, and/or a service visibility permission. In certain embodiments, the service register 8902 may be stored on an external device, which may be in addition to a local version of the service register 8902. In certain embodiments, the service register 8902 stored on an external device may be different from the local version, for example with only active services listed externally, and/or with services listed on the external device that are deleted from the local version.
Referencing
Example operations 9204 to expose the at least one service include: listing the service in a data structure provided to the requestor source; and/or listing the service in a data structure available to the requestor source.
Referencing
Without limitation to any other aspect of the present disclosure, embodiments herein provide for a system and procedures to implement a zonal network architecture to control time management of communications on the network, including time management for control purposes (e.g., synchronization of operations between distributed controllers), and/or for data analysis (e.g., comparing streams of data to detect events, plan or implement diagnostics or troubleshooting operations, etc.).
Referencing
An example system 9400 includes the time management scheme including a designated one of zone managers to operate as a precision time protocol (PTP) grandmaster for the multi-zone network. The example system 9400 may further include the other zone managers designated as boundary clocks for the corresponding network zones. In certain embodiments, the central zone manager may operate as the PTP grandmaster for the multi-zone network, but any other zone manager may operate as the PTP grandmaster, where the central zone manager operates as a boundary clock for the central zone.
In certain embodiments, one or more end points may instead operate as a clock for a given zone, including as the PTP grandmaster for the multi-zone network, and one or more end points may operate as boundary clocks for their respective zones. In certain embodiments, a mix of selected end points and/or zone managers may operate as the clocks, including the PTP grandmaster and/or boundary clocks for respective zones.
An example system includes the zone implementation circuit 5004 operating a best master clock algorithm to determine the designated one zone manager(s) and/or end points to operate as the PTP grandmaster. In certain embodiments, the zone implementation circuit 5004 may further operate a best master clock algorithm for end points and the zone manager of a given zone to determine and designate a boundary clock for the given zone. In certain embodiments, the best master clock algorithm may be operated away from the vehicle, for example on a build environment and/or monitoring environment such as depicted in
An example zone execution circuit 5008 further determines a PTP grandmaster time loss event 9404, the zone implementation circuit 5004 further operates the best master clock algorithm to determine an alternative one of the at least one zone managers to operate as the PTP grandmaster, and the zone execution circuit 5008 further designates the alternative one of the zone managers to operate as the PTP grandmaster. In certain embodiments, the alternative best PTP grandmaster is stipulated in the time management scheme, where the zone execution circuit 5008 further determines a PTP grandmaster time loss event 9404, and designates the stipulated alternative one of the zone managers to operate as the PTP grandmaster. In certain embodiments, the PTP grandmaster may be any one of a zone manager or an end point, where the zone execution circuit 5008 further determines a PTP grandmaster time loss event 9404, where the zone implementation circuit 5004 further operates the best master clock algorithm to determine an alternative end point and/or zone manager to operate at the PTP grandmaster, and the zone execution circuit 5008 further designates the determined alternative end point and/or zone manager to operate as the PTP grandmaster. In certain embodiments, the PTP grandmaster may be any one of a zone manager or an end point, where the alternative best PTP grandmaster is stipulated in the time management scheme as any one of a zone manager or an end point, where the zone execution circuit 5008 further determines a PTP grandmaster time loss event 9404, and designates the stipulated alternative one of the zone manager or end point as the PTP grandmaster.
An example system 9400 includes the zone controllers applying a common PTP time stamp to at least a portion of communications provided on the corresponding network zones. An example system 9400 includes the zone controllers instructing the application of a common PTP time stamp to at least a portion of communications provided on the corresponding network zones.
An example system 9400 includes the zone controllers removing a local time stamp from at least a portion of communications provided on the corresponding one of the plurality of network zones. An example system 9400 includes the zone controllers instructing the removal of a local time stamp from at least a portion of communications provided on the corresponding network zones. In certain embodiments, the local time stamp is kept, and/or moved into a different part of the message. Keeping the original local time stamp allows for certain post-processing operations, confirmation of the performance and selection of the PTP grandmaster, detection of systematic issues in the overall timekeeping and synchronization scheme, and the like.
Referencing
An example communications priority scheme 9504 includes a network routing value 9506, for example providing a short path, lower activity path, and/or more rapid travel time path for high priority communications, and providing a longer path, a higher activity path, and/or a longer travel time path for low priority communications. An example communications priority scheme 9504 includes a communication scheduling value 9508, for example providing a higher priority scheduling for a high priority communication, and providing a lower priority scheduling, including potentially as “as available” or “best effort” scheduling, for a lower priority communication. In certain embodiments, a credit based scheduling may be utilized to prioritize high priority communications while allowing some lower priority communications to proceed.
In certain embodiments, the vehicle operating conditions are utilized to determine scheduling and/or routing for high and low priority messages, and/or the vehicle operating conditions are utilized to determine or adjust the priority of messages. For example, during normal operations, an AV message may be a high priority message due to the time sensitivity of such messages, but during certain operating conditions, for example when critical network traffic for control messages are high, and/or the network is degraded, an AV message may be treated as a low priority message, until vehicle operations return to normal and/or the degradation is resolved.
Referencing
Referencing
In certain embodiments, procedure 9600 includes designating an end point and/or a zone manager as a boundary clock for each zone, with one end point and/or zone manager designated as a PTP grandmaster. In certain embodiments, the procedure 9600 includes operating a best master clock algorithm to designate the end point and/or zone manager as the PTP grandmaster. In certain embodiments, the procedure 9700 includes operating a best master clock algorithm to designate the alternative PTP grandmaster. In certain embodiments, designating the PTP grandmaster, the alternative PTP grandmaster, and/or the boundary clocks includes determining the PTP grandmaster, alternative PTP grandmaster, and/or the alternative clocks based on a master zone having the most critical and/or most time sensitive operations occurring thereon.
Without limitation to any other aspect of the present disclosure, embodiments herein provide for a system and procedures to configure and/or adjust a zonal network architecture, whether in the design phase (e.g., planning the zonal network architecture for a new vehicle) or the runtime phase (e.g., monitoring, confirming, or troubleshooting an existing vehicle that is in operation). Embodiments herein include tools to quickly design a new system, to confirm expected operation, to diagnose anomalous operation, to compare different configurations, to leverage lessons learned and configuration options between vehicles, and to roll out updated configurations with a high confidence that the updated configuration will operate as expected and not cause downtime.
