Patents by Inventor Chih-Hung Chou
Chih-Hung Chou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240114688Abstract: A memory structure including a substrate, a first doped region, a second doped region, a first gate, a second gate, a first charge storage structure, and a second charge storage structure is provided. The first gate is located on the first doped region. The second gate is located on the second doped region. The first charge storage structure is located between the first gate and the first doped region. The first charge storage structure includes a first tunneling dielectric layer, a first dielectric layer, and a first charge storage layer. The second charge storage structure is located between the second gate and the second doped region. The second charge storage structure includes a second tunneling dielectric layer, a second dielectric layer, and a second charge storage layer. The thickness of the second tunneling dielectric layer is greater than the thickness of the first tunneling dielectric layer.Type: ApplicationFiled: November 21, 2022Publication date: April 4, 2024Applicant: United Microelectronics Corp.Inventors: Chia-Wen Wang, Chien-Hung Chen, Chia-Hui Huang, Ling Hsiu Chou, Jen Yang Hsueh, Chih-Yang Hsu
-
Patent number: 11948936Abstract: The present disclosure provides a semiconductor device. The semiconductor device includes a fin disposed in a first region of the semiconductor device, channel members disposed in a second region of the semiconductor device and stacked in a vertical direction, first and second metal gates disposed on a top surface of the fin, a third metal gate wrapping around each of the channel members, a first implant region in the fin with a first conductivity type, and a second implant region in the fin with a second conductivity opposite the first conductivity type. The fin includes first and second type epitaxial layers alternatingly disposed in the vertical direction. The first and second type epitaxial layers have different material compositions. The first type epitaxial layers and the channel members have the same material composition.Type: GrantFiled: April 24, 2023Date of Patent: April 2, 2024Assignee: TAIWAN SEMICONDUCTOR MANUFACTURING CO., LTD.Inventors: Chih-Hung Wang, Chih Chieh Yeh, Zi-Ang Su, Chia-Ju Chou, Ming-Shuan Li
-
Publication number: 20240087953Abstract: A semiconductor device and method of formation are provided. The semiconductor device comprises a silicide layer over a substrate, a metal plug in an opening defined by a dielectric layer over the substrate, a first metal layer between the metal plug and the dielectric layer and between the metal plug and the silicide layer, a second metal layer over the first metal layer, and an amorphous layer between the first metal layer and the second metal layer.Type: ApplicationFiled: November 22, 2023Publication date: March 14, 2024Inventors: Yu-Hung Lin, Sheng-Hsuan Lin, Chih-Wei Chang, You-Hua Chou
-
Publication number: 20240079485Abstract: A high electron mobility transistor device including a channel layer, a first barrier layer, and a P-type gallium nitride layer is provided. The first barrier layer is disposed on the channel layer. The P-type gallium nitride layer is disposed on the first barrier layer. The first thickness of the first barrier layer located directly under the P-type gallium nitride layer is greater than the second thickness of the first barrier layer located on two sides of the P-type gallium nitride layer.Type: ApplicationFiled: October 27, 2022Publication date: March 7, 2024Applicant: Powerchip Semiconductor Manufacturing CorporationInventors: Jih-Wen Chou, Chih-Hung Lu, Bo-An Tsai, Zheng-Chang Mu, Po-Hsien Yeh, Robin Christine Hwang
-
Patent number: 11780877Abstract: The present invention provides a method of sugar-guided modifying a glycosylated polypeptide. First, a boronic acid group of a probe molecule and a sugar group of the glycosylated polypeptide form a first covalent bond. Next, an alkyne group of a modifying group and an azide group of the probe molecule form a second covalent bond by adding a promoter. As a result, the modifying group can be close to the glycosylated polypeptide. Then, the modifying group can bind to a nucleophilic residue that is near the sugar group, through a nucleophilic addition reaction. The method of the present invention can selectively modify a given site with the guidance of the sugar group.Type: GrantFiled: September 28, 2022Date of Patent: October 10, 2023Assignee: NATIONAL SUN YAT-SEN UNIVERSITYInventors: Po-Chiao Lin, Chih-Hung Chou
-
Publication number: 20230137869Abstract: The present invention provides a method of sugar-guided modifying a glycosylated polypeptide. First, a boronic acid group of a probe molecule and a sugar group of the glycosylated polypeptide form a first covalent bond. Next, an alkyne group of a modifying group and an azide group of the probe molecule form a second covalent bond by adding a promoter. As a result, the modifying group can be close to the glycosylated polypeptide. Then, the modifying group can bind to a nucleophilic residue that is near the sugar group, through a nucleophilic addition reaction. The method of the present invention can selectively modify a given site with the guidance of the sugar group.Type: ApplicationFiled: September 28, 2022Publication date: May 4, 2023Applicant: National Sun Yat-Sen UniversityInventors: Po-Chiao Lin, Chih-Hung Chou
-
