Patent application number | Description | Published |
20100248636 | SYSTEMS AND METHODS FOR REDUCING POWER CONSUMPTION IN VEHICLE COMMUNICATION SYSTEMS - A vehicle communication system includes a connection quality module and a channel scan frequency module. The connection quality module determines that a vehicle is out-of-range (OOR) from a host when a connection quality between the vehicle and the host is below a predetermined connection quality threshold. The channel scan frequency module controls a frequency of attempts by the vehicle to connect to the host when the vehicle is OOR based on at least one of whether an engine is on and a movement rate of the vehicle. | 09-30-2010 |
20110208386 | METHOD OF ACTIVATING A TELEMATICS DEVICE - A method of registering a vehicle with a call center of a telematics system may entail turning a key within a vehicle ignition to begin a call from a telematics control module within the vehicle to a server at a telematics call center, connecting the telematics control module within the vehicle to the server at the telematics service center, sending a health check request from the telematics control module within the vehicle to the server at the telematics service center; and receiving a health check confirmation in the telematics control module within the vehicle from the server at the telematics service center. The method may further entail inquiring if such a health check request request-confirmation was successful. The method may also include a call fail counter and a message fail counter to automatically re-initiate a health check request and a successful answer to such a request. | 08-25-2011 |
20110208388 | AUDIO NOISE REDUCTION METHOD FOR TELEMATICS SYSTEM - A telematics system for a vehicle includes an infotainment module, a codec module, and a control module. The infotainment module outputs data to a speaker via a first audio data path. The codec module outputs data to the speaker via a second audio data path when a telematics function of the telematics system is triggered. The control module switches from the first audio data path to the second audio data path after the telematics function is triggered. The control module changes a state of a relay of the speaker and a gain of the codec module in a first predetermined order before outputting data to the speaker via the second audio data path. | 08-25-2011 |
20110230186 | PREVENTION OF OVERREACH CONDITION IN CELLULAR COMMUNICATION - A method of wireless communication between a base station and a mobile station may entail scanning a first entry of a preferred roaming list for a first base station channel, transmitting a downlink signal from the base station to the mobile station; determining that the downlink signal to the mobile station from the base station has not been received, scanning the preferred roaming list for a second base station, identifying that the second base station does not exist on the preferred roaming list, and inquiring whether a vehicle ignition is off upon determining that the second base station does not exist. Moreover, the method may entail determining that the vehicle ignition is on, and return an excluded channel of a base station to the preferred roaming list and determine that the vehicle ignition is off and invoke a sleep mode of the digital control module. | 09-22-2011 |
20110239285 | AUTHENTICATION BYPASS METHOD - A method for reactivating a telematics device configured to make a data call via a roaming partner of a service provider is disclosed. The service provider has an authentication bypass feature which uses an authentication bypass key common to the telematics device and the service provider to allow the telematics device to make a data call without authentication. The method comprises setting the authentication bypass key on a server of the service provider equal to a previous authentication bypass key, wherein the previous authentication bypass key was used by the authentication bypass feature prior to deactivation of the telematics device. The method includes setting the authentication bypass key on the telematics device equal to the previous authentication bypass key. The method further comprises commencing the data call through the roaming partner by sending the authentication bypass key to the service provider from the telematics device via the roaming partner. | 09-29-2011 |
20120239972 | SYSTEM AND METHOD FOR CURING A READ INABILITY STATE IN A MEMORY DEVICE - A system and method for correcting a boot error is disclosed. The system comprises a solid-state nonvolatile memory device, the solid-state nonvolatile memory device storing a boot loader at a predetermined block having a first address on the solid-state nonvolatile memory device. The system further comprises a main controller that retrieves the boot loader from the predetermined block upon powering up. The system also includes a monitoring module configured to monitor an initial boot sequence of the main controller and to determine when the predetermined block has a read inability error. The main controller obtains a backup boot loader from a backup block when the monitoring module determines that the predetermined block is corrupted. | 09-20-2012 |
20120246525 | METHOD FOR INITIATING A REFRESH OPERATION IN A SOLID-STATE NONVOLATILE MEMORY DEVICE - A method for initiating a refresh operation of a solid-state nonvolatile memory device coupled to a processor is disclosed. The method comprises determining an error number for a block of the solid-state nonvolatile memory. The error number corresponds to an amount of error bits in a page of the block having a greatest amount of error bits. The method further comprises comparing the error number with an error threshold and determining a reset number indicating an amount of times that the processor has been reset since a previous refresh operation was performed on the block of the solid-state nonvolatile memory. The method further includes comparing the number of resets with a reset threshold and refreshing the block of the solid-state nonvolatile memory when the number of errors exceeds the error threshold and the number of resets exceeds the reset threshold. | 09-27-2012 |
20120254596 | METHOD AND SYSTEM FOR CONTROLLING MESSAGE TRAFFIC BETWEEN TWO PROCESSORS - A system and method for controlling messaging between a first processor and a second processor is disclosed. The second processor controls one or more peripheral devices on behalf of a plurality of predetermined tasks being executed by the first processor. The system includes a message control module that receives an input message intended for the second processor from the first processor and maintains a message history based on the received input message and previously received input messages. The message history indicates which peripheral devices of the system are to be on and which tasks of the plurality of tasks requested the peripheral devices to be on. The message control module is further configured to generate an output message that includes output instructions for the second processor based on the message history and an output duration based on the message history. The second processor executes the output instructions. | 10-04-2012 |
20120254901 | METHOD AND SYSTEM FOR RESTORING AN APPLICATION IN A DYNAMICALLY LINKED ENVIRONMENT - A method and system for executing an application on a device is disclosed. The device comprises a nonvolatile memory having a file system that stores the application. The nonvolatile memory further includes a backup memory space that stores a backup copy of the application. The system further includes a processing module configured to execute the application and an application programmers interface (API) utilized by the processing module to facilitate instructions from the application to the processing module. The processing module is further configured to retrieve the application from the file system, execute the application on the processing module; monitor interactions between the application and the processing module for an API call from the application to the processing module, and retrieve a backup copy of the application from the backup memory space based on the monitoring for the API call. | 10-04-2012 |