摘要:
An input/output bias circuit used in MOS memory devices is insensitive to inadvertent power supply variations. A memory cell, programmed to a given state, has a terminal connected to a first node. A first MOS switch, normally open, is connected between the first node and a ground terminal. A biasing circuit and a second MOS switch, normally closed, are connected between a power supply terminal and the first node. The first node is connected to one of two input terminals of a sense amplifier, the second input terminal being connected to a sense amplifier enable/disable signal. Upon selecting the memory cell, the first switch is turned on and the second switch is turned off for a first period of time. During this period, the biasing circuit and the first switch interact to bias the first node to a potential equal to one threshold voltage below the supply voltage. During a second period of time immediately after the first period, both switches 1 and 2 are turned off. During this period, the biasing circuit interacts with the memory cell to bias the first node to a potential corresponding to the state of the memory cell. Also during the second period of time the sense amplifier is enabled to detect the state of the memory cell by sensing the potential on the first node.
摘要:
An input/output bias circuit used in MOS memory devices is insensitive to inadvertent power supply variations. A memory cell, programmed to a given state, has a terminal connected to a first node. A first MOS switch, normally open, is connected between the first node and a ground terminal. A biasing circuit and a second MOS switch, normally closed, are connected between a power supply terminal and the first node. The first node is connected to one of two input terminals of a sense amplifier, the second input terminal being connected to a sense amplifier enable/disable signal. Upon selecting the memory cell, the first switch is turned on and the second switch is turned off for a first period of time. During this period, the biasing circuit and the first switch interact to bias the first node to a potential equal to one threshold voltage below the supply voltage. During a second period of time immediately after the first period, both switches 1 and 2 are turned off. During this period, the biasing circuit interacts with the memory cell to bias the first node to a potential corresponding to the state of the memory cell. Also during the second period of time the sense amplifier is enabled to detect the state of the memory cell by sensing the potential on the first node.
摘要:
A sense amplifier charging circuit can work with different power supply voltages (EVCC). When EVCC is high, a signal generated from EVCC disables some of the charging transistors to reduce the circuit noise. When EVCC is low, the signal generated from EVCC enables the transistors thus increasing the circuit speed.
摘要:
A dynamic random access memory generates an internal power supply voltage IVCC. IVCC is lower in magnitude than the external power supply voltage EVCC. During a read operation, the sense amplifiers are powered from EVCC while the bit lines charge to their output levels. Then the sense amplifiers stop being powered from EVCC and begin being powered from IVCC to maintain the bit lines at their output levels. A timer defines the time that the sense amplifiers are powered from EVCC. This time depends inversely on EVCC. The timer includes a transistor connected between EVCC and an input of the inverter. The time that the sense amplifiers are powered from EVCC is defined by the time that the input of the inverter charges to the trip point of the inverter.
摘要:
A bias voltage generator generates the same bias voltage VBB for different external power supply voltages EVCC (for example, for EVCC=3.3V or 5.0V). During power-up, the charge pump that generates VBB is controlled by an enable signal ExtEn referenced to EVCC. Later an internal supply voltage IVCC becomes fully developed to a value independent from EVCC (for example, IVCC=3.0V), and the charge pump becomes controlled by an enable signal IntEn referenced to IVCC. This enable signal IntEn will cause VBB to reach its target value, for example, -1.5V. This target value is independent of EVCC. During power-up, when the charge pump is controlled by ExtEn, the bias voltage VBB is driven to an intermediate value (for example, -0.5V or -1V). This intermediate value depends on EVCC, but is below the target value in magnitude. The intermediate value reduces the likelihood of latch-up during power-up, but the intermediate value does not go beyond the target value thus does not create a significant pn-junction current leakage in semiconductor regions to which the bias voltage is applied.
摘要:
Disclosed is a method of facilitating authentication of a user. The method may include performing at least one of generating and receiving, using a processor, a primary cryptographic identifier consisted of a primary public key and a primary private key. Further, the method may include generating, using the processor, a global static user identifier corresponding to the user based on the primary public key. Further, the method may include generating, using the processor, a digital signature corresponding to a service based on a unique identifier associated with the service and the primary cryptographic identifier. Further, the method may include generating, using the processor, a key generation seed based on the digital signature and the global static user identifier. Further, the method may include generating, using the processor, a secondary cryptographic identifier including a secondary public key based on the key generation seed.
摘要:
A method of authentication by leveraging mobile devices for expediting user login and registration processes provides a generic method for remotely authenticating login sessions using a portable computing device. An authentication initiation code (AIC) is generated and then displayed on the portable computing device. The AIC is inputted into a login feature of a relying party and a user entry is received through the login feature. An authentication request is sent to the portable computing device. User verification data is located for the relying party within a secure vault of personal identification data. The user is prompted to approve or deny the authentication request if the user verification data for the relying party is found within the secure vault. The user verification data is then used to grant access to restricted portions of the relying party if the authentication request is approved through the portable computing device.
摘要:
Disclosed herein is a method for providing durable forward confidentiality during communications between devices, in accordance with some embodiments. Accordingly, the method may include receiving an ephemeral entropy source identifier and a bit range identifier from a first user device, encrypting the ephemeral entropy source identifier and the bit range identifier, generating a ciphertext, transmitting the ciphertext to a second user device, receiving the ciphertext from the second user device, decrypting the ciphertext, obtaining the ephemeral entropy source identifier and the bit range identifier, identifying an ephemeral entropy source and a bit range, capturing a content from a stream of the ephemeral entropy source, generating a secret key using the content, identifying the ephemeral entropy source and the bit range, capturing the content from the stream, and generating the secret key using the content.
摘要:
Disclosed is a method of facilitating authentication of a user. The method may include performing at least one of generating and receiving, using a processor, a primary cryptographic identifier consisted of a primary public key and a primary private key. Further, the method may include generating, using the processor, a global static user identifier corresponding to the user based on the primary public key. Further, the method may include generating, using the processor, a digital signature corresponding to a service based on a unique identifier associated with the service and the primary cryptographic identifier. Further, the method may include generating, using the processor, a key generation seed based on the digital signature and the global static user identifier. Further, the method may include generating, using the processor, a secondary cryptographic identifier including a secondary public key based on the key generation seed.
摘要:
A laser machining system may include an opposite side camera to provide workpiece alignment from an opposite side of the system (i.e., the side opposite the laser machining process). The opposite side camera may be used with an air bearing positioning stage, and a portion of the stage and/or the opposite side camera may be moved to allow the opposite side camera to image a feature on the workpiece to be aligned. The opposite side alignment may be used with back side scribing and/or dual side scribing of a workpiece with alignment from one or both sides of the workpiece. Laser machining systems and methods may also be used to provide quasi-stealth scribing and multi-beam scribing.