109
Background Statement for SEMI Draft Document 5888 Revision to: SEMI E170-0815: SPECIFICATION FOR PRODUCTION RECIPE CACHE (PRC) with title change to SPECIFICATION FOR SECURED FOUNDATION OF RECIPE MANAGEMENT SYSTEM (SFORMS) SEMI E170.1-0815: SPECIFICATION FOR SECS-II PROTOCOL FOR PRODUCTION RECIPE CACHE with title change to SPECIFICATION FOR SECS-II PROTOCOL FOR SECURED FOUNDATION OF RECIPE MANAGEMENT SYSTEM (SFORMS) Note: This background statement is not part of the balloted item. It is provided solely to assist the recipient in reaching an informed decision based on the rationale of the activity that preceded the creation of this document. Note: Recipients of this document are invited to submit, with their comments, notification of any relevant patented technology or copyrighted items of which they are aware and to provide supporting documentation. In this context, ‘patented technology’ is defined as technology for which a patent has issued or has been applied for. In the latter case, only publicly available information on the contents of the patent application is to be provided. Background Through the application studies, addition of capability to support ‘Remote Access operation’ is requested and the TF agreed to add the capability as an option. According to this addition, following revisions are needed. Generalize and improve the purpose section and the scope section in order to include ‘Remote Access operation’ Change document title to align with the expanded Scope. Add specifications of Remote Access (including some amendments in other sections to align with this addition) Add TypeID and EquipmentID to RecipeXID in order to specify what equipment the recipe is composed for In order to align with above additions, make necessary changes to SEMI E170 and SEMI E170.1 1

Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

Embed Size (px)

Citation preview

Page 1: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

Background Statement for SEMI Draft Document 5888Revision to:

SEMI E170-0815: SPECIFICATION FOR PRODUCTION RECIPE CACHE (PRC) with title change to SPECIFICATION FOR SECURED FOUNDATION OF RECIPE MANAGEMENT SYSTEM (SFORMS)

SEMI E170.1-0815: SPECIFICATION FOR SECS-II PROTOCOL FOR PRODUCTION RECIPE CACHE with title change to SPECIFICATION FOR SECS-II PROTOCOL FOR SECURED FOUNDATION OF RECIPE MANAGEMENT SYSTEM (SFORMS)

Note: This background statement is not part of the balloted item. It is provided solely to assist the recipient in reaching an informed decision based on the rationale of the activity that preceded the creation of this document.

Note: Recipients of this document are invited to submit, with their comments, notification of any relevant patented technology or copyrighted items of which they are aware and to provide supporting documentation. In this context, ‘patented technology’ is defined as technology for which a patent has issued or has been applied for. In the latter case, only publicly available information on the contents of the patent application is to be provided.

Background

Through the application studies, addition of capability to support ‘Remote Access operation’ is requested and the TF agreed to add the capability as an option. According to this addition, following revisions are needed.

Generalize and improve the purpose section and the scope section in order to include ‘Remote Access operation’

Change document title to align with the expanded Scope. Add specifications of Remote Access (including some amendments in other sections to align with this addition) Add TypeID and EquipmentID to RecipeXID in order to specify what equipment the recipe is composed for In order to align with above additions, make necessary changes to SEMI E170 and SEMI E170.1

Also, Version ID has been planned to be defined in #5618A PRI, however, development of the document is frozen. So, the TF decided to add the definition in SEMI E170. Add definition of VersionID

In addition, Incremental Implementation Step is added.

Editorial errors and insufficient explanations that are found through the revision work are amended.

Note 1: Because this ballot involves changes to the Title and the Scope section, it cannot be conducted as Line Item ballot. Any part of the entire Document is open for Negatives and Comments regardless of the markups (e.g., underlines and strikethrough). In order to avoid unnecessary delays in developing the revisions, however, it would be appreciated if any items that you may object to, but that are not listed as changes, be objected to as comments rather than rejections, so that they may be taken up as new business at the next meetings.

1

Page 2: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

Note 2: In this document, remarkable amendments from published Standard are distinguished by color. In addition, the added parts are typically highlighted with underline; the removed parts are typically denoted with double strikeout marks (on the bottom for figure). Deleted figures may also be denoted with Delete, added figures may also be denoted with Add for better readability. These markings are for highlight in the ballot only. They are not proposed to be included in the updated standard.

2

Page 3: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

Revision ControlThis revision control records activity within the task force as well as formal submit and resubmit dates and results per SEMI. Entries have been made by the task force.Date Version Name Edits

Review InformationTask Force Review Committee Review

Group: Japan GEM300 TF Japan TC Chapter of Information & Control Global Technical Committee

Date: Thursday, December 10, 2015 Friday, December 18, 2015Time & Time Zone: 1:00 p.m.- 5:00 p.m. [JST] 10:00 a.m.- 5:00 p.m. [JST]Location: SEMI Japan, Ichigaya office Tokyo Big Sight Conference TowerCity, State/Country: Tokyo, Japan Tokyo, JapanLeader(s): Yoshihisa Takasaki (SCREEN

Semiconductor Solution)Yuko Toyoshima (Hitachi High-Technologies)

Takayuki Nishimura (SCREEN Semiconductor Solutions Co., Ltd)Mitsuhiro Matsuda (Hitachi Kokusai Electric Inc.)

Standards Staff: Chie Yanagisawa (SEMI Japan)81.3.3222.5863 / cyanagisawa @semi.org

Chie Yanagisawa (SEMI Japan)81.3.3222.5863 / cyanagisawa @semi.org

Task Force Review meeting’s details are subject to change, and additional review sessions may be scheduled if necessary. Contact the task force leaders or Standards staff for confirmation.

3

Page 4: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

SEMI E170-mmyy: SPECIFICATION FOR SECURED FOUNDATION OF RECIPE MANAGEMENT SYSTEM (SFORMS) PRODUCTION RECIPE CACHE (PRC)

This Standard was technically approved by the Information & Control Global Technical Committee. This edition was approved for publication by the global Audits and Reviews Subcommittee on Mmmm Dd, 2015. Available at www.semiviews.org and www.semi.org in Mmmmmm 2015.

1 Purpose1.1 The purpose of this Standard is to provide a standardized ‘secure, safe and efficient recipe operation transfer and storage mechanism between from Recipe Management System (RMS) and Server to equipment’, which is used as a foundation of RMS for semiconductor manufacturing systems or similar ones, where the management of the master copies of the recipes for mass-production is centralized on the Recipe Server.

1.2 The purpose of this Standard is to provide a standardized ‘secure, safe and efficient recipe operation mechanism between Recipe Management System (RMS) and equipment’ which especially supports RMS with the following concepts.

Management of recipes is centralized to RMS (Single Point Of Recipe Management (SPORM) concept) Storage of the master copies of the recipes are centralized to Recipe Server in RMS (Recipe Server Centric

concept)

1.3 The purpose of this Standard is to provide a standardized mechanism to transfer production recipes from Recipe Server to equipment, and to store the recipes securely in the equipment, so that the recipes in the equipment are exact subset copies of the recipes in the Recipe Server and are protected from non-authorized access, in a factory in which the master copies of production recipes are managed on the Recipe Server.

1.4 The purpose of this Standard is to support RMS in provide a recipe transfer and storage mechanism which provides the following aspects benefits.

Extension of recipe identification capability

Protection of the recipes in equipment from non-privileged access by defining a protected recipe spaces per purposes and Recipe User Group management capability

Reduction of operator efforts required to maintain consistency of recipes in equipment with recipes in Recipe Server by providing an automated consistency maintenance mechanism based on cache

Authentication of consistency of recipes in equipment with Recipe Server by providing an optional Pre-Execution Check mechanism

Reduction of operator efforts to download recipes that are used for production from Recipe Server to equipment by providing an automatic transfer mechanism based on cache

Reduction of communication and computation overhead and cost due to recipe download related transactions by adopting cache Cache Mode operation

Addition of remote access capability to access recipes on the host RMS by using recipe applications (such as recipe editor) on equipment or other workstation

1.5 The purpose of this Standard is to provide a recipe operation transfer and storage mechanism which supports similar with or a superset of is compatible with current practices in the following aspects for easier deployment.

Recipe identification and uniqueness control

Recipe linkage

Variable Parameter management

Recipe operations except for production execution

Consistency check of a recipe with the recipe in Recipe Server just before execution (Pre-Execution Check)

Conventional recipe download modes such as Pre-Download Mode or Full Download Mode

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 4 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 5: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

2 Scope2.1 This Standard covers a definition and usage of secure, safe and efficient recipe operation mechanism intended to be used as a foundation of RMS.

2.2 This Standard covers a definition and usage of extended recipe identification scheme which identifies recipes from multiple aspects including uniqueness and security.

2.3 This Standard covers a definition and usage of secured recipe space management mechanism which manages multiple recipe spaces in order to provide logically separated recipe spaces for different security level of recipe operations.

2.4 This Standard covers a definition and usage of Production Execution Mode (PEM) state an equipment status flag which shows represents the status of equipment, whether the equipment is in use for mass production or not.

2.5 This Standard covers a definition and usage of Recipe User Group for recipe security control.

2.6 This Standard covers a definition and usage of recipe feeding mechanism from the host to equipment which enables secure, safe and efficient recipe operation for production execution by the host.

2.6.1 This Standard covers a definition of new recipe space named Production Recipe Cache (PRC) as one of secured recipe space in equipment, which is dedicated for host controlled process execution in which recipes shall be synchronized with the host and shall be protected from modification by unauthorized operations.

2.6.2 This Standard covers definitions of mechanisms and operations which manage PRC so that recipes in PRC are protected from non-privileged access and are consistent with the recipes on the Recipe Server in the host.

2.7 This Standard covers a definition and usage of remote access operation mechanism which enables remote access of the recipes on Recipe Server in RMS by using recipe applications on equipment or other workstation.

NOTICE: SEMI Standards and Safety Guidelines do not purport to address all safety issues associated with their use. It is the responsibility of the users of the documents to establish appropriate safety and health practices, and determine the applicability of regulatory or other limitations prior to use.

3 Limitations3.1 No Message Definition — This Document does not define any messaging. Messaging may be defined in a separate standard.

3.2 Master Copies on Recipe Server — This Standard has a precondition that the master copies of the recipes that are used for host triggered PJ creation in PEM On state are stored and managed on Recipe Server. This Standard cannot be applied to the factory in which a Recipe Server does not exist.

3.3 Linked Recipe Compatibility — This Standard does not define any requirements for linked recipes but is intended to be compatible with currently implemented recipe linkage schemes by allowing the structure of PRC to be composed as equivalent with the structure of the Conventional Recipe Space.

3.4 Recipe Identification — This Standard introduces extended recipe identification scheme for new requirements but is intended to be compatible with the existing recipe identification schemes for existing functionalities.

3.5 Variable Parameters — This Standard does not define any specific requirements for Variable Parameters but is intended to be compatible with the current implementations.

3.6 User Authentication and Access Privilege — This Standard does not define any requirement for user authentication and access privileges but only recommends the use of access control on PRC resources and functions. User authentication and access privilege should be defined separately from this Standard.

4 Referenced Standards and Documents4.1 SEMI Standards and Safety Guidelines

SEMI E30 — Generic Model for Communications and Control of Manufacturing Equipment (GEM)

SEMI E39 — Object Services Standard: Concepts, Behavior, and Services

SEMI E40 — Standard for Processing Management

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 5 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 6: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

SEMI E87 — Specification for Carrier Management (CMS)

SEMI E94 — Specification for Control Job Management

NOTICE: Unless otherwise indicated, all documents cited shall be the latest published versions.

5 Terminology5.1 Abbreviations and Acronyms

5.1.1 FOUP — front opening unified pod

5.1.2 GEM — generic equipment model

5.1.3 MES — manufacturing execution system

5.1.4 PEM — Production Execution Mode

5.1.5 PJ — process job

5.1.6 PRC — Production Recipe Cache

5.1.7 RAC — Remote Access Cache

5.1.8 RMS — Recipe Management System

5.2 Definitions

5.2.1 Cache Full — the required recipe cannot be written into the cache PRC because the cache PRC does not have enough space to write the specified recipe.

5.2.2 Cache Hit — the required recipe is found in the cache PRC.

5.2.3 Cache Miss — the required recipe is not found in the cache PRC.

5.2.4 carrier — a container, such as a FOUP or open cassette, with one or more positions for holding substrates. [SEMI E87]

5.2.5 collection event — a collection event is an event (or grouping of related events) on the equipment that is considered to be significant to the host. [SEMI E30]

5.2.6 Conventional Recipe Space — an existing recipe space on the equipment, which is normally used by every user, including the host, for various purposes such as equipment installation, process development and production operation.

5.2.7 extended recipe identifier (Recipe XID) — an identifier of a recipe which is extended with Version ID, and Security ID, Type ID, and Equipment ID in addition to conventional Recipe ID.

5.2.8 formalized recipe — a recipe which is recognized by and under control of the RMS in the host.

5.2.9 host — the factory computer system or an intermediate system that represents the factory and the user to the equipment [SEMI E87], the intelligent system which communicates with the equipment. [SEMI E4, SEMI E5]

5.2.10 multi-part equipment — equipment that has a capability to accomplish multiple operations that require recipe execution by multiple users simultaneously.

5.2.11 object instantiation — the act of storing of information related to a physical or logical entity so that it can be recalled on demand based on its public identifier. [SEMI E87]

5.2.12 operator — a human who operates the equipment to perform its intended function (e.g., processing). The operator typically interacts with the equipment via the equipment supplied operator console. [SEMI E30]

5.2.13 privileged user — a user who is allowed to use system functions that are not available to other users.

5.2.14 production equipment — equipment used to produce product, such as semiconductor devices, including substrate sorting, process, and metrology equipment and excluding material handling equipment. [SEMI E87]

5.2.15 Production Execution Mode (PEM) — a mode of equipment, in which the equipment is used for production. The state which determines whether the equipment operates in this mode or not shall be set by the host or privileged

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 6 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 7: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

user. In PEM On state, Online/Remote/Auto may typically be used; however other combinations may also be used for some purposes such as operator assistance, so PEM is an independent mode from Online/Offline, Remote/Local or Auto/Manual.

5.2.16 Production Execution Mode Recipe (PEM Recipe) — a recipe which is used in PEM On state. PEM Recipe consists of not only recipes for mass production lots but also recipes for engineering lots, etc., as long as the recipes are used in PEM On state. Any recipe that is prepared to be used in the PEM On state shall be considered as a PEM Recipe.

5.2.17 Production Recipe Cache (PRC) — a recipe space that resides in equipment and holds exact subset copies of PEM Recipes on the Recipe Server by using PRC Operation.

5.2.18 properties — a set of name value pairs assigned to an object or used in a service message to include additional information about the object (i.e., carrier, port, etc.). [SEMI E87]

5.2.19 Recipe Executor — a component of a module that stores and executes recipes. [SEMI E40]

5.2.20 Recipe Execution Space — a recipe space in the equipment which holds the recipe(s) under execution.

5.2.21 Recipe Management System (RMS) — an information system that manages recipes. Especially, the factory information system that manages recipes registered to the factory and is a part of the host. Typically, RMS has a Recipe Server which holds the master copy of the recipes.

5.2.22 Recipe Queue Space — a recipe space in the equipment which holds the recipe(s) already referred and queued for execution.

5.2.23 Recipe Server — a computer system in the host, which maintains the master copy of the recipes that are used by the equipment for host-controlled process executions.

5.2.24 Security Class — a category of recipe which has the same security requirements.

5.2.25 Security ID — an identifier of a recipe which identifies the Security Class of the recipe.

5.2.26 Secured Recipe Space (SRS) — a recipe space which logically discriminates recipes per Security Class identified by Security ID of each recipe.

5.2.27 substrate — material held within a carrier. This can be product, or durables such as reticles. [SEMI E87]

5.2.28 Version ID — an additional ID for a recipe, which provides a unique version name to the recipe. In case Recipe ID cannot ensure naming uniqueness of recipes, Version ID may be used in addition to the Recipe ID.