Referencing
The example system 9800 includes an end point modeling circuit 9808 that populates the virtual multi-zone network model 10004 with end points based on a vehicle control model 10006. In certain embodiments, the end point modeling circuit 9808 is empirical and/or low resolution, and populates the end points with data providers that simulate traffic on the network of the vehicle at a realistic rate, for example based on monitoring data from a vehicle in service. In certain embodiments, the end point modeling circuit 9808 is based on high resolution and/or first principals, for example utilizing the actual applications, flows, end points, or the like that are installed (and/or a representative installation) on the vehicle, allowing for true generation of traffic, response to inputs including environmental parameters, sensors, and/or operator inputs. In certain embodiments, both a low resolution and high resolution model may be utilized, for example using a low resolution realistic network traffic emulator to detect gross network problems, and then using a high resolution full end point model to make a granular diagnosis of the network performance, test whether new control algorithms or updates will create any unexpected issues, or the like. In certain embodiments, operator inputs, sensor inputs, and the like may be fully simulated, for example utilizing a software interface to simulate the vehicle interior and controls available to the operator, and/or utilizing actual hardware elements that interface with the vehicle multi-zone architecture configuration platform 9802 to simulate operator inputs. In certain embodiments, a simple interface screen depicting the available switches and operator inputs may be utilized, with numerical or graphical selection of the positions of operator inputs.
The example vehicle multi-zone architecture configuration platform 9802 includes the network modeling circuit 9806 further building the virtual multi-zone network model 10004 by applying a zoned architecture communication scheme 10008, for example an actual full zone manager control scheme according to embodiments herein, and which again may have low resolution simplified versions, and high resolution realistic or actual versions to fully test the planned control environment for the vehicle. The example vehicle multi-zone architecture configuration platform 9802 includes a network execution circuit 9810 that simulates runtime operation of a multi-zone network of a vehicle in response to the virtual multi-zone network model 10004, the vehicle control model 10006, and/or the zoned architecture communication scheme 10008. Depending upon which aspects of the zonal architecture design, the multi-zone network, and/or the vehicle controls, one or more aspects of the virtual multi-zone network model 10004, the vehicle control model 10006, and/or the zoned architecture communication scheme 10008 may be provided in a low resolution or high resolution mode. Additionally or alternatively, vehicle operations may be performed according to a digitally fed operation, for example with driving operations, torque feedback, ambient conditions, and the operating through a digitally specified sequence (e.g., simulating a driving route, certain tests, diagnostics, network monitoring operations, or the like intended to test control features and/or exercising the network under selected conditions), through manual inputs of an operator (e.g., using a virtual vehicle interior, and/or some elements that include actual hardware in the loop). The example vehicle multi-zone architecture configuration platform 9802 includes a zoned architecture evaluation circuit 9812 that provides a network operation report 10010 in response to the simulating.
Referencing
In certain embodiments, operations to build the virtual multi-zone network model 10004 include allowing the user to begin with a pre-built model, which may be selected from a list or menu of basic network selection values 10502 (e.g., reference
In certain embodiments, the user may add elements by dragging and dropping them onto the virtual network build environment 9908, for example pulling zone managers, switches, end points, network connections, and the like onto the virtual network build environment 9908, and/or inserting elements onto the virtual network build environment 9908 using menu selections and/or keyboard shortcuts. In certain embodiments, typical interface elements are provided on the virtual network build environment 9908, for example allowing a user to select devices and drag them to different locations, alternate select devices (e.g., with a right click, shift click, hold click, etc.) to get a properties menu for the device, and the like. In certain embodiments, devices will be populated with actual example hardware, for example including actual device capabilities and characteristics (e.g., ports, processing power, memory, communication rates, etc.) and/or costs of the devices. In certain embodiments, end points may be configured, for example as sensors, actuators, and computing devices (e.g., ECUs), which may additionally be selected from a menu of actual devices, have user-defined properties, and/or default properties. In certain embodiments, the model is populated with actual network hardware, and runs a high resolution network hardware model 10014, for example including (reference
In certain embodiments, end points, zone managers, or other elements can be populated with actual controls—for example designating a software build from a configuration library, which may be synced with actual production and/or engineering databases for a high resolution simulation. In certain embodiments, for example even when a full software build is integrated into the virtual network build environment 9908, a selection for simulation resolution can allow for switching the simulation between simple network traffic modeling, or actual vehicle runtime modeling. In certain embodiments, a selection can include environmental modeling (e.g., a vehicle environment model 10012), for example determining temperatures, vibration profiles, water intrusion or road splash, or the like for the network components, including models for temperature generation, heat rejection, warm-up, and/or cool down operations by controllers and nearby vehicle devices (e.g., an engine, electric motor, turbocharger, radiator, wheels and brakes, etc.) as well as ambient heat transfer. Referencing
In certain embodiments, the user can select a previous build, a build from an actual vehicle, or the like. In certain embodiments, the vehicle may be depicted schematically (e.g., as an outline, which may have a proper relative size or not), omitted completely, and/or depicted realistically (e.g., from CAD file, a drawing prepared for the purpose of the platform, etc.). In certain embodiments, the vehicle may be depicted as an empty shell, with major parts in place (e.g., powertrain components, engine, tires, vehicle interior, etc.), and/or as a high resolution model of the vehicle (e.g., enabling footprint analysis, high resolution determination of installation feasibility, modeling of environmental parameters, and/or integration challenges). An example network modeling circuit 9806 builds the virtual multi-zone network model of the vehicle by pre-populating the virtual multi-zone network model 10004.
Referencing
An example vehicle control model 10006 includes a model of end points of the multi-zone network simulating vehicle control operation, including actual network traffic, vehicle responses, and/or actual vehicle control instructions and data.
An example network execution circuit 9810 simulates runtime operation of the multi-zone network by simulating an off-nominal condition, for example certain hardware, control, and/or operating failures. An example network execution circuit 9810 simulates the off-nominal condition by simulating at least one condition selected from: the loss of an end point, the loss of a network component, a selected vehicle operating condition, or a selected operator behavior.
An example network modeling circuit 9806 builds the virtual multi-zone network model 10004 of the vehicle by applying a network topology description. An example network topology description includes applying a selected network topology for the zones of the multi-zone network, and assigning the zone controllers to the zones of the multi-zone network. An example network modeling circuit 9806 applies the network topology description in response to user inputs on the user interface.
An example network operation report 10010 includes an operational capability value (e.g., describing simulation outcomes, comparisons to expectations and/or specifications, etc.), a vehicle network performance description 10202 (e.g., reference
Referencing
In certain embodiments, a high resolution simulation of network operations includes the network modeling circuit 9806 building the virtual multi-zone network model 10004 by performing one or more of (reference
An example vehicle multi-zone architecture configuration platform 9802 further includes a zoned architecture rollout circuit 9814 that builds a zoned architecture communication scheme 10008 in response to user operations on the interface and/or simulation results. The example zoned architecture rollout circuit 9814 communicates the zoned architecture communication scheme 10008 to a network management controller of a target vehicle, allowing the vehicle multi-zone architecture configuration platform 9802 to directly implement the zoned architecture rollout circuit 9814. In certain embodiments, the zoned architecture rollout circuit 9814 can provide a communication or final output including any aspects of the virtual multi-zone network model 10004, vehicle control model 10006, vehicle environment model 10012, network hardware model 10014, a schematic of the build environment, the network operation report 10010, a bill of materials for network components, and any simulation parameters, configurations, or results.
