US20050041836A1 - Information media using information of defect in an article - Google Patents

Information media using information of defect in an article Download PDF

Info

Publication number
US20050041836A1
US20050041836A1 US10/841,814 US84181404A US2005041836A1 US 20050041836 A1 US20050041836 A1 US 20050041836A1 US 84181404 A US84181404 A US 84181404A US 2005041836 A1 US2005041836 A1 US 2005041836A1
Authority
US
United States
Prior art keywords
card
code
article
memory
pattern
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/841,814
Inventor
Kazuo Takeda
Aritoshi Sugimoto
Takanori Ninomiya
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Ltd
Original Assignee
Hitachi Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Ltd filed Critical Hitachi Ltd
Priority to US10/841,814 priority Critical patent/US20050041836A1/en
Publication of US20050041836A1 publication Critical patent/US20050041836A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07372Means for preventing undesired reading or writing from or onto record carriers by detecting tampering with the circuit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • G06K19/14Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards the marking being sensed by radiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L23/00Details of semiconductor or other solid state devices
    • H01L23/544Marks applied to semiconductor devices or parts, e.g. registration marks, alignment structures, wafer maps
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2223/00Details relating to semiconductor or other solid state devices covered by the group H01L23/00
    • H01L2223/544Marks applied to semiconductor devices or parts
    • H01L2223/54413Marks applied to semiconductor devices or parts comprising digital information, e.g. bar codes, data matrix
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2223/00Details relating to semiconductor or other solid state devices covered by the group H01L23/00
    • H01L2223/544Marks applied to semiconductor devices or parts
    • H01L2223/54433Marks applied to semiconductor devices or parts containing identification or tracking information
    • H01L2223/5444Marks applied to semiconductor devices or parts containing identification or tracking information for electrical read out
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2223/00Details relating to semiconductor or other solid state devices covered by the group H01L23/00
    • H01L2223/544Marks applied to semiconductor devices or parts
    • H01L2223/54473Marks applied to semiconductor devices or parts for use after dicing
    • H01L2223/5448Located on chip prior to dicing and remaining on chip after dicing
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2223/00Details relating to semiconductor or other solid state devices covered by the group H01L23/00
    • H01L2223/544Marks applied to semiconductor devices or parts
    • H01L2223/54493Peripheral marks on wafers, e.g. orientation flats, notches, lot number
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2224/00Indexing scheme for arrangements for connecting or disconnecting semiconductor or solid-state bodies and methods related thereto as covered by H01L24/00
    • H01L2224/01Means for bonding being attached to, or being formed on, the surface to be connected, e.g. chip-to-package, die-attach, "first-level" interconnects; Manufacturing methods related thereto
    • H01L2224/02Bonding areas; Manufacturing methods related thereto
    • H01L2224/04Structure, shape, material or disposition of the bonding areas prior to the connecting process
    • H01L2224/05Structure, shape, material or disposition of the bonding areas prior to the connecting process of an individual bonding area
    • H01L2224/0554External layer
    • H01L2224/05599Material
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2224/00Indexing scheme for arrangements for connecting or disconnecting semiconductor or solid-state bodies and methods related thereto as covered by H01L24/00
    • H01L2224/01Means for bonding being attached to, or being formed on, the surface to be connected, e.g. chip-to-package, die-attach, "first-level" interconnects; Manufacturing methods related thereto
    • H01L2224/10Bump connectors; Manufacturing methods related thereto
    • H01L2224/15Structure, shape, material or disposition of the bump connectors after the connecting process
    • H01L2224/16Structure, shape, material or disposition of the bump connectors after the connecting process of an individual bump connector
    • H01L2224/161Disposition
    • H01L2224/16151Disposition the bump connector connecting between a semiconductor or solid-state body and an item not being a semiconductor or solid-state body, e.g. chip-to-substrate, chip-to-passive
    • H01L2224/16221Disposition the bump connector connecting between a semiconductor or solid-state body and an item not being a semiconductor or solid-state body, e.g. chip-to-substrate, chip-to-passive the body and the item being stacked
    • H01L2224/16225Disposition the bump connector connecting between a semiconductor or solid-state body and an item not being a semiconductor or solid-state body, e.g. chip-to-substrate, chip-to-passive the body and the item being stacked the item being non-metallic, e.g. insulating substrate with or without metallisation
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2224/00Indexing scheme for arrangements for connecting or disconnecting semiconductor or solid-state bodies and methods related thereto as covered by H01L24/00
    • H01L2224/01Means for bonding being attached to, or being formed on, the surface to be connected, e.g. chip-to-package, die-attach, "first-level" interconnects; Manufacturing methods related thereto
    • H01L2224/42Wire connectors; Manufacturing methods related thereto
    • H01L2224/44Structure, shape, material or disposition of the wire connectors prior to the connecting process
    • H01L2224/45Structure, shape, material or disposition of the wire connectors prior to the connecting process of an individual wire connector
    • H01L2224/45001Core members of the connector
    • H01L2224/45099Material
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2224/00Indexing scheme for arrangements for connecting or disconnecting semiconductor or solid-state bodies and methods related thereto as covered by H01L24/00
    • H01L2224/01Means for bonding being attached to, or being formed on, the surface to be connected, e.g. chip-to-package, die-attach, "first-level" interconnects; Manufacturing methods related thereto
    • H01L2224/42Wire connectors; Manufacturing methods related thereto
    • H01L2224/47Structure, shape, material or disposition of the wire connectors after the connecting process
    • H01L2224/48Structure, shape, material or disposition of the wire connectors after the connecting process of an individual wire connector
    • H01L2224/4805Shape
    • H01L2224/4809Loop shape
    • H01L2224/48091Arched
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2224/00Indexing scheme for arrangements for connecting or disconnecting semiconductor or solid-state bodies and methods related thereto as covered by H01L24/00
    • H01L2224/01Means for bonding being attached to, or being formed on, the surface to be connected, e.g. chip-to-package, die-attach, "first-level" interconnects; Manufacturing methods related thereto
    • H01L2224/42Wire connectors; Manufacturing methods related thereto
    • H01L2224/47Structure, shape, material or disposition of the wire connectors after the connecting process
    • H01L2224/48Structure, shape, material or disposition of the wire connectors after the connecting process of an individual wire connector
    • H01L2224/481Disposition
    • H01L2224/48151Connecting between a semiconductor or solid-state body and an item not being a semiconductor or solid-state body, e.g. chip-to-substrate, chip-to-passive
    • H01L2224/48221Connecting between a semiconductor or solid-state body and an item not being a semiconductor or solid-state body, e.g. chip-to-substrate, chip-to-passive the body and the item being stacked
    • H01L2224/48225Connecting between a semiconductor or solid-state body and an item not being a semiconductor or solid-state body, e.g. chip-to-substrate, chip-to-passive the body and the item being stacked the item being non-metallic, e.g. insulating substrate with or without metallisation
    • H01L2224/48227Connecting between a semiconductor or solid-state body and an item not being a semiconductor or solid-state body, e.g. chip-to-substrate, chip-to-passive the body and the item being stacked the item being non-metallic, e.g. insulating substrate with or without metallisation connecting the wire to a bond pad of the item
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2224/00Indexing scheme for arrangements for connecting or disconnecting semiconductor or solid-state bodies and methods related thereto as covered by H01L24/00
    • H01L2224/01Means for bonding being attached to, or being formed on, the surface to be connected, e.g. chip-to-package, die-attach, "first-level" interconnects; Manufacturing methods related thereto
    • H01L2224/42Wire connectors; Manufacturing methods related thereto
    • H01L2224/47Structure, shape, material or disposition of the wire connectors after the connecting process
    • H01L2224/48Structure, shape, material or disposition of the wire connectors after the connecting process of an individual wire connector
    • H01L2224/484Connecting portions
    • H01L2224/48463Connecting portions the connecting portion on the bonding area of the semiconductor or solid-state body being a ball bond
    • H01L2224/48465Connecting portions the connecting portion on the bonding area of the semiconductor or solid-state body being a ball bond the other connecting portion not on the bonding area being a wedge bond, i.e. ball-to-wedge, regular stitch
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2224/00Indexing scheme for arrangements for connecting or disconnecting semiconductor or solid-state bodies and methods related thereto as covered by H01L24/00
    • H01L2224/80Methods for connecting semiconductor or other solid state bodies using means for bonding being attached to, or being formed on, the surface to be connected
    • H01L2224/85Methods for connecting semiconductor or other solid state bodies using means for bonding being attached to, or being formed on, the surface to be connected using a wire connector
    • H01L2224/8538Bonding interfaces outside the semiconductor or solid-state body
    • H01L2224/85399Material
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L24/00Arrangements for connecting or disconnecting semiconductor or solid-state bodies; Methods or apparatus related thereto
    • H01L24/01Means for bonding being attached to, or being formed on, the surface to be connected, e.g. chip-to-package, die-attach, "first-level" interconnects; Manufacturing methods related thereto
    • H01L24/42Wire connectors; Manufacturing methods related thereto
    • H01L24/47Structure, shape, material or disposition of the wire connectors after the connecting process
    • H01L24/48Structure, shape, material or disposition of the wire connectors after the connecting process of an individual wire connector
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2924/00Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
    • H01L2924/0001Technical content checked by a classifier
    • H01L2924/00014Technical content checked by a classifier the subject-matter covered by the group, the symbol of which is combined with the symbol of this group, being disclosed without further technical details
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2924/00Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
    • H01L2924/01Chemical elements
    • H01L2924/01019Potassium [K]
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2924/00Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
    • H01L2924/10Details of semiconductor or other solid state devices to be connected
    • H01L2924/102Material of the semiconductor or solid state bodies
    • H01L2924/1025Semiconducting materials
    • H01L2924/10251Elemental semiconductors, i.e. Group IV
    • H01L2924/10253Silicon [Si]
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2924/00Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
    • H01L2924/10Details of semiconductor or other solid state devices to be connected
    • H01L2924/11Device type
    • H01L2924/12Passive devices, e.g. 2 terminal devices
    • H01L2924/1204Optical Diode
    • H01L2924/12042LASER
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2924/00Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
    • H01L2924/15Details of package parts other than the semiconductor or other solid state devices to be connected
    • H01L2924/181Encapsulation