5.2.29 user — a human or humans who represent the factory and enforce the factory operation model. A user is considered to be responsible for many setup and configuration activities that cause the equipment to best conform to factory operations practices. [SEMI E30]

5.2.30 Recipe User Group — a group which consists of one or more users who have the same privilege to access specified recipes from a security control view point. The recipes may be specified as the ones in the same recipe space. Recipe User Group is not intended to be used for safety control purposes.

6 Conventions6.1 Objects

6.1.1 Whenever the equipment is required to know about specific kinds of entities, and required to manage information concerning these entities, it is useful to treat these entities as objects that comply with the basic requirements of SEMI E39 Object Services Standard (OSS). This is especially true whenever there are a large number of objects of a given type or when the entities are transient rather than permanent. In both cases, it is difficult to describe a general way for the host and equipment to specify which particular entity is referenced and to get information related only to a specific one out of many.

6.1.2 By defining these entities as objects that comply with OSS, it is only necessary for the host to specify the type of object and its specific identifier in order to inquire about one or more properties of the specific entity of interest.

6.1.3 Object Properties

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 7 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 8: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

6.1.3.1 A property (attribute) is information about an individual object that is presented as a name/value pair. The name is a formally reserved text string that represents the property, and the value is the current setting for that property.

6.1.3.2 Properties shall be accessible to the host via the service GetAttr. Using SEMI E39 Object Services Standard, for example, it is possible to:

get the list of IDs for the current objects at the equipment, and

get the specified properties for one or more individual objects.

6.1.4 Rules for Object Properties

Attributes with RO (Read Only) access cannot be changed using SetAttr service as defined in OSS.

Attributes with RW (Read/Write) access can be changed using SetAttr service as defined in OSS.

Additional attributes may be specified by the user or the equipment supplier by using an attribute name starting with ‘UD’ (User Defined). Care should be taken to ensure the name of the attribute is unique.

6.1.5 Object Attribute Table

6.1.5.1 The object attribute table is used to list all the attributes related to the defined object as shown below. The access is defined as Read Only (RO) or Read/Write (RW). The Reqd column is used to specify whether the attribute is required (Y), conditional (C), or optional (O) for implementation. Finally, the Form column is used to specify the format of that particular attribute.

Table 1 Object Attribute Table

Attribute Name Definition Access Reqd Form

6.2 State Model Methodology

6.2.1 A state model consists of four elements: a State Model Diagram, a State Model Definition Table, a State Definition and a State Transition Table.

6.2.2 State Model Diagram — The diagram of the state model uses the Harel State Chart notation. An overview of this notation is presented in an Appendix of SEMI E30. The definition of this notation is presented in Science of Computer Programming 8, “Statecharts: A Visual Formalism for Complex Systems,” by D. Harel, 1987.1

6.2.3 State Model Definition Table — The State Model Definition Table used in this Standard has the following format. This table defines states and possible transition(s) from each state side by side. Each state has one or more transitions. In case the transition comes from outside this table, the State column for the transition may be blank (see #1). Also, in case the transition comes from unspecified multiple states with the same condition, the state definition column may say ‘#Any state,’ and there may not be an explicit transition number.

6.2.3.1 Definition of State — Columns under the State column define States with No. (Number), Name and Abstract of Definition. ‘No.’ corresponds to the state number in the associated state diagram. ‘Name’ defines a name of each state. ‘Abstract of Definition’ provides an abstract of the State Definition in the State Definition Table.

6.2.3.2 Definition of Transition — Columns under the Transition column define Transitions with No. (Number), Abstract of Trigger, Abstract of Action, New State, and Comments. ‘No.’ corresponds to transition number in the associated state diagram. ‘Abstract of Trigger’ and ‘Abstract of Action’ provide abstracts of the Trigger and Action in the State Transition Table accordingly. ‘New State’ defines a state number to move after the transition is completed by pointing one of the states defined in the state definition in left side of the table. The Comment column may be used to put comments to each transition or their From state.

1 Elsevier Science, P. O. Box 945, New York, NY 10159-0945; http://www.journals.elsevier.com/science-of-computer-programming/

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 8 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 9: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Table 2 State Model Definition Table

State Transition

No. Name Abstract of Definition No. Abstract of Trigger Abstract of Action New State

Comments

-#1 -#1 -#1 T00 S00Snn#2 # Any state#2 -#2 - S03S00 T01 S01S04#3 T02 S00

S01 T03 S02T04 S03

S02 T05#4 S00

S10#5 - - - -S11 T10 S12S12 T11 S11

S03 T06 S00#1 In case the transition comes from outside of this table, the state definition column may be blank.#2 In case the transition comes from unspecified multiple states with the same condition, the state definition column may say ‘#Any state’.#3 A state which has substates.#4 One transition path has multiple cases (trigger and action pairs).#5 A state separated by a dotted line is a parallel state of the state above.

6.2.4 State Definition Table — State definition tables are provided in conjunction with the state diagrams to explicitly describe the definition of each state. A state definition table contains columns for State Number, Mnemonic, State Definition, and Comments.

Table 3 State Definition Table

Num Mnemonic State Definition Comments

6.2.5 State Transition Table — State transition tables are provided in conjunction with the state diagrams to explicitly describe the nature of each state transition. A state transition table contains columns for Transition Number, Previous State, Trigger, New State, Actions, and Comments. The ‘Trigger’ (column 3) for the transition occurs while in the ‘Previous’ State. The ‘Actions’ (column 5) includes a combination of:

Actions taken upon exit of the previous state,

Actions taken upon entry of the new state, and

Actions taken which are most closely associated with the transition.

Table 4 State Transition Table

Num Previous State Trigger New State Actions Comments

6.2.6 State Model Requirements

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 9 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 10: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

6.2.6.1 Requirement — The state models included in this Standard are a requirement for compliance. Equipment must maintain state models for each of the required state models as defined in this Standard. Equipment shall maintain individual and unique state models for each logical entity instantiated or physical entity in the equipment that has state models associated with it.

6.2.6.2 Representation as the Host View — A state model represents the host’s view of the equipment, and does not necessarily describe the internal equipment operation. All state model transitions shall be mapped sequentially into the appropriate internal equipment collection events that satisfy the requirements of those transitions. In certain implementations, the equipment may enter a state and have already satisfied all of the conditions required by the state models in this Standard for transition to another state. In this case, the equipment makes the required transition without any additional actions in this situation.

6.2.6.3 Additional Substates — Some equipment may need to include additional substates other than those in this Standard. Additional substates may be added, but shall not change the defined state transitions in this Standard. All expected transitions between states in this Standard shall occur.

6.2.6.4 Uniqueness of Event Identifier — The event identifier reported during a particular state transition change for each of these state models shall be shared for all associated state models but unique for each transition. For example, if the equipment has two load ports and the load port state model defines 10 transitions, there must be exactly 10 event identifiers for each load port transfer state model but not 10 for each physical load port. The information identifying the physical entity or logical entity undergoing the transition will be contained within the associated event report.

6.2.6.5 Events — All state transitions in this Standard, unless otherwise specified, shall correspond to collection events. More explicitly, there must be a unique collection event for each state transition.

6.2.6.6 Events for Multiple AND Substates — In case a state model is defined with multiple AND substates, the equipment may report all state entry events with only one collection event.

6.2.6.7 Events for Conditional Path — In case conditional paths are defined in the state model, it is not necessary to report any state transition(s) until a terminal state is reached at which time each transition used to reach that state is reported.

6.3 Object

6.3.1 Recognition of Object — From the host point of view, an object is instantiated if the host is able to query the equipment about that object, its current state, and other attributes. Once instantiated, the object is considered destroyed (no longer instantiated) if the response to such queries is ‘unknown object’.

6.3.2 Object Identifier (ObjID) — The purpose of an Object Identifier is to allow references to an object within the system. The object identifier is assigned when an object is instantiated and should be unchanged or persistent until the end of the object lifecycle. The Object Identifier shall be unique at the equipment during lifecycle of the object.

6.4 Services

6.4.1 Definition of Service — Services are functions or methods that may be provided by either the equipment or the host. A service message may be either a request message, which always requires a response, or a notification message that does not require a response.

6.4.1.1 Notification Message Service — Notification type messages are initiated by the service provider (e.g., the equipment) and the provider does not expect to get a response from the service user.

6.4.1.2 Request Message Service — Request messages are initiated by a service user (e.g., the host). Request messages ask for data or an activity from the provider. Request messages expect a specific response message (no presumption on the message content).

6.4.2 Service Message Description — A service message description table defines the parameters used in a service, as shown in the following table:

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 10 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 11: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Table 5 Service Message Description Table

Service Name Type Description

#1 Type can be either ‘N’ = Notification or ‘R’ = Request & Response.

6.4.3 Service Message Parameter Definition — A service parameter dictionary table defines the description, range, and type for parameters used by services, as shown in the following table:

Table 6 Service Message Parameter Definition Table

Parameter Name Form Description

#6 A row is provided in the table for each parameter used on a service.

6.4.4 Service Message Definition — A service message description table defines the parameters used in a service message, and also, describes each message and its cause/effect to the equipment, as shown in the following table:

Table 7 Service Message Definition Table

Service Parameter Req/Ind Rsp/Conf Description

6.4.4.1 Definition of Req/Ind and Rsp/Conf Columns — The columns labeled Req/Ind and Rsp/Conf link the parameters to the direction of the message. The message sent by the initiator is called the ‘Request’. The receiver terms this message the ‘Indication’. The receiver may then send a ‘Response’, which the original sender terms the ‘Confirmation’.

6.4.4.2 Definition of Codes for Req/Ind and Rsp/Conf Columns — The following codes appear in the Req/Ind and Rsp/Conf columns and are used in the definition of the parameters (e.g., how each parameter is used in each direction):

Table 8 Codes For Req/Ind and Rsp/Conf Columns

M Mandatory Parameter – must be given a valid value.C Conditional Parameter – may be defined in some circumstances and undefined in others. Whether a value is given may

be completely optional or may depend on the values of other parameters.U User-Defined Parameter.- The parameter is not used.= (for response only) Indicates that the value of this parameter in the response must match that in the primary (if defined).

6.5 Variable Data Definitions

6.5.1 This defines variable data requirements. Values of these variables are available to the host via collection event reports and host status queries.

6.5.2 Event Report Requirement — The identifier of that object and all of the attributes of that object shall be available for inclusion in event reports associated with that object.

6.5.3 Object Attribute Variable in Non-extinction Event — The object attribute variables in event reports linked to non-extinction event(s) shall contain the values of the attributes after the transition. This requirement allows the receiver of the report to know the current condition of the object.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 11 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 12: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

6.5.4 Object Attribute Variable in Extinction Event — The object attribute variables in event reports linked to extinction event(s) shall contain the values of the attributes before the transition unless it is specifically stated that the destruction transition modifies the attribute value. This requirement allows the receiver of the report to know the final condition of the object at the time it was deleted.

6.5.5 Subscripted variables are used either as items within a list or to differentiate data representing different entities. Subscripted variables are always valid.

6.5.6 Table Format — The following table defines variable data that shall be provided by the production equipment.

Table 9 Variable Data Definitions

Variable Name Description Type Access Comment

7 Conceptual Descriptions7.1 Position of Conceptual Descriptions — This section defines and describes a concept of this Standard. This section does not contain any requirements.7.2 Equipment Centric vs. Recipe Server Centric — There may be several management policies of production recipes from equipment centric to Recipe Server centric. This Standard is designed to be applicable to the methods described in the following Figure.

Delete

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 12 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 13: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

AddFigure 1

Typical Recipe Server-Equipment Models and Coverage of This Standard PRC

7.3 Introduction of Single Point of Recipe Management (SPORM)   Concept — In order to manage numbers of recipes in secure, safe, and efficient way, this Standard introduces SPORM concept. In SPORM concept, recipes are managed in the following manner. A recipe is formalized when it is registered to RMS (which is normally in the host). Basically, recipes which are not formalized are not used for production related operations.

The master copy of formalized recipes are stored in a Recipe Server (normally, under RMS in the host). Temporary copies of formalized recipes which are made to support quick and efficient operations (such as

recipe editing or recipe execution ) may be in equipment (normally in cache, queue, or execution spaces) . All recipe management operations are done under recognition and approval of RMS (normally in the host). Backup scheme which prepares for system failure of the host is not in scope of SPORM.

7.4 Intended Application of This Standard — The intended application of this Standard is to construct a SPORM based Recipe Server centric recipe management system which provides ‘What you have done on the Recipe Server is what you will have on the equipment’ operability and ‘Secure, and safe, and efficient recipe operation mechanism Production Execution path isolated from operators’. The key features are: Clear separation between ‘Production’ and ‘Preparation’ activities ‘Centralized Management’ of the master copy of ‘Formalized Production Recipes’ on Recipe Server Only privileged user can handle Production Recipes (e.g. Certification) Introduction of RecipeXID for more secure identification Introduction of ‘Secured Recipe Space’ to provide dedicated recipe spaces per purposes Leave ‘Conventional Recipe Space’ flexible as it is, for installation, maintenance, recipe development, etc.

Introduction of ‘Production Recipe Cache’ as secure and safe ‘Production Execution Path’ for Production Recipes

Introduction of ‘Production Execution Mode’ flag which selects ‘Production Recipe Cache’ instead of ‘Conventional Recipe Space’ for secure production execution, when the flag shows the equipment is in ‘Production Execution Mode’

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 13 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 14: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Introduction of ‘Remote Access Cache’ in order to access recipes on Recipe Server by using equipment applications

Delete

AddFigure 2

Example of Intended Application of This Standard PRC

7.5 Introduction of RecipeXID — In order to identify recipes from multiple aspects, this Standard introduces Extended Recipe ID called RecipeXID. RecipeXID consists of the following identifiers.

Recipe ID: Main recipe identifier (PPID)

Version ID: An optional recipe identifier which helps unique identification in case Recipe ID is not always unique

Only the host assigns the value Zero length is assigned when the recipe is locally edited on equipment

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 14 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 15: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Security ID: An additional recipe identifier which indicates the Security Class of the recipe. Security Class is used to identify:

I n which logical recipe space the recipe shall be stored By which operator the recipe may be used For which operation the recipe may be used

Type ID: An optional recipe identifier which indicates type of the recipe.

Equipment ID: An optional recipe identifier that indicates equipment which the recipe is tuned for

May define ‘Ideal’ equipment for reference recipe

AddFigure 3

Introduction of Recipe XID

7.6 Introduction of Secured Recipe Space — In order to deal recipes with different security requirements, this Standard introduces Secured Recipe Space which logically discriminates recipes per their Security Class specified by SecurityID.

Delete

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 15 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 16: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

AddFigure 4

Introduction of Secured Recipe Space

7.6.1 Linked Recipe Compatibility — To be compatible with current implementations, SRS PRC introduces a concept which makes the recipe linkage scheme of SRS PRC the same with Conventional Recipe Space.7.6.1.1 Management of Host-Managed Sub-Recipes — Sub-recipes, which are under management of the host, may be managed similarly in SRS PRC. Those recipes should reside in the SRS PRC, and should be linked together in the same way as the recipes in the Conventional Recipe Space. This Standard does not define the linkage specification.

Delete

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 16 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 17: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

AddFigure 5

Linkage to Host-Managed Sub-Recipes

7.6.1.2 Management of Locally Managed Sub-Recipes — Sub-recipes which are not under management of the host but are linked under the recipes managed by host are out of the scope of this Standard PRC. Those recipes may reside somewhere in the equipment (may reside in a part of Conventional Recipe Space), and may be linked from the recipes in other SRS PRC in the same way as the link from the recipes in the Conventional Recipe Space. This Standard does not define the way of linkage.

Delete

AddFigure 6

Linkage to Locally Managed Sub-Recipes

7.6.2 SRS PRC Space Structure Concept — The SRS PRC may be used in the following ways to maintain compatibility with existing implementations of recipe space.

