Abstract:
A wireless multi-carrier communication system having designated control sub-channels (402) that enable a receiving device (106) to operate in a low power decoding mode. A sending device (104) may send control or payload information via the control sub-channels. The receiving device (106) operates in a low-power decoding mode to decode the control sub-channels, yielding the control or payload information. If the sending device has payload information directed to the receiving device that can not fit within the control sub-channels, it sends the information to the receiving device in one or more payload sub-channels (404). The receiving device operates in a second, generally higher power decoding mode to decode the payload sub-channels, yielding the payload information.
Abstract:
Method for securing encryption keys for encrypting software while providing for secure updates of the key for other or updated versions of the software. A First Encryption Key which is used to encrypt an initial software version includes a FIRST SPLIT portion and a TOKEN portion. The FIRST SPLIT portion can be stored in an anti-tamper storage memory of a hardware product and the TOKEN can be stored in external storage medium so that the FIRST SPLIT and the TOKEN are separately provided to separate personnel of the user while the identity of the First Encryption Key is kept secure by remaining in custody of the provider. The user employs the hardware to combine the FIRST SPLIT and TOKEN to generate the First Encryption Key within the hardware to decrypt the encrypted software. To facilitate updates the provider combines the First Encryption Key with a Second Encryption Key to generate an UPDATE SPLIT for updated software which is encrypted with the Second Encryption Key. The UPDATE SPLIT and encrypted updated software are provided to the user who employs the hardware to calculate the Second Encryption Key from the FIRST SPLIT, UPDATE SPLIT and the TOKEN. This allows the identity of the Second Encryption Key to also remain secure in the custody of the provider. The Second Encryption Key which can be sequential or non-sequential with the First Encryption Key, is used within the hardware product to decrypt the encrypted updated software.
Abstract:
An apparatus and method that optimizes the data rate for forward link data transmissions in a spread-spectrum communications system 106 is provided. The spread-spectrum communications system 106 comprises a wireless infrastructure 103, at least one wireless mobile receiving device 105, and an radio frequency (RF) forward link 104 between the wireless infrastructure 103 and the wireless mobile receiving device 105. The data rate of the RF forward link 104 is optimized in the wireless infrastructure 103 by estimating or measuring the bottleneck link speed of the data transmission and adjusting the data rate for the RF forward link 104 according to several embodiments of a data rate optimization algorithm. The algorithm creates an optimum range for the data rate of the RF wireless link 104 which maximizes system capacity and reduces transmission delays to the wireless mobile receiving device 105. When appropriate, the data rate of the RF forward link 104 is decreased to remain within the optimized range, thereby increasing system capacity without impacting the performance perceived by a user at the wireless mobile receiving device 105. Conversely, if necessary, the data rate is increased to remain with the optimized range, thereby reducing transmission delays to the wireless mobile receiving device 105.
Abstract:
Fixed network equipment (100) initializes a channel aggregation strategy and establishes a default channel aggregation. A request for a service requiring additional bandwidth is received from a device. An updated channel aggregation is generated based upon the request and the channel aggregation strategy to create an updated channel aggregation. The updated channel aggregation is signaled to at least one mobile station (116) via an in-band message.
Abstract:
This invention relates to semiconductor devices, microelectronic devices, micro electro mechanical devices, microfluidic devices, and more particularly to a lithographic template, a method of forming the lithographic template and a method for forming devices with the lithographic template. The lithographic template (20, 30, 42) is formed having a substrate (22, 32) and a template pedestal (24, 34) having formed thereon an uppermost surface an etched pattern or relief image (26, 36, 48). The template (20, 30, 42) is used in the fabrication of a semiconductor device (44) for affecting a pattern in the device (44) by positioning the template (20, 30, 42) in close proximity to semiconductor device (44) having a radiation sensitive material (50) formed thereon and applying a pressure (52) to cause the radiation sensitive material (50) to flow into the relief image (48) present on the template (42). Radiation (53) is then applied through the template (42) so as to further cure portions of the radiation sensitive material (50) and further define the pattern in the radiation sensitive material (50). The template (20, 30, 42) is then removed to complete fabrication of semiconductor device (44).
Abstract:
A method of verifying the integrity of software resident on a remote network appliance is disclosed. The method includes providing a secure hash algorithm coupled with a seed value that may be employed by a network host to verify the integrity of the software associated with one or more network appliances.
Abstract:
A semiconductor device on a wafer is formed by lithography with the following steps of: coating (13) a lithography resist onto said wafer in a coating means (5), exposing (14) said wafer to an irradiation through a reticle in an exposure tool (4), stabilizing (15) said lithography resist for activating chemical reaction and developing said lithography resist in said predetermined areas in a developer means (6) so as to reveal a predetermined lithography resist pattern on the wafer surface, stabilizing (16) the lithography resist in a stabilization means (7) for strengthening said pattern on the wafer surface, performing (17) a metrology inspection of said lithography resist pattern on said wafer surface in a metrology tool (8), etching, wet processing or implanting ions (18) into said wafer in a processing cell (9), wherein said metrology inspection is performed by atomic force microscopy in a atomic force microscopy module (11) immediately after developing and baking said lithography resist adjacent to said stabilization means (7).
Abstract:
A method and apparatus for signal combining within a communication system is provided herein. The output of RAKE fingers is combined via a chip combiner. The combined chip stream can be despread with the appropriate Walsh code (defining a particular channel). The resulting symbol stream can then be deinterleaved and decoded.
Abstract:
A copper interconnect polishing process begins by polishing (17) a bulk thickness of copper (63) using a first platen. A second platen is then used to remove (19) a thin remaining interfacial copper layer to expose a barrier film (61). Computer control (21) monitors polish times of the first and second platen and adjusts these times to improve wafer throughput. One or more platens and/or the wafer is rinsed (20) between the interfacial copper polish and the barrier polish to reduce slurry cross contamination. A third platen and slurry is then used to polish away exposed portions of the barrier (61) to complete polishing of the copper interconnect structure. A holding tank that contains anti-corrosive fluid is used to queue the wafers until subsequent scrubbing operations (25). A scrubbing operation (25) that is substantially void of light is used to reduce photovoltaic induced corrosion of copper in the drying chamber of the scubber.
Abstract:
A mobile wireless router (100) includes a first wireless transceiver (102) for accessing a wireless packet data channel (206), and a network interface (106) for coupling to a first network (204). The mobile wireless router also includes a processor (104) coupled to the first wireless transceiver and coupled to the network interface for controlling and communicating with the first wireless transceiver and the network interface. The processor is programmed to provide an internet protocol (IP) router function to terminal equipment (TE) (202) coupled to the mobile wireless router through the first network, and is further programmed to appear, to another device (214) in a second network (220) coupled via the wireless packet data channel, to be an ordinary router.