Detecting anomalies using real-time controller processing activity
First Claim
1. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for identifying controller anomalies, comprising:
- receiving data representing real-time processing activity of a controller;
receiving comparable data relating to processing activity of at least one other controller deemed comparable in functionality to the controller;
comparing the real-time processing activity data with the comparable data, to identify, based on a deviation between the real-time processing activity data and the comparable data, at least one anomaly in the real-time processing activity of the controller; and
implementing a control action for the controller when the at least one anomaly is identified based on the deviation;
wherein;
the control action includes changing software of a first version on the controller based on a delta file corresponding to a second version of the software on the controller, andthe delta file comprises position-independent code.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed embodiments relate to identifying Electronic Control Unit (ECU) anomalies in a vehicle. Operations may include monitoring data representing real-time processing activity of the ECU; receiving comparable data relating to processing activity of at least one other ECU deemed comparable in functionality to the ECU; comparing the real-time processing activity data with the comparable data, to identify at least one anomaly in the real-time processing activity of the ECU; and implementing a control action for the ECU when the at least one anomaly is identified.
-
Citations
20 Claims
-
1. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for identifying controller anomalies, comprising:
-
receiving data representing real-time processing activity of a controller; receiving comparable data relating to processing activity of at least one other controller deemed comparable in functionality to the controller; comparing the real-time processing activity data with the comparable data, to identify, based on a deviation between the real-time processing activity data and the comparable data, at least one anomaly in the real-time processing activity of the controller; and implementing a control action for the controller when the at least one anomaly is identified based on the deviation;
wherein;the control action includes changing software of a first version on the controller based on a delta file corresponding to a second version of the software on the controller, and the delta file comprises position-independent code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method for identifying controller anomalies, the method comprising:
-
receiving data representing real-time processing activity of a controller; receiving comparable data relating to processing activity of at least one other controller deemed comparable in functionality to the controller; comparing the real-time processing activity data with the comparable data, to identify, based on a deviation between the real-time processing activity data and the comparable data, at least one anomaly in the real-time processing activity of the controller; and implementing a control action for the controller when the at least one anomaly is identified based on the deviation;
wherein;the control action includes changing software of a first version on the controller based on a delta file corresponding to a second version of the software on the controller, and the delta file comprises position-independent code. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification