External memory data integrity validation

    公开(公告)号:US11861179B2

    公开(公告)日:2024-01-02

    申请号:US17527865

    申请日:2021-11-16

    CPC classification number: G06F3/0619 G06F3/0655

    Abstract: In some examples, a method includes determining, during a boot sequence of a controller, a hash value for data of a block of a flash storage device, the block including executable code, determining a bit pattern based on a randomly generated number, extracting a subset of data bits of the hash value according to the bit pattern to obtain a snippet, and storing the snippet to a secure storage device.

    METHODS TO IMPROVE CONNECTIONLESS RECEPTION WINDOW WIDENING

    公开(公告)号:US20230292264A1

    公开(公告)日:2023-09-14

    申请号:US18321259

    申请日:2023-05-22

    CPC classification number: H04W56/001 H04W4/80

    Abstract: An example apparatus includes: a memory; instructions in the apparatus; and a Bluetooth controller to execute the instructions to: enable circuitry to receive a synchronized transmission; determine if a synchronized transmission is received during a first duration; increment the first duration to a second duration as a result of not receiving the synchronized transmission during the first duration; and determine a third duration based on a determined difference in time between enabling circuitry to receive a synchronized transmission and receiving the synchronized transmission.

    Transmission control protocol (TCP) acknowledgement (ACK) packet suppression

    公开(公告)号:US11522979B2

    公开(公告)日:2022-12-06

    申请号:US17329919

    申请日:2021-05-25

    Abstract: Systems and methods for Transmission Control Protocol (TCP) acknowledgement (ACK) packet suppression are described. In various implementations, these systems and methods may be applicable to low-power communications. For example, a method may include receive a transport packet at a transport layer; de-encapsulating the transport packet using a transport protocol to identify a security packet; communicating the security packet to a security layer by the transport layer; communicating an acknowledgement signal to the transport layer from the security layer in response to receiving the security packet; suppressing an acknowledgement packet at the transport layer in response to receiving the acknowledgement signal; adding an acknowledgment indication to a next data packet to be sent after the suppress action; and sending the next data packet.

    SELECTIVE POWER REDUCTION TO MITIGATE BAND INTERFERENCE
    15.
    发明申请
    SELECTIVE POWER REDUCTION TO MITIGATE BAND INTERFERENCE 审中-公开
    选择性功率减少以减轻带干扰

    公开(公告)号:US20150133180A1

    公开(公告)日:2015-05-14

    申请号:US14599830

    申请日:2015-01-19

    CPC classification number: H04W52/243 H04B1/1036 H04W52/42

    Abstract: A method includes transmitting a first set of transmission signals over an operating frequency band. The method includes detecting if a second set of transmission signals are transmitted adjacent the operating frequency band and reducing power to a subset of the first set of transmission signals when the second set of transmission signals are detected.

    Abstract translation: 一种方法包括在工作频带上传输第一组传输信号。 该方法包括:当检测到第二组传输信号时,检测第二组传输信号是否在工作频带附近传输,并将功率降低到第一组传输信号的子集。

    BINARY CONVOLUTION INSTRUCTIONS FOR BINARY NEURAL NETWORK COMPUTATIONS

    公开(公告)号:US20250004762A1

    公开(公告)日:2025-01-02

    申请号:US18344091

    申请日:2023-06-29

    Abstract: A system for accelerating binary convolution operations of a neural network includes a set of destination registers, binary convolution circuitry, a decoder coupled to the binary convolution circuitry, and instruction fetch circuitry coupled to the decoder and configured to fetch a binary convolution instruction from an associated memory. The binary convolution instruction specifies input data, weight data, and the set of destination registers for performing a binary convolution operation. The decoder receives the binary convolution instruction from the instruction fetch circuitry and causes the input data and the weight data to be provided to the binary convolution circuitry. In response, the binary convolution circuitry performs the binary convolution operation on the input data and the weight data to produce output data and stores the output data in the set of destination registers.

    HARDWARE SYSTEM FOR AUTOMATIC DIRECT MEMORY ACCESS DATA FORMATTING

    公开(公告)号:US20230112720A1

    公开(公告)日:2023-04-13

    申请号:US17499522

    申请日:2021-10-12

    Abstract: A hardware direct memory access controller including an input port configured to receive data from an electronic device for direct memory access transfer, an output port configured to provide data for direct memory access, and processing circuitry is disclosed. The processing circuitry is configured to receive data comprising a header and payload from the electronic device via the input port, parse the header to determine data parameters including a transaction length and an input data format, and select a target destination for the data based at least in part on the data parameters. The processing circuitry is also configured to allocate memory within the target destination based at least in part on the transaction length, and to format the payload for direct memory access based at least in part on the data parameters, and to transfer the formatted payload for storage within the allocated memory within the target destination via the output port using direct memory access.

    LTE TRANSMISSION MASK ADJUSTMENT TO MAXIMIZE PERFORMANCE AND REDUCE INTERFERENCE

    公开(公告)号:US20220112771A1

    公开(公告)日:2022-04-14

    申请号:US17556289

    申请日:2021-12-20

    Abstract: System and methods for using channel quality reports to reduce inter-band interference are disclosed. Channel information is received at a first wireless communication device from a second wireless communication device. The first wireless device is operating in a first frequency range, and the second wireless device is operating in a second frequency range. The first frequency range is adjacent to the second frequency range. A channel quality report is generated at the first wireless communication device. The channel quality report indicates that particular sub-bands in the first frequency range have low channel quality. The particular sub-bands are selected using the channel information.

    Power saving medium access in congested network environments

    公开(公告)号:US11178566B2

    公开(公告)日:2021-11-16

    申请号:US15816731

    申请日:2017-11-17

    Abstract: A Wi-Fi device in a WLAN network includes a processor and a transceiver adapted to be coupled to an antenna, and a power saving medium access in congested network environments algorithm that is activated after a Wi-Fi connection is established with its access point (AP). A Traffic Indication Map (TIM) bitmap in a TIM information element received in a beacon frame from the AP is analyzed to determine whether more than a predetermined number of bits (X) are set to indicate the AP has ≥1 buffered frame for ones of the Wi-Fi devices to conclude whether the WLAN is in a congested environment. When in a congested environment, transmissions responsive to the beacon are postponed by entering a sleep mode for a random period of time (P). After P expires, the sleep mode is exited and a poll frame is transmitted to the AP to try to gain medium access.

    Transmission control protocol (TCP) acknowledgement (ACK) packet suppression

    公开(公告)号:US11050857B2

    公开(公告)日:2021-06-29

    申请号:US14333751

    申请日:2014-07-17

    Abstract: Systems and methods for Transmission Control Protocol (TCP) acknowledgement (ACK) packet suppression are described. In various implementations, these systems and methods may be applicable to low-power communications. For example, a method may include receive an incoming TCP packet at a TCP layer implemented by the communication system; de-encapsulating the incoming TCP packet using a TCP protocol to identify an incoming Secure Sockets Layer (SSL) or Transport Layer Security (TLS) packet; passing the incoming SSL or TLS packet from the TCP layer to an SSL or TLS layer; and signaling, by the SSL or TLS layer to the TCP layer in response to the SSL or TLS layer having received the incoming SSL or TLS packet, that a TCP acknowledgement be suppressed by the TCP layer.

Patent Agency Ranking