摘要:
Methods and systems are provided for processing a film over a substrate in a process chamber using plasma deposition. A plasma is formed in the process chamber and a process gas mixture suitable for processing the film is flowed into the process chamber under a set of process conditions. The process gas mixture may include a silicon-containing gas and an oxygen-containing gas to deposit a silicate glass, which may in some instances also be doped to obtain specifically desired optical properties. A parameter is monitored during processing of the film so that the process conditions may be changed in accordance with a correlation among a value of the parameter, an optical property of the film, and the process conditions.
摘要:
Methods for communicating support of operations or capabilities for enhanced directional multi-gigabit (EDMG) communications are described. A supported channel width field or operating channel width field is used in a capabilities element or operation element. The supported channel width field or operating channel width field includes bit positions with bit values that are set to indicate support of operation or a capability of the transmit device from among defined options, the defined options including: the transmit device can perform channel bonding only, the transmit device can perform carrier aggregation only, and the transmit device can perform both channel bonding and carrier aggregation.
摘要:
A method includes transmitting with a selected antenna of an access point, one or more first beacon frames over a primary channel within a beacon transmission interval, and transmitting with the selected antenna of the access point, one or more second beacon frames over a secondary channel within the beacon transmission interval.
摘要:
System and method using distance bounding to provide security in fine timing measurement (FTM) communications including authenticating a prover device at a verifier device, including: transmitting from a verifier device, through the wireless interface, a sequence of challenge bits for a prover device, each challenge bit being transmitted in a respective FTM frame; receiving, at the verifier device, FTM acknowledgment frames; determining, for at least some of the received FTM acknowledgement frames, respective round trip time (RTT) measurements; determining, for at least some of the received FTM acknowledgement frames, whether the included response bit matches a predicted response bit; and authenticating the prover device based on the determined RTT measurements and the determined response bit matches.
摘要:
Methods for communicating support of operations or capabilities for enhanced directional multi-gigabit (EDMG) communications are described. A supported channel width field or operating channel width field is used in a capabilities element or operation element. The supported channel width field or operating channel width field includes bit positions with bit values that are set to indicate support of operation or a capability of the transmit device from among defined options, the defined options including: the transmit device can perform channel bonding only, the transmit device can perform carrier aggregation only, and the transmit device can perform both channel bonding and carrier aggregation.
摘要:
A method, apparatus and system for transmitting control information in a header of a physical protocol data unit (PPDU), such as an IEEE 802.11 compliant PPDU. Embodiments include indicating control features in an EDMG PPDU for Wireless LAN communications. The method and system may include overloading at least one bit of a Scrambler Initialization Field in the PPDU header (e.g. the PHY header) to convey control information, as well as to be used to initialise the scrambler shift register. The same header bits are thus used for both purposes. Examples of control information include a primary channel, channel width or MIMO configuration to be used in further communication.
摘要:
Various methods and communications devices to improve association and handoff performance of a wireless network are provided. By way of example, a modified state machine that permits reduced security requirements for authentication in order to achieve fast authentication is employed. The modified state machine providing fast authentication remains compatible with the classic state machine implementing the wireless fidelity (WiFi) standard.
摘要:
A substrate patterning method including the steps of spraying ink on a surface of a substrate, the spraying of the ink resulting in an overspray of excess ink past an edge of the substrate; changing a temperature of the excess ink to cause a change in a viscosity of the excess ink; and removing the excess ink having the changed viscosity.
摘要:
The present invention provides methods and devices for a security architecture for use in wireless multi-hop networks. A method for implementing pair-wise encryption key establishment, network node authentication and determining tunnel encryption keys is provided in a following manner. In a multi-hop wireless network including a plurality of network nodes, pair-wise security is established between pairs of neighboring network nodes of the plurality of network nodes. For example, pair-wise security is established in the form of temporal pair-wise encryption keys. Following establishment of pair-wise security between pairs of neighboring network nodes, for a pair of network nodes that are not neighbors, tunnel security is established between the pair of network nodes using tunnel encryption keys derived by the pair of network nodes on an ad hoc basis. The tunnel encryption keys are used to form the connection between non-neighboring network nodes so as to avoid the hop-by-hop encryption/decryption used in conventional multi-hop wireless systems.
摘要:
A security zone key is used to secure data traffic/control messages in a multi-hop wireless relay network. In one embodiment, the security zone key is generated by a base station and passed to relay stations and optionally mobile stations that are to be associated with the security zone. A given base station may implement multiple security zones on the wireless network. The members in each zone share a unique group security association. One or more connections may be assigned to a particular security zone. Data traffic/control messages directed to relay stations in a security zone are processed using the security zone key to enable all relay nodes within the security zone to verify the authenticity of the management message and optionally decode the messages. From a management perspective, since a common security zone key is in use by all relay stations in the security zone, the management messages may be broadcast/multicast to the relay nodes in the security zone and the key distribution and management protocols have much less complexity.