Abstract:
An audio pipeline for audio distribution on a system on a chip platform is described. In one example, a method includes adding an audio input to a hardware audio module using a pipeline manager coupled to an operating system running on a processor, connecting the audio input to an audio source, adding an audio output to the hardware audio module, and connecting the audio output to an audio sink using the pipeline manager.
Abstract:
An apparatus may include an accelerator and a processor. The processor may receive an input string targeting a data buffer comprising a plurality of strings. The processor may receive, from the accelerator, a fixed-length data buffer based on the data buffer, respective ones of a plurality of entries of the fixed-length data buffer based on respective ones of the strings. The processor may receive, from the accelerator, a plurality of streams, respective ones of the plurality of streams to comprise a portion of respective entries in the fixed-length data buffer. The processor may generate, based on the input string, a plurality of target portions of the input string. The processor may receive, from the accelerator, indexes of the plurality of streams based on respective target portions of the input string matching respective entries of the plurality of streams. The processor may aggregate the indexes received from the accelerator.
Abstract:
In a method for protecting electronic data, a data processing system (20, 20A, 20B) uses (a) a master electrocardiogram (ECG) identifier (44) for an authorized user of the system and (b) a secret chip key (26) for the system to encrypt data in the system. Also, before allowing the encrypted data to be decrypted, the system collects an ECG reading for a current user of the system and uses (a) the collected ECG reading for the current user and (b) at least one predetermined ECG identifier (EID) vector for the authorized user to determine whether the current user is the authorized user. In response to determining that the current user is the authorized user, the system uses the master ECG identifier (44) for the authorized user and the secret chip key (26) for the system to decrypt the data.
Abstract:
In one example an application processor comprises a memory and a virtual sensor hub coupled to the memory and comprising a plurality of sensor drivers and a sensor fusion driver communicatively coupled to the plurality of sensor drivers, wherein the sensor fusion driver receives inputs from the plurality of sensor drivers and processes the data to generate sensor data. Other examples may be described.