SlideShare a Scribd company logo
1 of 27
Download to read offline
SECS/GEM for Legacy
Semiconductor Equipment
Nirav Thakkar
Founder & President
Background – Automation Purpose
• Prevent human errors
• Selecting wrong recipe – automated through barcode/RFID scan
• Data entry errors – metrology or other process params
• Extract & analyze data from equipment
• Process parameters, alarms, events, equipment configuration, etc.
• Implement FDC & APC
• Improve yield, OEE, cycle time, equipment up-time
• Reduce equipment maintenance cost, “fire-fighting”, total cost of manufacturing
Background - What is secs/gem?
• SECS/GEM protocol/standard for communication between a semiconductor equipment and factory systems – Host,
FDC, AMHS, etc.
• Allows factory systems to collect process parameters – temp, pressure, gas flow, etc., alarms/errors & events – process start,
step finished, etc.
• Also allows factory system to send commands to equipment, such as selecting a recipe, start processing, abort, etc.
• Other features, such as equipment configuration settings, upload & download recipes, etc.
• Messages of the format – SxFy, eg. S2F41 message to send remote commands to the equipment, S5F1 is for equipment to
send alarms to the factory host, etc.
• Visit https://www.einnosys.com/introduction-secs-gem/ for more info
Legacy Equipment Automation Challenges
• SECS/GEM interpretation must be implemented on both sides – equipment
as well as factory system – host, FDC, or other
• Factories can’t implement SECS/GEM on the equipment on their own
• SECS/GEM on the equipment has to be integrated with the equipment software, which
requires source code of the equipment
• Legacy – Equipment on which you can’t get SECS/GEM capability
• OEM out of business, asking “an arm & a leg”, licensing disputes, etc.
Cost of NO Automation on legacy equipment
• Yield loss, due to -
• Human errors – technician selecting wrong recipe
• Lack of data to analyze and enhance process or equipment configuration
• Longer equipment downtime & increased maintenance cost, due to –
• Lack of automated notification of equipment alarms/warnings
• Lack of equipment performance data
• Lower throughput & OEE, higher Cycle Time
• Lower morale due to constant fire fighting
Equipment Software Layers
Options to Automate Legacy Equipment
• Purchase SECS/GEM from OEM, if available
• Transfer equipment logs and process for data collection
• Tap communication between PLC or I/O controller and controller PC
• Connect factory system to equipment PLC or I/O Controller
• Implement innovative solutions
Interfacing at GEM Interface Layer
Purchase SECS/GEM from OEM
• Supported by OEM • Most likely expensive
• Most reliable, if it’s been running for many years
at other factories
• May require other hardware and software upgrade
– additional cost, tool down time & engineering
time to re-qualify equipment & recipes
• Both data collection & machine control options
available
• Cost & effort may be an overkill if only data
collection is required of a few data items
• Fully or close to fully SEMI compliant solution
•Pros Cons
Best option, if available and cost & equipment downtime is reasonable
Options to Automate Legacy Equipment
• Purchase SECS/GEM from OEM, if available
• Transfer equipment logs and process for data collection
• Tap communication between PLC or I/O controller and controller PC
• Connect factory system to equipment PLC or I/O Controller
• Implement innovative solutions
Transfer equipment logs and
process for data collection
• One of the easies ways to extract data from
equipment
• Only data extraction, no machine control
• Safe method – it’s unlikely that this method of
extracting data would cause equipment issues
• Data extracted are not real-time but historical, so
FDC or similar solution can’t be implemented
• Don’t need OEM support in most cases • No uniform solution across the factory as the
method of extraction changes from tool to tool
• All data may not be available on all equipment
•Pros Cons
One of the easiest & safest option to extract historical data
Options to Automate Legacy Equipment
• Purchase SECS/GEM from OEM, if available
• Transfer equipment logs and process for data collection