Definitions

  • the present invention relates to an identification unit and an identification method of an article.
  • a card for which money is paid beforehand and where information and functions of quantity equivalent to the paid money are coded and recorded a so-called prepaid card or a digital cash card which is a type of an IC card via which money can be received and paid, further a cash card and a credit card wherein equivalent money is withdrawn from its owner's account for a bought article are used.
  • An identification system is adopted to check that a user of a card is its owner. That is, the above system is a system of registering personal identification numbers in a card beforehand and checking whether input numbers are equal to the registered personal identification numbers or not in using the card.
  • technology for preventing duplication and unfair use is developed and there are the following well-known examples.
  • a personal identification method and a personal identification unit in a security system for identifying a user of a card as its owner as another well-known invention
  • a method of identifying a user of a card as its owner utilizing organism information such as a finger print pattern, an iris pattern, a blood vessel pattern of an eyeground and a capillary vessel pattern is known.
  • organism information such as a finger print pattern, an iris pattern, a blood vessel pattern of an eyeground and a capillary vessel pattern.
  • a unit utilizing a finger print is disclosed in Japanese patent laid open Sho 63-123168.
  • a well-known invention utilizing a radioscopic image of a blood vessel for personal identification information is disclosed in Japanese patent laid open Hei 07-21373.
  • an article provided with identification information for making unfair duplication and the use of an unfairly duplicated article extremely difficult and an identification unit and an identification method respectively utilizing the above identification information of the article are provided and it is proposed as its means to utilize the information of a crystal defect which it is extremely difficult to compose artificially.
  • FIG. 1A shows an embodiment in which the present invention is applied to the identification of a semiconductor substrate and
  • FIG. 1B schematically shows an example of a crystal defect which appears in an area for defect measurement set in a semiconductor substrate.
  • FIG. 2 is a block diagram showing an example of a unit for detecting a crystal defect.
  • FIG. 3 explains the outline of the structure of a card in an embodiment in which the present invention is applied to the identification of an IC card.
  • FIG. 4A is a partial sectional view showing the cross section of the IC card shown in FIG. 3 in a part of a chip for certification (a certificate chip) 22 and
  • FIG. 4B is a partial sectional view showing the cross section of the IC card shown in FIG. 3 in a part of a photo image sensor 8 .
  • FIG. 5A and FIG. 5B show the outline of the change of a wafer in a processing flow and each process in an example of a process for manufacturing the certificate chip 22 .
  • FIG. 6 shows an example in which a position where a mark showing an area for defect measurement is provided is changed.
  • FIG. 7 is a schematic perspective view for explaining an IC card reader explained in FIG. 3 .
  • FIG. 8A shows the configuration of the whole system for explaining an example of a method of using the IC card and the card reader in this embodiment
  • FIG. 8B is a flowchart showing an example of signal processing in the card reader.
  • FIG. 9A , FIG. 9B and FIG. 9C are schematic drawings for explaining a group of memory elements in which a fail bit occurs such as DRAM, SRAM and a flash memory.
  • FIGS. 10A to FIG. 10D show an example of a method of building a certificate chip in an IC card.
  • a crystal defect itself inside a semiconductor device can be utilized, however, it will be described below that it is extremely difficult to artificially forge a crystal defect inside a semiconductor device.
  • the above crystal defect is a grown-in defect and oxygen precipitate generated by heat treatment for example, however, it is difficult to artificially control the generated position, the depth, the size and others of these. The reason is that the generation of these defects is a phenomenon related to a diffusion phenomenon and it is difficult to control the generated position and the size of an individual defect.
  • These defects are caused by 10 6 pieces per 1 cm 3 (defect density) in a wafer created by Czochralski method for example. It can be said that the above defect density is an enough number to utilize for identification information. It is clear that the distribution pattern of positions in which the above crystal defects exist can be utilized for information for identifying a substrate. Therefore, a substrate can be identified by generating a code using the random pattern of crystal defects which naturally occur inside the substrate.
  • the defect pattern of the semiconductor substrate can be utilized for the management code of the substrate. Also, as defects are further added to a chip through a process, identification information is more increased, can be applied to the management of the chip mounted in an IC card and as it is difficult to duplicate a chip having the same code, the unfair used of the IC card can be prevented.
  • the defect pattern of a semiconductor substrate is utilized for a management code of the substrate.
  • processing such as heat treatment, etching and further, polish for a substrate is executed in a device manufacturing process
  • a mark placed on the surface of the substrate is deformed, discolored, damaged or erased hereby and it may become difficult to recognize the mark.
  • a process from first to last that a single enterprise executes the whole process using one line is changed to an expert allocation system that an expert enterprise which is good at a certain process takes in charge of the process every type of a process, it is expected that a problem occurs in relation to a mark to be placed on a substrate in process management when a device is manufactured by plural enterprises.
  • defect pattern of a semiconductor substrate is utilized for a management code of the substrate, a problem can be solved by artificially making a defect.
  • an area for defect measurement 12 is set in an area apart by 5-6 mm from the periphery of a wafer 1 on the reverse side of a notch 11 in which no device pattern is formed.
  • An example of the area 12 and an example of crystal defects which appear in the above area are schematically shown in FIG. 1B .
  • the area 12 is surrounded by marks 10 1 to 10 4 in the shape of a cross showing a range for discriminating the area.
  • the concave or convex marks 10 1 to 10 4 are formed on the surface of the wafer in a boundary part with the area by a laser beam or FIB and others and the measurement of defects is performed using the marks as the criterion of the area 12 .
  • a concrete example of defect measurement will be described later.
  • FIG. 1B schematically shows a state in which the inplane distribution of defects in a range 0.5 ⁇ m deep from the surface is measured and enlarged.
  • the above defects 14 do not appear of the same size but some appear large and some hardly appear as shown in FIG. 1B .
  • the position of a defect in the range of the area is shown by a broken line, the range is divided at a fixed interval in X and Y directions and the positional coordinates of a defect are shown on two-dimensional coordinates every defect. Description using the two-dimensional coordinates is conceptual and it hardly need be said that two-dimensional coordinates are actually not drawn on the wafer 1 .
  • the two-dimensional X-Y coordinates are shown, the range is divided into 22 pieces in the X direction and into 5 pieces in the Y direction and the position of a defect is shown on the X-Y coordinates in the order of a smaller value on the x-coordinate.
  • the position of a defect can be shown as ( 2 , 4 ), ( 6 , 1 ), ( 7 , 3 ), ( 9 , 4 ), ( 11 , 2 ), ( 14 , 3 ), ( 15 , 1 ) and ( 19 , 2 ) in the order of a smaller value on the x-coordinate.
  • an effect upon the surface which is susceptible to an artificial change such as particles on the surface and a defect on the surface can be prevented by utilizing an inside defect such as a grown-in defect inside a crystal caused when the crystal is grown, oxygen precipitate generated by heat treatment and slipband dislocation for recognizing a semiconductor chip.
  • an inside defect such as a grown-in defect inside a crystal caused when the crystal is grown, oxygen precipitate generated by heat treatment and slipband dislocation for recognizing a semiconductor chip.
  • the set area for defect measurement 12 has only to be an area which is not influenced by a circuit pattern, an area around the notch 11 in which no device pattern is formed may be also selected without being limited to the reverse side to the notch 11 on the surface of the above wafer 1 .
  • the notch is described as an example, however, it hardly need be said that an orientation flat may be used in place of the notch.
  • FIG. 2 is a block diagram showing an example of a detector of a crystal defect.
  • a stage 140 on which the wafer 1 to be measured is laid is provided and light sources 1401 and 1402 for emitting light of different wavelengths are provided under the stage. These light sources irradiate light of the respective wavelengths on the area for defect measurement 12 on the back side of the wafer 1 , staggering time.
  • a photo image sensor 141 collects separately each wavelength scattered light from a defect on the surface or an inner defect using an optical component for a wavelength separator. The above detected scattered light intensity signal and a defect detected position are digitized and are stored in a temporary memory 142 . Coding processing according to the distribution of defects is executed based upon the stored data by a data processor 143 as described referring to FIG. 1B .
  • a display 144 displays a coded wafer ID.
  • the photo image sensor 141 has only to be a two-dimensional detector and for example, may be also any of a photo diode array, a photo transistor array and Charge Coupled Device (CCD).
  • CCD Charge Coupled Device
  • a mark for adjusting sensitivity to the area for defect measurement 12 . That is, as signal strength for detecting a defect by the photo image sensor 141 can be corrected using a detection signal of a mark for adjusting sensitivity as a criterion if it is checked whether a signal at an address of ( 13 , 1 ) shown in FIG. 1B is effective or not, reliability for the repeatability of the measurement of signal strength can be secured. It is also useful to provide the area for defect measurement 12 in a certain fixed area on the surface reverse to the surface on which a circuit pattern is formed as the mark for adjusting sensitivity beforehand.
  • the marks 10 1 to 10 4 of the area for defect measurement 12 may be also used for the mark for adjusting sensitivity. Further, the marks 10 1 to 10 4 of the area for defect measurement 12 shown in FIG. 1B are not necessarily required at four corners. The reason is that as these have only the meaning of defining the area for defect measurement 12 , measurement is enabled if the area of the area for defect measurement is determined beforehand and it is apparent from which position and in which direction measurement is to be performed. Therefore, if a mark of ‘+’ is provided as an example in which the mark 10 1 is shown and it is promised on which side of the mark the area 12 exists, the other three marks are not necessarily required.
  • This embodiment can be also applied to a semiconductor substrate made of silicon on an insulator (SOI). More concretely, this embodiment can be also applied to a semiconductor substrate provided with a first semiconductor substrate and a second semiconductor substrate and formed by oxidizing the above first semiconductor substrate, sticking the oxidized first substrate and the second substrate afterward and heating them. As for the above substrate, as a circuit pattern is formed on the stuck surface of the polished second substrate, the area for defect measurement 12 has only to be formed on the outside surface of the first substrate.
  • SOI silicon on an insulator
  • a method of identifying without artificially providing a mark on the surface of a substrate is effective in the management of wafers by a manufacturer manufacturing wafers.
  • the manufacturer of wafers does not desire to mark on a product till shipment. It is effective that management is enabled only by setting a specific position of a wafer as the area for defect measurement 12 without artificially marking.
  • this embodiment is applied to SOI semiconductor substrate, there is a merit that the malfunction of a circuit pattern due to the propagation of free carriers can be prevented because the movement of free carriers by light irradiated on the backface is stopped by a layer of SiO 2 .
  • a crystal defect in an IC chip built in an IC card is used for ID of the IC card.
  • an area to be identified as identification information is 10 mm ⁇ 10 mm and the depth is 1 ⁇ m
  • the number of states in each of which 10 pieces of defects exists is 10 60 .
  • the size of a chip used for a generally used IC card is 10 mm ⁇ 10 mm and the thickness is approximately 50 ⁇ m. If the size of an area used for identification information is 1 mm ⁇ 1 mm and the depth is 1 ⁇ m, the number of states in each of which 10 pieces of defects exist is 10 40 and the number is the quantity of information enough to utilize for recognition.
  • FIG. 3 is an exploded view showing an example of an IC card generally used.
  • four sheets shown by 31 to 34 are laminated and are shown with them shifted by degrees.
  • a reference number 33 denotes a substrate sheet, a wiring pattern 23 is formed on the surface and a chip required to fulfill a function of an IC card is arranged.
  • the above wiring pattern 23 is wiring between chips.
  • a certificate chip 22 , a control chip 24 and a photo image sensor 8 are mounted.
  • a reference number 32 denotes a spacer sheet and the spacer sheet has cutouts 35 , 36 and 37 corresponding to the size of each chip in positions corresponding to each chip described above. The thickness of the spacer sheet 32 approximately corresponds to the height of the chip.
  • Reference numbers 31 and 34 denote a cover sheet and the cover sheets are arranged with the spacer sheet 32 and the substrate sheet 33 kept between the cover sheets.
  • a group of terminals 78 for electrically connecting the certificate chip mounted on the substrate sheet 33 and an external device is provided on the outside surface of the cover sheet 31 as a generally used IC card. As general technique can be applied to the connection of the group of terminals 78 and the wiring pattern 23 or the certificate chip 22 and the control chip 24 as it is, the above connection is not described.
  • a transparent window 72 is provided in the center of a terminal 79 generally used for a grounding terminal of the group of terminals 78 . Further, a transparent window 70 for inputting a finger print is provided. Though concretely described later, the transparent window 72 is provided in a position corresponding to the center of the back-surface of the certificate chip 22 , crystal defects in the certificate chip 22 are detected through the window and the validity of the identification of the IC card is evaluated.
  • the transparent window 70 is provided in a position corresponding to the photo image sensor 8 , the photo image sensor 8 detects a finger print image imprinted by a user on the transparent window 70 and the validity of the user of the IC card can be evaluated.
  • FIG. 4A is a partial sectional view cut in the part of the certificate chip 22 showing the embodiment of the IC card shown in FIG. 3
  • FIG. 4B is a partial sectional view cut in the part of the photo image sensor 8 showing the embodiment of the IC card shown in FIG. 3
  • reference numbers 31 to 34 denote a sheet described in relation to FIG. 3 .
  • a part between each sheet shown without a reference number is an adhesive for bonding each sheet.
  • the adhesive for bonding the sheets 31 to 34 is required to pass light as described later, it is desirable that the adhesive is substantially transparent.
  • the wiring pattern 23 is formed on the surface of the substrate sheet 33 and a circuit in a circuit pattern plane 131 of the certificate chip 22 is connected to the wiring pattern 23 via a bump 138 .
  • the certificate chip 22 receives light 4 1 and 4 2 from the outside through the transparent window 72 and reflection from the back-surface or scattered light 4 3 from an extremely shallow layer inside the backface can be outgoing to the outside. If the above light 4 1 and 4 2 is light from the light sources 140 1 and 140 2 described in relation to FIG.
  • a cutout to which a reference number 73 is allocated on the backface of the certificate chip 22 corresponds to the marks 10 1 to 10 4 in the shape of ‘+’ showing a range for discriminating an area for defect measurement 12 described in relation to FIG. 1B and in this embodiment, the above cutout is a linear cut connecting the mark 10 1 and the mark 10 3 in the shape of ‘+’. It hardly need be said that the similar effect is also acquired if the above cutout is a projection.
  • the wiring pattern 23 is formed on the surface of the substrate sheet 33 and an output circuit of a charge coupled device (CCD) is connected to the wiring pattern 23 via the bump 138 on the side of the back of the plane 150 where the charge coupled devices (CCD) are arrayed of the photo image sensor 8 .
  • CCD charge coupled device
  • As technique for conducting the output circuit of the charge coupled device (CCD) to the back side is similar to technique of this type generally performed, it is not described.
  • the plane where the charge coupled devices (CCD) are arrayed of the photo image sensor 8 corresponds to the position of the transparent window 70 , the plane receives light according to a finger print pattern 91 imprinted on the outside surface of the transparent window 70 through the transparent window 70 .
  • the output of the photo image sensor 8 is collated with a finger print pattern registered beforehand by signal processing by the control chip 24 for example and it is determined whether they are coincident or not, it can be determined whether a person who imprints a finger print pattern on the transparent window 70 to use an IC card can use the IC card or not.
  • the finger print pattern of the valid user of the IC card is required to be registered beforehand inside the IC card, however, for it, the following procedure is desirable.
  • the IC card is set on an IC card data setting terminal.
  • the image data of the finger print pattern read at this time has only to be stored in a memory to which writing is allowed only once and from which only reading is allowed afterward and which is built in the certificate chip 22 by operating the data setting terminal. Further, in the above operation, crystal defects are fetched from the backface of the certificate chip 22 , are coded as described in relation to FIG.
  • ID of the IC card is used for a certificate every time the card is used, it is required to be registered in a section accessible in common via a network such as a certificate authority to be described later in relation to FIG. 8 .
  • the setting terminal of an IC card currently generally used is not provided with a function for irradiating light on an IC card, the setting terminal is required to be provided with an optical system with which a card reader to be described in an embodiment described later is provided to actually use the IC card equivalent to this embodiment.
  • a reason why the image data of a finger print pattern is stored in the memory built in the certificate chip 22 is that it is more effective for enhancing security that data which should not be falsified is stored in the certificate chip 22 because the validity of an IC card is evaluated based upon crystal defects in the certificate chip 22 in this embodiment. Therefore, if the image data of a finger print pattern is stored in a memory built in the control chip 24 , a function of certificating the validity of the user in an IC card can be also realized.
  • a conventional type certification method by personal identification numbers (a certification method by a scrambled code realized by software depending upon a private key such as RAS) together in addition to evaluating the validity of an IC card based upon crystal defects in the certificate chip 22 . If only certification by personal identification numbers is executed when a case in which an IC card is used is not important so much, an IC card can be simply used.
  • the transparent windows 72 and 70 are formed by cutting out the cover sheet 31 and fitting a transparent member such as quartz glass.
  • a transparent member such as quartz glass.
  • a layer of a transparent member such as quartz glass is provided between the cover sheet 31 and the spacer sheet 32 and a thin cover sheet 31 a part corresponding to a transparent window of which is cut out may be also provided on the transparent layer.
  • FIG. 5A and FIG. 5B respectively show a processing flow as an example of a process for manufacturing the certificate chip 22 and the outline of the change of a wafer in each process.
  • a step 120 a device is produced on the surface of a wafer. After the device is completed, a part S 1 on the backface of the wafer is mechanically polished and is thinned in a step 121 .
  • a step 122 mirror polish is applied to a part S 2 by chemical mechanical polishing (CMP), etching the part.
  • CMP chemical mechanical polishing
  • a part S 3 on the back-surface of the wafer is covered with an oxide film 200 by CVD.
  • a cutout 73 is provided on the outside surface of the oxide film 200 by FIB or a laser beam.
  • the cutout 73 is provided to specify the area for defect measurement 12 as described above.
  • the wafer is cut into chips. As described above, a certificate chip 22 having desired size and thickness h is completed.
  • desired height h is acquired by processing the surface different from the surface on which the circuit pattern 131 is provided by chemical etching after mechanical polish. Concretely, the wafer is thinned up to approximately 50 ⁇ m, however, can be thinned up to 30 ⁇ m.
