Patents by Inventor Kun Yi

Kun Yi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12282771
    Abstract: An addition mask value generator is provided. A first operation circuit is configured to obtain first intermediate data according to first output mask value and fourth output mask value. A second operation circuit is configured to obtain the addition output mask value of a first mask group according to first intermediate data and fourth input mask value. A third operation circuit is configured to obtain second intermediate data according to second output mask value and third output mask value. A fourth operation circuit is configured to obtain the addition output mask value of a second mask group according to second intermediate data and second input mask value. The first and second addition input mask values of first mask group are first and second input mask values. The first and second addition input mask values of second mask group are third input mask value and first intermediate data.
    Type: Grant
    Filed: December 29, 2022
    Date of Patent: April 22, 2025
    Assignee: NUVOTON TECHNOLOGY CORPORATION
    Inventors: Kun-Yi Wu, Yu-Shan Li
  • Publication number: 20250117525
    Abstract: An encryption device is provided herein, which includes a memory array and a memory control device. The memory array is configured to store lock data. The memory control device determines whether the lock data is equal to a predetermined value according to an operation instruction. When the memory control device determines that the lock data is equal to the predetermined value, the memory control device performs a logic operation on the write data and an output key to generate encrypted write data, and writes the encrypted data into the memory array as ciphertext.
    Type: Application
    Filed: December 30, 2023
    Publication date: April 10, 2025
    Inventors: Kun-Yi WU, Yu-Shan LI
  • Patent number: 12124816
    Abstract: A carry-lookahead adder is provided. A first mask unit performs first mask operation on first input data with the first mask value to obtain first masked data. A second mask unit performs second mask operation on second input data with the second mask value to obtain second masked data. A first XOR gate receives the first and second mask values to provide a variable value. A half adder receives the first and second masked data to generate a propagation value and an intermediate generation value. A third mask unit performs third mask operation on the propagation value with the third mask value to obtain the third masked data. A carry-lookahead generator provides the carry output and the carry value according to carry input, the generation value, and the propagation value. The second XOR gate receives the third masked data and the carry value to provide the sum output.
    Type: Grant
    Filed: December 28, 2022
    Date of Patent: October 22, 2024
    Assignee: NUVOTON TECHNOLOGY CORPORATION
    Inventors: Kun-Yi Wu, Yu-Shan Li
  • Patent number: 12075707
    Abstract: A method for fabricating magnetic tunnel junction (MTJ) pillars is provided. The method includes following operations. A MTJ stack of layers including a first magnetic layer, a tunnel barrier layer overlying the first magnetic layer, and a second magnetic layer overlying the tunnel barrier layer is provided. A first patterning step is carried out by using a reactive ion etching. In the first patterning step, the second magnetic layer and the tunnel barrier layer are etched to form one or more pillar structures and a protection layer is formed and covers sidewalls of the pillar structures.
    Type: Grant
    Filed: July 25, 2023
    Date of Patent: August 27, 2024
    Assignee: TAIWAN SEMICONDUCTOR MANUFACTURING COMPANY LTD.
    Inventors: Jiann-Horng Lin, Kun-Yi Li, Han-Ting Lin, Huan-Just Lin, Chen-Jung Wang, Sin-Yi Yang
  • Publication number: 20240250153
    Abstract: A semiconductor device structure, along with methods of forming such, are described. The structure includes a gate electrode disposed over a semiconductor substrate and a gate cut-fill structure disposed in the gate electrode to separate the gate electrode into two portions. The gate cut-fill structure includes a first liner, a second liner disposed on the first liner, and a dielectric material disposed on the second liner. The dielectric material has a ā€œVā€ shaped cross-section.