• Tap communication between PLC or I/O controller and
controller PC
• Connect factory system to equipment PLC or I/O Controller
• Implement innovative solutions
Interfacing between Hardware & Software
Tap Communication between PLC or I/O
Controller & Controller PC
• None • Most intrusive and riskiest option – could easily
impact function or performance of equipment
• Detailed understanding of controller PC and PLC
is required
• Time consuming – trial & error
• No uniform solution across the factory as the
method of extraction changes from tool to tool
•Pros Cons
Most intrusive and risky method, could affect equipment reliability
Options to Automate Legacy Equipment
• Purchase SECS/GEM from OEM, if available
• Transfer equipment logs and process for data collection
• Tap communication between PLC or I/O controller and controller PC
• Connect factory system to equipment PLC or I/O
Controller
• Implement innovative solutions
Connecting directly to Equipment Hardware
Connect factory system to
equipment PLC or I/O Controller
• No OS dependency, since factory system is
directly connecting to the hardware
• Quite intrusive method, one could impact
equipment operation if not careful
• Detailed knowledge of controller software and its
communication with hardware not needed
• Knowledge of where each sensor/device is
connected to the PLC and how to extract needed
• Data extraction can be done thru’ standard
protocols like OPC, Modbus, etc.
• No uniform solution across the factory as the
method of extraction changes from tool to tool
•Pros Cons
Intrusive and risky method, could affect equipment reliability
Options to Automate Legacy Equipment
• Purchase SECS/GEM from OEM, if available
• Transfer equipment logs and process for data collection
• Tap communication between PLC or I/O controller and
controller PC
• Connect factory system to equipment PLC or I/O Controller
• Implement innovative solutions
EIGEMBox – the safest way
• Based on patent pending technology – EINNOSYS
• Plug-n-Play
• No software or hardware installation on equipment required
• Doesn’t matter which OS is running on the equipment
• OEM support not needed
• Takes minutes to setup and seconds to disconnect
• Safest non-intrusive way, since you are not even interjecting at OS level or application level
• Built-in IoT capabilities to extract data from outside sensors as well and send data from these sensors also as
SECS status variables
EIGEMBox – Plug-n-Play Solution
More info at www.einnosys.com/eigembox
EINNOSYS – Semi Software Specialists
Capital
Equipment
Software
100+
Years
Fab/Assembly
Automation
Industry 4.0 &
Smart Factory
Fab/Assembly Automation
• Yield Management
• Cycle Time, OEE & equipment up-time improvement through automation
• Fault Detection & Classification (FDC)
• Advanced Process Control (APC)
• Cycle Time, OEE & equipment up-time improvement through automation
• Cost savings through automation
• MES development, customization & migration
• Automated Inspection (AOI) through computer vision systems
• RFID based WIP tracking & Inventory Management
SECS/GEM Products
• EIGEMBox
• EIGEMEquipment & EIGEM300Equipment
• SDK for OEMs – in .Net, C++, Java (Win, Linux & Android)
• EIGEMHost & EIGEM300Host
• SDK for Fabs/Assemblies – in .Net, C++, Java (Win, Linux & Android)
• EIGEMSim
• SECS/GEM testing/simulation software (Win & Linux)
Other Automation Products
• EIRMS – Recipe Management System
• EIAMS – Alarm Management System
• EIPartsManager – Spare Parts Management
• EIGEMHost – SECS/GEM software for fab host
• EIGEMSim – SECS/GEM compliance testing
• EIQRSTS – Consumables Tracking
• EIMobileMonitor – Industry 4.0 & Smart Factory
• EIBarcodeGuardian – Chemical Management
• EIMWS - Wet Bench Automation
OEM Products & Services
• SECS/GEM implementation
• Controller(GUI) & PLC software development & maintenance
• Sub-tool Integration
• EFEM, Robot, SMIF/FOUP, OCR, RFID, Barcode, etc.
• Computer Vision & Image Processing software
• Data collection & analysis software
• QA, Compliance Audit, Software Refactoring, Design Reviews
Delivery Model
•Product Solutions
•Custom Applications
•Manpower Services
THANK YOU
Email: nirav@einnosys.com
web: www.einnosys.com
Call: +1.805.231.2424
Skype: einnosys