Referencing
Referencing
Without limitation to any other aspect of the present disclosure, embodiments herein provide for a system and procedures to monitor and/or analyze a zonal network architecture and/or a prospective zonal network architecture, to utilize the network monitoring and/or analysis in performing diagnostics, identifying issues, responding to issues, planning mitigation actions to issues, performing fault tree analysis, planning updates or recalls, developing a deeper understanding of activity on the vehicle and/or vehicle effects of a possible or actual failure or off-nominal operation, or the like.
Referencing
An example virtual network map 11014 includes an interactive network activity depiction, for example with a graphical depiction of traffic flows between end points and/or network zones, bandwidth utilization descriptions, statistical data such as lost packets, comparisons to expected values, and the like. In certain embodiments, the virtual network map 11014 may include any data or depictions such as those depicted in
An example network analysis circuit 11008 further provides a network detail value 11018 (reference
vehicle multi-zone monitoring platform 11002 further includes a zoned architecture rollout circuit 9814 that builds a zoned architecture communication scheme 10008 in response to the network adjustment value 11020. The example zoned architecture rollout circuit 9814 further communicates the zoned architecture communication scheme 10008 to a network management controller of the vehicle or an offset vehicle (e.g., as a part of upgrading offset vehicles, which may be within the same vehicle class and/or share a relevant similarity in the network configuration).
Referencing
Referencing
Without limitation to any other aspect of the present disclosure, embodiments herein provide for a system and procedures to monitor and/or analyze a zonal network architecture, where such monitoring can operate on the vehicle, and quickly identify and respond to issues as experienced on the vehicle with rapid response, or even immediate and/or automated response. Actions to respond include, without limitation, implementing a redundancy plan, changing a configuration of the zonal network operations (e.g., prioritizing critical communications and operations, and/or changing the routing or configuration of communications), migrating responsibility for security and/or control operations, and/or providing notifications and/or relevant data to a selected off-vehicle location.
Referencing
An example network reaction circuit 11404 collects one or more aspects of the event information as a post-event activity. An example network reaction circuit 11404 collects one or more aspects of the event information as pre-event information, for example captured from a rolling buffer, and/or captured from non-transient information (e.g., states or fault codes) that survived the event period. An example network reaction circuit 11404 collects the event information by capturing network activity 11012 utilized to determine the network performance event 11408. Referencing
Referencing
The methods and systems described herein may be deployed in part or in whole through a machine having a computer, computing device, processor, circuit, and/or server that executes computer readable instructions, program codes, instructions, and/or includes hardware configured to functionally execute one or more operations of the methods and systems herein. The terms computer, computing device, processor, circuit, and/or server, (“computing device”) as utilized herein, should be understood broadly.
An example computing device includes a computer of any type, capable to access instructions stored in communication thereto such as upon a non-transient computer readable medium, whereupon the computer performs operations of the computing device upon executing the instructions. In certain embodiments, such instructions themselves comprise a computing device. Additionally or alternatively, a computing device may be a separate hardware device, one or more computing resources distributed across hardware devices, and/or may include such aspects as logical circuits, embedded circuits, sensors, actuators, input and/or output devices, network and/or communication resources, memory resources of any type, processing resources of any type, and/or hardware devices configured to be responsive to determined conditions to functionally execute one or more operations of systems and methods herein.
Network and/or communication resources include, without limitation, local area network, wide area network, wireless, internet, or any other known communication resources and protocols. Example and non-limiting hardware and/or computing devices include, without limitation, a general-purpose computer, a server, an embedded computer, a mobile device, a virtual machine, and/or an emulated computing device. A computing device may be a distributed resource included as an aspect of several devices, included as an interoperable set of resources to perform described functions of the computing device, such that the distributed resources function together to perform the operations of the computing device. In certain embodiments, each computing device may be on separate hardware, and/or one or more hardware devices may include aspects of more than one computing device, for example as separately executable instructions stored on the device, and/or as logically partitioned aspects of a set of executable instructions, with some aspects comprising a part of one of a first computing device, and some aspects comprising a part of another of the computing devices.
A computing device may be part of a server, client, network infrastructure, mobile computing platform, stationary computing platform, or other computing platform. A processor may be any kind of computational or processing device capable of executing program instructions, codes, binary instructions and the like. The processor may be or include a signal processor, digital processor, embedded processor, microprocessor or any variant such as a co-processor (math co-processor, graphic co-processor, communication co-processor and the like) and the like that may directly or indirectly facilitate execution of program code or program instructions stored thereon. In addition, the processor may enable execution of multiple programs, threads, and codes. The threads may be executed simultaneously to enhance the performance of the processor and to facilitate simultaneous operations of the application. By way of implementation, methods, program codes, program instructions and the like described herein may be implemented in one or more threads. The thread may spawn other threads that may have assigned priorities associated with them; the processor may execute these threads based on priority or any other order based on instructions provided in the program code. The processor may include memory that stores methods, codes, instructions and programs as described herein and elsewhere. The processor may access a storage medium through an interface that may store methods, codes, and instructions as described herein and elsewhere. The storage medium associated with the processor for storing methods, programs, codes, program instructions or other type of instructions capable of being executed by the computing or processing device may include but may not be limited to one or more of a CD-ROM, DVD, memory, hard disk, flash drive, RAM, ROM, cache and the like.
A processor may include one or more cores that may enhance speed and performance of a multiprocessor. In embodiments, the process may be a dual core processor, quad core processors, other chip-level multiprocessor and the like that combine two or more independent cores (called a die).
The methods and systems described herein may be deployed in part or in whole through a machine that executes computer readable instructions on a server, client, firewall, gateway, hub, router, or other such computer and/or networking hardware. The computer readable instructions may be associated with a server that may include a file server, print server, domain server, internet server, intranet server and other variants such as secondary server, host server, distributed server and the like. The server may include one or more of memories, processors, computer readable transitory and/or non-transitory media, storage media, ports (physical and virtual), communication devices, and interfaces capable of accessing other servers, clients, machines, and devices through a wired or a wireless medium, and the like. The methods, programs, or codes as described herein and elsewhere may be executed by the server. In addition, other devices required for execution of methods as described in this application may be considered as a part of the infrastructure associated with the server.
The server may provide an interface to other devices including, without limitation, clients, other servers, printers, database servers, print servers, file servers, communication servers, distributed servers, and the like. Additionally, this coupling and/or connection may facilitate remote execution of instructions across the network. The networking of some or all of these devices may facilitate parallel processing of program code, instructions, and/or programs at one or more locations without deviating from the scope of the disclosure. In addition, all the devices attached to the server through an interface may include at least one storage medium capable of storing methods, program code, instructions, and/or programs. A central repository may provide program instructions to be executed on different devices. In this implementation, the remote repository may act as a storage medium for methods, program code, instructions, and/or programs.
