Information may be stored on individual memory cells of a memory as a physical signal (e.g., a charge on a capacitive element). The memory may be a volatile memory, and the physical signal may decay over time (which may degrade or destroy the information stored in the memory cells). It may be necessary to periodically refresh the information in the memory cells by, for example, rewriting the information to restore the physical signal to an initial value.
As memory components have decreased in size, the density of memory cells has greatly increased. Repeated access to a particular memory cell or group of memory cells (often referred to as a ‘row hammer’ attack) may cause an increased rate of data degradation in nearby memory cells. Some memories may identify addresses which are repeatedly accessed so that the nearby memory cells may be refreshed to avoid damage from row hammer attacks. As memory devices are developed to resist certain types of attacks, the memory devices may remain vulnerable to new and/or different types of attacks. Accordingly, continued advances in memory attack management are desirable.
The following description of certain embodiments is merely exemplary in nature and is in no way intended to limit the scope of the disclosure or its applications or uses. In the following detailed description of embodiments of the present systems and methods, reference is made to the accompanying drawings which form a part hereof, and which are shown by way of illustration specific embodiments in which the described systems and methods may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice presently disclosed systems and methods, and it is to be understood that other embodiments may be utilized and that structural and logical changes may be made without departing from the spirit and scope of the disclosure. Moreover, for the purpose of clarity, detailed descriptions of certain features will not be discussed when they would be apparent to those with skill in the art so as not to obscure the description of embodiments of the disclosure. The following detailed description is therefore not to be taken in a limiting sense, and the scope of the disclosure is defined only by the appended claims.
Various patterns of access to the memory (generally referred to as attacks) may cause an increased rate of data degradation in one or more memory cells, such that they would decay before they can be refreshed as part of the auto-refresh operation. For example, repeated access to a particular row of memory (e.g., an aggressor row) may cause an increased rate of decay in rows (e.g., victim rows) which are close to the aggressor row. These repeated accesses may be part of a deliberate attack against the memory and/or may be due to ‘natural’ access patterns of the memory. The increased rate of decay in the victim rows may require that they be refreshed as part of a targeted refresh operation. The targeted refresh operations may be in addition to the auto refresh operations. The memory device may periodically perform targeted refresh operations. Additionally or alternatively, the memory device may perform one or more targeted refresh operations “as needed.” That is, the targeted refresh operations may not be periodic (e.g., regularly scheduled). The targeted refresh operations may occur intermixed with auto-refresh operations. For example, the memory device may perform a set of refresh operations including a number of auto refresh operations, and a number of targeted refresh operations and then repeat this cycle. A memory device may generally cycle between performing access operations for a period of time, performing refresh operations for a period of time, performing access operations and so forth.
In some memory devices, the memory device may pause its “normal” operations of responding to commands from an external device (e.g., a memory controller) to perform the targeted refresh operations. During periods where the memory device performs targeted refresh operations, the memory device may activate (e.g., assert) a signal (e.g., a “busy” signal) on a pin, which may be referred to as a ready/wait pin or an alert pin. The signal provided to the pin may be received by the external device. Responsive to the active signal on the pin, the external device may stop providing commands to the memory device, sometimes referred to as a command bus stall. After the targeted refresh operations are completed, the memory device may deactivate the signal on the pin, and the external device may resume providing commands to the memory device. An example of a memory device with a pin for alerting an external device that the memory device is busy performing targeted refresh operations may be found in U.S. application Ser. No. 17/102,266 which is incorporated herein by reference for any purpose.
Memory devices may include circuitry for detecting aggressor rows and determining the corresponding victim rows to be refreshed during targeted refresh operations. When the circuitry determines that the row meets one or more criteria, the row may be determined to be an aggressor row. Victim rows of the aggressor row may then be determined and refreshed during targeted refresh operations. In some applications, a number of accesses to a row may be used to identify aggressor rows. When a number of accesses of a row reaches a threshold (e.g., threshold value) within a certain period of time, the memory device may determine the row is an aggressor row. However, certain memory attacks may take advantage of the use of a threshold. A memory attack may access a set of word lines to increase the number of accesses just below the threshold. Once several word lines have been accessed a number of times just below the threshold, the word lines may be accessed simultaneously, near simultaneously, or in quick succession. This may cause an overflow of a targeted refresh queue and/or the memory device to assert the ready/wait pin for an unacceptably long period of time as it refreshes all of the numerous victim rows. The unavailability of the memory device to respond to external commands during the targeted refresh operations may reduce performance of a system including the memory device and/or cause a malfunction of the system.
The present disclosure is directed to techniques for providing dynamic thresholds for detecting aggressor rows. In some embodiments, the dynamic threshold may be based, at least in part, on a random number provided by a random number generator. Comparing a number of accesses of a row to a dynamic threshold may reduce the occurrence of several word lines being detected as aggressors in a short period of time. Thus, the length of time the memory device is unavailable due to performing targeted refresh operations may remain within an acceptable time period.
While in general the present disclosure refers to determining aggressor and victim word lines and addresses, it should be understood that as used herein, an aggressor word line does not necessarily need to cause data degradation in neighboring word lines, and a victim word line does not necessarily need to be subject to such degradation. A memory may use some criteria to judge whether an address is an aggressor address, which may capture potential aggressor addresses rather than definitively determining which addresses are causing data degradation in nearby victims. Similarly, victim addresses may be determined based on which word lines are expected to be effected by aggressors, rather than a definitive determination of which word lines are undergoing an increased rate of data decay.
The semiconductor device 100 includes a memory array 118. The memory array 118 is shown as including a plurality of memory banks. In the embodiment of
In some embodiments, such as the one shown in
The selection of the word line WL is performed by a row decoder circuit 108 and the selection of the bit lines BL is performed by a column decoder 110. In the embodiment of
The semiconductor device 100 may employ a plurality of external terminals that include command and address (C/A) terminals coupled to a command and address bus to receive commands and addresses, and a CS signal, clock terminals to receive clocks CK_t and CK_c, data terminals DQ to provide data, and power supply terminals to receive power supply potentials VDD, VSS, VDDQ, and VSSQ.
The clock terminals are supplied with external clocks CK_t and CK_c that are provided to an input circuit 112. The external docks may be complementary. The input circuit 112 generates an internal clock ICLK based on the CK_t and clocks. The ICLK clock is provided to the command decoder 110 and to an internal clock generator 114. The internal clock generator 114 provides various internal clocks LCLK based on the ICLK clock. The LCLK clocks may be used for timing operation of various internal circuits. The internal data clocks LCLK are provided to the input/output circuit 122 to time operation of circuits included in the input/output circuit 122, for example, to data receivers to time the receipt of write data.
The C/A terminals may be supplied with memory addresses. The memory addresses supplied to the C/A terminals are transferred, via a command/address input circuit 102, to an address decoder circuit 104. The address decoder circuit 104 receives the address and supplies a decoded row address XADD to the row decoder circuit 108 and supplies a decoded column address YADD to the column decoder circuit 110. The address decoder circuit 104 may also supply a decoded bank address BADD, which may indicate the bank of the memory array 118 containing the decoded row address XADD and column address YADD. The C/A terminals may be supplied with commands. Examples of commands include timing commands for controlling the timing of various operations, access commands for accessing the memory, such as read commands for performing read operations and write commands for performing write operations, as well as other commands and operations. The access commands may be associated with one or more row address XADD, column address YADD, and bank address BADD to indicate the memory cell(s) to be accessed. In some embodiments, the commands and/or addresses may be provided by a component external to the device 100, for example, as shown in
The received commands may be provided as internal command signals to a command decoder circuit 106 via the command/address input circuit 102. The command decoder circuit 106 includes circuits to decode the internal command signals to generate various internal signals and commands for performing operations. For example, the command decoder circuit 106 may provide a row command signal to select a word line and a column command signal to select a bit line.
The device 100 may receive an access command which is a row activation command ACT. When the row activation command ACT is received, a bank address BAUD and a row address XADD are timely supplied with the row activation command ACT.
The device 100 may receive access commands for performing read operations. When the commands are received, and a bank address, a row address and a column address are timely supplied with the commands, read data is read from memory cells MC in the memory, array 118 corresponding to the row address and column address. The commands are received by the command decoder circuit 106, which provides internal commands so that read data from the memory array 118 is provided to the read/write amplifiers 120. The read data is output to outside from the data terminals DQ via the input/output circuit 122.
The device 100 may receive access commands for performing write operations. When the commands are received, and a bank address, a row address and a column address are timely supplied with the commands, write data supplied to the data terminals DQ is written to a memory cells in the memory array 118 corresponding to the row address and column address. The commands are received by the command decoder circuit 106, which provides internal commands so that the write data is received by data receivers in the input/output circuit 122. Write clocks may also be provided to the external clock terminals for timing the receipt of the write data by the data receivers of the input/output circuit 122. The write data is supplied via the input/output circuit 122 to the read/write amplifiers 120, and by the read/write amplifiers 120 to the memory array 118 to be written into the memory cell MC.
The device 100 may also receive commands causing it to carry out one or more refresh operations as part of a self-refresh mode. The device 100 may be periodically placed in a refresh mode. Thus, refresh operations may be performed periodically each time the memory device is in the refresh mode. In some embodiments, the refresh mode command may be externally issued to the memory device 100, such as by memory controller 101. In some embodiments, the refresh mode command may be periodically generated by a component of the device 100. In some embodiments, when an external signal indicates a refresh mode entry command (e.g., an external refresh command), the refresh signal AREF may also be activated. The refresh signal AREF may be a pulse signal which is activated when the command decoder circuit 106 receives a signal which indicates entry to the self-refresh mode. The refresh signal AREF may be activated once immediately after command input, and thereafter may be cyclically activated at desired internal timing. In some embodiments, the refresh signal AREF may cause more than one refresh operation to be performed, which may be referred to as a “multi pump” refresh. In some embodiments, the refresh signal AREF may be active during the refresh mode. In some embodiments, the refresh signal AREF may be active during the multiple refresh operations. The refresh signal AREF may be used to control the timing of refresh operations during the refresh mode. A self-refresh exit command may cause the automatic activation of the refresh signal AREF to stop and may cause the device 100 to return to an idle state and/or resume other operations.