More Related Content

What's hot

Defcon 27 - Writing custom backdoor payloads with C#
Defcon 27 - Writing custom backdoor payloads with C#Defcon 27 - Writing custom backdoor payloads with C#
Defcon 27 - Writing custom backdoor payloads with C#Mauricio Velazco
 
Floodlight OpenFlow Controller Overview
Floodlight OpenFlow Controller OverviewFloodlight OpenFlow Controller Overview
Floodlight OpenFlow Controller Overviewmscohen02
 
Understanding Unit Testing
Understanding Unit TestingUnderstanding Unit Testing
Understanding Unit Testingikhwanhayat
 
Unit and integration Testing
Unit and integration TestingUnit and integration Testing
Unit and integration TestingDavid Berliner
 
Functional Tests Automation with Robot Framework
Functional Tests Automation with Robot FrameworkFunctional Tests Automation with Robot Framework
Functional Tests Automation with Robot Frameworklaurent bristiel
 
CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)Sam Bowne
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2Scott Sutherland
 
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic AnalysisCNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic AnalysisSam Bowne
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationChris Gates
 
Introduction to Test Automation
Introduction to Test AutomationIntroduction to Test Automation
Introduction to Test AutomationPekka Klärck
 
DevOps Testing | Continuous Testing In DevOps | DevOps Tutorial | DevOps Trai...
DevOps Testing | Continuous Testing In DevOps | DevOps Tutorial | DevOps Trai...DevOps Testing | Continuous Testing In DevOps | DevOps Tutorial | DevOps Trai...
DevOps Testing | Continuous Testing In DevOps | DevOps Tutorial | DevOps Trai...Edureka!
 
Robot Framework Introduction
Robot Framework IntroductionRobot Framework Introduction
Robot Framework IntroductionPekka Klärck
 
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ BehaviourWAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ BehaviourSoroush Dalili
 
[2018] Java를 위한, Java에 의한 도구들
[2018] Java를 위한, Java에 의한 도구들[2018] Java를 위한, Java에 의한 도구들
[2018] Java를 위한, Java에 의한 도구들NHN FORWARD
 
What’s the Best PostgreSQL High Availability Framework? PAF vs. repmgr vs. Pa...
What’s the Best PostgreSQL High Availability Framework? PAF vs. repmgr vs. Pa...What’s the Best PostgreSQL High Availability Framework? PAF vs. repmgr vs. Pa...
What’s the Best PostgreSQL High Availability Framework? PAF vs. repmgr vs. Pa...ScaleGrid.io
 
ROS-TSC-ros-k8s.20230309.pdf
ROS-TSC-ros-k8s.20230309.pdfROS-TSC-ros-k8s.20230309.pdf
ROS-TSC-ros-k8s.20230309.pdfTomoya Fujita
 

What's hot (20)

Defcon 27 - Writing custom backdoor payloads with C#
Defcon 27 - Writing custom backdoor payloads with C#Defcon 27 - Writing custom backdoor payloads with C#
Defcon 27 - Writing custom backdoor payloads with C#
 
Floodlight OpenFlow Controller Overview
Floodlight OpenFlow Controller OverviewFloodlight OpenFlow Controller Overview
Floodlight OpenFlow Controller Overview
 
Unit testing
Unit testingUnit testing
Unit testing
 
Understanding Unit Testing
Understanding Unit TestingUnderstanding Unit Testing
Understanding Unit Testing
 
Unit and integration Testing
Unit and integration TestingUnit and integration Testing
Unit and integration Testing
 
Functional Tests Automation with Robot Framework
Functional Tests Automation with Robot FrameworkFunctional Tests Automation with Robot Framework
Functional Tests Automation with Robot Framework
 
CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
 
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic AnalysisCNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
Unit testing
Unit testingUnit testing
Unit testing
 
Introduction to Test Automation
Introduction to Test AutomationIntroduction to Test Automation
Introduction to Test Automation
 
DevOps Testing | Continuous Testing In DevOps | DevOps Tutorial | DevOps Trai...
DevOps Testing | Continuous Testing In DevOps | DevOps Tutorial | DevOps Trai...DevOps Testing | Continuous Testing In DevOps | DevOps Tutorial | DevOps Trai...
DevOps Testing | Continuous Testing In DevOps | DevOps Tutorial | DevOps Trai...
 
Ceh v5 module 14 sql injection
Ceh v5 module 14 sql injectionCeh v5 module 14 sql injection
Ceh v5 module 14 sql injection
 
Robot Framework Introduction
Robot Framework IntroductionRobot Framework Introduction
Robot Framework Introduction
 
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ BehaviourWAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
 
Netcat - A Swiss Army Tool
Netcat - A Swiss Army ToolNetcat - A Swiss Army Tool
Netcat - A Swiss Army Tool
 
[2018] Java를 위한, Java에 의한 도구들
[2018] Java를 위한, Java에 의한 도구들[2018] Java를 위한, Java에 의한 도구들
[2018] Java를 위한, Java에 의한 도구들
 
What’s the Best PostgreSQL High Availability Framework? PAF vs. repmgr vs. Pa...
What’s the Best PostgreSQL High Availability Framework? PAF vs. repmgr vs. Pa...What’s the Best PostgreSQL High Availability Framework? PAF vs. repmgr vs. Pa...
What’s the Best PostgreSQL High Availability Framework? PAF vs. repmgr vs. Pa...
 
ROS-TSC-ros-k8s.20230309.pdf
ROS-TSC-ros-k8s.20230309.pdfROS-TSC-ros-k8s.20230309.pdf
ROS-TSC-ros-k8s.20230309.pdf
 

Similar to Secsgem for legacy semiconductor equipment

Smart Manufacturing Requirements for Equipment Capability and Control
Smart Manufacturing Requirements forEquipment Capability and ControlSmart Manufacturing Requirements forEquipment Capability and Control
Smart Manufacturing Requirements for Equipment Capability and ControlKimberly Daich
 
PlantConnect Presentation
PlantConnect PresentationPlantConnect Presentation
PlantConnect PresentationAkshay Tilak
 
Aud5_Chapter-26.pptx
Aud5_Chapter-26.pptxAud5_Chapter-26.pptx
Aud5_Chapter-26.pptxJayLloyd8
 
PlantConnect insights
PlantConnect insightsPlantConnect insights
PlantConnect insightsAkshay Tilak
 
Smarter Manufacturing through Equipment Data-Driven Application Design
Smarter Manufacturing through Equipment Data-Driven Application DesignSmarter Manufacturing through Equipment Data-Driven Application Design
Smarter Manufacturing through Equipment Data-Driven Application DesignKimberly Daich
 
Fdp embedded systems
Fdp embedded systemsFdp embedded systems
Fdp embedded systemsKavya G
 
ROI-based Approach for Evaluating Application Data Collection Use Case Altern...
ROI-based Approach for Evaluating Application Data Collection Use Case Altern...ROI-based Approach for Evaluating Application Data Collection Use Case Altern...
ROI-based Approach for Evaluating Application Data Collection Use Case Altern...Kimberly Daich
 
Embedded Systems - A Brief Introduction
Embedded Systems - A Brief IntroductionEmbedded Systems - A Brief Introduction
Embedded Systems - A Brief Introductionkrnathan
 
Tulane Technology Services Computer/OS Upgrades
Tulane Technology Services Computer/OS UpgradesTulane Technology Services Computer/OS Upgrades
Tulane Technology Services Computer/OS UpgradesDerekToten
 
Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016Inductive Automation
 
Basics of Automation, PLC and SCADA
Basics of Automation, PLC and SCADABasics of Automation, PLC and SCADA
Basics of Automation, PLC and SCADAIndira Kundu
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Perficient
 
Io techniques & its types
Io techniques & its typesIo techniques & its types
Io techniques & its typesNehal Naik
 
Vendor innovation – New Technologies in practice
Vendor innovation – New Technologies in practiceVendor innovation – New Technologies in practice
Vendor innovation – New Technologies in practiceNNE
 

Similar to Secsgem for legacy semiconductor equipment (20)

Smart Manufacturing Requirements for Equipment Capability and Control
Smart Manufacturing Requirements forEquipment Capability and ControlSmart Manufacturing Requirements forEquipment Capability and Control
Smart Manufacturing Requirements for Equipment Capability and Control
 
PlantConnect Presentation
PlantConnect PresentationPlantConnect Presentation
PlantConnect Presentation
 
Ashrae presentation Managing BMS systems
Ashrae presentation Managing BMS systemsAshrae presentation Managing BMS systems
Ashrae presentation Managing BMS systems
 
Aud5_Chapter-26.pptx
Aud5_Chapter-26.pptxAud5_Chapter-26.pptx
Aud5_Chapter-26.pptx
 
PlantConnect insights
PlantConnect insightsPlantConnect insights
PlantConnect insights
 
Smarter Manufacturing through Equipment Data-Driven Application Design
Smarter Manufacturing through Equipment Data-Driven Application DesignSmarter Manufacturing through Equipment Data-Driven Application Design
Smarter Manufacturing through Equipment Data-Driven Application Design
 
Embedded
EmbeddedEmbedded
Embedded
 
Fdp embedded systems
Fdp embedded systemsFdp embedded systems
Fdp embedded systems
 
Computer basic
Computer basicComputer basic
Computer basic
 
AIA Solutions Brochure
AIA Solutions BrochureAIA Solutions Brochure
AIA Solutions Brochure
 
ROI-based Approach for Evaluating Application Data Collection Use Case Altern...
ROI-based Approach for Evaluating Application Data Collection Use Case Altern...ROI-based Approach for Evaluating Application Data Collection Use Case Altern...
ROI-based Approach for Evaluating Application Data Collection Use Case Altern...
 
