摘要:
Energy-reversible acyl conjugates, intermediates, and related compositions are disclosed. In preferred aspects, examples of such compositions include:
摘要:
Energy-reversible acyl conjugates, intermediates, and related compositions are disclosed. In preferred aspects, examples of such compositions include:
摘要:
A method and system for relearning a previously programmed, authenticated key. The system includes an electronic control module (ECM) and a key. The method begins when the ECM fails to match an identification code (ID) of the key with all active or disabled IDs that are stored within the ECM. Thereafter, the ECM sends a signal to the key by encryption with a default secret code. If the key does not respond to this signal, then the ECM sends a signal to the key by encryption with one of a series of unique secret codes. The key receives this signal and then transmits an encrypted valid response signal to the ECM. The ECM extracts a key password from the encrypted valid response signal and compares this key password to a module password. Thereafter, the ECM determines that the passwords are identical and the ECM stores the key ID.
摘要:
A method is provided for configuring an operation mode of a passive entry system of a vehicle. A configuration mode of a vehicle based communication module is enabled by depressing a predetermined combination of actuation buttons on a portable communication device to broadcast a configuration mode command signal. A passive entry configuration is selected by depressing a respective actuation button on the portable communication device when in the configuration mode. The portable communication device broadcasts a corresponding command signal to the vehicle based communication module identifying the selection. The corresponding command signal is received from the portable communication device and the selected passive entry configuration is adopted in response thereto.
摘要:
A high-speed multiplexing technique employs diode bridges to multiplex the outputs of two or more digital-to-analog converters (DACs) together. Like prior art techniques, the diode bridges isolate the DAC outputs from one another and are activated by forward biasing the bridges, one at a time in a staggered-phase, sequential fashion with sequenced biasing currents, to effectively connect the DACs, one at a time to an output signal. Unlike prior art techniques, however, the low capacitance diodes are inserted in series with the sequenced biasing current driving each diode bridge, one on each side of the bridge. The low capacitance diodes are oriented to pass current in the direction of forward bias of the diode bridges. Voltage mode switching is employed to limit the effect of parasitic capacitances on output amplitude. One embodiment is directed to a pair of back-to-back diode bridges driven by a single transformer secondary winding. Other embodiments are directed to transformerless and multiple-transformer implementations.
摘要:
A passive entry system for a vehicle is provided that includes a vehicle-based communication module mounted in the vehicle and a portable communication device. The vehicle-based communication module includes a transmitter for transmitting a challenge signal to the portable communication device when in a polling state to determine a presence of the portable communication device for allowing access to the vehicle. The portable communication device includes a receiver for receiving the challenge signal and is responsive to the challenge signal when in a response state and non-responsive to the challenge signal when in a non-response state.
摘要:
A write mode for programming selected memory locations of an electronic module with data includes writing data to be programmed into memory into first, second and third data blocks, and a checksum corresponding to data block. A read mode for reading and using data located in memory locations includes reading data from first, second, and third data blocks, determining if the contents of those data blocks is identical to the contents of any other of the data blocks, and using the data from the memory with the contents of any data block whose contents are identical to the contents of another data block.
摘要:
Memory contents in an electronic key are re-programmed using a base station from a multi-byte pre-existing or default value. If writing the new secret code value is interrupted and results in a partially-written value then a first recovery code is formed comprising a leading portion having values matching a corresponding portion of the pre-existing secret code and a trailing portion having values matching a corresponding portion of the new secret code. The first recovery code is transmitted to the electronic key for comparison with the stored secret code value. The electronic key compares a received secret code value in response to the first recovery code with the stored secret code value. If the comparison detects a non-match, then interaction with the base station is suspended. If the comparison detects a match, then interaction with the base station is continued in order to accept the new secret code value after re-transmission in full from the base station.