Sep 30, 2014 - and other optical spectroscopy tools on a silicon wafer. SUMMARY OF THE .... of the invention. FIG. 4 depicts an exemplary magnetic ?eld pro?le for a ... comprise a plasmonic nanocavity resonator 101, i.e. a sub micron sized ...
Oct 20, 1997 - Ho, ChainâMin Richard, âValidation Tools For Complex ... 33rd Design Automation Conference, Las Vegas, NV, Pro ceedings .... 97â101.*.
Jul 30, 2013 - Jones et al., Releasable Luciferin-Transporter Conjugates: Tools for the Real-Time Analysis .... pro-drug: release behavior of biphenylylacetic acid from its ... polymer conjugate IT-101 in multiple human lymphoma xeno grafts,â.
Mar 28, 2012 - 156/172. 3,715,231 A * 2/1973 Ngetal. 206/5243. 3,854,905 A * 12/1974 BalZer et a1. 96/220 .... the ability to retain enough fuel for a ?nal de-orbit maneuver at end of life. .... ginally acceptable quali?cation and certi?cation proced
Nov 11, 1999 - diagnosis, prevention and treatment of diseases associated with C. pneumoniae. ... has been demonstrated in atherosclerotic lesions of the aorta and coronary .... variety of forms including, for example, Fv, Fa, and F(ab')2, as well as
Mar 15, 1996 - plasmid carrying a gene of interest under regulatory control ..... visual observation. .... DNA construct: glufosinate (Phosphinothricin, L-PPT).
Nov 18, 2010 - co s4 1 3 day3 .ppt ... Microsoft MSDN Library Visual Studio 2005 (2005, March) ... FSCTL_GET_NTFS_VOLUME_DATA Control Code.
Sep 12, 2003 - Gervais, A., 'Security Analysis of Industrial Control Systems', Aalto .... odva.org/ 10i2/03ievents /NewEtherNet/EtherNet-IPOverview.ppt retrieved on Nov. 11, 2004. ...... maps/displays via a visual or other type application. At 420 ..
Aug 20, 2010 - scroll of a PowerPoint presentation, and a rapid scroll or pan of photographic images. .... ning within the GUI. Typical document control gestures .... degraded visual performance may continue until the object' s or item's speed ...
Sep 18, 2012 - Intezyne Technologies, Inc., Tampa, FL. (Us). Subject to any ...... ulfanyl, bis-benzyloxy-methyl, [l,3]dioxolan-2-yl, and [1,3] dioxan-2-yl. In other ...
(12) United States Patent Lutter
(10) Patent No.: US 8,020,028 B1 (45) Date of Patent: *Sep. 13, 2011
(54) APPLICATION MANAGEMENT SYSTEM FORMOBILE DEVICES
(75) Inventor: Robert Pierce Lutter, Tacoma, WA
7, 1991 Stuart 9, 1991 MVrick
(US) - 0 (73) Assignee: Eagle Harbor Holdings, Bainbridge Island, WA (US)
3. A 5,031,330 A 5,045,937 A
Subject to any disclaimer, the term of this
patent is extended or adjusted under 35 U.S.C. 154(b) by 0 days. This patent is Subject to a terminal dis
multiprocessor system. The mobile device is connected and
L V 1. 7 18f1 07
configured into the multiprocessor System when a type of data
lication file f 1 hhi ee application file for complete search history. References Cited
used by the mobile device conforms to a type of data used in the multiprocessor System. A stored application in the multi processor system is identified that employs a same data type
utilized on the mobile device. The stored application is run which includes taking over control and operation of the mobile device and process data received from the mobile device. Security is used to allowed to access the multiproces
U.S. PATENT DOCUMENTS 2,995.318 A 8, 1961 Cocharo 4,303,978 A 12/1981 Shaw 4,528,563 A 7, 1985 Takeuchi 4,591.976 A 5, 1986 Webber 4,829.434 A 5, 1989 Karmel
Jones Evans Koike Drori Breed Preston Himmelstein Gutta Keller
Dowling Berry Bunn
Sakaguchi et al. Proctor et al. Lutter Kitamura Knockeart etal Preston Nelson Himmelstein Honda Shuman Preston Preston
Drury et al. Russell Saito Watler Munch Breed Lutter Preston Lutter Hanse Lu Richard Lutter Kroon Newell Laursen Rune Williams Preston Funkhouser et al. Ohmura Himmelstein Saito Pecen Himmelstein Foxlin
Stephenson Martin Himmelstein
Himmelstein Preston Preston Himmelstein Preston Bianconi Lutter White Preston Smith Fournier et al. Preston Lu
A. Das, R. Fierro, V. Kumar, J. Ostrowski, J. Spletzer, and C. Taylor, “A Framework for Vision Based Formation Control', IEEE Transac
tions on Robotics and Automation, vol. 18, Nov. 5, 2001, pp. 1-13. Ada 95 Transition Support—Lessons Learned, Sections 3, 4, and 5. CACI, Inc. -Federal, Nov. 15, 1996, 14 pages. AMIC. Architecture specification release 1, 2001; 35 pages. Bluetooth Doc: Advance Audio Distribution Profile Specification; Adopted version 1.0; dated May 22, 2003; 75 pages. Bluetooth Doc; Audio/Video Remote Control Profile; Version 1.0
Adopted; dated May 22, 2003; 52 pages.
Bluetooth Hands-free Profile 1.5 Nov. 25, 2005.
Bluetooth Specification version 1.1; Feb. 22, 2001; 452 pages. Boeing News Release, “Boeing Demonstrates JSF Avionics Multi Sensor Fusion'. Seattle, WA. May 9, 2000, pp. 1-2. Boeing Statement, “Chairman and CEO Phil Condit on the JSF Decision', Washington, D.C., Oct. 26, 2001, pp. 1-2. Counterair: The Cutting Edge, Ch. 2 “The Evolutionary Trajectory The Fighter Pilot-Here to Stay?” AF2025 v3c8-2, Dec. 1996, pp. 1-7. Counterair: The Cutting Edge, Ch. 4 “The Virtual Trajectory Air Superiority without an “Air Force?” AF2025 v3c8-4, Dec. 1996, pp. 1-12.
Embedded Bluetooth Migrates to Lisbon and Seattle; 11 pages; Jan. 23, 2008.
Green Hills Software, Inc., “The AdaMULTI 2000 Integrated Devel opment Environment.” Copyright 2002, printed Jul. 9, 2002; 7 pages. H. Chung, L. Ojeda, and J. Borenstein, “Sensor Fusion for Mobile Robot Dead-reckoning with a Precision-calibrated Fiber Optic Gyro scope', 2001 IEEE International Conference on Robotics and Auto mation, Seoul, Korea, May 21-26, 2001, pp. 1-6. Hitachi Automated Highway System (AHS), Automotive Products, Hitachi, Ltd., Copyright 1994-2002, 8 pages. IEEE Standard for Information Technology—POSIX Based Supercomputing Application Environment Profile; Jun. 14, 1995, 72 pageS.
ISIS Project: Sensor Fusion, Linkoping University Division of Auto matic Control and Communication Systems in cooperation with SAAB (Dynamics and Aircraft), 2001, 18 pages. J. Takezaki, N. Ueki, T. Minowa, H. Kondoh, “Support System for Safe Driving—A Step Toward ITS Autonomous Driving '', Hitachi Review, vol. 49, Nov. 3, 2000, pp. 1-8. Joint Strike Fighter Terrain Database, ets-news.com “Simulator Solutions' 2002, 3 pages. Luttge, Karsten; "E-Charging API: Outsource Charging to a Payment Service Provider”; IEEE: 2001 (pp. 216-222). M. Chantler, G. Russel, and R. Dunbar, “Probabilistic Sensor Fusion
for Reliable Workspace Sensing”. Fourth IARP workship on Under water Robotics, Genoa, Nov. 1992, pp. 1-14. MSRC Redacted Proposal, 3.0 Architecture Development, Aug. 29. 2002: pp. 1-43. MyGig User Guide. Powerpoint Presentation by Robert Allen Boeing Phantom Works entitled “Real-Time Embedded Avionics System Security and COTS Operating Systems”. Open Group Real-Time Forum, Jul. 18, 2001, 16 pages. Product description of Raytheon Electronic Systems (ES), Copyright 2002, pp. 1-2. Product description of Raytheon RT Secure, “Development Environ ment”. Copyright 2001, pp. 1-2. Product description of Raytheon RT Secure, "Embedded Hard Real Time Secure Operating System”. Copyright 2000, pp. 1-2. Product description of Raytheon RT Secure, Copyright 2001, pp. 1-2. S.G. Goodridge, “Multimedia Sensor Fusion for Intelligent Camera Control and Human-Computer Interaction”. Dissertation submitted to the Graduate Faculty of North Carolina State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical Engineering, Raleigh, NC, 1997, pp. 1-5. Specification of the Bluetooth System v1.0.B.; Dec. 1, 1999. Specification of the Bluetooth System v1.1; Feb. 22, 2001. TNO FEL Annual Review 1998: Quality works, Observation Sys tems Division: “The Whole is More Than the Sum of its Parts'; 16 pageS.
Vehicle Dynamics Lab, University of California, Berkeley, funded by BMW, current members: D. Caveney and B. Feldman, "Adaptive Cruise Control”, at least as early as 2002, printed Jul. 2, 2002; 17 pageS.
Stirling A: “Mobile Multimedia platforms' Vehicular Technology Conferene Fall 2000. IEEE VTS Fall VTC2000. 52nd Vehicular
Technology Conference (CAT. No. 00CH37152). Nusser R. et al.: "Bluetooth-based wireless connectivity in an auto motive environment” Vehicular Technoloty Conference Fall 2000. IEEE VTS Fall VTC2000 52nd Vehicular Techonlogy Conference (Cat. No. 00CH37152).
US 8,020,028 B1 Page 4 Martins efv et al. “design of an OS9 operating system extension for a message-passing multiprocesor Microprocessors and Microsysetms, IPC Business Press LT. London, BG, vol. 21, No. 9. Apr. 1, 1998, pp. 533-543. Gutierrez Garcia JJ et al. “Minimizing the effects of jitter in distrib uted hard real-time systems' Journal of Systems Architecture, Elsevier Science Publishers B.V., Amsterdam, NL, vol. 41, No. 6/7. Dec. 15, 1996, pp. 431-447. International Search Report for PCT/US02/020402; Mailing date Apr. 3, 2003.
International Search Report for PCT/US02/020403; Mailing date Jan. 27, 2003.
International Search Report for PCT/US02/016364; Mailing date Feb. 14, 2003.
International Search Report for PCT/US02/016371; Mailing date Aug. 18, 2003. Stolowitz Ford Cowger LLPListing of Related Cases; Aug. 23, 2010. Stolowitz Ford Cowger LLP, Listing of Related Cases, Jan. 4, 2011.
* cited by examiner
Sep. 13, 2011
Sheet 1 of 5
US 8,020,028 B1
Sep. 13, 2011
Sheet 2 of 5
US 8,020,028 B1
Sep. 13, 2011
Sheet 3 of 5
US 8,020,028 B1
CRTCAL DATA MANAGER
Sep. 13, 2011
Sheet 4 of 5
US 8,020,028 B1
US 8,020,028 B1
US 8,020,028 B1 1.
2 tive but provides a secure operating system from a bottom perspective. This allows portable languages, such as Java, to be used for secure embedded multiprocessor environments. The foregoing and other objects, features and advantages of the invention will become more readily apparent from the following detailed description of a preferred embodiment of the invention which proceeds with reference to the accompa nying drawings.
APPLICATION MANAGEMENT SYSTEM FORMOBILE DEVICES
This application is a continuation of U.S. patent applica tion Ser. No. 1 1/616,650, filed Dec. 27, 2006 entitled: METHOD FOR MULTI-TASKING MULTIPLE JAVAVIR
TUAL MACHINES IN A SECURE ENVIRONMENT, which is a continuation of U.S. Pat. No. 7,178,049 issued Feb. 13, 2007 entitled: METHOD FOR MULTI-TASKING MUL TIPLE JAVAVIRTUAL MACHINES IN A SECURE ENVI
RONMENT, which are both incorporated by referenced in their entirety. This application incorporates by reference U.S. patent application Ser. No. 09/841,753, filed Apr. 24, 2001 entitled: OPEN COMMUNICATION SYSTEM FOR REAL-TIME
MULTIPROCESSOR APPLICATIONS and U.S. patent application Ser. No. 09/841,915, filed Apr. 24, 2001 entitled: METHOD AND APPARATUS FOR DYNAMIC CON FIGURATION OF MULTIPROCESSOR SYSTEM. BACKGROUND OF THE INVENTION
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a diagram showing a Java stack with an additional Secure Real-time Executive (SRE) layer. FIG. 2 is a diagram of a multiprocessor System that runs multiple Java Virtual Machines that each include a SRE. FIG. 3 is a detailed diagram of the managers in the SRE. FIG. 4 is a block diagram of how the SRE manages a multiprocessor system. FIG. 5 is a bock diagram showing how a task manager in the SRE operates the multiprocessor system in a lock-step mode.
Java is a robust, object-oriented programming language expressly designed for use in the distributed environment of the Internet. Java can be used to create complete applications that may run on a single computer or be distributed among servers and clients in a network. A source program in Java is compiled into byte code, which can be run anywhere in a
DETAILED DESCRIPTION 25
A Java application stack includes a Java layer 5 for running any one of multiple different applications. In one example, the applications are related to different vehicle operations Such as Infrared (IR) and radar sensor control and monitoring,
network on a server or a client that has a Java virtual machine
(JVM). AJVM describes software that is nothing more than an inter face between the compiled byte code and the microprocessor or hardware platform that actually performs the programs instructions. Thus, the JVM makes it possible for Java appli cation programs to be built that can run on any platform without having to be rewritten or recompiled by the program mer for each separate platform. Jini is a distributed system based on the idea of federating groups of users and the resources required by those users. Resources can be implemented either as hardware devices, Software programs, or a combination of the two. The Jini system extends the Java application environment from a single virtual machine to a network of machines. The Java application environment provides a good computing platform for distributed computing because both code and data can move from machine to machine. The Jini infrastructure pro vides mechanisms for devices, services, and users to join and detach from a network. Jini systems are more dynamic than is currently possible in networked groups where configuring a network is a centralized function done by hand. However, the Java/Jini approach is not without its disad Vantages. Both Java and Jini are free, open source applica tions. The Java application environment is not designed for controlling messaging between different machines. For example, the Java application is not concerned about the protocols between different hardware platforms. Jini has some built-in security that allows code to be downloaded and
implemented in the same JVM 10, However, for explanation purposes, the JVM 10 and the SRE 14 will be shown as separate elements. FIG.2 shows a system 15 that includes multiple processors 16, 18, 20, 22 and 24. Each processor includes one or more JVMs 10 that run different Java applications. For example, processor 16 includes one Java application 28 that controls a vehicle security system and another Java application 26 that controls the vehicles antilock brakes. A processor 18 includes a Java application 30 that controls audio sources in the vehicle. Other processors 20 and 22 may run different threads 32A and 32B for the same sensor fusion Java application 32 that monitors different IR sensors. Another thread 32C on
SUMMARY OF THE INVENTION
The present invention allows construction of a secure, real time operating system from a portable language such as Java that appears to be a Java virtual machine from a top perspec
A Java Virtual Machine (JVM) layer 16 provides the hard ware independent platform for running the Java applications 5. A Jini layer 12 provides some limited security for the Java applications that run on different machines. However, the Jini layer 12 does not provide the necessary reconfiguration and security management necessary for a distributed real-time multiprocessor system. A Secure Real-time Executive (SRE) 14 provides an exten sion to the JVM 16 and allows Java to run on different pro cessors for real-time applications. The SRE 20 manages mes saging, security, critical data, file I/O multiprocessor task control and watchdog tasks in the Java environment as described below. The JVM 16, Jini 12 and SRE 14 can all be
run from different machines in confidence. However, this
limited security is insufficient for environments where it is necessary to further restrict code sharing or operation sharing among selected devices in a secure embedded system.
vehicle brake control, vehicle audio and video control, envi ronmental control, driver assistance control, etc.
processor 24 monitors a radar sensor for the sensor fusion Java application 32. The SRE 14 runs below the JVMs 10 in each processor and control tasks, messaging, security, etc. For example, the Java application 26 controls vehicle braking according to the sen sor data collected by the sensor fusion Java application 32. The SRE 14 in one example prevents unauthorized data from being loaded into the processor 16 that runs brake control application 26. The SRE 14 also prevents other Java applica tions that are allowed to be loaded into processor 16 from
US 8,020,028 B1 3 disrupting critical braking operations, or taking priority over the braking operations, performed by Java application 26. For example, the SRE 14 may prevent noncritical vehicle applications, such as audio control, from being loaded onto processor 16. In another example, noncritical operations, Such as security control application 28, are allowed to be loaded onto processor 16. However, the SRE 14 assigns the security messages low priority values that will only be pro cessed when there are no braking tasks in application 26 that require processing by processor 16. The SRE 14 allows any variety of real-time, mission criti cal, nonreal-time and nonmission critical Java applications to be loaded onto the multiprocessor system 15. The SRE 14 then automatically manages the different types of applica tions and messages to ensure that the critical vehicle applica tions are not corrupted and processed with the necessary priority. The SRE 14 is secure software that cannot be manipulated by other Java applications. The SRE 14 provides priority preemption on a message scale across the entire system 15 and priority preemption on a task scale across the entire system 15. So the SRE 14
4 agers in the 753 and 915 patent applications are herein incor porated by reference and are therefore not described in further detail.
However, Some specific tasks performed by the managers 50-60 are described below in further detail.
such as a Universal Serial Bus, a wireless link such as blue tooth or IEEE 802.11, or a network link such as Ethernet, etc.
The configuration manager 60 acts as a watchdog to make
sure that the GPS thread 62 and the sensor fusion thread 64 are
controls how the JVMs 10 talk to each other and controls how
the JVMs 10 are started or initiated to perform tasks. The SRE 14 allows programmers to write applications using Java in a
safe and secure real time environment. Thus, viruses can be
prevented by SRE 14 from infiltrating the system 15. While the explanation uses Java as one example of a pro gramming environment where SRE 14 can be implemented, it should be understood that the SRE 14 can be integrated into any variety of different programming environments that may run in the same or different systems 15. For example, SRE 14 can be integrated into an Application Programmers Interface (API) for use with any programming language such as C++. FIG.3 shows the different functions that are performed by the SRE 20. Any combination of the functions described below can be provided in the SRE20. A message manager 50 controls the order messages are received and transmitted by the different Java applications. A security manager 52 con trols what data and messages are allowed to be received or transmitted by different Java applications. A critical data manager 54 controls what data is archived by the different Java applications. A data manager 56 controls what data is allowed to be transferred between different processors. A task manager 58 controls the order tasks are performed by the different JVMs. A reconfiguration manager 60 monitors the operation of the different processors in the system and reassigns or reconfig ures Java applications and Java threads to different processors according to what processors have failed or what new proces sors and applications have been configured into system 15. The message manager 50 partially corresponds to the pri ority manager 44 shown in FIG. 2 of pending patent applica tion Ser. No. 09/841,753, the critical data manager 52 par tially corresponds with the logging manager 44 shown in FIG. 2 of the copending 753 patent application, and the security manger 54 a least partially corresponds with the security manager 40 shown in the 753 patent application. The data manager 56 at least partially corresponds with the data man ager 42 shown in FIG. 2 of pending patent application Ser. No. 09/841,915, the task manager 58 partially corresponds to the device manger 46 shown in FIG. 2 of the 915 application, and the configuration manager 60 at least partially corre sponds to the configuration manager 44 shown in FIG. 2 of the 915 patent application. The descriptions of how the different managers 50-60 operate similarly to the corresponding man
FIG. 4 shows in more detail how the SRE 14 operates. One of the operations performed by the task manager 58 is to control when different tasks are initiated on different proces sors. For example, a first Global Positioning System (GPS) thread 62 is running on a JVM in a processor 80. Another sensor fusion thread 64 is running on a different processor 82. Block 74 represents the Java Virtual Machine operating in each of processors 80 and 82. A master JVM 74 may run on either processor 80, processor 82 or on some other processor. The task manager 58 sends an initiation command 66 to the GPS thread 62 to obtain location data. The task manager 58 then directs the obtained GPS data 68 through a link to the sensor fusion thread 64 for subsequent processing of GPS data 68. The link may be any bus, such as a PCIbus, serial link
each running correctly. In one example, separate configura tion managers 60 in each processor 80 and 82 sends out periodic signals to the other configuration managers 60 in the other processors. Any one of the configuration managers 60 can detect a processor or application failure by not receiving the periodic 'ok' signals from any one of the other processors for some period of time. If a failure is detected, then a par ticular master configuration manager 60 in one of the proces sors determines where the task in the failed processor is going to be reloaded. If the master configuration manager 60 dies, then some conventional priority Scheme, such as round robin, is used to select another configuration master. If a failure is detected, say in the processor 82 that is currently performing the sensor fusion thread 64, a message is sent from the configuration manager 60 notifying the task manager 58 which processor is reassigned the sensor fusion thread. In this example, another sensor fusion thread 76 in processor 84 is configured by the configuration manager 60. The critical data manager 52 manages the retention of any critical data 72 that was previously generated by the sensor fusion thread 64. For example, the critical data manager 54 automatically stores certain data and state information that was currently, being used in the sensor fusion thread 64. The critical data may include GPS readings for the last 10 min utes, sensor data obtained from sensors in other processors in the vehicle over the last 10 minutes. The critical data may also include any processed data generated by the sensor fusion thread 64 that identifies any critical vehicle conditions. The critical data manager 52 also determines which data to archive generally for vehicle maintenance and accident reconstruction purposes. The configuration manager 60 directs the critical data 72 to the new sensor fusion thread 76. The task manager 74 then redirects any new GPS data obtained by the GPS thread 78 to the new sensor fusion thread 76 and controls sensor fusion
tasks from application 76. Thus, the configuration manager 60 and the task manager 58 dynamically control how different Java threads are initialized, distributed and activated on dif
ferent processors. The message manager 50 determines the priority of sent and received messages. If the data transmitted and received by the sensor fusion thread 76 is higher priority than other data transmitted and received on the processor 84, then the sensor fusion data will be given priority over the other data.