The methods, program code, instructions, and/or programs may be associated with a client that may include a file client, print client, domain client, internet client, intranet client and other variants such as secondary client, host client, distributed client and the like. The client may include one or more of memories, processors, computer readable transitory and/or non-transitory media, storage media, ports (physical and virtual), communication devices, and interfaces capable of accessing other clients, servers, machines, and devices through a wired or a wireless medium, and the like. The methods, program code, instructions, and/or programs as described herein and elsewhere may be executed by the client. In addition, other devices required for execution of methods as described in this application may be considered as a part of the infrastructure associated with the client.
The client may provide an interface to other devices including, without limitation, servers, other clients, printers, database servers, print servers, file servers, communication servers, distributed servers, and the like. Additionally, this coupling and/or connection may facilitate remote execution of methods, program code, instructions, and/or programs across the network. The networking of some or all of these devices may facilitate parallel processing of methods, program code, instructions, and/or programs at one or more locations without deviating from the scope of the disclosure. In addition, all the devices attached to the client through an interface may include at least one storage medium capable of storing methods, program code, instructions, and/or programs. A central repository may provide program instructions to be executed on different devices. In this implementation, the remote repository may act as a storage medium for methods, program code, instructions, and/or programs.
The methods and systems described herein may be deployed in part or in whole through network infrastructures. The network infrastructure may include elements such as computing devices, servers, routers, hubs, firewalls, clients, personal computers, communication devices, routing devices and other active and passive devices, modules, and/or components as known in the art. The computing and/or non-computing device(s) associated with the network infrastructure may include, apart from other components, a storage medium such as flash memory, buffer, stack, RAM, ROM and the like. The methods, program code, instructions, and/or programs described herein and elsewhere may be executed by one or more of the network infrastructural elements.
The methods, program code, instructions, and/or programs described herein and elsewhere may be implemented on a cellular network having multiple cells. The cellular network may either be frequency division multiple access (FDMA) network or code division multiple access (CDMA) network. The cellular network may include mobile devices, cell sites, base stations, repeaters, antennas, towers, and the like.
The methods, program code, instructions, and/or programs described herein and elsewhere may be implemented on or through mobile devices. The mobile devices may include navigation devices, cell phones, mobile phones, mobile personal digital assistants, laptops, palmtops, netbooks, pagers, electronic books readers, music players and the like. These devices may include, apart from other components, a storage medium such as a flash memory, buffer, RAM, ROM and one or more computing devices. The computing devices associated with mobile devices may be enabled to execute methods, program code, instructions, and/or programs stored thereon. Alternatively, the mobile devices may be configured to execute instructions in collaboration with other devices. The mobile devices may communicate with base stations interfaced with servers and configured to execute methods, program code, instructions, and/or programs. The mobile devices may communicate on a peer-to-peer network, mesh network, or other communications network. The methods, program code, instructions, and/or programs may be stored on the storage medium associated with the server and executed by a computing device embedded within the server. The base station may include a computing device and a storage medium. The storage device may store methods, program code, instructions, and/or programs executed by the computing devices associated with the base station.
The methods, program code, instructions, and/or programs may be stored and/or accessed on machine readable transitory and/or non-transitory media that may include: computer components, devices, and recording media that retain digital data used for computing for some interval of time; semiconductor storage known as random access memory (RAM); mass storage typically for more permanent storage, such as optical discs, forms of magnetic storage like hard disks, tapes, drums, cards and other types; processor registers, cache memory, volatile memory, non-volatile memory; optical storage such as CD, DVD; removable media such as flash memory (e.g. USB sticks or keys), floppy disks, magnetic tape, paper tape, punch cards, standalone RAM disks, Zip drives, removable mass storage, off-line, and the like; other computer memory such as dynamic memory, static memory, read/write storage, mutable storage, read only, random access, sequential access, location addressable, file addressable, content addressable, network attached storage, storage area network, bar codes, magnetic ink, and the like.
Certain operations described herein include interpreting, receiving, and/or determining one or more values, parameters, inputs, data, or other information (“receiving data”). Operations to receive data include, without limitation: receiving data via a user input; receiving data over a network of any type; reading a data value from a memory location in communication with the receiving device; utilizing a default value as a received data value; estimating, calculating, or deriving a data value based on other information available to the receiving device; and/or updating any of these in response to a later received data value. In certain embodiments, a data value may be received by a first operation, and later updated by a second operation, as part of the receiving a data value. For example, when communications are down, intermittent, or interrupted, a first receiving operation may be performed, and when communications are restored an updated receiving operation may be performed.
Certain logical groupings of operations herein, for example methods or procedures of the current disclosure, are provided to illustrate aspects of the present disclosure. Operations described herein are schematically described and/or depicted, and operations may be combined, divided, re-ordered, added, or removed in a manner consistent with the disclosure herein. It is understood that the context of an operational description may require an ordering for one or more operations, and/or an order for one or more operations may be explicitly disclosed, but the order of operations should be understood broadly, where any equivalent grouping of operations to provide an equivalent outcome of operations is specifically contemplated herein. For example, if a value is used in one operational step, the determining of the value may be required before that operational step in certain contexts (e.g., where the time delay of data for an operation to achieve a certain effect is important), but may not be required before that operation step in other contexts (e.g. where usage of the value from a previous execution cycle of the operations would be sufficient for those purposes). Accordingly, in certain embodiments an order of operations and grouping of operations as described is explicitly contemplated herein, and in certain embodiments re-ordering, subdivision, and/or different grouping of operations is explicitly contemplated herein.
The methods and systems described herein may transform physical and/or or intangible items from one state to another. The methods and systems described herein may also transform data representing physical and/or intangible items from one state to another.
The methods and/or processes described above, and steps thereof, may be realized in hardware, program code, instructions, and/or programs or any combination of hardware and methods, program code, instructions, and/or programs suitable for a particular application. The hardware may include a dedicated computing device or specific computing device, a particular aspect or component of a specific computing device, and/or an arrangement of hardware components and/or logical circuits to perform one or more of the operations of a method and/or system. The processes may be realized in one or more microprocessors, microcontrollers, embedded microcontrollers, programmable digital signal processors or other programmable device, along with internal and/or external memory. The processes may also, or instead, be embodied in an application specific integrated circuit, a programmable gate array, programmable array logic, or any other device or combination of devices that may be configured to process electronic signals. It will further be appreciated that one or more of the processes may be realized as a computer executable code capable of being executed on a machine readable medium.
The computer executable code may be created using a structured programming language such as C, an object oriented programming language such as C++, or any other high-level or low-level programming language (including assembly languages, hardware description languages, and database programming languages and technologies) that may be stored, compiled or interpreted to run on one of the above devices, as well as heterogeneous combinations of processors, processor architectures, or combinations of different hardware and computer readable instructions, or any other machine capable of executing program instructions.
Thus, in one aspect, each method described above, and combinations thereof, may be embodied in computer executable code that, when executing on one or more computing devices, performs the steps thereof. In another aspect, the methods may be embodied in systems that perform the steps thereof, and may be distributed across devices in a number of ways, or all of the functionality may be integrated into a dedicated, standalone device or other hardware. In another aspect, the means for performing the steps associated with the processes described above may include any of the hardware and/or computer readable instructions described above. All such permutations and combinations are intended to fall within the scope of the present disclosure.
