This disclosure relates generally to semiconductor devices, and more specifically to semiconductor memory devices. In particular, the disclosure relates to volatile memory, such as dynamic random access memory (DRAM). Information may be stored on individual memory cells of the memory as a physical signal (e.g., a charge on a capacitive element). The memory may be a volatile memory, and the physical signal may decay over time (which may degrade or destroy the information stored m the memory cells). It may be necessary to periodically refresh the information in the memory cells by, for example, rewriting the information to restore the physical signal to an initial value.
As memory components have decreased in size, the density of memory cells, has greatly increased. Repeated access to a particular memory cell or group of memory cells (often referred to as a ‘row hammer’) may cause an increased rate of data degradation in nearby memory cells. Memory cells affected by the row hammer effect may be identified and refreshed as part of a targeted refresh operation. These targeted refresh operations may take the place of (e.g., steal) time slots which would otherwise be used for a background refresh operation. It may be desirable to balance the number of background refresh operations and targeted refresh operations.
The following description of certain embodiments is merely exemplary in nature and is in no way intended to limit the scope of the disclosure or its applications or uses. In the following detailed description of embodiments of the present systems and methods, reference is made to the accompanying drawings which form a part hereof, and which are shown by way of illustration specific embodiments in which the described systems and methods may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice presently disclosed systems and methods, and it is to be understood that other embodiments may be utilized and that structural and logical changes may be made without departing from the spirit and scope of the disclosure. Moreover, for the purpose of clarity, detailed descriptions of certain features will not be discussed when they would be apparent to those with skill in the art so as not to obscure the description of embodiments of the disclosure. The following detailed description is therefore not to be taken in a limiting sense, and the scope of the disclosure is defined only by the appended claims.
Information in a volatile memory device may be stored in memory cells (e.g., as a charge on a capacitive element), and may decay over time. The memory cells may be organized into rows (wordlines) and columns (bit lines), and the memory cells may be refreshed on a row-by-row basis. In order to prevent information from being lost or corrupted due to this decay, the memory may carry out a background refresh process, such as refresh operations as part of a refresh mode. During a to operation, information may be rewritten to the wordline to restore its initial state. Auto-refresh operations may be performed on the wordlines of the memory in a sequence such that over time each of the wordlines of the memory are refreshed at a rate faster than the expected rate of data degradation.
Repeated access to a particular row of memory (e.g., an aggressor row) may cause an increased rate of decay in rows (e.g., victim rows) which are close to the aggressor row. These repeated accesses may be part of a deliberate attack against the memory and/or may be due to ‘natural’ access patterns of the memory. The increased rate of decay in the victim rows may require that they be refreshed as part of a targeted refresh operation. The memory device may periodically perform targeted refresh operations as part of the refresh mode. For example, when the memory device is in a refresh mode it may perform a set of refresh operations including a number of auto-refresh operations, and a number of targeted refresh operations and then repeat this cycle. In some embodiments, the targeted refresh operations may ‘steal’ timeslots which would otherwise be used for auto-refresh operations. A memory device may generally cycle between performing access operations for a period of time, entering a refresh mode for a period of time, performing access operations and so forth.
If a memory begins receiving access requests at a very high rate, it may indicate that an attack against the memory is occurring and it may be desirable to perform targeted refresh operations even when the device is not in a refresh mode. Based on rate of access commands (e.g., on a bank-by-bank basis), a targeted refresh request command (e.g., a refresh management signal) may be issued which may lead to additional targeted refresh operations being performed while the memory is not in the refresh mode (e.g., in addition to the periodic targeted refresh operations). However, as the number of targeted refresh operations between refresh modes increases, it may be less necessary to perform targeted refresh operations within the next refresh mode. It may be desirable to manage targeted refresh operations so that as the number of requested targeted refresh operations increases, less periodic targeted refresh operations are performed during, the next refresh mode.
The present disclosure is drawn to apparatuses, systems, and methods for dynamic targeted refresh steals. A memory controller may count a number of access commands which are being issued to particular bank of the memory. Once the count of access commands meets or exceeds a threshold, the controller may send a refresh management signal and decrease the count. Accordingly, the memory device may receive access commands along with refresh management commands. Responsive to the refresh management signal, the memory may perform a targeted refresh operation, even if the memory is not otherwise performing refresh operations (e.g., is not currently in a refresh mode). The memory device may count a number of times a refresh management signal is issued, and may decrease a number of periodic targeted refresh operations during a next refresh mode as the count of refresh management signals increases. For example, when the count of refresh management signals meets or exceeds a threshold, a next periodic targeted refresh operation may be skipped and the count may be decreased.
The semiconductor device 100 includes a memory array 118. The memory array 118 is shown as including a plurality of memory banks, in the embodiment of
The semiconductor device 100 may employ a plurality of external terminals that include command and address (C/A) terminals coupled to a command and address bus to receive commands and addresses, and a CS signal, clock terminals to receive clocks CK and /CK, data terminals DQ to provide data, and power supply terminals to receive power supply potentials VDD, VSS, VDDQ, and VSSQ.
The clock terminals are supplied with external docks CK and /CK that are provided to an input circuit 112. The external clocks may be complementary. The input circuit 112 generates an internal clock ICLK based on the CK and /CK clocks. The ICLK clock is provided to the command decoder 110 and to an internal clock generator 114. The internal clock generator 114 provides various internal clocks LCLK based on the ICLK clock. The LCLK clocks may be used for timing operation of various internal circuits. The internal data clocks LCLK are provided to the input/output, circuit 122 to time operation of circuits included in the input/output circuit 122, for example, to data receivers to time the receipt of write data.
The C/A terminals may be supplied with memory addresses. The memory addresses supplied to the C/A terminals are transferred, via a command address input circuit 102, to an address decoder 104. The address decoder 104 receives the address and supplies a decoded row address XADD to the row decoder 108 and supplies a decoded column address YADD to the column decoder 110. The address decoder 104 may also supply a decoded bank address BADD, which may indicate the bank of the memory array 118 containing the decoded row address XADD and column address YADD. The C/A terminals may be supplied with commands. Examples of commands include timing commands for controlling the timing of various operations, access commands for accessing the memory, such as read commands for performing read operations and write commands for performing write operations, as well as other commands and operations. The access commands may be associated with one or more row address XADD, column address YADD, and bank address BADD to indicate the memory cell(s) to be accessed.
The commands may be provided as internal command signals to a command decoder 106 via the command/address input circuit 102. The command decoder 106 includes circuits to decode the internal command signals to generate various internal signals and commands for performing operations. For example, the command decoder 106 may provide a row command signal to select a word line and a column command signal to select a bit line.
The device 100 may receive an access command which is a read command. When a read command is received, and a bank address, a row address and a column address are timely supplied with the read command, read data is read from memory cells in the memory array 118 corresponding to the row address and column address. The read command is received by the command decoder 106 which provides internal commands so that read data from the memory array 118 is provided to the read/write amplifiers 120. The read data is output to outside from the data terminals DQ via the input/output circuit 122.
The device 100 may receive an access command which is a write command. When the write command is received, and a bank address, a row address and a column address are timely supplied with the write command, write data supplied to the data terminals DQ is written to a memory cells in the memory array 118 corresponding to the row address and column address. The write command is received by the command decoder 106, which provides internal commands so that the write data is received by data receivers in the input/output circuit 122. Write clocks may also be provided to the external clock terminals for timing the receipt of the write data by the data receivers of the input/output circuit 122. The write data is supplied via the input/output circuit 122 to the read/write amplifiers 120, and by the read/write amplifiers 120 to the memory array 118 to be written into the memory cell MC.
The device 100 may also receive commands causing it to carry out one or more refresh operations as part of a self-refresh mode. The device 100 may be periodically placed in a refresh mode. Thus, refresh operations may be performed periodically each time the memory device is in the refresh mode. In some embodiments, the refresh mode command may be externally issued to the memory device 100. In some embodiments, the refresh mode command may be periodically generated by a component of the device. In some embodiments, when an external signal indicates a refresh mode entry command, the refresh signal AREF may also be activated. The refresh signal AREF may be a pulse signal which is activated when the command decoder 106 receives a signal which indicates entry to the self-refresh mode. The refresh signal AREF may be activated once immediately after command input, and thereafter may be cyclically activated at desired internal timing. The refresh signal AREF may be used to control the timing of refresh operations during the refresh mode. A self-refresh exit command may cause the automatic activation of the refresh signal AREF to stop and may cause the device 100 to return to an idle state and/or resume other operations.
The refresh signal AREF is supplied to the refresh control circuit 116. The refresh control circuit 116 supplies a refresh row address RXADD to the row decoder 108, which may refresh one or more wordlines WL indicated by the refresh row address RXADD. In some embodiments, the refresh address RXADD may represent, a single wordline. In some embodiments, the refresh address RXADD may represent multiple wordlines, which may be refreshed sequentially or simultaneously by the row decoder 108. In some embodiments, the number of wordlines represented by the refresh address RXADD may vary from one refresh address to another. The refresh control circuit 116 may control a timing of the refresh operation, and may generate and provide the refresh address RXADD. The refresh control circuit 116 may be controlled to change details of the refreshing address RXADD (e.g., how the refresh address is calculated, the timing of the refresh addresses, the number of wordlines represented by the address), or may operate based on internal logic.