  • 0.85 mm is generally standard, however, if the thickness of the certificate chip 22 , the cover sheets 31 and 34 and the spacer sheet 32 is suitably selected, the whole IC card can be thinned up to 0.15 mm.
  • the value is a dimension enough to use crystal defects for IC of the certificate chip. Crystal defects utilized for ID of the certificate chip 22 will be described below.
  • crystal defects in a wafer itself and ID of the wafer utilizing them are described, however, as well known, crystal defects are further increased when processing is applied to a wafer.
  • heat treatment is applied to the certificate chip 22 in the manufacturing process.
  • SiO 2 particles are generated inside the silicon wafer by heat treatment in the process.
  • density of the generated SiO 2 particles it is known that at least 10 8 pieces/cm 3 are generated inside in processing for forming the nucleus of SiO 2 (four hours at 800° C.) which is model annealing of a wafer generally performed and in heat treatment for forming SiO 2 (16 hours at 1000° C.).
  • the oxygen precipitate is generated deep to some extent from the surface, however, even within 50 ⁇ m from the surface, the sufficient density of precipitate is acquired. For example, if volume density is 10 8 pieces/cm 3 , surface density is 10 2 pieces/mm 2 within 1 ⁇ m from the backface. Defects are by far more than those when a wafer is generated.
  • oxygen precipitate of sufficient density generated in heat treatment in the process can be detected if crystal defects are detected from the backface and crystal defects have sufficient quantity of information as ID.
  • the certificate chip 22 and the control chip 24 are provided, however, these can be also integrated and further, it hardly need be said that a processor function for executing image processing for the output of a charge coupled device (CCD) may be added to the photo image sensor 8 .
  • CCD charge coupled device
  • FIG. 6 shows an example that a mark 73 is provided on the side of the lower surface of a transparent member fitted into the transparent window 72 , that is, on the side opposite to the backface of the certificate chip 22 in place of producing the mark 73 for specifying the area for defect measurement 12 on the backface of the certificate chip 22 .
  • the step 124 described in relation to FIG. 5A can be omitted.
  • FIG. 7 is a schematic perspective view for explaining an IC card reader described in relation to FIG. 3 .
  • a reference number 6 denotes a card reader and 2 denotes an IC card.
  • a group of terminals 78 , a transparent window 72 and a transparent window 70 are seen on the surface of the IC card.
  • the transparent window 72 is provided to detect crystal defects in the certificate chip 22 and to evaluate the validity of ID of an IC card.
  • the transparent window 70 is provided to detect a finger print image and to evaluate the validity of a card owner.
  • Light sources 62 1 and 62 2 and a photo image sensor 63 are attached on the inner wall of the card reader 6 opposite to the side of the surface of the IC card 2 , that is, the surface having the transparent windows 72 and 70 .
  • a reference number 61 denotes space for a card and the space for a card functions as a guide for inserting the IC card 2 into the card reader.
  • a reference number 66 denotes a roller and it is provided to feed the IC card 2 into the space for a card 61 of the card reader 6 .
  • a reference number 65 denotes a sensor for stop of moving and it is provided to detect that the IC card 2 reaches a position for the card to be stopped.
  • a reference number 74 denotes a verification switch and it is turned on after the IC card 2 is set in the space for a card 61 of the card reader 6 .
  • a reference number 64 denotes a data processor, it corresponds to the temporary memory 142 and the data processor 143 described in relation to FIG. 2 and processes the output of the photo image sensor 63 .
  • Reference numbers 75 and 76 denote a display and it displays the output of the data processor 64 .
  • a reference number 77 denotes a connector and it is used for connecting the card reader 6 to a controller as described later and sending the output to a center via a network. Though not shown, a contact for coming in contact with the group of terminals 78 of the IC card 2 , reading data and others stored in a memory inside the card and sending data to the card from the controller if necessary is provided to the card reader 6 .
  • the IC card reader 6 is used as follows.
  • the rollers 66 provided on both sides of the space for a card 61 are rotated by a driving motor not shown and feed the IC card 2 to the inside of the space for a card.
  • the sensor for stop of moving 65 is operated and the IC card 2 is stopped. Until the IC card 2 is stopped since it is inserted into the space for a card 61 , light is irradiated on the side of the surface of the IC card 2 , that is, the transparent window 72 from the light sources 62 1 , 62 2 and 10 .
  • Light from the light sources 62 1 and 62 2 irradiates the back-surface of the certificate chip 22 as described in relation to FIG. 4A or 6 through the transparent window 72 as described in relation to FIG. 2 and the position of the light sources 62 1 and 62 2 is determined so that the required surface can be irradiated while the IC card moves.
  • light from the light source 10 is irradiated on the transparent window 70 through the slit 67 .
  • the position of the light source 10 and the slit 67 is determined so that the required surface can be irradiated while the IC card moves.
  • the photo image sensor 63 can detect information in an area for defect measurement 12 specified by the mark 73 on the back-surface of the certificate chip 22 and data for determining whether the IC card is suitably issued or not can be output by processing the output by the data processor 64 . It can be determined inside the IC card 2 , for example by the control chip 24 by light irradiated through the transparent window 70 whether a finger print image imprinted on the transparent window 70 is coincident with a finger print registered when the IC card is issued or not.
  • the result of processing by the data processor 64 and the result output from the group of terminals 78 via the contact of collating finger print images are displayed on the displays 75 and 76 if necessary. Needless to say, the above results may be also displayed on the controller connected via the connector 77 .
  • the verification switch 74 is turned off for example, the rollers 66 are reversed and the IC card is ejected from the space for a card 61 of the card reader 6 .
  • a finger print image is only stored in an IC card when the IC card is issued. Therefore, as a finger print image can be prevented from being sent to a bank, a corporate body such as a company or an institute as data via a network every time an IC card is used, the leakage of private information of an individual and the risk of unfair use can be reduced.
  • FIG. 8A shows the configuration of the whole system for explaining an example of a method of using an IC card and a card reader in this embodiment
  • FIG. 8B is a flowchart showing an example of signal processing inside the card reader.
  • a reference number 800 denotes a card reader controller and it is used for providing information required for a card reader 6 and a system and extracting a signal read by the card reader 6 .
  • a reference number 801 denotes an input section and 802 denotes a transmitter-receiver.
  • the card reader 6 is composed of a reading section 811 mainly comprising the above light sources 62 1 , 62 2 and 10 and a photo image sensor 63 , a display section 812 mainly comprising displays 575 and 576 , a comparing processing section 813 mainly comprising a data processor 64 and an output section 814 .
  • a reference number 820 denotes a network and the controller 800 is connected to the network 820 .
  • a reference number 830 denotes a certificate authority, it is connected to a network 820 and fulfills a function for certificating whether a code detected in an area for defect measurement 12 of the IC card and sent is coincident with an IC code registered when the IC card is issued or not.
  • a reference number 831 denotes a transmitter-receiver and 832 denotes an ID collator.
  • a reference number 840 denotes a bank B, it is connected to the network 820 and processes according to information of the receipt and payment of money sent from the controller 800 and information sent from the certificate authority.
  • a reference number 841 denotes a transmitter-receiver, 842 denotes a processor and 844 and 845 are a client account data memory.
  • a client K buys a merchandise C at a shop A and pays by withdrawing from his/her account in the bank B using his/her IC card.
  • the shop A After the client K is asked to imprint his/her finger print on the transparent window 70 and imprints it, his/her IC card is received. It is inserted into the IC card reader 6 described in relation to FIG. 7 .
  • the finger print image imprinted on the transparent window 70 is detected, an ID code read in the area for defect measurement 12 of the certificate chip 22 from the backface of the IC card is detected and the collation of the finger print, that is, the detected finger print image and a finger print image registered beforehand are compared.
  • FIG. 8B shows the flow of the above signal processing. If it is displayed that the user of the card is a valid owner, a salesperson of the shop A inputs the price of the merchandise C via the input section 801 .
  • the price of the merchandise C, the read ID code and the data of an account for payment registered when the card is issued and others are sent to the network 820 via the transmitter 802 .
  • the certificate authority 830 determines whether the ID code is the one registered when the card is issued or not when the certificate authority receives the read ID code and sends the result to the network 820 .
  • the bank B receives the data of the account for payment, it waits for the result of certification from the certificate authority 830 , if it is determined that the user of the card is valid, the sum of money equivalent to the price is subtracted from the owner's account data 843 and is added to the account data of the shop A 844 .
  • the result is sent to the controller 800 of the shop A, the card is ejected from the card reader at the shop A and is returned to the client K.
  • the account of the shop A is not provided to the bank B, it hardly need be said that processing for receiving money is executed in another bank having the account of the shop A and connected to the network. That is, according to this embodiment, as the validity of the user of the card is evaluated in collating finger prints and the validity of the IC card is evaluated in ID of the certificate chip 22 , security is checked doubly. In addition, as described above, if the data of a finger print image is stored in the certificate chip 22 , an unfair user cannot pass the double check even if the certificate chip is unfairly replaced.
  • the certificate authority 830 has only to exist in the bank system.
  • an area for defect measurement 12 is set on the backface of the substrate on which the circuit pattern is formed and a code acquired from crystal defects in the area is used for ID of the card.
  • a code acquired from crystal defects in the area is used for ID of the card.
  • a fail bit pattern of a memory caused by crystal defects is used for recognition.
  • the number of fail bits per one chip can be reduced in an approximately fixed range by mounting it on a wafer produced according to Czochralski process the density of defects of which is controlled. It is known that crystal defects have a bad effect upon the electric characteristic of a device and cause failure (refer to “The Analysis of the Defective Cells Induced by COP in a 0.3-micron-technology Node DRAM” by M.
  • a defect can be detected based upon the failure of the electric characteristic of the memory device. That is, as a fail bit map of a memory device based upon the failure of the electric characteristic of the memory device represents a crystal defect (including a defect by damage which a process causes) and the same cannot be artificially produced, the fail bit map can be utilized for a code for recognizing a semiconductor chip. As there are various types of memory devices and they are different in the density of fail bits, memory devices (DRAM, SRAM, EEPROM a flash memory, FRAM or a magnetic memory and others) different in the level of integration may be also used and a part of address space information may be also used.
  • a code corresponding to the fail bit pattern is required to be read via a group of terminals 78 for example and is required to be registered in a certificate authority.
  • a method of measuring it as a digital value as an IC tester that determines whether a characteristic every bit is 0 or 1 showing good or bad and records together with its address and a method of multivaluing the analog electric characteristic of a device corresponding to one address and recording it are enabled.
  • FIG. 9A , FIG. 9B and FIG. 9C a method of utilizing an electric defect random pattern will be more concretely described below.
  • FIG. 9A , FIG. 9B and FIG. 9C are schematic drawings for explaining a group of memory devices where a fail bit occurs such as DRAM, SRAM, EEPROM and a flash memory.
  • a two-dimensional area divided into small parts is an area used for a memory and each part denotes one bit of the memory.
  • fail bits occur with them dispersed in the whole area. That is, as a black part or a hatched part in an area ID equivalent to 1 ⁇ 3 from the left in the memory area is shown, fail bits occur in the whole area at statistic probability.
  • FIG. 9A shows the distribution of fail bits of binary data in a memory and a black bit means that it is a bit which does not normally store.
  • FIG. 9B shows an example that though data itself in a memory is binary, two thresholds are provided to judge whether a bit in the memory is a fail bit or not.
  • a black bit also means that it is a bit which does not normally store, however, a hatched bit means that it shows storage output to some extent though it is a bit which does not normally store.
  • FIG. 9C shows the same memory as that shown in FIG. 9A , however, it shows a schematic drawing of a case that thresholds for judging a fail bit are different. As clear when both are compared, even if the memories are the same, fail bit patterns are different.
  • a fail bit pattern acquired corresponding to a certain electric characteristic such as a leakage current value and threshold voltage for an address can be used for certification.
  • the whole memory is not required to be used for address space used for certification and a part has only to be used. It is desirable that address space is changed by security.
  • For certification it is desirable that a memory for recording important data and a certificate pattern the copying of which is impossible exist in the same chip. From this viewpoint, for a memory, a nonvolatile memory is convenient and it is desirable that an area of a memory is used for certification and another area is used for reading, writing or storing data.
  • a memory is produced using a mask such as an element corresponding to the address of a fail bit fails if the fail bit is artificially made and an IC card is unfairly produced. That is, it is conceivable that the element corresponding to the address is incompletely formed or no element is formed.
  • fail bits can be made, it is actually impossible to reproduce its electric characteristic. Therefore, it is more difficult to reproduce a pattern shown in FIG. 9B .
  • a method of replacing the address of a fail bit to be made with another bit is conceivable in place of using the mask described above.
  • This technique is used for a method of bit relief even at present and the operation of replacing the address of a fail bit with the address of a non-defective bit is actually performed by software.
  • various fail bit patterns are generated by software when the above replacement is allowed, it is effective to substantially prohibit the above replacement.
  • One of those methods is to add temporal constraint to calling a fail bit pattern. Hereby, time to spare for processing by software required for replacing bits is lost and unfair use can be prevented.
  • a method of converting the magnitude of a leakage current value from a gate insulating film of a transistor caused by defects in an oxide film under fixed applied strength every address from analog to digital and acquiring a pattern of the value every address and a method of combining some writing bias voltage in a flash memory, converting the voltage (Vt) of a memory cell in fixed time after writing from analog to digital and acquiring a pattern of the value every address are enabled.
  • FIG. 9A and FIG. 9C in a flash memory, writing voltage is varied and the variation (variation from a pattern shown in FIG. 9A to a pattern shown in FIG.
  • a binary fail bit pattern of a memory cell can be also used for a certificate pattern.
  • bias is varied and a fail bit pattern has only to be acquired.
  • a certificate authority specifies the quality of applied bias.
  • an area for defect measurement 12 is set, however, a circuit pattern itself can be utilized for data for setting the area for defect measurement 12 . That is, a code acquired from crystal defects in a specific area based upon a circuit pattern on the surface of a substrate on which the circuit pattern is formed is used for ID of a card.
  • a code acquired from crystal defects in a specific area based upon a circuit pattern on the surface of a substrate on which the circuit pattern is formed is used for ID of a card.
  • the density is 10 4 pieces per 1 cm 3 and as the similar high density defects to a wafer produced according to Czochralski process can be utilized if crystal defects are detected from the backface of a wafer, there is no problem.
  • ⁇ defect density is high in an area of the surface and the area for defect measurement 12 can be set on the surface, labor for producing a mark 73 can be omitted.
  • the area for defect measurement 12 may be also set in an area different from an area in which a circuit pattern is formed on the surface of the substrate in place of utilizing the circuit pattern itself for data for setting the area for defect measurement 12 .
  • the utilization of the backface it hardly need be said that a mark showing the area 12 is required to be placed.
  • the transparent window 70 is provided so that the user can be certificated utilizing his/her finger print in addition to card ID, however, to certificate an IC card itself, the transparent window is not necessarily required, in that case, the IC card is simplified and the card reader 6 can be also simplified by the quantity.
  • FIG. 10A to FIG. 10D show examples of a method of building a certificate chip in an IC card.
  • FIG. 10A is a sectional view in case a flip-flop chip 100 for functioning as the certificate chip 22 is built in a wiring pattern 23 provided on the substrate sheet 33 described in relation to FIG. 4A .
  • a wiring pattern 131 for functioning as the certificate chip 22 is connected to the wiring pattern 23 via a bump 138 .
  • a transparent film 136 for protection is stuck on a defect recognition surface at the back of the surface on which the wiring pattern 131 is provided.
  • it is useful to protect the defect recognition surface with an SiO 2 film however, a surface on which particles which adhere to the surface of the SiO 2 film adhere can be kept away from an inside defect detection area by further providing a transparent film outside the above film. Therefore, noise against defect recognition due to the adhesion of particles can be reduced.
  • FIG. 10B is a sectional view showing a mounting example in case the wiring pattern 131 itself for making the certificate chip 22 function is utilized for data for setting the area for defect measurement 12 .
  • the certificate chip is in a state of a chip-carrier and after wiring 23 ′ for connecting to the wiring pattern 23 is added to the wiring pattern 131 , the wiring 23 ′ is connected to the wiring pattern 23 .
  • FIG. 10C is a sectional view showing another mounting example in case the wiring pattern 131 itself for making the certificate chip 22 function is utilized for data for setting the area for defect measurement 12 .
  • the certificate chip 22 is embedded in a cutout 33 ′ of the substrate 33 .
  • the certificate chip is in a state of a chip-carrier and after wiring 23 ′ for connecting the wiring pattern 131 on the surface of the certificate chip 22 to the wiring pattern 23 is added, the wiring 23 ′ is connected to the wiring pattern 23 .
  • FIG. 10D is a sectional view showing an example in which the certificate chip 22 is mounted on the substrate 33 .
  • a reference number 201 denotes molding material for holding the certificate chip 22 on the substrate 33 .
  • a mark 73 is provided on the surface.
  • the certificate chip 22 is mounted on a board 139 so that its defect recognition surface is seen from a cutout 145 of the board 139 .
  • a wiring pattern 23 ′ for connecting to wiring 23 on the substrate 33 via a bump 138 ′ is provided on the board 139 .
  • the wiring pattern 131 of the certificate chip 22 and the wiring pattern 23 ′ on the board 139 are connected via a bump 138 and wiring 200 .
  • the certificate chip 22 is also embedded in the cutout 33 ′ of the substrate 33 .
  • the present invention is not limited to a semiconductor substrate and can be applied to all using material to have crystal defects as a result.
  • the present invention can be applied to a case that an amorphous film is formed on a substrate and a circuit pattern is formed in the film for example.
  • the decoding of a code and unfair use by copying can be prevented by using a crystal defect (it is not limited to a crystal and an amorphous defect can be also similarly treated) which it is very difficult to artificially produce for a recognition pattern.
  • the contact type IC card is described as the example, however, the present invention can be also applied to a non-contact type IC card. That is, if a card reader provided with only an optical system for detecting a finger print image and detecting the ID code of the certificate chip has only to be provided, a signal which can be electrically treated can be processed as a currently proposed non-contact type IC card.

