Patent application number | Description | Published |
20110149666 | BITLINE FLOATING DURING NON-ACCESS MODE FOR MEMORY ARRAYS - Techniques are disclosed that allow for power conservation in integrated circuit memories, such as SRAM. The techniques can be embodied in circuitry that allows for floating of bitlines to eliminate or otherwise reduce power leakage associated with precharging bitlines. For instance, the techniques can be embodied in a bitline floating circuit having a single logic gate for qualifying the precharge control signal with a wake signal, so that precharging of the bitline does not occur if the wake signal is not in an active state. The techniques further allow for the elimination or reduction of unnecessary power consumption by the I/O circuitry or the memory array, such as when the memory array is not being accessed or when the array or a portion thereof is permanently disabled for yield recovery. | 06-23-2011 |
20110161783 | METHOD AND APPARATUS ON DIRECT MATCHING OF CACHE TAGS CODED WITH ERROR CORRECTING CODES (ECC) - An apparatus and method is described herein directly matching coded tags. An incoming tag address is encoded with error correction codes (ECCs) to obtain a coded, incoming tag. The coded, incoming tag is directly compared to a stored, coded tag; this comparison result, in one example, yields an m-bit difference between the coded, incoming tag and the stored, coded tag. ECC, in one described embodiment, is able to correct k-bits and detect k+1 bits. As a result, if the m-bit difference is within 2k+2 bits, then valid codes—coded tags—are detected. As an example, if the m-bit difference is less than a hit threshold, such as k-bits, then a hit is determined, while if the m-bit difference is greater than a miss threshold, such as k+1 bits, then a miss is determined. | 06-30-2011 |
20140269019 | DUAL-PORT STATIC RANDOM ACCESS MEMORY (SRAM) - In one embodiment, a memory cell circuit for storing data includes a pair of cross-coupled inverters for storing states of the memory cell circuit. Access devices provide access to the pair of cross-coupled inverters. The memory cell circuit also includes a set of electrically inactive p-type metal oxide semiconductor (PMOS) devices that are coupled to the pair of cross-coupled inverters. The set of electrically inactive PMOS devices in combination with a portion (e.g., PMOS devices) of the pair of cross-coupled inverters enables a continuous p-type diffusion layer for the memory cell circuit. | 09-18-2014 |
20160078926 | DUAL-PORT STATIC RANDOM ACCESS MEMORY (SRAM) - In one embodiment, a memory cell circuit for storing data includes a pair of cross-coupled inverters for storing states of the memory cell circuit. Access devices provide access to the pair of cross-coupled inverters. The memory cell circuit also includes a set of electrically inactive p-type metal oxide semiconductor (PMOS) devices that are coupled to the pair of cross-coupled inverters. The set of electrically inactive PMOS devices in combination with a portion (e.g., PMOS devices) of the pair of cross-coupled inverters enables a continuous p-type diffusion layer for the memory cell circuit. | 03-17-2016 |
Patent application number | Description | Published |
20110300099 | MULTI-LEVEL SPECIFIC TARGETING OF CANCER CELLS - A compound comprising, in combination: a cell surface binding ligand or internalizing factor, such as an IL-13Rα2 binding ligand; at least one effector molecule (e.g., one, two, three or more effector molecules); optionally but preferably, a cytosol localization element covalently coupled between said binding ligand and said at least one effector molecule; and a subcellular compartment localization signal element covalently coupled between said binding ligand and said at least one effector molecule (and preferably with said cytosol localization element between said binding ligand and said subcellular compartment localization signal element). Methods of using such compounds and formulations containing the same are also described. | 12-08-2011 |
20130164257 | MULTI-LEVEL SPECIFIC TARGETING OF CANCER CELLS - A compound comprising, in combination: a cell surface binding ligand or internalizing factor, such as an IL-13Rα2 binding ligand; at least one effector molecule (e.g., one, two, three or more effector molecules); optionally but preferably, a cytosol localization element covalently coupled between said binding ligand and said at least one effector molecule; and a subcellular compartment localization signal element covalently coupled between said binding ligand and said at least one effector molecule (and preferably with said cytosol localization element between said binding ligand and said subcellular compartment localization signal element). Methods of using such compounds and formulations containing the same are also described. | 06-27-2013 |
