会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明授权
    • Pin diode
    • 引脚二极管
    • US08564105B2
    • 2013-10-22
    • US13520361
    • 2010-02-16
    • Yoshikazu NishimuraHirofumi YamamotoTakeyoshi Uchino
    • Yoshikazu NishimuraHirofumi YamamotoTakeyoshi Uchino
    • H01L31/075H01L31/105H01L31/117
    • H01L29/8611H01L29/0619H01L29/0638
    • A PIN diode having improved avalanche resistance is provided. The PIN diode includes: a semiconductor substrate 11 that includes an N+ semiconductor layer 1, and an N− semiconductor layer 2; a P-type anode region 15 that is formed by selective impurity diffusion into an outer surface of the N− semiconductor layer 2; and an anode electrode 17 that is conducted to the anode region 15 through a contact region 17c in the anode region 15. The anode region 15 has a substantially rectangular outer edge of which four sides are adapted to be linear parts B2 and four vertices are adapted to be curved parts B1, and outside the contact region 17c, N-type non-diffusion corner regions 16 that extend along the curved parts B1 are respectively formed.
    • 提供了具有改善的雪崩阻力的PIN二极管。 PIN二极管包括:包括N +半导体层1和N半导体层2的半导体衬底11; 通过选择性杂质扩散到N半导体层2的外表面中形成的P型阳极区域15; 以及通过阳极区域15中的接触区域17c而导引到阳极区域15的阳极电极17.阳极区域15具有基本上矩形的外边缘,其四条边适于线性部分B2,并且四个顶点被适配 作为弯曲部分B1,并且在接触区域17c的外部,分别形成沿着弯曲部分B1延伸的N型非扩散角区域16。
    • 37. 发明授权
    • Providing secure input to a system with a high-assurance execution environment
    • 为具有高度执行环境的系统提供安全输入
    • US07464412B2
    • 2008-12-09
    • US10693061
    • 2003-10-24
    • Idan AvrahamChristine M. ChewJohn E. PaffPaul RobertsHirofumi Yamamoto
    • Idan AvrahamChristine M. ChewJohn E. PaffPaul RobertsHirofumi Yamamoto
    • G06F12/14
    • G06F21/83G06F21/53G06F21/57G06F21/84G06F2221/2105H04W12/08H04W88/02
    • Techniques are disclosed to provide security for user input in which a first, host operating system is used along with a second, high assurance operating system, where the first system provides at least some of the infrastructure for the second system. Two modes are presented. In a first mode, user data is passed to the host operating system. In a second mode, user data is retained in the second operating system for the use of the second operating system or processes running on the second operating system. Transitions between the nodes can be accomplished according to hypothecated user actions such as keystroke combinations, or when the user performs an action which indicates a programmatic activation of a process running in the second operating system. Where shadow graphical elements are run by the first operating system to indicate the location of graphical elements from processes running on the second operating system, this programmatic activation may be indicated by programmatic activation of a shadow graphical element.
    • 公开了技术来为用户输入提供安全性,其中第一主机操作系统与第二高保证操作系统一起使用,其中第一系统为第二系统提供至少一些基础设施。 提出了两种模式。 在第一模式中,用户数据被传递到主机操作系统。 在第二模式中,用户数据被保留在第二操作系统中,以便使用在第二操作系统上运行的第二操作系统或进程。 节点之间的转换可以根据诸如按键组合之类的假设的用户动作,或当用户执行指示在第二操作系统中运行的进程的编程激活的动作时完成。 在阴影图形元素由第一操作系统运行以指示来自在第二操作系统上运行的进程的图形元素的位置的情况下,可以通过阴影图形元素的编程激活来指示该程序化激活。