Freguglia
Alessandro Freguglia, Bollate IT
Patent application number | Description | Published |
---|---|---|
20100327379 | CAPPED INTEGRATED DEVICE WITH PROTECTIVE CAP, COMPOSITE WAFER INCORPORATING INTEGRATED DEVICES AND PROCESS FOR BONDING INTEGRATED DEVICES WITH RESPECTIVE PROTECTIVE CAPS - A capped integrated device includes a semiconductor chip, incorporating an integrated device and a protective cap, bonded to the semiconductor chip for protection of the integrated device by means of a bonding layer made of a bonding material. The bonding material forms anchorage elements within recesses, formed in at least one between the semiconductor chip and the protective cap. | 12-30-2010 |
20110073966 | INDEXING OF ELECTRONIC DEVICES DISTRIBUTED ON DIFFERENT CHIPS - An embodiment of a method is proposed for indexing electronic devices. The embodiment includes the steps of forming a plurality of first chips in a first wafer, forming a plurality of second chips in a second wafer, forming the electronic devices by coupling each first chip with a corresponding second chip, and forming an index on each electronic device; the index is indicative of a position of the corresponding first chip in the first wafer. In an embodiment, the step of forming an index includes forming a first portion of the index on the first chip, and forming a second portion of the index on the second chip. | 03-31-2011 |
20130203235 | CAPPED INTEGRATED DEVICE WITH PROTECTIVE CAP, COMPOSITE WAFER INCORPORATING INTEGRATED DEVICES AND PROCESS FOR BONDING INTEGRATED DEVICES WITH RESPECTIVE PROTECTIVE CAPS - A capped integrated device includes a semiconductor chip, incorporating an integrated device and a protective cap, bonded to the semiconductor chip for protection of the integrated device by means of a bonding layer made of a bonding material. The bonding material forms anchorage elements within recesses, formed in at least one between the semiconductor chip and the protective cap. | 08-08-2013 |
Alessandro Freguglia, Bollate (mi) IT
Patent application number | Description | Published |
---|---|---|
20150294942 | INDEXING OF ELECTRONIC DEVICES DISTRIBUTED ON DIFFERENT CHIPS - A method for indexing electronic devices includes: forming first chips in a first wafer, forming second chips in a second wafer, forming the electronic devices by coupling each first chip with a corresponding second chip, and forming an index on each electronic device. The index is indicative of a position of the corresponding first chip in the first wafer. The step of forming an index includes forming a first portion of the index on the first chip, and forming a second portion of the index on the second chip. | 10-15-2015 |
Giorgio Freguglia, Torino IT
Patent application number | Description | Published |
---|---|---|
20090217033 | Short Authentication Procedure In Wireless Data Communications Networks - In a wireless communications network including at least one authenticator and at least one authentication server, wherein the authenticator is adapted to interact with the authentication server for authenticating supplicants in order to conditionally grant thereto access to the wireless communications network, a short authentication method for authenticating a supplicant, the method including: providing a shared secret, shared by and available at the supplicant and the authentication server; having the supplicant provide to the authenticator an authentication token, wherein the authentication token is based on the shared secret available thereat; having the authenticator forward the authentication token to the authentication server; having the authentication server ascertain an authenticity of the received authentication token based on the shared secret available thereat; in case the authenticity of the authentication token is ascertained, having the authentication server generate a first authentication key based on the shared secret available thereat, and provide the generated authentication key to the authenticator; having the supplicant generate a second authentication key based on the shared secret; and having the supplicant and the authenticator exploit the generated first and the second keys for communicating with each other. The short authentication method is particularly useful in situations of handoff of the supplicant from an authenticator to another. | 08-27-2009 |
20100058442 | METHOD AND SYSTEM FOR ENFORCING SECURITY POLICES IN MANETS - A method of enforcing security policies in a mobile ad-hoc network, includes: entrusting at least one first network node along a data traffic route from a data traffic origin node to a data traffic destination node, with the enforcing of predefined security policies on the data traffic; and entrusting at least one second network node, distinct from said first network node, with the control of the enforcement of the security policies by the first network node. | 03-04-2010 |