-
公开(公告)号:US20180321865A1
公开(公告)日:2018-11-08
申请号:US15589581
申请日:2017-05-08
Applicant: QUALCOMM Incorporated
Inventor: Gabriel Allen WATKINS , Albert Chee-Ming CHEUNG , Leonard WIDRA , Venkateshwar JUNNUTHULLA , Selvaraj JAIKUMAR , Mahesh Dandapani IYER , Eugen PIRVU , Chad KARAGINIDES
IPC: G06F3/06
CPC classification number: G06F3/0632 , G06F1/3206 , G06F1/3228 , G06F1/3275 , G06F3/0625 , G06F3/0634 , G06F3/0673
Abstract: Certain aspects of the present disclosure provide apparatus and techniques for configuring memory in an effort to reduce power consumption. For example, certain aspects of the present disclosure may provide an apparatus having a processing system configured to determine an operating mode of an application executing on the processing system. The operating mode may be one of a plurality of operating modes of the application, and each operating mode of the plurality of operating modes may correspond to a different configuration of memory. In certain aspects, the configurations of memory may correspond to different portions of memory that are active or inactive. In certain aspects, the apparatus may also include a memory control module configured to configure the memory based on the determined operating mode of the application.
-
公开(公告)号:US20180253556A1
公开(公告)日:2018-09-06
申请号:US15485561
申请日:2017-04-12
Applicant: QUALCOMM Incorporated
Inventor: Chad KARAGINIDES , Dhaval PATEL , Dhamim PACKER ALI , Selvaraj JAIKUMAR , Venkateshwar JUNNUTHULLA
CPC classification number: G06F21/575 , G06F1/3275 , G06F1/3287 , G06F9/4401 , G06F9/445 , G06F21/44 , G06F21/572 , G06F21/81 , G06F2221/2105
Abstract: Techniques for operating a computing device in one or more power modes are provided. An example method for operating a computing device according to these techniques includes determining whether a threshold condition for exiting a first power mode has been satisfied, identifying one or more segments of a volatile memory that were powered down while the computing device was operating in the first power mode responsive to the threshold condition being satisfied, identifying one or more segments of software that were stored in the one or more segments of the volatile memory that were powered down, restoring, from a non-volatile memory, the one or more segments of the software to the one or more segments of the volatile memory that were powered down, and authenticating the one or more segments of the software.
-