Patents by Inventor Chih-Hung Chou

Chih-Hung Chou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240114688
    Abstract: A memory structure including a substrate, a first doped region, a second doped region, a first gate, a second gate, a first charge storage structure, and a second charge storage structure is provided. The first gate is located on the first doped region. The second gate is located on the second doped region. The first charge storage structure is located between the first gate and the first doped region. The first charge storage structure includes a first tunneling dielectric layer, a first dielectric layer, and a first charge storage layer. The second charge storage structure is located between the second gate and the second doped region. The second charge storage structure includes a second tunneling dielectric layer, a second dielectric layer, and a second charge storage layer. The thickness of the second tunneling dielectric layer is greater than the thickness of the first tunneling dielectric layer.
    Type: Application
    Filed: November 21, 2022
    Publication date: April 4, 2024
    Applicant: United Microelectronics Corp.
    Inventors: Chia-Wen Wang, Chien-Hung Chen, Chia-Hui Huang, Ling Hsiu Chou, Jen Yang Hsueh, Chih-Yang Hsu
  • Patent number: 11948936
    Abstract: The present disclosure provides a semiconductor device. The semiconductor device includes a fin disposed in a first region of the semiconductor device, channel members disposed in a second region of the semiconductor device and stacked in a vertical direction, first and second metal gates disposed on a top surface of the fin, a third metal gate wrapping around each of the channel members, a first implant region in the fin with a first conductivity type, and a second implant region in the fin with a second conductivity opposite the first conductivity type. The fin includes first and second type epitaxial layers alternatingly disposed in the vertical direction. The first and second type epitaxial layers have different material compositions. The first type epitaxial layers and the channel members have the same material composition.
    Type: Grant
    Filed: April 24, 2023
    Date of Patent: April 2, 2024
    Assignee: TAIWAN SEMICONDUCTOR MANUFACTURING CO., LTD.
    Inventors: Chih-Hung Wang, Chih Chieh Yeh, Zi-Ang Su, Chia-Ju Chou, Ming-Shuan Li
  • Publication number: 20240087953
    Abstract: A semiconductor device and method of formation are provided. The semiconductor device comprises a silicide layer over a substrate, a metal plug in an opening defined by a dielectric layer over the substrate, a first metal layer between the metal plug and the dielectric layer and between the metal plug and the silicide layer, a second metal layer over the first metal layer, and an amorphous layer between the first metal layer and the second metal layer.
    Type: Application
    Filed: November 22, 2023
    Publication date: March 14, 2024
    Inventors: Yu-Hung Lin, Sheng-Hsuan Lin, Chih-Wei Chang, You-Hua Chou
  • Publication number: 20240079485
    Abstract: A high electron mobility transistor device including a channel layer, a first barrier layer, and a P-type gallium nitride layer is provided. The first barrier layer is disposed on the channel layer. The P-type gallium nitride layer is disposed on the first barrier layer. The first thickness of the first barrier layer located directly under the P-type gallium nitride layer is greater than the second thickness of the first barrier layer located on two sides of the P-type gallium nitride layer.
    Type: Application
    Filed: October 27, 2022
    Publication date: March 7, 2024
    Applicant: Powerchip Semiconductor Manufacturing Corporation
    Inventors: Jih-Wen Chou, Chih-Hung Lu, Bo-An Tsai, Zheng-Chang Mu, Po-Hsien Yeh, Robin Christine Hwang
  • Patent number: 11780877
    Abstract: The present invention provides a method of sugar-guided modifying a glycosylated polypeptide. First, a boronic acid group of a probe molecule and a sugar group of the glycosylated polypeptide form a first covalent bond. Next, an alkyne group of a modifying group and an azide group of the probe molecule form a second covalent bond by adding a promoter. As a result, the modifying group can be close to the glycosylated polypeptide. Then, the modifying group can bind to a nucleophilic residue that is near the sugar group, through a nucleophilic addition reaction. The method of the present invention can selectively modify a given site with the guidance of the sugar group.
    Type: Grant
    Filed: September 28, 2022
    Date of Patent: October 10, 2023
    Assignee: NATIONAL SUN YAT-SEN UNIVERSITY
    Inventors: Po-Chiao Lin, Chih-Hung Chou
  • Publication number: 20230137869
    Abstract: The present invention provides a method of sugar-guided modifying a glycosylated polypeptide. First, a boronic acid group of a probe molecule and a sugar group of the glycosylated polypeptide form a first covalent bond. Next, an alkyne group of a modifying group and an azide group of the probe molecule form a second covalent bond by adding a promoter. As a result, the modifying group can be close to the glycosylated polypeptide. Then, the modifying group can bind to a nucleophilic residue that is near the sugar group, through a nucleophilic addition reaction. The method of the present invention can selectively modify a given site with the guidance of the sugar group.