The refresh control circuit 116 may selectively output a targeted refresh address (e.g., which specifies one or more victim address based on an aggressor) or an automatic refresh address (e.g., from a sequence of auto-refresh addresses) as the refresh address RXADD. Based on the type of refresh address RXADD, the row decoder 108 may perform a targeted refresh or auto-refresh operation. The automatic refresh addresses may be from a sequence of addresses which are provided based on activations of the refresh signal AREF. The refresh control circuit 116 may cycle through the sequence of auto-refresh addresses at a rate determined by AREF. In some embodiments, the auto-refresh operations may generally occur with a timing such that the sequence of auto-refresh addresses is cycled such that no information is expected to degrade in the time between auto-refresh operations for a given wordline. In other words, auto-refresh operations may be performed such that each wordline is refreshed at a rate faster than the expected rate of information decay.
As used herein, an activation of a signal may refer to any portion of a signal's waveform that a circuit responds to. For example, if a circuit responds to a rising edge, then a signal switching from a low level to a high level may be an activation. One example type of activation is a pulse, where a signal switches from a low level to a high level for a period of time, and then back to the low level. This may trigger circuits which respond to rising edges, falling edges, and/or signals being at a high logical level.
The refresh control circuit 116 may also determine targeted refresh addresses which are addresses that require refreshing (e.g., victim addresses corresponding to victim rows) based on the access pattern of nearby addresses (e.g., aggressor addresses corresponding to aggressor rows) in the memory array 118. The refresh control circuit 116 may use one or more signals of the device 100 to calculate the targeted refresh address RXADD. For example, the refresh address RXADD may be a calculated based on the row addresses XADD provided by the address decoder.
In some embodiments, the refresh control circuit 116 may sample the current value of the row address XADD provided by the address decoder 104 along a row address bus, and determine a targeted refresh address based on one or more of the sampled addresses. The sampled addresses may be stored in a data storage unit of the refresh control circuit. When a row address XADD is sampled, it may be compared to the stored addresses in the data storage unit. In some embodiments, the aggressor address may be determined based on the sampled and/or stored addresses. For example, the comparison between the sampled address and the stored addresses may be used to update a count value (e.g., an access count) associated with the stored addresses and the aggressor address may be calculated based on the count values. The refresh addresses RXADD may then be used based on the aggressor addresses.
While in general the present disclosure refers to determining aggressor and victim wordlines and addresses, it should be understood that as used herein, an aggressor wordline does not necessarily need to cause data degradation in neighboring wordlines, and a victim wordline does not necessarily need to be subject to such degradation. The refresh control circuit 116 may use some criteria to judge whether an address is an aggressor address, which may capture potential aggressor addresses rather than definitively determining which addresses are causing, data degradation in nearby victims. For example, the refresh control circuit 116 may determine potential aggressor addresses based on a pattern of accesses to the addresses and this criteria may include some addresses which are not aggressors, and miss some addresses which are. Similar victim addresses may be determined based on which wordlines are expected to be effected by aggressors, rather than a definitive determination of which wordlines are undergoing an increased rate of data decay.
The refresh address RXADD may be provided with a timing based on a timing of the refresh signal AREF. During the periodic refresh operations of a refresh mode, the refresh control circuit 116 may have time slots corresponding to the timing of AREF, and may provide one or more refresh addresses RXADD during each time slot. In some embodiments, the targeted refresh address may be issued in (e.g., “steal”) a time slot which would otherwise have been assigned to an auto refresh address. In some embodiments, certain time slots may be reserved for targeted refresh addresses, and the refresh control circuit 116 may determine whether to provide a targeted refresh address, not provide an address during that time slot, or provide an auto-refresh address instead during the time slot.
The refresh control circuit 116 may use multiple methods to determine the timing of targeted refresh operations. The refresh control circuit 116 may have periodic targeted refresh operations during a refresh mode, where the refresh control circuit 116 performs auto-refresh operations and targeted refresh operations (e.g., by providing a targeted refresh address as the refresh, address RXADD) based on a periodic schedule. For example, after entering a refresh mode, the refresh control circuit 116 may perform a certain number of auto-refresh operations, and then perform e.g., steal) a certain number of targeted refresh operations.
The refresh control circuit 116 may also perform requested targeted refresh operations or panic targeted refresh operations, which may be based on access patterns to the bank associated with the refresh control circuit 116. The device 100 may receive commands which are refresh management commands (e.g., may receive request management commands at the command/address terminal C/A). The command decoder circuit 106 may provide a refresh management signal RFM based on the refresh management command. In some embodiments, the refresh management command may be the signal RFM, which may be passed directly to the refresh control circuit 116. Responsive to an activation of the RFM signal, the refresh control circuit 116 may indicate that a panic targeted refresh operation should be performed.
These panic targeted refresh operations may happen outside of a refresh period. For example, a high rate of accesses to the bank may indicate that an attack is taking place, and the refresh control circuit 116 may count the access commands and perform a panic targeted refresh operation once the count exceeds a threshold. As the number of panic targeted refresh operations increases, the refresh control circuit 116 may decrease a number of periodic targeted refresh operations during the next refresh mode. It should be understood that the process of refreshing wordlines during a periodic and panic targeted refresh operation may generally be the same, and the difference may generally be in the timing of when the refreshes are performed.
The power supply terminals are supplied with power supply potentials VDD and VSS. The power supply potentials VDD and VSS are supplied to an internal voltage generator circuit 124. The internal voltage generator circuit 124 generates various internal potentials VPP, VOD, VARY, VPERI, and the like based on the power supply potentials VDD and VSS supplied to the power supply terminals. The internal potential VPP is mainly used in the row decoder 108, the internal potentials VOD and VARY are mainly used in the sense amplifiers SAMP included in the memory array 118, and the internal potential VPERI is used in many peripheral circuit blocks.
The power supply terminals are also supplied with power supply potentials VDDQ and VSSQ. The power supply potentials VDDQ and VSSQ are supplied to the input/output circuit 122. The power supply potentials VDDQ and VSSQ supplied to the power supply terminals may be the same potentials as the power supply potentials VDD and VSS supplied to the power supply terminals in an embodiment of the disclosure. The power supply potentials VDDQ and VSSQ supplied to the power supply terminals may be different potentials from the power supply potentials VDD and VSS supplied to the power supply terminals in another embodiment of the disclosure. The power supply potentials VDDQ and VSSQ supplied to the power supply terminals are used for the input/output circuit 122 so that power supply noise generated by the input/output circuit 122 does not propagate to the other circuit blocks.
A DRAM interface 226 may provide one or more signals to an address refresh control circuit 216 and roar decoder 208 the refresh control circuit 216 may include a sample timing circuit 230, an aggressor detector circuit 232, a row hammer refresh (RHR) state control circuit 236 and a refresh address generator 234. The DRAM interface 226 may provide one or more control signals, such as a refresh signal AREF, activation and pre-charge signals ACT/Pre, and a row address XADD. The refresh control circuit 216 provides refresh address RXADD with timing based on the refresh signal AREF when the bank associated with the refresh control circuit 216 is in the refresh mode. The refresh control circuit may also provide the refresh address RXADD (and other signals) to indicate a panic targeted refresh based on a pattern of accesses to the bank of the memory.
In the example embodiment of
The received row addresses (either the sampled addresses or all addresses) may be stored in the aggressor circuit 232 and/or compared to previously stored addresses. The aggressor detector circuit 232 may provide a match address HitXADD based on a current row address XADD and/or previously stored row addresses. The RHR state control circuit 236 may provide the signal RHR to indicate that a row hammer refresh (e.g., a refresh of the victim rows corresponding to an identified aggressor row) should occur. The RHR state control circuit 236 may also provide an internal refresh signal IREF, to indicate that an auto-refresh should occur.
Responsive to an activation of RHR or IREF, the refresh address generator 234 may provide a refresh address RXADD, which may be an auto-refresh address or may be one or more victim addresses corresponding to victim rows of the aggressor row corresponding to the match address HitXADD. The RHR state control circuit 236 may provide a set of activations of RHR and IREF responsive to the refresh signal AREF. The row decoder 208 may perform a refresh operation responsive to the refresh address RXADD and the row hammer refresh signal RHR. The row decoder 208 may perform an auto-refresh operation based on the refresh address RXADD and the internal refresh signal IREF.
The DRAM interface 226 may represent one or more components which provides signals to components of the bank. In some embodiments, the DRAM interface 226 may represent a memory controller coupled to the semiconductor memory device (e.g., device 100 of
In the example embodiment of
The aggressor detector circuit 232 may receive the row address XADD from the DRAM interface 226 and the signal ArmSample from the sample timing circuit 230. The row address XADD on the row address bus may change as the DRAM interface 226 directs access operations (e.g., read and write operations) to different rows of the memory cell array (e.g., memory cell array 118 of
The aggressor detector circuit 232 may determine aggressor addresses based on one or more of the sampled row addresses, and then may provide the determined aggressor address as the match address HitXADD. The aggressor detector circuit 232 may include a data storage unit (e.g., a number of registers), which may be used to store sampled row addresses. In some example embodiments, when the aggressor detector circuit 232 samples a new value of the row address XADD (e.g., responsive to an activation of ArmSample) it may compare the sampled row address to the addresses stored in the data storage unit. If there is a match between the sampled address and one of the stored addresses, the aggressor detector circuit 232 may provide a match signal Match. In some example embodiments, the match address HitXADD may be one of the addresses stored in the aggressor detector circuit 232 which has been matched by the sampled address XADD the most frequently. For example, the aggressor detector circuit 232 may count a number of times that each address XADD is received, and provide the address which has been received the most times as the match address HitXADD.