7.6.2.1 Subspace Structure in SRS PRC — SRS PRC may be structurally divided into multiple tiers of multiple subspaces. Alignment of subspace structure with the one in the Conventional Recipe Space and/or the recipe space in Recipe Server may be useful for following purposes.7.6.2.1.1 Linked Recipe Aspect — This subspace concept may be used to deal with Linked Recipe.7.6.2.1.2 Recipe Security Aspect — This subspace concept may also be used for security purposes.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 17 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 18: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Delete

AddFigure 7

SRS PRC Space Structure Concept

7.6.2.2 How to Specify Subspace — To be compatible with the current implementations, the same subspace specification (path specification) mechanism, which is used in the Conventional Recipe Space, may be used.7.6.2.3 Subspace Structure Relationship between Conventional Recipe Space and Other SRS PRC — The subspace structure of other SRS PRC may be aligned with the subspace structure of Conventional Recipe Space in the equipment for easier correlation.7.6.2.4 Subspace Structure Relationship between SRS PRC and Recipe Server — The subspace structure in the recipe serving function in the host may be aligned with the subspace structure of SRS PRC in equipment for easier correlation.

7.6.3 Deployment Considerations — Introduction of Enable/Disable capability by the host makes deployment easier. The host can enable SRS when the host is ready to use SRS.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 18 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 19: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

7.7 Introduction of Production Recipe Cache Operation — For efficient production recipe transaction, this Standard introduces PRC Operations.

7.7.1 Cascading Considerations — Introduction of Cache Mode operation or Pre-Download Mode operation gives more freedom to recipe service timings for better cascading of process execution while reducing recipe related transactions.

7.7.2 Reduction of Computing and Communication Loads for Recipe Download and Check — Introduction of protected recipe space ‘PRC’ and Cache Mode operation reduces computing and communication loads for recipe download and avoids pre-execution check overhead. Recently used recipes are safely preserved in PRC and reused for consequent PJ creations with the same recipe.

7.7.3 Direct Service from Recipe Server in the Host — Introduction of Query Recipe from equipment may ease the use of direct service from Recipe Server in the host system instead of the use of service through MES.

7.7.4 Operational Compatibility — To be upward compatible with conventional operations, this Standard covers the following PRC Operation Modes. Pre-execution check is not logically required for PRC which is properly implemented and operated, however, may be required to help deployment path from conventional Pre-execution check based system or for double check purpose in some situations.

PRC Operation Modes

Full Download Mode: The host downloads required recipes every time just before demanding a PJ creation. Full Query Mode: Equipment queries required recipes every time upon PJ creation. Pre-Download Mode: The host downloads recipes prior to PJ creation demands for some duration. Cache Mode: Equipment holds recently used recipes in the PRC and queries required recipes in case they are

not in the PRC.

Pre-Execution Check Operation

Pre-Exe Check: Equipment uploads check information of the required recipe to the host for consistency check upon PJ creation, and the host responds with affirmative message or download of the correct recipe.

7.7.5 Deployment Considerations — Introduction of Enable/Disable capability by the host makes deployment easier. The host can enable PRC when the host is ready to use PRC.

7.8 Introduction of Remote Access Cache Operation — For SPORM based factory RMS, flexible use of equipment supplier supplied recipe applications (such as recipe editor) on equipment or other work stations to manage the recipes on Recipe Server is important. For this purpose, this Standard provides functionalities to support Remote Access.

7.8.1 Purpose of Remote Access Operations — The purpose of Remote Access operation is to perform recipe operations (such as edit, compare etc.) directly to the recipes on the host (RMS) by using equipment applications on equipment or a workstation. Remote Access operation is independent from PRC operation (RAC Space and PRC Space are also independent in equipment), and how to reflect the result of Remote Access operation to Production Recipes which go through PRC operation depends on the business rule in RMS.

7.8.2 Relationship Between RAC and PRC Operations — Remote Access operation is independent from PRC operation (RAC Space and PRC Space are also independent in equipment), and how to reflect the result of Remote Access operation to Production Recipes which go through PRC operation depends on the business rule in RMS.

7.8.3 Preconditions for Standardization — In order to simplify Remote Access operation for standardization, following pre and post processes which use the host system (e.g. RMS operation) are considered as preconditions.

Pre-process: Prior to a Remote Access operation, the following preparations are expected to respond to the Remote Access operation request from equipment (or workstation) .

Assign SecurityID which will be used by the equipment to request Remote Access operation Prepare directory of required recipes for the planned work

Post-process: After completion of the Remote Access operation, the following post processing are expected.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 19 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 20: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Acceptance process of the newly registered recipes Utilization process of the results from other recipe work (such as comparison result)

7.8.4 Intended Remote Access Operations — Intended operations are as below.

An operator requests Remote Access session at equipment (or workstation).

The equipment requests OperatorID and OperatorPassword, that are required for operator authentication by the host, to the operator, assigns SecurityID, and then asks the host for establishment of a RAC session.

The host authenticates the operator and responds to the equipment.

Normally, the operator requests directory of recipes to the host, and the host responds with an appropriate RecipeXIDList considering the SecurityID and EquipmentID provided from the equipment.

The operator may query required recipes to the host.

The operator uses those recipes for required works such as edit, compare, etc.

The operator may post the result of the work to the host. The work may result with the information other than recipe; however, the information should be dealt as quasi-recipe from the identification aspect in order to post it to the host through recipe transaction mechanism. TypeID may be used to identify a type of the result.

The operator closes the session upon completion of the work. The equipment reports to the host and clear recipes and other working results in the RAC.

7.8.5 Deployment Considerations — Introduction of Enable/Disable capability by the host makes deployment easier. The host can enable RAC when the host is ready to use RAC.

8 Extended Recipe Identification Requirements8.1 RecipeXID — In order to identify recipes from multiple aspects, this Standard introduces Extended Recipe ID called RecipeXID. RecipeXID consists of the following identifiers.

8.1.1 Recipe ID — The RecipeID is the main identifier of recipe.

8.1.2 Version ID — The VersionID is an optional recipe identifier that can be combined with the RecipeID to uniquely identify the recipe. If the host uses this field, it has the advantage of being factory-set so that uniqueness of the RecipeID and VersionID combination can be assured by the host. The VersionID is a field that can be set only with the cooperation of the host. The VersionID value is intended to be assigned by the factory. In a typical case, the recipe is created at the equipment with the VersionID set to a zero-length string. Upon upload, the recipe might be checked-in to a recipe management system. A part of this check-in could be the modification of the recipe header with a factory generated VersionID.

8.1.3 Security ID — The SecurityID is an additional recipe identifier that is used to indicate the Security Class which the recipe belongs to. The SecurityID is not used for unique identification of recipes. The SecurityID is intended to be used for the following purposes.

In which logical recipe space the recipe shall be stored.

By which operator the recipe may be used.

For which operation the recipe may be used.

8.1.4 Type ID — The TypeID is an optional recipe identifier which indicates the type of the recipe (such as Main recipe, process chamber recipe, pump recipe, etc.)

8.1.5 Equipment ID — The EquipmentID is an additional recipe identifier that indicates equipment which the recipe is tuned for.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 20 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 21: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Table 10 RecipeXID Definition

ID Name Mnemonic Form Definition Note

Recipe ID RecipeID RecID which is defined in SEMI E40

Recipe ID RecID may not always be a unique identifier

Version ID VersionID Maximum 256 characters.

A string that identifies this particular adaptation of a base recipe that shares the same RecipeID. It is intended to be populated based upon factory business rules.Upon creation or modification of a recipe, the VersionID shall be set to a zero-length string unless the recipe editor is able to work in conjunction with the host for proper VersionID assignment.Any two recipes in the factory with the same RecipeID and non-zero-length VersionID shall have the same content for the recipe body.

A recipe editor that is not integrated with factory business rules would not be able to determine an appropriate VersionID.The host may populate the VersionID at a later time, for example at the time the recipe is checked-in to the factory recipe management system. If the host does not choose to use the VersionID for a particular recipe, the VersionID will remain a zero-length string.When a VersionID is assigned, the combination of RecipeID and VersionID would provide unique identification of the recipe within the factory.

Security ID SecurityID Maximum 16 characters

An identifier which indicates Security Class of the recipe

Indicates in which Security Class the recipe shall be dealt with. The host shall define SecurityID per actions to be taken with/between the equipment.SecurityID is not an ID for unique identification of recipe.

Type ID TypeID Maximum 16 characters

An optional identifier which indicates the type of the recipe.TypeID shall be set to a zero-length string when it is not used.

Equipment ID EquipmentID Maximum 256 characters

An optional identifier that identifies for which equipment this particular recipe is prepared.The EquipmentID shall be set to a zero-length string when it is not used.

9 Secured Recipe Space Requirements9.1 Secured Recipe Space — Equipment compliant with this Standard shall be compliant with the SRS requirements defined in this section.

9.2 SRS and Security Class — SRS is a recipe space which logically discriminates recipes per Security Class identified by SecurityID of each recipe. Each Security Class is deemed to have its own logical recipe space in SRS.

9.3 Message Requirements — SRS uses following messages.

9.3.1 Conventional Messages — The messages based on the recipe identification scheme system which uses RecipeID (PPID) as an only identifier of recipe. For upward compatibility, access with conventional messages shall be directed to Conventional Recipe Space by applying VersionID= ‘’ (zero length), and SecurityID= ‘Conventional’, TypeID= ‘’ (zero length), and EquipmentID= ‘’ (zero length) except for the following cases.

9.3.1.1 PJ Creation from the Host — PJ creation demand from the host shall refer the recipes which belong to the Security Class specified by PEMFlag regarding the recipes which master copies are managed on Recipe Server. The references of recipes which master copies are managed in equipment are not affected by PEMFlag.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 21 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 22: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

9.3.1.2 SecurityID in Recipe Body — In case SecurityID (and VersionID as required) is embedded in Recipe Body, the conventional message may be used instead of the equivalent extended message.

9.3.2 Extended Messages — The messages which are defined to support SRS in this Standard. The messages are based on the use extended recipe identification scheme system which uses SecurityID and VersionID in addition to RecipeID (PPID) as extended recipe identifiers (RecipeXID).

Table 11 Secured Recipe Space Definitions

Logical Recipe Space

Security Class

(SecurityID)

Messages Definition Note

Conventional Extended

Conventional Recipe Space

‘Conventional’ Usable Usable Default recipe space.For upward compatibility with current implementation, currently used recipe space is mapped to this Security Class.

PRC Space ‘Production Cache’ or ‘Production Cache n’In case multiple PRCcaches are used, numerical character n should be added as ‘Production Cache n’

Not usableExcept for:PJ creation during PEM On

To be usedExcept for:PJ creation

Recipe space for PRC.Holds subset of exact copies of PEM Recipes that are managed on Recipe Server

‘Which PRC should be used for which PJ creation’ is equipment dependent.

RAC Space ‘Remote’ or ‘Remote n’In case multiple RACs are used, numerical character n should be added as ‘Remote n’

Not usable To be used Recipe space for Remote AccessThis space may hold temporary copy of required recipes that are managed on Recipe Server.After a remote access operation, modified or created recipes may be uploaded to Recipe Server and all related recipes used for the remote access shall be deleted from RAC.One RAC Space is used for one Remote Access connection for secure operation.

Optional Recipe Spaces

‘<user defined>’ Not usable To be used Recipe space for user defined Recipe Security Class

May be used to provide isolated recipe spaces to different roles

9.4 PEM State and PEMFlag — PEMFlag determines the PEM State whether the equipment operates in PEM On or PEM Off. PEMFlag holds the Security Class, which is used for the host triggered PJ creation, to indicate PEM State. PEMFlag may be used for protection purpose even in the case SecurityID is directly specified upon PJ creation demand.

9.4.1 Multiple PEMFlags for Multi-Part Equipment — In the case the equipment has a capability to divide itself into multiple parts that can operate in PEM On or PEM Off independently, the PEMFlag of the each part may separately be managed.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 22 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 23: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Table 12 PEM State and PEMFlag Definitions

PEM State PEMFlag

(Security Class to be used for PJ

Creation)

Definition Usage of Secured Recipe Space

Conventional Recipe Space PRC Space

PEM Off(Default)

‘Conventional’ A state for non-mass production operations such as installation, maintenance, process development, etc.

Shall be used for PJ creation for the equipment or the part of equipment controlled by this PEMFlag.May be used for PJ creation for other part of the equipment controlled by associated PEMFlags.

Shall not be used for any PJ creationMay be used for preparations of PRC before PEM On such as Cache Clear operation or Download operation

PEM On ‘Production Cache’ or ‘Production Cache n’

A state for mass production operations.

Shall not be used for PJ creation for the equipment or the part of equipment controlled by this PEMFlag.May be used for PJ creation for other part of the equipment controlled by associated PEMFlags.

Shall be used for PJ creation for the equipment or the part of the equipment managed by this PEMFlag.

9.5 Multi-Part Equipment Compatibility (Optional) — In case the equipment has a capability to divide itself into multiple parts that can operate in PEM On state or in PEM Off state independently (as a consequence, each part has its own Recipe Execution Space, and also may have its own Recipe Queue Space), the PEM state of the each part shall separately be managed and the use of PRC shall separately be controlled as shown in the following figure.

9.5.1 Multi-Part Equipment with One PRC — In case security control is not required between the recipes for multiple parts of the equipment, one PRC may be shared across all parts of the equipment.

9.5.2 Multi-Part Equipment with Dedicated PRCs — In case security control is required between the recipes for the multiple parts of the equipment, each part of the equipment shall have a dedicated PRC.

Figure 8PRC Implementation for Multi-Part Equipment

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 23 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 24: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

9.6 SRS Object (SRSOBJ) Requirement — Equipment compliant with SRS function of this Standard shall have SRS Object management capability.

9.6.1 Definition of SRSOBJ — The SRSOBJ is a software representation of SRS. Information about SRS is encapsulated as an object. This allows the host to exchange information with the equipment about SRSOBJ by using services defined in SEMI E39 Object Services Standard.

9.7 SRSOBJ Object Descriptions

9.7.1 SRSOBJ Object Instantiation — Under normal circumstances one SRSOBJ object is instantiated by the equipment when the equipment is started up.

9.7.2 SRSOBJ Object Identifier (ObjID) — The SRSOBJID is the SRSOBJ Object Identifier. The equipment is responsible for ensuring uniqueness of the SRSOBJID prior to instantiation.

9.7.3 SRSOBJ Object Destruction — A SRSOBJ Object reaches the end of its lifecycle when the equipment is shut down.

9.8 SRSOBJ Object Attribute Definitions — The following table defines the attributes of SRSOBJ object.

9.8.1 Who to Maintain the Attributes — All attributes in the following table are always maintained and updated by the equipment.

Table 13 SRSOBJ Attribute Definition

Attribute Name Definition Access#1 Reqd Form

ObjID SRSOBJ object Identifier. RO Y Text.SRSOBJIDNumerical text expression of positive integer.ObjID is equipment defined.

ObjType Object Type. RO Y Text = ‘SRSObject’SRSSwitch Enable / Disable entire SRS functionalities.

Default is Disabled.RO Y Enumerated: Disabled, Enabled

SecurityClassList List of implemented Security Classes RO Y List ofSecurityClass (Maximum 16 characters)

PEMFlagList List of implemented PEMFlagsThis attribute is required when PRC is implemented.

RO Y List ofPEMFlag (Maximum 16 characters)

PEMFlag = ‘Conventional’ :PEM Off PEMFlag = ‘Production Cache’ or

‘Production Cache n’ :PEM OnQueryStat Status of QueryRecipe.

RecipeXIDList under query is heldRO Y RecipeXIDList

Zero length when no QueryRecipe takes place

Pre-ExeCheckStat Status of Pre-ExeCheckRecipeXID and CheckInformation under check are listed.

RO Y List of RecipeXID CheckInformation Zero length when no Pre-ExeCheck takes place

#1 Even though a value may be marked as RO (read only), the initial value for the attribute may be provided by the host.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 24 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 25: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

9.9 SRSOBJ Services — This section defines the message services required to support SRSOBJ functionalities. Equipment compliant with SRS function of this Standard shall have following services.

