会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 33. 发明申请
    • METHOD AND APPARATUS FOR DRAM SPATIAL COALESCING WITHIN A SINGLE CHANNEL
    • 用于单个通道中的DRAM空间分析的方法和装置
    • WO2015100038A1
    • 2015-07-02
    • PCT/US2014/070123
    • 2014-12-12
    • QUALCOMM INCORPORATED
    • CHUN, Dexter TamioLO, Haw-JingDROP, Michael
    • G06F1/32G11C7/10
    • G06F12/06G06F1/3225G06F1/3275G06F13/1673Y02D10/13Y02D10/14Y02D50/20
    • Aspects include computing devices, systems, and methods for reorganizing the storage of data in memory to energize less than all of the memory devices of a memory module for read or write transactions. The memory devices may be connected to individual select lines such that a re-order logic may determine the memory devices to energize for a transaction according to a re-ordered memory map. The re-order logic may re-order memory addresses such that memory address provided by a processor for a transaction are converted to the re-ordered memory address according to the re-ordered memory map without the processor having to change its memory address scheme. The re-ordered memory map may provide for reduced energy consumption by the memory devices, or a balance of energy consumption and performance speed for latency tolerant processes.
    • 方面包括用于重新组织存储器中的数据存储器的计算设备,系统和方法,以激励小于用于读取或写入事务的存储器模块的所有存储器设备。 存储器件可以连接到单独的选择线,使得重新排序逻辑可以根据重新排序的存储器映射来确定存储器件激活事务。 重新排序逻辑可以重新排序存储器地址,使得由处理器为交易提供的存储器地址根据重新排序的存储器映射被转换为重新排序的存储器地址,而处理器不必改变其存储器地址方案。 重新排序的存储器映射可以提供由存储器件减少的能量消耗,或等待容忍过程的能量消耗和性能速度的平衡。
    • 35. 发明申请
    • PRE-IDENTIFYING PROBABLE MALICIOUS ROOTKIT BEHAVIOR USING BEHAVIORAL CONTRACTS
    • 使用行为合同预先识别可疑的恶性循环行为
    • WO2015080871A1
    • 2015-06-04
    • PCT/US2014/065528
    • 2014-11-13
    • QUALCOMM INCORPORATED
    • FIALA, DavidCHRISTODORESCU, MihaiSRIDHARA, VinayGUPTA, RajarshiFAWAZ, Kassem
    • G06F21/56
    • G06F21/56G06F21/566
    • The various aspects provide for a computing device and methods implemented by the device to ensure that an application executing on the device and seeking root access will not cause malicious behavior while after receiving root access. Before giving the application root access, the computing device may identify operations the application intends to execute while having root access, determine whether executing the operations will cause malicious behavior by simulating execution of the operations, and pre-approve those operations after determining that executing those operations will not result in malicious behavior. Further, after giving the application root access, the computing device may only allow the application to perform pre-approved operations by quickly checking the application's pending operations against the pre-approved operations before allowing the application to perform those operations. Thus, the various aspects may ensure that an application receives root access without compromising the performance or security integrity of the computing device.
    • 各种方面提供了一种计算设备和由设备实现的方法,以确保在接收根访问之后在设备上执行并寻求root访问的应用不会引起恶意行为。 在给予应用程序根访问之前,计算设备可以识别应用程序在具有root访问的同时执行的操作,确定执行操作是否会通过模拟操作的执行而导致恶意行为,并且在确定执行这些操作之后预先批准这些操作 操作不会导致恶意行为。 此外,在给予应用程序根访问之后,计算设备可以仅允许应用程序通过在允许应用程序执行这些操作之前快速检查应用程序针对预先批准的操作的待处理操作来执行预先批准的操作。 因此,各个方面可以确保应用程序接收根访问,而不会影响计算设备的性能或安全完整性。
    • 36. 发明申请
    • MANEUVER PROCESSING
    • MANEUVER加工
    • WO2015080833A1
    • 2015-06-04
    • PCT/US2014/063418
    • 2014-10-31
    • ANALYTICAL GRAPHICS INC.
