-
公开(公告)号:MY185098A
公开(公告)日:2021-04-30
申请号:MYPI2014002536
申请日:2014-08-29
Applicant: MIMOS BERHAD
Abstract: The present invention relates to a method for manufacturing a large Schottky diode. Thme present invention comprising: depositing a contact etch stop layer (CESL) on top of the gate oxide and trench array structure (600); depositing (700) and planarizing (800) a pre-metal dielectric to produce flat topography on the top surface; patterning (900) and etching (1000, 1100) the dielectric layers using plasma etch method; and conducting wet etching to remove the dielectric layer completely from contact area (1200). The present invention provides a robust fabrication method of producing a large area of trench Schottky diode with better protection to the trench guard ring structure. The structure of the diode technically directly affects the reverse leakage current of the diode. Due to that, it is important to produce the diode without structure damage at guard ring area in order to reduce and stabilize reverse leakage current.
-
公开(公告)号:MY184944A
公开(公告)日:2021-04-30
申请号:MYPI2014702046
申请日:2014-07-24
Applicant: MIMOS BERHAD
Inventor: ALWYN GOH , NG KANG SIONG , SEA CHONG SEAK , THILLAI RAJ T RAMANATHAN
Abstract: The present invention discloses a method and system for computation and verification of authentication parameters between two entities, an originating entity and a receiving entity, which in the embodiment of interest comprises a server (100), a client interface thereof (110), a human user (120) and a trusted system (130) deemed as such by the human user. The method comprises the user (120) authenticating the server (100) by visual comparison of an authentication code in numeric, symbolic, graphical or visual-interactive form computed by the server (100) in comparison to a plurality of reference codes computed on the trusted system (130); and reciprocally the server (100) authenticating the user (120) subsequent to transcription or transfer of an authentication code, as computed and displayed on the trusted system (130), to the client interface (110) and thenceforth to the server (100),by means of comparison of the test code to a plurality of reference codes computed on the server (100). The method of computation and verification of the authentication codes as aforesaid are by means of zero knowledge (ZK) transformation of time, location or service-specific information; with measurement or determination of time or location information as independently undertaken on server (100) and trusted system (130). The most illustrative drawing: FIGURE 1
-
公开(公告)号:MY184711A
公开(公告)日:2021-04-19
申请号:MYPI2013700746
申请日:2013-05-08
Applicant: MIMOS BERHAD , MULTIMEDIA UNIV
Inventor: ETTIKAN KANDASAMY A/L KARUPPIAH , SHAHIRINA BINTI MOHD TAHIR , ONG PENG SHEN , CHANG YOONG CHOON , OOI CHEE PUN
Abstract: The present invention relates to a system and method for detecting an object. The system and method reduce the amount of computations needed in detecting and tracking the moving object by predicting the motion of the object in the following frames. Thus, the system (1000) is able to focus on computing a portion of the frame where the object has been predicted to be in. The system (1000) comprises of an image acquisition module (1100), a buffering module (1200), a pre-processor (1300), an image sub-segmenting module (1400), an image sub-segment module (1500), a main processor (1600), an object feature extracting module (1700), a predictive module (1800) and an object and priority evaluator (1900). (Figure 1)
-
254.
公开(公告)号:MY184704A
公开(公告)日:2021-04-18
申请号:MYPI2014702836
申请日:2014-09-26
Applicant: MIMOS BERHAD
Inventor: KHAIRUL AZMI BIN ABU BAKAR , NG KANG SIONG , ALWYN GOH , BONG CHIN WEI , DEREK WILLIAM HOLTBY
IPC: H04L9/32
Abstract: The present invention relates to a system and method for authenticating a user based on user behaviour and environmental factors. The system (100) allows the user to access to an application server by evaluating the trust value of environmental and user behaviour factors. The system (100) comprises a Client Platform (101), an Authentication Gateway (102), an Authentication Server (103), an Application Server (104), and a Trust Engine (105). (Figure 1)
-
公开(公告)号:MY184627A
公开(公告)日:2021-04-10
申请号:MYPI2015704572
申请日:2015-12-15
Applicant: MIMOS BERHAD
Inventor: DAHLIA BINTI DIN , SHEERA SHAHEERA BTE OTHMAN TALIB , CHRISHANTON VETHANAYAGAM A/L SEBASTIAMPI , OOI HOEY YEW , EE SING YAN
IPC: G06F9/445 , G06F15/177
Abstract: The present invention relates to a system (100) and method for restoring bulk configuration. The system (100) comprises a server (10) and at least a node (20) connected to the server (10) in a network. The server (10) comprises an Internet Protocol (IP) Monitoring (IPM) module (11) to generate a unique session identification (ID) reference and obtain IP addresses and order dependency; a Bulk Configuration Module (BCM) (12) to send Bulk Restore Configuration (BRC) command with a configuration file; and a Bulk Configuration Report (BCR) module (13) to check for successful application of Bulk Restore Configuration (BRC) file to all the nodes (20). The node (20) comprises a Communication Path Detection Module (CPDM) (22) to detect BRC Initiate which are either incoming to nodes (20) or outgoing from nodes (20); a Communication Path Preservation Module (CPPM) (23) to mark configuration file with preservation markings; and a Configuration Customization Module (CCM) (23) to apply new configuration sections onto current configurations which do not have the preservation markings. (Figure 2)
-
公开(公告)号:MY184604A
公开(公告)日:2021-04-07
申请号:MYPI2013702295
申请日:2013-11-28
Applicant: MIMOS BERHAD
Inventor: YUEN SHANG LI , CHOONG TECK LIONG , HON HOCK WOON , HASMARINA BINTI HASAN , LIANG KIM MENG
Abstract: The present invention relates to a method for estimating a possible route of an incomplete tag access information. The method comprises the steps of by a Region Ontology Generator (30), creating a region ontology for each tag access information received by the Region Ontology Generator (30), setting the row and column of the region ontology according to the connected region identification by the Region Ontology Generator (30), filling up the region ontology with tag identification numbers and need tag values by the Region Ontology Generator (30), generating intensity profile data of a user based on historical access frequency data by an Intensity Profiling Module (50), searching for probable route taken by the user based on the region ontology by a Probably Route Searching Module (70) and estimating the best route based on the probable route found and intensity profile data by a Best Route Estimation module (80). FIG. 1
-
257.