The memory device may carry out a sequence of refresh operations in order to periodically refresh the rows of the memory device as part of a refresh mode. The RHR state control circuit 236 may determine if a given refresh operation is an auto-refresh operation or a targeted refresh operation. The RHR signal may be generated in order to indicate that the device should refresh a particular targeted row (e.g., a victim row) instead of an address from the sequence of auto-refresh addresses. The RHR state control circuit 236 may also provide an internal refresh signal IREF, which may indicate that an auto-refresh operation should take place. In some embodiments, the signals RHR and IREF may be generated such that they are not active at the same time (e.g., are not both at a high logic level at the same time). In some embodiments IREF may be activated for every refresh operation, and an auto-refresh operation may be performed unless RHR is also active, in which case a targeted refresh operation is performed instead. The RHR state control circuit may perform a sequence of auto-refresh operations and targeted refresh operation responsive to one or more activations of the refresh signal AREF.
In some embodiments, the refresh control circuit 216 may perform multiple refresh operations responsive to each activation of the refresh signal AREF. For example, each time the refresh signal AREF is received, the refresh control circuit 216 may perform K different refresh operations, by providing K different refresh addresses RXADD. Each refresh operation may be referred to as a ‘pump’. Each of the K different refresh operations may be an auto-refresh operation or a targeted refresh operation. In some embodiments, the number of targeted and auto-refresh operations may be constant in each group of pumps responsive to an activation of the refresh signal REF. In some embodiments it may vary.
The refresh address generator 234 may receive the row hammer refresh signal RHR and the match address HitXADD. The match address HitXADD may represent an aggressor row. The refresh address generator 234 may determine the locations of one or more victim rows based on the match address HitXADD and provide them as the refresh address RXADD when the signal RHR indicates a targeted refresh operation. In some embodiments, the victim rows may include rows which are physically adjacent to the aggressor row HitXADD+1 and HitXADD−1). In some embodiments, the victim rows may also include rows which are physically adjacent to the physically adjacent rows of the aggressor row (e.g., HitXADD+2 and HitXADD−2). Other relationships between victim rows and the identified aggressor rows may be used in other examples. For example, +/−3, +/−4, and/or other rows may also be refreshed.
The refresh address generator 234 may determine the value of the refresh address RXADD based on the row hammer refresh signal RHR. In some embodiments, when the signal RHR is not active, the refresh address generator 234 may provide one of a sequence of auto refresh addresses. When the signal RHR is active, the refresh address generator 234 may provide a targeted refresh address, such as a victim address, as the refresh address RXADD. In some embodiments, the refresh address generator 234 may count activations of the signal RHR, and may provide closer victim rows, (e.g., HitXADD+−1) more frequently than victim rows which are further away from the aggressor address (e.g., HitXADD+/−2).
The row decoder 208 may perform one or more operations on the memory array (not shown) based on the received signals and addresses. For example, responsive to the activation signal ACT and the row address XADD (and IREF and RHR being at a low logic level), the row decoder 208 may direct one or more access operations (for example, a read operation) on the specified row address XADD. Responsive to the RHR signal being active, the row decoder 208 may refresh the refresh address RXADD.
The refresh control circuit 216 receives a refresh management signal RPM, which may be provided to a memory device (e.g., device 100 of
Accordingly, the RHR state control circuit 236 may indicate that targeted refresh operations should be performed as pan of a periodic sequence, and may also indicate that targeted refresh operations should be performed responsive to an activation of the signal RFM. Targeted refresh operations performed as part of a periodic sequence of refresh operations may generally be referred to as ‘periodic targeted refresh operations’ in order to distinguish them from targeted refresh operations performed responsive to the signal RFM, which may generally be referred to as ‘requested targeted refresh operations’ or ‘panic targeted refresh operations’. It should be understood that the method of actually performing the periodic targeted refresh operation and the requested targeted refresh operation may generally be the same (e.g., refreshing victim wordlines based on the match address HitXADD), and the different terminology is meant to distinguish the cause of a particular targeted refresh operation.
A memory controller may monitor the access commands which are being provided to a given bank of the memory. The memory controller may include a refresh management (RFM) logic circuit which may include a count value. The count value stored in the RFM logic circuit may be a rolling accumulated ACT (RAA) count. The controller may include a separate count value RAA for each bank of the memory device and may separately compare each count value RAA to a threshold to determine if the signal RFM (or a refresh management command) should be provided to the bank associated with that count value RAA. The RAA count may be compared to a threshold which is an RAA initial management threshold (RAAIMT). The value of the threshold RAAIMT may be a configurable value.
The signal RFM may be provided to the memory device based on the comparison of the count RAA to the threshold RAAIMT. For example, in an embodiment where the count RAA is increased responsive to each activation of ACT, the controller may determine if the count RAA is greater than the threshold RAAIMT. In such an embodiment, if the count RAA is greater than RFM then the signal RFM is provided to the refresh control circuit 216. When the signal RFM is provided, the value of the count. RAA may be changed. For example, if the count RAA is increased (e.g., incremented) responsive to ACT, then responsive to the signal RFM being provided, the count RAA may be decreased. In some embodiments, the count RAA may be decreased by the value of the threshold RAAINT, in some embodiments, the count value RAA may have a minimum value (e.g., 0) which the count value RAA cannot be decreased below even if the reduction of RAA by the value of RAAINT would normally be below that minimum value.
The RHR state control circuit 236 may receive, the refresh signal AREF and the signal RFM and provide the row hammer refresh signal RHR and internal refresh signal REF. The refresh signal AREF may be periodically generated and may be used to control the timing of refresh operations. The signals RHR and IREF may be used to control whether the memory performs a targeted refresh operation or an auto-refresh operation, respectively. For example, responsive to each activation of the signal AREF, the RHR state control circuit 236 may provide a number of activations of the internal refresh signal IREF. Responsive to each activation of IREF (as long as the signal RHR is not active) an auto-refresh operation may be performed. The RHR state control circuit 236 may perform periodic targeted refresh operations by providing a number of activations of the signal REM after counting a certain number of the activations of IREF. In other words, with timing based on AREF, the RHR state control circuit 236 may indicate that the memory should provide a first number of auto-refresh operations, then a second number of auto-refresh operations, then the first number of auto-refresh operations again, etc. For example, the RHR state control circuit 236 may indicate that 8 auto-refresh operations should be performed (e.g., by providing IREF eight times) and then may indicate that 4 targeted refresh operations should be performed (e.g., by providing IREF along with RHR four times), and then repeating that cycle for as long as the memory device is in a refresh mode. Other numbers of auto-refresh and targeted refresh operations may be used in other examples. Accordingly, a normal operation of the memory may include a period of time over which the memory performs some number of access operations (e.g., due to external commands) and then a period of time in a refresh mode (e.g., when AREF is being provided) where a sequence of auto- and targeted-refresh operations are being performed.
Responsive to receiving the signal RFM, the RHR state control circuit 236 may indicate that one or more panic targeted refresh operations should be performed. In some embodiments, after receiving the signal RFM, the RHR state control circuit 236 may perform a panic targeted refresh operation even if as refresh operation would not otherwise be performed. For example, after receiving the signal RFM, even if the memory device is not currently in a refresh mode, the refresh control circuit 216 may issue the signals IREF and RHR together to indicate that a targeted refresh operation should be performed. In some embodiments, access operations may be put ‘on hold’ while the memory performs a panic targeted refresh and access operations may then resume. In some embodiments, the RHR state control may indicate that multiple targeted refresh operations should be performed (e.g., by providing the signals RHR and IREF multiple times). For example, responsive to each activation of the signal RFM, the RHR state control circuit 236 may indicate that two panic targeted refresh operations should be performed. Other numbers of panic targeted refresh operations may be performed responsive to each activation of RFM in other examples.
The refresh control circuit 216 may include a skip logic circuit 239, which, may receive the signals RFM and REF_IP and provide the signal Skip based on those two signals. The signal Skip may be used to indicate that the RHR state control circuit 236 should skip the next periodic targeted refresh operation (e.g., because enough targeted refreshes have already been performed by panic targeted refreshes before the current refresh mode). In some embodiments the signal Skip may cause the RHR state control circuit 236 to skip all of the periodic targeted refresh operations in a next refresh period (e.g., the next period of time where there is a refresh mode). In some embodiments, where the memory performs multiple targeted refresh operations periodically as part of each refresh period, the signal Skip may cause the RHR state control circuit 236 to skip only a portion of the periodic targeted refresh operations. For example, only one periodic targeted refresh operation may be skipped due to the activation of the signal Skip. Other numbers of periodic targeted refresh operations may be skipped in other example embodiments.