Abstract

A semiconductor substrate has a peculiar crystal defect. Crystal defects in a fixed area of a substrate can be treated as data acquired by coding the distribution of the crystal defects. The coded data is utilized for certificate data of an IC card by identifying a semiconductor substrate itself.

Description

    BACKGROUND OF THE INVENTION
  • The present invention relates to an identification unit and an identification method of an article.
  • For example, a card for which money is paid beforehand and where information and functions of quantity equivalent to the paid money are coded and recorded, a so-called prepaid card or a digital cash card which is a type of an IC card via which money can be received and paid, further a cash card and a credit card wherein equivalent money is withdrawn from its owner's account for a bought article are used. An identification system is adopted to check that a user of a card is its owner. That is, the above system is a system of registering personal identification numbers in a card beforehand and checking whether input numbers are equal to the registered personal identification numbers or not in using the card. For such identification of a card, technology for preventing duplication and unfair use is developed and there are the following well-known examples.
  • It is disclosed in Japanese patent laid open Hei 08-211215 to prevent duplication and forgery by utilizing etching technology in the manufacture of a semiconductor device and using optical diffraction structure in relation to a credit card, an identification card and others. In the above well-known example, an identification label composed of diffraction structure formed on a substrate based upon artificial data and further, a transparent overcoat layer on the diffraction structure is disclosed. For a well-known invention using a crack for identification information, there is the U.S. Pat. No. 4,661,983.
  • Also, for a personal identification method and a personal identification unit in a security system for identifying a user of a card as its owner as another well-known invention, a method of identifying a user of a card as its owner utilizing organism information such as a finger print pattern, an iris pattern, a blood vessel pattern of an eyeground and a capillary vessel pattern is known. For example, a unit utilizing a finger print is disclosed in Japanese patent laid open Sho 63-123168. Further, a well-known invention utilizing a radioscopic image of a blood vessel for personal identification information is disclosed in Japanese patent laid open Hei 07-21373.
  • In the meantime, for a method of managing a wafer in a semiconductor device manufacturing process, a method of marking a character and a number respectively having irregularities on the surface by a laser beam and a focused ion beam (FIB) as a mark for recognition on a wafer is disclosed in Japanese patent laid open Hei 08-31705.
  • SUMMARY OF THE INVENTION
  • At present when a card is widely used, it is not permitted to decode ID of an IC card, duplicate an IC card and use it unfairly and as described above, various technologies have been developed. In the meantime, it is also a fact that unfair duplication and the use of a card unfairly duplicated have been not rooted out.
  • In the present invention, an article provided with identification information for making unfair duplication and the use of an unfairly duplicated article extremely difficult, and an identification unit and an identification method respectively utilizing the above identification information of the article are provided and it is proposed as its means to utilize the information of a crystal defect which it is extremely difficult to compose artificially.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1A shows an embodiment in which the present invention is applied to the identification of a semiconductor substrate and FIG. 1B schematically shows an example of a crystal defect which appears in an area for defect measurement set in a semiconductor substrate.
  • FIG. 2 is a block diagram showing an example of a unit for detecting a crystal defect.
  • FIG. 3 explains the outline of the structure of a card in an embodiment in which the present invention is applied to the identification of an IC card.
  • FIG. 4A is a partial sectional view showing the cross section of the IC card shown in FIG. 3 in a part of a chip for certification (a certificate chip) 22 and FIG. 4B is a partial sectional view showing the cross section of the IC card shown in FIG. 3 in a part of a photo image sensor 8.
  • FIG. 5A and FIG. 5B show the outline of the change of a wafer in a processing flow and each process in an example of a process for manufacturing the certificate chip 22.
  • FIG. 6 shows an example in which a position where a mark showing an area for defect measurement is provided is changed.
  • FIG. 7 is a schematic perspective view for explaining an IC card reader explained in FIG. 3.
  • FIG. 8A shows the configuration of the whole system for explaining an example of a method of using the IC card and the card reader in this embodiment and FIG. 8B is a flowchart showing an example of signal processing in the card reader.
  • FIG. 9A, FIG. 9B and FIG. 9C are schematic drawings for explaining a group of memory elements in which a fail bit occurs such as DRAM, SRAM and a flash memory.
  • FIGS. 10A to FIG. 10D show an example of a method of building a certificate chip in an IC card.
  • DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • For one of embodiments utilizing the information of a crystal defect of the present invention, a crystal defect itself inside a semiconductor device can be utilized, however, it will be described below that it is extremely difficult to artificially forge a crystal defect inside a semiconductor device.
  • When a semiconductor crystal is grown, a crystal defect occurs in a crystal. The above crystal defect is a grown-in defect and oxygen precipitate generated by heat treatment for example, however, it is difficult to artificially control the generated position, the depth, the size and others of these. The reason is that the generation of these defects is a phenomenon related to a diffusion phenomenon and it is difficult to control the generated position and the size of an individual defect. These defects are caused by 106 pieces per 1 cm3 (defect density) in a wafer created by Czochralski method for example. It can be said that the above defect density is an enough number to utilize for identification information. It is clear that the distribution pattern of positions in which the above crystal defects exist can be utilized for information for identifying a substrate. Therefore, a substrate can be identified by generating a code using the random pattern of crystal defects which naturally occur inside the substrate.
  • Therefore, the defect pattern of the semiconductor substrate can be utilized for the management code of the substrate. Also, as defects are further added to a chip through a process, identification information is more increased, can be applied to the management of the chip mounted in an IC card and as it is difficult to duplicate a chip having the same code, the unfair used of the IC card can be prevented.
  • EMBODIMENT I
  • In this embodiment, an example that the defect pattern of a semiconductor substrate is utilized for a management code of the substrate will be described. As processing such as heat treatment, etching and further, polish for a substrate is executed in a device manufacturing process, a mark placed on the surface of the substrate is deformed, discolored, damaged or erased hereby and it may become difficult to recognize the mark. Further, if in future, a process from first to last that a single enterprise executes the whole process using one line is changed to an expert allocation system that an expert enterprise which is good at a certain process takes in charge of the process every type of a process, it is expected that a problem occurs in relation to a mark to be placed on a substrate in process management when a device is manufactured by plural enterprises.
  • If the defect pattern of a semiconductor substrate is utilized for a management code of the substrate, a problem can be solved by artificially making a defect.
  • An example that a crystal defect is used for a recognition pattern of a semiconductor substrate and is detected will be described below.
  • As shown in FIG. 1A, an area for defect measurement 12 is set in an area apart by 5-6 mm from the periphery of a wafer 1 on the reverse side of a notch 11 in which no device pattern is formed. An example of the area 12 and an example of crystal defects which appear in the above area are schematically shown in FIG. 1B. The area 12 is surrounded by marks 10 1 to 10 4 in the shape of a cross showing a range for discriminating the area. An area apart by a few mm from the periphery on the reverse side of the notch 11 on the surface of the wafer 1 in which no device pattern is formed is selected, the concave or convex marks 10 1 to 10 4 are formed on the surface of the wafer in a boundary part with the area by a laser beam or FIB and others and the measurement of defects is performed using the marks as the criterion of the area 12. A concrete example of defect measurement will be described later.
  • In the area 12 surrounded by the marks 10 1 to 10 4 as shown by an star, a measured defect 14 exists. The example shown in FIG. 1B schematically shows a state in which the inplane distribution of defects in a range 0.5 μm deep from the surface is measured and enlarged. The above defects 14 do not appear of the same size but some appear large and some hardly appear as shown in FIG. 1B. As the position of a defect in the range of the area is shown by a broken line, the range is divided at a fixed interval in X and Y directions and the positional coordinates of a defect are shown on two-dimensional coordinates every defect. Description using the two-dimensional coordinates is conceptual and it hardly need be said that two-dimensional coordinates are actually not drawn on the wafer 1. In a case shown in FIG. 1B, the two-dimensional X-Y coordinates are shown, the range is divided into 22 pieces in the X direction and into 5 pieces in the Y direction and the position of a defect is shown on the X-Y coordinates in the order of a smaller value on the x-coordinate. In this case, the position of a defect can be shown as (2, 4), (6, 1), (7, 3), (9, 4), (11, 2), (14, 3), (15, 1) and (19, 2) in the order of a smaller value on the x-coordinate. A reason why (13, 1) is ignored is that noise may occur because a signal level is low and the above coordinates are deleted in a process of signal processing. When the above coordinates of defects are represented by a code of a hexadecimal number in order from the left, they are represented as 24-61-73-94-112-143-151-192. These are codes generated in the correspondence of one to one based upon the defect pattern. These codes can be displayed by defect inspection equipment as a code which an operator can recognize.
  • As described above, an effect upon the surface which is susceptible to an artificial change such as particles on the surface and a defect on the surface can be prevented by utilizing an inside defect such as a grown-in defect inside a crystal caused when the crystal is grown, oxygen precipitate generated by heat treatment and slipband dislocation for recognizing a semiconductor chip. As the set area for defect measurement 12 has only to be an area which is not influenced by a circuit pattern, an area around the notch 11 in which no device pattern is formed may be also selected without being limited to the reverse side to the notch 11 on the surface of the above wafer 1. In the example shown in FIG. 1A, the notch is described as an example, however, it hardly need be said that an orientation flat may be used in place of the notch.
  • FIG. 2 is a block diagram showing an example of a detector of a crystal defect. A stage 140 on which the wafer 1 to be measured is laid is provided and light sources 1401 and 1402 for emitting light of different wavelengths are provided under the stage. These light sources irradiate light of the respective wavelengths on the area for defect measurement 12 on the back side of the wafer 1, staggering time. A photo image sensor 141 collects separately each wavelength scattered light from a defect on the surface or an inner defect using an optical component for a wavelength separator. The above detected scattered light intensity signal and a defect detected position are digitized and are stored in a temporary memory 142. Coding processing according to the distribution of defects is executed based upon the stored data by a data processor 143 as described referring to FIG. 1B. A display 144 displays a coded wafer ID.
  • Even if light is simultaneously irradiated from these light sources, the same result is acquired, however, in this case, scattered light is required to be collected via a device for separating scattered light from a defect on the surface of a sample or inside it every wavelength of irradiated light.
  • A method of detecting scattered light from a defect on the surface or an inner defect every wavelength of irradiated light by the photo image sensor 141 and evaluating defect structure is described in detail in “A NEW MEASUREMENT METHOD OF MICRO DEFECTS NEAR SURFACE OF Si WAFERS; OPTICAL SHALLOW DEFECT ANALYZER (OSDA)” Mat. Res. Soc. Symp. Proc. Vol. 442, 1997 announced by these inventors. The photo image sensor 141 has only to be a two-dimensional detector and for example, may be also any of a photo diode array, a photo transistor array and Charge Coupled Device (CCD).
  • To adjust so that the sensitivity of a signal detected from a wafer is fixed, it is also useful to add a mark for adjusting sensitivity to the area for defect measurement 12. That is, as signal strength for detecting a defect by the photo image sensor 141 can be corrected using a detection signal of a mark for adjusting sensitivity as a criterion if it is checked whether a signal at an address of (13, 1) shown in FIG. 1B is effective or not, reliability for the repeatability of the measurement of signal strength can be secured. It is also useful to provide the area for defect measurement 12 in a certain fixed area on the surface reverse to the surface on which a circuit pattern is formed as the mark for adjusting sensitivity beforehand. The marks 10 1 to 10 4 of the area for defect measurement 12 may be also used for the mark for adjusting sensitivity. Further, the marks 10 1 to 10 4 of the area for defect measurement 12 shown in FIG. 1B are not necessarily required at four corners. The reason is that as these have only the meaning of defining the area for defect measurement 12, measurement is enabled if the area of the area for defect measurement is determined beforehand and it is apparent from which position and in which direction measurement is to be performed. Therefore, if a mark of ‘+’ is provided as an example in which the mark 10 1 is shown and it is promised on which side of the mark the area 12 exists, the other three marks are not necessarily required.
  • This embodiment can be also applied to a semiconductor substrate made of silicon on an insulator (SOI). More concretely, this embodiment can be also applied to a semiconductor substrate provided with a first semiconductor substrate and a second semiconductor substrate and formed by oxidizing the above first semiconductor substrate, sticking the oxidized first substrate and the second substrate afterward and heating them. As for the above substrate, as a circuit pattern is formed on the stuck surface of the polished second substrate, the area for defect measurement 12 has only to be formed on the outside surface of the first substrate.
  • As in this embodiment, a method of identifying without artificially providing a mark on the surface of a substrate is effective in the management of wafers by a manufacturer manufacturing wafers. Generally, the manufacturer of wafers does not desire to mark on a product till shipment. It is effective that management is enabled only by setting a specific position of a wafer as the area for defect measurement 12 without artificially marking. When this embodiment is applied to SOI semiconductor substrate, there is a merit that the malfunction of a circuit pattern due to the propagation of free carriers can be prevented because the movement of free carriers by light irradiated on the backface is stopped by a layer of SiO2.
  • EMBODIMENT II
  • In this embodiment, a crystal defect in an IC chip built in an IC card is used for ID of the IC card.
  • As described above, if plane resolution or reading resolution is 10 μm, an area to be identified as identification information is 10 mm×10 mm and the depth is 1 μm, the number of states in each of which 10 pieces of defects exists is 1060. Actually, the size of a chip used for a generally used IC card is 10 mm×10 mm and the thickness is approximately 50 μm. If the size of an area used for identification information is 1 mm×1 mm and the depth is 1 μm, the number of states in each of which 10 pieces of defects exist is 1040 and the number is the quantity of information enough to utilize for recognition. Referring to the drawings, an embodiment in an IC card will be concretely described below.
  • FIG. 3 is an exploded view showing an example of an IC card generally used. In this example, four sheets shown by 31 to 34 are laminated and are shown with them shifted by degrees. A reference number 33 denotes a substrate sheet, a wiring pattern 23 is formed on the surface and a chip required to fulfill a function of an IC card is arranged. The above wiring pattern 23 is wiring between chips.
  • In this embodiment, a certificate chip 22, a control chip 24 and a photo image sensor 8 are mounted. To mount these chips on the substrate, well-known technique may be used. A reference number 32 denotes a spacer sheet and the spacer sheet has cutouts 35, 36 and 37 corresponding to the size of each chip in positions corresponding to each chip described above. The thickness of the spacer sheet 32 approximately corresponds to the height of the chip. Reference numbers 31 and 34 denote a cover sheet and the cover sheets are arranged with the spacer sheet 32 and the substrate sheet 33 kept between the cover sheets. A group of terminals 78 for electrically connecting the certificate chip mounted on the substrate sheet 33 and an external device is provided on the outside surface of the cover sheet 31 as a generally used IC card. As general technique can be applied to the connection of the group of terminals 78 and the wiring pattern 23 or the certificate chip 22 and the control chip 24 as it is, the above connection is not described.
  • In the IC card equivalent to this embodiment, a transparent window 72 is provided in the center of a terminal 79 generally used for a grounding terminal of the group of terminals 78. Further, a transparent window 70 for inputting a finger print is provided. Though concretely described later, the transparent window 72 is provided in a position corresponding to the center of the back-surface of the certificate chip 22, crystal defects in the certificate chip 22 are detected through the window and the validity of the identification of the IC card is evaluated. The transparent window 70 is provided in a position corresponding to the photo image sensor 8, the photo image sensor 8 detects a finger print image imprinted by a user on the transparent window 70 and the validity of the user of the IC card can be evaluated.
  • FIG. 4A is a partial sectional view cut in the part of the certificate chip 22 showing the embodiment of the IC card shown in FIG. 3 and FIG. 4B is a partial sectional view cut in the part of the photo image sensor 8 showing the embodiment of the IC card shown in FIG. 3. In FIG. 4A and FIG. 4B, reference numbers 31 to 34 denote a sheet described in relation to FIG. 3. A part between each sheet shown without a reference number is an adhesive for bonding each sheet. As the adhesive for bonding the sheets 31 to 34 is required to pass light as described later, it is desirable that the adhesive is substantially transparent.
  • As clear referring to FIG. 4A, the wiring pattern 23 is formed on the surface of the substrate sheet 33 and a circuit in a circuit pattern plane 131 of the certificate chip 22 is connected to the wiring pattern 23 via a bump 138. As the backface of the certificate chip 22 corresponds to the position of the transparent window 72, the certificate chip receives light 4 1 and 4 2 from the outside through the transparent window 72 and reflection from the back-surface or scattered light 4 3 from an extremely shallow layer inside the backface can be outgoing to the outside. If the above light 4 1 and 4 2 is light from the light sources 140 1 and 140 2 described in relation to FIG. 2 and reflection from the back-surface or scattered light 4 3 from the extremely shallow layer inside the back-surface is light input to the photo image sensor 141, crystal defects in the certificate chip 22 can be detected. A cutout to which a reference number 73 is allocated on the backface of the certificate chip 22 corresponds to the marks 10 1 to 10 4 in the shape of ‘+’ showing a range for discriminating an area for defect measurement 12 described in relation to FIG. 1B and in this embodiment, the above cutout is a linear cut connecting the mark 10 1 and the mark 10 3 in the shape of ‘+’. It hardly need be said that the similar effect is also acquired if the above cutout is a projection.
  • As clear referring to FIG. 4B, the wiring pattern 23 is formed on the surface of the substrate sheet 33 and an output circuit of a charge coupled device (CCD) is connected to the wiring pattern 23 via the bump 138 on the side of the back of the plane 150 where the charge coupled devices (CCD) are arrayed of the photo image sensor 8. As technique for conducting the output circuit of the charge coupled device (CCD) to the back side is similar to technique of this type generally performed, it is not described. As the plane where the charge coupled devices (CCD) are arrayed of the photo image sensor 8 corresponds to the position of the transparent window 70, the plane receives light according to a finger print pattern 91 imprinted on the outside surface of the transparent window 70 through the transparent window 70. If the output of the photo image sensor 8 is collated with a finger print pattern registered beforehand by signal processing by the control chip 24 for example and it is determined whether they are coincident or not, it can be determined whether a person who imprints a finger print pattern on the transparent window 70 to use an IC card can use the IC card or not.
  • In this case, the finger print pattern of the valid user of the IC card is required to be registered beforehand inside the IC card, however, for it, the following procedure is desirable. First, when an IC card is supplied, its valid user is required to imprint his/her finger print pattern on the outside surface of a transparent member of the transparent window 70. In the state, the IC card is set on an IC card data setting terminal. The image data of the finger print pattern read at this time has only to be stored in a memory to which writing is allowed only once and from which only reading is allowed afterward and which is built in the certificate chip 22 by operating the data setting terminal. Further, in the above operation, crystal defects are fetched from the backface of the certificate chip 22, are coded as described in relation to FIG. 1B and these codes have only to be registered as ID of the IC card. In this case, as ID of the IC card is used for a certificate every time the card is used, it is required to be registered in a section accessible in common via a network such as a certificate authority to be described later in relation to FIG. 8. As the data setting terminal of an IC card currently generally used is not provided with a function for irradiating light on an IC card, the setting terminal is required to be provided with an optical system with which a card reader to be described in an embodiment described later is provided to actually use the IC card equivalent to this embodiment. A reason why the image data of a finger print pattern is stored in the memory built in the certificate chip 22 is that it is more effective for enhancing security that data which should not be falsified is stored in the certificate chip 22 because the validity of an IC card is evaluated based upon crystal defects in the certificate chip 22 in this embodiment. Therefore, if the image data of a finger print pattern is stored in a memory built in the control chip 24, a function of certificating the validity of the user in an IC card can be also realized.
  • As in this embodiment, it is also useful to use a conventional type certification method by personal identification numbers (a certification method by a scrambled code realized by software depending upon a private key such as RAS) together in addition to evaluating the validity of an IC card based upon crystal defects in the certificate chip 22. If only certification by personal identification numbers is executed when a case in which an IC card is used is not important so much, an IC card can be simply used.
  • In the embodiment shown in FIG. 4A and FIG. 4B, the transparent windows 72 and 70 are formed by cutting out the cover sheet 31 and fitting a transparent member such as quartz glass. These can be variously transformed, for example, a layer of a transparent member such as quartz glass is provided between the cover sheet 31 and the spacer sheet 32 and a thin cover sheet 31 a part corresponding to a transparent window of which is cut out may be also provided on the transparent layer.
  • FIG. 5A and FIG. 5B respectively show a processing flow as an example of a process for manufacturing the certificate chip 22 and the outline of the change of a wafer in each process. In a step 120, a device is produced on the surface of a wafer. After the device is completed, a part S1 on the backface of the wafer is mechanically polished and is thinned in a step 121. Afterward, in a step 122, mirror polish is applied to a part S2 by chemical mechanical polishing (CMP), etching the part. Afterward, in a step 123, a part S3 on the back-surface of the wafer is covered with an oxide film 200 by CVD. Afterward, in a step 124, a cutout 73 is provided on the outside surface of the oxide film 200 by FIB or a laser beam. The cutout 73 is provided to specify the area for defect measurement 12 as described above. Afterward, in a step 125, the wafer is cut into chips. As described above, a certificate chip 22 having desired size and thickness h is completed.
  • For the thickness of the certificate chip 22, desired height h is acquired by processing the surface different from the surface on which the circuit pattern 131 is provided by chemical etching after mechanical polish. Concretely, the wafer is thinned up to approximately 50 μm, however, can be thinned up to 30 μm. For the thickness of the whole IC card, 0.85 mm is generally standard, however, if the thickness of the certificate chip 22, the cover sheets 31 and 34 and the spacer sheet 32 is suitably selected, the whole IC card can be thinned up to 0.15 mm.
  • If the whole IC card is thinned up to such a small value, the value is a dimension enough to use crystal defects for IC of the certificate chip. Crystal defects utilized for ID of the certificate chip 22 will be described below.
  • In the first embodiment, crystal defects in a wafer itself and ID of the wafer utilizing them are described, however, as well known, crystal defects are further increased when processing is applied to a wafer. As described in relation to FIG. 5A, heat treatment is applied to the certificate chip 22 in the manufacturing process. SiO2 particles are generated inside the silicon wafer by heat treatment in the process. For the density of the generated SiO2 particles, it is known that at least 108 pieces/cm3 are generated inside in processing for forming the nucleus of SiO2 (four hours at 800° C.) which is model annealing of a wafer generally performed and in heat treatment for forming SiO2 (16 hours at 1000° C.). The oxygen precipitate is generated deep to some extent from the surface, however, even within 50 μm from the surface, the sufficient density of precipitate is acquired. For example, if volume density is 108 pieces/cm3, surface density is 102 pieces/mm2 within 1 μm from the backface. Defects are by far more than those when a wafer is generated.
  • That is, in the certificate chip 22, oxygen precipitate of sufficient density generated in heat treatment in the process can be detected if crystal defects are detected from the backface and crystal defects have sufficient quantity of information as ID.
  • It is described that in this embodiment, the certificate chip 22 and the control chip 24 are provided, however, these can be also integrated and further, it hardly need be said that a processor function for executing image processing for the output of a charge coupled device (CCD) may be added to the photo image sensor 8.
  • FIG. 6 shows an example that a mark 73 is provided on the side of the lower surface of a transparent member fitted into the transparent window 72, that is, on the side opposite to the backface of the certificate chip 22 in place of producing the mark 73 for specifying the area for defect measurement 12 on the backface of the certificate chip 22. In this case, the step 124 described in relation to FIG. 5A can be omitted.
  • EMBODIMENT III
  • FIG. 7 is a schematic perspective view for explaining an IC card reader described in relation to FIG. 3. A reference number 6 denotes a card reader and 2 denotes an IC card. A group of terminals 78, a transparent window 72 and a transparent window 70 are seen on the surface of the IC card. As described above, the transparent window 72 is provided to detect crystal defects in the certificate chip 22 and to evaluate the validity of ID of an IC card. The transparent window 70 is provided to detect a finger print image and to evaluate the validity of a card owner. Light sources 62 1 and 62 2 and a photo image sensor 63 are attached on the inner wall of the card reader 6 opposite to the side of the surface of the IC card 2, that is, the surface having the transparent windows 72 and 70. Further, on this inner wall, a light source 10 is attached and a slit 67 is formed. A reference number 61 denotes space for a card and the space for a card functions as a guide for inserting the IC card 2 into the card reader. A reference number 66 denotes a roller and it is provided to feed the IC card 2 into the space for a card 61 of the card reader 6. A reference number 65 denotes a sensor for stop of moving and it is provided to detect that the IC card 2 reaches a position for the card to be stopped. A reference number 74 denotes a verification switch and it is turned on after the IC card 2 is set in the space for a card 61 of the card reader 6. A reference number 64 denotes a data processor, it corresponds to the temporary memory 142 and the data processor 143 described in relation to FIG. 2 and processes the output of the photo image sensor 63. Reference numbers 75 and 76 denote a display and it displays the output of the data processor 64. A reference number 77 denotes a connector and it is used for connecting the card reader 6 to a controller as described later and sending the output to a center via a network. Though not shown, a contact for coming in contact with the group of terminals 78 of the IC card 2, reading data and others stored in a memory inside the card and sending data to the card from the controller if necessary is provided to the card reader 6.
  • The IC card reader 6 is used as follows. When the IC card 2 is set in the space for a card 61 of the card reader 6 and the verification switch 74 is turned on, the rollers 66 provided on both sides of the space for a card 61 are rotated by a driving motor not shown and feed the IC card 2 to the inside of the space for a card. When the IC card 2 reaches a predetermined position, the sensor for stop of moving 65 is operated and the IC card 2 is stopped. Until the IC card 2 is stopped since it is inserted into the space for a card 61, light is irradiated on the side of the surface of the IC card 2, that is, the transparent window 72 from the light sources 62 1, 62 2 and 10. Light from the light sources 62 1 and 62 2 irradiates the back-surface of the certificate chip 22 as described in relation to FIG. 4A or 6 through the transparent window 72 as described in relation to FIG. 2 and the position of the light sources 62 1 and 62 2 is determined so that the required surface can be irradiated while the IC card moves. Similarly, light from the light source 10 is irradiated on the transparent window 70 through the slit 67. The position of the light source 10 and the slit 67 is determined so that the required surface can be irradiated while the IC card moves.
  • Until the IC card 2 is stopped since it is inserted into the space for a card 61, light from the respective light sources is irradiated on the transparent windows 72 and 70. Therefore, the photo image sensor 63 can detect information in an area for defect measurement 12 specified by the mark 73 on the back-surface of the certificate chip 22 and data for determining whether the IC card is suitably issued or not can be output by processing the output by the data processor 64. It can be determined inside the IC card 2, for example by the control chip 24 by light irradiated through the transparent window 70 whether a finger print image imprinted on the transparent window 70 is coincident with a finger print registered when the IC card is issued or not. The result of processing by the data processor 64 and the result output from the group of terminals 78 via the contact of collating finger print images are displayed on the displays 75 and 76 if necessary. Needless to say, the above results may be also displayed on the controller connected via the connector 77.
  • When the certification of the IC card 2 and required input processing by the controller are finished, the verification switch 74 is turned off for example, the rollers 66 are reversed and the IC card is ejected from the space for a card 61 of the card reader 6.
  • As clear from the above description, in this embodiment, a finger print image is only stored in an IC card when the IC card is issued. Therefore, as a finger print image can be prevented from being sent to a bank, a corporate body such as a company or an institute as data via a network every time an IC card is used, the leakage of private information of an individual and the risk of unfair use can be reduced.
  • EMBODIMENT IV
  • FIG. 8A shows the configuration of the whole system for explaining an example of a method of using an IC card and a card reader in this embodiment and FIG. 8B is a flowchart showing an example of signal processing inside the card reader. A reference number 800 denotes a card reader controller and it is used for providing information required for a card reader 6 and a system and extracting a signal read by the card reader 6. A reference number 801 denotes an input section and 802 denotes a transmitter-receiver. The card reader 6 is composed of a reading section 811 mainly comprising the above light sources 62 1, 62 2 and 10 and a photo image sensor 63, a display section 812 mainly comprising displays 575 and 576, a comparing processing section 813 mainly comprising a data processor 64 and an output section 814.
  • A reference number 820 denotes a network and the controller 800 is connected to the network 820.
  • A reference number 830 denotes a certificate authority, it is connected to a network 820 and fulfills a function for certificating whether a code detected in an area for defect measurement 12 of the IC card and sent is coincident with an IC code registered when the IC card is issued or not. A reference number 831 denotes a transmitter-receiver and 832 denotes an ID collator.
  • A reference number 840 denotes a bank B, it is connected to the network 820 and processes according to information of the receipt and payment of money sent from the controller 800 and information sent from the certificate authority. A reference number 841 denotes a transmitter-receiver, 842 denotes a processor and 844 and 845 are a client account data memory.
