会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Resistive memory with small electrode and method for fabricating the same
    • 具有小电极的电阻记忆及其制造方法
    • US09142768B2
    • 2015-09-22
    • US13698799
    • 2012-05-02
    • Yimao CaiJun MaoRu HuangShenghu TanYinglong HuangYue Pan
    • Yimao CaiJun MaoRu HuangShenghu TanYinglong HuangYue Pan
    • H01L45/00
    • H01L45/1253H01L45/04H01L45/122H01L45/1233H01L45/1273H01L45/146H01L45/1608H01L45/1616H01L45/1625
    • Systems and methods are disclosed involving a resistive memory with a small electrode, relating to the field of semiconductor resistive memory in ULSI. An illustrative resistive memory may include an Al electrode layer, a SiO2 layer, a Si layer, a resistive material layer and a lower electrode layer in sequence, wherein the Al electrode layer and the resistive material layer are electrically connected through one or more conductive channel and the conductive channel is formed by penetrating Al material into the Si layer via defects in the SiO2 layer and dissolving Si material into the Al material. Methods may include forming a lower electrode layer, a resistive layer, a Si layer and a SiO2 layer over a substrate; fabricating a Al electrode layer over the SiO2 layer; and performing an anneal process to the resultant structure. Consistent with innovations herein, a small electrode may be obtained via a conventional process.
    • 公开了涉及具有与ULSI中的半导体电阻性存储器的领域相关的具有小电极的电阻性存储器的系统和方法。 示例性电阻存储器可以依次包括Al电极层,SiO 2层,Si层,电阻材料层和下电极层,其中Al电极层和电阻材料层通过一个或多个导电沟道电连接 并且通过SiO 2层中的缺陷将Al材料穿过Si层而将Si材料溶解到Al材料中而形成导电通道。 方法可以包括在衬底上形成下电极层,电阻层,Si层和SiO 2层; 在SiO 2层上制造Al电极层; 对所得到的结构进行退火处理。 与本文的创新一致,可以通过常规方法获得小电极。
    • 8. 发明授权
    • Identifying application sources on non-rooted devices
    • 在无根设备上识别应用程序源
    • US09092615B1
    • 2015-07-28
    • US13752026
    • 2013-01-28
    • Jun MaoAbubakar Wawda
    • Jun MaoAbubakar Wawda
    • G06F11/00G06F21/51
    • G06F21/51G06F2221/2149
    • A method and apparatus for identifying an application source from which an application is installed on a non-rooted computing device. An application source identifier of a security application that does not have root access to an operating system monitors for an application installation. The application source identifier extracts a process identifier (PID) of the application being installed from a log message associated with the application installation and determines a package name from the PID. The PID identifies an application source from which the application is installed. The application source identifier receives, based on the package name, a confidence level for the application source from a security service over a network.
    • 一种用于识别应用程序在非根系计算设备上安装应用程序的方法和装置。 不具有对操作系统的根访问权限的安全应用程序的应用程序源标识符监视应用程序安装。 应用程序源标识符从与应用程序安装相关联的日志消息中提取正在安装的应用程序的进程标识符(PID),并从PID确定程序包名称。 PID标识安装应用程序的应用程序源。 应用源标识符基于包名从基于网络的安全服务接收应用源的置信水平。
    • 9. 发明授权
    • Systems and methods for detecting illegitimate applications
    • 用于检测非法应用的系统和方法
    • US08732834B2
    • 2014-05-20
    • US13604422
    • 2012-09-05
    • Jun MaoBruce McCorkendaleBarry LaffoonAbubakar Wawda
    • Jun MaoBruce McCorkendaleBarry LaffoonAbubakar Wawda
    • G06F21/00H04L29/06
    • G06F21/57G06F21/554
    • A computer-implemented method for detecting illegitimate applications may include 1) identifying an installation of an application on a computing system, 2) determining, in response to identifying the installation of the application, that at least one system file with privileged access on the computing system has changed prior to the installation of the application, 3) determining that the application is illegitimate based at least in part on a time of the installation of the application relative to a time of a change to the system file, and 4) performing a remediation action on the application in response to determining that the application is illegitimate. Various other methods, systems, and computer-readable media are also disclosed.
    • 用于检测非法应用的计算机实现的方法可以包括:1)识别计算系统上的应用的安装; 2)响应于识别应用的安装,确定至少一个在计算上具有特权访问的系统文件 系统在安装应用程序之前已经改变,3)至少部分地基于应用程序的安装时间相对于系统文件的更改时间确定该应用是非法的,以及4)执行一个 响应确定应用程序是非法的,对应用程序进行修复操作。 还公开了各种其它方法,系统和计算机可读介质。