Embedded Systems - A Brief Introduction
Embedded Systems - A Brief IntroductionEmbedded Systems - A Brief Introduction
Embedded Systems - A Brief Introduction
 
Tulane Technology Services Computer/OS Upgrades
Tulane Technology Services Computer/OS UpgradesTulane Technology Services Computer/OS Upgrades
Tulane Technology Services Computer/OS Upgrades
 
Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016
 
Basics of Automation, PLC and SCADA
Basics of Automation, PLC and SCADABasics of Automation, PLC and SCADA
Basics of Automation, PLC and SCADA
 
PLC & SCADA
PLC & SCADAPLC & SCADA
PLC & SCADA
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
 
Io techniques & its types
Io techniques & its typesIo techniques & its types
Io techniques & its types
 
Get More Data Into Your SCADA
Get More Data Into Your SCADAGet More Data Into Your SCADA
Get More Data Into Your SCADA
 
Vendor innovation – New Technologies in practice
Vendor innovation – New Technologies in practiceVendor innovation – New Technologies in practice
Vendor innovation – New Technologies in practice
 

Recently uploaded

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 

Recently uploaded (20)

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 

Secsgem for legacy semiconductor equipment

  • 1. SECS/GEM for Legacy Semiconductor Equipment Nirav Thakkar Founder & President
  • 2. Background – Automation Purpose • Prevent human errors • Selecting wrong recipe – automated through barcode/RFID scan • Data entry errors – metrology or other process params • Extract & analyze data from equipment • Process parameters, alarms, events, equipment configuration, etc. • Implement FDC & APC • Improve yield, OEE, cycle time, equipment up-time • Reduce equipment maintenance cost, “fire-fighting”, total cost of manufacturing
  • 3. Background - What is secs/gem? • SECS/GEM protocol/standard for communication between a semiconductor equipment and factory systems – Host, FDC, AMHS, etc. • Allows factory systems to collect process parameters – temp, pressure, gas flow, etc., alarms/errors & events – process start, step finished, etc. • Also allows factory system to send commands to equipment, such as selecting a recipe, start processing, abort, etc. • Other features, such as equipment configuration settings, upload & download recipes, etc. • Messages of the format – SxFy, eg. S2F41 message to send remote commands to the equipment, S5F1 is for equipment to send alarms to the factory host, etc. • Visit https://www.einnosys.com/introduction-secs-gem/ for more info
  • 4. Legacy Equipment Automation Challenges • SECS/GEM interpretation must be implemented on both sides – equipment as well as factory system – host, FDC, or other • Factories can’t implement SECS/GEM on the equipment on their own • SECS/GEM on the equipment has to be integrated with the equipment software, which requires source code of the equipment • Legacy – Equipment on which you can’t get SECS/GEM capability • OEM out of business, asking “an arm & a leg”, licensing disputes, etc.
  • 5. Cost of NO Automation on legacy equipment • Yield loss, due to - • Human errors – technician selecting wrong recipe • Lack of data to analyze and enhance process or equipment configuration • Longer equipment downtime & increased maintenance cost, due to – • Lack of automated notification of equipment alarms/warnings • Lack of equipment performance data • Lower throughput & OEE, higher Cycle Time • Lower morale due to constant fire fighting
  • 7. Options to Automate Legacy Equipment • Purchase SECS/GEM from OEM, if available • Transfer equipment logs and process for data collection • Tap communication between PLC or I/O controller and controller PC • Connect factory system to equipment PLC or I/O Controller • Implement innovative solutions
  • 8. Interfacing at GEM Interface Layer
  • 9. Purchase SECS/GEM from OEM • Supported by OEM • Most likely expensive • Most reliable, if it’s been running for many years at other factories • May require other hardware and software upgrade – additional cost, tool down time & engineering time to re-qualify equipment & recipes • Both data collection & machine control options available • Cost & effort may be an overkill if only data collection is required of a few data items • Fully or close to fully SEMI compliant solution •Pros Cons Best option, if available and cost & equipment downtime is reasonable
  • 10. Options to Automate Legacy Equipment • Purchase SECS/GEM from OEM, if available • Transfer equipment logs and process for data collection • Tap communication between PLC or I/O controller and controller PC • Connect factory system to equipment PLC or I/O Controller • Implement innovative solutions
  • 11. Transfer equipment logs and process for data collection • One of the easies ways to extract data from equipment • Only data extraction, no machine control • Safe method – it’s unlikely that this method of extracting data would cause equipment issues • Data extracted are not real-time but historical, so FDC or similar solution can’t be implemented • Don’t need OEM support in most cases • No uniform solution across the factory as the method of extraction changes from tool to tool • All data may not be available on all equipment •Pros Cons One of the easiest & safest option to extract historical data
  • 12. Options to Automate Legacy Equipment • Purchase SECS/GEM from OEM, if available • Transfer equipment logs and process for data collection • Tap communication between PLC or I/O controller and controller PC • Connect factory system to equipment PLC or I/O Controller • Implement innovative solutions
  • 14. Tap Communication between PLC or I/O Controller & Controller PC • None • Most intrusive and riskiest option – could easily impact function or performance of equipment • Detailed understanding of controller PC and PLC is required • Time consuming – trial & error • No uniform solution across the factory as the method of extraction changes from tool to tool •Pros Cons Most intrusive and risky method, could affect equipment reliability
  • 15. Options to Automate Legacy Equipment • Purchase SECS/GEM from OEM, if available • Transfer equipment logs and process for data collection • Tap communication between PLC or I/O controller and controller PC • Connect factory system to equipment PLC or I/O Controller • Implement innovative solutions
  • 16. Connecting directly to Equipment Hardware
  • 17. Connect factory system to equipment PLC or I/O Controller • No OS dependency, since factory system is directly connecting to the hardware • Quite intrusive method, one could impact equipment operation if not careful • Detailed knowledge of controller software and its communication with hardware not needed • Knowledge of where each sensor/device is connected to the PLC and how to extract needed • Data extraction can be done thru’ standard protocols like OPC, Modbus, etc. • No uniform solution across the factory as the method of extraction changes from tool to tool •Pros Cons Intrusive and risky method, could affect equipment reliability
  • 18. Options to Automate Legacy Equipment • Purchase SECS/GEM from OEM, if available • Transfer equipment logs and process for data collection • Tap communication between PLC or I/O controller and controller PC • Connect factory system to equipment PLC or I/O Controller • Implement innovative solutions
  • 19. EIGEMBox – the safest way • Based on patent pending technology – EINNOSYS • Plug-n-Play • No software or hardware installation on equipment required • Doesn’t matter which OS is running on the equipment • OEM support not needed • Takes minutes to setup and seconds to disconnect • Safest non-intrusive way, since you are not even interjecting at OS level or application level • Built-in IoT capabilities to extract data from outside sensors as well and send data from these sensors also as SECS status variables
  • 20. EIGEMBox – Plug-n-Play Solution More info at www.einnosys.com/eigembox
  • 21. EINNOSYS – Semi Software Specialists Capital Equipment Software 100+ Years Fab/Assembly Automation Industry 4.0 & Smart Factory
  • 22. Fab/Assembly Automation • Yield Management • Cycle Time, OEE & equipment up-time improvement through automation • Fault Detection & Classification (FDC) • Advanced Process Control (APC) • Cycle Time, OEE & equipment up-time improvement through automation • Cost savings through automation • MES development, customization & migration • Automated Inspection (AOI) through computer vision systems • RFID based WIP tracking & Inventory Management
  • 23. SECS/GEM Products • EIGEMBox • EIGEMEquipment & EIGEM300Equipment • SDK for OEMs – in .Net, C++, Java (Win, Linux & Android) • EIGEMHost & EIGEM300Host • SDK for Fabs/Assemblies – in .Net, C++, Java (Win, Linux & Android) • EIGEMSim • SECS/GEM testing/simulation software (Win & Linux)
  • 24. Other Automation Products • EIRMS – Recipe Management System • EIAMS – Alarm Management System • EIPartsManager – Spare Parts Management • EIGEMHost – SECS/GEM software for fab host • EIGEMSim – SECS/GEM compliance testing • EIQRSTS – Consumables Tracking • EIMobileMonitor – Industry 4.0 & Smart Factory • EIBarcodeGuardian – Chemical Management • EIMWS - Wet Bench Automation
  • 25. OEM Products & Services • SECS/GEM implementation • Controller(GUI) & PLC software development & maintenance • Sub-tool Integration • EFEM, Robot, SMIF/FOUP, OCR, RFID, Barcode, etc. • Computer Vision & Image Processing software • Data collection & analysis software • QA, Compliance Audit, Software Refactoring, Design Reviews
  • 26. Delivery Model •Product Solutions •Custom Applications •Manpower Services
  • 27. THANK YOU Email: nirav@einnosys.com web: www.einnosys.com Call: +1.805.231.2424 Skype: einnosys