Methods and Articles of Manufacture for Hosting a Safety Critical Application on an Uncontrolled Data Processing Device
First Claim
Patent Images
1. A method for hosting a safety critical application (SCA) on an uncontrolled data processing device (UDPD), the method comprising:
- determining, with a UDPD, whether a SCA installed properly on the UDPD;
determining, with the UDPD, whether the SCA functions properly on the UDPD;
preventing, with the UDPD, the SCA from operating freely on the UDPD when;
a determination that the SCA did not install properly on the UDPD is made;
ora determination that the SCA does not function properly on the UDPD is made; and
permitting, with the UDPD, the SCA to operate freely on the UDPD when the SCA is determined to operate properly on the UDPD, wherein a determination that the SCA operates properly on the UDPD requires;
a determination that the SCA installed properly on the UDPD; and
a determination that the SCA functions properly on the UDPD.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and articles of manufacture for hosting a safety critical application on an uncontrolled data processing device are provided. Various combinations of installation, functional, host integrity, coexistence, interoperability, power management, and environment checks are performed at various times to determine if the safety critical application operates properly on the device. The operation of the SCA on the UDPD may be controlled accordingly.
167 Citations
72 Claims
-
1. A method for hosting a safety critical application (SCA) on an uncontrolled data processing device (UDPD), the method comprising:
-
determining, with a UDPD, whether a SCA installed properly on the UDPD; determining, with the UDPD, whether the SCA functions properly on the UDPD; preventing, with the UDPD, the SCA from operating freely on the UDPD when; a determination that the SCA did not install properly on the UDPD is made;
ora determination that the SCA does not function properly on the UDPD is made; and permitting, with the UDPD, the SCA to operate freely on the UDPD when the SCA is determined to operate properly on the UDPD, wherein a determination that the SCA operates properly on the UDPD requires; a determination that the SCA installed properly on the UDPD; and a determination that the SCA functions properly on the UDPD. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A method for hosting a safety critical application (SCA) on an uncontrolled data processing device (UDPD), the method comprising:
-
permitting, with the UDPD, a SCA to operate freely on a UDPD at a first time, the first time associated with a determination that SCA operates properly on the UDPD; identifying, with the UDPD, a current environment for the UDPD, the current environment associated with a second time, the second time after the first time; determining, with the UDPD, whether a change in environment occurred on the UDPD since the first time; determining, with the UDPD, whether the SCA functions properly on the UDPD when determined that a change in environment occurred; preventing, with the UDPD, the SCA from operating freely on the UDPD when a determination that the SCA does not function properly on the UDPD is made; and permitting, with the UDPD, the SCA to continue to operate freely on the UDPD when the SCA is determined to still operate properly on the UDPD, wherein a determination that the SCA still operates properly on the UDPD requires a determination that the SCA functions properly on the UDPD. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71)
-
-
72-142. -142. (canceled)
Specification