When the RHR state control circuit 236 receives the signal Skip, it may skip (e.g., not perform) a next periodic targeted refresh operation. In some embodiments, the RHR state control circuit 236 may skip a periodic targeted refresh operation by not performing any kind of refresh operation. In some embodiments, the RHR state control circuit 236 may skip a periodic targeted refresh operation by performing an auto-refresh operation instead (e.g., by providing the signal IREF alone). When a periodic targeted refresh operation is skipped, the RHR state control circuit 236 may provide an activation of a signal REF_IP which indicates that a periodic targeted refresh operation was skipped. The activation of REF_IP may be a pulse of the signal, where the signal is changed from an inactive level to an active level for a period of time, and then returned to the inactive level.
The skip logic circuit 239 may provide the signal Skip based on a count of the number of panic targeted refresh operations. The skip logic circuit 239 may count a number of activations of the signal RFM and compare that count to a threshold. For example, each time the signal RFM is activated, a count value N in the skip logic circuit 239 may be increased (e.g., incremented by one). Each time the count value N is changed, it may be compared to a threshold N_th. When the count value N meets or exceeds the threshold N_th, the signal Skip may be provided. The signal Skip may continue to be provided at an active level until the RHR state control circuit 236 responds to the signal Skip (e.g., by skipping a next periodic targeted refresh operation). Responsive to the RHR state control circuit 236 skipping a periodic targeted refresh operation (e.g., when the RHR state control circuit 236 provides the signal REF_IP), the skip logic circuit 239 may change the count N in a different direction than the value N is changed responsive to the signal RFM. For example, responsive to a periodic targeted refresh operation being skipped (e.g., responsive to the signal REF_IP), the count value N may be decreased. In some embodiments, the count value N may be decreased by the value of the threshold N_th. In some embodiments, the count value N may be reset to an initial value (e.g., 0).
The value of the threshold N_th may be based on a number of targeted refresh operations performed as part of each periodic targeted refresh cycle and a number of targeted refresh operations performed responsive to each activation of the signal RFM. For example, the value of the threshold N_th may be set as multiple of the ratio of the number of targeted refresh operations performed per periodic targeted refresh cycle (I) to the number of targeted refresh operations performed responsive to each activation of the signal RFM (J). In one example embodiment, the value of N_th may be given by N_th=2*I/J. The value of N_th may be programmable, for example it may be set by a trim fuse of the memory.
In some embodiments, the skip logic 239 may separately control skip operations for targeted refresh operations on different types of victim word lines. For example, the skip logic 239 may include a first threshold N_th1 and when the count N is above the threshold N_th1, the skip logic circuit 239 may provide a signal which causes a next periodic targeted refresh operation on +/−1 (e.g., adjacent) victim word lines to be skipped. The skip logic 239 may also include a second threshold N_th2 and when the count N is above the second threshold N_th2, the skip logic circuit 239 may provide a signal which causes a next periodic targeted refresh operation on a +/−2 victim word lines to be skipped.
The second line of the timing charts 300a-b shows the refresh operations performed by the memory along with the refresh management signal RFM as well as the accesses between the refresh operations. For purposes of clarity, the timing diagrams of
The third line of the timing charts 300a-b shows the count value N in the skip logic circuit (e.g., 239 of
At the initial time t0, the count value (not shown may be at 0 after the periodic targeted refresh operation just after t0 is skipped. In the case of both the embodiments shown in
In the embodiment of
The skip logic circuit 400 includes a counter circuit 444 which stores and manages the value of the count N. In the embodiment of
A clk terminal of the counter circuit 444 is coupled to the refresh management signal RFM. Each time an activation of the signal RFM is received (e.g., a rising edge of RFM), the counter circuit 444 may increment the value of N. The counter circuit 444 may compare the count value N to the threshold N_th each time the count value is changed. A reset terminal of the counter circuit is coupled to a reset signal rst_n. When the counter circuit 444 receives an activation of the signal rst_n (e.g., the signal rst_n at a low logical level), the count value N may be rest to an initial value (e.g., 0). In some embodiments, the threshold may be set by setting a maximum value that the count value N may have, and then setting the signal Flag to an active level when the count exceeds the maximum value rolls over). Accordingly, the signal tmfz may be used to set a maximum value of N to N_th−1.
The reset signal rst_n may be based on the state of the signal Skip. The signal Skip may be coupled through a delay circuit 442 to an inverter circuit 443. Accordingly, at a first time, the signal skip may rise front a low logical level to a high logical level (e.g., when the count value N meets or exceeds the threshold N_th). At a second time which is after the first time, the signal rst_n may change from a high logical level to a low logical level. This in turn may cause the count value to reset, and the signal Flag to drop to a low logical level.
The skip logic circuit 400 includes a latch circuit 452, which may store and provide a value of the skip signal Skip. The latch circuit 452 may be used to ensure that the signal Skip remains at an active level (e.g., a high logical level) until after a next periodic targeted refresh operation is skipped. As shown in the circuit of the example of
The skip logic circuit 400 receives the signal REF_IP, which indicates that a periodic targeted refresh operation has been skipped. The signal REF_IP is coupled to the reset terminal of the latch circuit 452 through an inverter 446, a delay circuit 448, and a NOR gate 450 which act as a falling edge detector for the signal REF_IP. One of the input terminals of the NOR gate 450 is coupled to the signal REF_IP. The other input terminal of the NOR gate 450 is coupled to the signal REF_IP through the inverter circuit 446 and the delay circuit 448. Accordingly, when the signal REF_IP falls from an active level to an inactive level (e.g., a high logical level to a low logical level), the NOR gate 450 may provide a signal at a high logical level, which may reset the latch circuit 452 so that the signal Skip is provided at a low logical level.
The first trace shows the refresh management signal RFM, which is provided by a controller of the memory based on a rate of accesses to the memory. The second trace shows the signal REF_IP, which is used to indicate that a periodic targeted refresh operation has been skipped. The third trace shows the count value N over time. The fourth trace shows the signal Flag, which may be provided by a counter circuit (e.g., 444 of
Before an initial time to, the value of the count N is at 0, and the signals REF_IP, Flag, and Skip are all at a low logical level. At t0, an activation of the signal RFM is received. This may indicate that the controller has counted a certain number of access commands directed to the bank. Responsive to the activation of RFM (e.g., responsive to a rising edge of RFM), the count value N is increased by one to a value of one. At a first time a second activation of the signal RFM is received. This may raise the value of N to two, which in this example embodiment is the threshold value N_th.
Since the value of N is now equal to or greater than N_th, the signal Flag is raised to a high logical level, which in turn raises the signal Skip to a high logical level. The signal skip rising to a high logical level may in turn reset the count value N to an initial value (e.g., 0). This may cause the signal Flag to drop to low logical level. The signal Skip may be provided to the RHR state control circuit to indicate that the next periodic targeted refresh operation should be skipped. At a second time t2, the signal REF_IP is provided to indicate that the memory device has performed periodic refresh operations, and that a periodic targeted refresh operation has been skipped. At a third time t1, responsive to a failing edge of the signal REF_IP, and the signal Flag no longer being at a high logical level, the signal Skip drops back to a low logical level.
The method 600 may include block 610 which describes receiving a refresh management signal at a bank of a memory. The refresh management signals may be based on access commands to a particular bank of the memory. The access commands may be access commands associated with, for example, reading or writing data to/from one or more word lines of the bank. The access commands may be provided by a controller (e.g., interface 226 of
The refresh management signal may be based on a first count responsive to the access commands and comparing the first count to a threshold. The controller may include the first count value e.g., RAA). In some embodiments, each time the access command is provided to a particular bank of the memory, the first count value may be increased (e.g., increased by one). The first count value may be compared to a first threshold (e.g., RAAIMT) and may determine if the first count RAA is greater than or equal to the first threshold RAAIMT. The refresh management signal (e.g., RFM) may be provided when the count is greater than the first threshold.
Block 610 may be followed by block 620 which describes changing a count responsive to the refresh management signal and comparing the count to a threshold. The refresh control circuit may include a skip logic circuit (e.g., 239) which manages the count value (e.g., N). In some embodiments, responsive to each refresh management signal (e.g., RFM), the count value N may be increased. The count value may be compared to a threshold (e.g., N_th) to determine if the count value is greater than or equal to the second threshold N_th.
Block 620 may be followed by block 630, which describes periodically performing a targeted refresh operation on the memory bank. The memory bank may be put into a refresh mode, where periodic refresh operations are performed. An interface may put the memory bank into the refresh mode by providing a refresh signal (e.g., AREF). While performing refresh operations, some of the refresh operations may be auto-refresh operations and some may be targeted refresh operations. The memory bank may receive access commands for a period of time, then be in a refresh mode for a period of time, and then this may repeat.
Block 630 may be followed by block 640, which describes skipping a next of the periodic targeted refresh operations based on the comparison of the second count to the second threshold. In some embodiments, when the second count is greater than or equal to the second threshold, the next periodic targeted refresh operation may be skipped. In some embodiments, after the next periodic targeted refresh operation is skipped, the count value N may be decreased. For example, the count value N may be decreased by the threshold N_th. In, another example, the count value N may be decreased by resetting the value of N to an initial value (e.g., 0).
Of course, it is to be appreciated that any one of the examples, embodiments or processes described herein may be combined with one or more other examples, embodiments and/or processes or be separated and/or performed amongst separate devices or device portions in accordance with the present systems, devices and methods.
