Security
When will we start seeing royalty contributions from your company’s accumulated PUF-related tape-outs?
-
Over the past few years, we have accumulated more than 110 tape-outs related to PUF technology, spanning a wide range of applications—from leading-edge processors, automotive ADAS, and networking, to general consumer products—covering a very diverse set of customers and process platforms.
Because security IP typically requires a longer verification and integration cycle, the time from adoption to mass-production royalties is generally longer than for OTP. However, the stickiness of such IP is also higher. Based on our July royalty report, we have already begun to see some customer applications enter mass production. Past design wins are now converting into more stable and long-term royalty streams. Coupled with the current strong demand for security IP, we expect both license fees and royalties to enter a period of rapid growth.
How is eMemory and PUFsecurity’s crypto co-processor unique compared to others?
-
In the past, when people seek security solutions, they have to look around and search for a couple of providers to provide 1) security storage, 2) Root of Trust, and 3) crypto engines. After they have IPs with all three components, they still need to figure out how to integrate all into a solution. To become to a security co-processor, SoC designers need to add firmware and API such that it can be easily embedded into SoC.
Our PUFcc integrates all three elements into one security solution and is able to provide firmware and API to facilitate the design of SoC. Since our solutions is built on our existing OTP process platforms, we are able to provide our solutions quickly as we currently have more than 600 OTP process platforms ready. No other security IP companies are able to do this.
PUFsecurity recently obtained the Riscure Common Criteria Certification. Does this mean that PUFsecurity can enter the security IP application market more quickly?
-
The benefits for customers are: if customers adopt our solution for their product designs, we can help customers pass security certifications, without extra R&D and certification costs.
Who are your main competitors in the Security IP market, and how does your competitiveness compare to theirs?
-
When looking at the landscape, we see three other main players: Rambus, Cadence (following their acquisition of Secure-IC), and Synopsys. Rambus and Cadence excel in software encryption and protocols, whereas we focus on the hardware physical layer. Because of this, our roles are often complementary—in fact, they are our potential customers. As for Synopsys and their SRAM PUF technology, our NeoPUF offers a clear advantage in physical stability. We fully align with the Caliptra hardware standards, and importantly, NeoPUF doesn't require complex error correction or 'helper data.' By eliminating these extra requirements, we significantly simplify the system architecture. Combined with our radiation-hardened reliability, our PUF-based security IPs remain the top choice for high-security applications.
Although advanced process eFuse has the drawback of burn-in error, foundry can still provide hundreds of thousands of reliability tests, if customers do not need to test to that number, how can we convince customers to use NeoPUF?
-
Reliability is not the only consideration.
UID and Key ensure the chip's identity cannot be tampered with, copied or stolen, and the process of generating it needs to be strictly controlled. To use eFuse to for Key storage or UID, you must first write-in the key or obtain a random number from outside. The eFuse of each chip is empty at the beginning, and the data is written externally, which gives attackers opportunity to manipulate information. Using NeoPUF to generate Key or UID is from the chip's own PUF and cannot be written externally. The security of these two methods are different.
In addition to generating the UID and Key, which cannot be interfered with externally, our PUFrt and Secure OTP both contain physical, electrical anti-tampering designs (certified by Riscure), which can further prevent attacks.
How will the post-quantum encryption algorithm affect the company?
-
Encryption uses crypto algorithms to protect sensitive information, including secure websites or even emails. The widely used public-key encryption system relies on algorithms difficult for even the fastest conventional computers to solve in limited time. However, quantum computers will threaten existing public-key encryption within a decade, The National Institute of Standards and Technology (NIST) is expected to announce new algorithms for encryption in 2024. The main problem with the potential post-quantum encryption algorithm is that the key size is very long, which may be thousands of times longer than current RSA and ECC keys.
The strength of eMemory's PUF-based Root of Trust lies in its flexible and high-speed key generation, which is currently the world's easiest, fastest, and safest method. It will be necessary for customers to adopt PUF-based Hardware Root of Trust to face post-quantum crypto algorithm. The last large-scale replacement of the encryption algorithm was around 2000. At that time, the United States decided to adopt the AES algorithm. It took ten years for major related companies to switch to the new encryption methods, so we expect that changing to a new encryption algorithm will also take around ten years. This is very positive for speeding up customers' adoption of our solution.
To learn more about Post-Quantum Cryptography (PQC), please visit this article.
You mentioned that AI-related applications are among the few early adopters of PUF. Why are they the first to adopt PUF?
-
Advanced AI models are typically stored in conventional commodity flash memory, and this standard storage device has no security function, so it can be stolen or modified. Our PUF-based hardware security Root of Trust IP (PUFrt) and Crypto Coprocessor (PUFcc) can encrypt and authenticate these AI models to protect them from being stolen or modified, which is why customers need PUFsecurity and eMemory solutions.
In addition, all processors have SRAM, one type of volatile memory, just like DRAM. When SRAM is manufactured, it will have bad bits that need OTP for memory repair. In the past, eFuse was used to do SRAM repair functions. However, the SRAM density in AI chips is much bigger, which eFuse cannot fulfil due to density limitations. Our OTP offers 500 to 1000 times bigger density than eFuse. Therefore, for AI with large-density/SRAM, our IP become a necessity. Based on SRAM repair and security requirements, most AI chips will convert from eFuse to our OTP.
Could you update us on the collaboration with Arm?
