Abstract: Disclosed are techniques for performing an antivirus task in a mobile wireless device running an embedded operating system. In one embodiment, calls intended for an application programming interface (API) function code is redirected to an antivirus function code. The redirection to the antivirus function code may be performed by modifying a kernel structure to point to a modified entry list instead of an API entry list. The redirection to the antivirus function code may also be performed by modifying the API function code to allow the antivirus function code to execute before the API function code. The kernel structure or the API function code may be properly restored back to its original form. Software implementations of these techniques may be readily loaded and unloaded, and may not require re-installation of the embedded operating system.
Abstract: In one embodiment, an anti-virus verification unit detects connection messages transmitted by a network server and a network client on a network. The anti-virus verification unit determines a network address of the network client according to the connection messages. Using the network address, the anti-virus verification unit verifies if the network client has an anti-virus software.
Abstract: A solar cell having backside contacts is economically fabricated through use of acceptor and donor polymers which are inkjet printed in interleaved patterns on the back surface as the carrier accepting electrodes of the solar cell. The polymers can be placed on a tunnel oxide on the surface of a semiconductor substrate, or the polymers can be in direct contact with the semiconductor substrate. Electrical patterns interconnecting the acceptor and donor polymer patterns can also be formed by inkjet printing a seed layer and then electroplating the seed layer. Advantageously, high temperature processing is not required in the process as is required in conventional solar cell fabrication using dopant implants into the semiconductor substrate. In alternative embodiments, doped contacts are diffused in the top surface and a polymer contact is formed over the back surface.
Abstract: An electron beam apparatus is configured for dark field imaging of a substrate surface. Dark field is defined as an operational mode where the image contrast is sensitive to topographical features on the surface. A source generates a primary electron beam, and scan deflectors are configured to deflect the primary electron beam so as to scan the primary electron beam over the substrate surface whereby secondary and/or backscattered electrons are emitted from the substrate surface, said emitted electrons forming a scattered electron beam. A beam separator is configured to separate the scattered electron beam from the primary electron beam. The apparatus includes a cooperative arrangement which includes at least a ring-like element, a first grid, and a second grid. The ring-like element and the first and second grids each comprises conductive material. A segmented detector assembly is positioned to receive the scattered electron beam after the scattered electron beam passes through the cooperative arrangement.
Type:
Grant
Filed:
August 19, 2008
Date of Patent:
May 11, 2010
Assignee:
KLA-Tencor Corporation
Inventors:
Edward M. James, Ye Yang, Mark Lin, Alexander J. Gubbens, Paul Petric
Abstract: One embodiment relates to a solid-state charged-particle detector. The detector includes a PIN diode and a conductive coating on the front-side of the PIN diode, wherein the front-side receives incident charged particles to be detected. In addition, the detector includes a metal layer on the backside of the PIN diode and electrical connections to the metal layer and to the conductive coating. Other embodiment are also disclosed.
Type:
Grant
Filed:
February 26, 2007
Date of Patent:
May 11, 2010
Assignee:
KLA-Tencor Technologies Corporation
Inventors:
Mark A. McCord, Tom G. Miller, David L. Brown
Abstract: The present application discloses a new technique which reduces the dimensionality of a feature model by re-use of data that has been obtained by a prior measurement. The data re-used from the prior measurement may range from parameters, such as geometrical dimensions, to more complex data that describe the electromagnetic scattering function of an underlying layer (for example, a local solution of the electric field properties).
Type:
Grant
Filed:
July 16, 2007
Date of Patent:
May 11, 2010
Assignee:
KLA-Tencor Technologies Corporation
Inventors:
Daniel C. Wack, Andrei Veldman, Edward R. Ratner, John Hench, Noah Bareket
Abstract: A sample and hold inductor current sense configuration senses inductor current flowing through an output inductor of a voltage regulator and generates an average of the sensed inductor current. The average of the sensed inductor current may be generated from samples of peaks and valleys of the sensed inductor current. For example, the peak of the sensed inductor current may be stored in a first capacitor and the valley of the sensed inductor current may be stored in a second capacitor. The first and second capacitors may be coupled together to generate the average of the sensed inductor current. The average of the sensed inductor current may be provided to a droop control circuit to control droop of an output voltage of the voltage regulator. An input offset voltage of a current sense amplifier sensing the inductor current may be calibrated between samplings of the sensed inductor current.
Abstract: In one embodiment, a content filtering system scans an incoming data for malicious content against a portion or the entirety of its knowledge base. If the incoming data is not detected to contain malicious content, the incoming data is forwarded to a content filtering agent that may perform further scanning of the incoming data against portions of its knowledge base that were not employed by the content filtering system. This advantageously allows a complete knowledge base to be segmented, with different computers scanning an incoming data using different segments of the knowledge base. The content filtering system and content filtering agent may be antivirus programs, while the knowledge bases may be virus/pattern files, for example.
Abstract: In one embodiment, script patterns for identifying particular network viruses are written using a scripting language. The scripting language may allow for flow control, arithmetic, memory manipulation, and content matching operations, for example. Each script pattern may identify a particular network virus using a set of instructions supported by the scripting language. Among other advantages, the use of script patterns allows antivirus analysts to develop more flexible and effective patterns for dealing with current and future network threats.