Finally, the above-discussion is intended to be merely illustrative of the present system and should not be construed as limiting the appended claims to any particular embodiment or group of embodiments. Thus, while the present system has been described in particular detail with reference to exemplary embodiments, it should also be appreciated that numerous modifications and alternative embodiments may be devised by those having ordinary skill in the art without departing from the broader and intended spirit and scope of the present system as set forth in the claims that follow. Accordingly, the specification and drawings are to be regarded in an illustrative manner and are not intended to limit the scope of the appended claims,
This application is a continuation of U.S. patent application Ser. No. 16/655,110 filed Oct. 16, 2019 and issued as U.S. Pat. No. 11,302,377 on Apr. 12, 2022. The aforementioned application, and issued patent, is incorporated herein by reference, in its entirety, for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
5299159 | Balistreri et al. | Mar 1994 | A |
5654929 | Mote, Jr. | Aug 1997 | A |
5699297 | Yamazaki et al. | Dec 1997 | A |
5867442 | Kim et al. | Feb 1999 | A |
5933377 | Hidaka | Aug 1999 | A |
5943283 | Wong et al. | Aug 1999 | A |
5956288 | Bermingham et al. | Sep 1999 | A |
5959923 | Matteson et al. | Sep 1999 | A |
5970507 | Kato et al. | Oct 1999 | A |
5999471 | Choi | Dec 1999 | A |
6002629 | Kim et al. | Dec 1999 | A |
6011734 | Pappert | Jan 2000 | A |
6061290 | Shirley | May 2000 | A |
6064621 | Tanizaki et al. | May 2000 | A |
6212118 | Fujita | Apr 2001 | B1 |
6306721 | Teo et al. | Oct 2001 | B1 |
6310806 | Higashi et al. | Oct 2001 | B1 |
6310814 | Hampel et al. | Oct 2001 | B1 |
6363024 | Fibranz | Mar 2002 | B1 |
6392952 | Chen | May 2002 | B1 |
6424582 | Ooishi | Jul 2002 | B1 |
6434064 | Nagai | Aug 2002 | B2 |
6452868 | Fister | Sep 2002 | B1 |
6515928 | Sato et al. | Feb 2003 | B2 |
6535950 | Funyu et al. | Mar 2003 | B1 |
6535980 | Kumar et al. | Mar 2003 | B1 |
6567340 | Nataraj et al. | May 2003 | B1 |
6950364 | Kim | Sep 2005 | B2 |
7002868 | Takahashi | Feb 2006 | B2 |
7057960 | Fiscus et al. | Jun 2006 | B1 |
7082070 | Hong | Jul 2006 | B2 |
7187607 | Koshikawa et al. | Mar 2007 | B2 |
7203113 | Takahashi et al. | Apr 2007 | B2 |
7203115 | Eto et al. | Apr 2007 | B2 |
7209402 | Shinozaki et al. | Apr 2007 | B2 |
7215588 | Lee | May 2007 | B2 |
7444577 | Best et al. | Oct 2008 | B2 |
7551502 | Dono et al. | Jun 2009 | B2 |
7565479 | Best et al. | Jul 2009 | B2 |
7692993 | Iida et al. | Apr 2010 | B2 |
7830742 | Han | Nov 2010 | B2 |
8174921 | Kim et al. | May 2012 | B2 |
8400805 | Yoko | Mar 2013 | B2 |
8526260 | Pyeon | Sep 2013 | B2 |
8572423 | Isachar et al. | Oct 2013 | B1 |
8625360 | Iwamoto et al. | Jan 2014 | B2 |
8681578 | Narui | Mar 2014 | B2 |
8756368 | Best et al. | Jun 2014 | B2 |
8811100 | Ku | Aug 2014 | B2 |
8862973 | Zimmerman et al. | Oct 2014 | B2 |
8938573 | Greenfield et al. | Jan 2015 | B2 |
9032141 | Bains et al. | May 2015 | B2 |
9047978 | Bell et al. | Jun 2015 | B2 |
9076499 | Schoenborn et al. | Jul 2015 | B2 |
9087602 | Youn et al. | Jul 2015 | B2 |
9117544 | Bains et al. | Aug 2015 | B2 |
9123447 | Lee et al. | Sep 2015 | B2 |
9153294 | Kang | Oct 2015 | B2 |
9190137 | Kim et al. | Nov 2015 | B2 |
9190139 | Jung et al. | Nov 2015 | B2 |
9236110 | Bains et al. | Jan 2016 | B2 |
9251885 | Greenfield et al. | Feb 2016 | B2 |
9286964 | Halbert et al. | Mar 2016 | B2 |
9299400 | Bains et al. | Mar 2016 | B2 |
9311984 | Hong et al. | Apr 2016 | B1 |
9311985 | Lee et al. | Apr 2016 | B2 |
9324398 | Jones et al. | Apr 2016 | B2 |
9384821 | Bains et al. | Jul 2016 | B2 |
9390782 | Best et al. | Jul 2016 | B2 |
9396786 | Yoon et al. | Jul 2016 | B2 |
9406358 | Lee | Aug 2016 | B1 |
9412432 | Narui et al. | Aug 2016 | B2 |
9418723 | Chishti et al. | Aug 2016 | B2 |
9424907 | Fujishiro | Aug 2016 | B2 |
9484079 | Lee | Nov 2016 | B2 |
9514850 | Kim | Dec 2016 | B2 |
9570143 | Lim et al. | Feb 2017 | B2 |
9570201 | Morgan et al. | Feb 2017 | B2 |
9646672 | Kim et al. | May 2017 | B1 |
9653139 | Park | May 2017 | B1 |
9672889 | Lee et al. | Jun 2017 | B2 |
9685240 | Park | Jun 2017 | B1 |
9691466 | Kim | Jun 2017 | B1 |
9697913 | Mariani et al. | Jul 2017 | B1 |
9734887 | Venkata | Aug 2017 | B1 |
9741409 | Jones et al. | Aug 2017 | B2 |
9741447 | Akamatsu | Aug 2017 | B2 |
9747971 | Bains et al. | Aug 2017 | B2 |
9761297 | Tomishima | Sep 2017 | B1 |
9786351 | Lee et al. | Oct 2017 | B2 |
9799391 | Wei | Oct 2017 | B1 |
9805782 | Liou | Oct 2017 | B1 |
9805783 | Ito et al. | Oct 2017 | B2 |
9812185 | Fisch et al. | Nov 2017 | B2 |
9818469 | Kim et al. | Nov 2017 | B1 |
9831003 | Sohn et al. | Nov 2017 | B2 |
9865326 | Bains et al. | Jan 2018 | B2 |
9865328 | Desimone et al. | Jan 2018 | B1 |
9922694 | Akamatsu | Mar 2018 | B2 |
9934143 | Bains et al. | Apr 2018 | B2 |
9953696 | Kim | Apr 2018 | B2 |
9978430 | Seo et al. | May 2018 | B2 |
10020045 | Riho | Jul 2018 | B2 |
10020046 | Uemura | Jul 2018 | B1 |
10032501 | Ito et al. | Jul 2018 | B2 |
10049716 | Proebsting | Aug 2018 | B2 |
10083737 | Bains et al. | Sep 2018 | B2 |
10090038 | Shin | Oct 2018 | B2 |
10134461 | Bell et al. | Nov 2018 | B2 |
10141042 | Richter | Nov 2018 | B1 |
10147472 | Jones et al. | Dec 2018 | B2 |
10153031 | Akamatsu | Dec 2018 | B2 |
10170174 | Ito et al. | Jan 2019 | B1 |
10192608 | Morgan | Jan 2019 | B2 |
10210925 | Bains et al. | Feb 2019 | B2 |
10297305 | Moon et al. | May 2019 | B1 |
10297307 | Raad et al. | May 2019 | B1 |
10339994 | Ito et al. | Jul 2019 | B2 |
10381327 | Ramachandra et al. | Aug 2019 | B2 |
10446256 | Ong et al. | Oct 2019 | B2 |
10468076 | He et al. | Nov 2019 | B1 |
10490250 | Ito et al. | Nov 2019 | B1 |
10490251 | Wolff | Nov 2019 | B2 |
10504577 | Alzheimer | Dec 2019 | B1 |
10510396 | Notani et al. | Dec 2019 | B1 |
10572377 | Zhang et al. | Feb 2020 | B1 |
10573370 | Ito et al. | Feb 2020 | B2 |
10607679 | Nakaoka | Mar 2020 | B2 |
10685696 | Brown | Jun 2020 | B2 |
10699796 | Benedict et al. | Jun 2020 | B2 |
10790005 | He et al. | Sep 2020 | B1 |
10825505 | Rehmeyer | Nov 2020 | B2 |
10832792 | Penney et al. | Nov 2020 | B1 |
10930335 | Bell et al. | Feb 2021 | B2 |
10943636 | Wu et al. | Mar 2021 | B1 |
10950289 | Ito et al. | Mar 2021 | B2 |
10957377 | Noguchi | Mar 2021 | B2 |
10964378 | Ayyapureddi et al. | Mar 2021 | B2 |
10978132 | Rehmeyer et al. | Apr 2021 | B2 |
11017833 | Wu et al. | May 2021 | B2 |
11069393 | Cowles et al. | Jul 2021 | B2 |
11081160 | Ito et al. | Aug 2021 | B2 |
11222683 | Rehmeyer | Jan 2022 | B2 |
11222686 | Noguchi | Jan 2022 | B1 |
11227649 | Meier et al. | Jan 2022 | B2 |
11264079 | Roberts | Mar 2022 | B1 |
11302374 | Jenkinson et al. | Apr 2022 | B2 |
11302377 | Li et al. | Apr 2022 | B2 |
11309010 | Ayyapureddi | Apr 2022 | B2 |
11309012 | Meier et al. | Apr 2022 | B2 |
11315619 | Wolff | Apr 2022 | B2 |
11315620 | Ishikawa et al. | Apr 2022 | B2 |
11320377 | Chen | May 2022 | B2 |
11348631 | Wu et al. | May 2022 | B2 |
11380382 | Zhang et al. | Jul 2022 | B2 |
11417383 | Jenkinson et al. | Aug 2022 | B2 |
11532346 | Brown et al. | Dec 2022 | B2 |
11557331 | Mitsubori et al. | Jan 2023 | B2 |
20010008498 | Ooishi | Jul 2001 | A1 |
20020026613 | Niiro | Feb 2002 | A1 |
20020181301 | Takahashi et al. | Dec 2002 | A1 |
20020191467 | Matsumoto et al. | Dec 2002 | A1 |
20030026161 | Yamaguchi et al. | Feb 2003 | A1 |
20030063512 | Takahashi et al. | Apr 2003 | A1 |
20030067825 | Shimano et al. | Apr 2003 | A1 |
20030081483 | De Paor et al. | May 2003 | A1 |
20030123301 | Jang et al. | Jul 2003 | A1 |
20030161208 | Nakashima et al. | Aug 2003 | A1 |
20030193829 | Morgan et al. | Oct 2003 | A1 |
20030231540 | Lazar et al. | Dec 2003 | A1 |
20040004856 | Sakimura et al. | Jan 2004 | A1 |
20040008544 | Shinozaki et al. | Jan 2004 | A1 |
20040022093 | Lee | Feb 2004 | A1 |
20040024955 | Patel | Feb 2004 | A1 |
20040114446 | Takahashi et al. | Jun 2004 | A1 |
20040130959 | Kawaguchi | Jul 2004 | A1 |
20040184323 | Mori et al. | Sep 2004 | A1 |
20040218431 | Chung et al. | Nov 2004 | A1 |
20050002268 | Otsuka et al. | Jan 2005 | A1 |
20050041502 | Perner | Feb 2005 | A1 |
20050105362 | Choi et al. | May 2005 | A1 |
20050108460 | David | May 2005 | A1 |
20050213408 | Shieh | Sep 2005 | A1 |
20050243627 | Lee et al. | Nov 2005 | A1 |
20050265104 | Remaklus et al. | Dec 2005 | A1 |
20060018174 | Park et al. | Jan 2006 | A1 |
20060083099 | Bae et al. | Apr 2006 | A1 |
20060087903 | Riho et al. | Apr 2006 | A1 |
20060104139 | Hur et al. | May 2006 | A1 |
20060176744 | Stave | Aug 2006 | A1 |
20060198220 | Yoon et al. | Sep 2006 | A1 |
20060215474 | Hokenmaier | Sep 2006 | A1 |
20060233012 | Sekiguchi et al. | Oct 2006 | A1 |
20060262616 | Chen | Nov 2006 | A1 |
20060262617 | Lee | Nov 2006 | A1 |
20060268643 | Schreck et al. | Nov 2006 | A1 |
20070002651 | Lee | Jan 2007 | A1 |
20070008799 | Dono et al. | Jan 2007 | A1 |
20070014175 | Min et al. | Jan 2007 | A1 |
20070028068 | Golding et al. | Feb 2007 | A1 |
20070030746 | Best et al. | Feb 2007 | A1 |
20070033339 | Best et al. | Feb 2007 | A1 |
20070147154 | Lee | Jun 2007 | A1 |
20070165042 | Yagi | Jul 2007 | A1 |
20070237016 | Miyamoto et al. | Oct 2007 | A1 |
20070263442 | Cornwell et al. | Nov 2007 | A1 |
20070297252 | Singh | Dec 2007 | A1 |
20080028260 | Oyagi et al. | Jan 2008 | A1 |
20080031068 | Yoo et al. | Feb 2008 | A1 |
20080126893 | Harrand et al. | May 2008 | A1 |
20080130394 | Dono et al. | Jun 2008 | A1 |
20080181048 | Han | Jul 2008 | A1 |
20080212386 | Riho | Sep 2008 | A1 |
20080224742 | Pomichter | Sep 2008 | A1 |
20080253212 | Iida et al. | Oct 2008 | A1 |
20080253213 | Sato et al. | Oct 2008 | A1 |
20080266990 | Loeffler | Oct 2008 | A1 |
20080270683 | Barth et al. | Oct 2008 | A1 |
20080306723 | De Ambroggi et al. | Dec 2008 | A1 |
20080316845 | Wang et al. | Dec 2008 | A1 |
20090021999 | Tanimura et al. | Jan 2009 | A1 |
20090052264 | Hong et al. | Feb 2009 | A1 |
20090059641 | Jeddeloh | Mar 2009 | A1 |
20090073760 | Betser et al. | Mar 2009 | A1 |
20090161468 | Fujioka | Jun 2009 | A1 |
20090168571 | Pyo et al. | Jul 2009 | A1 |
20090185440 | Lee | Jul 2009 | A1 |
20090201752 | Riho et al. | Aug 2009 | A1 |
20090228739 | Cohen et al. | Sep 2009 | A1 |
20090251971 | Futatsuyama | Oct 2009 | A1 |
20090296510 | Lee et al. | Dec 2009 | A1 |
20100005217 | Jeddeloh | Jan 2010 | A1 |
20100005376 | Laberge et al. | Jan 2010 | A1 |
20100061153 | Yen et al. | Mar 2010 | A1 |
20100074042 | Fukuda et al. | Mar 2010 | A1 |
20100097870 | Kim et al. | Apr 2010 | A1 |
20100110809 | Kobayashi et al. | May 2010 | A1 |
20100110810 | Kobayashi | May 2010 | A1 |
20100124138 | Lee et al. | May 2010 | A1 |
20100128547 | Kagami | May 2010 | A1 |
20100131812 | Mohammad | May 2010 | A1 |
20100141309 | Lee | Jun 2010 | A1 |
20100157693 | Iwai et al. | Jun 2010 | A1 |
20100182862 | Teramoto | Jul 2010 | A1 |
20100182863 | Fukiage | Jul 2010 | A1 |
20100329069 | Ito et al. | Dec 2010 | A1 |
20110026290 | Noda et al. | Feb 2011 | A1 |
20110055495 | Remaklus, Jr. et al. | Mar 2011 | A1 |
20110069572 | Lee et al. | Mar 2011 | A1 |
20110122987 | Neyer | May 2011 | A1 |
20110134715 | Norman | Jun 2011 | A1 |
20110216614 | Hosoe | Sep 2011 | A1 |
20110225355 | Kajigaya | Sep 2011 | A1 |
20110299352 | Fujishiro et al. | Dec 2011 | A1 |
20110310648 | Iwamoto et al. | Dec 2011 | A1 |
20120014199 | Narui | Jan 2012 | A1 |
20120059984 | Kang et al. | Mar 2012 | A1 |
20120151131 | Kilmer et al. | Jun 2012 | A1 |
20120155173 | Lee et al. | Jun 2012 | A1 |
20120155206 | Kodama et al. | Jun 2012 | A1 |
20120213021 | Riho et al. | Aug 2012 | A1 |
20120254472 | Ware et al. | Oct 2012 | A1 |
20120287727 | Wang | Nov 2012 | A1 |
20120307582 | Marumoto et al. | Dec 2012 | A1 |
20120327734 | Sato | Dec 2012 | A1 |
20130003467 | Klein | Jan 2013 | A1 |
20130003477 | Park et al. | Jan 2013 | A1 |
20130028034 | Fujisawa | Jan 2013 | A1 |
20130051157 | Park | Feb 2013 | A1 |
20130051171 | Porter et al. | Feb 2013 | A1 |
20130077423 | Lee | Mar 2013 | A1 |
20130173971 | Zimmerman | Jul 2013 | A1 |
20130254475 | Perego et al. | Sep 2013 | A1 |
20130279284 | Jeong | Oct 2013 | A1 |
20130304982 | Jung et al. | Nov 2013 | A1 |
20140006700 | Schaefer et al. | Jan 2014 | A1 |
20140006703 | Bains et al. | Jan 2014 | A1 |
20140006704 | Greenfield et al. | Jan 2014 | A1 |
20140013169 | Kobla et al. | Jan 2014 | A1 |
20140013185 | Kobla et al. | Jan 2014 | A1 |
20140016422 | Kim et al. | Jan 2014 | A1 |
20140022858 | Chen et al. | Jan 2014 | A1 |
20140043888 | Chen et al. | Feb 2014 | A1 |
20140050004 | Mochida | Feb 2014 | A1 |
20140078841 | Chopra | Mar 2014 | A1 |
20140078842 | Oh et al. | Mar 2014 | A1 |
20140089576 | Bains et al. | Mar 2014 | A1 |
20140089758 | Kwok et al. | Mar 2014 | A1 |
20140095780 | Bains et al. | Apr 2014 | A1 |
20140095786 | Moon et al. | Apr 2014 | A1 |
20140119091 | You et al. | May 2014 | A1 |
20140143473 | Kim et al. | May 2014 | A1 |
20140169114 | Oh | Jun 2014 | A1 |
20140177370 | Halbert et al. | Jun 2014 | A1 |
20140181453 | Jayasena et al. | Jun 2014 | A1 |
20140185403 | Lai | Jul 2014 | A1 |
20140189228 | Greenfield et al. | Jul 2014 | A1 |
20140219042 | Yu et al. | Aug 2014 | A1 |
20140219043 | Jones et al. | Aug 2014 | A1 |
20140237307 | Kobla et al. | Aug 2014 | A1 |
20140241099 | Seo et al. | Aug 2014 | A1 |
20140254298 | Dally | Sep 2014 | A1 |
20140281206 | Crawford et al. | Sep 2014 | A1 |
20140281207 | Mandava et al. | Sep 2014 | A1 |
20140293725 | Best et al. | Oct 2014 | A1 |
20140321226 | Pyeon | Oct 2014 | A1 |
20150016203 | Sriramagiri et al. | Jan 2015 | A1 |
20150036445 | Yoshida et al. | Feb 2015 | A1 |
20150049566 | Lee et al. | Feb 2015 | A1 |
20150049567 | Chi | Feb 2015 | A1 |
20150055420 | Bell et al. | Feb 2015 | A1 |
20150078112 | Huang | Mar 2015 | A1 |
20150085564 | Yoon et al. | Mar 2015 | A1 |
20150089326 | Joo et al. | Mar 2015 | A1 |
20150092508 | Bains | Apr 2015 | A1 |
20150109871 | Bains et al. | Apr 2015 | A1 |
20150120999 | Kim et al. | Apr 2015 | A1 |
20150134897 | Sriramagiri et al. | May 2015 | A1 |
20150155025 | Lee et al. | Jun 2015 | A1 |
20150162064 | Oh et al. | Jun 2015 | A1 |
20150162067 | Kim et al. | Jun 2015 | A1 |
20150170728 | Jung et al. | Jun 2015 | A1 |
20150199126 | Jayasena et al. | Jul 2015 | A1 |
20150206572 | Lim et al. | Jul 2015 | A1 |
20150213872 | Mazumder et al. | Jul 2015 | A1 |
20150243339 | Bell et al. | Aug 2015 | A1 |
20150255140 | Song | Sep 2015 | A1 |
20150279442 | Hwang | Oct 2015 | A1 |
20150294711 | Gaither et al. | Oct 2015 | A1 |
20150340077 | Akamatsu | Nov 2015 | A1 |
20150356048 | King | Dec 2015 | A1 |
20150380073 | Joo et al. | Dec 2015 | A1 |
20160019940 | Jang et al. | Jan 2016 | A1 |
20160027498 | Ware et al. | Jan 2016 | A1 |
20160027531 | Jones et al. | Jan 2016 | A1 |
20160027532 | Kim | Jan 2016 | A1 |
20160042782 | Narui et al. | Feb 2016 | A1 |
20160070483 | Yoon et al. | Mar 2016 | A1 |
20160078846 | Liu et al. | Mar 2016 | A1 |
20160078911 | Fujiwara et al. | Mar 2016 | A1 |
20160086649 | Hong et al. | Mar 2016 | A1 |
20160093402 | Kitagawa et al. | Mar 2016 | A1 |
20160125931 | Doo et al. | May 2016 | A1 |
20160133314 | Hwang et al. | May 2016 | A1 |
20160155491 | Roberts et al. | Jun 2016 | A1 |
20160180917 | Chishti et al. | Jun 2016 | A1 |
20160180921 | Jeong | Jun 2016 | A1 |
20160196863 | Shin et al. | Jul 2016 | A1 |
20160202926 | Benedict | Jul 2016 | A1 |
20160225433 | Bains et al. | Aug 2016 | A1 |
20160336060 | Shin | Nov 2016 | A1 |
20160343423 | Shido | Nov 2016 | A1 |
20170011792 | Oh et al. | Jan 2017 | A1 |
20170052722 | Ware et al. | Feb 2017 | A1 |
20170076779 | Bains et al. | Mar 2017 | A1 |
20170092350 | Halbert et al. | Mar 2017 | A1 |
20170111792 | Correia Fernandes et al. | Apr 2017 | A1 |
20170117030 | Fisch et al. | Apr 2017 | A1 |
20170133085 | Kim et al. | May 2017 | A1 |
20170133108 | Lee et al. | May 2017 | A1 |
20170140807 | Sun et al. | May 2017 | A1 |
20170140810 | Choi et al. | May 2017 | A1 |
20170140811 | Joo | May 2017 | A1 |
20170146598 | Kim et al. | May 2017 | A1 |
20170148504 | Saifuddin et al. | May 2017 | A1 |
20170177246 | Miller et al. | Jun 2017 | A1 |
20170186481 | Oh et al. | Jun 2017 | A1 |
20170213586 | Kang et al. | Jul 2017 | A1 |
20170221546 | Loh et al. | Aug 2017 | A1 |
20170263305 | Cho | Sep 2017 | A1 |
20170269861 | Lu et al. | Sep 2017 | A1 |
20170287547 | Ito et al. | Oct 2017 | A1 |
20170323675 | Jones et al. | Nov 2017 | A1 |
20170345482 | Balakrishnan | Nov 2017 | A1 |
20170352404 | Lee et al. | Dec 2017 | A1 |
20180005690 | Morgan et al. | Jan 2018 | A1 |
20180025770 | Ito et al. | Jan 2018 | A1 |
20180025772 | Lee et al. | Jan 2018 | A1 |
20180025773 | Bains et al. | Jan 2018 | A1 |
20180033479 | Lea et al. | Feb 2018 | A1 |
20180047110 | Blackman et al. | Feb 2018 | A1 |
20180061476 | Kim | Mar 2018 | A1 |
20180061483 | Morgan | Mar 2018 | A1 |
20180061485 | Joo | Mar 2018 | A1 |
20180075927 | Jeong | Mar 2018 | A1 |
20180082737 | Lee | Mar 2018 | A1 |
20180096719 | Tomishima et al. | Apr 2018 | A1 |
20180102776 | Chandrasekar et al. | Apr 2018 | A1 |
20180107417 | Shechter et al. | Apr 2018 | A1 |
20180108401 | Choi et al. | Apr 2018 | A1 |
20180114561 | Fisch et al. | Apr 2018 | A1 |
20180114565 | Lee | Apr 2018 | A1 |
20180122454 | Lee et al. | May 2018 | A1 |
20180130506 | Kang et al. | May 2018 | A1 |
20180137005 | Wu et al. | May 2018 | A1 |
20180158504 | Akamatsu | Jun 2018 | A1 |
20180158507 | Bang | Jun 2018 | A1 |
20180182445 | Lee et al. | Jun 2018 | A1 |
20180190340 | Kim et al. | Jul 2018 | A1 |
20180218767 | Wolff | Aug 2018 | A1 |
20180226119 | Kim et al. | Aug 2018 | A1 |
20180233197 | Laurent | Aug 2018 | A1 |
20180240511 | Yoshida et al. | Aug 2018 | A1 |
20180247876 | Kim et al. | Aug 2018 | A1 |
20180254078 | We et al. | Sep 2018 | A1 |
20180261268 | Hyun et al. | Sep 2018 | A1 |
20180276150 | Eckert et al. | Sep 2018 | A1 |
20180285007 | Franklin et al. | Oct 2018 | A1 |
20180294028 | Lee et al. | Oct 2018 | A1 |
20180308539 | Ito et al. | Oct 2018 | A1 |
20180341553 | Koudele et al. | Nov 2018 | A1 |
20190013059 | Akamatsu | Jan 2019 | A1 |
20190043558 | Suh et al. | Feb 2019 | A1 |
20190051344 | Bell et al. | Feb 2019 | A1 |
20190065087 | Li et al. | Feb 2019 | A1 |
20190066759 | Nale | Feb 2019 | A1 |
20190066766 | Lee | Feb 2019 | A1 |
20190088315 | Saenz et al. | Mar 2019 | A1 |
20190088316 | Inuzuka et al. | Mar 2019 | A1 |
20190103147 | Jones et al. | Apr 2019 | A1 |
20190115069 | Lai | Apr 2019 | A1 |
20190122723 | Ito et al. | Apr 2019 | A1 |
20190129651 | Wuu et al. | May 2019 | A1 |
20190130960 | Kim | May 2019 | A1 |
20190130961 | Bell et al. | May 2019 | A1 |
20190147964 | Yun et al. | May 2019 | A1 |
20190161341 | Howe | May 2019 | A1 |
20190190341 | Beisele et al. | Jun 2019 | A1 |
20190196730 | Imran | Jun 2019 | A1 |
20190198078 | Hoang et al. | Jun 2019 | A1 |
20190198099 | Mirichigni et al. | Jun 2019 | A1 |
20190205253 | Roberts | Jul 2019 | A1 |
20190228810 | Jones et al. | Jul 2019 | A1 |
20190228815 | Morohashi et al. | Jul 2019 | A1 |
20190252020 | Rios et al. | Aug 2019 | A1 |
20190267077 | Ito et al. | Aug 2019 | A1 |
20190279706 | Kim | Sep 2019 | A1 |
20190294348 | Ware et al. | Sep 2019 | A1 |
20190333573 | Shin et al. | Oct 2019 | A1 |
20190347019 | Shin et al. | Nov 2019 | A1 |
20190348100 | Smith et al. | Nov 2019 | A1 |
20190348102 | Smith et al. | Nov 2019 | A1 |
20190348103 | Jeong et al. | Nov 2019 | A1 |
20190362774 | Kuramori et al. | Nov 2019 | A1 |
20190385661 | Koo et al. | Dec 2019 | A1 |
20190385667 | Morohashi et al. | Dec 2019 | A1 |
20190385668 | Fujioka et al. | Dec 2019 | A1 |
20190385670 | Notani et al. | Dec 2019 | A1 |
20190386557 | Wang et al. | Dec 2019 | A1 |
20190391760 | Miura et al. | Dec 2019 | A1 |
20190392886 | Cox et al. | Dec 2019 | A1 |
20200005857 | Ito et al. | Jan 2020 | A1 |
20200051616 | Cho | Feb 2020 | A1 |
20200075086 | Hou et al. | Mar 2020 | A1 |
20200082873 | Wolff | Mar 2020 | A1 |
20200126611 | Riho et al. | Apr 2020 | A1 |
20200135263 | Brown et al. | Apr 2020 | A1 |
20200143871 | Kim et al. | May 2020 | A1 |
20200176050 | Ito et al. | Jun 2020 | A1 |
20200185026 | Yun et al. | Jun 2020 | A1 |
20200194050 | Akamatsu | Jun 2020 | A1 |
20200194056 | Sakurai et al. | Jun 2020 | A1 |
20200202921 | Morohashi et al. | Jun 2020 | A1 |
20200210278 | Rooney et al. | Jul 2020 | A1 |
20200211632 | Noguchi | Jul 2020 | A1 |
20200211633 | Okuma | Jul 2020 | A1 |
20200211634 | Ishikawa et al. | Jul 2020 | A1 |
20200219555 | Rehmeyer | Jul 2020 | A1 |
20200219556 | Ishikawa et al. | Jul 2020 | A1 |
20200265888 | Ito et al. | Aug 2020 | A1 |
20200273517 | Yamamoto | Aug 2020 | A1 |