-
Our collaboration with Arm has evolved from a pure IP licensing model into broader ecosystem collaboration. On the technical side, we align our Hardware Root of Trust with Arm-based security subsystems and reference designs to support confidential computing in edge AI and cloud data centers. At the same time, we continue integrating OTP and PUF technologies on advanced-node platforms to meet system-level security needs. In addition, we have joined the Arm Total Design (ATD) program, leveraging our security IPs to support the security of Arm Compute Subsystems (CSS), as in last year’s N3P project. We expect more 3nm chip adoptions this year, with the collaboration extending into the 2nm process node.
There are ongoing concerns for operations in data centers to be secure and confidential. I heard that AMD, Google, Microsoft and Nvidia recently worked together to develop a Caliptra initiative to define standards for hardware root of trust (HRoT). Are you guys a part of this standard? Follow up: what does this mean for eMemory?
-
Caliptra is an open-source standard that aims to integrate security mechanisms into chips and plays a crucial role in the Open Compute Project (OCP) reference design. Its primary goal is to establish an open-source standard for the Hardware Root of Trust (HRoT), which is essential for hardware-based security functions embedded in CPUs, GPUs, SoCs, ASICs, Network Chips, SSDs, and more.
As far as we know, this is the first time TRNG, OTP and PUF are collectively addressed within a single standard, which happens to be our strengths and expertise. This also means the HRoT of the processor for data centers must include hard macros, TRNG, OTP, and PUF, as key components. However, since hard macros are unavailable through open source, they must be obtained through licensing from us.
While Caliptra is still in its early stages, we foresee broader adoption for hardware-based security in data centers in the future, which opens up significant opportunities for our PUF-based technologies.
In your partnership with Arm, which areas are you targeting? When will you start to see real contributions from them?
-
We are working with them on Confidential Computing Architecture and Corstone Architecture, covering applications such as Smartphones, Automotive and IoT (edge computing). There are license contributions from Automotive and IoT customers already.
Will PUF become the market mainstream in the foreseeable future? Compared to current security solutions, what specific problems does it solve that make it a 'must-have' for chip designers?
-
Our PUF technology serves as a Unique ID and a secure key. Beyond its current role in AI accelerators and data center security, it is becoming essential for the expansion of Edge AI and Physical AI. As we move toward an autonomous world, every autonomous device will require a unique identity and its own cryptographic keys to protect both data and assets. We are providing the foundational trust for this future.
Could you please provide a detailed explanation of your agreement with DARPA? If DARPA adopts eMemory's solutions, will DARPA's suppliers also adopt these solutions? If so, how does eMemory proceed with such business opportunities?
-
When our technology is adopted within DARPA programs, it indicates that the solution has undergone practical validation in high-security systems, covering key requirements such as hardware root of trust, key protection, and system integration. These programs typically establish reference security design frameworks that enable relevant system suppliers and ecosystem partners to evaluate and consider adoption in subsequent projects.
In practice, when these suppliers plan products for defense, aerospace, or other high-security infrastructure, they often prioritize architectures that have already been validated through DARPA programs, as this helps reduce both design and qualification risks.
Synopsys' recently acquired Intrinsic ID. Will this affect your PUF-based applications? Also, will this have an impact on similar technologies and IPs of your company?
-
After the launch of NeoPUF which is our PUF technology, many customers have switched to use our NeoPUF and OTP instead of SRAM PUF, from Intrinsic ID’s technology is based on. The main reason is that our NeoPUF has better properties than SRAM PUF, including:
1) Enhanced stability.
2) Increased reliability.
3) Eliminates the need for error correction.
4) Eliminates the need for OTP for storing helper data.
5) Demonstrates radiation-hardened capabilities
We are confident that we will become a leading company in the field of PUF, OTP, TRNG, and RoT IPs. Furthermore, Synopsys’ acquisition of Intrinsic ID is a good sign that the industry recognizes the significant potential and future demand for PUF in chip security and driving the provisioning of these IP solutions through acquisition to better penetrate the market and capitalize on these opportunities. eMemory recognized this trend in 2015 and developed the best PUF-based technology to address the problems encountered by SRAM PUF. Combined with our own OTP, we can provide customers with complete hardware security solutions. We believe that we are at the forefront of this trend and will be the first to provide one-stop-shop services to meet customer demands.
It looks like TRNG can provide a random source for generating a secret key and making obfuscation that will help resist attacks. Does this imply that having high-speed TRNG in security design is more important than having a PUF?
-
In very high security systems, the high-speed TRNG is very important as well as PUF because in our invention, the high-speed TRNG relies on the PUF as input to generate random numbers. PUF also plays an important role as unique ID, which requires unique numbers from natural randomness. By using this natural randomness, the unique ID can also create the mother security key for the system. Therefore, in very high security systems, both PUF and high-speed TRNG are very important.
What role does eMemory play in OpenTitan?
-
The OpenTitan platform sets the standard for securing data transmission between IoT devices and the cloud through hardware security. Our security IP, being a hardware security solution, can be directly applied to Google's OpenTitan platform for encryption and decryption.
Although the recent blue screen crash event at CrowdStrike seems unrelated to security, CrowdStrike's endpoint security is also touted as Zero Trust. How can eMemory compete with software companies using a hardware approach?
-
Within the Zero Trust framework, eMemory's hardware security provides a hardware root of trust and security computation capabilities. For cybersecurity software companies, hardware security can enhance the security of their applications. eMemory's security IP aims to boost the competitiveness of these software companies, not to compete with them.