While the disclosure has been disclosed in connection with certain embodiments shown and described in detail, various modifications and improvements thereon will become readily apparent to those skilled in the art. Accordingly, the scope of the present disclosure is not to be limited by the foregoing examples but is to be understood in the broadest sense allowable by law.
The present application claims priority to, and is a continuation of, U.S. patent application Ser. No. 18/244,147, filed on 8 Sep. 2023, published as U.S. 2024-0073093 A1 and entitled SYSTEM, METHOD, AND APPARATUS TO EXECUTE VEHICLE COMMUNICATIONS USING A ZONAL ARCHITECTURE. U.S. patent application Ser. No. 18/244,147 claims priority to, and is a continuation-in-part of, U.S. patent application Ser. No. 17/570,738, filed on 7 Jan. 2022, Publication No. US 2022-0131753 and entitled SYSTEM, METHOD, AND APPARATUS TO EXTRA VEHICLE COMMUNICATIONS CONTROL. U.S. patent application Ser. No. 17/570,738 is a continuation of and claims priority to U.S. patent application Ser. No. 17/027,187, filed 21 Sep. 2020, entitled SYSTEM, METHOD, AND APPARATUS TO EXTRA VEHICLE COMMUNICATIONS CONTROL, now issued as U.S. Pat. No. 11,228,496. U.S. patent application Ser. No. 17/027,187 claims benefit of priority to the following provisional applications: U.S. Application Ser. No. 62/903,462, filed 20 Sep. 2019, entitled SYSTEM, METHOD AND APPARATUS FOR A MIXED VEHICLE NETWORK; U.S. Application Ser. No. 62/911,249, filed 5 Oct. 2019, entitled SYSTEM, METHOD AND APPARATUS FOR A MIXED VEHICLE NETWORK; U.S. Application Ser. No. 62/911,248, filed 5 Oct. 2019, entitled SYSTEM, METHOD AND APPARATUS FOR CLOUD-BASED INTERACTIONS WITH A MIXED VEHICLE NETWORK; U.S. Application Ser. No. 62/986,444, filed 6 Mar. 2020, entitled SYSTEM, METHOD AND APPARATUS FOR IMPLEMENTING CONFIGURABLE DATA COLLECTION FOR A VEHICLE; and U.S. Application Ser. No. 63/024,383, filed 13 MAY 2020, entitled SYSTEM, METHOD AND APPARATUS TO TEST AND VERIFY A VEHICLE NETWORK. U.S. patent application Ser. No. 18/244,147 claims benefit of priority to provisional U.S. Application Ser. No. 63/404,918, filed 8 Sep. 2022 entitled ZONAL ARCHITECTURE FOR A VEHICLE. Each of the foregoing patents and applications are incorporated herein by reference in the entirety for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
6292731 | Kirchhoffer et al. | Sep 2001 | B1 |
7702739 | Cheng et al. | Apr 2010 | B1 |
8024486 | Beers et al. | Sep 2011 | B2 |
8705527 | Addepalli et al. | Apr 2014 | B1 |
9355507 | Lee et al. | May 2016 | B1 |
9380428 | Dame et al. | Jun 2016 | B1 |
9470579 | Ritter et al. | Oct 2016 | B2 |
9634892 | Das | Apr 2017 | B2 |
9852636 | Chow et al. | Dec 2017 | B2 |
9871819 | Liyanage et al. | Jan 2018 | B2 |
10181059 | Brewton et al. | Jan 2019 | B1 |
10573168 | Razak et al. | Feb 2020 | B1 |
10616176 | Lei et al. | Apr 2020 | B2 |
10650621 | King et al. | May 2020 | B1 |
10759424 | Misu et al. | Sep 2020 | B2 |
10945199 | Omiya et al. | Mar 2021 | B2 |
10951728 | Lepp | Mar 2021 | B2 |
11072356 | Mong et al. | Jul 2021 | B2 |
11165651 | Fang et al. | Nov 2021 | B2 |
11228496 | Fang et al. | Jan 2022 | B2 |
11252039 | Fang | Feb 2022 | B2 |
11287150 | Guan et al. | Mar 2022 | B2 |
11312374 | Zhao et al. | Apr 2022 | B2 |
11349717 | Fang et al. | May 2022 | B2 |
11362899 | Fang et al. | Jun 2022 | B2 |
11386229 | Adams et al. | Jul 2022 | B2 |
11411823 | Fang et al. | Aug 2022 | B2 |
11520677 | Arazi | Dec 2022 | B1 |
11538287 | Fang et al. | Dec 2022 | B2 |
11721137 | Fang et al. | Aug 2023 | B2 |
11736357 | Fang et al. | Aug 2023 | B2 |
11750462 | Fang et al. | Sep 2023 | B2 |
11772583 | Fang et al. | Oct 2023 | B2 |
11778434 | Kim et al. | Oct 2023 | B2 |
11805018 | Fang et al. | Oct 2023 | B2 |
11824722 | Fang et al. | Nov 2023 | B2 |
11929878 | Fang et al. | Mar 2024 | B2 |
11943109 | Fang et al. | Mar 2024 | B2 |
12003374 | Fang et al. | Jun 2024 | B2 |
12034601 | Fang et al. | Jul 2024 | B2 |
20010033225 | Razavi | Oct 2001 | A1 |
20040093434 | Hovell et al. | May 2004 | A1 |
20040267410 | Duri et al. | Dec 2004 | A1 |
20050075760 | Moisel et al. | Apr 2005 | A1 |
20050108444 | Flauaus et al. | May 2005 | A1 |
20050182534 | Legate et al. | Aug 2005 | A1 |
20060089938 | Leonard et al. | Apr 2006 | A1 |
20060155438 | Tsunoda et al. | Jul 2006 | A1 |
20070229350 | Scalisi | Oct 2007 | A1 |
20080119983 | Inbarajan et al. | May 2008 | A1 |
20080147250 | Oesterling et al. | Jun 2008 | A1 |
20080195257 | Rauch | Aug 2008 | A1 |
20080258939 | Smith et al. | Oct 2008 | A1 |
20090125153 | Yang et al. | May 2009 | A1 |
20090187968 | Roese et al. | Jul 2009 | A1 |
20090207818 | Tsai et al. | Aug 2009 | A1 |
20090256690 | Golenski | Oct 2009 | A1 |
20100169353 | Soetarman | Jul 2010 | A1 |
20100269155 | Droms et al. | Oct 2010 | A1 |
20100332584 | Ramakrishnan et al. | Dec 2010 | A1 |
20110078299 | Nagapudi et al. | Mar 2011 | A1 |
20110153149 | Jeon | Jun 2011 | A1 |
20110169755 | Murphy | Jul 2011 | A1 |
20110196571 | Foladare et al. | Aug 2011 | A1 |
20110260884 | Yi et al. | Oct 2011 | A1 |
20110269441 | Silver | Nov 2011 | A1 |
