VIRTUAL AND PHYSICAL EXTENDED MEMORY ARRAY
    11.
    发明公开

    公开(公告)号:US20240086319A1

    公开(公告)日:2024-03-14

    申请号:US17941592

    申请日:2022-09-09

    CPC classification number: G06F12/0292 G11C29/10 G06F2212/1032 G06F2212/657

    Abstract: A memory device for extending addressable array space by incorporating virtual and physical memory arrays is disclosed. When extra storage space beyond a physical memory array is needed by a controller of the memory device, the storage space may be provided by extending the address space using a virtual array. The memory device incorporates the use of an extra row address bit to increase the addressable space, whereby the extra bit is utilized to address virtual rows in the virtual array. Spare or redundant physical memory elements utilized for memory repair may be programmed to a virtual address space for the virtual memory array. When a memory device operation is activated, the extra row address bit is set to high, and the virtual row address matches with a spare or redundant memory element, the virtual row in the virtual array space is activated for performance of the operation.

    MEMORY ROW-HAMMER MITIGATION
    12.
    发明公开

    公开(公告)号:US20240038284A1

    公开(公告)日:2024-02-01

    申请号:US17877592

    申请日:2022-07-29

    CPC classification number: G11C7/24 G11C7/1063 G11C7/1066

    Abstract: Methods, systems, and devices for memory row-hammer mitigation are described. A memory device may operate based on a scheme that is continuous across power cycles. For example, the memory device may access a region if a value of a counter does not satisfy a threshold value and may access the region if a value of the counter satisfies the threshold value. Upon transitioning power states, the value of the counter may be stored to a non-volatile memory such that it may be accessed when transitioning back to the original power state (e.g., an “ON” state). Accordingly, the value of the counter may be maintained across power cycles.

    MEMORY ROW-HAMMER MITIGATION
    13.
    发明申请

    公开(公告)号:US20250006236A1

    公开(公告)日:2025-01-02

    申请号:US18882436

    申请日:2024-09-11

    Abstract: Methods, systems, and devices for memory row-hammer mitigation are described. A memory device may operate based on a scheme that is continuous across power cycles. For example, the memory device may access a region if a value of a counter does not satisfy a threshold value and may access the region if a value of the counter satisfies the threshold value. Upon transitioning power states, the value of the counter may be stored to a non-volatile memory such that it may be accessed when transitioning back to the original power state (e.g., an “ON” state). Accordingly, the value of the counter may be maintained across power cycles.

    ACTIVATE INFORMATION ON PRECEDING COMMAND

    公开(公告)号:US20240393979A1

    公开(公告)日:2024-11-28

    申请号:US18792843

    申请日:2024-08-02

    Abstract: A method and a device is provided for utilizing unused valid (V) bits residing on a previous command to transmit additional activate information to a memory device. Additional activate information may be transmitted to the memory device without increasing the tRCD time, or increasing the command/address (CA) bus pins, or adding additional circuit area, thereby reducing the impact on the performance of the memory device.

    Memory row-hammer mitigation
    15.
    发明授权

    公开(公告)号:US12112831B2

    公开(公告)日:2024-10-08

    申请号:US17877592

    申请日:2022-07-29

    CPC classification number: G11C7/24 G11C7/1063 G11C7/1066 G11C8/20

    Abstract: Methods, systems, and devices for memory row-hammer mitigation are described. A memory device may operate based on a scheme that is continuous across power cycles. For example, the memory device may access a region if a value of a counter does not satisfy a threshold value and may access the region if a value of the counter satisfies the threshold value. Upon transitioning power states, the value of the counter may be stored to a non-volatile memory such that it may be accessed when transitioning back to the original power state (e.g., an “ON” state). Accordingly, the value of the counter may be maintained across power cycles.

    Frequency regulation for memory management commands

    公开(公告)号:US12086415B2

    公开(公告)日:2024-09-10

    申请号:US17662187

    申请日:2022-05-05

    CPC classification number: G06F3/0613 G06F3/0619 G06F3/0659 G06F3/0679

    Abstract: Methods, systems, and devices for frequency regulation for memory management commands are described. A memory device may maintain a respective first counter and second counter for each monitoring area of the memory device, where the counters may be incremented for each activate command received for the corresponding monitoring area. If the first counter satisfies a first threshold, an activate command issued to the monitoring area may be ignored. If the second counter fails to satisfy a second threshold, a memory management command issued to the monitoring area may be ignored and the memory device may maintain a value of the second counter, while decrementing the first counter. Alternatively, if the second counter satisfies the second threshold, the memory device may perform a memory management operation associated with a received memory management command and may decrement the first counter and the second counter.

    TECHNIQUES FOR NON-VOLATILE DATA PROTECTION
    18.
    发明公开

    公开(公告)号:US20230350580A1

    公开(公告)日:2023-11-02

    申请号:US17730755

    申请日:2022-04-27

    Abstract: Methods, systems, and devices for techniques for non-volatile data protection are described. As part of a power on operation, a non-volatile memory system may be configured to selectively stored data. For example, the memory system may determine whether a host system is authorized to access data stored in the memory system prior to a power off operation. If the memory system determines that the host system is authorized, the memory device may retain the data. If the memory system determines that the host system is not authorized, the memory system may erase all or a portion of the data. In some cases, the memory system may maintain a retain flag to determine whether the host system is authorized. Additionally or alternatively, the memory system may determine whether a password received from the host system is valid to determine whether the host system is authorized.

Patent Agency Ranking