Could you share an update on customer adoption progress for Post-Quantum Cryptography (PQC) solutions?
-
Our PUF-based PQC hardware security solution has successfully met NIST FIPS 205 and SP 800-208 standards. Covering critical applications such as key exchange and digital signatures, our technology fully complies with NIST’s currently defined core PQC specifications and is ready for commercial adoption. In terms of application progress, our PQC solutions have already been adopted by several server-related chip customers. These designs utilize our IP to meet NIST-compliant post-quantum security requirements, serving as a critical component of the Hardware Root of Trust within high-security systems.
Chairman Hsu mentioned that eMemory’s True Random Number Generator (TRNG) is the fastest in the world. If this is the case, why haven’t major HPC vendors used it?
-
Our TRNG is based on our OTP and PUF technologies. This is a hard IP and must be qualified in each process. The number of our qualified processes continues to grow, progressing towards the most advanced nodes. As more customers adopt our technology and accumulate production records, and as hackers use faster computing to launch attacks, the market will demand faster random number generators. We are working with our CPU partners to promote this technology and are very confident about its future developments.
Since Caliptra is an open standard, who might play a role in enforcing its adoption? What are the key motivations for customers to implement it?
-
The Caliptra standard primarily establishes security requirements for data centers, largely driven by cloud service providers (CSPs). CSPs offer data centers for data storage, analysis, and services such as AI model training and more. Customers using data center services want their data to be securely protected, analyzed, and deliver expected outcomes. For end devices to access cloud-based data centers, they must comply with Caliptra standards, which require a PUF for generating a unique ID, a TRNG for random number generation, and OTP for private key storage. Our PUFrt IP integrates all three (PUF, OTP, and TRNG) to create a root of trust, meeting the security needs of data center applications, with customer demand for PUFrt steadily increasing.
According to Caliptra documentation, the goal is for confidential computing to first adopt Caliptra, with later plans to expand to all chip types. Is this a primarily datacenter-driven opportunity, or is it expected to extend significantly into edge AI applications as well?
-
Caliptra’s initial focus was indeed on datacenter applications. However, as AI processing shifts toward the edge, such as in IoT sensors, autonomous vehicles, and smart devices, the root of trust (RoT) becomes equally crucial. For edge AI, RoT enables secure authentication when devices communicate with datacenters, ensuring that only verified data and devices can interact with the central systems.
Establishing RoT at both datacenter and edge levels enhances security and integrity across the entire ecosystem, from data generation at the edge to cloud processing and storage. This approach strengthens overall network protection, making data transmission and processing more reliable and secure.
Security is a significant trend, and numerous companies are providing cybersecurity software and services. How does your company fit into the broader security landscape?
-
We offer hardware security solutions based on PUF technology to protect data usages, while many security software and services companies use software for data encryption and secret key generation. The use of software method to secure data usages is easy to be attacked through internet. For a system to be secure, secret keys must be generated randomly and stored in hardware. Our cutting-edge technology combines both the generation and storage of secret keys, providing the most secure foundation for security applications and ensuring data protection.
What function does NeoPUF technology serve in post-quantum encryption?
-
NeoPUF is capable of generating long random numbers, reaching several megabits in length, which can serve as a secret key. Given that post-quantum cryptography (PQC) has secret keys with 20 to 60 times longer longercompared to conventional encryption techniques, NeoPUF can effectively meet this demand for generation.generation. As a result, PQC applications depend on NeoPUF to deliver high-quality secret keyssecret keys, enhancing the security of encryption systems.
Open Compute Project has defined Caliptra root of trust as recommendation for security architecture. eMemory has been preparing for this architecture for a long time. Could you elaborate on the revenue and profit contributions of related IPs?
-
The three key components outlined in the Caliptra specification are the same three key featuresfeatures (OTP, PUF,TRNG) that PUFrt was developed to provide over four years ago. Consequently, starting in mid-2024, we have indeed received inquiries from some customers regarding Caliptra. Notably, in the fourth quarter, several projects have already been licensed or are in the process of being finalized.
Using NVIDIA’s next-generation platforms, such as Vera Rubin, as an example of the industry’s move toward confidential computing and hardware security architectures, could you share more insight into its design-in progress and commercialization timeline in this area?
-
Within NVIDIA’s Vera Rubin architecture, the integration of Caliptra as a Hardware Root of Trust for rack-scale confidential computing has become a core design. This reflects a pivotal, once-in-two-decades structural upgrade in hardware security. As Agentic AI demands significantly higher security, protection is no longer an optional add-on but a foundational element integrated directly into the silicon architecture.
With the protection provided by Caliptra, model developers like OpenAI and Anthropic can securely deploy their multi-billion-dollar models on third-party cloud platforms. They can trust that even on external servers, their model weights remain encrypted and accessible only to their authorized code.
We have already secured multiple design wins within this framework. As we deepen our collaboration with global CSPs (Cloud Service Providers), our Security IP will support the evolving requirements for hardware security and confidential computing in the upcoming Caliptra 2.0. Combined with the essential demand for SRAM repair in inference chips, we expect our penetration within the AI server market to continue expanding.
Business Model
What is the difference between eMemory’s IP business and other IP company’s IP business?
