摘要:
An image sensor has at least two photodiodes in each unit pixel. A high dynamic range is achieved by selecting different exposure times for the photodiodes. Additionally, blooming is reduced. The readout timing cycle is chosen so that the short exposure time photodiodes act as drains for excess charge overflowing from the long exposure time photodiodes. To improve draining of excess charge, the arrangement of photodiodes may be further selected so that long exposure time photodiodes are neighbored along vertical and horizontal directions by short exposure time photodiodes. A micro-lens array may also be provided in which light is preferentially coupled to the long exposure time photodiodes to improve sensitivity.
摘要:
An image sensor has at least two photodiodes in each unit pixel. A high dynamic range is achieved by selecting different exposure times for the photodiodes. Additionally, blooming is reduced. The readout timing cycle is chosen so that the short exposure time photodiodes act as drains for excess charge overflowing from the long exposure time photodiodes. To improve draining of excess charge, the arrangement of photodiodes may be further selected so that long exposure time photodiodes are neighbored along vertical and horizontal directions by short exposure time photodiodes. A micro-lens array may also be provided in which light is preferentially coupled to the long exposure time photodiodes to improve sensitivity.
摘要:
An image sensor that has a pixel array using an isolation structure between pixels that reduce electrical cross-talk is disclosed. The pixel array is formed on a substrate that has a thin (less than 5 microns) epitaxial layer. The isolation structure uses a deep p-well to surround a shallow trench isolation. The deep p-well is formed using an implant energy of typically over 700 keV.
摘要:
Securing an out-of-band message from a server to a mobile computing device. After requesting a service ticket from a trusted third party (e.g., via a pre-existing ticketing infrastructure), the requested service ticket and a shared secret are obtained from the trusted third party via a first channel. The mobile computing device thereafter sends the service ticket with the shared secret to a server via a second channel. The server encrypts a message (e.g., an SMS message) using the shared secret. The mobile computing device receives the encrypted message from the server via a third channel that is out-of-band relative to the first channel. The encrypted message is decrypted via the shared secret and the decrypted message is provided to a user of the mobile computing device. In some embodiments, the message includes commands for controlling the mobile computing device.
摘要:
Securing an out-of-band message from a server to a mobile computing device. After requesting a service ticket from a trusted third party (e.g., via a pre-existing ticketing infrastructure), the requested service ticket and a shared secret are obtained from the trusted third party via a first channel. The mobile computing device thereafter sends the service ticket with the shared secret to a server via a second channel. The server encrypts a message (e.g., an SMS message) using the shared secret. The mobile computing device receives the encrypted message from the server via a third channel that is out-of-band relative to the first channel. The encrypted message is decrypted via the shared secret and the decrypted message is provided to a user of the mobile computing device. In some embodiments, the message includes commands for controlling the mobile computing device.
摘要:
The embodiments described herein generally relate to systems and methods for modeling a user-initiated request to a business process application as an email form. It is often necessary for individuals to communicate, or exchange information, with a business application. Inefficiencies and delays arise where individuals are required to work within the context of the business application to accomplish desired actions or to determine the status of a requested action. By allowing a user to request an action from a business application using an email form, such inefficiencies and delays are minimized, if not eliminated altogether. A user may therefore initiate a request to a business application by working within the familiar and readily-available UI of the user's general-purpose email client and may receive status updates regarding such a request with the same UI of the original request.