Abstract:
An on-chip inductor includes a semiconductor substrate, a plurality of insulating layers stacked over the semiconductor substrate, and first, second and third spiral-shaped coil patterns. The first, second and third spiral-shaped coil patterns are inductively coupled to each other and sequentially disposed on respective layers among the plurality of insulating layers. Further, the first, second and third spiral-shaped coil patterns have respective first ends overlapping each other. The on-chip inductor further includes a first via connecting the respective first ends of the first and second spiral-shaped coil patterns to each other, and a second via connecting the respective first ends of the second and third spiral-shaped coil patterns to each other, where the first and second vias overlap each other.
Abstract:
An RF circuit including: first and second ports receiving first and second RF signals; a (1-1)-th amplification stage and a (1-2)-th amplification stage connected to the first port and a first ground to amplify the first RF signal; a (2-1)-th amplification stage and a (2-2)-th amplification stage connected to the second port and a second ground to amplify the second RF signal; a (1-1)-th switch connected to the (1-1)-th amplification stage and the second ground, and a (1-2)-th switch connected to the (1-2)-th amplification stage and the second ground; a (2-1)-th switch connected to the (2-1)-th amplification stage and the first ground, and a (2-2)-th switch connected to the (2-2)-th amplification stage and the first ground; and a mixer to mix the first RF signal or the second RF signal with an LO signal, and mix the first RF signal or the second RF signal with the LO signal.
Abstract:
Provided is a method for operating a storage device including a nonvolatile memory and a memory controller controlling the nonvolatile memory. The method include receiving a kill request by the memory controller, performing authentication based on the received kill request by the memory controller, and entering a locked state, by the memory controller, according to the kill request when the authentication is successfully performed. In the locked state, the memory controller denies a request for access to a selected area of the nonvolatile memory.