    • BERRY, Matthew M.CATHER, Douglas E.
    • G01S19/21
    • B64G1/24B64G3/00G01C21/24G01S5/0294G05D1/0883
    • A computing device may detect that a space object has undergone a maneuver and may attempt to calculate a solution to that maneuver based in part on start and stop times and thrust uncertainties associated with the detected maneuver. However, the computing device may sometimes be unable to calculate an acceptable solution for a detected maneuver given these initial start and stop times and thrust uncertainties. Thus, the various embodiments provide for a computing device and methods implemented by a processor executing on the device for identifying and calculating a recovery maneuver of a space object when an acceptable solution for a detected maneuver cannot be determined. In the various embodiments, a computing device processor may generate a recovery maneuver based on the detected maneuver, and the processor may adjust the start and stop times and the uncertainty values of the recovery maneuver until an acceptable solution is found.
    • 计算设备可以检测空间物体已经经历了机动,并且可以部分地基于与检测到的机动相关联的起始和停止时间和推力不确定性来尝试计算该操纵的解。 然而,考虑到这些初始停止时间和推力不确定性,计算设备有时可能无法为检测到的机动计算可接受的解决方案。 因此,各种实施例提供了一种计算设备和由在设备上执行的处理器实现的方法,用于在无法确定检测到的机动的可接受的解决方案时识别和计算空间物体的恢复操作。 在各种实施例中,计算设备处理器可以基于检测到的机动来生成恢复操作,并且处理器可以调整恢复操作的开始和停止时间以及不确定性值,直到找到可接受的解决方案。
    • 37. 发明申请
    • USING SENSOR DATA TO PROVIDE INFORMATION FOR PROXIMALLY-RELEVANT GROUP COMMUNICATIONS
    • 使用传感器数据提供临时相关组通信的信息
    • WO2015077129A1
    • 2015-05-28
    • PCT/US2014/065535
    • 2014-11-13
    • QUALCOMM INCORPORATED
    • SURYAVANSHI, Vijay AnandraoMAGGENTI, MarkSHARMA, SandeepSHUMAN, Mohammed Ataur Rahman
    • H04L29/08G01S5/02H04W12/10
    • H04W4/08G01S5/0284H04L63/104H04L67/125H04W4/027H04W4/80H04W12/06H04W12/08H04W12/10H04W48/16H04W64/006
    • Methods, devices, and systems for a mobile device to perform actions associated with applications when confirmed to be within proximity of a physical location relevant to the applications, including identifying a unique identifier of a proximate wireless network access point, determining whether the unique identifier matches a predefined identifier stored on the mobile device and associated with an application, obtaining sensor data via a sensor in response to determining that the unique identifier matches the predefined identifier, processing the obtained sensor data to identify encoded information, determining whether the encoded information within the obtained sensor data is associated with the unique identifier, and performing an action based on the encoded information in response to determining that the encoded information is associated with the unique identifier. In various embodiments, the unique identifier may be a service set identifier (SSID), and the sensor data may be acoustic signals emitted from a speaker.