Patent number: 11381595Abstract: Preventing Transport Layer Security session man-in-the-middle attacks is provided. A first security digest generated by an endpoint device is compared with a second security digest received from a peer device. It is determined whether a match exists between the first security digest and the second security digest based on the comparison. In response to determining that a match does not exist between the first security digest and the second security digest, a man-in-the-middle attack is detected and a network connection for a Transport Layer Security session is terminated with the peer device.Type: GrantFiled: November 9, 2018Date of Patent: July 5, 2022Assignee: International Business Machines CorporationInventors: Wei-Hsiang Hsiung, Sheng-Tung Hsu, Kuo-Chun Chen, Chih-Hung Chou
-
Patent number: 11370062Abstract: A multifunctional shaft apparatus includes a shaft base, a spindle, a tool holder, an ultrasonic vibration assembly, a laser light source and a mirror assembly. The spindle is disposed in the shaft base. The spindle has a laser channel extending along the spindle. The tool holder is disposed on the spindle. The tool holder has a hollow passage, an inner space and a recessed portion. The hollow passage is communicated with the laser channel. An inner wall of the hollow passage has at least one through hole communicated with the inner space, and the recessed portion is disposed on a bottom surface of the tool holder. The bottom surface has a light outlet. The ultrasonic vibration assembly includes a vibration member disposed in the recessed portion. The mirror assembly is disposed in the tool holder and is configured to reflect the laser light beam generated by the laser light source.Type: GrantFiled: November 28, 2019Date of Patent: June 28, 2022Assignees: METAL INDUSTRIES RESEARCH & DEVELOPMENT CENTRE, PARFAITE TOOL CO., LTD.Inventors: Yu-Ting Lyu, Yu-Fu Lin, Jui-Teng Chen, Chih-Hung Chou
-
Patent number: 11122077Abstract: Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a system for network protection, the method comprising determining, by the processor, if an incoming connection comprising one or more packets has a false latency larger than a trigger latency; determining, by the processor, if an attack is currently in progress; and if the attack is in progress, injecting, by the processor, at least one of the one or more packets of the incoming connection or one or more packets of an outgoing connection with a false latency.Type: GrantFiled: January 14, 2020Date of Patent: September 14, 2021Assignee: International Business Machines CorporationInventors: Chih-Hung Chou, Cheng-ta Lee, Yin Lee, Chun-Shuo Lin
-
Patent number: 10834074Abstract: An example operation may include one or more of obtaining a request to validate an application with respect to an OAuth provider, identifying a previously registered digital signature of the application, generating verification information of the application based on the identified digital signature of the application, and passing the generated verification information of the application to the OAuth provider via a user login page.Type: GrantFiled: August 17, 2018Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Jiande Jiang, Sheng Hao Wang, Chih-Hung Chou, Kuo-Chun Chen
-
Patent number: 10792767Abstract: A laser preheating control method is applied to a laser preheating control device. When a cutter processes a workpiece along a process path, a laser source of the device is provided to output a laser beam to the workpiece for selectively forming a laser spot on the workpiece surface. And according to a movement direction of the cutter, a laser controller of the device is provided to form the laser spot only on a preheating region of the workpiece, where in front of the cutter in the process path, for preheating the workpiece in the preheating region. As a result, the laser spot will not repeatedly heat the workpiece behind the cutter in the process path, and the qualitative change of the workpiece caused by repeating heating is preventable.Type: GrantFiled: December 26, 2017Date of Patent: October 6, 2020Assignees: Metal Industries Research & Development Centre, Parfaite Tool Co., Ltd.Inventors: Yu-Ting Lu, Yu-Fu Lin, Jui-Teng Chen, Wen-Long Chang, Chih-Hung Chou
-
Publication number: 20200189030Abstract: A multifunctional shaft apparatus includes a shaft base, a spindle, a tool holder, an ultrasonic vibration assembly, a laser light source and a mirror assembly. The spindle is disposed in the shaft base. The spindle has a laser channel extending along the spindle. The tool holder is disposed on the spindle. The tool holder has a hollow passage, an inner space and a recessed portion. The hollow passage is communicated with the laser channel. An inner wall of the hollow passage has at least one through hole communicated with the inner space, and the recessed portion is disposed on a bottom surface of the tool holder. The bottom surface has a light outlet. The ultrasonic vibration assembly includes a vibration member disposed in the recessed portion. The mirror assembly is disposed in the tool holder and is configured to reflect the laser light beam generated by the laser light source.Type: ApplicationFiled: November 28, 2019Publication date: June 18, 2020Inventors: Yu-Ting LYU, Yu-Fu LIN, Jui-Teng CHEN, Chih-Hung CHOU
-
Publication number: 20200153859Abstract: Preventing Transport Layer Security session man-in-the-middle attacks is provided. A first security digest generated by an endpoint device is compared with a second security digest received from a peer device. It is determined whether a match exists between the first security digest and the second security digest based on the comparison. In response to determining that a match does not exist between the first security digest and the second security digest, a man-in-the-middle attack is detected and a network connection for a Transport Layer Security session is terminated with the peer device.Type: ApplicationFiled: November 9, 2018Publication date: May 14, 2020Inventors: Wei-Hsiang Hsiung, Sheng-Tung Hsu, Kuo-Chun Chen, Chih-Hung Chou