Abstract: A silicon solar cell having a silicon substrate includes p-type and n-type emitters on a surface of the substrate, the emitters being doped nano-particles of silicon. To reduce high interface recombination at the substrate surface, the nano-particle emitters are preferably formed over a thin interfacial tunnel oxide layer on the surface of the substrate.
Abstract: One embodiment pertains to an apparatus for reflection electron beam lithography, including at least illumination electron-optics, an electron-reflective pattern generator, projection electron-optics, a moving stage holding a target substrate, control circuitry, and a deflection system. The illumination electron-optics is configured to form an illumination electron beam. The electron-reflective pattern generator configured to generate an electron-reflective pattern of pixels and to reflect the illumination electron beam using the pattern to form a patterned electron beam. The projection electron-optics is configured to project the patterned electron beam onto the moving target substrate. The control circuitry is configured to shift the generated pattern in discrete steps in synchronization with the stage motion. The deflection system is configured to deflect said projected patterned electron beam so as to compensate for said stage motion in between discrete shifts of said generated pattern.
Abstract: In one embodiment, an antivirus system logs in-transit e-mails in a computer network. Upon receipt of an updated pattern file for an antivirus scan engine, the log may be checked to determine if the computer network has been exposed to a computer virus identified in the updated pattern file. If so, antivirus actions, such as antivirus scanning of a client computer that has been infected by the virus, may be remotely initiated.
Abstract: One embodiment pertains to a method for reviewing a potential defect on a substrate from one electron image. An image of an area containing the potential defect is obtained using a charged-particle apparatus. At least three image segments within the image are determined. The three segments are transformably identical to each other, and one of said three segments includes the potential defect. Another embodiment pertains to a method for reviewing a potential defect on a substrate by obtaining an electron-beam image of a relatively large field of view containing a first image segment. The first image segment is substantially smaller than the field of view and includes a location of the potential defect. A comparison image segment within the field of view is determined. The comparison image segment is transformably identical to the first image segment. Other embodiments and features are also disclosed.
Abstract: Debugging of a network security appliance is facilitated by allowing for generation of debug information in a user-friendly manner. In one embodiment, the network security appliance automatically detects a presence of a file in a removable non-volatile memory and, in response, places at least one of its components in debug mode. This allows the component to write debug information to the removable non-volatile memory. Removal of the removable non-volatile memory from the network security appliance automatically triggers placement of the component in non-debug mode. The debug information generated in the network security appliance may be forwarded to a server computer for analysis.
Abstract: One embodiment disclosed relates to the use of object motion estimation to interlace a progressive video sequence. One of a plurality of consecutive frames is segmented and motion vectors for each segment are determined though object motion estimation. Interpolated motion vectors are used to construct at least one intermediate frame, and interlaced fields are extracted from the new sequence of frames that includes intermediate frames. An interlaced sequence with smooth, incremental motion is thus constructed from a progressive video sequence.
Abstract: A method and apparatus for temporally filtering a video sequence using motion compensation in which motion information captures the motion of objects is disclosed. Pixels from a current frame are aligned with matching pixels from previous and/or future frames according to the motion of the surrounding object of arbitrary shape. A weighted average of the corresponding pixels is taken for each pixel in the current frame to produce a filtered version of the current frame. The weights may be adjusted to compensate for similarities between the frames and for blur transitions near object boundaries. A lighting offset may also be used to prevent erroneous lighting shifts during filtering.
Abstract: In a method for blocking email spams, the header fields and the message body of a received email first are identified. Predefined patterns are identified by matching in the header fields and message body, wherein a data structure of characteristic information is created for each recognized pattern. The characteristic information then are analyzed by rule inference to determine whether the received email is a spam.
Abstract: One embodiment disclosed relates to a method for encoding and decoding a video sequence in which a keyframe is used to bi-directionally predict frames in the sequence. The keyframe is coded independently of other frames in the sequence. Both a prior frame occurring before the keyframe and a subsequent frame occurring after the keyframe are predicted using data from the keyframe. Another embodiment disclosed relates to a method for allocating bits to a keyframe during video encoding. Effects of a plurality of keyframe bit allocations on quality of a predicted frame are measured. Said effects are used to determine a near optimal keyframe bit allocation.
Type:
Grant
Filed:
July 24, 2008
Date of Patent:
December 22, 2009
Assignee:
Altera Corporation
Inventors:
David B. Kita, Tser-Yuan Brian Yang, Dylan SeLegue
Abstract: In one embodiment, a back side contact solar cell includes a tunnel oxide layer formed on a back side of a substrate. A polysilicon layer is formed on the tunnel oxide layer, and dopant sources are formed on the polysilicon layer. Dopants from the dopant sources are diffused into the polysilicon layer to form p-type and n-type regions therein. The p-type and n-type regions form p-n junctions that, among other advantages, allow for relatively high conversion efficiency.
Abstract: In one embodiment, a technique for managing an electronic data representation includes storing first and second attributes in response to the creation of the electronic data representation by a user. The electronic data representation may be any type of digital asset, for example. The first and second attributes may be accessed in response to a message including the digital asset being sent by another or the same user. The message may be allowed to pass from a first domain (e.g., a trusted domain) to a second domain (e.g., an open domain) or the message may be maintained in the first domain in response to the first and second attributes. The first attributes may be an asset signature including an identifier and a digital watermark, for example. The second attributes may be an asset policy including distribution lists for sending and/or receiving the message, a content appropriate for sending field, and a time frame for message sending, for example.