摘要:
Disclosed is a method of facilitating authentication of a user. The method may include performing at least one of generating and receiving, using a processor, a primary cryptographic identifier consisted of a primary public key and a primary private key. Further, the method may include generating, using the processor, a global static user identifier corresponding to the user based on the primary public key. Further, the method may include generating, using the processor, a digital signature corresponding to a service based on a unique identifier associated with the service and the primary cryptographic identifier. Further, the method may include generating, using the processor, a key generation seed based on the digital signature and the global static user identifier. Further, the method may include generating, using the processor, a secondary cryptographic identifier including a secondary public key based on the key generation seed.
摘要:
A method of authentication by leveraging mobile devices for expediting user login and registration processes provides a generic method for remotely authenticating login sessions using a portable computing device. An authentication initiation code (AIC) is generated and then displayed on the portable computing device. The AIC is inputted into a login feature of a relying party and a user entry is received through the login feature. An authentication request is sent to the portable computing device. User verification data is located for the relying party within a secure vault of personal identification data. The user is prompted to approve or deny the authentication request if the user verification data for the relying party is found within the secure vault. The user verification data is then used to grant access to restricted portions of the relying party if the authentication request is approved through the portable computing device.
摘要:
Disclosed herein is a method for providing durable forward confidentiality during communications between devices, in accordance with some embodiments. Accordingly, the method may include receiving an ephemeral entropy source identifier and a bit range identifier from a first user device, encrypting the ephemeral entropy source identifier and the bit range identifier, generating a ciphertext, transmitting the ciphertext to a second user device, receiving the ciphertext from the second user device, decrypting the ciphertext, obtaining the ephemeral entropy source identifier and the bit range identifier, identifying an ephemeral entropy source and a bit range, capturing a content from a stream of the ephemeral entropy source, generating a secret key using the content, identifying the ephemeral entropy source and the bit range, capturing the content from the stream, and generating the secret key using the content.
摘要:
Disclosed is a method of facilitating authentication of a user. The method may include performing at least one of generating and receiving, using a processor, a primary cryptographic identifier consisted of a primary public key and a primary private key. Further, the method may include generating, using the processor, a global static user identifier corresponding to the user based on the primary public key. Further, the method may include generating, using the processor, a digital signature corresponding to a service based on a unique identifier associated with the service and the primary cryptographic identifier. Further, the method may include generating, using the processor, a key generation seed based on the digital signature and the global static user identifier. Further, the method may include generating, using the processor, a secondary cryptographic identifier including a secondary public key based on the key generation seed.
摘要:
A laser machining system may include an opposite side camera to provide workpiece alignment from an opposite side of the system (i.e., the side opposite the laser machining process). The opposite side camera may be used with an air bearing positioning stage, and a portion of the stage and/or the opposite side camera may be moved to allow the opposite side camera to image a feature on the workpiece to be aligned. The opposite side alignment may be used with back side scribing and/or dual side scribing of a workpiece with alignment from one or both sides of the workpiece. Laser machining systems and methods may also be used to provide quasi-stealth scribing and multi-beam scribing.
摘要:
A method and structure of manufacture of mask ROM device is provided. Firstly, a semiconductor structure is provided that comprises a first dielectric layer, a plurality of buried bit lines and a plurality of code areas, wherein each of the code areas is placed between two buried bit lines. Next, a second dielectric layer having a plurality of contact plugs is formed on the semiconductor structure, wherein the contact plug comprises a second dielectric layer and a first glue layer, furthermore; the first glue layer is placed on the side-wall and bottom of the contact plugs. In addition, the contact plugs filled with the first metal layer. Then, a second glue layer, a second metal layer and a pad layer having an opening pattern are respectively formed on the second dielectric layer and contact plug. Thus, the processes of the present invention can improve the stability and accuracy in the electricity of the mask ROM device.
摘要:
A method and structure of manufacture of mask ROM device is provided. Firstly, a semiconductor structure is provided that comprises a first dielectric layer, a plurality of buried bit lines and a plurality of code areas, wherein each of the code areas is placed between two buried bit lines. Next, a second dielectric layer having a plurality of contact plugs is formed on the semiconductor structure, wherein the contact plug comprises a second dielectric layer and a first glue layer, furthermore; the first glue layer is placed on the side-wall and bottom of the contact plugs. In addition, the contact plugs filled with the first metal layer. Then, a second glue layer, a second metal layer and a pad layer having an opening pattern are respectively formed on the second dielectric layer and contact plug. Thus, the processes of the present invention can improve the stability and accuracy in the electricity of the mask ROM device.
摘要:
An input/output bias circuit used in MOS memory devices is insensitive to inadvertent power supply variations. A memory cell, programmed to a given state, has a terminal connected to a first node. A first MOS switch, normally open, is connected between the first node and a ground terminal. A biasing circuit and a second MOS switch, normally closed, are connected between a power supply terminal and the first node. The first node is connected to one of two input terminals of a sense amplifier, the second input terminal being connected to a sense amplifier enable/disable signal. Upon selecting the memory cell, the first switch is turned on and the second switch is turned off for a first period of time. During this period, the biasing circuit and the first switch interact to bias the first node to a potential equal to one threshold voltage below the supply voltage. During a second period of time immediately after the first period, both switches 1 and 2 are turned off. During this period, the biasing circuit interacts with the memory cell to bias the first node to a potential corresponding to the state of the memory cell. Also during the second period of time the sense amplifier is enabled to detect the state of the memory cell by sensing the potential on the first node.
摘要:
An input/output bias circuit used in MOS memory devices is insensitive to inadvertent power supply variations. A memory cell, programmed to a given state, has a terminal connected to a first node. A first MOS switch, normally open, is connected between the first node and a ground terminal. A biasing circuit and a second MOS switch, normally closed, are connected between a power supply terminal and the first node. The first node is connected to one of two input terminals of a sense amplifier, the second input terminal being connected to a sense amplifier enable/disable signal. Upon selecting the memory cell, the first switch is turned on and the second switch is turned off for a first period of time. During this period, the biasing circuit and the first switch interact to bias the first node to a potential equal to one threshold voltage below the supply voltage. During a second period of time immediately after the first period, both switches 1 and 2 are turned off. During this period, the biasing circuit interacts with the memory cell to bias the first node to a potential corresponding to the state of the memory cell. Also during the second period of time the sense amplifier is enabled to detect the state of the memory cell by sensing the potential on the first node.
摘要:
A method of authentication by leveraging mobile devices for expediting user login and registration processes provides a generic method for remotely authenticating login sessions using a portable computing device. An authentication initiation code (AIC) is generated and then displayed on the portable computing device. The AIC is inputted into a login feature of a relying party and a user entry is received through the login feature. An authentication request is sent to the portable computing device. User verification data is located for the relying party within a secure vault of personal identification data. The user is prompted to approve or deny the authentication request if the user verification data for the relying party is found within the secure vault. The user verification data is then used to grant access to restricted portions of the relying party if the authentication request is approved through the portable computing device.