20120139489 | Gaul et al. | Jun 2012 | A1 |
20120271849 | Lesser | Oct 2012 | A1 |
20130159489 | Cha | Jun 2013 | A1 |
20130303192 | Louboutin et al. | Nov 2013 | A1 |
20130311774 | Larson et al. | Nov 2013 | A1 |
20140173076 | Ravindran et al. | Jun 2014 | A1 |
20140215491 | Addepalli et al. | Jul 2014 | A1 |
20140276090 | Breed | Sep 2014 | A1 |
20140277935 | Daman et al. | Sep 2014 | A1 |
20140325602 | Kwon | Oct 2014 | A1 |
20140350768 | Filippov | Nov 2014 | A1 |
20140359185 | Sawal et al. | Dec 2014 | A1 |
20150051787 | Doughty et al. | Feb 2015 | A1 |
20150071115 | Neff et al. | Mar 2015 | A1 |
20150149017 | Attard et al. | May 2015 | A1 |
20150200969 | Leung et al. | Jul 2015 | A1 |
20150210287 | Penilla et al. | Jul 2015 | A1 |
20150228130 | Zinner et al. | Aug 2015 | A1 |
20150244806 | Renac et al. | Aug 2015 | A1 |
20150276415 | Shrinath et al. | Oct 2015 | A1 |
20160031441 | Foley | Feb 2016 | A1 |
20160133063 | Lim et al. | May 2016 | A1 |
20160163136 | Lee et al. | Jun 2016 | A1 |
20160182341 | Fischer et al. | Jun 2016 | A1 |
20160197776 | Das | Jul 2016 | A1 |
20160255154 | Kim | Sep 2016 | A1 |
20160269225 | Kirchmeier et al. | Sep 2016 | A1 |
20160275158 | Baset | Sep 2016 | A1 |
20160294605 | Searle et al. | Oct 2016 | A1 |
20160328197 | Bai et al. | Nov 2016 | A1 |
20170054574 | Wu et al. | Feb 2017 | A1 |
20170060559 | Ye et al. | Mar 2017 | A1 |
20170126810 | Kentley et al. | May 2017 | A1 |
20170134164 | Haga et al. | May 2017 | A1 |
20170147989 | Onimaru | May 2017 | A1 |
20170161973 | Katta et al. | Jun 2017 | A1 |
20170210228 | Katayama et al. | Jul 2017 | A1 |
20170228410 | Slusar | Aug 2017 | A1 |
20170248965 | Wellman et al. | Aug 2017 | A1 |
20170251339 | Addepalli et al. | Aug 2017 | A1 |
20170262277 | Endo et al. | Sep 2017 | A1 |
20170339056 | Uno | Nov 2017 | A1 |
20170339095 | Lei | Nov 2017 | A1 |
20170359128 | Xi et al. | Dec 2017 | A1 |
20180007161 | Hwang et al. | Jan 2018 | A1 |
20180017404 | Mendels et al. | Jan 2018 | A1 |
20180062988 | Sikaria et al. | Mar 2018 | A1 |
20180072250 | Kim et al. | Mar 2018 | A1 |
20180076970 | Han et al. | Mar 2018 | A1 |
20180131524 | Shin | May 2018 | A1 |
20180189323 | Wheeler | Jul 2018 | A1 |
20180191636 | Wang | Jul 2018 | A1 |
20180205703 | Grau | Jul 2018 | A1 |
20180232235 | Gaur et al. | Aug 2018 | A1 |
20180237039 | Mong et al. | Aug 2018 | A1 |
20180261020 | Petousis et al. | Sep 2018 | A1 |
20180267530 | Sugaiwa et al. | Sep 2018 | A1 |
20180270230 | Schmidt et al. | Sep 2018 | A1 |
20180286152 | Iwaasa | Oct 2018 | A1 |
20180287815 | Yamamoto et al. | Oct 2018 | A1 |
20180293809 | James et al. | Oct 2018 | A1 |
20180357561 | Selvarajan et al. | Dec 2018 | A1 |
20180367525 | Kassimis et al. | Dec 2018 | A1 |
20190007794 | Thakur et al. | Jan 2019 | A1 |
20190020985 | Dai et al. | Jan 2019 | A1 |
20190028864 | Liang et al. | Jan 2019 | A1 |
20190068407 | Haga et al. | Feb 2019 | A1 |
20190079842 | Chae et al. | Mar 2019 | A1 |
20190095650 | Midgley | Mar 2019 | A1 |
20190097932 | Buczek | Mar 2019 | A1 |
20190098472 | Yoshihara | Mar 2019 | A1 |
20190108049 | Singh et al. | Apr 2019 | A1 |
20190123908 | Morita et al. | Apr 2019 | A1 |
20190129778 | Olson et al. | May 2019 | A1 |
20190141133 | Rajan et al. | May 2019 | A1 |
20190141142 | Filippou et al. | May 2019 | A1 |
20190188651 | Penilla et al. | Jun 2019 | A1 |
20190207862 | Kajio et al. | Jul 2019 | A1 |
20190215185 | Hellenthal | Jul 2019 | A1 |
20190217777 | John Naum Vangelov et al. | Jul 2019 | A1 |
20190256049 | Jawany | Aug 2019 | A1 |
20190258252 | Muta et al. | Aug 2019 | A1 |
20190260800 | Shalev et al. | Aug 2019 | A1 |
20190287080 | Penilla et al. | Sep 2019 | A1 |
20190334763 | Cawse | Oct 2019 | A1 |
20190349071 | Saxena | Nov 2019 | A1 |
20190356574 | Schoch | Nov 2019 | A1 |
20190379683 | Overby et al. | Dec 2019 | A1 |
20190394089 | Barrett | Dec 2019 | A1 |
20190394305 | Kim et al. | Dec 2019 | A1 |
20200036717 | Akella et al. | Jan 2020 | A1 |
20200053577 | Sundar | Feb 2020 | A1 |
20200057630 | Cho et al. | Feb 2020 | A1 |
20200090504 | Kadar et al. | Mar 2020 | A1 |
20200145252 | Torisaki et al. | May 2020 | A1 |
20200160633 | Zhang | May 2020 | A1 |
20200164882 | Beiderbeck et al. | May 2020 | A1 |
20200186449 | Tofighbakhsh et al. | Jun 2020 | A1 |
20200208998 | Xiang et al. | Jul 2020 | A1 |
20200209002 | Hou | Jul 2020 | A1 |
20200210336 | Bräutigam et al. | Jul 2020 | A1 |
20200218531 | Kushwaha et al. | Jul 2020 | A1 |
20200252339 | McKeefery et al. | Aug 2020 | A1 |
20200257317 | Musk et al. | Aug 2020 | A1 |
20200259919 | Lepp | Aug 2020 | A1 |
20200264632 | Sugimoto | Aug 2020 | A1 |
20200267080 | Joshi et al. | Aug 2020 | A1 |
20200274927 | Richmond et al. | Aug 2020 | A1 |
20200296139 | Fainberg | Sep 2020 | A1 |
20200341956 | Bayer et al. | Oct 2020 | A1 |
20200342691 | Saers et al. | Oct 2020 | A1 |
20200344090 | Park | Oct 2020 | A1 |
20200346628 | Whitfield, Jr. | Nov 2020 | A1 |
20200361487 | Sakamoto | Nov 2020 | A1 |
20200371774 | Kato | Nov 2020 | A1 |
20200374221 | Tandon | Nov 2020 | A1 |
20200389469 | Litichever et al. | Dec 2020 | A1 |
