Application processors and memory architecture for wireless applications
First Claim
Patent Images
1. A method for accessing memory, the method comprising:
- sending memory transactions to a memory sub-system for a first processor to an intermediate second processor interposed on a communication path between the first processor and the memory sub-system; and
controlling when the memory transactions are allowed to pass through the second processor to reach the memory sub-system.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, the invention provides a method for accessing memory. The method comprises sending memory transactions to a memory sub-system for a first processor to an intermediate second processor interposed on a communication path between the first processor and the memory sub-system; and controlling when the memory transactions are allowed to pass through the second processor to reach the memory sub-system.
64 Citations
27 Claims
-
1. A method for accessing memory, the method comprising:
-
sending memory transactions to a memory sub-system for a first processor to an intermediate second processor interposed on a communication path between the first processor and the memory sub-system; and
controlling when the memory transactions are allowed to pass through the second processor to reach the memory sub-system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system, comprising:
-
a first processor;
a memory sub-system;
a communications path between the first processor and the memory sub-system to allow the first processor to access the memory sub-system; and
a second processor interposed between the first processor and the memory sub-system and defining an intermediate point in the communications path, the second processor including a memory controller to control access to the memory sub-system by the first and second processors. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27)
-
Specification