The refresh signal AREF is supplied to the refresh control circuit 116. The refresh control circuit 116 supplies a refresh row address RXADD to the row decoder circuit 108, which may refresh one or more word lines WL indicated by the refresh row address RXADD. In some embodiments, the refresh address RXADD may represent a single word line. In some embodiments, the refresh address RXADD may represent multiple word lines, which may be refreshed sequentially or simultaneously by the row decoder circuit 108. In some embodiments, the number of word lines represented by the refresh address RXADD may vary from one refresh address to another. The refresh control circuit 116 may control a timing of the refresh operation, and may generate and provide the refresh address RXADD. The refresh control circuit 116 may be controlled to change details of the refreshing address RXADD (e.g., how the refresh address is calculated, the timing of the refresh addresses, the number of word lines represented by the address), or may operate based on internal logic.
The refresh control circuit 116 may selectively output a targeted refresh address (e.g., which specifies one or more victim addresses based on an aggressor) or an automatic refresh address (e.g., from a sequence of auto refresh addresses) as the refresh address RXADD. Based on the type of refresh address RXADD, the row decoder circuit 108 may perform a targeted refresh or auto refresh operation. The automatic refresh addresses may be from a sequence of addresses which are provided based on activations of the refresh signal AREF and/or pumps generated responsive to AREF. The refresh control circuit 116 may cycle through the sequence of auto refresh addresses at a rate determined by AREF. In some embodiments, the auto refresh operations may generally occur with a timing such that the sequence of auto refresh addresses is cycled such that no information is expected to degrade in the time between auto refresh operations for a given word line. In other words, auto refresh operations may be performed such that each word line is refreshed at a rate faster than the expected rate of information decay.
The refresh address control circuit 116 may also determine targeted refresh addresses which are addresses that require refreshing victim addresses corresponding to victim rows) based on the access pattern of nearby addresses (e.g., aggressor addresses associated with aggressor rows) in the memory array 118. The refresh address control circuit 116 may monitor accesses to the different word lines WL of the memory bank. As described in U.S. Pat. No. 10,770,127, which is incorporated herein by reference for any purpose, when the row decoder circuit 108 sends an access command to a particular row, the information in the counter memory cells 126 along that row may be read to the refresh address control circuit 116 as the access count Xcount. The refresh address control circuit 116 may determine an access count of the row based on the values stored in the counter memory cells 126 of the accessed row.
The refresh address control circuit 116 may determine if the accessed row is an aggressor row based on the access count from the counter memory cells 126. In some embodiments, the refresh control circuit 116 may compare the access count value XCount to a threshold value. Based on the comparison, the refresh control circuit 116 may determine whether the current row is an aggressor row. For example, if the access count value XCount is equal to or above the threshold value, the current row may be determined to be an aggressor row.
According to embodiments of the present disclosure, rather than being a static value, the threshold value may be a random number (as used herein, random collectively refers to “truly” random, quasi-random, and pseudorandom). In some embodiments, the refresh address control circuit 116 may generate a random number as the threshold value each time an activation ACT command is received. In some embodiments, the random number is a number generated within a defined range (e.g., 1,000-2,000). In some embodiments, the threshold value may be a combination of a fixed number and a randomly generated offset. For example, the fixed number may be 1,000 and the offset is a random number between 50 and +50 and the threshold value is the sum of the fixed number and the offset. The numbers and ranges provided herein are merely exemplary and other numbers and ranges may be used in other embodiments. The numbers and ranges selected for the threshold value may be based on one or more factors such as word line density, system criticality, and/or materials used for the memory cells MC. In some embodiments, the range of the random number, the range of the offset, and/or the fixed number may be hardwired in the device 100. In some embodiments, these values may be programmable values stored in the device 100. For example, the range of the random number, the range of the offset, and/or the fixed number may be stored in a mode register 128 and written to the mode register with a mode register write command. The mode register 128 may then provide the programmed values to the refresh control circuit 116.
Returning to the determination made by the refresh address control circuit 116, the current row is not an aggressor row, the value of the access count may be changed and then the refresh address control circuit may write the new value of the access count back to the counter memory cells 126 of the accessed row. If the refresh address control circuit 116 determines that the accessed row is an aggressor, then the refresh address control circuit 116 may use the row address XADD of the accessed row to determine one or more victim row addresses and provide them as a refresh address RXADD as part of a targeted refresh operation. When the accessed row is determined to be an aggressor, the access count Xcount associated with that row may be reset (e.g., to a minimum value, such as 0). In some embodiments, the refresh address control circuit 116 may queue up identified aggressor addresses (e.g., in a register) for later use in targeted refresh operations. The refresh address RXADD may be provided with a timing based on a timing of the refresh signal AREF.
The refresh control circuit 116 may use multiple methods to determine the timing of targeted refresh operations. In some embodiments, the refresh control circuit 116 may have periodic targeted refresh operations during a refresh mode, where the refresh control circuit 116 performs auto refresh operations and targeted refresh operations (e.g., by providing a targeted refresh address as the refresh address RXADD) based on a periodic schedule. For example, after entering a refresh mode, the refresh control circuit 116 may perform a certain number of auto refresh operations, and then perform a certain number of targeted refresh operations.
In some embodiments, the refresh control circuit 116 may perform targeted refresh operations responsive to determining an accessed row is an aggressor row. Targeted refresh operations performed responsive to the detected aggressor row may be in addition to or instead of periodic targeted refresh operations. In some embodiments, the targeted refresh operations responsive to the detection of the aggressor row may be performed outside of a regularly scheduled refresh mode. In some embodiments, the refresh control circuit 116 may activate (e.g., assert) a busy signal BUSY, which may be provided to an external pin of device 100, such as an alert pin ALERT and/or Ready-Wait pin. The busy signal BUSY may be received by an external device, such as the memory controller 101, via the external pin. The busy signal BUSY may notify the external device that the device 100 is performing targeted refresh operations and is not available to perform access operations. In some embodiments, responsive to the active busy signal BUSY, the memory controller 101 may pause (e.g., delay) providing further access commands and/or other commands to the device 100. In some embodiments, the memory controller 101 may cancel one or more queued commands responsive to the active busy signal BUSY. Once the targeted refresh operations have been completed, the refresh control circuit 116 may deactivate the busy signal BUSY. The memory controller 101 may resume providing commands to the device 100 responsive to the deactivated busy signal BUSY.
The power supply terminals are supplied with power supply potentials VDD and VSS. The power supply potentials VDD and VSS are supplied to an internal voltage generator circuit 124. The internal voltage generator circuit 124 generates various internal potentials VPP, VOD, VARY, VPERI, and the like based on the power supply potentials VDD and VSS supplied to the power supply terminals. The internal potential VPP is mainly, used in the row decoder 108, the internal potentials VOD and VARY are mainly used in the sense amplifiers SAMP included in the memory array 118, and the internal potential VPERI is used in many peripheral circuit blocks.
The power supply terminals are also supplied with power supply potentials VDDQ and VSSQ. The power supply potentials VDDQ and VSSQ are supplied to the input/output circuit 122. The power supply potentials VDDQ and VSSQ supplied to the power supply, terminals may be the same potentials as the power supply potentials VDD and VSS supplied to the power supply terminals in an embodiment of the disclosure. The power supply potentials VDDQ and VSSQ supplied to the power supply terminals may be different potentials from the power supply potentials VDD and VSS supplied to the power supply terminals in another embodiment of the disclosure. The power supply potentials VDDQ and VSSQ supplied to the power supply terminals are used for the input/output circuit 122 so that power supply noise generated by the input/output circuit 122 does not propagate to the other circuit blocks.
A DRAM interface 240 may provide one or more signals to the address refresh control circuit 216 and row decoder 208 which in turn (along with a column decoder, not shown) may perform access operations on the memory array 218. The DRAM interface 240 may represent one or more components which provides signals to components of the bank. In some embodiments, the DRAM interface 240 may include a memory controller coupled to the semiconductor memory device (e.g., memory controller 101). In some embodiments, the DRAM interface 240 may represent one or more components of a semiconductor device (e.g., device 100) such as the command address input circuit 102, the address decoder 104, and/or the command decoder circuit 106 of
In some embodiments, the refresh control circuit 216 may include a counter circuit 228, a threshold comparator circuit 230, a threshold generator circuit 232, an RHR state control circuit 242, an aggressor address register 244, and a refresh address generator 250.
The counter circuit 228 may be coupled to the memory array 218, particularly, to the count value memory cells 226 of the memory array 218. The count value memory cells 226 may be used to implement the count value memory cells 126 in some embodiments. When a word line of the memory array 218 is accessed, the value XCount of the count value memory cells 226 along that word line are read to the counter circuit 228. The counter circuit 228 may determine a value of the access count for that row based on the value(s) read from the count value memory cells 226. The counter circuit 228 may provide the access count CNT to the threshold comparator circuit 230.
The threshold comparator circuit 230 may compare the access count CNT to a threshold value. Based on the comparison, the threshold comparator circuit 230 may activate a trigger signal TRIG that is provided to the counter circuit 228, the aggressor address register 244, and/or the REM state control circuit 342. For example, the threshold comparator circuit 230 may determine if the value of the access count CNT for the word line exceeds the threshold value (e.g., if the value is greater than the threshold value) or is equal to a threshold value. If the value is not equal to or does not exceed the threshold (e.g., if the value is less than the threshold), then the threshold comparator circuit 230 may not activate the trigger signal TRIG. Responsive to the inactive (e.g., unasserted) TRIG, the counter circuit 228 may update (e.g, change) a value of the access count CNT and write the updated count XCount hack to the count value memory cells 226. Updating the count may include incrementing or decrementing the count in some embodiments.