9.9.1 SRSOBJ Service Message Description — The following table is a list of SRSOBJ services.

Table 14 SRSOBJ Service Message Description

Service Name Triggered by Type#1 Req#2 DescriptionGetSRSAttributes Host R R This service gets attributes of SRSOBJSetSRSSwitch Host R R This service sets SRSSwitchSetPEMFlag Host R R This service sets PEMFlagClearClass Host R R This service clears all recipes in the Security Class specified by

SecurityIDDeleteRecipe Host R R This service deletes specified recipes in SRSWriteRecipe Host R R This service writes recipes down into SRSGetRecipeXIDList Host R O This service gets a list of RecipeXID which has specified SecurityIDReadRecipe Host R O This service reads specified recipes from SRSPreSpecifyRecipe Host R O This service specifies recipes by using RecipeXID for subsequent PJ

creation message that does not support RecipeXID. If the specified recipes are not in SRS, the equipment shall query those recipes to the host and check them. When the same RecipeID with the one specified by this service is given by the subsequent PJ creation, the VersionID and SecurityID specified by this service are used.

PresetRecipeXID Host R O This service presets RecipeXID for subsequent conventional access with the same RecipeID.

QueryRecipe Equipment R R This service writes specified recipes down into SRS triggered by the associated event from equipment which requests recipes to the host.

Pre-ExeCheck Equipment R O This service sends Pre-Execution Check result to equipment (and write correct recipes down into SRS when the check result is NG) triggered by the associated event from equipment which reports check information to the host.

QueryRecipeXIDList Equipment R O This service requests RecipeXID list which can be seen by specified Security Class to the host, and host responds with RecipeXIDList.

PostRecipe Equipment N O This service post s recipes to the host. #1 The ‘Type’ column is used to indicate whether the service consists of a request/response message pair, ‘R’, or a single notification message, ‘N’.#2 The ‘Req’ column is used to indicate whether the service is required, ‘R’, or optional, ‘O’.

9.9.2 SRSOBJ Service Message Parameter Definition — The following is a list of required parameters used in conjunction with SRSOBJ service messages.

Table 15 SRSOBJ Service Message Parameter Definition

Parameter Name Form Description

ObjID Text.SRSOBJID. Numerical text expression of positive integer.ObjID is equipment defined.

SRSOBJ object Identifier.

SRSSwitch Enumerated: Disabled, Enabled Enable / Disable entire SRS functionalities. Default is Disabled.

PEMFlagList List of PEMFlag

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 25 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 26: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Parameter Name Form Description

PEMFlag Maximum 16 characters PEMFlag = ‘Conventional’ :PEM Off PEMFlag = ‘Production Cache’ or

‘Production Cache n’ :PEM On

PEMFlag holds SecurityID to be used for PJ creation

RecipeID RecID which is defined in SEMI E40 Recipe IDRecID may not always be a unique identifier

VersionID Maximum 256 characters Optional unique identifier of recipesVersionID shall be unique within the recipes with the same Recipe ID

SecurityID Maximum 16 characters Identifier of Security Class of the recipeTypeID Maximum 16 characters Identifier of the Type of the recipeEquipmentID Maximum 256 characters Identifier that indicates equipment which the recipe is

tuned forRecipeXID List of

RecipeIDVersionIDSecurityIDTypeIDEquipmentID

Extended recipe identifier

RecipeBody Equipment defined recipe Recipe BodyRecipeXIDList List of (RecipeID, VersionID, SecurityID,

TypeID, EquipmentID )List of RecipeXID

RecipeList List of (RecipeID, VersionID, SecurityID, TypeID, EquipmentID , RecipeBody)

List of Recipe

CheckInformation User defined Check information of specified recipesPre-ExeCheckResult Enumerated: OK, NG OK/NG response from the host to Pre-Exe Check

event from equipmentSetSRSSwitchResp Enumerated: Done, Error Information concerning the result of the serviceSetPEMFlagResp Enumerated: Done, Error Information concerning the result of the serviceClearClassResp Enumerated: Done, Error Information concerning the result of the serviceDeleteRecipeResp Enumerated: Done, Error Information concerning the result of the serviceWriteRecipeResp List of

RecipeTransferResultList of EachRecipeTransfer

Information concerning the result of the service

RecipeCheckNotifResp List of EachRecipeCheck Notification of recipe check result to the serviceGetRecipeXIDListResp Enumerated: Done, Error Information concerning the result of the serviceReadRecipeResp Enumerated: Done, Error Information concerning the result of the servicePreSpecifyRecipeResp Enumerated: Done, Error Information concerning the result of the servicePresetRecipeXIDResp Enumerated: Done, Error Information concerning the result of the servicePre-ExeCheckResp List of

Pre-ExeCheckResultAckConditional WriteRecipeResp

Information concerning the result of the service

QueryRecipeXIDListResp Enumerated: Done, Error Information concerning the result of the serviceRecipeTransferResult Enumerated: Done, Full, Error Response component for a list of recipe transferEachRecipeTransfer Enumerated: OK, NG Response component for single recipe transferEachRecipeCheck Enumerated: OK, NG Response component for single recipe checkPre-ExeCheckResultAck Enumerated: Done, Error Response component for Pre-ExeCheckResult

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 26 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 27: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

9.9.3 SRSOBJ Host Triggered Service Message Definitions — The following tables specify the allowable/required parameters for each service.

9.9.3.1 GetSRSAttributes — This service gets attributes of SRSOBJ. Use GetAtt of E39 OSS.

9.9.3.2 SetSRSSwitch — This service sets SRSSwitch.

Table 16 SetSRSSwitch Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDSRSSwitch M - SRSSwitch value to be set.SetSRSSwitchResp - M Information concerning the result of the service

9.9.3.3 SetPEMFlag — This service sets PEMFlag.

Table 17 SetPEMFlag Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDPEMFlagList M - List of PEMFlagSetPEMFlagResp - M Information concerning the result of the service

9.9.3.4 ClearClass — This service clears all recipes in the Security Class specified by SecurityID.

Table 18 ClearClass Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDSecurityID M - Security IDClearClassResp - M Information concerning the result of the service

9.9.3.5 DeleteRecipe — This service deletes specified recipes in SRS. In case the specified recipe does not exist, the DeleteRecipe performs no action.

Table 19 DeleteRecipe Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDRecipeXIDList M - List of RecipeXIDDeleteRecipeResp - M Information concerning the result of the service

9.9.3.6 WriteRecipe — This service writes recipes down into SRS. If same named recipes exist, this service overwrites them.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 27 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 28: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Table 20 WriteRecipe Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDRecipeList M - List of RecipesWriteRecipeResp - M Information concerning the result of the serviceRecipeCheckNotifResp - M Notification of recipe check result to the service

9.9.3.7 GetRecipeXIDList — This service gets a list of RecipeXID which has specified SecurityID.

Table 21 GetRecipeXIDList Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDSecurityID M - Security IDRecipeXIDList - M List of RecipeXIDGetRecipeXIDListResp - M Information concerning the result of the service

9.9.3.8 ReadRecipe — This service reads specified recipes from SRS.

Table 22 ReadRecipe Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDRecipeXIDList M - List of RecipeXIDRecipeList - M List of RecipesReadRecipeResp - M Information concerning the result of the service

9.9.3.9 PreSpecifyRecipe — This service specifies recipes by using RecipeXID for subsequent PJ creation message that does not support RecipeXID.

Table 23 PreSpecifyRecipe Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDRecipeXIDList M - List of RecipeXIDPreSpecifyRecipeResp - M Information concerning the result of the serviceRecipeCheckNotifResp - M Notification of recipe check result to the service

9.9.3.10 PresetRecipeXID — This service presets RecipeXID for subsequent conventional access with the same RecipeID.

Table 24 PresetRecipeXID Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDRecipeXIDList M - List of RecipeXIDPresetRecipeXIDResp - M Information concerning the result of the service

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 28 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 29: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

9.9.4 SRSOBJ Equipment Triggered Service Message Definitions — The following tables specify the allowable/required parameters for each service. Equipment triggered service starts with an event from the equipment, and normally, the host responds with a required service.

9.9.4.1 QueryRecipe — This service writes specified recipes down into SRS triggered by the associated event from equipment which requests recipes to the host. Equipment requests recipes by QueryRecipe Event to the host, and the host responds with the specified recipes by using WriteRecipe service. Interleave of QueryRecipes are not allowed.9.9.4.1.1 QueryRecipe Event — This event requests recipes to the host.

Table 25 QueryRecipe Event Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

RecipeXIDList M - List of RecipeXID

9.9.4.1.2 QueryRecipe Service — WriteRecipe service is used as this service.

9.9.4.2 Pre-ExeCheck — This service sends Pre-Execution Check result to equipment (and write correct recipes down into SRS when the check result is NG) triggered by the associated event from equipment which reports check information to the host. Equipment requests Pre-Execution Check to the host by using Pre-ExeCheck Event, and the host sends the Pre-Execution Check result by using Pre-ExeCheck Service.9.9.4.2.1 Pre-ExeCheck Event — This event requests Pre-Execution Check to the host by sending RecipeXIDList and CheckInformation.

Table 26 Pre-ExeCheck Event Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

RecipeXIDList M - List of RecipeXIDCheckInformation M - Check information for Pre-Execution Check.

9.9.4.3 Pre-ExeCheck Service — This service is used to send Pre-ExeCheckResult to the equipment. Correct recipes are also sent down when Pre-ExeCheckResult is NG.

Table 27 Pre-ExeCheck Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDRecipeXIDList M - List of RecipeXIDPre-ExeCheckResult M - Check result from the host. OK or NGRecipeList - C List of Recipes is sent when Pre-ExeCheckResult is NGPre-ExeCheckResp - M Information concerning the result of the serviceRecipeCheckNotifResp - C Notification of recipe check result to the service

9.9.4.4 QueryRecipeXIDList — This service requests RecipeXIDList to the host by QueryRecipeList Event from the equipment, and host responds with the list of RecipeXID in specified Security Class by using QueryRecipeList Service.9.9.4.4.1 QueryRecipeXIDList Event — This event requests RecipeXIDList to the host.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 29 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 30: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Table 28 QueryRecipeXIDList Event Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

SecurityID M -EquipmentID C -

9.9.4.4.2 QueryRecipeXIDList Service — This service downloads RecipeXID list to the equipment.

Table 29 QueryRecipeXIDList Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDRecipeXIDList M - List of RecipeXIDQueryRecipeXIDListResp - M Information concerning the result of the service

9.9.4.5 PostRecipe — This service posts a list of recipe to the host. SecurityID and EquipmentID of RecipeXIDs of the recipes in the RecipeList may be checked by the host for security.

Table 30 PostRecipe Event Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

RecipeList M -

10 PRC Requirements10.1 Operational Preconditions — This section describes preconditions for operations of the PRC.

10.1.1 Single Point of Control (SPOC) — The host side (e.g., something like an Equipment Interface) should maintain which node in the host takes care of which functionality of PRC Operation.

10.1.2 Single Point of Recipe Management (SPORM) — The master copy of PEM Recipes shall be managed by the host (normally by Recipe Server) and all PEM Recipe related interactions defined in this Standard shall be done between the host (including Recipe Server) and the equipment. Backup copies may be somewhere in the host, and temporary copies to support seamless execution are normally in the equipment.

10.1.3 PRC as Temporary Recipe Space — PRC shall be considered as a temporary recipe space which may be cleared whenever the host or privileged user decides for consistency or security reasons.

10.1.4 Copy Out of the Recipes Already Referred (Recipe Queue Space and Recipe Execution Space) — Recipes already used to create PJs shall be copied from the PRC to other protected recipe spaces such as Recipe Queue Space or Recipe Execution Space which hold the recipes while the PJs are queued or executed accordingly, so that recipes in PRC can be overwritten or deleted at any time. Recipes in the protected recipe space (such as Recipe Queue Space or Recipe Execution Space) shall not be able to be read or written by non-host-controlled or non-privileged-user-controlled actions.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 30 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 31: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Figure 9Position of PRC

10.2 Fundamental Requirements — This section defines operation rules of PRC.

10.2.1 Use of Recipes in PRC — Recipes in PRC shall be used for process execution only in the PEM On state. Conventional Recipe Space shall be used in the PEM Off state.

10.2.2 Recipe Security Control of PRC — To ensure the security of the recipes in PRC, the entire recipes in PRC may be cleared by the host or privileged user upon the change of Recipe User Group.

10.2.3 No Concurrent PRC Reference for Multiple Recipe Request — Equipment may have multiple recipe reference requirements simultaneously, however, concurrent requests for multiple recipes to PRC (such as a new recipe request during Query Recipe state) are not allowed. Recipes shall be requested one by one.

10.2.4 Recipe Consistency Management by the Host — In the following cases the host (Recipe Server) shall delete a PEM Recipe potentially exists in PRC by using Delete Operation in order to maintain consistency between the PEM Recipes in Recipe Server and the PEM Recipes in PRC. The host shall not execute Delete Operation on the PEM recipe which is being used for PJ creation (the PJ creation demand from the host is not responded with completion by the equipment) by the equipment. Equipment ignores the Delete Operation from the host in case the specified recipe is not in PRC. In case MaxNumber=0 (Full Download Mode or Full Query Mode), the deletion may not be required.

10.2.4.1 Recipe Modification under the Same Recipe ID on Recipe Server — In case PEM Recipe modification under the same Recipe ID without the use of Version ID occurred on Recipe Server, the host (Recipe Server) shall delete a PEM Recipe, which has the same Recipe ID, potentially exists in PRC.10.2.4.2 Recipe Deletion on Recipe Server — In case PEM Recipe deletion occurred on Recipe Server, the host (Recipe Server) shall delete the PEM Recipe, which has the same Recipe ID (and Version ID if in use), potentially exists in PRC.

10.2.5 Recipe Management per Equipment — Recipe Server may separately manage the master copies of the PEM Recipes which are optimized for particular equipment, and may manage variable parameters as well.

10.2.6 No Editing of Recipe in PRC — Equipment shall not edit recipes in PRC upon any request from any user. Users shall not be allowed to edit any recipe in the PRC.

10.2.7 Copy Out of a Recipe from PRC — Except for the copy out of a recipe for PJ creation in PEM On state, equipment shall only be allowed to copy the recipes out from the PRC upon a request from the host or a privileged user in order to use the recipes as a base copy for other experiment uses. This function may be used by privileged

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 31 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 32: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

users to copy out the recipes managed in PRC into the Conventional Recipe Space and modify the recipe to run for process development or experiment. It may be faster to copy a recipe in PRC into Conventional Recipe Space than to download the recipe from the host.

10.2.8 Local Access to PRC — Non-host-controlled or non-privileged-user-controlled recipe write actions such as create or edit are not allowed to PRC in order to isolate and protect PEM Recipes from inadequate operations in equipment. Only delete is allowed.

10.2.9 Content Management Logics of PRC — This section defines content management logics of PRC.

10.2.9.1 Maximum Number of PEM Recipes Downloaded in PRC — Maximum number of PEM Recipes downloaded in PRC before PJ creation is limited by the capacity of the PRC. MaxNumber is not applied upon download. In case Cache Full occurred, least recently accessed (written into PRC or used for PJ creation) recipes are deleted in order to create sufficient space.

10.2.9.2 Maximum Number of PEM Recipes Preserved in PRC — Maximum number of PEM Recipes preserved in PRC after PJ creation is dynamically settable from the host by using MaxNumber attribute of PRC. MaxNumber has a list structure so that each subspace may have individual number in case PRC has subspace structure. PRC shall accept as many PEM recipes downloaded by the host before PJ creation demand, and MaxNumber shall be referred to determine how many PEM Recipes are preserved in PRC upon the change of MaxNumber or each time after PJ creation. Least recently accessed (written into PRC or used for PJ creation) PEM Recipes are deleted in case the number of PEM Recipes exceeds the value in MaxNumber after PJ creation. Regardless of the value set to MaxNumber, absolute maximum number of PEM Recipes in PRC is limited by the capacity of the PRC.

10.2.9.3 Maximum Time of PEM Recipes Preserved in PRC (Optional) — An optional function which determines the maximum preservation duration, after its latest accesses (write into PRC or used for PJ creation), of PEM Recipes in PRC preserved under Maximum Number management. PRC object has an attribute MaxTime for this purpose. A PEM Recipe which expired with this time limit shall automatically be deleted by the equipment. MaxTime is dynamically settable from the host.

10.3 PRC Operation Modes — PRC Operation Mode is a way to use PRC Operations in order to transfer PEM Recipe from the host to the equipment, and to use the PEM Recipes in the equipment. PRC performs following four PRC Operation Modes. In case PRC has subspace structure, each subspace may independently operate in different PRC Operation Mode.

Table 31 PRC Operation Modes

MaxNumber

Download or Query

MaxNumber =‘0’ MaxNumber =‘1’ or More Download/Query and Lookup Relationship

Download Basis

The host downloads required PEM Recipes prior to the associated PJ creation demand.

Full Download Mode

Download: Every time just before associated PJ creation demandLook-up: Upon PJ creationCache Hit: OccursCache Miss: Doesn’t occurPreservation: None. Delete all

Pre-Download Mode

Download: Appropriately before associated PJ creation demandLook-up: Upon PJ creationCache Hit: OccursCache Miss: Doesn’t occurPreservation: Allowed number

Upon PJ creation, equipment looks up the required PEM Recipes in PRC.The required PEM Recipes are in PRC and are used for the PJ creation.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 32 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 33: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

MaxNumber

Download or Query

MaxNumber =‘0’ MaxNumber =‘1’ or More Download/Query and Lookup Relationship

Query Basis

The host doesn’t download required PEM Recipes prior to the associated PJ creation demand.

Full Query Mode

Download: NoneLook-up: Upon PJ creationCache Hit: Doesn’t occurCache Miss: Occurs every time. Query is used.Preservation: None. Delete all

Cache Mode

Download: NoneLook-up: Upon PJ creationCache Hit: May occurCache Miss: May occur. Query is used.Preservation: Allowed number

Upon PJ creation, equipment looks up the required PEM Recipes in PRC.In case the required PEM Recipes are in PRC, the PEM Recipes are used for the PJ creation.In case the required PEM Recipes are not in PRC, the equipment queries the required PEM Recipes and uses the served PEM Recipes for the PJ creation.

MaxNumber and Write Recipe Relationship

PEM Recipes downloaded by the host or queried by the equipment are once written into PRC regardless of MaxNumber.In case Cache Full occurred, least recently accessed (written into PRC or used for PJ creation) PEM Recipe is deleted.

MaxNumber and Preservation Relationship

No PEM Recipes are preserved in PRC after PJ creation.

Allowed numbers of PEM Recipe are preserved in PRC after PJ creation.In case the number of PEM Recipes exceeds MaxNumber, least recently accessed (written into PRC or used for PJ creation) PEM Recipe is deleted.

10.4 PRC Operations — PRC has the following operations. PRC Operation Modes uses these PRC Operations. Unless otherwise noted, ‘Production Cache’ or ‘Production Cache n’ shall be used for SecurityID in the services to PRC when SecurityID is required.

Table 32 PRC Operations

PRC Operation Operation Service to be used Note

Cache Clear Clear entire contents of PRC ClearClass The host or equipment triggersDownload The host downloads PEM Recipes into PRC WriteRecipeDelete The host deletes specified PEM Recipes in

PRCDeleteRecipe

Lookup Equipment looks up the required PEM Recipes in PRC

Cache Miss Equipment queries the required PEM Recipes to Recipe Server as the required PEM Recipes are not in PRC

QueryRecipe Equipment uses the served PEM Recipe from Recipe Server for the PJ creation

Cache Hit Equipment finds the required PEM Recipes in PRC

- Equipment uses the PEM Recipe found in PRC for the PJ creation

Consistency Check(Optional)

Pre-Execution Check Pre-ExeCheck

10.4.1 Cache Clear Operation — Cache Clear Operation clears all the recipes in PRC. This operation is used in case the recipes in PRC are deemed inconsistent with the recipes in Recipe Server. The host uses ClearClass service

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 33 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 34: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

to execute Cache Clear Operation. The equipment executes Cache Clear Operation, triggered by the cases listed below.

The host or the privileged user shall trigger Cache Clear Operation in case there is a known mismatch between recipes in PRC and the recipes on the Recipe Server.

The host or the privileged user may trigger Cache Clear Operation in case they deem that mismatch is probable between recipes in PRC and the recipes on the Recipe Server (such as after maintenance).

An operator may trigger Cache Clear Operation in case there is a known mismatch between recipes in PRC and the recipes on the Recipe Server (such as after maintenance).

The host or the privileged user may trigger Cache Clear Operation in case they deem there is a security concern on leaving the recipes in PRC (such as Recipe User Group change).

Privileged user may trigger Cache Clear Operation in case there is a known impact to the contents of the PRC (such as disk drive exchange in maintenance).

10.4.1.1 Auto Clear Function — A function which automatically clears PRC by equipment, in order to avoid unexpected recipe read out after the host communication for PRC management is lost, and in order to avoid unexpected recipe existence when the host communication for PRC management is established. Equipment shall trigger Cache Clear Operation automatically when the host communication for PRC management is established, lost, or re-established. Auto Clear function is enabled or disabled by AutoClear. AutoClear shall be nonvolatile.

Figure 10Cache Clear Operation

10.4.2 Download Operation — Download Operation writes down PEM recipes into PRC by using WriteRecipe service. The host can issue Download Operation whenever the equipment is not in PJ creation.

Figure 11Download Operation

10.4.3 Delete Operation — Delete Operation deletes the specified PEM Recipe in PRC. Delete Operation from the host uses DeleteRecipe service. The host can issue Delete Operation whenever the equipment is not in PJ creation.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 34 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 35: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Figure 12Delete Operation

10.4.4 Lookup Operation — Lookup Operation is used to look up the required recipe in PRC. Equipment initiates Lookup Operation upon PJ creation.

10.4.4.1 Cache Miss Operation — In case the required recipe is not in the PRC (Cache Miss), equipment requests the recipe to the Recipe Server by using QueryRecipe service. The recipe written into PRC is served to PJ Creator for PJ creation.

10.4.4.1.1 Query of Linked Recipes — In case the recipe has linkages to sub-recipes, and those linked sub-recipes are also managed in the Recipe Server and PRC, the linked sub-recipes are also queried upon their Cache Miss.

Figure 13Cache Miss Operation

10.4.4.2 Cache Hit Operation — In case the required recipe is in the PRC (Cache Hit), equipment uses the recipe for the PJ creation.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 35 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 36: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Figure 14Cache Hit Operation

10.4.4.2.1 Consistency Check Operation (Optional) — Upon Cache Hit, Consistency Check operation may be used in order to confirm the consistency of the content of the PEM Recipe in the PRC with the PEM Recipe with the same Recipe ID in Recipe Server. The equipment uses Pre-ExeCheck Service in order to request consistency check to the host (Recipe Server) and to have OK/NG information, in case of NG, correct PEM Recipe.10.4.4.2.1.1 Check Information — The check information (such as Checksum or entire Recipe) which is sent by Pre-ExeCheck Event is user defined. The host-managed sub-recipes may also be taken into account for the check information composition. This Standard does not define check information (e.g., Checksum) specification. Non-host-managed sub-recipes and/or equipment parameters may also be taken into account (the host may compare the information with the correct information which was prospectively uploaded to the host), however, upon a negative response from the host, the equipment can only report an error and stop the execution.

Figure 15Consistency Check Operation (OK and NG)

10.5 PRC Object (PRCOBJ) Requirement — Equipment compliant with PRC function of this Standard shall have PRC Object management capability.

10.5.1 Definition of PRCOBJ — The PRCOBJ is a software representation of the PRC. Information about PRC is encapsulated as an object. This allows the host to exchange information with the equipment about one or more specific PRCOBJ by using services defined in SEMI E39 Object Services Standard.

10.6 PRCOBJ Object Descriptions

10.6.1 PRCOBJ Object Instantiation — Under normal circumstances PRCOBJ object is instantiated by the equipment when the equipment is started up or is changed its configuration of PRC.

10.6.2 PRCOBJ Object Identifier (ObjID) — The PRCOBJID is the PRCOBJ Object Identifier. The equipment is responsible for ensuring uniqueness of the PRCOBJID prior to instantiation.

10.6.3 PRCOBJ Object Destruction — A PRCOBJ Object reaches the end of its lifecycle when the equipment is shut down or is changed its configuration that affects to the PRCOBJ Object.

10.6.4 PRCOBJ Object Persistence — A PRCOBJ Object does not need to persist over equipment shut down to restart.

10.7 PRCOBJ Object Attribute Definitions — The following table defines the attributes of PRCOBJ object.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 36 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 37: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

10.7.1 Who to Maintain the Attributes — All attributes in the following table are always maintained and updated by the equipment.

Table 33 PRCOBJ Attribute Definition

Attribute Name Definition Access#1 Reqd Form

ObjID PRCOBJ object Identifier. RO Y Text.PRCOBJID.‘<Security Class>’Security Class implemented by SRS ObjectObjID is equipment defined.

ObjType Object Type. RO Y Text = ‘PRCObject’PRCSwitch Enable/Disable of entire PRC

functionalities. Default is Disabled.RO Y Enumerated: Enabled, Disabled

AutoClear A flag which enables or disables the Auto Clear function

RO Y Enumerated:Enable, Disable

MaxNumber Maximum number of PEM Recipes allowed to be preserved in PRC after PJ creation. MaxNumber has a list structure so that it can be applied to each subspace. The usage of the list structure is equipment defined.

RO Y List of:Unsigned integer:

‘n’ = n recipes are allowedDefault = 1

MaxTime Maximum time during which a PEM Recipe allowed to be in PRC after use

RO O Unsigned integer.Unit is user defined.‘0’ = Maximum Time function is not used (Default)‘1’ or more = Maximum Time

PRCPre-ExeCheck Enable/Disable of Pre-Execution Check optionThis defines use of optional Pre-Execution Check

RO O Enumerated: Enabled, DisabledDefault is Disabled

#3 Even though a value may be marked as RO (read only), the initial value for the attribute may be provided by the host.

10.8 State Management of PRCOBJ

10.8.1 Activation of PRC — For upward compatibility, PRC shall be disabled when equipment is started up, and all recipe operation shall be done with Conventional Recipe Space. In order to use PRC in addition to Conventional Recipe Space, PRC shall be enabled by the host or privileged user.

10.9 PRCOBJ Services — This section defines the message services required to support PRCOBJ functionalities. Equipment compliant with PRC function of this Standard shall have following services to manage PRCOBJ.

10.9.1 PRCOBJ Service Message Description — The following table is a list of PRCOBJ services.

Table 34 PRCOBJ Service Message Description

Service Name Type#1 DescriptionSetPRCAttributes R This service sets attributes of PRCOBJGetPRCAttributes R This service gets attributes of PRCOBJ

#4 The ‘Type’ column is used to indicate whether the service consists of a request/response message pair, ‘R’, or a single notification message, ‘N’.

10.9.2 PRCOBJ Service Message Parameter Definition — The following is a list of required parameters used in conjunction with PRCOBJ service messages.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 37 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 38: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Table 35 PRCOBJ Service Message Parameter Definition

Parameter Name Form Description

ObjID Text.PRCOBJID.‘<Security Class>’Security Class implemented by SRS ObjectObjID is equipment defined.

PRCOBJ object Identifier.

PRCSwitch Enumerated: Enabled, Disabled Enable/Disable of entire PRC functionalitiesAutoClear Enumerated:

Enable, DisableA flag which enables or disables the Auto Clear function

MaxNumber List of:Unsigned integer:‘n’ = n recipes are allowedDefault = 1

Maximum number of PEM Recipes allowed to be preserved in PRC after PJ creation. MaxNumber has a list structure so that it can be applied to each subspace. The usage of the list structure is equipment defined.

MaxTime Unsigned integer.Unit is user defined.‘0’ = Maximum Time function is not used (Default)‘1’ or more = Maximum Time

Maximum time during which a PEM Recipe allowed to be in PRC after use

PRCPre-ExeCheck Enumerated: Enabled, Disabled Enable/Disable of Pre-Execution Check optionThis defines use of optional Pre-Execution Check

SetPRCAttributesResp Enumerated: Done, Error Information concerning the result of the service

10.9.3 PRCOBJ Service Message Definitions — The following tables specify the allowable/required parameters for each service.

10.9.3.1 SetPRCAttributes — This service is used to initialize and start functionalities of PRC.

Table 36 SetPRCAttributes Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDPRCSwitch M - Enable/Disable of entire PRC functionalitiesAutoClear M - Auto Clear upon host communication establishmentMaxNumber M - Maximum number of recipes preserved in PRCMaxTime CO - Maximum time to preserve recipes in PRCPRCPre-ExeCheck CO - Enable/Disable of Pre-Execution Check optionSetPRCAttributesResp - M Information concerning the result of the service

10.9.3.2 GetPRCAttributes — Use GetAtt of E39 OSS.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 38 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 39: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

11 Remote Access Cache Requirements11.1 Remote Access Cache — This section defines specifications of Remote Access Cache function.

11.2 Use of RAC Space — RAC Space is used as a work space for Remote Access operation. RAC caches required recipes which master copies are on Recipe Server, and holds newly revised or created recipes. Upon closing of a Remote Access session, RAC Space shall be cleared after uploading required results to the host.

11.3 One RAC Space for One Session — One RAC Space is used for one Remote Access session.

11.4 Initialization and Termination of RAC Space — RAC Space shall be ready when a Remote Access session is opened and shall be cleared when a Remote Access session is closed.

11.5 Authentication of Operator — Equipment shall maintain access control of RAC throughout a session. One RAC is used for one session for one operator.

11.5.1 Opening of a Session — Equipment shall request OperatorID and OperatorPassword to the operator who requests remote access and shall send them to the host through Open Remote Access operation for authentication by the host.

11.5.2 During the Session — Equipment is strongly recommended to confirm OperatorID and OperatorPassword at appropriate timings during the session.

11.5.3 Closing of a Session — Equipment shall request OperatorID and OperatorPassword to the operator and shall send CloseStatus to the host by Close Remote Access operation.

11.6 Remote Access Operations — RAC has the following operations. Unless otherwise noted, ‘Remote’ or ‘Remote n’ shall be used for SecurityID in RACOBJ services.

Table 37 Remote Access Operations

Remote Access Operation

Operation Originated by

Service to be used Note

Session Management

Establish session in secure manner

Open Remote Access

Equipment requests to open a Remote Access session to the host.

Equipment OpenRemoteAccess

Close Remote Access

Equipment requests to close the Remote Access session to the host.

Equipment CloseRemoteAccess

Directory Access Equipment gets directory from the host.Request Directory Equipment requests directory to the host Equipment QueryRecipeXIDList

Download/Upload of Recipes

Query Recipe Equipment queries specified recipes when the recipes are not in RAC Space.

Equipment QueryRecipe

Upload Recipe Equipment uploads specified recipes in RAC Space to the host.

Equipment PostRecipe

11.6.1 Open Remote Access Operation — This operation establishes a Remote Access session between the host and equipment. This operation is used at the beginning of Remote Access in order to have an operator authentication by the host. Upon the grant from the host, a Remote Access session is established. OperatorID and OperatorPassword are required for operator authentication.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 39 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 40: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

AddFigure 16

Open Remote Access Operation

11.6.2 Close Remote Access Operation — This operation closes the Remote Access session between the host and equipment. This operation is used at the end of Remote Access. Upon the grant from the host, the RAC Space is cleared and the Remote Access session is closed.

AddFigure 17

Close Remote Access Operation

11.6.3 Request Directory Operation — This operation requests directory information to see required set of recipes in Recipe Server.

AddFigure 18

Request Directory Operation

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 40 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 41: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

11.6.4 Query Recipe Operation — This operation queries recipes to Recipe Server. When the specified recipes are found in RAC Space, the recipes are used and query to Recipe Server does not occur.

AddFigure 19

Query Recipe Operation (Cache Miss)

AddFigure 20

Query Recipe Operation (Cache Hit)

11.6.5 Upload Recipe Operation — This operation requests upload of recipes in RAC Space to Recipe Server. VersionID of the recipes locally edited on equipment shall be zero length. VersionID may be assigned by the host upon acceptance.

AddFigure 21

Upload Recipe Operation

11.7 RAC Object (RACOBJ) Requirement — Equipment compliant with RAC function of this Standard shall have RAC Object management capability.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 41 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 42: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

11.7.1 Definition of RACOBJ — The RACOBJ is a software representation of the RAC. Information about RAC is encapsulated as an object. This allows the host to exchange information with the equipment about one or more specific RACOBJ by using services defined in SEMI E39 Object Services Standard.

11.8 RACOBJ Object Descriptions

11.8.1 RACOBJ Object Instantiation — Under normal circumstances RACOBJ object is instantiated by the equipment when the equipment recognizes request of Remote Access operation.

11.8.2 RACOBJ Object Identifier (ObjID) — The RACOBJID is the RACOBJ Object Identifier. The equipment is responsible for ensuring uniqueness of the RACOBJID prior to instantiation.

11.8.3 RACOBJ Object Destruction — A RACOBJ Object reaches the end of its lifecycle when the equipment closes the Remote Access session. Remote Access session is closed by operator, also, is closed by optional AutoClose timer for security.

11.8.4 RACOBJ Object Persistence — A RACOBJ Object does not need to persist over equipment shut down to restart.

11.9 RACOBJ Object Attribute Definitions — The following table defines the attributes of RACOBJ object.

11.9.1 Who to Maintain the Attributes — All attributes in the following table are always maintained and updated by the equipment.

Table 38 RACOBJ Attribute Definition

Attribute Name Definition Access #1 Reqd Form

ObjID RACOBJ object Identifier. RO Y Text.RACOBJID.‘<Security Class>’Security Class implemented by SRS ObjectObjID is equipment defined.

ObjType Object Type. RO Y Text = ‘RACObject’RACSwitch Enable/Disable of entire RAC

functionalities. Default is Disabled.RO Y Enumerated: Enabled, Disabled

AutoClose A function that equipment closes the session automatically when operator access doesn’t occur exceeding the predefined maximum time.

RO Y Unsigned integer.Unit is user defined.‘0’ = AutoClose function is not used (Default)‘1’ or more = Maximum time

OperatorID Host-registered identifier of the operator who uses the Remote Access session

RO Y Maximum 32 characters

OperatorPassword Host-registered password of the operator who uses the Remote Access session

RO Y Maximum 16 characters

CloseStatus Status of the RACObj RO Y Enumerated: Normal, AutoClosed, Error#5 Even though a value may be marked as RO (read only), the initial value for the attribute may be provided by the host.

11.10 State Management of RACOBJ

11.10.1 Activation of RAC — For upward compatibility, RAC shall be disabled when equipment is started up. In order to use RAC, RAC shall be enabled by the host or privileged user by enabling RACSwitch.

11.11 RACOBJ Services — This section defines the message services required to support RACOBJ functionalities. Equipment compliant with RAC function of this Standard shall have following services to manage RACOBJ.

11.11.1 RACOBJ Service Message Description — The following table is a list of RACOBJ services.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 42 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 43: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Table 39 RACOBJ Service Message Description

Service Name Triggered by Type #1 Req # 2 DescriptionSetRACAttributes Host R Y This service sets attributes of RACOBJGetRACAttributes Host R Y This service gets attributes of RACOBJOpenRemoteAccess Equipment R Y This service requests to open a Remote Access session to the host.CloseRemoteAccess Equipment R Y This service requests to close a Remote Access session to the host.

#1 The ‘Type’ column is used to indicate whether the service consists of a request/response message pair, ‘R’, or a single notification message, ‘N’.#2 The ‘Req’ column is used to indicate whether the service is required, ‘R’, or optional, ‘O’.

11.11.2 RACOBJ Service Message Parameter Definition — The following is a list of required parameters used in conjunction with RACOBJ service messages.

Table 40 RACOBJ Service Message Parameter Definition

Parameter Name Form Description

ObjID Text.RACOBJID.‘<Security Class>’Security Class implemented by SRS ObjectObjID is equipment defined.

RACOBJ object Identifier.

RACSwitch Enumerated: Enabled, Disabled Enable/Disable of entire RAC functionalitiesAutoClose Unsigned integer.

Unit is user defined.‘0’ = AutoClose function is not used (Default)‘1’ or more = Maximum time

A function that equipment closes the session automatically when operator access doesn’t occur exceeding the predefined maximum time.

OperatorID Maximum 32 characters Identifier of the operator who uses the Remote Access session

OperatorPassword Maximum 16 characters Password of the operator who uses the Remote Access session

CloseStatus Enumerated: Normal, AutoClosed, Error Status which indicates how the RACObj is closedSetRACAttributesResp Enumerated: Done, Error Information concerning the result of the serviceOpenRemoteAccessResp Enumerated: OK, NG Information concerning the result of the serviceCloseRemoteAccessResp Enumerated: OK, NG Information concerning the result of the service

11.11.3 RACOBJ Service Message Definitions — The following tables specify the allowable/required parameters for each service.

11.11.3.1 SetRACAttributes — This service is used to initialize and start functionalities of RAC.

Table 41 SetRACAttributes Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDRACSwitch M - Enable/Disable of entire RAC functionalitiesAutoClose M - Maximum time for AutoClose functionSetRACAttributesResp - M Information concerning the result of the service

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 43 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 44: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

11.11.3.2 GetRACAttributes — Use GetAtt of E39 OSS.

11.11.4 OpenRemoteAccess — This service requests to open Remote Access to the host. The host responds with OK or NG.

11.11.4.1 OpenRemoteAccess Event — This event requests to open Remote Access to the host. OperatorID and OperatorPassword are sent to the host for operator authentication.

Table 42 OpenRemoteAccess Event Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

OperatorID M - ID of the operatorOperatorPassword M - Password of the operatorSecurityID M - This specifies the Security Class of targeted recipesEquipmentID C -

11.11.4.2 OpenRemoteAccess Service — The host responds to the equipment if the Remote Access request is granted.

Table 43 OpenRemoteAccess Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDOpenRemoteAccessResp - M Information concerning the result of the service

11.11.5 CloseRemoteAccess — This service requests to close Remote Access to the host. The host responds with OK or NG.

11.11.5.1 CloseRemoteAccess Event — This event requests to close the Remote Access to the host.

Table 44 CloseRemoteAccess Event Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

SecurityID M -CloseStatus M - Informs if the session is closed properly

11.11.5.2 CloseRemoteAccess Service — The host responds to the equipment if the Remote Access is properly closed.

Table 45 CloseRemoteAccess Service Parameter Definitions

Parameter Name Req/Ind Rsp/Conf Description

ObjID M - Object IDCloseRemoteAccessResp - M Information concerning the result of the service

12 Requirements for Compliance12.1 Following table provides a checklist for PRC compliance.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 44 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 45: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Table 46 PRC Compliance Statement

Fundamental PRC Requirements PRC Section Implemented PRC Compliant

Extended Recipe Identification Requirements 8 RecipeXID 8.1 Yes No Yes No

Secured Recipe Space Requirements 98 Secured Recipe Space 98.1 Yes No Yes NoSRS and Security Class 98.2 Yes No Yes NoMessage Requirements 98.3 Yes No Yes No

Conventional Messages 98.3.1 Yes No Yes NoPJ Creation from the Host 98.3.1.1 Yes No Yes NoSecurityID in Recipe Body 98.3.1.2 Yes No Yes No

Extended Messages 98.3.2 Yes No Yes NoPEM State and PEMFlag 9 8 .4 Yes No Yes No

Multiple PEMFlags for Multo-Part Equipment 98.4.1 Yes No Yes NoMulti-Part Equipment Compatibility (Optional) 9.58.7 Yes No Yes No

Multi-Part Equipment with One PRC 9.5.18.7.1 Yes No Yes NoMulti-Part Equipment with dedicated PRCs 9.5.28.7.2 Yes No Yes No

SRS Object (SRSOBJ) Requirement 9.68.8 Yes No Yes NoSRSOBJ Object Descriptions 9.78.9 Yes No Yes NoSRSOBJ Object Attribute Definitions 9.88.10 Yes No Yes NoSRSOBJ Services 9.9 8.11 Yes No Yes No

PRC Requirements 109 Fundamental Requirements 109.2 Yes No Yes No

Use of Recipes in PRC 109.2.1 Yes No Yes NoNo Concurrent PRC Reference for Multiple Recipe Request

109.2.3 Yes No Yes No

No Editing of Recipe in PRC 109.2.6 Yes No Yes NoCopy Out of a Recipe from PRC 109.2.7 Yes No Yes NoLocal Access to PRC 109.2.8 Yes No Yes NoContent Management Logics of PRC 109.2.9

Maximum Number of PEM Recipes Downloaded in PRC

109.2.9.1 Yes No Yes No

Maximum Number of PEM Recipes Preserved in PRC

109.2.9.2 Yes No Yes No

Maximum Time of PEM Recipes Preserved in PRC (Optional)

109.2.9.3 Yes No Yes No

PRC Operation Modes 109.3 Yes No Yes No PRC Operations 109.4

Cache Clear Operation 109.4.1 Yes No Yes NoDownload Operation 109.4.2 Yes No Yes NoDelete Operation 109.4.3 Yes No Yes NoLookup Operation 109.4.4 Yes No Yes No

Cache Miss Operation 109.4.4.1 Yes No Yes NoQuery of Linked Recipes 109.4.4.1.1 Yes No Yes No

Cache Hit Operation 109.4.4.2 Yes No Yes No

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 45 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 46: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Fundamental PRC Requirements PRC Section Implemented PRC Compliant

Consistency Check Operation (Optional) 109.4.4.2.1 Yes No Yes NoPRC Object (PRCOBJ) Requirement 109.5 Yes No Yes NoPRCOBJ Object Descriptions 109.6 Yes No Yes NoPRCOBJ Object Attribute Definitions 109.7 Yes No Yes NoState Management of PRCOBJ 109.8 Yes No Yes NoPRCOBJ Services 109.9 Yes No Yes No

Remote Access Cache Requirements 11 Use of RAC Space 11.2 Yes No Yes NoOne RAC Space for One Session 11.3 Yes No Yes NoInitialization and Termination of RAC Space 11.4 Yes No Yes NoAuthentication of Operator 11.5 Yes No Yes No

Opening of a Session 11.5.1 Yes No Yes NoDuring the Session 11.5.2 Yes No Yes NoClosing of a Session 11.5.3 Yes No Yes No

Remote Access Operations 11.6 Yes No Yes NoOpen Remote Access Operation 11.6.1 Yes No Yes NoClose Remote Access Operation 11.6.2 Yes No Yes NoRequest Directory Operation 11.6.3 Yes No Yes NoQuery Recipe Operation 11.6.4 Yes No Yes NoUpload Recipe Operation 11.6.5 Yes No Yes No

RAC Object (RACOBJ) Requirement 11.7 Yes No Yes NoRACOBJ Object Descriptions 11.8 Yes No Yes NoRACOBJ Object Attribute Definitions 11.9 Yes No Yes NoState Management of RACOBJ 11.10 Yes No Yes NoRACOBJ Services 11.11 Yes No Yes No

13 Related Documents13.1 Subordinate Standards

SEMI E170.1 — Specification for SECS-II Protocol for Secured Foundation Of Recipe Management System Production Recipe Cache

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 46 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 47: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

RELATED INFORMATION 1 INCREMENTAL IMPLEMENTATION STEPSNOTICE: This Related Information is not an official part of SEMI E170 and was derived from the work of the global Information and Control Technical Committee. This Related Information was approved for publication by full letter ballot procedures on [ A&R approval date ].

R1-1 Purpose of Incremental Implementation Steps R1-1.1 Introduction of Incremental Implementation Steps — To make implementation barrier lower, following deployment steps are considered and recommended. Step 3A and Step 3B are independent and can be implemented in either order. Step 4 is the completion of E170 implementation with both 3A and 3B implemented.

Table R1-1 Incremental Implementation Steps

Steps Step 1 Step 2 Step 3A1 Step 3A2 Step 3B Step 4

Introduced E170 Capability

Message Set with RecipeXID

SRS Management PRC Space PRC Operation RAC Operation All

Purpose Introduce E170 recipe transaction capability (Preparation of Extended Recipe ID capability)

Introduce E170 Secured Recipe Space management capability

Introduce recipe space switching function for production execution

Introduce cache operation for production recipe transaction efficiency

Introduce Remote Access function for SPORM

Completion of E170 implementation

Precondition None(Decision to go with E170)

Step 1 Step 2 Step 3A1 Step 2(PEMFlag is not needed)

Step 3A or 3B

Implementation E170 Messages for Recipe Upload and Download

SRS Object except PEMFlag

PRC SpacePEMFlag

PRC Object RAC SpaceRAC Object

All components

Expected Effects Multiple recipe upload or download by single message is supported(Conventional messaging are not affected and are also usable)

Secured Recipe Spaces are usableOptional Recipe Spaces can be assigned to differently privileged operator groups

PRC Space is usable for secure production recipe handling(Pre-Download Mode, Full Download Mode)

Efficient transaction of recipe by cache operation(Cache Mode, Full Query Mode)

Remote Access of recipes on Recipe Server by using supplier provided recipe applications on equipment or workstation

Full effect of E170

Available Operations and Functions

Extended recipe identification by RecipeXIDMultiple recipes by single message

SRS Management (Security Class management by SecurityID)

PEMFlag which selects recipe space for E40 PJ

PRC operations RAC operations All E170 functionalities for SPORM

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 47 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 48: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

R1-2 Step 1: Message Set with RecipeXIDR1-2.1 Purpose — The purpose of this step is to provide a communication channel with expected identification capabilities of recipes by using basic set of E170 messages which uses RecipeXID.

R1-2.2 Expected Effects — By the implementation of basic set of E170 messages, the following functionalities are provided.R1-2.2.1 Messaging Capabilities — The messages provides following capabilities.

Multiple-recipe-upload/download by single message. This simplifies recipe transactions by enabling the use of single upload/download message for one set of recipes required for one process execution.

Replace conventional recipe Upload/Download messages preparing for the introduction of Step 2.

R1-2.2.2 Confirmation and Logging Capabilities — In case recipe editor is modified to manage RecipeXID, the following confirmation and logging are possible.

VersionID may be recorded in process log in order to make the version of the recipe used to each process clear.

SecurityID may be used to confirm if the recipe is the one certified by the host.

EquipmentID may be used to confirm if the recipe is prepared for the equipment.

Add

Figure R1-1Image of Step 1: Message Set with RecipeXID

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 48 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 49: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

R1-3 Step 2: SRS ManagementR1-3.1 Purpose — The purpose of this step is to provide SRS capability. SecurityID in the RecipeXID is used to distinguish recipe spaces with different Security Classes for different purposes.

R1-3.2 Expected Effects — By using SecurityID, recipe spaces are securely managed.

R1-3.2.1 SRS Space Definition — Any of SRS Spaces may be implemented. SRS Spaces including Conventional Recipe Space are clearly separated each other.R1-3.2.2 Optional Recipe Spaces (User Defined) — Optional Recipe Spaces with optional Recipe Security Class can be determined and used.

e.g. The recipes which SecurityID is ‘ABC’ can only reside in the recipe space with Security Class ‘ABC’.

R1-3.3 Available Functions — In addition to the Step1, this step has following functions.

Add

Figure R1-2Image of Step 2: SRS Management

R1-4 Step 3A1: PRC SpaceR1-4.1 Purpose — The purpose of this step is to provide SRS capability. SecurityID in the RecipeXID is used to distinguish recipe spaces with different Security Classes for different purposes.

R1-4.2 Expected Effects — By using SecurityID, recipe spaces are securely managed.

R1-4.2.1 PRC Space Definition — PRC Space is clearly separated from Conventional Recipe Space. PRC Space provides secure recipe space for Production Recipe. The recipes in PRC Space cannot be seen by equipment operator.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 49 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 50: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

R1-4.2.2 Selection of Recipe Spaces upon PJ Creation — Host controlled PEMFlag shows if the equipment (or the part of equipment) is in PEM (Production Execution Mode), and determines which recipe space is used for PJ creation. Conventional E40 PJM message can be used for PJ creation by referencing PEM Flag.

PEM On State (when the host sets PEMFlag as ‘Production’), the Production Recipes (SecurityID= ‘Production’) in PRC Space are used.

PEM Off State (when the host sets PEMFlag as ‘Conventional’), the recipes (SecurityID= ‘Conventional’) in Conventional Recipe Space are used.

R1-4.2.3 Optional Recipe Spaces (User Defined) — Optional Recipe Spaces with optional Recipe Security Class can be determined and used.

e.g. The recipes which SecurityID is ‘ABC’ can only reside in the recipe space with Security Class ‘ABC’.

R1-4.3 Available Functions — In addition to the Step1, this step has following functions.

Add

Figure R1-3Image of Step 3A1: PRC Space

R1-5 Step 3A2: PRC OperationR1-5.1 Purpose — The purpose of this step is to add Cache Mode operation in order to improve recipe transaction efficiency.

R1-5.2 Expected Effects — The following functions are implemented.

R1-5.2.1 Cache Mode Operation — MaxNumber management provides optimum cache hit rate management.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 50 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 51: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

R1-5.2.2 MaxNumber Management of PRC Space — MaxNumber management provides optimum cache hit rate management.

Normally, absolute maximum number of PRC Space is fixed and managed by equipment regardless of the implementation of dynamic MaxNumber control capability. So, implementation of MaxNumber management capability may not be needed at the begining to start using Cache Mode Operation.

R1-5.2.3 AutoClear — AutoClear is not a must for recipe operation but for security, and may be postponed.R1-5.2.4 MaxTime (Option) — MaxTime option may be implemented for more security in this Step or after.

Add

Figure R1-4Image of Step 3A2: PRC Operation

R1-6 Step 3B: RAC OperationR1-6.1 Purpose — The purpose of this step is to provide capability to access the recipes on RMS remotely from equipment or other work station in order to support SPORM. All master copies of the recipes are managed at single point on Recipe Server in RMS.

R1-6.2 Expected Effects — Remote Access capability becomes available and recipe access from equipment or other work stations are enabled.

R1-6.2.1 Enables Use of Equipment Supplier Provided Applications — Recipe applications, that are on equipment or equipment supplier provided work station and are optimized for the equipment, are also usable to the recipes on Recipe Server in RMS.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 51 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 52: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Recipe editor

Other recipe management applications such as history management, comparison, etc.

R1-6.2.2 Secured RAC Mechanism Supports Remote Access — The following secured RAC mechanisms are provided to enable Remote Access.

Dedicated Recipe Security Class ‘Remote’ or ‘Remote n’ is introduced.

Dedicated RAC Space ‘Remote’ or ‘Remote n’ is prepared.

Session management which support secure session initiation and close is implemented.

Add

Figure R1-5Image of Step 3B: RAC Operation

R1-7 Step 4: AllR1-7.1 Purpose — The purpose of this step is to improve recipe transaction efficiency improvement.

R1-7.2 Expected Effects — All functionalities of this Standard.

R1-7.2.1 Extended Recipe Identification — Recipes are identified by RecipeXID.R1-7.2.2 Recipe Space Security Management — SRS Object manages security among recipe spaces.R1-7.2.3 Recipe Transaction Efficiency Optimization — Cache Mode Operation and its options optimize recipe transaction efficiency in balance of security.R1-7.2.4 Remote Access Operation — Secured Remote Access supports SPORM based RMS.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 52 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 53: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Add

Figure R1-6Image of Step 4: All

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 53 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 54: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

RELATED INFORMATION 2 EXAMPLE OF PRODUCTION RECIPE CACHE OPERATION IN CACHE MODE NOTICE: This Related Information is not an official part of SEMI E170 and was derived from the work of the global Information and Control Technical Committee. This Related Information was approved for publication by full letter ballot procedures on [A&R approval date].

R2-1 Example of PRC OperationR2-1.1 Typical Cache Mode Operation — This Appendix shows an operation example of PRC in Cache Mode.

R2-2 PRC OperationR2-2.1 Cache Clear — PRC need to be cleared before start using as it may contain invalid recipes.

a. MES demands PRC Controller to clear PRC at any time.

b. PRC Controller clears the PRC.

R2-2.2 Lookup Operation — Upon a demand from MES, PRC Controller looks up PRC for required recipe.

c. MES sends a PJ.

d. Recipe Executor queries the recipe specified by the PJ to PRC Controller.

e. PRC Controller searches the recipe from PRC.

R2-2.2.1 Cache Hit Operation — In case of Cache Hit, following operation should take place.

f. Upon Cache Hit, PRC Controller responds to Recipe Executor with the recipe in the PRC.

R2-2.2.2 Cache Miss Operation — In case of Cache Miss, following operation should take place.

g. Upon Cache Miss, PRC Controller queries the recipe to Recipe Server.

h. Then, PRC Controller writes the recipe served from Recipe Server into PRC, and serves the recipe to Recipe Executor.

i. If the PRC is full, PRC Controller deletes the recipes which have lower possibility to be used.

R2-2.3 Recipe Execution — Specified recipe is copied and used.

j. Recipe Executor holds the recipe in Recipe Execution Space and executes.

Figure R1-7Cache Mode Operations

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 54 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 55: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

R2-3 Example ScenarioR2-3.1 Equipment Start Up — In case such as recovery from maintenance. Unknown recipes may remain in PRC.

Figure R1-8Equipment Start Up

R2-3.2 MES Sends Cache Clear Request — PRC Controller deletes recipes in PRC.

Figure R1-9MES Sends Cache Clear Request

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 55 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 56: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

R2-3.3 PRC is Cleared — No recipe remains in PRC.

Figure R1-10PRC is Cleared

R2-3.4 MES Sends PJ with Recipe #A — Cache Miss occurs as PRC is empty.

Figure R1-11MES Sends PJ with Recipe #A

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 56 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 57: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

R2-3.5 PRC Controller Queries Recipe #A to Recipe Server — Recipe Server responds with Recipe #A.

Figure R1-12PRC Controller Queries Recipe #A to Recipe Server

R2-3.6 PRC Controller Writes Recipe #A in PRC — And sends Recipe #A to Recipe Executor.

Figure R1-13PRC Controller Writes Recipe #A in PRC

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 57 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 58: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

R2-3.7 Recipe Executor Sends Recipe #A to Recipe Execution Space — Recipe execution starts!

Figure R1-14Recipe Executor Sends Recipe #A to Recipe Execution Space

R2-3.8 PJ Ends — Recipe #A remains in the PRC.

Figure R1-15PJ Ends

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 58 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 59: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

R2-3.9 MES Sends PJ with Recipe #A Again — Cache hits as Recipe #A is in PRC.

Figure R1-16MES Sends PJ with Recipe #A Again

R2-3.10 PRC Controller Passes Recipe #A to Recipe Executor — Recipe Executor sends Recipe #A to Recipe Execution Space.

Figure R1-17PRC Controller Passes Recipe #A to Recipe Executor

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 59 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 60: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

R2-3.11 PJ Ends Again — Recipe #A still remains in the PRC.

Figure R1-18PJ Ends Again

R2-3.12 MES Requests PJ with Recipe #B — Cache Miss occurs as Recipe #B is not in PRC.

Figure R1-19MES Requests PJ with Recipe #B

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 60 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 61: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

R2-3.13 PRC Queries Recipe #B to Recipe Server — And Recipe #B is served, written into PRC, passed to Recipe Executor and sent to Recipe Execution Space. And process starts.

Figure R1-20PRC Queries Recipe #B to Recipe Server

R2-3.14 PJ with Recipe #B is in Progress — Recipe #A and Recipe #B remain in PRC.

Figure R1-21PJ with Recipe #B is in Progress

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 61 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 62: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

R2-3.15 MES Requests PJ with Recipe #A Again — Text.

Figure R1-22MES Requests PJ with Recipe #A Again

R2-3.16 Recipe #A Starts Immediately After Completion of Recipe #B — Recipe Executor sends Recipe #A to Recipe Execution Space.

Figure R1-23Recipe #A Starts Immediately After Completion of Recipe #B

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 62 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 63: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

NOTICE: SEMI makes no warranties or representations as to the suitability of the Standards and Safety Guidelines set forth herein for any particular application. The determination of the suitability of the Standard or Safety Guideline is solely the responsibility of the user. Users are cautioned to refer to manufacturer’s instructions, product labels, product data sheets, and other relevant literature, respecting any materials or equipment mentioned herein. Standards and Safety Guidelines are subject to change without notice.

By publication of this Standard or Safety Guideline, SEMI takes no position respecting the validity of any patent rights or copyrights asserted in connection with any items mentioned in this Standard or Safety Guideline. Users of this Standard or Safety Guideline are expressly advised that determination of any such patent rights or copyrights and the risk of infringement of such rights are entirely their own responsibility.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 63 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 64: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

SEMI E170.1-mmyy: SPECIFICATION FOR SECS-II PROTOCOL FOR SECURED FOUNDATION OF RECIPE MANAGEMENT SYSTEM PRODUCTION RECIPE CACHE

This Standard was technically approved by the Information & Control Global Technical Committee. This edition was approved for publication by the global Audits and Reviews Subcommittee on Mmmmm Dd, 2015. Available at www.semiviews.org and www.semi.org in Mmmm 2015

14 Purpose14.1 The purpose of this Standard is to provide a mapping of the services and data of SEMI E170-mmyy Specification for Secured Foundation Of Recipe Management System Production Recipe Cache to SECS-II message protocol.

15 Scope15.1 The scope of this Standard is to map the services and data of SEMI E170 to SECS-II streams, functions, and items.

NOTICE: SEMI Standards and Safety Guidelines do not purport to address all safety issues associated with their use. It is the responsibility of the users of the Documents to establish appropriate safety and health practices, and determine the applicability of regulatory or other limitations prior to use.

16 Referenced Standards and Documents16.1 SEMI Standards and Safety Guidelines

SEMI E5 — SEMI Equipment Communications Standard 2 Message Content (SECS-II)

SEMI E30 — Generic Model for Communications and Control of Manufacturing Equipment (GEM)

SEMI E39 — Object Services Standard: Concepts, Behavior, and Services

SEMI E39.1 — SECS-II Protocol for Object Services Standard (OSS)

SEMI E40 — Standard for Processing Management

SEMI E170 — Secured Foundation Of Recipe Management System (SFORMS) Specification for Production Recipe Cache (PRC)

NOTICE: Unless otherwise indicated, all documents cited shall be the latest published versions.

17 Terminology17.1 None.

18 Mapping of SRSOBJ Services

Table 1 SRSOBJ Service Messages Mapping

SRSOBJ Service Message Name E39 Object Service Message Name

Stream, Function SECS-II Name

GetSRSAttributes GetAttr S14F1,F2 GetAttr Request/GetAttr DataSetSRSSwitch ObjectAction S14F19,F20 Generic Service Request/AcknowledgeSetPEMFlag ObjectAction S14F19,F20 Generic Service Request/AcknowledgeClearClass ObjectAction S14F19,F20 Generic Service Request/AcknowledgeDeleteRecipe ObjectAction S14F19,F20 Generic Service Request/AcknowledgeWriteRecipe ObjectAction S14F19,F20 Generic Service Request/Acknowledge

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 64 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 65: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

SRSOBJ Service Message Name E39 Object Service Message Name

Stream, Function SECS-II Name

GetRecipeXIIDList ObjectAction S14F19,F20 Generic Service Request/AcknowledgeReadRecipe ObjectAction S14F19,F20 Generic Service Request/AcknowledgePreSpecifyRecipe ObjectAction S14F19,F20 Generic Service Request/AcknowledgePresetRecipeXID ObjectAction S14F19,F20 Generic Service Request/AcknowledgePre-ExeCheck ObjectAction S14F19,F20 Generic Service Request/AcknowledgeQueryRecipeXIDList ObjectAction S14F19,F20 Generic Service Request/AcknowledgeQueryRecipe Event - S6F11, F12 Event Report Send/AcknowledgePre-ExeCheck Event - S6F11, F12 Event Report Send/AcknowledgeQueryRecipeXIDList Event - S6F11, F12 Event Report Send/AcknowledgePostRecipe Event - S6F11, F12 Event Report Send/Acknowledge

19 Mapping of SRSOBJ Parameter

Table 2 Parameter to SECS-II Data Items Mapping

SRSOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

--- OperationID OPID [5( )]--- ObjSpec OBJSPEC [20]--- ObjectAction ‘SetSRSSwitch’

‘SetPRMFlag’‘ClearClass’‘DeleteRecipe’‘WriteRecipe’‘GetRecipeXIDList’‘ReadRecipe’‘PreSpecifyRecipe’‘PresetRecipeXID’‘QueryRecipe’‘Pre-ExeCheck’‘QueryRecipeXIDList’

SVCNAME [20]

ObjID for GetSRSAttributes

ObjID 1-80 characters OBJID

ObjID forother services

ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘ObjID’SPVAL 1-80 characters

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 65 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 66: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

SRSOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

SRSSwitch ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘SRSSwitch’SPVAL [51] 0=Disabled 1=Enabled

PEMFlagList ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘PEMFlagList’SPVAL L, n 1. PEMFlag1

: n. PEMFlagn

PEMFlagn 0-16 characters ‘Conventional’, ‘Production Cache’ or ‘Production Cache n’

SecurityID ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘SecurityID’SPVAL 0-16 characters

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 66 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 67: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

SRSOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

RecipeXIDList ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘RecipeXIDList’SPVAL L, n 1.L,5 1. RecipeID1

2. VersionID1

3. SecurityID1

4. TypeID1

5. EquipmentID1

: n.L,5 1. RecipeIDn

2. VersionIDn

3. SecutiryIDn

4. TypeIDn

5. EquipmentIDn

RecipeID=RCPSPEC or PPID.VersionID 0-256 charactersSecurityIDn

L,2 1. ‘SecurityID’ 2. SecurityID 0-16 charactersTypeID 0-16 charactersEquipmentIDn

L,2 1. ‘EquipmentID’ 2. EquipmentID 0-256 characters

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 67 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 68: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

SRSOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

RecipeList ObjectActionParameterRequestObjectActionParameterResult

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘RecipeList’SPVAL L, n 1.L,6 1. RecipeID1

2. VersionID1

3. SecurityID1

4. TypeID1

5. EquipmentID1

6. RecipeBody1> : n. L,6 n.L,n 1. RecipeIDn

2. VersionIDn

3. SecurityIDn

4. TypeIDn

5. EquipmentIDn

6. RecipeBodyn

RecipeID=RCPSPEC or PPID.VersionID 0-256 charactersSecurityIDn

L,2 1. ‘SecurityID’ 2. SecurityID 0-16 charactersTypeID 0-16 charactersEquipmentIDn

L,2 1. ‘EquipmentID’ 2. EquipmentID 0-256 charactersRecipeBody User defined

CheckInformation ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘CheckInformation’SPVAL User defined

Pre-ExeCheckResult ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘Pre-ExeCheckResult’SPVAL [51] 0=OK 1=NG

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 68 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 69: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

SRSOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

SetSRSSwitchResp ObjectActionParameterResult L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘SetSRSSwitchResp’SPVAL [51] 0=OK 1=NG

SetPEMFlagResp ObjectActionParameterResult L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘SetPEMFlagResp’SPVAL [51] 0=OK 1=NG

ClearClassResp ObjectActionParameterResult L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘ClearClassResp’SPVAL [51] 0=OK 1=NG

DeleteRecipeResp ObjectActionParameterResult L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘DeleeteRecipeResp’SPVAL [51] 0=OK 1=NG

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 69 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 70: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

SRSOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

WriteRecipeResp List ofObjectActionParameterResult

List of RecipeTransferResult List of EachRecipeTransfer

L,2 1.L,2 1.<SPNAME> 2. <SPVAL> 2.L,n 1.L,2 1.<SPNAME1> 2.<SPVAL1> : n.L,2 1.<SPNAMEn> 2.<SPVALn>

SPNAME=‘RecipeTransferResult’SPNAMEn=‘EachRecipeTransfer’SPVAL [51] 0=Done 1=Error 2=FullSPVALn [51] 0=OK 1=NG

RecipeCheckNotifResp List of ObjectActionParameterResult

L,n 1.L,2 1.<SPNAME1> 2. <SPVAL1> : n.L,2 1.<SPNAMEn> 2. <SPVALn>

SPNAMEn= ‘EachRecipeCheck’SPVALn [51] 0=OK 1=NG

GetRecipeXIDListResp ObjectActionParameterResult L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘GetREcipeXIDListResp’SPVAL [51] 0=OK 1=NG

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 70 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 71: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

SRSOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

ReadRecipeResp ObjectActionParameterResult L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘ReadRecipeResp’SPVAL [51] 0=OK 1=NG

PreSpecifyRecipeResp

ObjectActionParameterResult L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘PreSpecifyRecipeResp’SPVAL [51] 0=OK 1=NG

PresetRecipeXIDResp

ObjectActionParameterResult L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘PresetREcipeXIDResp’SPVAL [51] 0=OK 1=NG

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 71 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 72: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

SRSOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

Pre-ExeCheckResp List of ObjectActionParameterResult

List of Pre-ExeCheckResultAck WriteRecipeResp

i.e.List of 1.Pre-ExeCheckResultAck 2.List of 1.RecipeTransferResult 2.List of EachRecipeTransfer

L,2 1.L,2 1.<SPNAMEa> 2. <SPVALa> 2.L,2 1.L,2 1.<SPNAMEb> 2. <SPVALb> 2.L,n 1.L,2 1.<SPNAME1> 2.<SPVAL1> : n.L,2 1.<SPNAMEn> 2.<SPVALn>

SPNAMEa=‘Pre-ExeCheckResultAck’SPNAMEb=‘RecipeTransferResult’SPNAMEn=‘EachRecipeTransfer’SPVALa,SPVALn [51] 0=OK 1=NGSPVALb [51] 0=Done 2=Full 5=Error

QueryRecipeXIDListResp

ObjectActionParameterResult L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘QueryRecipeXIDListResp’SPVAL [51] 0=OK 1=NG

RecipeTransferResult ObjectActionParameterResult L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘RecipeTransferResult’SPVAL [51] 0=OK 1=NG

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 72 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 73: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

SRSOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

EachRecipeTransfer ObjectActionParameterResult 1.L,2 1.<SPNAME> 2.<SPVAL>

SPNAME=‘EachRecipeTransfer’SPVAL [51] 0=Done 2=Full 5=Error

EachRecipeCheck ObjectActionParameterResult 1.L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘EachRecipeCheck’SPVAL [51] 0=OK 1=NG

Pre-ExeCheckResultAck ObjectActionParameterResult 1.L,2 1.<SPNAMEa> 2. <SPVAL>

SPNAMEa=‘Pre-ExeCheckResultAck’SPVAL [51] 0=Done 1=NG

--- ObjectActionStatus SVCACK 0=Acknowledge, service has been performed 1=Service does not exist 2=Cannot perform now 3=At least parameter is invalid 4=Acknowledge, service will be performed with completion notified later with parameters for response 5=Service is not completed or prohibited 6=No such object exists

L,2 1.<SVCACK> 2.Status

SVCACK [51]

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 73 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 74: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

SRSOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

--- Status L,n 1.L,2 1.<ERRCODE1> 2.<ERRTEXT1> : n.L,2 1.<ERRCODEn> 2.<ERRTEXTn>

ERRCODE [5( )]ERRTEXT [20]

--- ObjectLinkID LINKID [54]

20 Mapping of PRCOBJ Services

Table 3 PRCOBJ Service Messages Mapping

PRCOBJ Service Message Name E39 Object Service Message Name

Stream, Function SECS-II Name

SetPRCAttributes ObjectAction S14F19,F20 Generic Service Request/AcknowledgeGetPRCAttributes GetAttr S14F1,F2 GetAttr Request/GetAttr Data

21 Mapping of PRCOBJ Parameter

Table 4 Parameter to SECS-II Data Items Mapping

PRCOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

--- OperationID OPID [5( )]--- ObjSpec OBJSPEC [20]--- ObjectAction ‘SetPRCAttributes’ SVCNAME [20]ObjID for GetPRCAttributes

ObjID 1-80 characters OBJID

ObjID forSetPRCAttributes

ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘ObjID’SPVAL 1-80 characters

PRCSwitch ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘PRCSwitch’SPVAL [51] 0=Disabled 1=Enabled

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 74 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 75: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

PRCOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

AutoClear ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘AutoClear’SPVAL [51] 0=Disabled 1=Enabled

MaxNumber ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘MaxNumber’SPVAL L, n 1. <MaxNumber1> : n. <MaxNumbern>MaxNumbern [51] ‘n’ = n recipes are allowed

MaxTime ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘MaxTime’SPVAL [51] 0=Maximum Time function is not used 1 or more = Maximum Time

PRCPre-ExeCheck ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘PRCPre-ExeCheck AutoClear’SPVAL [51] 0=Disabled 1=Enabled

SetPRCAttributesResp

ObjectActionParameterResult 1.L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘SetPRCAttributesResp’SPVAL [51] 0=Done 1=Error

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 75 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 76: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

PRCOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

--- ObjectActionStatus SVCACK 0=Acknowledge, service has been performed 1=Service does not exist 2=Cannot perform now 3=At least parameter is invalid 4=Acknowledge, service will be performed with completion notified later with parameters for response 5=Service is not completed or prohibited 6=No such object exists

L,2 1.<SVCACK> 2.Status

SVCACK [51]

--- Status L,n 1.L,2 1.<ERRCODE1> 2.<ERRTEXT1> : n.L,2 1.<ERRCODEn> 2.<ERRTEXTn>

ERRCODE [5( )]ERRTEXT [20]

--- ObjectLinkID LINKID [54]

22 Mapping of RACOBJ Services

Table 5 RACOBJ Service Messages Mapping

RACOBJ Service Message Name E39 Object Service Message Name

Stream, Function SECS-II Name

SetRACAttributes ObjectAction S14F19,F20 Generic Service Request/AcknowledgeGetRACAttributes GetAttr S14F1,F2 GetAttr Request/GetAttr DataOpenRemoteAccess ObjectAction S14F19,F20 Generic Service Request/AcknowledgeCloseRemoteAccess ObjectAction S14F19,F20 Generic Service Request/Acknowledge

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 76 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 77: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

23 Mapping of RACOBJ Parameter

Table 6 Parameter to SECS-II Data Items Mapping

RACOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

--- OperationID OPID [5( )]--- ObjSpec OBJSPEC [20]--- ObjectAction ‘SetRACAttributes’

‘OpenRemoteAccess’‘CloseRemoteAccess’

SVCNAME [20]

ObjID for GetRACAttributes

ObjID 1-80 characters OBJID

ObjID forother services

ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘ObjID’SPVAL 1-80 characters

RACSwitch ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘RACSwitch’SPVAL [51] 0=Disabled 1=Enabled

AutoClose ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘AutoClese’SPVAL [5()] 0=AutoClose function is not used (default) >0 Maximum time

OperatorID ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘OperatorID’SPVAL 0-32 characters

OperatorPassword ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘OperatorPassword’SPVAL 0-16 characters

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 77 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 78: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

RACOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

SecurityID ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘SecurityID’SPVAL 0-16 characters

EquipmentID ObjectActionParameterRequest

L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘EquipmentID’SPVAL 0-256 characters

SetRACAttributesResp ObjectActionParameterResult L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘SetRACAttributeResp’SPVAL [51] 0=Done 1=Error

OpenRemoteAccessResp ObjectActionParameterResult L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘OpenRemoteAccessResp’SPVAL [51] 0=OK 1=NG

CloseStatus ObjectActionParameterResult L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘CloseStatus’SPVAL [51] 0=Normal 1=AutoClose 2=Error

CloseRemoteAccessResp

ObjectActionParameterResult L,2 1.<SPNAME> 2. <SPVAL>

SPNAME= ‘CloseRemoteAccessResp’SPVAL [51] 0=OK 1=NG

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 78 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 79: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

RACOBJ Service Parameter

E39 Object Service Message Parameter

Range SECS-II Data Item

--- ObjectActionStatus SVCACK 0=Acknowledge, service has been performed 1=Service does not exist 2=Cannot perform now 3=At least parameter is invalid 4=Acknowledge, service will be performed with completion notified later with parameters for response 5=Service is not completed or prohibited 6=No such object exists

L,2 1.<SVCACK> 2.Status

SVCACK [51]

--- Status L,n 1.L,2 1.<ERRCODE1> 2.<ERRTEXT1> : n.L,2 1.<ERRCODEn> 2.<ERRTEXTn>

ERRCODE [5( )]ERRTEXT [20]

--- ObjectLinkID LINKID [54]

24 Mapping of Variable Data Item24.1 Table 5 shows the specific SECS-II data classes, and formats needed for SECS-II implementations of SEMI E170 variable data items.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 79 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 80: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Table 7 Variable Data Item Mapping

Variable Name Class Format

RecipeXIDList DVVAL L,2 1. ‘RecipeXIDList’ 2., n 1.L,5 1. [20]RecipeID1

2. [20]VersionID1

3. SecurityID1

4. [20]TypeID1

5. EquipmentID1

: n.L,5 1. [20]RecipeIDn

2. [20]VersionIDn

3. SecurityIDn

4. [20]TypeIDn

5. EquipmentIDn

RecipeID=RCPSPEC or PPID.VersionID 0-256 charactersSecurityIDn

L,2 1. ‘SecurityID’ 2. SecurityID 0-16 charactersTypeID 0-16 charactersEquipmentIDn

L,2 1. ‘EquipmentID’ 2 EquipmentID 0-256 characters

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 80 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 81: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Variable Name Class Format

RecipeList L,2 1. ‘RecipeList’ 2.L, n 1.L,6 1. RecipeID1

2. VersionID1

3. SecurityID1

4. TypeID1

5. EquipmentID1

6. RecipeBody1> : n. L,6 1. RecipeIDn

2. VersionIDn

3. SecurityIDn

4. TypeIDn

5. EquipmentIDn

6. RecipeBodyn

RecipeID=RCPSPEC or PPID.VersionID 0-256 charactersSecurityIDn L,2 1. ‘SecurityID’ 2. SecurityID 0-16 charactersTypeID 0-16 charactersEquipmentID L,2 1. ‘EquipmentID’ 2 EquipmentID 0-256 charactersRecipeBody User defined

RecipeID DVVAL [20]VersionID DVVAL [20]SecurityID DVVAL L,2

1.[20]=’SecurityID’ 2.[20]

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 81 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 82: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

25 SECS-II Attribute Definitions25.1 SRS Object SECS-II Attributes Definitions — The following table defines the SECS-II structure for SRSOBJ object of SEMI E170.

Table 8 SRSOBJ SECS-II Attribute Definitions

Attribute Name Attribute Data Form: SECS-II Structure

ObjID [20] <OBID> (Conforms to the restrictions of ObjID as specified in SEMI E39.1, § 6.)ObjType [20] ‘SRSObject’SRSSwitch [51]

SRSSwitch is enumerated as follows:0=Disabled1=Enabled

SecurityClassList L,n 1. [20] SecurityClass1

: n. [20] SecurityClassn

PEMFlagList L,n 1. [20] PEMFlag1

: n. [20] PEMFlagn

QueryStat L,2 1. ‘RecipeXIDList’ 2., n 1.L,5 1. [20]RecipeID1

2. [20]VersionID1

3. SecurityID1

4. [20]TypeID1

5. EquipmentID1

: n.L,5 1. [20]RecipeIDn

2. [20]VersionIDn

3. SecurityIDn

4. [20]TypeIDn

5. EquipmentIDn

n=0 indicates no QueryRecipe takes place

SecurityIDn

L,2 1. ‘SecurityID’ 2. SecurityIDEquipmentIDn

L,2 1. ‘EquipmentID’ 2 EquipmentID

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 82 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 83: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Attribute Name Attribute Data Form: SECS-II Structure

Pre-ExeCheckStat L, n 1.L,6 1. [20] RecipeID1

2. [20] VersionID1

3. SecurityID1

4. [20] TypeID1

5. EquipmentID1

6. [20] CheckInformation1

: n.L,6 1. [20] RecipeIDn

2. [20] VersionIDn

3. SecurityIDn

4. [20] TypeIDn

5. EquipmentIDn

6. [20] CheckInformationn

n=0 indicates no PreExeCheckStat takes place

SecurityIDn

L,2 1. ‘SecurityID’ 2. SecurityIDEquipmentIDn

L,2 1. ‘EquipmentID’ 2 EquipmentID

25.2 PRC Object SECS-II Attributes Definitions — The following table defines the SECS-II structure for PRCOBJ object of SEMI E170.

Table 9 PRCOBJ SECS-II Attribute Definitions

Attribute Name Attribute Data Form: SECS-II Structure

ObjID [20] <OBID> (Conforms to the restrictions of ObjID as specified in SEMI E39.1, § 6.)ObjType [20] ‘PRCObject’PRCSwitch [51]

PRCSwitch is enumerated as follows:0=Disabled1=Enabled

AutoClear [51]AutoClear is enumerated as follows:0=Disabled1=Enabled

MaxNumber L,n 1. [51] MaxNumber1

: n. [51] MaxNumbern

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 83 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943

Page 84: Standards Border Template - SEMIdownloads.semi.org/.../$FILE/5888.docx · Web view— equipment used to produce product, such as semiconductor devices, including substrate sorting,

DRAFTDocument Number: 5888

Date: 5/6/23

Attribute Name Attribute Data Form: SECS-II Structure

MaxTime [5()]0=Maximum Time function is not used>0 Maximum time

PRCPre-ExeCheck [51]PRCPre-ExeCheck is enumerated as follows:0=Disabled1=Enabled

Table 10 RACOBJ SECS-II Attribute Definitions

Attribute Name Attribute Data Form: SECS-II Structure

ObjID [20] <OBID> (Conforms to the restrictions of ObjID as specified in SEMI   E39.1, § 6.) ObjType [20] ‘RACObject’RACSwitch [51]

RACSwitch is enumerated as follows:0=Disabled1=Enabled

AutoClose [51]AutoClear is enumerated as follows:0=AutoClose function is not used (Default)>1 Maximum time

OperatorID [20] Maximum 32 charactersOperatorPassword [20] Maximum 16 charactersCloseStatus [51]

CloseStatus is enumerated as follows:0=Normal1=AutoClosed2=Error

NOTICE: SEMI makes no warranties or representations as to the suitability of the Standards and Safety Guidelines set forth herein for any particular application. The determination of the suitability of the Standard or Safety Guideline is solely the responsibility of the user. Users are cautioned to refer to manufacturer’s instructions, product labels, product data sheets, and other relevant literature, respecting any materials or equipment mentioned herein. Standards and Safety Guidelines are subject to change without notice.

By publication of this Standard or Safety Guideline, SEMI takes no position respecting the validity of any patent rights or copyrights asserted in connection with any items mentioned in this Standard or Safety Guideline. Users of this Standard or Safety Guideline are expressly advised that determination of any such patent rights or copyrights, and the risk of infringement of such rights are entirely their own responsibility.

This is a draft document of the SEMI International Standards program. No material on this page is to be construed as an official or adopted standard. Permission is granted to reproduce and/or distribute this document, in whole or in part, only within the scope of SEMI International Standards committee (document development) activity. All other reproduction and/or distribution without the prior written consent of SEMI is prohibited.

Page 84 Doc. 5888 SEMI

Semiconductor Equipment and Materials International3081 Zanker RoadSan Jose, CA 95134-2127Phone:408.943.6900 Fax: 408.943.7943