Self-healing learning system for one or more controllers
First Claim
1. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for automatically providing software changes, comprising:
- identifying a software vulnerability based on a deviation of activity data of a first controller from an allowed envelope of at least one operational attribute;
identifying a controller software change based on the identified software vulnerability, wherein the identified controller software change is configured to adjust the first controller from executing a first version of controller software to a second version of controller software;
sending, to the first controller, a first delta file configured based on the identified controller software change, wherein the first delta file is configured to cause the first version of controller software on the first controller to become non-executable;
identifying a second controller determined to be similar to the first controller; and
sending a second delta file, corresponding to the first delta file, to the second controller based on the determined similarity, wherein;
the first or second version of controller software is mapped to functional units and the first controller is configured to utilize a virtual file system (VFS) to manage and track one or more versions of the functional units, andthe delta file is configured to change a memory address of the first controller corresponding to one of the functional units and to disable one of the functional units.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed embodiments relate to automatically providing updates to at least one vehicle. Operations may include receiving, at a server remote from the at least one vehicle, Electronic Control Unit (ECU) activity data from the at least one vehicle, the ECU activity data corresponding to actual operation of the ECU in the at least one vehicle; determining, at the server and based on the ECU activity data, a software vulnerability affecting the at least one vehicle, the software vulnerability being determined based on a deviation between the received ECU activity data and expected ECU activity data; identifying, at the server, an ECU software update based on the determined software vulnerability; and sending, from the server, a delta file configured to update software on the ECU with a software update corresponding to the identified ECU software update.
22 Citations
20 Claims
-
1. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for automatically providing software changes, comprising:
-
identifying a software vulnerability based on a deviation of activity data of a first controller from an allowed envelope of at least one operational attribute; identifying a controller software change based on the identified software vulnerability, wherein the identified controller software change is configured to adjust the first controller from executing a first version of controller software to a second version of controller software; sending, to the first controller, a first delta file configured based on the identified controller software change, wherein the first delta file is configured to cause the first version of controller software on the first controller to become non-executable; identifying a second controller determined to be similar to the first controller; and sending a second delta file, corresponding to the first delta file, to the second controller based on the determined similarity, wherein; the first or second version of controller software is mapped to functional units and the first controller is configured to utilize a virtual file system (VFS) to manage and track one or more versions of the functional units, and the delta file is configured to change a memory address of the first controller corresponding to one of the functional units and to disable one of the functional units. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method for automatically providing software changes, the method comprising:
-
identifying a software vulnerability based on a deviation of activity data of a first controller from an allowed envelope of at least one operational attribute; identifying a controller software change based on the identified software vulnerability, wherein the identified controller software change is configured to adjust the first controller from executing a first version of controller software to a second version of controller software; sending, to the first controller, a first delta file configured based on the identified controller software change, wherein the first delta file is configured to cause the first version of controller software on the first controller to become non-executable; identifying a second controller determined to be similar to the first controller; and sending a second delta file, corresponding to the first delta file, to the second controller based on the determined similarity, wherein; the first or second version of controller software is mapped to functional units and the first controller is configured to utilize a virtual file system (VFS) to manage and track one or more versions of the functional units, and the delta file is configured to change a memory address of the first controller corresponding to one of the functional units and to disable one of the functional units. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification