摘要:
The exposure of the interface between the bottom electrode and barrier layer to a high temperature oxygen ambience is avoided by recessed Pt-in-situ deposited with a barrier layer.
摘要:
CMP of integrated circuits containing DRAM arrays with trench capacitors fill the trenches with oxide, resulting in a an array of oxide structures that is dense compared with the concentration in the surrounding support structures and therefore has a higher loading. A conformal layer is deposited over the wafer, increasing the loading in the array, but filling in spaces between active areas. A blanket etch removes material in both the array and the supports. A block etch balances the amount of material in the array and the supports. A supplementary oxide deposition in the array fills spaces between the structures to a nearly uniform density.
摘要:
A multi-layer electrode (246) and method of fabrication thereof in which a conductive region (244) is separated from a barrier layer (222) by a first conductive liner (240) and a second conductive liner (242). First conductive layer (240) comprises Pt, and second conductive liner (242) comprises a thin layer of conductive oxide. The multi-layer electrode (246) prevents oxygen diffusion through the top conductive region (244) and reduces material variation during electrode patterning.
摘要:
Si, Al, Al plus TiN, and IrO2 are used as adhesion layers to prevent peeling of noble metal electrodes, such as Pt, from a silicon dioxide (SiO2) substrate in capacitor structures of memory devices.
摘要:
A multi-layer electrode (246) and method of fabrication thereof in which a conductive region (244) is separated from a barrier layer (222) by a first conductive liner (240) and a second conductive liner (242). First conductive layer (240) comprises Pt, and second conductive liner (242) comprises a thin layer of conductive oxide. The multi-layer electrode (246) prevents oxygen diffusion through the top conductive region (244) and reduces material variation during electrode patterning.
摘要:
An interconnect includes an opening formed in a dielectric layer. A conductive barrier is deposited in the opening, over which a first conductive layer is deposited. A conductive oxide is deposited over the first conductive layer, and a second conductive layer, formed from the same material as the first conductive layer, is deposited over the conductive liner.
摘要:
The disclosure details the implementation of an apparatus, method, and system for an integrated data security layer (IDSL). In one aspect, the IDSL enables entities wishing to control users' data access, whether they are content owners, corporate system administrators, or concerned parents wishing to prevent ill-gotten data to work across their systems, to manage the access of content. The IDSL provides the ability to curb such unwanted access of data. The IDSL has the ability to obtain content information, policy rules regarding the content, and unique identifiers for the content from content providers and/or their proxies. Further, the IDSL has the ability to provide such information to IDSL clients. Such clients employ the obtained information to analyze and control access to the content. Additionally, the IDSL may act as a lookup facility to create, maintain, and update associations between a content information, policy rules, and unique identifiers of content, and any other associated information as detailed throughout. The IDSL coordinates with an IDSL database to identify interassociated items in the generation of entries regarding any related information.
摘要:
An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e.g., using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.
摘要:
An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e.g., using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.
摘要:
An expandable mobile computer system is described. The mobile computer system includes a peripheral expansion interface that allows a large number of different sized expansion peripherals to be created and used with the mobile computer system. A pair of rails forms a first opening of the peripheral expansion interface wherein an expansion peripheral device may be inserted. Large expansion peripherals may extend in a first dimension out of that first opening. The rails also form a second opening along a second dimension orthogonal to the first dimension. Large expansion peripherals may also extend outward from the peripheral expansion interface in the second dimension.