    Type: Application
    Filed: January 20, 2023
    Publication date: July 25, 2024
    Inventors: Kun-Yi LIN, Tai-Jung KUO, Yunn-Shiuan LIU, Zhen-Cheng WU, Chi On CHUI
  • Publication number: 20240220606
    Abstract: An embodiment of the invention provides a fault-attack analysis device. The first encoder performs a first encoding operation on the first output result corresponding to the normal round calculation to generate a first encoding result. The first decoder performs a first decoding operation on the first encoding result to generate a first decoding result. The second encoder performs a second encoding operation on the second output result corresponding to the redundant round calculation to generate a second encoding result. The second decoder performs a second decoding operation on the second encoding result to generate a second decoding result. The second encoding operation and the second decoding operation are based on binary field addition. The comparison circuit compares the first decoding result to the second decoding result to perform a fault-attack analysis.
    Type: Application
    Filed: December 12, 2023
    Publication date: July 4, 2024
    Inventors: Kun-Yi WU, Yu-Shan LI
  • Publication number: 20240103626
    Abstract: The disclosed apparatus may include a wearable haptic ring that features input capabilities relative to a computing system. In various examples, the wearable haptic ring may be designed to curve around a human finger of a wearer with a touchpad that is seamlessly integrated with the ring. For example, the seamlessly integrated touchpad may be operable by another finger of the wearer. Moreover, the haptic ring may include a haptic feedback unit designed to provide haptic feedback in response to input from the wearer. As such, the haptic ring may enable a wide range of user inputs while appearing like a typical ring rather than a computer input/output device. Various other implementations are also disclosed.
    Type: Application
    Filed: September 20, 2023
    Publication date: March 28, 2024
    Inventors: Dan Kun-yi Chen, Chengyuan Yan
  • Publication number: 20240078345
    Abstract: A method for tamper protection in cryptographic calculations is provided. A cryptographic calculation includes a plurality of normal rounds and a plurality of redundant rounds. The method includes obtaining a first variable x and a second variable y using a random number generator; dividing the normal rounds into a first normal section and a second normal section, and dividing the redundant rounds into a first redundant section and a second redundant section according to the first variable x and the second variable y; executing the first normal section and the first redundant section in sequence using a clock signal; in response to completion of the first redundant section and a first calculation result of the first normal section and a second calculation result of the first redundant section being the same, executing the second normal section and the second redundant section in sequence to complete the cryptographic calculation.
    Type: Application
    Filed: September 5, 2023
    Publication date: March 7, 2024
    Inventors: Kun-Yi WU, Yu-Shan LI
  • Publication number: 20240054352
    Abstract: A multi-layer federated learning method based on distributed clustering is provided, which comprises the following steps. Computing a feature distribution similarity for each of participating nodes with non-(non-independent and identically distributed) data sets, and grouping these nodes into plural clusters by the feature distribution similarity. Updating local model of nodes of each cluster by a federated learning algorithm, and inputting these nodes into a multi-layer aggregation mechanism. Terminating the operation of the multi-layer aggregation mechanism until the clustering result meets a required demand. Furthermore, we implement a blockchain-based multi-layer federated learning system, including model aggregation module, API module, time-series synchronization module, and IPFS, based on distributed clustering architecture. The learning performance is proven to effectively improved.
    Type: Application
    Filed: July 30, 2023
    Publication date: February 15, 2024
    Applicant: ASIA UNIVERSITY
    Inventors: ZON-YIN SHAE, KUN-YI CHEN, JING-PHA TSAI, CHI-YU CHANG, YUAN-YU TSAI
  • Publication number: 20240007283
    Abstract: A cryptographic device for a memory device includes a determination unit, a mapping unit, and a cryptographic unit. The determination unit determines that a memory address is in a protection area to select a key and a random number. The mapping unit maps a binary code to an injection code according to the key and the memory address, in which the binary code includes the random number and the memory address. The cryptographic unit generates a key stream according to the key and the injection code.
