Detecting anomalies online using histograms of controller processing activity
First Claim
1. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for identifying controller anomalies, comprising:
- monitoring data representing real-time processing activity of a first controller;
accessing historical data relating to processing activity of the first controller, the historical data representing expected processing activity of the first controller;
comparing the real-time processing activity data with the historical data, to identify at least one anomaly in the real-time processing activity of the first controller; and
implementing a control action for the first controller when the at least one anomaly is identified, wherein the control action includes issuing a prompt to adjust the first controller from executing a first version of controller software to a second version of controller software;
wherein the historical data comprises data from a second controller different from the first controller, andwherein the first version of controller software includes position-independent code, and the first controller is configured to utilize the position-independent code without requiring modification to the first version of controller software.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed embodiments relate to identifying Electronic Control Unit (ECU) anomalies in a vehicle. Operations may include monitoring, in the vehicle, data representing real-time processing activity of the ECU; accessing, in the vehicle, historical data relating to processing activity of the ECU, the historical data representing expected processing activity of the ECU; comparing, in the vehicle, the real-time processing activity data with the historical data, to identify at least one anomaly in the real-time processing activity of the ECU; and implementing a control action for the ECU when the at least one anomaly is identified.
-
Citations
18 Claims
-
1. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for identifying controller anomalies, comprising:
-
monitoring data representing real-time processing activity of a first controller; accessing historical data relating to processing activity of the first controller, the historical data representing expected processing activity of the first controller; comparing the real-time processing activity data with the historical data, to identify at least one anomaly in the real-time processing activity of the first controller; and implementing a control action for the first controller when the at least one anomaly is identified, wherein the control action includes issuing a prompt to adjust the first controller from executing a first version of controller software to a second version of controller software; wherein the historical data comprises data from a second controller different from the first controller, and wherein the first version of controller software includes position-independent code, and the first controller is configured to utilize the position-independent code without requiring modification to the first version of controller software. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for identifying controller anomalies, the system comprising:
-
one or more processors; and one or more memories having instructions that, when executed by the one or more processors, cause the one or more processors to perform the operations of; monitoring data representing real-time processing activity of a first controller; accessing historical data relating to processing activity of the first controller, the historical data representing expected processing activity of the first controller; comparing the real-time processing activity data with the historical data, to identify at least one anomaly in the real-time processing activity of the first controller; and implementing a control action for the first controller when the at least one anomaly is identified, wherein the control action includes issuing a prompt to adjust the first controller from executing a first version of controller software to a second version of controller software; wherein the historical data comprises data from a second controller different from the first controller, and wherein the first version of controller software includes position-independent code, and the first controller is configured to utilize the position-independent code without requiring modification to the first version of controller software. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-implemented method for identifying controller anomalies, the method comprising:
-
monitoring data representing real-time processing activity of a first controller; accessing historical data relating to processing activity of the first controller, the historical data representing expected processing activity of the first controller; comparing the real-time processing activity data with the historical data to identify at least one anomaly in the real-time processing activity of the first controller; and implementing a control action for the first controller when the at least one anomaly is identified, wherein the control action includes issuing a prompt to adjust the first controller from executing a first version of controller software to a second version of controller software; wherein the historical data comprises data from a second controller different from the first controller, and wherein the first version of controller software includes position-independent code, and the first controller is configured to utilize the position-independent code without requiring modification to the first version of controller software.
-
Specification