US 8,020,028 B1 5 The task manager 58 controls the priority that the sensor fusion thread 76 is giving by processor 84. If the sensor fusion thread 76 has higher priority than, for example, an audio application that is also being run by processor 84, then the sensor fusion thread 76 will be performed before the audio application. The SRE 14 can be implemented in any system that needs to be operated in a secure environment. For example, network servers or multiprocessors operating in a home environment. The multiprocessors in home appliances. Such as washer and dryers, home computers, home security systems, home heat ing systems, can be networked together and operate Java applications. The SRE 14 prevents these multiple processors and the Software that controls these processors from being corrupted by unauthorized software and also allows the appli cations on these different processors to operate as one inte grated system. The SRE 14 is a controlled trusted computing based that is not accessible by non-authorized application programmers and anyone in the general public. Therefore, the SRE 14 prevents hacking or unauthorized control and access to the processors in the vehicle. Task Controlled Applications Debugging is a problem with multiprocessor Systems. The task manager 58 allows the Java applications to be run in a lock-step mode to more effectively identify problems in the multiprocessor system 15. FIG. 5 shows a path 90 taken by a vehicle 92. In one application, the position of the vehicle 92 is sampled every second t, t t t etc. The position of the vehicle 92 is sampled by a GPS receiver in vehicle 92 that reads a longi tudinal and latitudinal position from a GPS satellite. The GPS receiver is controlled by the GPS thread 62 that receives the
6 The task manager 58 can isolate any state in the overall system 89, such as the state of system 89 after a first GPS reading by GPS thread 62 or the state of system 89 after the thirty second GPS reading by GPS thread 62 by controlling when and how often activation commands 94 are sent to UPS
thread 62. In a similar manner, the task manager 58 can control when other tasks are performed by the system 89. such as when the sensor fusion thread 64 is activated. 10
as various interconnected functional blocks or distinct soft 35
GPS data and then sends the GPS data to a sensor fusion
thread 64 that may run on the same or a different processor in the vehicle 92. The sensor fusion thread 64 can perform any one of many different tasks based on the GPS data. For example, the sensor fusion thread 64 may update a map that is currently being displayed to the driver of vehicle 92 or gen erate a warning signal to the vehicle driver. For each sample period to the task manager 58 sends a request 94 to the GPS thread 62 to obtain GPS data. The task manager 58 uses a clock 96 as a reference for identifying each one second sample period. Each time a second passes accord ing to clock 96, the task manager 58 sends out the request 94 that wakes up the GPS thread 62 to go read the GPS data from the GPS satellite. Once the GPS data has been received, the
implemented by themselves, or in combination with other operations in either hardware or software. Having described and illustrated the principles of the invention in a preferred embodiment thereof, it should be apparent that the invention may be modified in arrangement and detail without departing from Such principles. Claim is made to all modifications and variation coming within the spirit and scope of the following claims. The invention claimed is:
mode until it receives another activation command from the
of the GPS data 96 can be isolated.
ware modules. This is not necessary, however, and there may be cases where these functional blocks or modules are equiva lently aggregated into a single logic device, program or opera tion with unclear boundaries. In any event, the functional blocks and software modules or described features can be
GPS thread 62 passes the UPS data 96 to the sensor fusion thread 64. The GPS thread 62 then goes back into an idle task manager 58. The task manager 58 can control when the GPS thread 62 is woken up. Instead of the GPS thread 62 being free running, the GPS thread 62 is operating according to a perceived time controlled by the task manager 58. The task manager 58 may send the activation request 94 to the GPS thread 62 once every second during normal sensor fusion operation. When the system is in a debug mode, however, the task manager 58 may only send one activation command 94. This allows the other operations performed by the system 89 to be monitored and determine how the single sampling of GPS data 96 propagates through system 89. The task manager 58 may also delay or disable task initiation to other threads, so that the processing
Thus, the task manager 58 controls when Java applications are activated effectively running the overall system 89 in a lock-step mode. The task manager 58 can control the initia tion of multiple tasks at the same time. This allows the task manager to control what parameters and operations are per formed and used by the different Java threads so that different states in the multiprocessor system 89 can be detected and monitored more effectively. One application for the task controlled applications is for accident reconstruction. The critical data manager 52 (FIG.3) may save different vehicle parameters from a vehicle that has been in an accident. For example, sensor data, brake data, speed data, etc. The task manager 58 can feed the saved data into the different Java applications in a lock-step mode to determine how each Java thread processes the saved data. This can then be used to identify any failures that may have occurred in the system 89. The system described above can use dedicated processor systems, micro controllers, programmable logic devices, or microprocessors that perform some or all of the communica tion operations. Some of the operations described above may be implemented in Software and other operations may be implemented in hardware. For the sake of convenience, the operations are described
1. An application management system for a multiprocessor System, comprising: one or more processors coupled together into a multipro cessor System, wherein at least one of the processors in the multiprocessor system is configured to: operate a transceiver configured to detect a new device within communication range of the multiprocessor system;
detect a protocol used by the new device; configure the multiprocessor System to communicate with the new device when the protocol conforms with a protocol used in the multiprocessor System; identify a particular type of data used in the new device and processed with a first Software application con trolled and operated by the new device; identify a second Software application from among mul tiple different software applications located in a memory in the multiprocessor System, wherein the second software application is currently not loaded in or operated by any the on board processors in the