  • Suppose that a client K buys a merchandise C at a shop A and pays by withdrawing from his/her account in the bank B using his/her IC card. At the shop A, after the client K is asked to imprint his/her finger print on the transparent window 70 and imprints it, his/her IC card is received. It is inserted into the IC card reader 6 described in relation to FIG. 7. As a result, inside the card reader 6, the finger print image imprinted on the transparent window 70 is detected, an ID code read in the area for defect measurement 12 of the certificate chip 22 from the backface of the IC card is detected and the collation of the finger print, that is, the detected finger print image and a finger print image registered beforehand are compared. It is judged in the comparing processing section 813 by the above collation of the finger prints whether the user of the card is a valid owner or not and the result is displayed in the display section 812. At this time, if the collated finger prints are coincident, that is, the user of the card is a valid owner, the ID code of the certificate chip 22 is also sent to the controller 800 via the output section 814. If the collated finger prints are not coincident, that is, the user of the card is not a valid owner, the succeeding processing is prohibited. FIG. 8B shows the flow of the above signal processing. If it is displayed that the user of the card is a valid owner, a salesperson of the shop A inputs the price of the merchandise C via the input section 801. As a result, the price of the merchandise C, the read ID code and the data of an account for payment registered when the card is issued and others are sent to the network 820 via the transmitter 802. The certificate authority 830 determines whether the ID code is the one registered when the card is issued or not when the certificate authority receives the read ID code and sends the result to the network 820. When the bank B receives the data of the account for payment, it waits for the result of certification from the certificate authority 830, if it is determined that the user of the card is valid, the sum of money equivalent to the price is subtracted from the owner's account data 843 and is added to the account data of the shop A 844. When payment processing by the bank B is finished, the result is sent to the controller 800 of the shop A, the card is ejected from the card reader at the shop A and is returned to the client K. If the account of the shop A is not provided to the bank B, it hardly need be said that processing for receiving money is executed in another bank having the account of the shop A and connected to the network. That is, according to this embodiment, as the validity of the user of the card is evaluated in collating finger prints and the validity of the IC card is evaluated in ID of the certificate chip 22, security is checked doubly. In addition, as described above, if the data of a finger print image is stored in the certificate chip 22, an unfair user cannot pass the double check even if the certificate chip is unfairly replaced.
  • In the meantime, as the above certificate authority only exists as a part of the function of the bank if the above system is applied only in a specific bank system, the certificate authority 830 has only to exist in the bank system.
  • As described above, if the validity of the IC card can be also evaluated based upon personal identification numbers generally used at present in addition to the ID code of the certificate chip 22 read in the area for defect measurement 12 from the backface of the IC card, only processing based upon personal identification numbers may be also executed when the price of the bought merchandise is smaller than a predetermined price. As a load of the network can be reduced in such a state, there is a merit that responsibility is kept enough even if the system becomes a large scale.
  • EMBODIMENT V
  • In the above embodiments, an area for defect measurement 12 is set on the backface of the substrate on which the circuit pattern is formed and a code acquired from crystal defects in the area is used for ID of the card. In this embodiment, not crystal defects themselves but a fail bit pattern of a memory caused by crystal defects is used for recognition. When a memory device is produced, fail bits occur, however, the number of fail bits per one chip can be reduced in an approximately fixed range by mounting it on a wafer produced according to Czochralski process the density of defects of which is controlled. It is known that crystal defects have a bad effect upon the electric characteristic of a device and cause failure (refer to “The Analysis of the Defective Cells Induced by COP in a 0.3-micron-technology Node DRAM” by M. MURANAKA et al., JJAP37(1998)1240-1243). A defect can be detected based upon the failure of the electric characteristic of the memory device. That is, as a fail bit map of a memory device based upon the failure of the electric characteristic of the memory device represents a crystal defect (including a defect by damage which a process causes) and the same cannot be artificially produced, the fail bit map can be utilized for a code for recognizing a semiconductor chip. As there are various types of memory devices and they are different in the density of fail bits, memory devices (DRAM, SRAM, EEPROM a flash memory, FRAM or a magnetic memory and others) different in the level of integration may be also used and a part of address space information may be also used.
  • In this embodiment, as the fail bit pattern of a memory device in an IC card is required to be measured, an optical system described in relation to FIG. 7 is not required, however, in place, a code corresponding to the fail bit pattern is required to be read via a group of terminals 78 for example and is required to be registered in a certificate authority. For a fail bit pattern, a method of measuring it as a digital value as an IC tester that determines whether a characteristic every bit is 0 or 1 showing good or bad and records together with its address and a method of multivaluing the analog electric characteristic of a device corresponding to one address and recording it are enabled.
  • In this case, for a generated code of an IC card, 1) a case that the address of a fail bit is coded and 2) a case that the address of a fail bit and the degree of failure of the bit (the case of multivalued recording) are possible, however, to prevent copying, the latter code is securer. To briefly explain the above, the explanation is as follows. The possibility of copying of a chip the address of the fail bit of which is known is considered and a mask for a semiconductor device is produced so that a bit at the fail bit address fails and a memory is produced. However, even if a device is produced using the above mask, the reason why the latter code is securer is that it is impossible to reproduce the characteristic of a fail bit, aside from reproducing the array of fail bits.
  • Referring to FIG. 9A, FIG. 9B and FIG. 9C, a method of utilizing an electric defect random pattern will be more concretely described below.
  • FIG. 9A, FIG. 9B and FIG. 9C are schematic drawings for explaining a group of memory devices where a fail bit occurs such as DRAM, SRAM, EEPROM and a flash memory. As shown in FIG. 9A, FIG. 9B and FIG. 9C, a two-dimensional area divided into small parts is an area used for a memory and each part denotes one bit of the memory. When the memory is produced, fail bits occur with them dispersed in the whole area. That is, as a black part or a hatched part in an area ID equivalent to ⅓ from the left in the memory area is shown, fail bits occur in the whole area at statistic probability. In the meantime, as for an area M-ARY equivalent to ⅔ shown by an alternate long and short dash line on the right side of the memory area and bit relief is applied as performed in a general memory so that no fail bit seems to exist. That is, to fulfill a proper function as a memory, no fail bit is made to seem to exist by using a normal memory bit existing outside a memory area in place of a fail bit in the memory area by processing by software.
  • FIG. 9A shows the distribution of fail bits of binary data in a memory and a black bit means that it is a bit which does not normally store. FIG. 9B shows an example that though data itself in a memory is binary, two thresholds are provided to judge whether a bit in the memory is a fail bit or not. A black bit also means that it is a bit which does not normally store, however, a hatched bit means that it shows storage output to some extent though it is a bit which does not normally store. As clear when FIG. 9A and FIG. 9B are compared, as a fail bit different in a character from a fail bit shown in FIG. 9A exists in FIG. 9B, stricter certification is enabled by identifying both. FIG. 9C shows the same memory as that shown in FIG. 9A, however, it shows a schematic drawing of a case that thresholds for judging a fail bit are different. As clear when both are compared, even if the memories are the same, fail bit patterns are different.
  • As described above, a fail bit pattern acquired corresponding to a certain electric characteristic such as a leakage current value and threshold voltage for an address can be used for certification. The whole memory is not required to be used for address space used for certification and a part has only to be used. It is desirable that address space is changed by security. For certification, it is desirable that a memory for recording important data and a certificate pattern the copying of which is impossible exist in the same chip. From this viewpoint, for a memory, a nonvolatile memory is convenient and it is desirable that an area of a memory is used for certification and another area is used for reading, writing or storing data.
  • As described above, if failure which occurs in a process for manufacturing a memory is used for certification, more reliable certification is enabled in case measures to prevent unfair forgery are taken.
  • It is conceivable that a memory is produced using a mask such as an element corresponding to the address of a fail bit fails if the fail bit is artificially made and an IC card is unfairly produced. That is, it is conceivable that the element corresponding to the address is incompletely formed or no element is formed. However, according to this method, though fail bits can be made, it is actually impossible to reproduce its electric characteristic. Therefore, it is more difficult to reproduce a pattern shown in FIG. 9B. Also, for another method, a method of replacing the address of a fail bit to be made with another bit is conceivable in place of using the mask described above. This technique is used for a method of bit relief even at present and the operation of replacing the address of a fail bit with the address of a non-defective bit is actually performed by software. As various fail bit patterns are generated by software when the above replacement is allowed, it is effective to substantially prohibit the above replacement. One of those methods is to add temporal constraint to calling a fail bit pattern. Hereby, time to spare for processing by software required for replacing bits is lost and unfair use can be prevented.
  • In the meantime, when the prevention of unfairness is viewed from a point of detecting an electric characteristic, a method of converting the magnitude of a leakage current value from a gate insulating film of a transistor caused by defects in an oxide film under fixed applied strength every address from analog to digital and acquiring a pattern of the value every address and a method of combining some writing bias voltage in a flash memory, converting the voltage (Vt) of a memory cell in fixed time after writing from analog to digital and acquiring a pattern of the value every address are enabled. As examples shown in FIG. 9A and FIG. 9C, in a flash memory, writing voltage is varied and the variation (variation from a pattern shown in FIG. 9A to a pattern shown in FIG. 9C) of a binary fail bit pattern of a memory cell can be also used for a certificate pattern. In this method, concretely, bias is varied and a fail bit pattern has only to be acquired. It is desirable that a certificate authority specifies the quality of applied bias. In this case, it hardly need be said that the condition of bias and a fail bit pattern are required be registered in a certificate authority. That is, when an IC card is issued, these conditions are specified by a certificate authority and a fail bit map is registered. It is the same as a case that crystal defects themselves are used for certification that when an IC card is used, a pattern registered in a certificate authority and a pattern sent from a reader are collated.
  • OTHERS
  • In the above embodiments, an area for defect measurement 12 is set, however, a circuit pattern itself can be utilized for data for setting the area for defect measurement 12. That is, a code acquired from crystal defects in a specific area based upon a circuit pattern on the surface of a substrate on which the circuit pattern is formed is used for ID of a card. As described above, in an epitaxial wafer where an epitaxial layer is provided on a wafer produced according to Czochralski process, so many crystal defects do not exist in the epitaxial film, compared with a wafer produced according to Czochralski process to which heat treatment is applied. The density is 104 pieces per 1 cm3 and as the similar high density defects to a wafer produced according to Czochralski process can be utilized if crystal defects are detected from the backface of a wafer, there is no problem. In the case of a wafer produced according to Czochralski process, as γ defect density is high in an area of the surface and the area for defect measurement 12 can be set on the surface, labor for producing a mark 73 can be omitted.
  • To detect defects from the surface of a substrate, the area for defect measurement 12 may be also set in an area different from an area in which a circuit pattern is formed on the surface of the substrate in place of utilizing the circuit pattern itself for data for setting the area for defect measurement 12. In this case, as the utilization of the backface, it hardly need be said that a mark showing the area 12 is required to be placed.
  • In the above embodiments, in the IC card, to enable the certification of the user himself/herself of a card, the transparent window 70 is provided so that the user can be certificated utilizing his/her finger print in addition to card ID, however, to certificate an IC card itself, the transparent window is not necessarily required, in that case, the IC card is simplified and the card reader 6 can be also simplified by the quantity.
  • Some mounting methods in case a certificate chip 22 is built in an IC card will be described below. These mounting methods can be similarly applied to a control chip 24 or a photo image sensor 8.
  • FIG. 10A to FIG. 10D show examples of a method of building a certificate chip in an IC card.
  • FIG. 10A is a sectional view in case a flip-flop chip 100 for functioning as the certificate chip 22 is built in a wiring pattern 23 provided on the substrate sheet 33 described in relation to FIG. 4A. A wiring pattern 131 for functioning as the certificate chip 22 is connected to the wiring pattern 23 via a bump 138. In this example, a transparent film 136 for protection is stuck on a defect recognition surface at the back of the surface on which the wiring pattern 131 is provided. As described above referring to FIG. 5A and FIG. 5B, it is useful to protect the defect recognition surface with an SiO2 film, however, a surface on which particles which adhere to the surface of the SiO2 film adhere can be kept away from an inside defect detection area by further providing a transparent film outside the above film. Therefore, noise against defect recognition due to the adhesion of particles can be reduced.
  • FIG. 10B is a sectional view showing a mounting example in case the wiring pattern 131 itself for making the certificate chip 22 function is utilized for data for setting the area for defect measurement 12. The certificate chip is in a state of a chip-carrier and after wiring 23′ for connecting to the wiring pattern 23 is added to the wiring pattern 131, the wiring 23′ is connected to the wiring pattern 23.
  • FIG. 10C is a sectional view showing another mounting example in case the wiring pattern 131 itself for making the certificate chip 22 function is utilized for data for setting the area for defect measurement 12. In this example, the certificate chip 22 is embedded in a cutout 33′ of the substrate 33. As in FIG. 10B, the certificate chip is in a state of a chip-carrier and after wiring 23′ for connecting the wiring pattern 131 on the surface of the certificate chip 22 to the wiring pattern 23 is added, the wiring 23′ is connected to the wiring pattern 23.
  • FIG. 10D is a sectional view showing an example in which the certificate chip 22 is mounted on the substrate 33. A reference number 201 denotes molding material for holding the certificate chip 22 on the substrate 33. To use the backface of a surface on which the wiring pattern 131 for making the certificate chip 22 function is provided for a defect recognition surface, a mark 73 is provided on the surface. The certificate chip 22 is mounted on a board 139 so that its defect recognition surface is seen from a cutout 145 of the board 139. A wiring pattern 23′ for connecting to wiring 23 on the substrate 33 via a bump 138′ is provided on the board 139. The wiring pattern 131 of the certificate chip 22 and the wiring pattern 23′ on the board 139 are connected via a bump 138 and wiring 200. In this example, as in FIG. 10C, the certificate chip 22 is also embedded in the cutout 33′ of the substrate 33. In this embodiment, there is a merit that a spacer sheet 32 can be thinned.
  • The above all embodiments are based upon crystal defects in a semiconductor substrate, however, the present invention is not limited to a semiconductor substrate and can be applied to all using material to have crystal defects as a result. The present invention can be applied to a case that an amorphous film is formed on a substrate and a circuit pattern is formed in the film for example.
  • As described above, the decoding of a code and unfair use by copying can be prevented by using a crystal defect (it is not limited to a crystal and an amorphous defect can be also similarly treated) which it is very difficult to artificially produce for a recognition pattern.
  • In the above embodiments, the contact type IC card is described as the example, however, the present invention can be also applied to a non-contact type IC card. That is, if a card reader provided with only an optical system for detecting a finger print image and detecting the ID code of the certificate chip has only to be provided, a signal which can be electrically treated can be processed as a currently proposed non-contact type IC card.