    Type: Application
    Filed: September 28, 2022
    Publication date: May 4, 2023
    Applicant: National Sun Yat-Sen University
    Inventors: Po-Chiao Lin, Chih-Hung Chou
  • Patent number: 11381595
    Abstract: Preventing Transport Layer Security session man-in-the-middle attacks is provided. A first security digest generated by an endpoint device is compared with a second security digest received from a peer device. It is determined whether a match exists between the first security digest and the second security digest based on the comparison. In response to determining that a match does not exist between the first security digest and the second security digest, a man-in-the-middle attack is detected and a network connection for a Transport Layer Security session is terminated with the peer device.
    Type: Grant
    Filed: November 9, 2018
    Date of Patent: July 5, 2022
    Assignee: International Business Machines Corporation
    Inventors: Wei-Hsiang Hsiung, Sheng-Tung Hsu, Kuo-Chun Chen, Chih-Hung Chou
  • Patent number: 11370062
    Abstract: A multifunctional shaft apparatus includes a shaft base, a spindle, a tool holder, an ultrasonic vibration assembly, a laser light source and a mirror assembly. The spindle is disposed in the shaft base. The spindle has a laser channel extending along the spindle. The tool holder is disposed on the spindle. The tool holder has a hollow passage, an inner space and a recessed portion. The hollow passage is communicated with the laser channel. An inner wall of the hollow passage has at least one through hole communicated with the inner space, and the recessed portion is disposed on a bottom surface of the tool holder. The bottom surface has a light outlet. The ultrasonic vibration assembly includes a vibration member disposed in the recessed portion. The mirror assembly is disposed in the tool holder and is configured to reflect the laser light beam generated by the laser light source.
    Type: Grant
    Filed: November 28, 2019
    Date of Patent: June 28, 2022
    Assignees: METAL INDUSTRIES RESEARCH & DEVELOPMENT CENTRE, PARFAITE TOOL CO., LTD.
    Inventors: Yu-Ting Lyu, Yu-Fu Lin, Jui-Teng Chen, Chih-Hung Chou
  • Patent number: 11122077
    Abstract: Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a system for network protection, the method comprising determining, by the processor, if an incoming connection comprising one or more packets has a false latency larger than a trigger latency; determining, by the processor, if an attack is currently in progress; and if the attack is in progress, injecting, by the processor, at least one of the one or more packets of the incoming connection or one or more packets of an outgoing connection with a false latency.
    Type: Grant
    Filed: January 14, 2020
    Date of Patent: September 14, 2021
    Assignee: International Business Machines Corporation
    Inventors: Chih-Hung Chou, Cheng-ta Lee, Yin Lee, Chun-Shuo Lin
  • Patent number: 10834074
    Abstract: An example operation may include one or more of obtaining a request to validate an application with respect to an OAuth provider, identifying a previously registered digital signature of the application, generating verification information of the application based on the identified digital signature of the application, and passing the generated verification information of the application to the OAuth provider via a user login page.
    Type: Grant
    Filed: August 17, 2018
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Jiande Jiang, Sheng Hao Wang, Chih-Hung Chou, Kuo-Chun Chen
  • Patent number: 10792767
    Abstract: A laser preheating control method is applied to a laser preheating control device. When a cutter processes a workpiece along a process path, a laser source of the device is provided to output a laser beam to the workpiece for selectively forming a laser spot on the workpiece surface. And according to a movement direction of the cutter, a laser controller of the device is provided to form the laser spot only on a preheating region of the workpiece, where in front of the cutter in the process path, for preheating the workpiece in the preheating region. As a result, the laser spot will not repeatedly heat the workpiece behind the cutter in the process path, and the qualitative change of the workpiece caused by repeating heating is preventable.
    Type: Grant
    Filed: December 26, 2017
    Date of Patent: October 6, 2020
    Assignees: Metal Industries Research & Development Centre, Parfaite Tool Co., Ltd.
    Inventors: Yu-Ting Lu, Yu-Fu Lin, Jui-Teng Chen, Wen-Long Chang, Chih-Hung Chou
  • Publication number: 20200189030
    Abstract: A multifunctional shaft apparatus includes a shaft base, a spindle, a tool holder, an ultrasonic vibration assembly, a laser light source and a mirror assembly. The spindle is disposed in the shaft base. The spindle has a laser channel extending along the spindle. The tool holder is disposed on the spindle. The tool holder has a hollow passage, an inner space and a recessed portion. The hollow passage is communicated with the laser channel. An inner wall of the hollow passage has at least one through hole communicated with the inner space, and the recessed portion is disposed on a bottom surface of the tool holder. The bottom surface has a light outlet. The ultrasonic vibration assembly includes a vibration member disposed in the recessed portion. The mirror assembly is disposed in the tool holder and is configured to reflect the laser light beam generated by the laser light source.
    Type: Application
    Filed: November 28, 2019
    Publication date: June 18, 2020
    Inventors: Yu-Ting LYU, Yu-Fu LIN, Jui-Teng CHEN, Chih-Hung CHOU
  • Publication number: 20200153859
    Abstract: Preventing Transport Layer Security session man-in-the-middle attacks is provided. A first security digest generated by an endpoint device is compared with a second security digest received from a peer device. It is determined whether a match exists between the first security digest and the second security digest based on the comparison. In response to determining that a match does not exist between the first security digest and the second security digest, a man-in-the-middle attack is detected and a network connection for a Transport Layer Security session is terminated with the peer device.
