Appeal No. 2003-1153 Application No. 09/349,214 methodology by which the central controller analyzes the crash data developed by the CAS and the satellite acceleration sensors 24-35, and the occupant position data developed by the occupant sensors 36-41, for purposes of determining which, if any, of the restraints 12, 14, 16, 18, 19, 20 should be deployed. In general, this is achieved according to this invention by using the sensor data to construct characterization tables for the vehicle, and by applying various masks to the tables for the purpose of classifying the crash event and restraint status, and deciding whether one or more of the restraints 12, 14, 16, 18, 19, 20 should be deployed based on the determined classification status. Three tables are described: a crash classification table based on sensed crash severity, an intrusion table based on sensed intrusion in a crash event, and an occupant classification table based on occupant sensor data. In a preferred embodiment, the classifications determined from the crash classification and intrusion tables are combined in a logical OR function, and the result is combined with a restraint status determined from the occupant classification table in a logical AND function to determine which restraints should be deployed. Thus, Appellants' crash classification mask is a unique binary number which is used in a logical operation to combine with the sensor data to arrive at a restraint deployment code. Returning to Hermann, we note that Hermann teaches "all of the acceleration signals or signals derived from them are evaluated in the evaluation device, for example by being compared with a threshold value or processed algorithmically. When the threshold is exceeded or a triggering criterion is fulfilled during the algorithmic processing, the respective protection device is triggered." See Hermann, column 7, lines 50-56. In 11Page: Previous 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 NextLast modified: November 3, 2007