-
1.
公开(公告)号:US20200257650A1
公开(公告)日:2020-08-13
申请号:US16836982
申请日:2020-04-01
Applicant: QUALCOMM Incorporated
Inventor: Dhamim PACKER ALI , Sreenivasulu Reddy CHALAMCHARLA , Ruchi PAREKH , Daison DAVIS KOOLA , Dhaval PATEL , Eric TASESKI , Yanru LI , Alexander GANTMAN
IPC: G06F15/177 , G06F9/4401 , G06F21/57 , G06F15/76 , G06F9/445 , G06F30/30 , G06F1/3293 , G06F1/3234 , G06F1/324 , G05B13/02
Abstract: Various additional and alternative aspects are described herein. In some aspects, the present disclosure provides a method of calibrating a component. The method includes receiving previous calibration parameters for an external component at a secondary SoC from a primary SoC, wherein the secondary SoC is coupled to the external component and configured to calibrate the external component. The method further includes determining validity of the previous calibration parameters by the secondary SoC. The method further includes operating the external component by the secondary SoC based on the determined validity of the previous calibration parameters.
-
2.
公开(公告)号:US20180293204A1
公开(公告)日:2018-10-11
申请号:US15682296
申请日:2017-08-21
Applicant: QUALCOMM Incorporated
Inventor: Dhamim PACKER ALI , Sreenivasulu Reddy CHALAMCHARLA , Ruchi PAREKH , Daison DAVIS KOOLA , Dhaval PATEL , Eric TASESKI , Yanru LI , Alexander GANTMAN
Abstract: Various additional and alternative aspects are described herein. In some aspects, the present disclosure provides a method of calibrating a component. The method includes receiving previous calibration parameters for an external component at a secondary SoC from a primary SoC, wherein the secondary SoC is coupled to the external component and configured to calibrate the external component. The method further includes determining validity of the previous calibration parameters by the secondary SoC. The method further includes operating the external component by the secondary SoC based on the determined validity of the previous calibration parameters.
-
公开(公告)号:US20180330095A1
公开(公告)日:2018-11-15
申请号:US15631575
申请日:2017-06-23
Applicant: QUALCOMM Incorporated
Inventor: Dhamim PACKER ALI , Dhaval PATEL , Justin Yongjin KIM , Maria MIRANDA , Cory David FEITELSON , Eric TASESKI
CPC classification number: G06F21/575 , G06F8/65 , G06F15/76 , G06F15/781 , G06F21/44 , G06F21/51 , G06F21/572 , G06F21/64 , G06F2221/033 , H04L9/0643 , H04L9/0891 , H04L9/3236 , H04L9/3247 , H04L2209/12
Abstract: Various additional and alternative aspects are described herein. In some aspects, the present disclosure provides a method of authenticating executable images in a system-on-chip (SoC), the method comprising: storing a plurality of executable images; storing, as separate from the plurality of executable images, a signed image of hashes comprising a plurality of hashes corresponding to the plurality of executable images and a first signature; authenticating the signed image of hashes based on the first signature; and using a first hash of the plurality of hashes to authenticate a first executable image of the plurality of executable images when the signed image of hashes passes authentication.
-
公开(公告)号:US20180253556A1
公开(公告)日:2018-09-06
申请号:US15485561
申请日:2017-04-12
Applicant: QUALCOMM Incorporated
Inventor: Chad KARAGINIDES , Dhaval PATEL , Dhamim PACKER ALI , Selvaraj JAIKUMAR , Venkateshwar JUNNUTHULLA
CPC classification number: G06F21/575 , G06F1/3275 , G06F1/3287 , G06F9/4401 , G06F9/445 , G06F21/44 , G06F21/572 , G06F21/81 , G06F2221/2105
Abstract: Techniques for operating a computing device in one or more power modes are provided. An example method for operating a computing device according to these techniques includes determining whether a threshold condition for exiting a first power mode has been satisfied, identifying one or more segments of a volatile memory that were powered down while the computing device was operating in the first power mode responsive to the threshold condition being satisfied, identifying one or more segments of software that were stored in the one or more segments of the volatile memory that were powered down, restoring, from a non-volatile memory, the one or more segments of the software to the one or more segments of the volatile memory that were powered down, and authenticating the one or more segments of the software.
-
-
-