-
There are two categories in IP companies:
1. Pure design IP companies
These companies use existing transistors to design specific functional IPs, such as standard cell, SRAM, high speed IO, etc. They license to fabless companies directly and are companies like ARM, Synopsys, and M31 and RISC-V related.
2. Technology + Design IP companies
These companies have their own device technology developed at foundry and they license the technology to foundries, such as OTP, MTP, and Flash. They also use the device they invented to design IP for fabless companies. These companies are, for example, eMemory and SST. SST’s Flash cell is only on the embedded Flash process, while eMemory’s OTP cell covers all the processes. Therefore, OTP’s market size is much bigger than Flash.
Is the patent right held by the inventor or the company? Can the patent inventor use their invention if they leave the company?
-
All patents are held by the company, and the inventor cannot use the patent if they leave.
Why is your royalty ratio of revenue much higher than other IP companies, and why has it been like this for such a long time?
-
The majority of IP companies mainly collect licensing fees but with no or little royalty. Our strategy is to charge less on licensing in the early stage but insist on collecting royalties.
The company continues to highlight growth in foundry and design-in licenses. With foundries expanding capacity and our TAM increasing, why hasn't our royalty revenue growth outperformed the foundries?
-
The expansion of TAM does not translate immediately and proportionally into royalty revenue, as there is an inherent time lag between the two. Whether it is technology licensing at foundries or design licensing with chip customers, the cycle from contract signing, design-in, and customer mass production to royalty recognition typically takes time—especially for advanced nodes and more complex applications. Over the past two years, while industry growth was concentrated in advanced nodes, many of our licenses were still in the design and integration phase and had not yet reached high-volume production. Currently, our penetration rate among major foundries’ 12-inch capacity is around 1.4%. To date, we have built a solid pipeline, with more than 100 tape-outs at 16nm and below. As these designs gradually move into mass production, we see meaningful room for further growth.
What's your view on the penetration rate over the next few years?
-
We foresee an increase in foundry penetration rate due to our extensive development in technology platforms across multiple foundries. More than 100 process platforms are under development each year, with an average of 400 new product tape-outs growing to an average of 600 new product tape-outs per year, designing in our OTP, MTP and PUF-related security technologies.
What's your conversion rate (hit rate) from new tape-outs to royalty revenue?
-
The conversion rate from tape-out to mass production exceeds 95%. We have a high conversion rate because most of our tape-outs come from the mature applications of big companies. Almost all of these tape-outs will successfully move to production, resulting in royalty revenue.
Will cost constraints push your customers to use eFuse, which is free of charge, to reduce expenses?
-
Many of our customers developed their first-generation products using foundry’s eFuse. However, in response to competitive pressures and the need for improving cost and performance, they transition to our IPs. Our OTP offers improved yield and reduced chip area compared to eFuse and enables customers to protect their intellectual property (i.e. algorithms) stored in the chip. The success of these has led to the continued adoption of our IPs in subsequent generations of products.
The chairman talked about the concept of production capacity, highlighting the increasing number of foundries capacity will increase your total addressable market. Since you have been actively establishing our technology platform in these newly built facilities, can they directly transform to our royalties in the future?
-
Yes, our total addressable market will increase as the world expands foundry capacity and moves toward more advanced technology. Our technology coverage in each foundry will increase as more technology process develop and more fabs are established. With each generation of technology, there is a need for continuity to move to the next generation, therefore our technologies are increasingly available in each foundry. Historically, our royalty income for each foundry have experienced an upward trend. Consequently, as the number of fabs and technology platforms increases, we anticipate a corresponding growth in License fees, NRE, Usage, and Royalties.
Chip iteration cycles have shortened from two years to just one. Is this trend a net positive or negative for the company?
-
This is actually a very positive trend for us. As a provider of hard IP, our solutions need to be process-qualified before it can be adopted by customers. In the past, for chips manufactured on the foundry’s most advanced nodes, completing our IP validation in time for first-wave designs was often challenging. As a result, adoption typically occurred when customers migrated from the previous process node.
Now, as customer migration cycles are accelerating, the likelihood of IP replacement also increases, and the transition to the next generation can happen faster. In addition, with chiplet-based architectures, even if the compute die moves to a leading-edge node such as 2nm, our IP can be introduced earlier through a 3nm chiplet and integrated into the main system via advanced packaging.
There are multiple companies claiming to enter the OTP market and stating that their IPs are more competitive because their IP size is smaller than yours. Will you be losing orders because of them?
-
OTP and MTP technology have been in the market for over 20 years, and competition has never stopped. Our company continues to progress into the most leading process nodes, extending our technology portfolio into the security area. Reputation is very important in the IP industry and our customers, whether they are foundries, fabless, or even OEMs, are all satisfied with our technologies and services. All of these are reflected in our revenue and earnings. We strongly believe this trend will continue in the future.
Does China's semiconductor localization plan include IP? Do we face competition from local IP vendors in China? Are customers switching to domestic IPs due to government policies?
-
As we mentioned before, the NVM IP business is characterized by high technological barriers, very long periods of development, and relatively small revenue output compared to foundries and chips. Therefore, this is not the focus of localization of semiconductor policies. While we have observed some competition from local IP vendors, customers are very careful about IP adoption, which is not only cost consideration. Factors such as patent protection, quality, reliability, and technical support are much more important considerations. Thus, our licensing cases in China continue to increase. Additionally, some customers have encountered big issues after trying local IP vendors and have subsequently switched to using our IP.