    Type: Application
    Filed: May 30, 2023
    Publication date: January 4, 2024
    Inventors: Shun-Hsiung CHEN, Kun-Yi WU, Yu-Shan LI
  • Publication number: 20230418912
    Abstract: A medical data ownership management method comprises: Granting a first authority to a medical unit where the first authority allows the medical unit to generate a first medical object with its corresponding first non-fungible token (NFT) storing on a blockchain. Granting a second authority to a research unit, where the second authority allows the research unit to access the first medical object, and the research unit processes the first medical object to generate the second medical object with its corresponding second NFT storing on the blockchain. Finally, granting a third authority to a user unit, where the third authority allows the user unit to access the second medical object. The access control and ownership transfer of each medial object in the blockchain are achieved by trading the corresponding NFT and modifying its subordinate list. With the management method, the security and the privacy of the medical data will be enhanced.
    Type: Application
    Filed: October 14, 2022
    Publication date: December 28, 2023
    Inventors: ZON-YIN SHAE, JING-PHA TSAI, CHI-YU CHANG, YUAN-YU TSAI, KUN-YI CHEN
  • Publication number: 20230380293
    Abstract: A method for fabricating magnetic tunnel junction (MTJ) pillars is provided. The method includes following operations. A MTJ stack of layers including a first magnetic layer, a tunnel barrier layer overlying the first magnetic layer, and a second magnetic layer overlying the tunnel barrier layer is provided. A first patterning step is carried out by using a reactive ion etching. In the first patterning step, the second magnetic layer and the tunnel barrier layer are etched to form one or more pillar structures and a protection layer is formed and covers sidewalls of the pillar structures.
    Type: Application
    Filed: July 25, 2023
    Publication date: November 23, 2023
    Inventors: JIANN-HORNG LIN, KUN-YI LI, HAN-TING LIN, HUAN-JUST LIN, CHEN-JUNG WANG, SIN-YI YANG
  • Publication number: 20230327867
    Abstract: An encryption device is provided, which includes a controller, a random controller, a first functional unit, and a second functional unit. The controller generates a first enable signal and a second enable signal. When at least one of the first enable signal and the second enable signal is in a first logic level, the random controller generates a first random signal and a second random signal. The first functional unit performs the corresponding operation according to the first enable signal and the first random signal. The second functional unit performs the corresponding operation according to the second enable signal and the second random signal.
    Type: Application
    Filed: November 9, 2022
    Publication date: October 12, 2023
    Inventors: Kun-Yi WU, Yu-Shan LI
  • Patent number: 11770977
    Abstract: A method for fabricating magnetic tunnel junction (MTJ) pillars is provided. The method includes following operations. A MTJ stack of layers including a first magnetic layer, a tunnel barrier layer overlying the first magnetic layer, and a second magnetic layer overlying the tunnel barrier layer is provided. A first patterning step is carried out by using a reactive ion etching. In the first patterning step, the second magnetic layer and the tunnel barrier layer are etched to form one or more pillar structures and a protection layer is formed and covers sidewalk of the pillar structures.
    Type: Grant
    Filed: October 27, 2020
    Date of Patent: September 26, 2023
    Assignee: TAIWAN SEMICONDUCTOR MANUFACTURING COMPANY LTD.
    Inventors: Jiann-Horng Lin, Kun-Yi Li, Han-Ting Lin, Huan-Just Lin, Chen-Jung Wang, Sin-Yi Yang
  • Publication number: 20230216677
    Abstract: A cipher accelerator is provided. An encryption and decryption circuit is configured to perform an encryption and decryption operation according to a control signal. The encryption and decryption operation includes a plurality of normal rounds and a plurality of redundant rounds. A controller is configured to provide a control signal to the encryption and decryption circuit according to a first variable value and a second variable value. The encryption and decryption circuit is configured to divide the normal rounds into a first normal section and a second normal section according to the first variable value, and divide the redundant rounds into a first redundant section and a second redundant section according to the second variable value. The encryption and decryption circuit is configured to perform the first normal section, the first redundant section, the second normal section, and the second redundant section sequentially.