If the threshold comparator circuit 230 determines the count value CNT does equal or exceed the threshold, then the current address XADD may be determined to be an aggressor address. If the current address XADD is an aggressor address, TRIG may be activated. Responsive to the active TRIG, the aggressor address register 244 may record (e.g., latch) the current value of the row address XADD. In some embodiments, the active TRIG may further cause the RHR state control circuit 342 to trigger a targeted refresh operation. Further in response to the active TRIG, the counter circuit 228 may reset a value of the count, for example, by writing an initial value of the count (e.g., 0) back to the count value memory cells 226.
In some embodiments, the threshold comparator circuit 230 may receive the threshold value TV from a threshold generator circuit 232. The threshold generator circuit 232 may receive the activation signal ACT from the DRAM interface 240. Responsive to the ACT signal, the threshold generator circuit 232 may generate the threshold value TV provided to the threshold comparator circuit 230. Other signals may be used instead of or in addition to the ACT signal to generate a new random number. For example, the refresh signal AREF, an internal clock signal and/or a signal from an oscillator circuit included in the memory device may be used. In some embodiments, the threshold value TV may be a random number within a desired rage of values (e.g., 1,000-2,000). In some embodiments, the threshold value TV may be a fixed number (e.g., 1,500) combined with a randomly generated offset (e.g., −100 to +100).
The RHR state control circuit 242 may receive the AREF signal from the DRAM interface and the TRIG signal from the threshold comparator circuit 230. The MIR state control circuit 242 may provide an active signal RHR to indicate that a targeted refresh operation, such as a row hammer refresh (e.g., a refresh of the victim rows corresponding to an identified aggressor row) should occur. In some embodiments, the RHR state control circuit 242 may further provide a BUSY signal to the DRAM interface 240 to indicate performance of the targeted refresh operation. The MIR state control circuit 242 may also provide an active internal refresh signal IREF, to indicate that an auto-refresh operation should occur. The auto-refresh signal AREF may be periodically activated and may be used to control the timing of refresh operations. In some embodiments, the signals RHR and IREF may be activated such that they are not active at the same time (e.g., are not both at a high logic level at the same time).
The memory device may carry out a sequence of auto-refresh operations in order to periodically refresh the rows of the memory device. The RHR signal may be activated in order to indicate that the device should refresh a particular targeted row (e.g., a victim row) instead of an address from the sequence of auto-refresh addresses. The MK state control circuit 242 may use internal logic to provide the active RHR signal. For example, in some embodiments, the RHR state control circuit 242 may provide the active RHR signal based on certain number of activations of AREF (e.g., every 4th activation of AREF). Additionally or alternatively, the RHR state control circuit 242 may activate the RHR signal responsive to receiving an active TRIG signal from the threshold comparator circuit 230. In some embodiments, the active TRIG may trigger the refresh control circuit 216 to cause a targeted refresh operation to be performed outside the time period of a regularly scheduled refresh operation.
In some embodiments, the RHR state control circuit 242 may activate the BUSY signal during targeted refresh operations. In some embodiments, the BUSY signal may be activated when the RHR signal is activated. In some embodiments, the BUSY signal may be activated only when the RHR signal is activated outside a regularly scheduled refresh period and/or when the TRIG signal is activated. The active BUSY signal may notify other components of the semiconductor device including the refresh control circuit 216 or a component in communication with the device (e.g., a memory controller) that the memory array 218 is unavailable for access operations. In some embodiments, the BUSY signal may be provided to an externally available pin of a semiconductor device including the refresh control circuit 216 (e.g., an alert pin). When the targeted refresh operation is completed, the RHR state control circuit 242 may deactivate the BUSY signal.
Responsive to an activation of RHR, the aggressor address register 244 may provide an aggressor address HitXADD, and the refresh address generator 250 may provide a refresh address RXADD, which may be one or more victim addresses associated with HitXADD (e.g., row addresses of victim rows of the identified aggressor row). Responsive to IREF, the refresh address generator 250 may provide an auto-refresh address as the refresh address RXADD. The row decoder 208 may perform a refresh operation responsive to the refresh address RXADD and the targeted refresh signal RHR. The row decoder 208 may perform an auto-refresh operation based on the refresh address RXADD and the internal refresh signal IREF.
The aggressor address register 244 may store one or more row addresses which have been identified as aggressor addresses by the threshold comparator circuit 230. Responsive to the active TRIG from the threshold comparator circuit 230, the aggressor address register 244 may store the current row address XADD which is being accessed. The aggressor address register 244 may provide the stored address as a match address HitXADD to the refresh address generator 250, which may calculate one or more victim addresses associated with the match address HitXADD. In some embodiments, the aggressor address register 244 may be a latch circuit which stores a single address. In some embodiments, the aggressor address register 244 may be a buffer which stores multiple addresses, and provides the first stored address as the match address HitXADD. The aggressor address register 244 may switch to a next address in the register after the victim row(s) associated with the first address have been refreshed.
The refresh address generator 250 may receive the targeted refresh signal RHR and the match address HitXADD. The match address HitXADD may represent an aggressor row. The refresh address generator 250 may determine the locations of one or more victim rows based on the match address HitXADD and provide them as the refresh address RXADD. In some embodiments, the victim rows may include rows which are physically, adjacent to the aggressor row or rows (e.g., HitXADD+1 and HitXADD−1). Other physical relationships between victim rows and the identified aggressor rows may also or alternatively be used in other examples.
The refresh address generator 250 may determine the value of the refresh address RXADD based on the targeted refresh signal RHR and the internal auto-refresh signal IREF. In some embodiments, when the signal IREF is active, the refresh address generator 250 may provide one of a sequence of auto refresh addresses. When the signal RHR is active, the refresh address generator 250 may provide a targeted refresh address, such as a victim address, as the refresh address RXADD. In some embodiments, multiple targeted refresh addresses may be provided for a refresh operation.
The row decoder 208 may perform one or more operations on the memory array 218 based on the received signals and addresses. For example, responsive to the activation signal ACT and the row address XADD (and IREF and RHR being inactive), the row decoder 208 may direct one or more access operations (for example, a read operation) on the specified row address XADD. Responsive to the RHR signal being active, the row decoder 208 may refresh the refresh address RXADD. In some embodiments, the counter circuit 228 may increment the access count stored in the count value memory cells 226 responsive to a refresh operation of a given row. In some embodiments, the counter circuit 228 may not increment the access count responsive to a refresh operation.
If an attack caused several of the access count values XCount in the counter memory cells 226 to increase up to a similar value, it is unlikely that several of the word lines would trigger the threshold comparator 230 in a short period of time because the threshold value is dynamic rather than static. It is likely some of the word lines will trigger the threshold comparator 230 sooner and other word lines will trigger the threshold comparator 230 later based on the access count values as the threshold value varies each time. In some applications, this may prevent the aggressor address register 344 from “overflowing” and/or requiring the RHR state control circuit 342 to assert the BUSY signal for an unacceptably long period of time.
The random number generator circuit 352 may provide a random number responsive to activation of an activation signal ACT. In some embodiments, the random number generator circuit 352 may provide the random number as a threshold value TV. The threshold value may be received by a threshold comparator circuit, such as threshold comparator circuit 230 shown in
Any suitable random number generator now known or developed in the future may be used to implement the random number generator circuit 352. Examples include, but are not limited to, linear feedback shift registers, random cycle bit generators, and squares random number generators.
In some embodiments, the random number provided by the random number generator circuit 352 may be provided as an output random number RAN to a combining circuit 356. The combining circuit 356 may further receive a fixed value FIX from the fixed value storage circuit 354. In some embodiments, the combining circuit 356 may combine the random number RAN and the fixed value FIX to provide the threshold value TV. The threshold value TV may be provided to the threshold comparator circuit from the combining circuit 356 rather than from the random number generator circuit 352. In some embodiments, the combining circuit 356 may sum RAN and FIX to provide TV. In some embodiments, the combining circuit 356 may take an average of RAN and FIX to provide TV. In some embodiments, the combining circuit 356 may multiply RAN and FIX to provide TV. The circuitry for performing such arithmetic operations are well known in the art and will not be provided herein.
The fixed value storage circuit 354 may be any suitable storage circuit for storing a fixed value of a desired magnitude. Suitable circuits include, but are not limited to, latches and registers. The fixed value FIX may be set (e.g., hardwiring, fuse blowing, anti-fuses) or programmable (e.g., programmable latch or register, such as mode register 128) in the fixed value storage circuit 354. The numbers and ranges selected for the random number RAN and fixed value FIX may be based on one or more factors such as word line density, system criticality, and/or materials used in a memory device.
At block 402, “generating a threshold value based, at least in part, on a random number” may be performed. In some embodiments, the threshold value may be generated by threshold generator circuit 232 and/or 332. In some embodiments, generating the threshold value may include generating a random number and combining the random number with a fixed value. The random number may be generated by a random number generator circuit, such as random number generator circuit 352. In some embodiments, the fixed value may be stored in a storage circuit, such as fixed value storage circuit 354. However, in some embodiments, only the random number is generated and the fixed value is omitted. In some embodiments, the random number may be generated responsive to, at least in part, receipt of an activation command ACT. Optionally, in some embodiments, method 400 may further include programming at least one of a range, a standard deviation, or a mean of the random number, for example, by writing to a mode register.
At block 404, “comparing an access count value for a word line of a memory array to the threshold value” may be performed. The access count value may correspond to a number of times the word line has been accessed. The access count value may be received from a counter circuit, such as counter circuit 228, which may have received the information from counter memory cells, such as counter memory cells 126 and/or 226, located along word lines of a memory array, such as memory array 118. The comparing may be performed by a threshold comparator circuit, such as threshold comparator circuit 230.
Based on the comparing, at block 406, “activating a trigger signal” may be performed. In some embodiments, the threshold comparator circuit may activate the trigger signal, such as TRIG. In some embodiments, the trigger signal may be received by the counter circuit, an aggressor row address register circuit, such as aggressor address register circuit 244, and/or an RHR state control circuit, such as RHR state control circuit 342.
At block 408, “latching a row address of the word line when the trigger signal is activated” may be performed. In some embodiments, this may be performed by the aggressor row address register circuit. In some embodiments, method 400 may further include calculating at least one victim row address based, at least in part, on the row address latched by the aggressor row address register circuit. In some embodiments, this may be performed by a refresh address generator, such as refresh address generator 350. In some embodiments, method 400 may further include performing targeted refresh operations on at least one word line corresponding to the at least one victim row address. The refresh operations may be performed, at least in part, by a row decoder, such as row decoder 108 and/or 308.
Optionally, as shown in block 410, method 400 may include, “asserting a signal on an external pin of a memory device when the trigger signal is activated.” In some embodiments, the signal may be asserted by the RHR state control circuit. In some embodiments, the external pin may be a ready-wait pin and/or an alert pin. The signal on the pin may be provided to a device external to the memory, such as memory controller 101.
While the use of a random threshold value has been described herein with reference to memory devices where accesses of all word lines are tracked for purposes of determining aggressor word lines, random threshold values as disclosed herein may be used with memory devices that use sampling techniques for determining aggressor rows such as those described in U.S. Pat. No. 11,043,254 and U.S. patent application Ser. No. 16/428,625, which are incorporated herein by reference for any purpose.
The aggressor row detector circuit 500 may include a stack 501. The stack 501 may be a content addressable memory (CAM) stack in some embodiments. The stack 501 may include multiple registers (e.g., files) 502, each of which may have corresponding fields 504, 506. In the embodiment shown in
Each time a row address XADD is provided to the registers 502, the row address XADD may be compared to the fields 504. If the current row address XADD is already stored in one of the registers 502, then the count value in field 506 associated with the matching row address in field 504 may be adjusted (e.g., increased). If the current row address XADD is not already stored in one of the registers 502, it may be added to the registers 502. If there is an open register (e.g., a register without a row address) then the row address XADD may be stored in the open register. If there is not an open register, then the register 502 associated with the count value which has the lowest value (as indicated by the pointers 512) may have its row address replaced with the current row address XADD and count value reset.
The comparator 508 may compare the count values in fields 506 to a threshold value to determine if a count value for a row address has matched or exceeded the threshold value. In some embodiments, the comparator 508 may replace threshold comparator circuit 230. According to embodiments of the present disclosure, the threshold value may be provided by a threshold generator circuit 532. In some embodiments, the threshold generator circuit 532 may be implemented by threshold generator circuit 232 and/or 332. In some embodiments, the comparator 508 may further compare the count values to determine which row address is associated with the lowest count value. The fields 506 corresponding to the minimum count value and count values that meet or exceed the threshold value may be provided to a counter scrambler 510, which may match the above threshold value fields and minimum count value field to their respective associated row address fields 504. The pointers 512 may point to the row addresses in fields 504 associated with count values at or above the threshold value and may point to the fields 504 associated with the minimum count value in fields 506. The threshold value pointer(s) may be used to reset the counts of the row addresses determined to be aggressors. In some embodiments, the threshold value pointer(s) may be used to provide the corresponding row addresses) to the victim address generators as HitXADD. The minimum count value pointer may be used to overwrite a register 502 when a new row address XADD is received and there is no open register 502 to store it in.
If the threshold value used by the comparator 508 was static, an attack could possibly drive the count values for all of the fields 506 up to near the threshold value, then quickly access all of the addresses stored in the fields 504 simultaneously or near simultaneously. This could cause the comparator 508 to trigger all of the addresses in the fields 504 to be provided as HitXADD simultaneously or in a short period of time. This could cause malfunctions downstream (e.g., overload the refresh address generator 250). However, by randomly generating the threshold value each time with the threshold generator circuit 532, the risk may be reduced for similar reasons as those described with reference to
The systems, methods, and apparatuses may provide dynamic thresholds for detecting aggressor rows. Comparing a number of accesses of a row to a dynamic threshold may reduce the occurrence of several word lines being detected as aggressors in a short period of time. Thus, the length of time the memory device is unavailable due to performing targeted refresh operations may remain within an acceptable time period and/or memory errors due to a high number of aggressor rows may be reduced.
It is to be appreciated that any one of the examples, embodiments or processes described herein may be combined with one or more other examples, embodiments and/or processes or be separated and/or performed amongst separate devices or device portions in accordance with the present systems, devices and methods.
Finally, the above-discussion is intended to be merely illustrative of the present system and should not be construed as limiting the appended claims to any particular embodiment or group of embodiments. Thus, while the present system has been described in particular detail with reference to exemplary embodiments, it should also be appreciated that numerous modifications and alternative embodiments may be devised by those having ordinary skill in the art without departing from the broader and intended spirit and scope of the present system as set forth in the claims that follow. Accordingly, the specification and drawings are to be regarded in an illustrative manner and are not intended to limit the scope of the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
1158364 | Bibb | Oct 1915 | A |