Claims (10)

1-24. (Canceled)
25. A method for identifying an article including the steps of:
mounting a semiconductor chip in which a plurality of electronics devices are formed;
detecting binary data based on the electric characteristics of said devices according to one or a plurality of thresholds of the predetermined area groups of said devices of said chip;
recording the pattern as an ID code of said article, which is lined up said detected data with the predetermined order;
detecting binary data based on the electric characteristics of said devices according to one or a plurality of thresholds of the predetermined area groups of said devices of said chip mounted in an objective article;
transferring the detected binary data of said chip mounted in said objective article to an ID code according to a pattern which is lined up with said detected data with the predetermined order;
comparing said ID code with ID codes recorded; and
determining that said objective article corresponds to an article which has the same ID code recorded, on condition that said ID code is the same ID code with a recorded ID code.
26. An IC card that mounts a semiconductor chip in which a plurality of electronic devices are formed, wherein:
said semiconductor chip comprises:
an electric voltage circuit which applies the predetermined electric voltage to said plurality of electronic devices;
an AD converter which converts an electric characteristics of each of said electronic devices under said applied electric voltage to a digital signal according to the predetermined threshold value; and
a coding circuit which codes the pattern as an ID code of said IC card, which is lined up with said electric characteristics of each of said electronic devices with the predetermined order.
27. An IC card according to claim 26, wherein, said AD converter converts an electric characteristics of each of said electronic devices under said applied electric voltage to binary data according to a plurality of thresholds.
28. An IC card according to claim 26, wherein, said electric voltage circuit applies a plurality of predetermined electric voltages to said plurality of electronic devices; and
wherein, said AD converter converts electric characteristics of each of said electronic devices under said applied plurality of predetermined electric voltages to binary data according to the predetermined threshold value.
29. An IC card that mounts a semiconductor chip in which a memory device is formed, wherein:
said semiconductor chip comprises:
an electric voltage circuit which applies the predetermined electric voltage to a plurality of memory cells of the predetermined address area of said memory device;
an AD converter which converts an electric characteristics of each of said memory cells under said applied electric voltage to a digital signal according to the predetermined threshold value; and
a coding circuit which codes the pattern as an ID code of said IC card, which is lined up with said electric characteristics of each of said memory cells with the predetermined order.
30. An IC card according to claim 29, wherein, said AD converter converts electric characteristics of each of said memory cells under said applied electric voltage to binary data according to a plurality of thresholds.
31. An IC card that mounts a semiconductor chip in which two memory areas or two memory devices are formed, wherein only a first memory area or a first memory device of said two memory areas or two memory devices has bit relief circuits.
32. A method for identifying an article including the steps of:
mounting a semiconductor chip, in which plural numbers of memory cells are formed, in said article;
detecting a fail bit pattern of memory cells in a fixed address space of said semiconductor chip;
recording the fail bit pattern of said memory cells as an ID code of said article;
detecting a fail bit pattern of memory cells in a fixed address space of a semiconductor chip mounted in an objective article to be identified;
transferring the fail bit pattern of said memory cells of said semiconductor chip in said objective article to be identified to an ID code;
comparing said ID code with ID codes recorded; and
determining that said objective article corresponds to an article which has the same ID code recorded, on condition that said ID code is the same ID code as a recorded ID code.
33. A method for identifying an article according to claim 32, further including mounting a semiconductor chip, in which plural numbers of memory cells are formed, in said article;
wherein said fail bit pattern shows good or bad bit results and records the results together with an address, and a method of multivaluing the analog electric characteristic of a device corresponding to one address and recording the one address is enabled.
US10/841,814 1998-12-14 2004-05-10 Information media using information of defect in an article Abandoned US20050041836A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/841,814 US20050041836A1 (en) 1998-12-14 2004-05-10 Information media using information of defect in an article

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP35415598 1998-12-14
JP10-354155 1998-12-14
US09/457,741 US6760472B1 (en) 1998-12-14 1999-12-10 Identification method for an article using crystal defects
US10/841,814 US20050041836A1 (en) 1998-12-14 2004-05-10 Information media using information of defect in an article

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/457,741 Continuation US6760472B1 (en) 1998-12-14 1999-12-10 Identification method for an article using crystal defects

Publications (1)

Publication Number Publication Date
US20050041836A1 true US20050041836A1 (en) 2005-02-24

Family

ID=32587987

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/457,741 Expired - Fee Related US6760472B1 (en) 1998-12-14 1999-12-10 Identification method for an article using crystal defects
US10/841,814 Abandoned US20050041836A1 (en) 1998-12-14 2004-05-10 Information media using information of defect in an article

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/457,741 Expired - Fee Related US6760472B1 (en) 1998-12-14 1999-12-10 Identification method for an article using crystal defects

Country Status (1)

Country Link
US (2) US6760472B1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090261163A1 (en) * 2008-04-22 2009-10-22 Hon Hai Precision Industry Co., Ltd. Electronic device and information transmission method thereof
US20120147378A1 (en) * 2006-09-08 2012-06-14 Dai Nippon Printing Co., Ltd. Evaluation method of fouling, fouling evaluation apparatus, production method of optical member, optical layered body, and display product
US20140226177A1 (en) * 2013-02-12 2014-08-14 Takako SHIJOH Apparatus, system, and method of inspecting image, and recording medium storing image inspection control program
US9983818B2 (en) 2013-09-18 2018-05-29 Toshiba Memory Corporation Individual identification device, storage device, individual identification system, method of individual identification, and program product
CN114580454A (en) * 2022-02-24 2022-06-03 发明之家(北京)科技有限公司 Method and system for identifying poor chip appearance

