Patent application number | Description | Published |
20080231341 | OVER-VOLTAGE TOLERANT PASS-GATE - A pass-gate having a single or parallel opposite polarity FETs is disclosed. The wells of the primary transistor switches are driven from circuitry that reduces over-voltage leakage and other malfunctions. A circuit that drives the wells is also used to power enable circuits that drive the gates of the pass transistors. The use of separate circuits to the gate and the wells further reduces leakage. In the condition of power supply voltage and signal levels that are near the thresholds of the FETs involved, one or more Schottky diodes may be used across pn junctions in the FETs that will prevent turning on the pn junctions. | 09-25-2008 |
20120126625 | POWER MANAGEMENT WITH OVER VOLTAGE PROTECTION - This document discusses, among other things, systems and methods to provide an internal supply rail with over voltage protection using a host power source, an external power source, and a switch configured to receive indications of host and external power source validity. In an example, the switch can be configured to provide the internal supply rail using the host power source when the indication of host power source validity indicates a valid host power source and the external power source when the indication of host power source validity indicates an invalid host power source and the indication of external power source validity indicates a valid external power source. | 05-24-2012 |
20140219442 | SECURE CRYPTO KEY GENERATION AND DISTRIBUTION - This document discusses, among other things, a method of distributing authentication keys that can prevent certain forms of circuit fabrication piracy. In an example, a method can include selecting a number of authentication keys for generation at a key generation computer, generating a random number using a random number generator of the key generation computer, generating the number of authentication keys using the random number and a key generation algorithm stored in the memory of the key generation computer, scrambling each of the number of authentication keys using a scrambling routine executing on the key generation computer, and distributing the scrambled authentication keys to an authorized manufacturers. | 08-07-2014 |
20140223557 | PERMANENT LOCKOUT ATTACK DETECTION - This document discusses, among other things, an attack detection module configured to permanently shut down a slave device after a number of consecutive attacks. | 08-07-2014 |
20150326970 | AUDIO JACK INSERTION/REMOVAL FAULT DETECTION - This document discusses, among other things, circuits and methods for providing an indication of an impedance between a detecting pin and a first signal pin of an audio socket using first and second comparators to, among other things, determine if moisture is present in the audio socket. If moisture is present in the audio socket, communication between an audio processing unit and the audio socket can be disabled. | 11-12-2015 |