20200406910 | Ruan et al. | Dec 2020 | A1 |
20200413408 | Bailey et al. | Dec 2020 | A1 |
20210021497 | Brinkman et al. | Jan 2021 | A1 |
20210024035 | Nakashima et al. | Jan 2021 | A1 |
20210026617 | Maru et al. | Jan 2021 | A1 |
20210070321 | Serizawa | Mar 2021 | A1 |
20210075800 | Paraskevas | Mar 2021 | A1 |
20210092018 | Fang et al. | Mar 2021 | A1 |
20210092019 | Fang et al. | Mar 2021 | A1 |
20210144068 | Mo et al. | May 2021 | A1 |
20210152639 | Madden | May 2021 | A1 |
20210155267 | Goto | May 2021 | A1 |
20210155269 | Oba | May 2021 | A1 |
20210158688 | Lau et al. | May 2021 | A1 |
20210171042 | Hayakawa | Jun 2021 | A1 |
20210173911 | Ohashi | Jun 2021 | A1 |
20210192867 | Fang et al. | Jun 2021 | A1 |
20210197831 | Choi et al. | Jul 2021 | A1 |
20210209519 | Baskin et al. | Jul 2021 | A1 |
20210232687 | Sasaki et al. | Jul 2021 | A1 |
20210234760 | Fang et al. | Jul 2021 | A1 |
20210234761 | Fang et al. | Jul 2021 | A1 |
20210234762 | Fang et al. | Jul 2021 | A1 |
20210234763 | Fang | Jul 2021 | A1 |
20210234767 | Ricci et al. | Jul 2021 | A1 |
20210258189 | Toyoda | Aug 2021 | A1 |
20210264693 | Rueck et al. | Aug 2021 | A1 |
20210310217 | Akiyama | Oct 2021 | A1 |
20210407220 | Fang | Dec 2021 | A1 |
20210410134 | Cheraghi | Dec 2021 | A1 |
20220046460 | Samuel et al. | Feb 2022 | A1 |
20220070063 | Fang et al. | Mar 2022 | A1 |
20220078084 | Fang et al. | Mar 2022 | A1 |
20220118924 | Wortberg | Apr 2022 | A1 |
20220131751 | Fang et al. | Apr 2022 | A1 |
20220131752 | Fang et al. | Apr 2022 | A1 |
20220131753 | Fang et al. | Apr 2022 | A1 |
20220131754 | Fang | Apr 2022 | A1 |
20220131755 | Fang et al. | Apr 2022 | A1 |
20220158974 | Wang | May 2022 | A1 |
20220173969 | Fang | Jun 2022 | A1 |
20220173970 | Fang et al. | Jun 2022 | A1 |
20220173971 | Fang et al. | Jun 2022 | A1 |
20220173972 | Fang et al. | Jun 2022 | A1 |
20220217074 | Akhavain Mohammadi | Jul 2022 | A1 |
20220231917 | Fang et al. | Jul 2022 | A1 |
20220271971 | Newald et al. | Aug 2022 | A1 |
20220297635 | Fang et al. | Sep 2022 | A1 |
20220303194 | Palaios et al. | Sep 2022 | A1 |
20230043675 | Liu et al. | Feb 2023 | A1 |
20230109635 | Palermo et al. | Apr 2023 | A1 |
20230150523 | Fang et al. | May 2023 | A1 |
20230154244 | Fang et al. | May 2023 | A1 |
20230154245 | Fang et al. | May 2023 | A1 |
20230154246 | Fang et al. | May 2023 | A1 |
20230156748 | Li | May 2023 | A1 |
20230158974 | Fang et al. | May 2023 | A1 |
20230158975 | Fang et al. | May 2023 | A1 |
20230161583 | Fang et al. | May 2023 | A1 |
20230298398 | Fang et al. | Sep 2023 | A1 |
20230298399 | Fang et al. | Sep 2023 | A1 |
20230298400 | Fang et al. | Sep 2023 | A1 |
20230298401 | Fang et al. | Sep 2023 | A1 |
20230298402 | Fang et al. | Sep 2023 | A1 |
20230298403 | Fang et al. | Sep 2023 | A1 |
20230298404 | Fang et al. | Sep 2023 | A1 |
20230298405 | Fang et al. | Sep 2023 | A1 |
20230298406 | Fang et al. | Sep 2023 | A1 |
20230306796 | Tsuchiya et al. | Sep 2023 | A1 |
20230316817 | Fang et al. | Oct 2023 | A1 |
20230353446 | Ichimaru | Nov 2023 | A1 |
20230360448 | Fang et al. | Nov 2023 | A1 |
20230396634 | Fang et al. | Dec 2023 | A1 |
20240022524 | Bibernell et al. | Jan 2024 | A1 |
20240073093 | Fang | Feb 2024 | A1 |
20240098592 | Janneteau et al. | Mar 2024 | A1 |
20240154867 | Fang et al. | May 2024 | A1 |
20240154868 | Fang et al. | May 2024 | A1 |
20240163172 | Fang et al. | May 2024 | A1 |
20240163173 | Fang et al. | May 2024 | A1 |
20240163174 | Fang et al. | May 2024 | A1 |
20240179063 | Fang et al. | May 2024 | A1 |
20240214271 | Fang et al. | Jun 2024 | A1 |
Number | Date | Country |
---|---|---|
103019167 | Apr 2013 | CN |
103685000 | Mar 2014 | CN |
106961437 | Jul 2017 | CN |
107409079 | Nov 2017 | CN |
107819736 | Mar 2018 | CN |
107925594 | Apr 2018 | CN |
208401892 | Jan 2019 | CN |
111835627 | Oct 2020 | CN |
102006023137 | Nov 2007 | DE |
1571788 | Sep 2005 | EP |
1627778 | Feb 2006 | EP |
2959654 | Dec 2015 | EP |
20010027471 | Apr 2001 | KR |
100310412 | Sep 2001 | KR |
2001026332 | Apr 2001 | WO |
WO-2007050406 | May 2007 | WO |
2020039295 | Feb 2020 | WO |
2020150872 | Jul 2020 | WO |
2021055952 | Mar 2021 | WO |
WO-2021055955 | Mar 2021 | WO |
2021178979 | Sep 2021 | WO |
2021178979 | Oct 2021 | WO |
2022218554 | Oct 2022 | WO |
2022256742 | Dec 2022 | WO |
2023059938 | Apr 2023 | WO |
2024054664 | Mar 2024 | WO |
Entry |
---|
“Automotive testing and Engineering services”, 2022, 20 pages. |
202080080424.7 , “Chinese Application No. 202080080424.7, First Office Action and Search Report mailed Oct. 12, 2023”, Sonatus, Inc., 11 pages. |
20864819.6 , “European Application Serial No. 20864819.6, Extended European Search Report mailed Jun. 28, 2023”, Sonatus, Inc., 9 pages. |
20865060.6 , “European Application Serial No. 20865060.6, Extended European Search Report mailed Jul. 10, 2023”, Sonatus, Inc., 8 pages. |
Chapin, Peter C., et al., “Authorization in Trust Management: Features and Foundations”, Retrieved on Dec. 2, 2020 (Dec. 2, 2020) from <http://lemuria.cis.vtc.edu/-pchapin/papers/chapin-skalka-wang-ACMCS2008.pdf> entire document, 48 pages. |