-
Publication number: 20200153857Abstract: Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a system for network protection, the method comprising determining, by the processor, if an incoming connection comprising one or more packets has a false latency larger than a trigger latency; determining, by the processor, if an attack is currently in progress; and if the attack is in progress, injecting, by the processor, at least one of the one or more packets of the incoming connection or one or more packets of an outgoing connection with a false latency.Type: ApplicationFiled: January 14, 2020Publication date: May 14, 2020Inventors: Chih-Hung Chou, Cheng-ta Lee, Yin Lee, Chun-Shuo Lin
-
Patent number: 10609068Abstract: Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a system for network protection, the method comprising determining, by the analyzing unit, if an incoming connection comprising one or more packets has a false latency larger than a trigger latency; if the incoming connection latency is larger than the trigger latency, reporting, by the analyzing unit, the incoming connection as a suspicious connection; determining, by the analyzing unit, if an attack is currently in progress; and if the attack is in progress, injecting, by the analyzing unit, at least one of the one or more packets of the incoming connection or one or more packets of an outgoing connection with a false latency.Type: GrantFiled: October 18, 2017Date of Patent: March 31, 2020Assignee: International Business Machines CorporationInventors: Chih-Hung Chou, Cheng-ta Lee, Yin Lee, Chun-Shuo Lin
-
Patent number: 10587634Abstract: A system, method and computer program product for detecting distributed denial-of-service (DDoS) attacks is provided. Current aggregated flow information for a defined period of time is analyzed. It is determined whether network flow increased above a defined flow threshold value to a second data processing system connected to a network within the defined period of time based on analyzing the current aggregated flow information. In response to determining that the network flow has increased above the defined flow threshold value to the second data processing system connected to the network within the defined period of time, it is determined that the second data processing system is under a DDoS attack.Type: GrantFiled: October 15, 2018Date of Patent: March 10, 2020Assignee: International Business Machines CorporationInventors: Kuo-Chun Chen, Chih-Hung Chou, Wei-Hsiang Hsiung, Sheng-Tung Hsu
-
Publication number: 20200059466Abstract: An example operation may include one or more of obtaining a request to validate an application with respect to an OAuth provider, identifying a previously registered digital signature of the application, generating verification information of the application based on the identified digital signature of the application, and passing the generated verification information of the application to the OAuth provider via a user login page.Type: ApplicationFiled: August 17, 2018Publication date: February 20, 2020Inventors: Jiande Jiang, Sheng Hao Wang, Chih-Hung Chou, Kuo-Chun Chen
-
Patent number: 10491625Abstract: A system and computer program product for preventing abnormal application activity is provided. Packets are retrieved from a packet buffer using packet location information corresponding to information associated with the abnormal application activity in a data processing system. The packets are analyzed to identify content of the network packets causing the abnormal application activity. Network packets containing the content causing the abnormal application activity in the data processing system are blocked.Type: GrantFiled: October 3, 2017Date of Patent: November 26, 2019Assignee: International Business Machines CorporationInventors: Kuo-Chun Chen, Chih-Hung Chou, Wei-Hsiang Hsiung, Sheng-Tung Hsu
-
Patent number: 10484420Abstract: A method for preventing abnormal application activity is provided. Packets are retrieved from a packet buffer using packet location information corresponding to information associated with the abnormal application activity in a data processing system. The packets are analyzed to identify content of the network packets causing the abnormal application activity. Network packets containing the content causing the abnormal application activity in the data processing system are blocked.Type: GrantFiled: November 14, 2017Date of Patent: November 19, 2019Assignee: International Business Machines CorporationInventors: Kuo-Chun Chen, Chih-Hung Chou, Wei-Hsiang Hsiung, Sheng-Tung Hsu
-
Publication number: 20190143457Abstract: A laser preheating control method is applied to a laser preheating control device. When a cutter processes a workpiece along a process path, a laser source of the device is provided to output a laser beam to the workpiece for selectively forming a laser spot on the workpiece surface. And according to a movement direction of the cutter, a laser controller of the device is provided to form the laser spot only on a preheating region of the workpiece, where in front of the cutter in the process path, for preheating the workpiece in the preheating region. As a result, the laser spot will not repeatedly heat the workpiece behind the cutter in the process path, and the qualitative change of the workpiece caused by repeating heating is preventable.Type: ApplicationFiled: December 26, 2017Publication date: May 16, 2019Inventors: Yu-Ting Lu, Yu-Fu Lin, Jui-Teng Chen, Wen-Long Chang, Chih-Hung Chou