20130209541 | IL-13 RECEPTOR BINDING PEPTIDES - A targeting peptide that specifically binds to an IL13 receptor (e.g., wherein said targeting peptide is not an IL13 fragment) is described. The targeting peptide is optionally conjugated to at least one effector molecule. In some embodiments, the peptide specifically binds to the IL13Rα2 protein. | 08-15-2013 |
20150203557 | MULTI-LEVEL SPECIFIC TARGETING OF CANCER CELLS - A compound comprising, in combination: a cell surface binding ligand or internalizing factor, such as an IL-13Rα2 binding ligand; at least one effector molecule (e.g., one, two, three or more effector molecules); optionally but preferably, a cytosol localization element covalently coupled between said binding ligand and said at least one effector molecule; and a subcellular compartment localization signal element covalently coupled between said binding ligand and said at least one effector molecule (and preferably with said cytosol localization element between said binding ligand and said subcellular compartment localization signal element). Methods of using such compounds and formulations containing the same are also described. | 07-23-2015 |
Patent application number | Description | Published |
20090281879 | METHODS FOR ANALYZING JOB FUNCTIONS AND JOB CANDIDATES AND FOR DETERMINING THEIR CO-SUITABILITY - A method and system for conducting an elemental analysis of a job's functions and requirements, conducting a medical diagnosis of a worker to determine the physical capabilities and limitations of the worker, and comparing the elemental analysis and the medical diagnosis to determine whether the worker can function in a particular job be it the current job, another existing job or a modification of either. | 11-12-2009 |
20100121337 | DEVICE FOR DRILLING ANGLED OSTEAL TUNNELS - A surgical drill guide device for drilling an angled osteal tunnel having an support rack having a first end and a second end; a drill guide sleeve having a passage for receiving a drill therethrough, the drill guide sleeve being adjustably securable and positionable on the rack between the first end and the second end of the rack; and a guide component secured on the first end of said rack, the guide component having a suture seizing mechanism for seizing a suture. | 05-13-2010 |
20100121338 | METHOD FOR DRILLING ANGLED OSTEAL TUNNELS - Methods for drilling an angled osteal tunnel into a bone by drilling or punching at least one first tunnel portion into the bone from a first surface location on the bone, the at least one first tunnel portion having an interior end within the bone and then drilling or punching at least one second tunnel portion into the bone from a second surface location on the bone using a guide component to guide a drill to the interior end of the first tunnel portion, whereby the at least one first tunnel portion and the at least one second tunnel portion intersect and connect at an angle, resulting in an angled osteal tunnel. | 05-13-2010 |
20100121354 | DEVICE FOR THE INTRAOSTEAL SEIZING OF SUTURES - Devices for seizing sutures within osteal tunnels, including blindly seizing such sutures, having an interior end for insertion into an osteal tunnel, the interior end having a suture seizing mechanism; an exterior end having an activating mechanism for activating the suture seizing mechanism; a target ring, which is a component of the suture seizing mechanism, having an opening through which a suture to be seized can pass through; and a suture clamping component, which is a component of the suture seizing mechanism, for clamping the suture to be seized against a surface of the target ring. | 05-13-2010 |
20100121375 | SUTURE ANCHORING SYSTEM AND METHOD - A suture anchoring system having an anchor structure through which at least one suture can extend, the anchor being compressible or deformable to anchor the suture, and a method for using the suture anchoring system by attaching one end of a suture to a muscle, ligament or bone; threading the suture through an osteal tunnel; providing a surgical anchor comprising a cuff of deformable material suitably shaped to receive a suture, wherein said cuff, when compressed, tightly grips a suture and forms a point of support, whereby said deformed anchor prevents a suture from being pulled through a drilled osteal tunnel; threading the other end of the suture through the anchor; and deforming said anchor tightly about the suture to form a point of support. | 05-13-2010 |
20100228254 | METHOD FOR DRILLING ENLARGED SECTIONS OF ANGLED OSTEAL TUNNELS - Methods for drilling enlarged osteal tunnels using osteal guides capable of drilling an angled osteal tunnel, namely, an osteal tunnel having an angle or turn within the bone and for drawing a muscle, tendon or ligament in need of repair into the enlarged osteal tunnel such that the bone can mend about, around, over and/or within the muscle, tendon or ligament. A reamer and guide wire can be used to create the enlarged osteal tunnel to accommodate a portion of the muscle, tendon or ligament in need of repair. The device allows for the blind intraosseous preparation of osteal tunnels and the blind intraosseous retrieval of sutures from such osteal tunnels. | 09-09-2010 |
20120226113 | COMPUTERIZED INJURY MANAGEMENT PROCESS - A method for aiding a physician in examining, diagnosing and treating an injured patient has the steps of creating a computer database that converts a selected injured body part to a sorted group of one or more preliminary diagnoses with examination protocols for each preliminary diagnosis; conducting recommended examination protocols and inputting examination results to the computer database to narrow diagnosis to most likely diagnosis; selecting a recommended diagnosis; creating a computer database of treatment protocols for every computer generated injury diagnosis, the treatment protocols having usage data and outcome data; selecting a treatment protocol; initiating treatment; and inputting treatment outcome results back into the computer database for statistical inclusion into the computer database. | 09-06-2012 |
20120245973 | Methods For Analyzing Job Functions And Job Candidates And For Determining Their Co-Suitability - A method and system for conducting an elemental analysis of a job's functions and requirements, conducting a medical diagnosis of a worker to determine the physical capabilities and limitations of the worker, and comparing the elemental analysis and the medical diagnosis to determine whether the worker can function in a particular job be it the current job, another existing job or a modification of either. | 09-27-2012 |
20130023998 | SHOULDER INTER-SPACER COMPONENT AND SURGICAL METHOD OF IMPLANTATION - A shoulder inter-spacer implant has a first outer surface having a contoured profile simulating a glenoid surface and a second inner surface for resting on an outer surface of a prepared glenoid. The second inner surface has a flat or contoured profile void of any pegs, keels or bone interlocking projections so that the second inner surface is profiled to rest on the surface of the prepared glenoid when implanted free of any direct anchoring or cementing to the bone structure. In this fashion the inter-spacer is free to move or slide on the prepared glenoid. The inter-spacer may include one or more soft tissue attachment locations to which a tendon, cartilage, ligament or other soft tissue can be secured, the inter-spacer being otherwise free floating relative to the prepared glenoid. | 01-24-2013 |
20140236302 | SHOULDER INTER-SPACER COMPONENT AND SURGICAL METHOD OF IMPLANTATION - A shoulder inter-spacer implant has a first outer surface having a contoured profile simulating a glenoid surface and a second inner surface for resting on an outer surface of a prepared glenoid. The second inner surface has a flat or contoured profile void of any pegs, keels or bone interlocking projections so that the second inner surface is profiled to rest on the surface of the prepared glenoid when implanted free of any direct anchoring or cementing to the bone structure. In this fashion the inter-spacer is free to move or slide on the prepared glenoid. The inter-spacer may include one or more soft tissue attachment locations to which a tendon, cartilage, ligament or other soft tissue can be secured, the inter-spacer being otherwise free floating relative to the prepared glenoid. | 08-21-2014 |
20140288595 | SOFT TISSUE INTERFERENCE FIT ANCHOR SYSTEM - The soft tissue anchor system preferably has a sleeve ( | 09-25-2014 |
Patent application number | Description | Published |
20080244736 | MODEL-BASED ACCESS CONTROL - Access control as it relates to policies or permissions is provided based on a created model. A security policy is abstracted and can be independent of a mechanism used to protect resources. An asbstract model of a potential user, user role and/or resource is created without associating a specific individual and/or resource with a model. These abstract user models and abstract resource models can be used across applications or within disparate applications. The abstracted security policies can be selectively applied to the model. Specific users and/or resources can be associated with one or more abstract user model or abstract resource model. The models can be nested to provide configurations for larger systems. | 10-02-2008 |
20080301780 | ACCESS CONTROL NEGATION USING NEGATIVE GROUPS - The subject disclosure pertains to systems and methods that facilitate managing groups entities for access control. A negative group is defined using a base group, where the negative group associated with a base group includes any entities not included in the base group. Negative groups can be implemented using certificates rather than explicit lists of negative group members. A certificate can provide evidence of membership in the negative group and can be presented for evaluation to obtain access to resources. Subtraction groups can also be used to manage access to resources. A subtraction group can be defined as the members of a first group, excluding any members of a second group. | 12-04-2008 |
20080307486 | ENTITY BASED ACCESS MANAGEMENT - The subject disclosure pertains to systems and methods that facilitate entity-based for access management. Typically, access to one or more resources is managed based upon identifiers assigned to entities. Groups of identifiers can be assigned to access rights. An authority component can manage an exclusion group that excludes an entity, regardless of the identifier utilized by the entity. Access control components can utilize exclusion groups in access policies to define access rights to a resource. | 12-11-2008 |
20080313712 | TRANSFORMATION OF SEQUENTIAL ACCESS CONTROL LISTS UTILIZING CERTIFICATES - The subject disclosure pertains to systems and methods that facilitate managing access control utilizing certificates. The systems and methods described herein are directed to mapping an access policy as expressed in an access control list to a set of certificates. The set of certificates can be used to grant access to resources in the manner described by the ACL. The certificates can be distributed to entities for use in obtaining access to resources. Entities can present certificates to resources as evidence of their right to access the resources. The access logic of the sequential ACL can be transformed or mapped to a set of order independent certificates. In particular, each entry, position of the entry in the list and any preceding entries can be analyzed. The analysis can be used to generate order independent certificates that provide access in accordance with the access policy communicated in the ACL. | 12-18-2008 |
20140059680 | LOCAL SECURE SERVICE PARTITIONS FOR OPERATING SYSTEM SECURITY - Systems and methods provide multiple partitions hosted on an isolation technology such as a hypervisor where at least one of the partitions, a local secure service partition (LSSP), provides security services to other partitions. The service partitions (LSSPs) host those high assurance services that require strict security isolation, where the service can be shared across partitions and accessed even when the user is not connected to a network. The LSSP also can certify the results of any computation using a key signed by a TPM attestation identity key (AIK), or other key held securely by the hypervisor or a service partition. The LSSPs may be configured to provide trusted audit logs, trusted security scans, trusted cryptographic services, trusted compilation and testing, trusted logon services, and the like. | 02-27-2014 |
20140380318 | VIRTUALIZED COMPONENTS IN COMPUTING SYSTEMS - The subject disclosure is directed towards virtual components, e.g., comprising software components such as virtual components of a distributed computing system. Virtual components are available for use by distributed computing system applications, yet managed by the distributed computing system runtime transparent to the application with respect to automatic activation and deactivation on runtime-selected distributed computing system servers. Virtualization of virtual components is based upon mapping virtual components to their physical instantiations that are currently running, such as maintained in a global data store. | 12-25-2014 |
Patent application number | Description | Published |
20120254948 | METHODS AND SYSTEMS FOR AUTHENTICATING ONE OR MORE USERS OF A VEHICLE COMMUNICATIONS AND INFORMATION SYSTEM - In at least one embodiment, a system for authorizing use of a vehicle communication and information system may include one or more data processors configured to receive information associating one or more devices with a vehicle computer. The data processor(s) may be also configured to receive information identifying a user requesting authorization to command the vehicle controls from the one or more devices associated with the vehicle computer. The user(s) may be authorized to command the vehicle controls from the one or more devices associated with the vehicle computer based on performing an authentication process for authenticating the user, determining that the user is an authenticated user based on the authentication process, and enabling command of one or more vehicle controls from the one or more remote devices via the associated vehicle computer based on the user being authenticated. | 10-04-2012 |
20130297100 | Methods and Systems for Authenticating One or More Users of a Vehicle Communications and Information System - A system includes a processor, configured to wirelessly communicate with at least a vehicle computing system, wherein the processor is further configured to receive input from a vehicle owner indicating that transfer of administrative rights to vehicle systems is desired. The processor is further configured to send a confirmation message to a new owner of the vehicle and send a confirmation request to the vehicle computing system, following receipt of a response to the first confirmation message. Also, the processor is configured to establish the new owner as having administrative rights upon receipt of a response to the confirmation request. | 11-07-2013 |
20130305323 | METHODS AND SYSTEMS FOR AUTHENTICATING ONE OR MORE USERS OF A VEHICLE COMMUNICATIONS AND INFORMATION SYSTEM - In at least one embodiment, a system for authorizing use of a vehicle communication and information system may include one or more data processors configured to receive information associating one or more devices with a vehicle computer. The data processor(s) may be also configured to receive information identifying a user requesting authorization to command the vehicle controls from the one or more devices associated with the vehicle computer. The user(s) may be authorized to command the vehicle controls from the one or more devices associated with the vehicle computer based on performing an authentication process for authenticating the user, determining that the user is an authenticated user based on the authentication process, and enabling command of one or more vehicle controls from the one or more remote devices via the associated vehicle computer based on the user being authenticated. | 11-14-2013 |
20140032101 | Method and Apparatus for Point of Interest Evaluation - A system includes a navigation device and a processor in communication with the navigation device and an output. The processor is configured to receive a plurality of POIs. The processor is also configured to search for at least a first of the POIs in first proximity to a route in the navigation device. Further, the processor is configured to,subsequent to the search for a first POI in first proximity, for each instance of the first POI in first proximity to the route, search for at least a second of the POIs in second proximity to the first POI. The processor is also configured to output any instances wherein each of the POIs are found to be in second proximity to at least one of the other POIs of the plurality of POIs. | 01-30-2014 |
20140163811 | METHOD AND APPARATUS FOR STREAMLINED REMOTE TELEMATICS AUTHORIZATION - A vehicle system providing a temporary validation authorization request for one or more processors configured to transmit a signal from the vehicle system to a server once the one or more processors are installed in the vehicle. Once the server receives the installation signal, the processor may receive an in-vehicle authorization message from the server. The in-vehicle authorization message may be accepted by a user-input acceptance transmitted to the server. The system may determine temporary validation authorization if it is determined that the user accepted the in-vehicle authorization message within a predetermined amount of time following transmission of the signal to the server indicating that the processor was installed. Once authorized, the system may initialize to allow for assembly line testing. The temporary validation authorization initializes the vehicle system for temporary communication with the server while on a vehicle manufacturing assembly line for testing to ensure a quality product. | 06-12-2014 |
20140240111 | Method and Apparatus for In-Vehicle Alarm Activation and Response Handling - A system includes one or more processors configured to detect activation of an alarm trigger in communication with the one or more processors. The processors are further configured to determine a type of trigger and provide a subtle feedback response, based on the type of trigger, designed to avoid detection by an assailant. The processors are additionally configured to wirelessly contact an emergency responder and provide data usable in determining a vehicle location and a vehicle identification | 08-28-2014 |
20140274027 | Method and Apparatus for Disclaimer Presentation and Confirmation - A system includes a processor configured to select a message. The processor is also configured to determine if a phone is wirelessly connected to a vehicle computing system. The processor is further configured to display the message if no wirelessly connected phone is found. The processor is additionally configured to determine if the message was displayed during a connected phone's earlier connection. Also, the processor is configured to display the message if the message was not previously displayed during the connected phone's earlier connection. Further, the processor is configured to skip display of the message if the message was previously displayed during the connected phone's earlier connection. | 09-18-2014 |
20140274223 | Method and Apparatus for a Battery Saver Utilizing a Sleep and Vacation Strategy - A cellular communication module utilized within a battery-powered vehicle comprising a processor configured to activate an extended power mode, wherein the extended power mode allows the cellular communication module to establish a data session with a cellular communication network for a first time period. The process if further configured to activate a low power mode, wherein the low power mode allows the cellular communication module to maintain a registered cellular connection with the cellular communication network for a second time period, and activate a sleep mode, wherein the sleep mode maintains a registered cellular connection with the cellular communication network during a reoccurring wake-up cycle or is disconnected from the cellular communication network for a third time period. | 09-18-2014 |
20140274226 | Method and Apparatus for an Alert Strategy Between Modules - A telematics control unit comprising a transceiver configured to receive a message from a vehicle module during a sleep mode, the message requesting the telematics control unit to output information via a telecommunications network. The telematics control unit also includes a processor configured to determine whether to output the information or delay the output of the information based upon the message, and output the information to the telecommunications network, or delay outputting the information until the telematics control unit enters a full-power mode or a wake-up cycle. | 09-18-2014 |
20150105941 | Method for Securely Authorizing Vehicle Owners to an In-Vehicle Telematics Feature Absent In-Car Screen - A system includes a processor configured to receive remote vehicle identification information and a user-confirmable vehicle variable value from a remote vehicle computing system. The processor is also configured to receive vehicle identification information and user-confirmable variable value user-input, input in conjunction with a remote process remote access request. Further, the processor is configured to compare the user-input variable value to the remotely received variable value. The processor is additionally configured to provide access to the remote process upon a correspondence between the user-input variable value and the remotely received variable value. | 04-16-2015 |
20150193219 | FLEXIBLE FEATURE DEPLOYMENT STRATEGY - A vehicle may gather vehicle build configuration information, and provide a vehicle identifier and the vehicle information to a server. The server may determine a feature set configuration of a configurable module of the vehicle based on the vehicle information and vehicle feature associations retrieved from a vehicle data source, and provide, in a message topic of a topic tree associated with the vehicle identifier to which the vehicle is subscribed, a notification to configure the configurable module. The vehicle may update a feature set configuration of a configurable module supporting a plurality of features based on the notification. | 07-09-2015 |
20150193220 | AUTONOMOUS GLOBAL SOFTWARE UPDATE - A computer-implemented method may include subscribing to a first topic tree topic associated with an installed vehicle software component version; identifying a desired software component version based on a published notification retrieved from the first topic; and when the desired version and the installed version differ, updating a software component using a software update retrieved from a second topic tree topic associated with software updates to the installed version. | 07-09-2015 |
20150195364 | SECURE MANIPULATION OF EMBEDDED MODEM CONNECTION SETTINGS THROUGH SHORT MESSAGING SERVICE COMMUNICATION - A vehicle may include at least one controller configured to maintain a communication channel over a network between a vehicle and a vehicle service server accessible through an access point node. The at least one controller may be further configured to receive, over the network out-of-band from the communication channel, an update message including updated communication channel connection information, and upon receiving the message, reconnect the communication channel according to the updated connection information. A secure server may be configured to generate the update message specifying at least one of updated access point node information and updated address information, encrypt the update message according to an encryption key shared with a vehicle destination, and provide the update message over a network to the vehicle out-of-band from the communication channel. | 07-09-2015 |
20150221150 | Method and Apparatus for Secure Vehicle System Access from a Remote System - A system includes a processor configured to receive a vehicle-access-PIN generation request from a vehicle computing system (VCS). The processor is also configured to generate the vehicle-access-PIN. The processor is additionally configured to associate a vehicle with the vehicle-access-PIN. Further, the processor is configured to return the vehicle-access-PIN to the requesting VCS. Also, the processor is configured to receive a validation request, including a validation-PIN, from a non-vehicle computing system (NVCS). In addition, the processor is configured to validate the validation-PIN by comparison with stored vehicle-access-PINs to find a match and provide access credentials, for a vehicle associated with a stored vehicle-access-PIN that matches the validation-PIN, to the NVCS. | 08-06-2015 |