US 8,020,028 B1 8 12. The application management system of claim 11 wherein the multimedia system is wired to speakers. 13. The application management system of claim 1 wherein the detected new device runs a global positioning system application. 14. The application management system of claim 1 includ ing an external memory, and wherein one of the multiple processors is configured to:
7 multiprocessor system, and wherein the second soft ware application is also configured to process the same particular type of data processed by the first software application controlled and operated by the new device;
download a copy of the second Software application selected from the memory to one of the multiple pro cessors in the multiprocessor System; configure said processor to run the second Software application moved from the memory, wherein run ning the second software application causes said pro cessor to take over control and operation of the new
device; initiate transfer of the data from the new device to said
processor and initiate processing of the particular type
of data received from the new device with the second
Software application running on said processor, and prevent at least one of an unauthorized device, unautho rized application, or unauthorized data from access ing at least Some of the Software applications or data in the multiprocessor System. 2. The application management system of claim 1 wherein the multiprocessor System is further configured to monitor for at least one of a failure in an application in a newly added device, a failure in a processor in the newly added device, or a failure in a communications link with the newly added
16. The application management system of claim 15 wherein the user interface initiates control operations carried out by one or more of the processors in the multiprocessor system. 25
17. The application management system of claim 15 wherein the user interface generates feedback to a user, which feedback is derived from information displayed on the dis play. 18. A method for reconfiguring applications in a multipro cessor, comprising: operating a wireless device manager in at least one proces Sor in the multiprocessor System, the wireless device manager configured to: a. monitor for wireless signals from a new device not currently coupled to the multiprocessor System, wherein the new device runs a first software applica tion that processes a first type of data; and b. wirelessly connect the new device to the multiproces Sor system;
8. The application management system of claim 1 wherein the detected new device includes wireless speakers or wire less headphones. 9. The application management system of claim 1 wherein a data storage coupled to the multiprocessor system includes a readable and writeable data storage media selected from the group of solid state device, hard disk drive, or compact disk. 10. The application management system of claim 1 wherein a display processor in the multiprocessor system is coupled to a multimedia system. 11. The application management system of claim 10 wherein the multimedia system receives signals from mul tiple sources.
one of the multiple processors; identify the detected data source; and communicate the identity of the detected data source to a display processor in the multiprocessor System for indi cation on the display. 15. The application management system of claim 1 wherein a display in the multiprocessor system includes a user interface that includes a touch screen.
3. The application management system of claim 1 wherein the multiprocessor system is configured to: detect a first and second one of the new devices that gen erate streaming audio data; disconnect the streaming audio data generated from the first one of the detected new devices currently connected to the speakers; and connect streaming audio data generating from the second one of the detected new devices to the speakers accord ing to at least one of a priority level set in at least one of the processors and inputs received from a display coupled to the multiprocessor System. 4. The application management system of claim 1 wherein the detected new device has an integrated display Screen. 5. The application management system of claim 4 wherein at least a portion of content displayed on the display Screen of the detected new device is communicated to a display pro cessor in the multiprocessor System for display and genera tion of information on a display processor display. 6. The application management system of claim 1 wherein the detected new device includes a data storage device selected from the group of a hard disk drive, solid state device, or compact disk. 7. The application management system of claim 1 wherein the detected new device is a wired or wireless audio output
detect a data Source when the new device is connected to
operating a configuration manager in one of the multiple processors in the multiprocessor System, the configura tion manager configured to: c. monitor operations of the multiple processors in the multiprocessor system; d. identify data codes in the wireless signals from the new device and use the data codes to identify the first type of data processed by the first Software applica tion running on the new device; e. responsive to identifying the data codes from the new device, select a second software application from among multiple different Software applications stored within memory in the multiprocessor System, wherein the second software application is associated with the first type of data processed by the new device and is not currently loaded into one of the multiple proces sors in the multiprocessor System; f download a copy of the second software application selected from the memory to one of the multiple pro cessors in the multiprocessor System; g. reconfigure one of the multiple processors in the mul tiprocessor system to run the second Software appli cation downloaded from the memory and take over control and operation of the new device; and h. process data from the new device with the second Software application operating in and controlled by the particular one of the multiple processors in the multiprocessor system; and
US 8,020,028 B1 9 i. operating a security manager configured to determine authority to access at least Some of the new devices, Software applications or data used in the multiprocessor system. 19. The method of claim 18 wherein the new device is an
audio device, and further comprising receiving streaming audio data from the audio device with one of the multiple processors in the multiprocessor System.