TSMC is accelerating their investment in advanced 3D packaging technologies such as CoWoS, InFO, and SoIC. Are there opportunities for your IPs? Can you tell us if you currently have any customers adopting these applications?
-
In 2.5D/3D packaging, chips with different functionalities are packaged together, therefore, if one chip fails, the entire package chip will fail. Our IP can help repair these failed chips. For example, memory components (such as DRAM and SRAM) and image sensors (CIS) are frequently combined with logic ICs. OTP plays an important role as a high-density memory repair and sensor repair in these packaged chips. We already have many customers in this area with continuing adoption from new customers and applications.
Your company’s operating performance has lagged behind Company T’s. Why is that? Given your 3nm verification is complete, can we expect growth to catch up—or even surpass—Company T in the future?
-
Our business model naturally involves a long lead time from technology development to royalty contribution. From initial development to process verification takes about two years, followed by another two years from customer adoption to mass production and royalty generation. It can take several more years to build a meaningful revenue base—but once adopted, a process node can generate royalties for over 20 years.
We’ve followed closely with the leading foundry, starting from 16nm in 2014 through 7/6/5/4nm to 3nm with customer’s design-in. Royalties from sub-16nm nodes are only now becoming more significant. Over both the past 10 and 5 years, our wafer shipment growth has exceeded the leading foundry by 10%. The gap in performance has mainly been due to slower ASP growth, especially in recent years, as the leading foundry’s strong growth was driven by much higher-priced leading-edge nodes.
Historically, our IP enters the market after advanced nodes stabilize and complete roughly two years of foundry verification, capturing second- or third-generation products. With customer demand for security rising sharply, adoption is accelerating. Since advanced-node royalties are several times our historical average, plus incremental PUF-related IP royalties, our growth will be driven by both more wafer volumes and higher royalties per wafer going forward.
With the U.S. pushing for localized semiconductor manufacturing, would this pose any challenges to the company, given that it has historically relied primarily on foundries in Taiwan and China?
-
Our technology is licensed to foundries and IDMs worldwide, extending far beyond just China and Taiwan. Both U.S. domestic semiconductor companies and major global foundries with manufacturing bases in the United States utilize our IPs. As the demand for advanced nodes and security-integrated platforms continues to surge, we believe this broad geographical presence positions us favorably to capture these growth opportunities.
EDA companies are now leveraging AI to assist customers in IC design. When engineers select IP and design modules, AI can automatically generate a design layout, which saves a lot of time. As a result, being included as a module in the EDA software becomes important. EDA companies tend to prioritize their own IPs, and unless customers insistinsist on external IPs, the automatically generated design layout will likely default to using their in-house IPs. What do you view this trend?
-
The EDA companies primarily apply AI-assisted design to purely digital IPs, using standard transistors in these designs. In contrast, our IP design uses our own OTP transistors, which are protected by our patents. Unlike digital IPs, OTP and PUF IPs are specialized analog IPs, making them challenging to design using AI. This is because AI relies on large datasets for training, and they do not have sufficient OTP data to enable effective AI-driven design.
The current utilization rate for mature processes is generally below 70%, and with China expanding its mature process capacity, this will inevitably exert long-term downward pressure on foundry prices. Since a significant portion of your royalties come from mature processes, how do you plan to address this issue?
-
Our OTP is already an industry standard and widely applied in mature processes for major applications such as drivers, PMICs, ISP, and various sensors. As foundries expand their capacity, they will need to license our technology, which will increase our royalties. As existing customers transition to more advanced processes, royalties per chip will increase which can offset the downward pressure on foundry prices due to oversupply. To remain competitive, current foundries must focus on developing high-value-added specialty processes, such as MTP, embedded flash, and PUF, which is already underway. Royalties from MTP and security are much higher than those from OTP. Additionally, with advanced, high ASP processes starting to contribute, we expect the average royalty per chip to continue increasing.
Regarding regional political factors, Europe, the US and Japan are also expanding their capacities, which will require major customers to localize production. Since we are deploying our IP across foundriesfoundries in all regions, this will make it easier for chip customers to use our technology, strengthening the stickiness of our IPs and further broadening the scope of our business.
Application
Do you have any ASIC customers currently integrating our IPs, and what are the specific applications?
-
We have successfully secured multiple ASIC design wins, with several key projects already moving into advanced nodes. Our IPs are being integrated into critical designs such as AI Accelerators, CPUs, ISPs, and high-speed interfaces like SerDes, specifically targeting high-performance applications in AI and HPC.
Furthermore, we continue to expand the adoption and application of our IPs across advanced process platforms through strategic collaborations with our ASIC design service partners. This collaborative approach allows us to scale our presence and capture the growing demand in the high-end application market.
Why has eMemory’s technology become a standard for DDI and PMIC, but not for other applications? What is the alternative for other applications?
-
DDI and PMIC are analog circuit designs. Because there are variations in the production process of fabs, to control the output signal accurately and meet the specification, they need our OTP/MTP IP to perform output tuning, function setting, post-test parameter storage and code update.
These are already a standard in DDI and PMIC designs. We expect more analog and mixed mode application to follow.
Do you have any AI processor customers?
-
The definition of AI is very broad. I think what most people care about now is the large-scale language training models made by leading GPU/CPU providers N and A, both of which have contacted us in the past. Leading GPU provider N started reaching out in 2020, and we have been discussing how to implement our OTP and PUF into their security architecture. The reason for not being adopted was that our 4/5 nm did not complete the qualification at that time.
For the key storage of Hardware Root of Trust (HRoT), they currently use eFuse. As I mentioned earlier, eFuse is not safe for key storage. OTP or PUF+OTP must be used to provide keys secure storage.
For key generation of Hardware Root of Trust (HRoT), they currently use the conventional True Random Number Generator (TRNG) without PUF, so the entropy and speed of key generation is inferior to what we provide in PUF-based True Random Number Generator (TRNG). In fact, our randomness is about 100 times theirs, they also consume about 100 times the power of ours.
Especially in the future, the length of the key required by post-quantum algorithm will be greatly increased, which will also increase the calculation time. Having high-speed key generation such as ours is very advantageous. We are very confident that with the progress of our 3nm and more production records, we have great opportunities in the future.
In addition to these two major chip suppliers, we also have cloud customers doing in-house AI processor in China and US this year. Furthermore, if AI, in a broad sense, also covers edge computing, then we already have many customers. Our solution is only a small area and can generate basic security functions in a simple way, which is very competitive in edge computing.
Which AI server-related applications have adopted the company's IP? Does this include CPU and GPU?
-
Currently, the applications inside the AI server adopting our IPs with tape-outs or in production are: SSD controllers, CXL memory controllers, Retimers, PMIC and SPD for DDR 5 DIMM card. The CPU and GPU have not yet adopted our IP, but we have a good chance when we complete 3nm verification, especially for those who adopt Arm's solution.
Does eMemory do 12nm ISP? In addition, if the OTP of the ISP rises from 2K to 16K, will the output value of royalty be multiplied?
-
Some customers have adopted our IP in 12nm ISPs with small volume production. Since the price of 12nm wafer is 40% higher than that of 22/28nm, if existing 22/28nm customers switch to 12nm, chip size remains the same, then royalty difference will be the increase of wafer pricing, which has nothing to do with how much density is used.
Under the CXL framework, what role do eMemory IPs play?
-
CXL is the protocol to enhance the memory capacity sharing between CPU and other devices, such as GPU. Our CXL Memory eXpander Controller customers adopt our Root of Trust to protect the security of data confidentiality and integrity during data transfer.
Other than PMIC, do other parts of DDR5 also need to use your IPs? Ex: RCD(register clock driver), DB(Data Buffer), SPD Hub, etc...
-
RCD and DB currently do not use. But SPD Hub has adopted NeoEE for 100K endurance. So, inside DDR5 DIMM card, there are two chips SPD hub and PMIC with our MTP solution.
eFuse cannot shrink below 28nm. However, in terms of the advanced manufacturing process, if the customer's eFuse is accidentally blown out, what kind of solution will be adopted if the eMemory solution has not yet been adopted?
-
If the customer uses eFuse and it blows out accidentally, they will usually increase the eFuse area, however, this will take up too much space and would be very expensive for advanced process chips. In addition, eFuse cannot accommodate circuit design that needs to burn a large current. However, since eFuse is provided by the foundry, if there is a problem, the foundry will be responsible, so eFuse is still dominating in advanced manufacturing processes. Another type of technology is anti-fuse, mainly our NeoFuse and competitor’s solution. However, the IP of competitors has experienced problems in advanced manufacturing processes. At present, not heard any customer adopt their solution in leading processes. But it also affects customers' confidence and slows down the adoption of this technology. With more production record and successfully moving into 5nm and 3nm, we are confident to replacing eFuse is only a matter of time.
Are your IPs used in chiplets? What is its current proportion of revenue?
-
Customers use our OTP for multi-chip repair because traditional eFuse is unsuitable for post-packaging modifications. For example, in recent years, ISPs that need to be packaged with DRAM and CIS are driving customers to use our OTP for ISPs. As a result, ISP has contributed to over 10% of our royalties this year.
Furthermore, DRAM manufacturers have also licensed our technology for DRAM repair and after 3D or 2.5D chip packaging with logic chips. We expect more adoptions of our IPs for similar applications in the future.
As generative AI proliferates on edge devices, will this increase the adoption of eMemory IPs?
-
Edge devices all need security protection so that they can securely connect to cloud services. Particularly, with generative AI embedded in edge devices, the AI models and training data must also be protected. Our PUF-based security IPs will have a big market in edge devices.
Will changes in GAA (Gate All Around) and Backside Power Delivery Network affect your technologies?
-
No, this will not affect us. We are developing our IP in related processes.
What opportunities or threats do you face in the design of processors such as CPU/GPU/NPU?
-
Future computing processors will move toward Confidential Computing, which requires high-level security functions. As we have successfully developed PUF-based Root of Trust security IP, which provides very strong security functions for these processors, we have a great opportunity to license these IPs to these Confidential Computing processors. Besides, in order to enhance the computation performance, these processors all need high-density SRAM, our NeoFuse OTP plays an important role for SRAM repair. We expect our IPs to cover a huge market in these processor-related applications.
Regarding Charles' talk, have you seen any customer adoption for SRAM repair?
-
We have AI-related tape-out, which uses our OTP for SRAM repair due to high SRAM density. With the increasing SRAM density in AI and HPC processors, we foresee increasing demand of our OTP for SRAM repair.
Charles mentioned that your IPs play an important role in memory. Since memory is a huge market, how are you progressing in this area?
-
Our DRAM royalties will increase significantly, driven by the increase in production of existing customers and new customers’ ramping up production.
Given the rising memory costs that MediaTek and Qualcomm cited as a headwind for consumer demand, how does eMemory view the potential impact on overall business performance?
-
This year, revenue contributions from a major U.S. smartphone customer have primarily benefited from increased content per device, including the following factors:
1. Increased content from modem-related chips, driven by broader adoption across modem modules.
2. Migration to more advanced processes, with PMICs moving from 0.13µm to 55nm and OLED driver ICs transitioning from 28nm to 16nm, resulting in higher ASP per wafer.
3. Higher DDI content driven by foldable smartphones, where the number of display driver ICs has increased from one to two per device.
Furthermore, we also benefit from a natural hedge in the 'after-market.' Even when new smartphone sales slowdown, the demand for replacement panels remains robust. Because every panel replacement requires a new DDI, this inelastic demand allows us to offset any weakness in the new device market and maintain a resilient revenue base.
What kind of advantages does eMemory have in developing RRAM and MRAM?
-
Our strengths lie in our strong circuit design and device development team. With years of accumulated design experience, numerous patents, and a profound understanding of customer needs, we excel in quickly assisting foundries in customizing specifications for RRAM/MRAM. Our expertise extends to designing IPs tailored to meet customer requirements, and we are able to quickly complete qualification on foundry processes so that customers can use our IPs in their designs and move towards mass production. We have already completed verification at major foundries, and customers have begun to adopt our IPs in their chip designs. Currently, we are moving towards advanced processes.
Samsung is your largest end-chip customer. Does Samsung’s S24 mobile phone use your IPs? Will their memory-related products also include your IPs?
-
Currently, our IPs are adopted in ISP, OLED DDI. In the future, more applications will also adopt our IPs, such as PMIC. Memory-related has already adopted our technologies for the DDR5 module-related chips (in SPD hub and PMIC). In addition, we are developing embedded memory-related technologies in their foundries, which will gradually move its way into more products.
TSMC's latest A16 (1.6nm) process technology, featuring Super Power Rail, will relocate the power grid to the backside of the wafer. Will this have an impact on your technologies?
-
Backside power primarily aims to achieve two objectives in processes below 2nm: 1) Improving power efficiency, and 2) Reducing the number of backend layers to lower manufacturing costs. This has no impact on the use of our IPs.
Do you have cloud service customers?
-
Major cloud service providers are our customers already, using our IP across different product lines. These major players have strict requirements for IP vendors, which we have qualified for many years. Therefore, our IPs can be used in chips of different functionalities, whether in AI servers or edge devices.
Do you have any solutions for chiplet-related?
-
eMemory's IPs have been adopted across various applications, which will be integrated into a packaged module as chiplets:
1) In Digital ICs, for storing keys, ROM code, and repairing high-density SRAM.
2) In Analog ICs, for circuit repair and code storage.
3) In DRAM ICs, for DRAM repair functions.
4) In NAND modules, for storing keys for confidential computing.
In the future development of chiplets, we anticipate that more chips in the chiplets will incorporate our IPs instead of just one chip.
Do you have any solutions for AI applications?
-
There are three aspects to this question:
1) AI applications need a hardware root of trust for protecting assets and ensuring operational security. We offer several security solutions tailored to address these specific security concerns related to AI applications.
2) The computational demands of AI applications require substantial SRAM. Our comprehensive SRAM repair solutions are designed to improve the yield of AI chips and reduce production costs.
3) AI applications rely heavily on a large scale of DRAM. Our complete DRAM repair solution can help meet the demands of AI chips in high-density memory applications.
The chairman mentioned in previous quarters that the SRAM density is increasing, providing more opportunities for your IPs. What is your progress in this area? When can we expect to see contributions?
-
As the demand for AI and HPC increases, the density of embedded SRAM is also growing. Therefore, the demand for using OTP for SRAM repair continues to rise. We have seen an increase in the adoption of our solutions by more customers and products, resulting in more royalty, which we foresee will be a trend and the contribution will increase significantly in the future.
Regarding the trending topic of Co-Packaged Optics (CPO), will your IPs be required for these types of optical communication solutions?
-
We already have customers adopting our solutions in 4nm chips, and we also have startup customers that were recently acquired by industry leaders and have adopted our solutions. As data transmission speeds accelerate to 800G and 1.6T, the precision required for optical-electrical conversion becomes extremely high. In the field of Co-Packaged Optics (CPO), our OTP acts as both a 'Digital ID' and a 'Precision Calibration Profile.'
There are four core reasons why our OTP is essential for CPO:
1. Precision Calibration: Since every silicon photonics chip has slight manufacturing variances, our OTP stores laser power and wavelength parameters to ensure each chip achieves peak transmission performance.
2. Security & Authentication: CPO modules are high-value components for AI data centers. We provide Unique IDs (UID) and Secure Boot to prevent hardware counterfeiting and ensure the integrity of firmware execution.
3. Optimized Configuration: CPO modules contain multiple complex components. Our OTP records hardware revisions and default parameters—such as equalization settings—allowing the system to automatically recognize and optimize the device upon startup, significantly reducing system integration complexity.
4. Space Efficiency & Reliability: Space is extremely limited in CPO packaging. Unlike traditional external EEPROMs, our OTP is integrated directly into the chip. This not only saves critical board space but also ensures data remains permanent and tamper-proof.
What is your progress in DRAM?
-
Our OTP is mainly used for repair function in DRAM. It has already been implemented on multiple process platforms of several customers and is continuously being developed for more advanced processes. Recently, with the mass production of new processes of DRAM customers, the royalties have increased significantly.
MTP’s licensing fees and royalties have experienced the most significant growth. In which application is it mainly used? How do we expect MTP to contribute to the company's future?
-
Our MTP technologies include comprehensive product lines that meet different specifications, ranging from high endurance NeoEE and medium-density NeoMTP which require no additional masks, to high-density embedded flash such as NeoFlash/RRAM. The recent growth in MTP is driven by the adoption of NeoEE in PMIC and SPD ICs on DDR5, as well as NeoMTP in new four-color e-paper and electronic shelf label (ESL) driver ICs. Currently, technology licensing to foundries and the adoption across different applications are accelerating. The royalty rate of MTP is higher than OTP, so its contribution to our revenue will become increasingly significant.
Given that 3nm products currently in mass production have not yet contributed to royalty revenue, how should we think about the adoption trajectory at 3nm going forward? What are the key drivers that support future penetration?
-
It’s common for the initial wave of 3nm SoCs in mass production to utilize design legacies from previous generations as customers prioritize a fast time-to-market. However, we are seeing a clear shift for the next wave of 3nm applications.
As designs become increasingly complex and security requirements more stringent, customers are moving toward proven, pre-validated, and highly integrated IPs. They need system-level security solutions that can be seamlessly integrated into their advanced architectures. This is precisely where our competitive advantage lies—offering a silicon-proven security foundation that reduces design risk and accelerates deployment for our customers.
Are you seeing a trend of customers incorporating AI capabilities into their designs? How does this impact your company?
-
As far as we know, we already have customers who have incorporated AI functions into their designs and are moving to tape out in more advanced processes for functions such as recognition and image processing. As mentioned in the last earnings, AI application systems involve data input, data/model storage and computing (accelerators). Currently, our IPs are adopted for applications related to data input through various sensors. For data storage in NAND/DRAM, customers are using our IPs for SSD controller and CXL memory interface. In terms of computing, which is mainly in advanced processes, we have customers adopting our Root of Trust IPs and SRAM repair IPs. These developments are expected to drive our future licensing and royalty growth.
You recently issued a press release announcing the collaboration with Siemens to launch an SRAM repair tool. Typically, your IP is utilized by foundries and applied to chip customers. Why was it necessary to partner with an EDA company for this release?
-
EDA companies offer Built-In Self-Test (BIST) functionality for SRAM blocks. Through our collaboration with EDA companies, we have developed OTP with an appropriate interface that integrates seamlessly into EDA tools, making OTP repair more user-friendly. With Siemens’ BIST holding over 90% of the market share, our partnership with Siemens represents a powerful alliance.
Do you currently have any customers who have adopted your IP for SRAM repair?
-
Three companies have already adopted our IP, and all are developing AI SoCs in advanced processes.
We see that many high-demand chips in the market, such as CIS, ISP, OLED, TWS, WIFI, TCON, SSD Controller, High-Speed IC, PMIC, STB/DTV, RF, and Switch, are increasingly being developed using more advanced processes or FinFET technology. How will this trend affect company's business?
-
These application ICs, driven by the demand for more functions, higher speed, lower power consumption, and reduced costs, will continue to move toward more advanced processes, and even FinFET process. This is a very favorable development for us because it means the IC chips will become larger, wafer consumption will increase, and both our IP and the unit price of foundry wafers will be higher in advanced processes. All these factors will drive continuous growth in our royalties and licensing fees.
Could you provide more insights into SRAM repair technology? We understand it will be deployed in advanced nodes such as 5nm, 3nm, and 2nm. When do you expect to see revenue contributions from this technology?
-
Using our OTP for SRAM repair has always been the main reason why DDI customers choose our OTP IP. They rely on it because their DDI ICs use large-capacity SRAM, and to maintain high yields and good product performance, OTP is necessary. Now, we're seeing a similar trend in advanced nodes for HPC and AI applications. As these high-end digital ICs require large-capacity SRAM for fast computation, they’ll also start adopting OTP as a standard, just like DDI customers do, to repair SRAM. Across various advanced nodes, we have the demand that customers incorporate our OTP in their designs for SRAM repair.
What are the primary uses for MRAM and RRAM?
-
MRAM and RRAM are both emerging non-volatile memory technologies, each offering unique benefits and use cases. MRAM is characterized by its high speed, low power consumption, and ability to handle numerous rewrites, making it well-suited for applications that demand data reliability and quick access, such as IoT devices, smartphones, automotive electronics, and industrial automation. In contrast, RRAM has a simpler design, is cost-effective, and consumes less power, making it ideal for IoT applications, microcontrollers, and wearable technology. Additionally, as RRAM technology advances, it may find applications in automotive electronics and potentially in AI accelerators and neural network chips in the future.
With the recent sharp decline in AI model costs, several CSPs and chip companies anticipate an acceleration in AI inference applications. What are your key advantages in the inference applications?
-
The decrease in AI costs benefits edge computing applications. In edge AI, data training is used to establish an AI model, which is then used to infer possible results. This entire process, including the protection of input data, the model, and the generated results, requires hardware security IPs. We provide high-performance PUF-based security IPs to make edge AI applications safer and accelerate industry development.