白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Systems and methods for updating software in a hazard detection system

專(zhuān)利號(hào)
US11175900B2
公開(kāi)日期
2021-11-16
申請(qǐng)人
GOOGLE LLC(US CA Mountain View)
發(fā)明人
Jonathan Solnit; Kelly Veit; Edwin H. Satterthwaite, Jr.; Jeffery Theodore Lee
IPC分類(lèi)
G06F11/00; G06F8/65; G06F9/4401; G09C1/00; G08B17/10; G06F8/656; G06F21/57; G06F21/44
技術(shù)領(lǐng)域
hazard,alarm,processor,alarming,system,update,safety,may,software,state
地域: CA CA Mountain View

摘要

Systems and methods for updating software in a hazard detection system are described herein. Software updates may be received by, stored within, and executed by a hazard detection system, without disturbing the system's ability to monitor for alarm events and sound an alarm in response to a monitored hazard event. The software updates may be received as part of a periodic over-the-air communication with a remote server or as part of a physical connection with a data source such as a computer. The software updates may include several portions of code designed to operate with different processors and/or devices within the hazard detection system. The software updates may also include language specific audio files that can be accessed by the hazard detection system to play back language specific media files via a speaker.

說(shuō)明書(shū)

It is understood that the steps shown in FIG. 9 are merely illustrative and that additional steps may be added, that some steps may be omitted, and that the order of steps may be rearranged.

FIG. 10 shows an illustrative flowchart of steps for updating software via a physical port, according to an embodiment. Beginning with step 1002, the hazard detection system, and in particular, the software update module may detect and receive a software update package from a computer connected to a physical port of the hazard detection system. This software update package may be stored in an inactive portion of the NVM. At step 1004, the downloaded software package may be authenticated. The software package can be authenticated using any suitable technique. For example, in one approach the software update module can perform a series of integrity checks through a series of secure hash algorithm (SHA-1) checks on every code package within a software update binary. If the downloaded software package fails authentication, then the downloaded software update package may be deleted, as indicated by step 1006. In one approach, the entirety of the portion storing the unauthorized software update package may be deleted. Once deleted, the process may stop at step 1008. If the downloaded software package passes authentication, then the process proceeds to step 1010. At this point in the process, the authorized software update package is stored in an inactive portion of the NVM, but it is not yet being executed by any processor within the hazard detection system.

權(quán)利要求

1
微信群二維碼
意見(jiàn)反饋