3633175 | Harper | Jan 1972 | A |
5291198 | Dingwall et al. | Mar 1994 | A |
5299159 | Balistreri et al. | Mar 1994 | A |
5422850 | Sukegawa et al. | Jun 1995 | A |
5638317 | Tran | Jun 1997 | A |
5699297 | Yamazaki | Dec 1997 | A |
5768196 | Bloker | Jun 1998 | A |
5933377 | Hidaka | Aug 1999 | A |
5943283 | Wong et al. | Aug 1999 | A |
5970507 | Kato et al. | Oct 1999 | A |
5999471 | Choi | Dec 1999 | A |
6002629 | Kim et al. | Dec 1999 | A |
6011734 | Pappert | Jan 2000 | A |
6061290 | Shirley | May 2000 | A |
6212118 | Fujita | Apr 2001 | B1 |
6310806 | Higashi et al. | Oct 2001 | B1 |
6317381 | Gans et al. | Nov 2001 | B1 |
6373738 | Towler et al. | Apr 2002 | B1 |
6392952 | Chen et al. | May 2002 | B1 |
6424582 | Ooishi | Jul 2002 | B1 |
6434064 | Nagai | Aug 2002 | B2 |
6452868 | Fister | Sep 2002 | B1 |
6480931 | Buti et al. | Nov 2002 | B1 |
6515928 | Sato et al. | Feb 2003 | B2 |
6567340 | Natarai et al. | May 2003 | B1 |
6950364 | Kim | Sep 2005 | B2 |
7027343 | Sinha et al. | Apr 2006 | B2 |
7057960 | Fiscus et al. | Jun 2006 | B1 |
7082070 | Hong | Jul 2006 | B2 |
7187607 | Koshikawa et al. | Mar 2007 | B2 |
7203113 | Takahashi et al. | Apr 2007 | B2 |
7203115 | Eto et al. | Apr 2007 | B2 |
7209402 | Shinozaki et al. | Apr 2007 | B2 |
7215588 | Lee | May 2007 | B2 |
7283380 | Srinivasan et al. | Oct 2007 | B1 |
7304875 | Lien et al. | Dec 2007 | B1 |
7319602 | Srinivasan et al. | Jan 2008 | B1 |
7444577 | Best et al. | Oct 2008 | B2 |
7551502 | Dono et al. | Jun 2009 | B2 |
7565479 | Best | Jul 2009 | B2 |
7830742 | Han | Nov 2010 | B2 |
7870362 | Hong et al. | Jan 2011 | B2 |
7872907 | Okayama et al. | Jan 2011 | B2 |
8174921 | Kim et al. | May 2012 | B2 |
8400805 | Yoko | Mar 2013 | B2 |
8451677 | Okahiro et al. | May 2013 | B2 |
8625360 | Iwamoto et al. | Jan 2014 | B2 |
8676725 | Lin et al. | Mar 2014 | B1 |
8681578 | Narui | Mar 2014 | B2 |
8756368 | Best et al. | Jun 2014 | B2 |
8811100 | Ku | Aug 2014 | B2 |
8862973 | Zimmerman et al. | Oct 2014 | B2 |
8938573 | Greenfield et al. | Jan 2015 | B2 |
9032141 | Bains et al. | May 2015 | B2 |
9047978 | Bell et al. | Jun 2015 | B2 |
9058900 | Kang | Jun 2015 | B2 |
9087554 | Park | Jul 2015 | B1 |
9087602 | Youn et al. | Jul 2015 | B2 |
9117544 | Bains et al. | Aug 2015 | B2 |
9123447 | Lee | Sep 2015 | B2 |
9153294 | Kang | Oct 2015 | B2 |
9190137 | Kim et al. | Nov 2015 | B2 |
9190139 | Jung et al. | Nov 2015 | B2 |
9251885 | Greenfield et al. | Feb 2016 | B2 |
9286964 | Halbert et al. | Mar 2016 | B2 |
9299457 | Chun et al. | Mar 2016 | B2 |
9311985 | Lee et al. | Apr 2016 | B2 |
9324398 | Jones et al. | Apr 2016 | B2 |
9384821 | Bains et al. | Jul 2016 | B2 |
9390782 | Best et al. | Jul 2016 | B2 |
9412432 | Narui et al. | Aug 2016 | B2 |
9424907 | Fujishiro | Aug 2016 | B2 |
9484079 | Lee | Nov 2016 | B2 |
9514850 | Kim | Dec 2016 | B2 |
9570143 | Lim et al. | Feb 2017 | B2 |
9646672 | Kim et al. | May 2017 | B1 |
9672889 | Lee et al. | Jun 2017 | B2 |
9685240 | Park | Jun 2017 | B1 |
9691466 | Kim | Jun 2017 | B1 |
9697913 | Mariani et al. | Jul 2017 | B1 |
9734887 | Tavva | Aug 2017 | B1 |
9741409 | Jones et al. | Aug 2017 | B2 |
9741447 | Akamatsu | Aug 2017 | B2 |
9747971 | Bains et al. | Aug 2017 | B2 |
9761297 | Tomishima | Sep 2017 | B1 |
9786351 | Lee et al. | Oct 2017 | B2 |
9799391 | Wei | Oct 2017 | B1 |
9805782 | Liou | Oct 2017 | B1 |
9805783 | Ito et al. | Oct 2017 | B2 |
9818469 | Kim et al. | Nov 2017 | B1 |
9847118 | Won | Dec 2017 | B1 |
9865326 | Bains et al. | Jan 2018 | B2 |
9865328 | Desimone et al. | Jan 2018 | B1 |
9922694 | Akamatsu | Mar 2018 | B2 |
9934143 | Bains et al. | Apr 2018 | B2 |
9953696 | Kim | Apr 2018 | B2 |
10032501 | Ito | Jul 2018 | B2 |
10083737 | Bains et al. | Sep 2018 | B2 |
10090038 | Shin | Oct 2018 | B2 |
10134461 | Bell et al. | Nov 2018 | B2 |
10147472 | Jones et al. | Dec 2018 | B2 |
10153031 | Akamatsu | Dec 2018 | B2 |
10170174 | Ito et al. | Jan 2019 | B1 |
10176860 | Mylavarapu | Jan 2019 | B1 |
10210925 | Bains et al. | Feb 2019 | B2 |
10297305 | Moon et al. | May 2019 | B1 |
10339994 | Ito et al. | Jul 2019 | B2 |
10381327 | Ramachandra et al. | Aug 2019 | B2 |
10387276 | Ryu | Aug 2019 | B2 |
10446216 | Oh et al. | Oct 2019 | B2 |
10490251 | Wolff | Nov 2019 | B2 |
10600462 | Augustine et al. | Mar 2020 | B2 |
10600491 | Chou et al. | Mar 2020 | B2 |
10607686 | Akamatsu | Mar 2020 | B2 |
10629286 | Lee et al. | Apr 2020 | B2 |
10679710 | Hirashima et al. | Jun 2020 | B2 |
10705900 | Jin | Jul 2020 | B2 |
10770127 | Shore et al. | Sep 2020 | B2 |
10811066 | Jones et al. | Oct 2020 | B2 |
10832792 | Penney et al. | Nov 2020 | B1 |
10861519 | Jones et al. | Dec 2020 | B2 |
10867660 | Akamatsu | Dec 2020 | B2 |
10930335 | Bell et al. | Feb 2021 | B2 |
10943636 | Wu et al. | Mar 2021 | B1 |
10950289 | Ito et al. | Mar 2021 | B2 |
10964378 | Ayyapureddi et al. | Mar 2021 | B2 |
11011215 | Parry et al. | May 2021 | B1 |
11043254 | Enomoto et al. | Jun 2021 | B2 |
11139015 | Brown et al. | Oct 2021 | B2 |
11152050 | Morohashi et al. | Oct 2021 | B2 |
11158364 | Penney et al. | Oct 2021 | B2 |
11158373 | Penney et al. | Oct 2021 | B2 |
11200942 | Jenkinson et al. | Dec 2021 | B2 |
11222682 | Enomoto et al. | Jan 2022 | B1 |
11257535 | Shore et al. | Feb 2022 | B2 |
11264096 | Schreck et al. | Mar 2022 | B2 |
11322192 | Morohashi et al. | May 2022 | B2 |
11361808 | Bell et al. | Jun 2022 | B2 |
11386946 | Ayyapureddi et al. | Jul 2022 | B2 |
11398265 | Wu et al. | Jul 2022 | B2 |
11424005 | Penney et al. | Aug 2022 | B2 |
11462291 | Pan | Oct 2022 | B2 |
11482275 | Ayyapureddi et al. | Oct 2022 | B2 |
11521669 | Enomoto et al. | Dec 2022 | B2 |
11568918 | Ayyapureddi et al. | Jan 2023 | B2 |
20010008498 | Ooishi | Jul 2001 | A1 |
20020007476 | Kishino | Jan 2002 | A1 |
20020078311 | Matsuzaki et al. | Jun 2002 | A1 |
20020080677 | Watanabe et al. | Jun 2002 | A1 |
20020181301 | Takahashi et al. | Dec 2002 | A1 |
20030063512 | Takahashi et al. | Apr 2003 | A1 |
20030067825 | Shimano et al. | Apr 2003 | A1 |
20030090400 | Barker | May 2003 | A1 |
20030123301 | Jang et al. | Jul 2003 | A1 |
20030193829 | Morgan et al. | Oct 2003 | A1 |
20030231540 | Lazar et al. | Dec 2003 | A1 |
20040004856 | Sakimura et al. | Jan 2004 | A1 |
20040008544 | Shinozaki | Jan 2004 | A1 |
20040022093 | Lee | Feb 2004 | A1 |
20040052142 | Ikehashi et al. | Mar 2004 | A1 |
20040114446 | Takahashi et al. | Jun 2004 | A1 |
20040130959 | Kawaguchi | Jul 2004 | A1 |
20040174757 | Garverick et al. | Sep 2004 | A1 |
20040184323 | Mori et al. | Sep 2004 | A1 |
20040213035 | Cavaleri et al. | Oct 2004 | A1 |
20040218431 | Chung et al. | Nov 2004 | A1 |
20050041502 | Perner | Feb 2005 | A1 |
20050105315 | Shin et al. | May 2005 | A1 |
20050243629 | Lee | Nov 2005 | A1 |
20050265104 | Remaklus et al. | Dec 2005 | A1 |
20060083099 | Bae et al. | Apr 2006 | A1 |
20060087903 | Riho et al. | Apr 2006 | A1 |
20060176744 | Stave | Aug 2006 | A1 |
20060262616 | Chen | Nov 2006 | A1 |
20070008799 | Dono et al. | Jan 2007 | A1 |
20070014174 | Ohsawa | Jan 2007 | A1 |
20070028068 | Golding et al. | Feb 2007 | A1 |
20070030746 | Best et al. | Feb 2007 | A1 |
20070033339 | Best et al. | Feb 2007 | A1 |
20070133330 | Ohsawa | Jun 2007 | A1 |
20070230264 | Eto | Oct 2007 | A1 |
20070237016 | Miyamoto et al. | Oct 2007 | A1 |
20070297252 | Singh | Dec 2007 | A1 |
20080028260 | Oyagi et al. | Jan 2008 | A1 |
20080031068 | Yoo et al. | Feb 2008 | A1 |
20080062742 | Wang | Mar 2008 | A1 |
20080126893 | Harrand et al. | May 2008 | A1 |
20080130394 | Dono et al. | Jun 2008 | A1 |
20080181048 | Han | Jul 2008 | A1 |
20080224742 | Pomichter | Sep 2008 | A1 |
20080253212 | Iida et al. | Oct 2008 | A1 |
20080266990 | Loeffler | Oct 2008 | A1 |
