-
公开(公告)号:WO2020197653A1
公开(公告)日:2020-10-01
申请号:PCT/US2020/017580
申请日:2020-02-11
Applicant: MICRON TECHNOLOGY, INC.
Inventor: BELL, Debra M. , MALIHI, Naveh
Abstract: Apparatuses and methods related to updating data lines for data generation in, for example, a memory device or a computing system that includes a memory device. Updating data lines can include updating a plurality of data lines. The plurality of data lines can provide data form the memory array responsive to a receipt of the access command. The plurality of data lines can also be updated responsive to a determination that an access command received at a memory device is unauthorized.
-
公开(公告)号:WO2020139539A1
公开(公告)日:2020-07-02
申请号:PCT/US2019/064903
申请日:2019-12-06
Applicant: MICRON TECHNOLOGY, INC.
Inventor: MURPHY, Richard C. , SWAMI, Shivam , MALIHI, Naveh , KORZH, Anton , HUSH, Glen E.
Abstract: Apparatuses and methods related to mitigating unauthorized memory access are described. Mitigating unauthorized memory access can include verifying whether an access command is authorized to access a protected region of a memory array. The authorization can be verified utilizing a key and a memory address corresponding to the access command. If an access command is authorized to access a protected region, then a row of the memory array corresponding to the access command can be activated. If an access command is not authorized to access the protected region, then a row of the memory array corresponding to the access command may not be activated.
-
公开(公告)号:WO2020139534A1
公开(公告)日:2020-07-02
申请号:PCT/US2019/064716
申请日:2019-12-05
Applicant: MICRON TECHNOLOGY, INC.
Inventor: KEETH, Brent , MALIHI, Naveh
Abstract: Apparatuses and methods related to implementing a non-persistent unlock state for secure memory. Implementing the non-persistent unlock state can include verifying whether an access command is authorized to access a protected region of a memory array. The authorization can be verified utilizing a key and a memory address corresponding to the access command. If an access command is authorized to access a protected region, then a row of the memory array corresponding to the access command can be activated following the placement of the protected region in a non-persistent unlocked mode. If the row of the memory array corresponding to the access command is activated, then the protected region can be placed on a locked mode.
-
公开(公告)号:WO2020180464A1
公开(公告)日:2020-09-10
申请号:PCT/US2020/017578
申请日:2020-02-11
Applicant: MICRON TECHNOLOGY, INC.
Inventor: KEETH, Brent , MALIHI, Naveh
Abstract: Apparatuses and methods related to managing regions of memory are described. Managing regions can include verifying whether an access command is authorized to access a particular region of a memory array, which may have some regions that have rules or restrictions governing access (e.g., so-called "protected regions"). The authorization can be verified utilizing a key and a memory address corresponding to the access command. If an access command is authorized to access a region, then a row of the memory array corresponding to the access command can be activated. If an access command is not authorized to access the region, then a row of the memory array corresponding to the access command may not be activated.
-
公开(公告)号:WO2020139540A1
公开(公告)日:2020-07-02
申请号:PCT/US2019/064906
申请日:2019-12-06
Applicant: MICRON TECHNOLOGY, INC.
Inventor: KEETH, Brent , MALIHI, Naveh
IPC: G06F12/14 , G06F3/06 , G06F9/455 , G06F13/38 , G06F21/62 , G06F21/60 , G06F21/6245 , G06F21/79 , G06F2221/2101 , G06F3/0622 , G06F3/0637 , G06F3/0653 , G06F3/0659 , G06F3/0673 , G06F3/0679
Abstract: Apparatuses and methods related to tracking unauthorized access commands for memory. Identifying unauthorized memory access can include verifying whether an access command is authorized to access a protected region of a memory array. The authorization can be verified utilizing a key and a memory address corresponding to the access command. If an access command is authorized to access a protected region, then a row of the memory array corresponding to the access command can be activated. If an access command is not authorized to access the protected region, then an access count can be incremented to signify the unauthorized access command.
-
-
-
-