公开(公告)号:MY184557A
公开(公告)日:2021-04-02
申请号:MYPI2014002905
申请日:2014-10-10
Applicant: MIMOS BERHAD
Inventor: TAN KONG YEW
Abstract: A Successive Approximation Analog to Digital Converter, SA-ADC (100) and a method for calibrating thereof has been disclosed. The SA-ADC (100) includes a capacitance measurement circuit (200) which performs frequency based capacitance measurement for calibrating the SA-ADC (100). The capacitance measurement circuit (200) is connected to a Digital to Analog Converter, DAC of SA-ADC (100) once only and thereafter the frequency based capacitance value of capacitors is repeatedly used in conversion cycles. Thus, the capacitance measurement circuit (200) improves conversion rate of conventional successive approximation analog to digital converters and eliminates the need for high accuracy DAC required in conventional SA-ADC.
-
公开(公告)号:MY184480A
公开(公告)日:2021-04-01
申请号:MYPI2016001040
申请日:2016-06-02
Applicant: MIMOS BERHAD
Inventor: DR HANIZA BINTI YON , MOHD IZZUADY IZZUDIN BIN M NAJIMUDIN , NORSYAHIDA BINTI ABD KADIR , AZIMAH BINTI ABDUL KADIR , NUR AYU BINTI JOHAR
Abstract: The present invention provides a system and method for creation of multimedia items by utilizing innovative assessment item generator to assess complex human capabilities and behaviour through interactive digital assessment that includes various multimedia items type that best fits higher order thinking skills capabilities. The present invention comprises a database (102); a server (104); a network (106); and at least one workstation (108). The server (104) further comprising an operating system (202) having an item bank module (202a), question creation module (202b), answer creation module (202c), media presentation module (202d), answer module (202e), item creation module (202f), user requirement module (202g), graphics bank module (202h), item editing module (202i), question module (202j), psychometrics item module (202k) and item security key generator (2021); and a server system (203) within the server (104) having an item bank (203a) and a graphic bank (203b) wherein said operating system (202) and server system (203) enable multimedia item based on complex skills and competencies to be constructed.
-
公开(公告)号:MY184468A
公开(公告)日:2021-04-01
申请号:MYPI2016001224
申请日:2016-06-30
Applicant: MIMOS BERHAD
Inventor: DR CHIEN SU FONG , DR DAVID CHIENG HENG TZE , DR DEREK WILLIAM HOLTBY , DR CHOONG KHONG NENG
Abstract: The present invention relates to an improved method and system for estimating an indoor location of a requesting mobile terminal in an enclosed environment. The method comprises the steps of scanning and recording an arrival timestamp and location information of a beacon broadcasted wireless transceiver units surrounding the requesting mobile terminal (100) in a vector form; processing the arrival timestamp (101) to generate a fingerprint data comprising a set of Eigen data; comparing the fingerprint data against that of a corresponding predetermined radio map using a statistical technique thereby determining an actual grid from the corresponding predetermined radio map that depicts the indoor location of the requesting mobile terminal (102); and sending the actual grid of the indoor location to the requesting mobile terminal (103). The system comprises a location server (200) and a location module (2OOa) arranged in the location server (200).
-
公开(公告)号:MY184389A
公开(公告)日:2021-04-01
申请号:MYPI2013001813
申请日:2013-05-17
Applicant: MIMOS BERHAD
Abstract: A method and system for detecting a keylogger wherein details from the system call requests (201) relating to the keyboard buffer (112) are recorded, and if any suspicious behaviour is identified through monitoring (209) the application log ( I 06) for duplication of information, the system inserts (217) a data pattern as bait into the keyboard buffer such that if the bait is duplicated by an unrelated application, the system confirms (226) that a keylogger has been detected. Figure 1
-
-
-
-
-
-
-
-
-