Integrated circuits with persistent data storage
First Claim
Patent Images
1. A timing delay circuit, comprising:
- at least one inverter coupled to an input voltage line;
a transistor coupled to the at least one inverter;
a dielectric charge storage portion coupled to the transistor for storing a dielectric capacitance;
a junction capacitance portion coupled to the transistor for storing a junction capacitance; and
a logic gate coupled to the dielectric charge storage portion;
a code comparator coupled to the logic gate, the code comparator to receive a destruct command; and
wherein the timing delay circuit forms a portion of an RFID device, and wherein the destruct command, when enabled, destroys the RFID device.
5 Assignments
0 Petitions
Accused Products
Abstract
The circuitry introduced in this invention selectively slows down the functioning of an electronic circuit maintaining a particular state for a prolonged period of time. This circuitry is used not only to achieve the desired effect in maintaining security from electronic thieves trying to circumvent codes but also in other applications such as enabling a circuit to continue to function in the event of a brief loss of power. For example, in an RFID system, if a reader is frequency hopping, a tag loses power for as long as about 400 milliseconds when the reader changes to other frequencies. In a preferred embodiment, the disclosed circuitry is used in conjunction with a destruct sequence.
-
Citations
9 Claims
-
1. A timing delay circuit, comprising:
-
at least one inverter coupled to an input voltage line;
a transistor coupled to the at least one inverter;
a dielectric charge storage portion coupled to the transistor for storing a dielectric capacitance;
a junction capacitance portion coupled to the transistor for storing a junction capacitance; and
a logic gate coupled to the dielectric charge storage portion;
a code comparator coupled to the logic gate, the code comparator to receive a destruct command; and
wherein the timing delay circuit forms a portion of an RFID device, and wherein the destruct command, when enabled, destroys the RFID device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification