摘要:
A nonvolatile memory cell is constructed using a floating-gate pFET readout transistor having its source tied to a power source (Vdd) and its drain providing a current which can be sensed to determine the state of the cell. The gate of the pFET readout transistor provides for charge storage which can be used to represent information such as binary bits. A control capacitor structure having its first terminal coupled to a first voltage source and its second terminal coupled to the floating gate and a tunneling capacitor structure having its first terminal coupled to a second voltage source and its second terminal coupled to the floating gate are utilized in each embodiment. The control capacitor structure is fabricated so that it has much more capacitance than does the tunneling capacitor structure (and assorted stray capacitance between the floating gate and various other nodes of the cell). Manipulation of the voltages applied to the first voltage source and second voltage source (and Vdd) controls an electric field across the capacitor structure and pFET dielectrics and thus Fowler-Nordheim tunneling of electrons onto and off of the floating gate, thus controlling the charge on the floating gate and the information value stored thereon.
摘要:
Methods and apparatuses for programming a single-poly pFET-based nonvolatile memory cell bias the cell so that band-to-band tunneling (BTBT) is induced and electrons generated by the BTBT are injected onto a floating gate of the cell. Following a predetermined event, the single-poly pFET is biased to induce impact-ionized hot-electron injection (IHEI). The predetermined event may be, for example, the expiration of a predetermined time period or a determination that a channel has been formed by the BTBT injection process that is sufficiently conducting to support IHEI. Employing BTBT permits a previously overerased or stuck bit to be “unstuck” or “removed” and thus be made usable (i.e., able to be programmed) again.
摘要:
Methods of and apparatuses for matching the signal delay, clock timing, frequency response, gain, offset, and/or transfer function of signal pathways in electrical circuits such as, for example, time-interleaved and pipelined circuits using analog-valued floating-gate MOSFETs are disclosed. The methods and apparatuses disclosed are applicable to a variety of circuits, including but not limited to, sample-and-hold or track-and-hold circuits, quadrature mixers, analog-to-digital converters (ADCs), digital-to-analog converters (DACs), analog or digital filters, and amplifiers.
摘要:
Methods and apparatuses prevent overtunneling in pFET-based nonvolatile floating gate memory (NVM) cells. During a tunneling process, in which charge carriers are removed from a floating gate of a pFET-based NVM cell, a channel current of a memory cell transistor is monitored and compared to a predetermined minimum channel current required to maintain a conducting channel in an injection transistor of the memory cell. When the monitored channel current drops below the predetermined minimum channel current, charge carriers are injected onto the floating gate by impact-ionized hot-electron injection (IHEI) so that overtunneling is avoided.
摘要:
RFID tags capable of transitioning between a private state and one or more public states are provided. In the private state, tags may participate in an inventory round without restriction. In a public state, tags may be prevented from participating in an inventory round, allowed to participate without providing actual identifying information, or allowed to participate providing an alternate identifier. Whether and how the tag responds in a public state may depend on certain conditions including if one or more of the tag's flags are asserted or deasserted. A reader may select a public tag for inventorying by verifying itself, and the tag then asserting or deasserting one or more of its flags accordingly. The asserted or deasserted flag(s) may be used to determine whether and how a tag in a public state participates in an inventory round.
摘要:
RFID technology may be used to provide digital identities for physical items. An RFID IC attached to or integrated into a physical item contains an identifier for the physical item. Digital identity information associated with the item, such as ownership information, history, properties, and the like, may be located on one or more networks. An entity, after authenticating itself and/or the item, may use the identifier to locate, retrieve, and/or update the item's digital identity information on the network.
摘要:
A Radio Frequency Identification (RFID) tag IC stores an identifier and a check code. The IC determines whether the stored identifier is corrupted by comparing it to the check code. If the stored identifier does not correspond to the check code then the IC may terminate operation or indicate an error. The IC may also reconstruct the correct identifier from the check code.
摘要:
A method is provided to determine unique identifiers. A physical item has an RFID integrated circuit (IC) having a unique identifier and a secret. The RFID IC may be configured to provide an identifier portion and a response to a previously sent challenge, where the identifier portion by itself is insufficient to completely identify the IC or item and the response is based on the challenge and the secret. Attempts are made to verify the response using a set of potential secrets determined using the identifier portion. If the response is successfully verified using a certain secret, the secret may then be used to determine one or more other identifier portions. The unique, complete identifier may then be determined from a combination of at least the identifier portions.
摘要:
RFID tags capable of transitioning between a private state and one or more public states are provided. In the private state, tags may participate in an inventory round without restriction. In a public state, tags may be prevented from participating in an inventory round, allowed to participate without providing actual identifying information, or allowed to participate providing an alternate identifier. Whether and how the tag responds in a public state may depend on certain conditions including if one or more of the tag's flags are asserted or deasserted. A reader may select a public tag for inventorying by verifying itself, and the tag then asserting or deasserting one or more of its flags accordingly. The asserted or deasserted flag(s) may be used to determine whether and how a tag in a public state participates in an inventory round.