白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Systems and methods for updating software in a hazard detection system

專利號
US11175900B2
公開日期
2021-11-16
申請人
GOOGLE LLC(US CA Mountain View)
發(fā)明人
Jonathan Solnit; Kelly Veit; Edwin H. Satterthwaite, Jr.; Jeffery Theodore Lee
IPC分類
G06F11/00; G06F8/65; G06F9/4401; G09C1/00; G08B17/10; G06F8/656; G06F21/57; G06F21/44
技術領域
hazard,alarm,processor,alarming,system,update,safety,may,software,state
地域: CA CA Mountain View

摘要

Systems and methods for updating software in a hazard detection system are described herein. Software updates may be received by, stored within, and executed by a hazard detection system, without disturbing the system's ability to monitor for alarm events and sound an alarm in response to a monitored hazard event. The software updates may be received as part of a periodic over-the-air communication with a remote server or as part of a physical connection with a data source such as a computer. The software updates may include several portions of code designed to operate with different processors and/or devices within the hazard detection system. The software updates may also include language specific audio files that can be accessed by the hazard detection system to play back language specific media files via a speaker.

說明書

In some embodiments the downloaded software update package may be in a format suitable for the computer from which it was transferred, but it is not in a format suitable for use by the hazard detection system. For example, the downloaded packages may be arranged according to a FAT file system structure, but the hazard detection system may need the package to be arranged in a RAW format. At step 1010, the downloaded software package is converted into a converted software package and stored in another portion of the NVM. Depending on available storage space, in some embodiments, the converted package may be stored in the active portion, thereby overwriting the image currently being used by the hazard detection system.

In step 1012, the converted software package is authenticated. If authentication fails, the process proceeds to deletion step 1006. If authentication passes, then the process proceeds to step 1014. Step 1014 and the following steps are similar to the steps discussed above in connection with FIG. 8, and as such, the discussion will not be repeated. In some embodiments, if authentication passes, the process may bypass step 1014 and proceed directly to installation of the processor code in internal memory of the processor.

It is understood that the steps shown in FIG. 10 are merely illustrative and that additional steps may be added, that some steps may be omitted, and that the order of steps may be rearranged.

權利要求

1
微信群二維碼
意見反饋