-
公开(公告)号:US10127063B2
公开(公告)日:2018-11-13
申请号:US15635174
申请日:2017-06-27
Applicant: Samsung Electronics Co., Ltd.
Inventor: Chang-Eun Choi , Bin Lu , Yang Yu , Karnik Shah , Hingkwan Huen
Abstract: An embodiment includes a system, comprising: a device configured to present a logical device and enable a virtual device in response to a control signal; and a processor coupled to the device and configured to: present the logical device through a first device interface; transmit the control signal to the device to enable the virtual device; and after the virtual device is enabled, present the virtual device through a second device interface.
-
公开(公告)号:US10146627B2
公开(公告)日:2018-12-04
申请号:US15726375
申请日:2017-10-05
Applicant: Samsung Electronics Co., Ltd.
Inventor: Yang Yu , Chang-Eun Choi , Kyung Ho Kim , Walter Jun , Wonchuri Zoo , Robert Brennan
Abstract: Embodiments of the inventive concept include computer-implemented method for shadowing one or more boot images of a mobile device. The technique can include duplicating boot images to shadow partitions in a user area of a non-volatile memory device such as a flash memory. The technique can include detecting boot image corruption, and causing a mobile device to boot from the shadow partitions. The technique can include dynamically shadowing and releasing blocks used by the shadow partitions. The technique can include boot failure recovery and bad image preservation through firmware flash translation layer (FTL) logical to physical mapping updates. Boot image corruption failures can be recovered from and/or debugged using the shadow partitions.
-
公开(公告)号:US09823972B2
公开(公告)日:2017-11-21
申请号:US14663220
申请日:2015-03-19
Applicant: Samsung Electronics Co., Ltd.
Inventor: Yang Yu , Chang-Eun Choi , Kyung Ho Kim , Walter Jun , Wonchuri Zoo , Robert Brennan
CPC classification number: G06F11/1417 , G06F11/1004 , G06F11/1666 , G06F11/20
Abstract: Embodiments of the inventive concept include computer-implemented method for shadowing one or more boot images of a mobile device. The technique can include duplicating boot images to shadow partitions in a user area of a non-volatile memory device such as a flash memory. The technique can include detecting boot image corruption, and causing a mobile device to boot from the shadow partitions. The technique can include dynamically shadowing and releasing blocks used by the shadow partitions. The technique can include boot failure recovery and bad image preservation through firmware flash translation layer (FTL) logical to physical mapping updates. Boot image corruption failures can be recovered from and/or debugged using the shadow partitions.
-
-