Patent application number | Description | Published |
20090209196 | Methods of Suppressing GSM Wireless Device Threats in Dynamic or Wide Area Static Environments Using Minimal Power and Collateral Interference - Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons to prevent the messages from reaching the wireless devices. Still another class of techniques denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network. | 08-20-2009 |
20090311963 | Methods of Remotely Identifying, Suppressing, Disabling and Access Filtering Wireless Devices of Interest Using Signal Timing and Intercept Receivers to Effect Power Reduction, Minimization of Detection, and Minimization of Collateral Interfernce. - Techniques for interfering with communications made according to a wireless standard between a beacon and a wireless device. The techniques determine a characteristic that is required by the standard for a signal produced during the communication. Then an interference signal is generated that is specifically adapted to the characteristic and interferes with the characteristic such that the wireless device and the beacon cannot interact as provided for the communication by the wireless standard. The techniques may be used to suppress legitimate wireless beacons in an operational area, to establish a baiting beacon in the operational area, or to interfere with communications between a wireless device and a baiting beacon or other beacon. The interference signal is specifically adapted to the characteristic in a way that greatly reduces the amount of power required for the interference signal and the conspicuousness of the interference signal. | 12-17-2009 |
20100226308 | node- arbitrated media access control protocol for ad hoc broadcast networks carrying ephemeral information - Techniques for organizing nodes of an ad hoc broadcast network into sets and employing the sets to arbitrate access by the nodes to a shared communications medium. Each node has a copy of a signal library and the node indicates its membership in the set by associating itself with a signal in the library. In one application, the signals are ranked, the set is a queue, and the node's position in the queue is indicated by the rank of the signal associated with the node. Each node has rules for selecting the next signal. The hidden terminal problem is solved by having each node broadcast its tone and all of the other tones it has heard. The techniques are particularly useful for the broadcast of ephemeral information by the nodes. | 09-09-2010 |
20100302956 | Enhanced Methods of Cellular Environment Detection When Interoperating with Timed Interfers - Techniques for performing analysis of a cellular telephone signaling environment in the presence of interferers. The techniques do the analysis by employing a receiver to listen to the cellular environment during holes in the interference. The holes have a timing which differs from that used by the cellular telephone signaling environment and will thus over time overlap with structures of interest in the cellular telephone environment. The holes may be smaller than the structure of interest. The signals which the receiver hears in the holes are analyzed and combined to reproduce the structure. The combination may involve statistical methods and weighted decoding. The analysis obtains information which permits surgical attacks on individual wireless devices which are in the traffic state. Example applications of the techniques are given for the GSM and CDMA cellular telephone standards. | 12-02-2010 |
20100304706 | Methods for Identifying Wireless Devices Connected to Potentially Threatening Devices - Techniques for determining whether a cellular device is suspect, i.e., perhaps serving as an activator for a device such as a bomb. One way of doing this with cellular telephones that are in the idle state is to use a baiting beacon to bait and automatically call all the cellular telephones in an area that are in the idle state. If the call to a given cellular telephone is not answered by a human voice, the cellular telephone is suspect. Another way of doing this with cellular telephones that are in the traffic state is to use surgical analysis to examine the DTX pattern for the telephone. If it indicates persistent silence, the cellular telephone is suspect. The surgical analysis may also be used to trace the DTX pattern back to another telephone that is controlling the suspect cellular device. | 12-02-2010 |
20100309884 | Methods for surreptitious manipulation of CDMA 2000 wireless devices - Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices. | 12-09-2010 |
20110059689 | Using code channel overrides to suppress CDMA wireless devices - Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices. | 03-10-2011 |
20120178358 | METHODS OF SUPPRESSING GSM WIRELESS DEVICE THREATS IN DYNAMIC OR WIDE AREA STATIC ENVIRONMENTS USING MINIMAL POWER CONSUMPTION AND COLLATERAL INTERFERENCE - Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons to prevent the messages from reaching the wireless devices. Still another class of techniques denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network. | 07-12-2012 |
20130176905 | NODE ARBITRATED MEDIA ACCESS CONTROL PROTOCOL FOR AD HOC BROADCAST NETWORKS CARRYING EPHEMERAL INFORMATION - Techniques for organizing nodes of an ad hoc broadcast network into sets and employing the sets to arbitrate access by the nodes to a shared communications medium. Each node has a copy of a signal library and the node indicates its membership in the set by associating itself with a signal in the library. In one application, the signals are ranked, the set is a queue, and the node's position in the queue is indicated by the rank of the signal associated with the node. Each node has rules for selecting the next signal. The hidden terminal problem is solved by having each node broadcast its tone and all of the other tones it has heard. The techniques are particularly useful for the broadcast of ephemeral information by the nodes. | 07-11-2013 |
Patent application number | Description | Published |
20090001591 | REDUCING RESISTIVITY IN METAL INTERCONNECTS BY COMPRESSIVE STRAINING - Techniques for reducing resistivity in metal interconnects by compressive straining are generally described. In one example, an apparatus includes a dielectric substrate, a thin film of metal coupled with the dielectric substrate, and an interconnect metal coupled to the thin film of metal, the thin film of metal having a lattice parameter that is smaller than the lattice parameter of the interconnect metal to compressively strain the interconnect metal. | 01-01-2009 |
20090004463 | REDUCING RESISTIVITY IN METAL INTERCONNECTS USING INTERFACE CONTROL - Techniques for reducing resistivity in metal interconnects using interface control are generally described. In one example, an apparatus includes a dielectric substrate, a barrier film coupled with the dielectric substrate, a liner film of a selected material coupled with the barrier film, and a metal coupled with the liner film defining an interface region between the metal and the liner film, the material of the liner film being selected to provide an interface density of state about equal to or less than ten times the density of state of the metal in bulk form. | 01-01-2009 |
20090166867 | METAL INTERCONNECT STRUCTURES FOR SEMICONDUCTOR DEVICES - Cu interconnect structures using a bottomless liner to reduce the copper interfacial electron scattering and lower the electrical resistance are described in this application. The interconnect structures comprise a nucleation layer and a liner layer that may be formed by an oxide or nitride. The bottom portion of the liner layer is removed to expose the nucleation layer. Since the liner is bottomless, the nucleation layer is exposed during Cu deposition and serves to catalyze copper nucleation and enable selective growth of copper near the bottom (where the nucleation layer is exposed), rather than near the liner sidewalls. Thus, copper may be selectively grown with a bottom-up fill behavior than can reduce or eliminate formation of voids. Other embodiments are described. | 07-02-2009 |
20090212421 | POLYMER INTERLAYER DIELECTRIC AND PASSIVATION MATERIALS FOR A MICROELECTRONIC DEVICE - Polymer interlayer dielectric and passivation materials for a microelectronic device are generally described. In one example, an apparatus includes one or more interconnect structures of a microelectronic device and one or more polymeric dielectric layers coupled with the one or more interconnect structures, the polymeric dielectric layers including copolymer backbones having a first monomeric unit and a second monomeric unit wherein the first monomeric unit has a different chemical structure than the second monomeric unit and wherein the copolymer backbones are cross-linked by a first cross-linker or a second cross-linker, or combinations thereof. | 08-27-2009 |
Patent application number | Description | Published |
20120153478 | LINER LAYERS FOR METAL INTERCONNECTS - Electrical interconnects for integrated circuits and methods of fabrication of interconnects are provided. Devices are provided comprising copper interconnects having metallic liner layers comprising silver and a second component, such as, lanthanum, titanium, tungsten, zirconium, antimony, or calcium. Methods include providing a substrate having a trench or via formed therein, forming a silver alloy layer, comprising silver and a second component selected from the group consisting of lanthanum, titanium, tungsten, zirconium, antimony, and calcium, onto surfaces of the feature, depositing a copper seed layer, and depositing copper into the feature. | 06-21-2012 |
20120161251 | TRANSISTOR CHANNEL MOBILITY USING ALTERNATE GATE DIELECTRIC MATERIALS - An apparatus comprises a substrate, a phonon-decoupling layer formed on the substrate, a gate dielectric layer formed on the phonon-decoupling layer, a gate electrode formed on the gate dielectric layer, a pair of spacers formed on opposite sides of the gate electrode, a source region formed in the substrate subjacent to the phonon-decoupling layer, and a drain region formed in the substrate subjacent to the phonon-decoupling layer. The phonon-decoupling layer prevents the formation of a silicon dioxide interfacial layer and reduces coupling between high-k phonons and the field in the substrate. | 06-28-2012 |
20120161321 | SEMICONDUCTOR DEVICE CONTACTS - Techniques are disclosed for forming contacts in silicon semiconductor devices. In some embodiments, a transition layer forms a non-reactive interface with the silicon semiconductor contact surface. In some such cases, a conductive material provides the contacts and the material forming a non-reactive interface with the silicon surface. In other cases, a thin semiconducting or insulting layer provides the non-reactive interface with the silicon surface and is coupled to conductive material of the contacts. The techniques can be embodied, for instance, in planar or non-planar (e.g., double-gate and tri-gate FinFETs) transistor devices. | 06-28-2012 |
20140209855 | NANOWIRE STRUCTURES HAVING WRAP-AROUND CONTACTS - Nanowire structures having wrap-around contacts are described. For example, a nanowire semiconductor device includes a nanowire disposed above a substrate. A channel region is disposed in the nanowire. The channel region has a length and a perimeter orthogonal to the length. A gate electrode stack surrounds the entire perimeter of the channel region. A pair of source and drain regions is disposed in the nanowire, on either side of the channel region. Each of the source and drain regions has a perimeter orthogonal to the length of the channel region. A first contact completely surrounds the perimeter of the source region. A second contact completely surrounds the perimeter of the drain region. | 07-31-2014 |