20150262439 | METHODS AND SYSTEMS FOR AUTHENTICATING ONE OR MORE USERS OF A VEHICLE COMMUNICATIONS AND INFORMATION SYSTEM - In at least one embodiment, a system for authorizing use of a vehicle communication and information system may include one or more data processors configured to receive information associating one or more devices with a vehicle computer. The data processor(s) may be also configured to receive information identifying a user requesting authorization to command the vehicle controls from the one or more devices associated with the vehicle computer. The user(s) may be authorized to command the vehicle controls from the one or more devices associated with the vehicle computer based on performing an authentication process for authenticating the user, determining that the user is an authenticated user based on the authentication process, and enabling command of one or more vehicle controls from the one or more remote devices via the associated vehicle computer based on the user being authenticated. | 09-17-2015 |
20150264649 | Method and Apparatus for an Alert Strategy Between Modules - A telematics control unit comprising a transceiver configured to receive a message from a vehicle module during a sleep mode, the message requesting the telematics control unit to output information via a telecommunications network. The telematics control unit also includes a processor configured to determine whether to output the information or delay the output of the information based upon the message, and output the information to the telecommunications network, or delay outputting the information until the telematics control unit enters a full-power mode or a wake-up cycle. | 09-17-2015 |
20150277942 | TARGETED VEHICLE REMOTE FEATURE UPDATES - A system may include a configurable module having a firmware version supporting multiple functions and a configuration specifying which of the functions are utilized for a vehicle feature; and a controller configured to update the configuration of the module, based on a command published by a server to a controller-subscribed topic tree message topic, the command targeting the vehicle according to one of unique vehicle identifier and the vehicle feature. | 10-01-2015 |
20150281374 | REMOTE VEHICLE CONNECTION STATUS - A message broker may initialize, responsive to a connection notification published via vehicle connection to a vehicle-associated topic tree topic to which a service delivery network is subscribed, a lost-connection notification to be published to the topic by the broker upon broker identification of the connection as lost, and when a periodic notification over the connection to the message broker is missed, publish the lost-connection notification to the vehicle-associated topic. A service delivery may receive a message publish request for a vehicle topic via a message broker to which the service delivery network and vehicle subscribe; and send a wakeup message to the vehicle out-of-band from the message broker to request the vehicle to reconnect to the message broker when a type of the message requires the vehicle to be connected to publish the message and the vehicle is disconnected. | 10-01-2015 |
20150286475 | MULTIPLE CHUNK SOFTWARE UPDATES - A system may include a vehicle-based computing system. The vehicle-based computing system may identify from a first software update chunk retrieved from a subscribed topic for receiving vehicle updates, a number of chunks of the update, retrieve additional chunks of the update by subscription to each of a sequence of subtopics to the subscribed topic, each subtopic associated with a respective remaining one of the number of chunks, and update the software utilizing the retrieved chunks. | 10-08-2015 |
20150310741 | METHOD AND APPARATUS FOR VEHICLE MESSAGE RECALL - A system includes a processor configured to receive a request for publication of a message to a vehicle. The processor is further configured to determine if the message has a time-sensitive indicia, defining an expiration time, affiliated therewith. Also, the processor is configured to deliver messages having time-sensitive indicia to a time-sensitive inbox. The processor is additionally configured to remove messages from the time sensitive inbox when a defined expiration time for a given message has passed. | 10-29-2015 |
20150347326 | Method and Apparatus for Dynamically Updating a Vehicle Module Configuration Record - A system includes a processor configured to detect that a vehicle module update has been performed. The processor is further configured to create an identifier associated with a module that indicates an updated status and for each module having an identifier indicating an updated status associated therewith, requesting subscription to a topic, corresponding to the updated module, and specific to an individual vehicle, from a remote server. | 12-03-2015 |