    • 移动设备的方法,设备和系统当被确认为在与应用相关的物理位置附近时执行与应用相关联的动作,包括识别邻近无线网络接入点的唯一标识符,确定唯一标识符是否匹配 存储在所述移动设备上并与应用相关联的预定标识符,响应于确定所述唯一标识符与所述预定标识符相匹配,经由传感器获取传感器数据,处理所获得的传感器数据以识别编码信息,确定所述编码信息是否在 获得的传感器数据与唯一标识符相关联,并且响应于确定编码信息与唯一标识符相关联,基于编码信息执行动作。 在各种实施例中,唯一标识符可以是服务集标识符(SSID),并且传感器数据可以是从扬声器发射的声信号。
    • 38. 发明申请
    • SECURE, FAST AND NORMAL VIRTUAL INTERRUPT DIRECT ASSIGNMENT IN A VIRTUALIZED INTERRUPT CONTROLLER IN A MOBILE SYSTEM-ON-CHIP
    • 在移动系统中的虚拟中断控制器中的安全,快速和正常的虚拟中断直接分配
    • WO2015069600A1
    • 2015-05-14
    • PCT/US2014/063746
    • 2014-11-03
    • QUALCOMM INCORPORATED
    • ZENG, ThomasASBE, SamarTOUZNI, Azzedine
    • G06F9/455G06F9/48
    • G06F13/26G06F9/45533G06F9/45558G06F9/4812G06F13/24G06F2009/45579
    • Aspects include apparatuses and methods for secure, fast and normal virtual interrupt direct assignment managing secure and non-secure, virtual and physical interrupts by processor having a plurality of execution environments, including a trusted (secure) and a non-secure execution environment. An interrupt controller may identify a security group value for an interrupt and direct secure interrupts to the trusted execution environment. The interrupt controller may identify a direct assignment value for the non-secure interrupts indicating whether the non-secure interrupt is owned by a high level operating system (HLOS) Guest or a virtual machine manager (VMM), and whether it is a fast or a normal virtual interrupt. The interrupt controller may direct the HLOS Guest owned interrupt to the HLOS Guest while bypassing the VMM. When the HLOS Guest in unavailable, the interrupt may be directed to the VMM to attempt to pass the interrupt to the HLOS Guest until successful.
    • 方面包括用于安全,快速和正常的虚拟中断直接分配的装置和方法,其通过包括可信(安全)和非安全执行环境的多个执行环境的处理器管理安全和非安全的虚拟和物理中断。 中断控制器可以识别中断的安全组值,并将可靠执行环境直接安全中断。 中断控制器可以识别非安全中断的直接分配值,指示非安全中断是由高级操作系统(HLOS)来宾还是虚拟机管理器(VMM)拥有,以及它是快速还是快速 一个正常的虚拟中断。 在绕过VMM时,中断控制器可以将HLOS Guest拥有的中断指向HLOS Guest。 当HLOS访客不可用时,中断可能被定向到VMM,以尝试将中断传递给HLOS访客,直到成功。
    • 40. 发明申请
    • MULTI-CORE HETEROGENEOUS SYSTEM TRANSLATION LOOKASIDE BUFFER COHERENCY
    • 多核异构系统翻译LOOKASIDE BUFFER COHERENCY
    • WO2015050726A1
    • 2015-04-09
    • PCT/US2014/056664
    • 2014-09-19
    • QUALCOMM INCORPORATED
    • SHEN, JianCHUA-EOAN, Lew, Go
    • G06F12/10
    • G06F12/1027G06F12/1009G06F12/1036G06F2212/656G06F2212/683
    • Methods, devices, and instructions for performing a reverse translation lookaside buffer (TLB) look-up using a physical address input, including obtaining with a first processor the physical address input, wherein the physical address input indicates a physical address corresponding to a shared memory, obtaining a first mask associated with a first virtual address from a first TLB entry within a TLB associated with the first processor, wherein the obtained first mask is a bit pattern, obtaining from the first TLB entry a first page frame number associated with the shared memory, applying the obtained first mask to the obtained first page frame number to generate a first value, applying the obtained first mask to the obtained physical address input to generate a second value, and comparing the first value and the second value to determine whether the first value and the second value match.
    • 用于使用物理地址输入来执行反向翻译后备缓冲器(TLB)查找的方法,设备和指令,包括用第一处理器获取物理地址输入,其中物理地址输入指示对应于共享存储器的物理地址 从与所述第一处理器相关联的TLB内的第一TLB条目获得与第一虚拟地址相关联的第一掩码,其中所获得的第一掩码是位模式,从所述第一TLB条目获得与所述共享信息相关联的第一页框号 存储器,将所获得的第一掩模应用于获得的第一页帧号以产生第一值,将获得的第一掩码应用于获得的物理地址输入以产生第二值,并且比较第一值和第二值以确定是否 第一个值和第二个值匹配。