Chen, Wai , et al., “Ad hoc peer-to-peer network architecture for vehicle safety communications”, IEEE Communications Magazine, vol. 43, No. 4, 2005, pp. 100-107. |
Felser, Max , et al., “Coexistence Standardization of Operation Technology and Information Technology”, Proceedings of the IEEE, IEEE. New York, US, vol. 107, No. 6,, Jun. 1, 2019, pp. 962-976. |
Herber, Christian , et al., “Real-time capable CAN to AVB ethernet gateway using frame aggregation and scheduling”, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), EDAA,, Mar. 9, 2015, pp. 61-66. |
Ishak, Mohamad Khairi, et al., “Vehicle Sensors Programming BAsed on Controller Area Network (CAN) Bus Using Canoe”, 2019, 4 pages. |
Nguyen-Duy, Jonathan , “Smart Cars: A Peek Into the Future of Converged Networks”, Jan. 9, 2018, 4 pages. |
PCT/US2020/051817 , “International Application Serial No. PCT/US2020/051817, International Preliminary Report on Patentability mailed Mar. 31, 2022”, Sonatus, Inc., 22 pages. |
PCT/US2020/051817 , “International Application Serial No. PCT/US2020/051817, International Search Report and Written Opinion mailed Feb. 24, 2021”, Sonatus, Inc., 23 pages. |
PCT/US2020/051817 , “International Application Serial No. PCT/US2020/051817, Invitation to Pay Additional Fees and, Where Applicable, Protest Fee mailed Dec. 1, 2020”, Sonatus, Inc., 2 pages. |
PCT/US2020/051825 , “International Application Serial No. PCT/US2020/051825, International Search Report and Written Opinion mailed Jan. 13, 2021”, Sonatus, Inc., 15 pages. |
PCT/US2021/021421 , “International Application Serial No. PCT/US2021/021421, International Preliminary Report on Patentability mailed Sep. 15, 2022”, Sonatus, Inc., 17 pages. |
PCT/US2021/021421 , “International Application Serial No. PCT/US2021/021421, International Search Report and Written Opinion mailed Jul. 21, 2021”, Sonatus, Inc., 19 pages. |
PCT/US2021/021421 , “International Application Serial No. PCT/US2021/021421, Invitation to Pay Additional Fees and, Where Applicable, Protest Fee mailed May 10, 2021”, Sonatus, Inc., 2 pages. |
PCT/US2022/032380 , “International Application Serial No. PCT/US2022/032380, International Preliminary Report on Patentability mailed Nov. 21, 2023”, Sonatus, Inc., 13 pages. |
PCT/US2022/032380 , “International Application Serial No. PCT/US2022/032380, International Search Report and Written Opinion mailed Sep. 8, 2022”, Sonatus, Inc., 12 pages. |
PCT/US2022/046292 , “International Application Serial No. PCT/US2022/046292, International Search Report and Written Opinion mailed Mar. 7, 2023”, Sonatus, Inc., 18 pages. |
PCT/US2022/046292 , “International Application Serial No. PCT/US2022/046292, Invitation to Pay Additional Fees and, Where Applicable, Protest Fee mailed Jan. 11, 2023”, Sonatus, Inc., 2 pages. |
PCT/US2023/032346 , “International Application Serial No. PCT/US2023/032346, International Search Report and Written Opinion mailed Nov. 27, 2023”, Sonatus, Inc., 3 pages. |
PCTUS2020051825 , “International Application Serial No., International Preliminary Report on Patentability mailed Mar. 31, 2022”, Sonatus, Inc., 16 pages. |
Wakikawa, Ryuji , et al., “Design of Vehicle Network: Mobile Gateway for MANET and NEMO Converged Communication”, Sep. 2, 2005, 2 pages. |
Wang, Yujing , et al., “Adapting a Container Infrastructure for Autonomous Vehicle Development”, Cornell University Library/ Computer Science/Software Engineering, Nov. 19, 2019, [online] [retrieved on Jun. 22, 2021 (Jun. 22, 2021)] Retrieved from the Internet < URL: https://arxiv.org/abs/1911.01075>, entire document,, 6 pages. |
PCT/US2024/029686, filed May 16, 2024, Pending, Yu Fang. |
PCT/US2024/031110, filed May 24, 2024, Pending, Yu Fang. |
U.S. Appl. No. 18/743,848, filed Jun. 14, 2024, Pending, Yu Fang. |
U.S. Appl. No. 18/743,878, filed Jun. 14, 2024, Pending, Yu Fang. |
U.S. Appl. No. 18/743,953, filed Jun. 14, 2024, Pending, Yu Fang. |
U.S. Appl. No. 18/743,967, filed Jun. 14, 2024, Pending, Yu Fang. |
202217011087 , “Indian Application Serial No. 202217011087 First Examination Report, mailed Jan. 12, 2024”, Sonatus, Inc., 6 pages. |
202217011256 , “Indian Application Serial No. 202217011256 First Examination Report, mailed Mar. 27, 2024”, Sonatus, Inc., 6 pages. |
21764127.3 , “European Application Serial No. 21764127.3, Extended European Search Report mailed Mar. 11, 2024”, Sonatus, Inc., 7 pages. |
PCT/US2022/046292 , “International Application Serial No. PCT/US2022/046292, International Preliminary Report on Patentability mailed Apr. 18, 2024”, Sonatus, Inc., 15 pages. |
Number | Date | Country | |
---|---|---|---|
20240154869 A1 | May 2024 | US |
Number | Date | Country | |
---|---|---|---|
63404918 | Sep 2022 | US | |
63024383 | May 2020 | US | |
62986444 | Mar 2020 | US | |
62911249 | Oct 2019 | US | |
62911248 | Oct 2019 | US | |
62903462 | Sep 2019 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 18244147 | Sep 2023 | US |
Child | 18417520 | US | |
Parent | 17027187 | Sep 2020 | US |
Child | 17570738 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 17570738 | Jan 2022 | US |
Child | 18244147 | US |