    Type: Application
    Filed: November 9, 2022
    Publication date: July 6, 2023
    Inventors: Kun-Yi WU, Yu-Shan LI
  • Publication number: 20230214216
    Abstract: An addition mask value generator is provided. A first operation circuit is configured to obtain first intermediate data according to first output mask value and fourth output mask value. A second operation circuit is configured to obtain the addition output mask value of a first mask group according to first intermediate data and fourth input mask value. A third operation circuit is configured to obtain second intermediate data according to second output mask value and third output mask value. A fourth operation circuit is configured to obtain the addition output mask value of a second mask group according to second intermediate data and second input mask value. The first and second addition input mask values of first mask group are first and second input mask values. The first and second addition input mask values of second mask group are third input mask value and first intermediate data.
    Type: Application
    Filed: December 29, 2022
    Publication date: July 6, 2023
    Inventors: Kun-Yi WU, Yu-Shan LI
  • Publication number: 20230214183
    Abstract: A carry-lookahead adder is provided. First XOR gate receives a first mask value and a second mask value to provide a variable. First mask unit performs a first mask operation on first input data with the variable to obtain first masked data. A half adder receives the first masked data and second input data to generate a propagation value and an intermediate generation value. Second mask unit performs a second mask operation on the propagation value with a third mask value to obtain second masked data. A logic circuit provides a generation value according to the propagation value, the intermediate generation value and the second mask value. A carry-lookahead generator provides a carry output and a carry value according to a carry input, the generation value and the propagation value. Second XOR gate receives the second masked data and the carry value to provide a sum output.
    Type: Application
    Filed: December 28, 2022
    Publication date: July 6, 2023
    Inventors: Kun-Yi WU, Yu-Shan LI
  • Publication number: 20230214189
    Abstract: A carry-lookahead adder is provided. A first mask unit performs first mask operation on first input data with the first mask value to obtain first masked data. A second mask unit performs second mask operation on second input data with the second mask value to obtain second masked data. A first XOR gate receives the first and second mask values to provide a variable value. A half adder receives the first and second masked data to generate a propagation value and an intermediate generation value. A third mask unit performs third mask operation on the propagation value with the third mask value to obtain the third masked data. A carry-lookahead generator provides the carry output and the carry value according to carry input, the generation value, and the propagation value. The second XOR gate receives the third masked data and the carry value to provide the sum output.
    Type: Application
    Filed: December 28, 2022
    Publication date: July 6, 2023
    Inventors: Kun-Yi WU, Yu-Shan LI
  • Publication number: 20230208821
    Abstract: A method for protecting and managing keys is provided. The method includes the following steps. An OTF cipher transmits a request message to a cryptographic engine to request that the cryptographic engine obtain a wrap key when a key is located in an external memory. The cryptographic engine requests the wrap key from a key store. The key store reads and transmits the wrap key to the cryptographic engine. The OTF cipher requests access to a protection key from the key store, and the key store requests that an external memory controller read the protection key from the external memory. The external memory transmits the protection key to the cryptographic engine. The cryptographic engine generates the key according to the wrap key and the protection key and transmits the key to the OTF cipher. The OTF cipher uses the key to perform an encryption and decryption process.
    Type: Application
    Filed: December 20, 2022
    Publication date: June 29, 2023
    Inventors: Kun-Yi WU, Yu-Shan LI
  • Patent number: 11545619
    Abstract: A method for forming a memory device structure is provided. The method includes providing a substrate, a first dielectric layer, a conductive via, a magnetic tunnel junction cell, a first etch stop layer, and a first spacer layer. The substrate has a first region and a second region, the first dielectric layer is over the substrate, the conductive via passes through the first dielectric layer over the first region. The method includes removing the first etch stop layer, which is not covered by the first spacer layer. The method includes removing the first dielectric layer, which is not covered by the first etch stop layer.
    Type: Grant
    Filed: July 21, 2020
    Date of Patent: January 3, 2023
    Assignee: TAIWAN SEMICONDUCTOR MANUFACTURING CO., LTD.
    Inventors: Hsing-Hsiang Wang, Han-Ting Lin, Yu-Feng Yin, Sin-Yi Yang, Chen-Jung Wang, Yin-Hao Wu, Kun-Yi Li, Meng-Chieh Wen, Lin-Ting Lin, Jiann-Horng Lin, An-Shen Chang, Huan-Just Lin