Families Citing this family (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6760472B1 (en) * 1998-12-14 2004-07-06 Hitachi, Ltd. Identification method for an article using crystal defects
US6415977B1 (en) * 2000-08-30 2002-07-09 Micron Technology, Inc. Method and apparatus for marking and identifying a defective die site
US8171567B1 (en) 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
CA2559283C (en) 2004-03-12 2014-08-26 Russell Paul Cowburn Authenticity verification methods, products and apparatuses
CN100527152C (en) 2004-03-12 2009-08-12 英根亚技术有限公司 Methods and apparatuses for authenticatable printed articles and subsequently verifying them
GB2417592B (en) * 2004-08-13 2006-07-26 Ingenia Technology Ltd Authenticity verification of articles
JP2006190840A (en) * 2005-01-06 2006-07-20 Matsushita Electric Ind Co Ltd Semiconductor package, its identifying apparatus, its id recognizer and recognizing method, semiconductor integrated circuit chip and its identifying apparatus
WO2007012816A1 (en) 2005-07-27 2007-02-01 Ingenia Technology Limited Verification of authenticity
RU2008107316A (en) * 2005-07-27 2009-09-10 Инджениа Текнолоджи Лимитед (Gb) CHECKING THE PRODUCT SIGNATURE CREATED ON THE BASIS OF THE SIGNALS RECEIVED THROUGH THE SCATTERING OF THE COherent OPTICAL RADIATION FROM THE PRODUCT SURFACE
GB2429950B (en) * 2005-09-08 2007-08-22 Ingenia Holdings Copying
EP2110776B1 (en) * 2005-12-23 2012-10-31 Ingenia Holdings Limited Optical authentication
GB2434442A (en) * 2006-01-16 2007-07-25 Ingenia Holdings Verification of performance attributes of packaged integrated circuits
GB2440386A (en) * 2006-06-12 2008-01-30 Ingenia Technology Ltd Scanner authentication
GB2450131B (en) * 2007-06-13 2009-05-06 Ingenia Holdings Fuzzy Keys
JP5126231B2 (en) * 2007-08-10 2013-01-23 富士通セミコンダクター株式会社 Semiconductor element selection and acquisition method, semiconductor device manufacturing method, and semiconductor device
GB2460625B (en) * 2008-05-14 2010-05-26 Ingenia Holdings Two tier authentication
GB2462059A (en) * 2008-07-11 2010-01-27 Ingenia Holdings Authentication scanner
GB2466465B (en) * 2008-12-19 2011-02-16 Ingenia Holdings Authentication
GB2466311B (en) * 2008-12-19 2010-11-03 Ingenia Holdings Self-calibration of a matching algorithm for determining authenticity
US7793837B1 (en) * 2009-03-30 2010-09-14 Visa International Service Association Authentication using physical characteristics of tokens
GB2476226B (en) 2009-11-10 2012-03-28 Ingenia Holdings Ltd Optimisation
WO2011123553A2 (en) 2010-04-02 2011-10-06 Visa International Service Association Crack embossing using diamond technology
TW201137762A (en) * 2010-04-23 2011-11-01 Chung Shan Inst Of Science System and method for determining whether an individual to be identified as a registered individual
JP2013015898A (en) * 2011-06-30 2013-01-24 Fuji Xerox Co Ltd Authenticity determination support unit, authenticity determination device, authenticity determination support program and authenticity determination program
US20140195382A1 (en) * 2011-07-29 2014-07-10 Nec Corporation Collation/retrieval system, collation/retrieval server, image feature extraction apparatus, collation/retrieval method, and program
US20150379321A1 (en) 2012-03-01 2015-12-31 Sys-Tech Solutions, Inc. Methods and a system for verifying the authenticity of a mark
US20150169928A1 (en) 2012-03-01 2015-06-18 Sys-Tech Solutions, Inc. Methods and a system for verifying the identity of a printed item
KR101581196B1 (en) 2012-03-01 2015-12-30 시스-테크 솔루션스 인코포레이티드 Unique identification information from marked features
JP6083129B2 (en) * 2012-04-27 2017-02-22 富士電機株式会社 Semiconductor device manufacturing method and manufacturing apparatus
JP6239471B2 (en) 2014-09-19 2017-11-29 株式会社東芝 Authentication system, authentication device, and authentication method
JP6400469B2 (en) * 2014-12-26 2018-10-03 株式会社東芝 Information processing system and semiconductor device
US9940572B2 (en) 2015-02-17 2018-04-10 Sys-Tech Solutions, Inc. Methods and a computing device for determining whether a mark is genuine
JP6419614B2 (en) 2015-03-17 2018-11-07 株式会社東芝 Data generation apparatus and authentication system
WO2016205102A1 (en) 2015-06-16 2016-12-22 Sys-Tech Solutions, Inc. Methods and a computing device for determining whether a mark is genuine
CA3016131C (en) 2016-03-14 2019-10-22 Sys-Tech Solutions, Inc. Methods and a computing device for determining whether a mark is genuine
JP6495853B2 (en) 2016-03-16 2019-04-03 株式会社東芝 Data generation apparatus, electronic device, and authentication system
HK1223776A2 (en) * 2016-06-10 2017-08-04 Master Dynamic Ltd A process of forming an identification mark, and an identification mark formed by way of such a process

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4661983A (en) * 1982-10-05 1987-04-28 Rca Corporation Secure document identification technique
US5184162A (en) * 1990-08-21 1993-02-02 Kabushiki Kaisha Toshiba Testing integrated circuit using an A/D converter built in a semiconductor chip
US5856070A (en) * 1994-11-09 1999-01-05 International Business Machines Corporation Method of fabricating authentication labels and authenticating patterns incorporating diffraction structures
US6760472B1 (en) * 1998-12-14 2004-07-06 Hitachi, Ltd. Identification method for an article using crystal defects

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4078175A (en) * 1976-09-20 1978-03-07 Nasa Apparatus for use in examining the lattice of a semiconductor wafer by X-ray diffraction
US4534804A (en) * 1984-06-14 1985-08-13 International Business Machines Corporation Laser process for forming identically positioned alignment marks on the opposite sides of a semiconductor wafer
JPS63123168A (en) 1986-11-12 1988-05-26 Omron Tateisi Electronics Co Identity collation system
US4994142A (en) * 1988-09-22 1991-02-19 Rockwell International Corporation Eliminating undercutting of mask material when etching semiconductor topography by native oxide removal
JP2897248B2 (en) * 1989-04-18 1999-05-31 富士通株式会社 Method for manufacturing semiconductor device
JPH0770453B2 (en) * 1989-10-05 1995-07-31 三菱電機株式会社 Method for manufacturing semiconductor device
JP3175188B2 (en) * 1991-05-10 2001-06-11 ソニー株式会社 Method of forming alignment mark
WO1993006903A1 (en) * 1991-10-08 1993-04-15 Kabushiki Kaisha Ace Denken Card for recording number of game media, device for dispensing cards and device for taking cards in
KR950000099B1 (en) * 1991-11-12 1995-01-09 삼성전자 주식회사 Position recognizing method for semiconductor device by binary coding method
JP2911700B2 (en) * 1992-02-17 1999-06-23 三菱電機株式会社 Code reading pattern imaging device
US5325167A (en) * 1992-05-11 1994-06-28 Canon Research Center America, Inc. Record document authentication by microscopic grain structure and method
JPH0721373A (en) 1993-06-17 1995-01-24 Asahi Optical Co Ltd Individual identifying device
US5608816A (en) * 1993-12-24 1997-03-04 Matsushita Electric Industrial Co., Ltd. Apparatus for inspecting a wiring pattern according to a micro-inspection and a macro-inspection performed in parallel
US5619025A (en) * 1994-05-05 1997-04-08 Network Security Technologies Method for tamper-proof identification using photorefractive crystals
JPH0831705A (en) 1994-07-13 1996-02-02 Hitachi Cable Ltd Semiconductor wafer
JP3639636B2 (en) * 1995-04-25 2005-04-20 株式会社ルネサステクノロジ Semiconductor wafer failure analysis apparatus and failure analysis method
US5917332A (en) * 1996-05-09 1999-06-29 Advanced Micro Devices, Inc. Arrangement for improving defect scanner sensitivity and scanning defects on die of a semiconductor wafer
US5843831A (en) * 1997-01-13 1998-12-01 Taiwan Semiconductor Manufacturing Company, Ltd. Process independent alignment system
US6157444A (en) * 1997-11-28 2000-12-05 Hitachi, Ltd. Defect inspection apparatus for silicon wafer
US6121059A (en) * 1998-01-14 2000-09-19 Taiwan Semiconductor Manufacturing Company, Ltd Method and apparatus for identifying failure sites on IC chips
JP2881418B1 (en) * 1998-02-20 1999-04-12 一男 佐藤 Silicon substrate with identification data and method of manufacturing the same
US6049624A (en) * 1998-02-20 2000-04-11 Micron Technology, Inc. Non-lot based method for assembling integrated circuit devices
DE19827202A1 (en) * 1998-06-18 1999-12-23 Wacker Siltronic Halbleitermat Rapid and reliable nondestructive detection and characterization of crystal defects in single crystal semiconductor material, e.g. silicon rods or wafers
US6055293A (en) * 1998-06-30 2000-04-25 Seh America, Inc. Method for identifying desired features in a crystal
US6177287B1 (en) * 1998-09-28 2001-01-23 Advanced Micro Devices, Inc. Simplified inter database communication system
US6392289B1 (en) * 1999-04-15 2002-05-21 Micron Technology, Inc. Integrated circuit substrate having through hole markings to indicate defective/non-defective status of same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4661983A (en) * 1982-10-05 1987-04-28 Rca Corporation Secure document identification technique
US5184162A (en) * 1990-08-21 1993-02-02 Kabushiki Kaisha Toshiba Testing integrated circuit using an A/D converter built in a semiconductor chip
US5856070A (en) * 1994-11-09 1999-01-05 International Business Machines Corporation Method of fabricating authentication labels and authenticating patterns incorporating diffraction structures
US6760472B1 (en) * 1998-12-14 2004-07-06 Hitachi, Ltd. Identification method for an article using crystal defects

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120147378A1 (en) * 2006-09-08 2012-06-14 Dai Nippon Printing Co., Ltd. Evaluation method of fouling, fouling evaluation apparatus, production method of optical member, optical layered body, and display product
US8314936B2 (en) 2006-09-08 2012-11-20 Dai Nippon Printing Co., Ltd. Evaluation method of fouling, fouling evaluation apparatus, production method of optical member, optical layered body, and display product
US8339609B2 (en) * 2006-09-08 2012-12-25 Dai Nippon Printing Co., Ltd. Evaluation method of fouling, fouling evaluation apparatus, production method of optical member, optical layered body, and display product
US20090261163A1 (en) * 2008-04-22 2009-10-22 Hon Hai Precision Industry Co., Ltd. Electronic device and information transmission method thereof
US20140226177A1 (en) * 2013-02-12 2014-08-14 Takako SHIJOH Apparatus, system, and method of inspecting image, and recording medium storing image inspection control program
US9131187B2 (en) * 2013-02-12 2015-09-08 Ricoh Company, Ltd. Image inspection apparatus to detect a defect in a read image
US9983818B2 (en) 2013-09-18 2018-05-29 Toshiba Memory Corporation Individual identification device, storage device, individual identification system, method of individual identification, and program product
CN114580454A (en) * 2022-02-24 2022-06-03 发明之家(北京)科技有限公司 Method and system for identifying poor chip appearance

Also Published As

Publication number Publication date
US6760472B1 (en) 2004-07-06

Similar Documents

Publication Publication Date Title
US6760472B1 (en) Identification method for an article using crystal defects
JP2000235636A (en) Information medium using defect information
KR101168001B1 (en) Authenticity verification methods, products and apparatuses
CN101647030B (en) Fingerprint recognition device and user authentication method for card including the fingerprint recognition device
US6527173B1 (en) System of issuing card and system of certifying the card
US7471810B2 (en) Renewal method and renewal apparatus for an IC card having biometrics authentication functions
JP4027974B2 (en) Data carrier reliability test method
EP1147478B1 (en) Validation method for electronic cash cards and digital identity cards utilizing an optical data storage
KR101734856B1 (en) Certification card checking fingerprint and sensing a henatocele of finger
RU2435218C2 (en) Card with possibility of authentication
GB1574511A (en) Method and apparatus for automatically inspecting and correcting masks
US6622910B2 (en) Method and apparatus for producing personalized chip cards
US10896883B2 (en) Integrated circuit security
KR20180038351A (en) System of certification card checking fingerprint and sensing a henatocele of finger
KR101792002B1 (en) Algorithm and system and method of certification card checking fingerprint for nfc
JPH10293721A (en) Information recording method capable of preventing fraudulent alteration, information recorder and information recording medium
EP1277164B1 (en) Anti-counterfeit authentication method for optical memory cards and hybrid smart cards
KR101732544B1 (en) System of certification card checking fingerprint and sensing a henatocele of finger
JPS59140580A (en) Key card and method of discriminating user qualification using key card
JP2000182019A (en) Method for confirming data for identifying ic card
US20230097955A1 (en) Multipurpose card and reading system for said multipurpose card
EP1291825B1 (en) Card user identification system, host device used for said system, card reader, and card
JP2952882B2 (en) IC wafer and IC pass / fail identification method
JP3453162B2 (en) Hologram code reading apparatus and method, hologram and card with hologram
KR101852154B1 (en) Certification card checking fingerprint

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE