摘要:
A method and computer program capable of providing a plurality of activation areas in a display, the display having a plurality of selectable objects surrounded by an object area which defines the boundaries of the selectable objects which must be contacted by a pointing device for selection. The activation areas surround the selectable objects and expand the boundary of the selectable objects which must be contacted by the pointing device for selection. The size of the activation areas is determined by an expansion boundary having a border that outlines the size and shape of the activation areas and enlarges the activation areas to a maximum size without overlapping.
摘要:
The manufacture of an integrated circuit chip includes testing the integrated circuit while an external electric field is applied to the integrated circuit to facilitate detection of open circuit type defects. The electric field may be provided by applying a high potential to a plate parallel to a plane of the integrated circuit or by applying a high potential to a probe and moving the probe across the surface of the integrated circuit chip to obtain information regarding the location of the defect. Use of a probe type electric field generator allows the approximate position of the defect to be determined. The invention enhances current testing and diagnostics methods for wafers, chips, and integrated circuit packages by allowing detection of floating net defects during other conventional tests.
摘要:
A method of effectively reducing a length of shift register (SR) latches used in scan design testing for testing macro structures embedded within very large logic structures eliminates tester hardware buffer limitations required to load and unload a long chain SR. A plurality of shift register latches are connectable in a chain for scan design testing. Each shift register latch is composed of an L1 and an L2 latch receiving A and B clocks, respectively, to shift data into and out of the shift register latch. First specific shift register latches in a chain of shift register latches are used to generate test data inputs to an embedded macro structure, second specific shift register latches in the chain of shift register latches are used to receive test data outputs from the embedded macro structure. A separate B' clock is applied to the L2 latches of the first and second specific shift register latches while maintaining the B clock for the L2 latches for other shift register latches in the chain. The B' clock is similar to the B clock but displaced in time. The chain of shift register latches is flushed prior to a load operation of data for testing the embedded macro structure by simultaneously pulsing the A and B clocks. Then the embedded macro structure is loaded from the L2 latches of the first specific shift register latches with the L1 latches of the second specific shift register latches being loaded from the embedded macro structure by pulsing the B' clock to produce a scan cycle for the embedded macro structure.
摘要:
A rules driven multiple passwords system is provided wherein a list of stored passwords are used in rotation over time in accordance with a set of rules or conditions managed by the system. With such an arrangement, the currently active password of a system User may automatically be changed, in accordance with the rules or conditions, to the next password in the list. The User is notified as to the newly assigned password.
摘要:
A system and method of determining likelihood of counterfeiting without inspection of currency compares signals returned by uniquely customized RFID chips when interrogated, preferably incident to a transaction. The RFID information is compared to RFID information for bills known to be in circulation in order to validate a given currency bill. Usage patterns can be determined from statistical analysis of such reports and reported usage patterns will statistically differ significantly if not radically with the number of RFID chips returning the same RFID information and such differences will increase in either or both of geographic locations of reports and frequency of reports with increase of the number of bills having duplicated RFID chips. The basic infrastructure for practice of the invention is also capable of tracking genuine currency following, for example, a theft or other criminal activity.
摘要:
A method of implementing dynamic pseudorandom keyboard remapping of a system including a keyboard in communication with an operating system of a computing device includes encrypting an original keyboard scan code corresponding to each of a plurality of keyboard keys, using a mapping algorithm, wherein the mapping algorithm encrypts the original keyboard scan code by using both the original keyboard scan code and a current one of a sequence of pseudorandom numbers generated using a pseudorandom number generator (PRNG) algorithm and an initial seed value; and decrypting the original keyboard scan code based on an encrypted scan code generated and transmitted from the keyboard to the operating, responsive to a keystroke of the keyboard, wherein the operating system also uses the mapping algorithm, the PRNG algorithm, and the initial seed value.
摘要:
A system for implementing dynamic pseudorandom keyboard remapping includes a keyboard in communication with an operating system of a computing device; the keyboard configured to encrypt an original keyboard scan code corresponding to each of a plurality of keyboard keys, using a mapping algorithm, wherein the mapping algorithm encrypts the original keyboard scan code by using both the original keyboard scan code and a current one of a sequence of pseudorandom numbers generated using a pseudorandom number generator (PRNG) algorithm and an initial seed value; and the operating system configured to decrypt the original keyboard scan code based on an encrypted scan code generated and transmitted from the keyboard thereto, responsive to a keystroke of the keyboard, wherein the operating system also uses the mapping algorithm, the PRNG algorithm, and the initial seed value.
摘要:
Exemplary embodiments include a sequential and concurrent status detection and evaluation method for multiple processor cores, including receiving data from a plurality of processor cores, for each of the plurality of processor cores, simultaneously running a built-in self test to determine if each of the plurality of cores has failed, checking the data for a dominant logic state and recording a subset of the plurality of processor cores that have failed.
摘要:
A method of testing an integrated circuit. The method includes selecting a set of physical features of nets and devices of the integrated circuit, the integrated circuit having pattern input points and pattern observation points connected by the nets, each of the nets defined by an input point and all fan out paths to (i) input points of other nets of the nets or (ii) to the pattern observation points; selecting a measurement unit for each feature of the set of features; assigning a weight to each segment of each fan out path based on a number of the measurement units of the feature in each segment of each fan out path of each of the nets; and generating a set of test patterns optimized for test-coverage and cost based on the weights assigned to each segment of each of the nets of the integrated circuit.
摘要:
A computer random access memory is divided into first and second partitions. Each partition has its own operating system (OS). The first partition has a conventional OS and is designated for non-Internet use. The second partition is designated for secure Internet access, and has an OS specific for Internet usage. Software in the second partition cannot write or copy files in the second partition. The size of the second partition is fixed and unchangeable while said second partition is open. Each software application in the second partition is allocated a memory region that cannot be changed, thereby preventing memory overflow attacks. A secure memory is designated for temporary storage of software used in the second partition. Cyclic redundancy check (CRC) values are calculated for all files in the secure memory. To detect unauthorized file changes, CRC values are calculated for all files used in the second partition, and checked against values stored in the secure memory. The second partition can write only to a secure memory using a security arrangement such as password protection or a download memory separate from the first partition to allow files stored in the download memory to be examined by scanning and testing from the first partition prior to being stored elsewhere in the computer.