    Type: Application
    Filed: November 9, 2018
    Publication date: May 14, 2020
    Inventors: Wei-Hsiang Hsiung, Sheng-Tung Hsu, Kuo-Chun Chen, Chih-Hung Chou
  • Publication number: 20200153857
    Abstract: Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a system for network protection, the method comprising determining, by the processor, if an incoming connection comprising one or more packets has a false latency larger than a trigger latency; determining, by the processor, if an attack is currently in progress; and if the attack is in progress, injecting, by the processor, at least one of the one or more packets of the incoming connection or one or more packets of an outgoing connection with a false latency.
    Type: Application
    Filed: January 14, 2020
    Publication date: May 14, 2020
    Inventors: Chih-Hung Chou, Cheng-ta Lee, Yin Lee, Chun-Shuo Lin
  • Patent number: 10609068
    Abstract: Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a system for network protection, the method comprising determining, by the analyzing unit, if an incoming connection comprising one or more packets has a false latency larger than a trigger latency; if the incoming connection latency is larger than the trigger latency, reporting, by the analyzing unit, the incoming connection as a suspicious connection; determining, by the analyzing unit, if an attack is currently in progress; and if the attack is in progress, injecting, by the analyzing unit, at least one of the one or more packets of the incoming connection or one or more packets of an outgoing connection with a false latency.
    Type: Grant
    Filed: October 18, 2017
    Date of Patent: March 31, 2020
    Assignee: International Business Machines Corporation
    Inventors: Chih-Hung Chou, Cheng-ta Lee, Yin Lee, Chun-Shuo Lin
  • Patent number: 10587634
    Abstract: A system, method and computer program product for detecting distributed denial-of-service (DDoS) attacks is provided. Current aggregated flow information for a defined period of time is analyzed. It is determined whether network flow increased above a defined flow threshold value to a second data processing system connected to a network within the defined period of time based on analyzing the current aggregated flow information. In response to determining that the network flow has increased above the defined flow threshold value to the second data processing system connected to the network within the defined period of time, it is determined that the second data processing system is under a DDoS attack.
    Type: Grant
    Filed: October 15, 2018
    Date of Patent: March 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Kuo-Chun Chen, Chih-Hung Chou, Wei-Hsiang Hsiung, Sheng-Tung Hsu
  • Publication number: 20200059466
    Abstract: An example operation may include one or more of obtaining a request to validate an application with respect to an OAuth provider, identifying a previously registered digital signature of the application, generating verification information of the application based on the identified digital signature of the application, and passing the generated verification information of the application to the OAuth provider via a user login page.
    Type: Application
    Filed: August 17, 2018
    Publication date: February 20, 2020
    Inventors: Jiande Jiang, Sheng Hao Wang, Chih-Hung Chou, Kuo-Chun Chen
  • Patent number: 10491625
    Abstract: A system and computer program product for preventing abnormal application activity is provided. Packets are retrieved from a packet buffer using packet location information corresponding to information associated with the abnormal application activity in a data processing system. The packets are analyzed to identify content of the network packets causing the abnormal application activity. Network packets containing the content causing the abnormal application activity in the data processing system are blocked.
    Type: Grant
    Filed: October 3, 2017
    Date of Patent: November 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Kuo-Chun Chen, Chih-Hung Chou, Wei-Hsiang Hsiung, Sheng-Tung Hsu
  • Patent number: 10484420
    Abstract: A method for preventing abnormal application activity is provided. Packets are retrieved from a packet buffer using packet location information corresponding to information associated with the abnormal application activity in a data processing system. The packets are analyzed to identify content of the network packets causing the abnormal application activity. Network packets containing the content causing the abnormal application activity in the data processing system are blocked.
    Type: Grant
    Filed: November 14, 2017
    Date of Patent: November 19, 2019
    Assignee: International Business Machines Corporation
    Inventors: Kuo-Chun Chen, Chih-Hung Chou, Wei-Hsiang Hsiung, Sheng-Tung Hsu
  • Publication number: 20190143457
    Abstract: A laser preheating control method is applied to a laser preheating control device. When a cutter processes a workpiece along a process path, a laser source of the device is provided to output a laser beam to the workpiece for selectively forming a laser spot on the workpiece surface. And according to a movement direction of the cutter, a laser controller of the device is provided to form the laser spot only on a preheating region of the workpiece, where in front of the cutter in the process path, for preheating the workpiece in the preheating region. As a result, the laser spot will not repeatedly heat the workpiece behind the cutter in the process path, and the qualitative change of the workpiece caused by repeating heating is preventable.
    Type: Application
    Filed: December 26, 2017
    Publication date: May 16, 2019
    Inventors: Yu-Ting Lu, Yu-Fu Lin, Jui-Teng Chen, Wen-Long Chang, Chih-Hung Chou