20080288720 | Atwal et al. | Nov 2008 | A1 |
20080301362 | Cavanna et al. | Dec 2008 | A1 |
20080313494 | Hummler et al. | Dec 2008 | A1 |
20080316845 | Wang et al. | Dec 2008 | A1 |
20090021999 | Tanimura | Jan 2009 | A1 |
20090059641 | Jeddeloh | Mar 2009 | A1 |
20090077571 | Gara et al. | Mar 2009 | A1 |
20090161457 | Wakimoto | Jun 2009 | A1 |
20090168571 | Pyo et al. | Jul 2009 | A1 |
20090185440 | Lee | Jul 2009 | A1 |
20090201752 | Riho et al. | Aug 2009 | A1 |
20090213675 | Shino | Aug 2009 | A1 |
20090251971 | Futatsuyama | Oct 2009 | A1 |
20090296510 | Lee et al. | Dec 2009 | A1 |
20100005217 | Jeddeloh | Jan 2010 | A1 |
20100005376 | Laberge et al. | Jan 2010 | A1 |
20100054011 | Kim | Mar 2010 | A1 |
20100074042 | Fukuda et al. | Mar 2010 | A1 |
20100080074 | Ohmaru et al. | Apr 2010 | A1 |
20100110809 | Kobayashi et al. | May 2010 | A1 |
20100110810 | Kobayashi | May 2010 | A1 |
20100131812 | Mohammad | May 2010 | A1 |
20100157693 | Iwai et al. | Jun 2010 | A1 |
20100182863 | Fukiage | Jul 2010 | A1 |
20100329069 | Ito et al. | Dec 2010 | A1 |
20110026290 | Noda et al. | Feb 2011 | A1 |
20110051530 | Kushida | Mar 2011 | A1 |
20110055495 | Remaklus, Jr. et al. | Mar 2011 | A1 |
20110069572 | Lee et al. | Mar 2011 | A1 |
20110122987 | Neyer | May 2011 | A1 |
20110216614 | Hosoe | Sep 2011 | A1 |
20110225355 | Kajigaya | Sep 2011 | A1 |
20110286271 | Chen | Nov 2011 | A1 |
20110310648 | Iwamoto et al. | Dec 2011 | A1 |
20110317462 | Gyllenhammer et al. | Dec 2011 | A1 |
20120014199 | Narui | Jan 2012 | A1 |
20120059984 | Kang et al. | Mar 2012 | A1 |
20120151131 | Kilmer et al. | Jun 2012 | A1 |
20120213021 | Riho et al. | Aug 2012 | A1 |
20120254472 | Ware et al. | Oct 2012 | A1 |
20130003467 | Klein | Jan 2013 | A1 |
20130003477 | Park et al. | Jan 2013 | A1 |
20130057173 | Yao et al. | Mar 2013 | A1 |
20130107623 | Kavalipurapu et al. | May 2013 | A1 |
20130173971 | Zimmerman | Jul 2013 | A1 |
20130254475 | Perego et al. | Sep 2013 | A1 |
20130279284 | Jeong | Oct 2013 | A1 |
20130304982 | Jung et al. | Nov 2013 | A1 |
20140006703 | Bains et al. | Jan 2014 | A1 |
20140006704 | Greenfield et al. | Jan 2014 | A1 |
20140013169 | Kobla et al. | Jan 2014 | A1 |
20140013185 | Kobla et al. | Jan 2014 | A1 |
20140050004 | Mochida | Feb 2014 | A1 |
20140078841 | Chopra | Mar 2014 | A1 |
20140078842 | Oh et al. | Mar 2014 | A1 |
20140078845 | Song | Mar 2014 | A1 |
20140089576 | Bains et al. | Mar 2014 | A1 |
20140095780 | Bains et al. | Apr 2014 | A1 |
20140095786 | Moon et al. | Apr 2014 | A1 |
20140119091 | You | May 2014 | A1 |
20140136763 | Li et al. | May 2014 | A1 |
20140143473 | Kim et al. | May 2014 | A1 |
20140177370 | Halbert | Jun 2014 | A1 |
20140177376 | Song | Jun 2014 | A1 |
20140189215 | Kang et al. | Jul 2014 | A1 |
20140189228 | Greenfield et al. | Jul 2014 | A1 |
20140219043 | Jones et al. | Aug 2014 | A1 |
20140237307 | Kobla et al. | Aug 2014 | A1 |
20140241099 | Seo et al. | Aug 2014 | A1 |
20140254298 | Dally | Sep 2014 | A1 |
20140269021 | Yang et al. | Sep 2014 | A1 |
20140281206 | Crawford et al. | Sep 2014 | A1 |
20140281207 | Mandava et al. | Sep 2014 | A1 |
20140292375 | Angelini et al. | Oct 2014 | A1 |
20140293725 | Best et al. | Oct 2014 | A1 |
20140317344 | Kim | Oct 2014 | A1 |
20140355332 | Youn et al. | Dec 2014 | A1 |
20140369109 | Lee et al. | Dec 2014 | A1 |
20140379978 | Kim et al. | Dec 2014 | A1 |
20150049567 | Chi | Feb 2015 | A1 |
20150055420 | Bell et al. | Feb 2015 | A1 |
20150078112 | Huang | Mar 2015 | A1 |
20150089326 | Joo et al. | Mar 2015 | A1 |
20150155027 | Abe et al. | Jun 2015 | A1 |
20150162067 | Kim et al. | Jun 2015 | A1 |
20150170728 | Jung et al. | Jun 2015 | A1 |
20150199126 | Jayasena et al. | Jul 2015 | A1 |
20150206572 | Lim et al. | Jul 2015 | A1 |
20150213872 | Mazumder et al. | Jul 2015 | A1 |
20150213877 | Darel | Jul 2015 | A1 |
20150228341 | Watanabe et al. | Aug 2015 | A1 |
20150243339 | Bell et al. | Aug 2015 | A1 |
20150255140 | Song | Sep 2015 | A1 |
20150262652 | Igarashi | Sep 2015 | A1 |
20150279441 | Greenberg et al. | Oct 2015 | A1 |
20150279442 | Hwang | Oct 2015 | A1 |
20150294711 | Gaither et al. | Oct 2015 | A1 |
20150340077 | Akamatsu | Nov 2015 | A1 |
20150356048 | King | Dec 2015 | A1 |
20160019940 | Jang et al. | Jan 2016 | A1 |
20160027498 | Ware et al. | Jan 2016 | A1 |
20160027531 | Jones et al. | Jan 2016 | A1 |
20160027532 | Kim | Jan 2016 | A1 |
20160042782 | Narui et al. | Feb 2016 | A1 |
20160078845 | Lin | Mar 2016 | A1 |
20160078911 | Fujiwara et al. | Mar 2016 | A1 |
20160078918 | Hyun et al. | Mar 2016 | A1 |
20160086649 | Hong et al. | Mar 2016 | A1 |
20160086651 | Kim | Mar 2016 | A1 |
20160093402 | Kitagawa et al. | Mar 2016 | A1 |
20160099043 | Tu | Apr 2016 | A1 |
20160111140 | Joo et al. | Apr 2016 | A1 |
20160125931 | Doo et al. | May 2016 | A1 |
20160133314 | Hwang et al. | May 2016 | A1 |
20160140243 | Adams et al. | May 2016 | A1 |
20160163372 | Lee | Jun 2016 | A1 |
20160172056 | Huh | Jun 2016 | A1 |
20160180917 | Chishti et al. | Jun 2016 | A1 |
20160180921 | Jeong | Jun 2016 | A1 |
20160196863 | Shin et al. | Jul 2016 | A1 |
20160202926 | Benedict | Jul 2016 | A1 |
20160211008 | Benedict et al. | Jul 2016 | A1 |
20160224262 | Mandava et al. | Aug 2016 | A1 |
20160225433 | Bains et al. | Aug 2016 | A1 |
20160225461 | Tuers et al. | Aug 2016 | A1 |
20160336060 | Shin | Nov 2016 | A1 |
20160343423 | Shido | Nov 2016 | A1 |
20170011792 | Oh et al. | Jan 2017 | A1 |
20170076779 | Bains et al. | Mar 2017 | A1 |
20170092350 | Halbert et al. | Mar 2017 | A1 |
20170117030 | Fisch et al. | Apr 2017 | A1 |
20170133085 | Kim et al. | May 2017 | A1 |
20170139641 | Cha et al. | May 2017 | A1 |
20170140611 | Joo | May 2017 | A1 |
20170140807 | Sun et al. | May 2017 | A1 |
20170148504 | Saifuddin et al. | May 2017 | A1 |
20170177246 | Miller et al. | Jun 2017 | A1 |
20170186481 | Oh et al. | Jun 2017 | A1 |
20170213586 | Kang et al. | Jul 2017 | A1 |
20170221546 | Loh et al. | Aug 2017 | A1 |
20170263305 | Cho | Sep 2017 | A1 |
20170287547 | Ito et al. | Oct 2017 | A1 |
20170323675 | Jones | Nov 2017 | A1 |
20170352399 | Yokoyama et al. | Dec 2017 | A1 |
20170371742 | Shim et al. | Dec 2017 | A1 |
20170372767 | Kang et al. | Dec 2017 | A1 |
20180005690 | Morgan | Jan 2018 | A1 |
20180025770 | Ito et al. | Jan 2018 | A1 |
20180025772 | Lee et al. | Jan 2018 | A1 |
20180060194 | Ryu et al. | Mar 2018 | A1 |
20180061483 | Morgan | Mar 2018 | A1 |
20180082737 | Lee | Mar 2018 | A1 |
20180084314 | Koyama | Mar 2018 | A1 |
20180090199 | Kim | Mar 2018 | A1 |
20180096719 | Tomishima | Apr 2018 | A1 |
20180102776 | Chandrasekar et al. | Apr 2018 | A1 |
20180107417 | Shechter et al. | Apr 2018 | A1 |
20180114561 | Fisch et al. | Apr 2018 | A1 |
20180114565 | Lee | Apr 2018 | A1 |
20180158504 | Akamatsu | Jun 2018 | A1 |
20180182445 | Lee et al. | Jun 2018 | A1 |
20180203621 | Ahn et al. | Jul 2018 | A1 |
20180218767 | Wolff | Aug 2018 | A1 |
20180261268 | Hyun et al. | Sep 2018 | A1 |
20180294028 | Lee et al. | Oct 2018 | A1 |
20180308539 | Ito et al. | Oct 2018 | A1 |
20180341553 | Koudele et al. | Nov 2018 | A1 |
20180366182 | Hyun et al. | Dec 2018 | A1 |
20190013059 | Akamatsu | Jan 2019 | A1 |
20190043558 | Suh et al. | Feb 2019 | A1 |
20190051344 | Bell et al. | Feb 2019 | A1 |
20190066759 | Nale | Feb 2019 | A1 |
20190066762 | Koya | Feb 2019 | A1 |
20190088315 | Saenz et al. | Mar 2019 | A1 |
20190088316 | Inuzuka et al. | Mar 2019 | A1 |
20190096492 | Cai et al. | Mar 2019 | A1 |
20190103147 | Jones et al. | Apr 2019 | A1 |
20190130961 | Bell et al. | May 2019 | A1 |
20190139599 | Ito et al. | May 2019 | A1 |
20190147941 | Qin et al. | May 2019 | A1 |
20190147964 | Yun et al. | May 2019 | A1 |
20190161341 | Howe | May 2019 | A1 |
20190172518 | Chen et al. | Jun 2019 | A1 |
20190196730 | Imran | Jun 2019 | A1 |
20190198078 | Hoang et al. | Jun 2019 | A1 |
20190198090 | Lee | Jun 2019 | A1 |
20190198099 | Mirichigni et al. | Jun 2019 | A1 |
20190205253 | Roberts | Jul 2019 | A1 |
20190207736 | Ben-tovim et al. | Jul 2019 | A1 |
20190228810 | Jones et al. | Jul 2019 | A1 |
20190228813 | Nale et al. | Jul 2019 | A1 |
20190228815 | Morohashi et al. | Jul 2019 | A1 |
20190237132 | Morohashi | Aug 2019 | A1 |
20190243708 | Cha et al. | Aug 2019 | A1 |
20190252020 | Rios et al. | Aug 2019 | A1 |
20190267077 | Ito et al. | Aug 2019 | A1 |
20190279706 | Kim | Sep 2019 | A1 |
20190333573 | Shin et al. | Oct 2019 | A1 |
20190348100 | Smith et al. | Nov 2019 | A1 |
20190348102 | Smith et al. | Nov 2019 | A1 |
20190348103 | Jeong et al. | Nov 2019 | A1 |
20190348107 | Shin et al. | Nov 2019 | A1 |
20190349545 | Koh et al. | Nov 2019 | A1 |
20190362774 | Kuramori et al. | Nov 2019 | A1 |
20190371391 | Cha et al. | Dec 2019 | A1 |
20190385661 | Koo et al. | Dec 2019 | A1 |
20190385667 | Morohashi et al. | Dec 2019 | A1 |
20190386557 | Wang et al. | Dec 2019 | A1 |
20200005857 | Ito et al. | Jan 2020 | A1 |
20200075106 | Tokutomi et al. | Mar 2020 | A1 |
20200082873 | Wolff | Mar 2020 | A1 |
20200090760 | Purahmad et al. | Mar 2020 | A1 |
20200135263 | Brown et al. | Apr 2020 | A1 |
20200194050 | Akamatsu | Jun 2020 | A1 |
20200194056 | Sakurai et al. | Jun 2020 | A1 |
20200201380 | Murali et al. | Jun 2020 | A1 |
20200202921 | Morohashi et al. | Jun 2020 | A1 |
20200211626 | Hiscock et al. | Jul 2020 | A1 |
20200211633 | Okuma | Jul 2020 | A1 |
20200211636 | Hiscock et al. | Jul 2020 | A1 |
20200251158 | Shore et al. | Aug 2020 | A1 |
20200294576 | Brown et al. | Sep 2020 | A1 |
20200302994 | Enomoto et al. | Sep 2020 | A1 |
20200321049 | Meier et al. | Oct 2020 | A1 |
20200349995 | Shore | Nov 2020 | A1 |
20200365208 | Schreck et al. | Nov 2020 | A1 |
20200381040 | Penney et al. | Dec 2020 | A1 |
20200395072 | Penney et al. | Dec 2020 | A1 |
20210005229 | Hiscock et al. | Jan 2021 | A1 |
20210005240 | Brown et al. | Jan 2021 | A1 |
20210020223 | Ayyapureddi et al. | Jan 2021 | A1 |
20210020262 | Penney et al. | Jan 2021 | A1 |
20210026732 | Park et al. | Jan 2021 | A1 |
20210057012 | Ayyapureddi et al. | Feb 2021 | A1 |
20210057013 | Jenkinson et al. | Feb 2021 | A1 |
20210057021 | Wu et al. | Feb 2021 | A1 |
20210065755 | Kim et al. | Mar 2021 | A1 |
20210065764 | Cheng et al. | Mar 2021 | A1 |
20210142852 | Schreck et al. | May 2021 | A1 |
20210158851 | Ayyapureddi | May 2021 | A1 |
20210158860 | Wu et al. | May 2021 | A1 |
20210158861 | Jeong et al. | May 2021 | A1 |
20210201984 | Khasawneh et al. | Jul 2021 | A1 |
20210225432 | Enomoto et al. | Jul 2021 | A1 |
20210241810 | Hollis et al. | Aug 2021 | A1 |
20210265504 | Ishizu et al. | Aug 2021 | A1 |
20210343324 | Brown et al. | Nov 2021 | A1 |
20210350844 | Morohashi et al. | Nov 2021 | A1 |
20210398592 | Penney et al. | Dec 2021 | A1 |
20210407583 | Penney et al. | Dec 2021 | A1 |
20220069992 | Ayyapureddi | Mar 2022 | A1 |
20220165347 | Pan | May 2022 | A1 |
20220230672 | Ayyapureddi et al. | Jul 2022 | A1 |
20220293166 | Ayyapureddi et al. | Sep 2022 | A1 |
20220415427 | Pan | Dec 2022 | A1 |
20230010619 | Ayyapureddi et al. | Jan 2023 | A1 |
Number | Date | Country |
---|---|---|
1144434 | Mar 1997 | CN |
1195173 | Oct 1998 | CN |
101038785 | Sep 2007 | CN |
101067972 | Nov 2007 | CN |
101331554 | Dec 2008 | CN |
101458658 | Jun 2009 | CN |
101622607 | Jan 2010 | CN |
102113058 | Jun 2011 | CN |
102483952 | May 2012 | CN |
104350546 | Feb 2015 | CN |
106710621 | May 2017 | CN |
107871516 | Apr 2018 | CN |
H0773682 | Mar 1995 | JP |
2005-216429 | Aug 2005 | JP |
2011-258259 | Dec 2011 | JP |
4911510 | Jan 2012 | JP |
2013-004158 | Jan 2013 | JP |
20150002112 | Jan 2015 | KR |
20150002783 | Jan 2015 | KR |
20170058022 | May 2017 | KR |
1020180064940 | Jun 2018 | KR |
1020180085184 | Jul 2018 | KR |
20190048049 | May 2019 | KR |
2014120477 | Aug 2014 | WO |
2015030991 | Mar 2015 | WO |
2017171927 | Oct 2017 | WO |
2019222960 | Nov 2019 | WO |
2020010010 | Jan 2020 | WO |
2020191222 | Sep 2020 | WO |
2021003085 | Jan 2021 | WO |
2022108808 | May 2022 | WO |
Entry |
---|
US 11,264,075 B2, 03/2022, Bell et al. (withdrawn) |
U.S. Appl. No. 17/932,206, titled, “Apparatuses and Methods for Dynamically Allocated Aggressor Detection”, filed Sep. 14, 2022; pp. all pages of application as filed. |
U.S. Appl. No. 17/822,033, titled, “Apparatuses and Methods for Tracking Word Line Accesses”, filed Aug. 24, 2022, pp. all pages of application as filed. |
U.S. Appl. No. 17/456,849 titled “Apparatuses, Systems, and Methods for Main Sketch and Slim Sketch Circuitfor Row Address Tracking”, filed Nov. 29, 2021. |
U.S. Appl. No. 17/565,119 titled “Apparatuses and Methods for Row Hammer Counter Mat”, filed, Dec. 29, 2021. |
U.S. Appl. No. 17/565,187 titled “Apparatuses and Methods for Row Hammer Counter Mat”, filed Dec. 29, 2021. |
U.S. Appl. No. 17/446,710 titled “Apparatuses, Systems and Methods for Determining Extremum Numericalvalues”, filed Sep. 1, 2021. |
U.S. Appl. No. 17/470,883 titled “Apparatuses and Methods for Tracking Victim Rows”, filed Sep. 9, 2021. |
Application No. PCT/US20/23689, titled “Semiconductor Device Having Cam That Stores Address Signals”, dated Mar. 19, 2020, pp. all. |
U.S. Appl. No. 15/884,192 entitled ‘Semiconductor Device Performing Row Hammer Refresh Operation’, filed Jan. 30, 2018, pp. all. |
U.S. Appl. No. 16/797,658, titles “Apparatuses and Methods for Controlling Refresh Operations”, filed Feb. 21, 2020, pp. all. |
U.S. Appl. No. 16/818,981 titled “Apparatuses and Methods for Staggered Timing of Targeted Refresh Operations”, filed Mar. 13, 2020, pp. all. |
U.S. Appl. No. 16/824,460, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, dated Mar. 19, 2020, pp. all. |
U.S. Appl. No. 16/025,844, titled “Apparatus and Methods for Triggering Row Hammer Address Sampling”, filed Jul. 2, 2018, pp. all. |
U.S. Appl. No. 16/783,063, titled “Apparatus and Methods for Triggering Row Hammer Address Sampling”, dated Feb. 5, 2020, pp. all. |
U.S. Appl. No. 16/805,197, titled “Apparatuses and Methods for Calculating Row Hammer Refresh Addresses in a Semiconductor Device”, dated Feb. 28, 2020, pp. all. |
U.S. Appl. No. 16/232,837, titled “Apparatuses and Methods for Distributed Targeted Refresh Operations”, filed Dec. 26, 2018, pp. all. |
U.S. Appl. No. 16/818,989, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, dated Mar. 13, 2020, pp. all. |
U.S. Appl. No. 16/268,818, titled “Apparatuses and Methods for Managing Row Access Counts”, filed Feb. 6, 2019, pp. all. |
U.S. Appl. No. 16/286,187 titled “Apparatuses and Methods for Memory Mat Refresh Sequencing”, filed Feb. 26, 2019; pp. all. |
U.S. Appl. No. 16/084,119, titled “Apparatuses and Methods for Pure-Time, Self Adopt Sampling for Row Hammer Refresh Sampling”, filed Sep. 11, 2018, pp. all. |
U.S. Appl. No. 16/886,284 titled “Apparatuses and Methods for Access Based Refresh Timing”, filed May 28, 2020, pp. all. |
U.S. Appl. No. 16/886,284, titled “Apparatuses and Methods for Access Based Refresh Timing”, dated May 28, 2020, pp. all. |
U.S. Appl. No. 16/358,587, titled “Semiconductor Device Having Cam That Stores Address Signals”, dated Mar. 19, 2019, pp. all. |
U.S. Appl. No. 16/375,716 titled “Apparatuses and Methods for Staggered Timing of Targeted Refresh Operations”, filed Apr. 4, 2019; pp. all. |
U.S. Appl. No. 16/936,297 titled “Apparatuses and Methods for Managing Row Access Counts”, filed Jul. 22, 2020, pp. all. |
U.S. Appl. No. 16/411,573 titled “Apparatuses, Systems, and Methods for a Content Addressable Memory Cell”, filed May 14, 2019, pp. all. |
U.S. Appl. No. 16/428,625 titled “Apparatuses and Methods for Tracking Victim Rows”, filed May 31, 2019, pp. all. |
U.S. Appl. No. 16/513,400 titled “Apparatuses and Methods for tracking Row Accesses”, filed Jul. 16, 2019, pp. all. |
U.S. Appl. No. 17/060,403 titled “Apparatuses and Methods for Adjusting Victim Data”, filed Oct. 1, 2020, pp. all. |
U.S. Appl. No. 16/548,027 titled “Apparatuses, Systems, and Methods for Analog Row Access Rate Determination”, filed Aug. 22, 2019, pp. all. |
U.S. Appl. No. 16/549,942 titled “Apparatuses and Methods for Lossy Row Access Counting”, filed Aug. 23, 2019, pp. all. |
U.S. Appl. No. 16/546,152 titled “Apparatuses and Methods for Analog Row Access Tracking”, filed Aug. 20, 2019, pp. all. |
U.S. Appl. No. 16/549,411 titled “Apparatuses and Methods for Dynamic Refresh Allocation”, filed Aug. 23, 2019, pp. all. |
U.S. Appl. No. 16/655,110 titled “Apparatuses and Methods for Dynamic Targeted Refresh Steals”, filed Oct. 16, 2019, pp. all. |
U.S. Appl. No. 17/154,945 titled “Apparatuses, Systems, and Methods for a Content Addressable Memory Cell”, filed Jan. 21, 2021, pp. all. |
U.S. Appl. No. 17/170,616 titled “Apparatuses, Systems, and Methods for Analog Row Access Rate Determination”, filed Feb. 8, 2021, pp. all. |
U.S. Appl. No. 17/168,036 titled “Apparatuses and Methods for Analog Row Access Tracking”, filed Feb. 4, 2021, pp. all. |
U.S. Appl. No. 17/301,533 titled “Semiconductor Device Having Cam That Stores Address Signals”, filed Apr. 6, 2021, pp. all. |
International Application No. PCT/US19/40169 titled “Apparatus and Methods for Triggering Row Hammer Address Sampling”, filed Jul. 1, 2019, pp. all. |
International Application No. PCT/US19/64028, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, dated Dec. 2, 2019, pp. all. |
International Application No. PCT/US20/26689, titled “Apparatuses and Methods for Staggered Timing of Targeted Refresh Operations”, dated Apr. 3, 2020, pp. all. |
International Application No. PCT/US20/40077, titled “Apparatuses and Methods for Monitoring Word Line Accesses”, dated Jun. 29, 2020, pp. all. |
U.S. Appl. No. 16/788,657, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, dated Feb. 12, 2020, pp. all. |
U.S. Appl. No. 15/881,256 entitled ‘Apparatuses and Methods for Detecting a Row Hammer Attack With a Bandpass Filter’, filed Jan. 26, 2018, pp. all. |
U.S. Appl. No. 16/425,525 titled “Apparatuses And Methods for Tracking All Row Accesses”, filed May 29, 2019, pp. all. |
U.S. Appl. No. 16/427,105 titled “Apparatuses And Methods for Priority Targeted Refresh Operations”, filed May 30, 2019, pp. all. |
U.S. Appl. No. 16/427,140 titled “Apparatuses And Methods for Tracking Row Access Counts Between Multiple Register Stacks”, filed May 30, 2019, pp. all. |
U.S. Appl. No. 16/437,811 titled “Apparatuses, Systems, And Methods for Determining Extremum Numerical Values”, filed Jun. 11, 2019, pp. all. |
U.S. Appl. No. 16/537,981 titled “Apparatuses and Methods for Controlling Targeted Refresh Rates”, filed Aug. 12, 2019, pp. all. |
U.S. Appl. No. 17/153,555 titled “Apparatuses and Methods for Dynamically Allocated Aggressor Detection”, filed Jan. 20, 2021, pp. all. |
U.S. Appl. No. 17/201,941 titled “Apparatuses and Methods for Sketch Circuits for Refresh Binning”, filed Mar. 15, 2021, pp. all. |
U.S. Appl. No. 17/375,817 titled “Apparatuses and Methods for Monitoring Word Line Accesses”, filed Jul. 14, 2021, pp. all. |
U.S. Appl. No. 17/443,056 titled “Apparatuses and Methods for Multiple Row Hammer Refresh Address Sequences”, filed Jul. 20, 2021, pp. all. |
U.S. Appl. No. 17/444,925 titled “Apparatuses and Methods for Countering Memory Attacks”, filed Aug. 12, 2021, pp. all. |
U.S. Appl. No. 15/789,897, entitled “Apparatus and Methods for Refreshing Memory”, filed Oct. 20, 2017; pp. all. |
U.S. Appl. No. 15/796,340, entitled: “Apparatus and Methods for Refreshing Memory”, filed Oct. 27, 2017; pp. all. |
U.S. Appl. No. 16/012,679, titled “Apparatuses and Methods for Multiple Row Hammer Refresh Address Sequences”, filed Jun. 19, 2018; pp. all. |
U.S. Appl. No. 16/112,471, titled “Semiconductor Device”, filed Jun. 27, 2018; pp. all. |
U.S. Appl. No. 16/112,471 titled “Apparatuses and Methods for Controlling Refresh Operations”, filed Aug. 24, 2018; pp. all. |
U.S. Appl. No. 16/160,801, titled “Apparatuses and Methods for Selective Row Refreshes”, filed Oct. 15, 2018, pp. all. |
U.S. Appl. No. 16/176,932, titled “Apparatuses and Methods for Access Based Refresh Timing”, filed Oct. 31, 2018; pp. all. |
U.S. Appl. No. 16/208,217, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, filed Dec. 3, 2018, pp. all. |
U.S. Appl. No. 16/230,300, titled “Apparatuses and Methods for Staggered Timing of Targeted Refresh Operations”, filed Dec. 21, 2018; pp. all. |
U.S. Appl. No. 16/231,327 titled “Apparatuses and Methods for Selective Row Refreshes”, filed Dec. 21, 2018; pp. all. |
U.S. Appl. No. 16/237,291, titled “Apparatus and Methods for Refreshing Memory”, filed Dec. 31, 2018, pp. all. |
U.S. Appl. No. 16/290,730, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, filed Mar. 1, 2019; pp. all. |
U.S. Appl. No. 16/374,623, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, filed Apr. 3, 2019; pp. ail. |
U.S. Appl. No. 15/888,693 title “Semiconductor Device”, filed May 14, 2019; pp. all. |
U.S. Appl. No. 16/427,330 titled “Apparatuses and Methods for Storing Victim Row Data”, filed May 30, 2019; pp. all. |
U.S. Appl. No. 16/431,641 titled “Apparatuses and Methods for Controlling Steal Rates”, filed Jun. 4, 2019; pp. all. |
U.S. Appl. No. 16/682,606, titled “Apparatuses and Methods for Distributing Row Hammer Refresh Events Across a Memory Device”, filed Nov. 13, 2019; pp. all. |
U.S. Appl. No. 17/102,266, titled “Apparatuses and Methods for Tracking Word Line Accesses”, dated Nov. 23, 2020; pp. all. |
U.S. Appl. No. 15/876,566 entitled ‘Apparatuses and Methods for Calculating Row Hammer Refresh Addresses in a Semiconductor Device’, filed Jan. 22, 2018; pp. all. |
International Application No. PCT/US20/32684, titled “Apparatuses, Systems, and Methods for Content Addressable Memory Cell”, dated May 13, 2020; pp. all. |
U.S. Appl. No. 15/656,084, titled “Apparatuses and Methods for Targeted Refreshing of Memory”, filed Jul. 21, 2017; pp. all. |
U.S. Appl. No. 16/459,520 titled “Apparatuses and Methods for Monitoring Word Line Accesses”, filed Jul. 1, 2019, pp. all. |
PCT Application No. PCT/US18/55821 “Apparatus and Methods for Refreshing Memory”, filed Oct. 15, 2018, pp. all. |
U.S. Appl. No. 15/715,846, entitled “Semiconductor Device”, filed Sep. 26, 2017, pp. all. |
U.S. Appl. No. 15/888,993, entitled “Apparatuses and Methods for Controlling Refresh Operations”, filed Feb. 5, 2018, pp. all. |
U.S. Appl. No. 16/190,627 titled “Apparatuses and Methods for Targeted Refreshing of Memory”, filed Nov. 14, 2018, pp. all. |
U.S. Appl. No. 16/459,507 titled “Apparatuses and Methods for Adjusting Victim Data”, filed Jul. 1, 2019, pp. all. |
U.S. Appl. No. 15/281,818, entitled: “Semiconductor Device”, filed Sep. 30, 2016; pp. all. |
U.S. Appl. No. 17/007,069, titled “Apparatuses and Methods for Providing Refresh Addresses”, filed Aug. 21, 2020; pp. all. |
Kim, et al., “Flipping Bits in MemoryWithout Accessing Them: An Experimental Study of DRAM Disturbance Errors”, IEEE, Jun. 2014, 12 pgs. |
Stout, Thomas et al., “Voltage Source Based Voltage-to-Time Converter”, IEEE, downloaded Jul. 2020, pg. All. |
[English Abstract] Zheng, Bin , et al., “Design of Built-in DRAM for TFT-LCD Driver Chip” LCD and display, Issue 4, Aug. 15, 2009; pp. all. |
Number | Date | Country | |
---|---|---|---|
20230047007 A1 | Feb 2023 | US |