摘要:
Included within the scope of the invention are plasma etch-resistant films for substrates. The films include a yttria material and a at least a portion of the yttria material is in a crystal phase having an orientation defined by a Miller Index notation {111}. Also included are methods of manufacturing plasma etch-resistant films on a substrate. Such methods include applying a yttria material-containing composition onto at least a portion of a surface of a substrate to form a film. The film includes a yttria material and at least a portion of the yttria material is in a crystal phase having an orientation defined by a Miller Index notation {111}.
摘要:
The invention includes a plasma etch-resistant film for a substrate comprising a yttria material wherein at least a portion of the yttria material is in a crystal phase having a crystal lattice structure, wherein at least 50% of the yttria material is in a form of a monoclinic crystal system. The film may be treated by exposure to a fluorine gas plasma. Also included are plasma etch-resistant articles that include a substrate and a film, wherein the film comprises an yttria material and at least a portion of the yttria material is present in the film in a crystal phase having a crystal lattice structure and at least 50% of the yttria material is in a form of a monoclinic crystal system. Several methods are contemplated within the scope of the invention.
摘要:
Secure and auditable file exchange between a professional and a client, patient, colleague, or other associate of the professional may be achieved via a file exchange service that automatically verifies the professional's professional status and identity and provides applications and/or tools to accept files for transfer to the verified professional. The files are stored in encrypted form, along with cryptographic integrity codes. After the files have been transferred to the professional, the cryptographic integrity codes may be used to verify that the professional received a correct copy of the file that was originally provided.
摘要:
Techniques for detecting radio-frequency identification (RFID) tags are disclosed. For example, an exit control system is described that detects unauthorized removal of articles from a protected facility. A series of antennas are setup to produce interrogation corridors located near the exit of the protected area. RFID tags are attached to the articles to be protected. Each tag includes information that uniquely identifies the article to which it is affixed and status information as to whether the articles removal from the facility is authorized. The RF reader outputs RF signals through the antennas to create electromagnetic fields within the interrogation corridors. The reader outputs RF power from a single port to the multiple antennas via a splitter/combiner. In this way, a single RF reader with only one transmitter/receiver port simultaneously interrogates multiple antennas. A variety of techniques are described by which the reader can detect the removal of an unauthorized article.
摘要:
A durable radio frequency identification tag. A preferred embodiment of the invention provides a durable radio frequency identification tag comprising: a flexible substrate including a first major surface and a second major surface opposite the first major surface; a radio frequency identification antenna attached to the first major surface of the substrate; an integrated circuit attached to the antenna; and a thermoplastic guard attached to the flexible substrate adjacent the integrated circuit. The present invention also provides a method of manufacturing a durable radio frequency identification tag.
摘要:
Secure and auditable file exchange between a professional and a client, patient, colleague, or other associate of the professional may be achieved via a file exchange service that automatically verifies the professional's professional status and identity and provides applications and/or tools to accept files for transfer to the verified professional. The files are stored in encrypted form, along with cryptographic integrity codes. After the files have been transferred to the professional, the cryptographic integrity codes may be used to verify that the professional received a correct copy of the file that was originally provided.
摘要:
Techniques for detecting radio-frequency identification (RFID) tags are disclosed. For example, an exit control system is described that detects unauthorized removal of articles from a protected facility. A series of antennas are setup to produce interrogation corridors located near the exit of the protected area. RFID tags are attached to the articles to be protected. Each tag includes information that uniquely identifies the article to which it is affixed and status information as to whether the articles removal from the facility is authorized. The RF reader outputs RF signals through the antennas to create electromagnetic fields within the interrogation corridors. The reader outputs RF power from a single port to the multiple antennas via a splitter/combiner. In this way, a single RF reader with only one transmitter/receiver port simultaneously interrogates multiple antennas. A variety of techniques are described by which the reader can detect the removal of an unauthorized article.
摘要:
Techniques for detecting radio-frequency identification (RFID) tags are disclosed. For example, an exit control system is described that detects unauthorized removal of articles from a protected facility. A series of antennas are setup to produce interrogation corridors located near the exit of the protected area. RFID tags are attached to the articles to be protected. Each tag includes information that uniquely identifies the article to which it is affixed and status information as to whether the articles removal from the facility is authorized. The RF reader outputs RF signals through the antennas to create electromagnetic fields within the interrogation corridors. The reader outputs RF power from a single port to the multiple antennas via a splitter/combiner. In this way, a single RF reader with only one transmitter/receiver port simultaneously interrogates multiple antennas. A variety of techniques are described by which the reader can detect the removal of an unauthorized article.