configure the new device into the multiprocessor Sys tem,
20. The method of claim 18 wherein the new device is at
least one of a cellular telephone, navigation system and video
10 identify a new device that is not currently coupled to the multiprocessor system, connect the new device to the multiprocessor system when signaling from the new device conforms to a communication protocol used in the multiprocessor
identify data codes in the signaling from the new device identifying an application running on the new device, a data type used on the new device, and a security
21. The method of claim 18 wherein the new device is an
attribute associated with at least one of data stored in
audio device that includes an integrated display Screen. 22. The method of claim 21 further comprising a display, and communicating at least a portion of content displayed on the integrated display screen of the new device to the display.
the new device and the application running on the new device, 15
23. The method of claim 18 wherein the new device
includes a data storage device selected from the group of a hard disk drive, Solid state device, or compact disk, and fur ther comprising wirelessly receiving data from the data Stor age device with one of the processors in the multiprocessor
system. 24. The method of claim 18 wherein the new device is a
wired or wireless speaker, and further comprising communi cating audio signals from one of the processors in the multi processor system to the speaker. 25. The method of claim 22 wherein the display commu nicates with a multimedia system. 26. The method of claim 25 further comprising receiving at the multimedia system signals from multiple sources.
device, and the data. 30
27. The method of claim 18 wherein the new device com ellite network.
using the second new device in the multiprocessor System. 30. The method of claim 29 further comprising operating the first and second new devices to communicate with the
multiprocessor system using Bluetooth signals. 31. A multiprocessor System, comprising: multiple processors operating together as a multiprocessor system, wherein the multiprocessor system is a distrib uted processing system configured to:
identify at least one of a stored application in memory accessible by the multiprocessor system, wherein the application processes the same type of data processed by the new device, responsive to identifying the stored application, down load the stored application from memory into at least one processor in the multiprocessor System, and use the application to process data received from the new Select an appropriate human machine interface to output
prises a global positioning device, and further comprising receiving with the global positioning device data from a sat 28. The method of claim 22 wherein the multiprocessor system includes a plurality of speakers, and further compris ing (i) displaying images representing at least some of the speakers on the display in the vehicle, and (ii) operating one of the multiple processors to route audio signals from the detected audio device to selected ones of the speakers repre sented on the display. 29. The method of claim 22 further comprising: operating the device manager to monitor for wireless sig nals from at least a second new device not currently coupled to the multiprocessor System; determining whether a wireless communication interface used by the second new device is compatible with at least one protocol used in the multiprocessor System; adding the second new device to the multiprocessor sys
use the identified security attribute to prevent at least one of an unauthorized applications and unauthorized data from being processed by the multiprocessor Sys
32. The multiprocessor system of claim 31 wherein the multiprocessor system is positioned within proximity to, or located within a personal dwelling comprised at least one of: a computer server, associated with the personal dwelling; an appliance, wherein the appliance is an apparatus, or device for a particular purpose or use, and wherein the appliance is at least one of: a washing machine, a dryer, a personal computer, a cooking appliance, a home security appliance, a home lighting appliance, a multimedia appliance, an audio management appliance, a network appliance, a home environmental control appliance, and a vehicle appliance. 33. The multiprocessor system of claim 31 wherein the security attribute prevents a corruption in the operation or execution of any task controlled by one or more of the mul tiple processors or identified Software applications by any unauthorized application or Software code. 34. The multiprocessor system of claim 33 wherein the security attribute allows for any two or more of the identified applications executing on the different processors to operate as one or more integrated systems.
UNITED STATES PATENT AND TRADEMARK OFFICE Certificate
Patent No. 8,020,028 B1
Patented: September 13, 2011
On a certificate forerror correction of inventorship pursuant 35 U.S.C. 256, has e petition ound thatES e aboveissuance identifiedofpatent, through and without any deceptive intent,to improperly setsitforth Accordingl R is SE, certified that the correct inventorship of this patentis: Robert Pierce Lutter, Tacoma,
WA (US); and Dan Alan Preston, Bainbridge Island, WA (US). Signed and Sealed this Twenty-ninth Day of April 2014.