白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Systems and methods for updating software in a hazard detection system

專利號
US11175900B2
公開日期
2021-11-16
申請人
GOOGLE LLC(US CA Mountain View)
發(fā)明人
Jonathan Solnit; Kelly Veit; Edwin H. Satterthwaite, Jr.; Jeffery Theodore Lee
IPC分類
G06F11/00; G06F8/65; G06F9/4401; G09C1/00; G08B17/10; G06F8/656; G06F21/57; G06F21/44
技術(shù)領(lǐng)域
hazard,alarm,processor,alarming,system,update,safety,may,software,state
地域: CA CA Mountain View

摘要

Systems and methods for updating software in a hazard detection system are described herein. Software updates may be received by, stored within, and executed by a hazard detection system, without disturbing the system's ability to monitor for alarm events and sound an alarm in response to a monitored hazard event. The software updates may be received as part of a periodic over-the-air communication with a remote server or as part of a physical connection with a data source such as a computer. The software updates may include several portions of code designed to operate with different processors and/or devices within the hazard detection system. The software updates may also include language specific audio files that can be accessed by the hazard detection system to play back language specific media files via a speaker.

說明書

At step 810, the downloaded software package can be authenticated. The software package can be authenticated using any suitable technique. For example, in one approach the software update module can perform a series of integrity checks through a series of secure hash algorithm (SHA-1) checks on every code package within a software update binary. If the downloaded software package fails authentication, then the downloaded software update package may be deleted. In one approach, the entirety of the memory portion storing the unauthorized software update package (i.e., the inactive portion of the NVM) may be deleted, as indicated by step 811. Once deleted, the process may stop at step 808. If the downloaded software package passes authentication, then the process proceeds to step 812. At this point in the process, the authorized software update package is stored in an inactive portion of the NVM, but it is not yet being executed by any processor within the hazard detection system. The following steps, including the steps in the flowchart corresponding to FIG. 9, involve installing a code portion in a processor (e.g., a system processor) and enabling that processor to execute a portion of the code in the authenticated software update package. These steps may be followed to update one or more other processors within the hazard detection system.

權(quán)利要求

1
微信群二維碼
意見反饋