20200273518 | Raad et al. | Aug 2020 | A1 |
20200279599 | Ware et al. | Sep 2020 | A1 |
20200294569 | Wu et al. | Sep 2020 | A1 |
20200294576 | Brown et al. | Sep 2020 | A1 |
20200321049 | Meier et al. | Oct 2020 | A1 |
20200381040 | Penney et al. | Dec 2020 | A1 |
20200388324 | Rehmeyer et al. | Dec 2020 | A1 |
20200388325 | Cowles et al. | Dec 2020 | A1 |
20200395063 | Rehmeyer | Dec 2020 | A1 |
20210057021 | Wu et al. | Feb 2021 | A1 |
20210057022 | Jenkinson et al. | Feb 2021 | A1 |
20210118491 | Li et al. | Apr 2021 | A1 |
20210166752 | Noguchi | Jun 2021 | A1 |
20210183433 | Jenkinson et al. | Jun 2021 | A1 |
20210183435 | Meier et al. | Jun 2021 | A1 |
20210225431 | Rehmeyer et al. | Jul 2021 | A1 |
20210304813 | Cowles et al. | Sep 2021 | A1 |
20210335411 | Wu et al. | Oct 2021 | A1 |
20210406170 | Jung et al. | Dec 2021 | A1 |
20220059153 | Zhang et al. | Feb 2022 | A1 |
20220059158 | Wu et al. | Feb 2022 | A1 |
20220093165 | Mitsubori et al. | Mar 2022 | A1 |
20220165328 | Ishikawa et al. | May 2022 | A1 |
20220199144 | Roberts | Jun 2022 | A1 |
20220270670 | Wu et al. | Aug 2022 | A1 |
Number | Date | Country |
---|---|---|
101026003 | Aug 2007 | CN |
101038785 | Sep 2007 | CN |
101067972 | Nov 2007 | CN |
104350546 | Feb 2015 | CN |
104733035 | Jun 2015 | CN |
104981874 | Oct 2015 | CN |
105529047 | Apr 2016 | CN |
106710621 | May 2017 | CN |
107025927 | Aug 2017 | CN |
107871516 | Apr 2018 | CN |
108154895 | Jun 2018 | CN |
2005-216429 | Aug 2005 | JP |
2011-258259 | Dec 2011 | JP |
4911510 | Jan 2012 | JP |
2013-004158 | Jan 2013 | JP |
6281030 | Jan 2018 | JP |
201801079 | Jan 2018 | TW |
2014120477 | Aug 2014 | WO |
2015030991 | Mar 2015 | WO |
2017171927 | Oct 2017 | WO |
2019222960 | Nov 2019 | WO |
2020010010 | Jan 2020 | WO |
2020117686 | Jun 2020 | WO |
2020247163 | Dec 2020 | WO |
2020247639 | Dec 2020 | WO |
Entry |
---|
U.S. Appl. No. 17/662,733, titled “Apparatuses, Systems, and Methods for Identifying Victim Rows in a Memorydevice Which Cannot Be Simultaneously Refreshed” filed May 10, 2022, pp. all pages of the application as filed. |
U.S. Appl. No. 17/731,529, titled “Apparatuses and Methods for Access Based Refresh Dperations”; filed Apr. 28, 2022; pp. all pages of the application as filed. |
U.S. Appl. No. 17/731,645, titled “Apparatuses and Methods for Access Based Targeted Refresh Operations”, filed Apr. 28, 2022; pp. all pages of application as filed. |
U.S. Appl. No. 18/064,773, filed Dec. 12, 2022, titled, “Apparatuses and Methods for Access Based Refresh Timing,” pp. all pages of application as filed. |
International Application No. PCT/US20/23689, tilled “Semiconductor Device Having Cam that Stores Address Signals”, dated Mar. 19, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 16/797,658, titles “Apparatuses and Methods for Controlling Refresh Operations”, filed Feb. 21, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 16/818,981, titled “Apparatuses and Methods for Staggered Timing of Targeted Refresh Operations” filed Mar. 13, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 16/824,460, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, dated Mar. 19, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 16/025,844, titled “Apparatus and Methods for Triggering Row Hammer Address Sampling”, filed Jul. 2, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 16/783,063, titled “Apparatus and Methods for Triggering Row Hammer Address Sampling”, dated Feb. 5, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 16/805,197, titled “Apparatuses and Methods for Calculating Row Hammer Refresh Addresses in a Semiconductor Device”, dated Feb. 28, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 16/232,837, titled “Apparatuses and Methods for Distributed Targeted Refresh Operations”, filed Dec. 26, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 16/818,989, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, dated Mar. 13, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 16/268,818, titled “Apparatuses and Methods for Managing Row Access Counts”, filed Feb. 6, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/286,187 titled “Apparatuses and Methods for Memory Mat Refresh Sequencing” filed Feb. 26, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/084,119, titled “Apparatuses and Methods for Pure-Time, Self Adopt Sampling for Row Hammer Refresh Sampling”, filed Sep. 11, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 16/886,284 titled “Apparatuses and Methods for Access Based Refresh Timing” filed May 28, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 16/886,284, titled “Apparatuses and Methods for Access Based Refresh Timing”, dated May 28, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 16/358,587, titled “Semiconductor Device Having Cam that Stores Address Signals”, dated Mar. 19, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/375,716 titled “Apparatuses and Methods for Staggered Timing of Targeted Refresh Operations” filed Apr. 4, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/411,573 titled “Apparatuses, Systems, and Methods for a Content Addressable Memory Cell” filed May 14, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/428,625 titled “Apparatuses and Methods for Tracking Victim Rows” filed May 31, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/432,604 titled “Apparatuses and Methods for Staggered Timing of Skipped Refresh Operations” filed Jun. 5, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 17/008,396 titled “Apparatuses and Methods for Staggered Timing of Targeted Refresh Operations” filed Aug. 31, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 16/513,400 titled “Apparatuses and Methods for Tracking Row Accesses” filed Jul. 16, 2019, pp. all pages of application as filed. |
U.S. Application No. 16/548,027 titled “Apparatuses, Systems, and Methods for Analog Row Access Rate Determination” filed Aug. 22, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/549,942 titled “Apparatuses and Methods for Lossy Row Access Counting” filed Aug. 23, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/546,152 titled “Apparatuses and Methods for Analog Row Access Tracking” filed Aug. 20, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/549,411 titled “Apparatuses and Methods for Dynamic Refresh Allocation” filed Aug. 23, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/655,110 tilted “Apparatuses and Methods for Dynamic Targeted Refresh Steals” filed Oct. 16, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 17/186,913 titled “Apparatuses and Methods for Dynamic Refresh Allocation” filed Feb. 26, 2021, pp. all pages of application as filed. |
U.S. Appl. No. 17/187,002 titled “Apparatuses and Methods for Staggered Timing of Targeted Refresh Operations” filed Feb. 26, 2021, pp. all pages of application as filed. |
U.S. Appl. No. 17/347,957 titled “Apparatuses and Methods for Controlling Steal Rates” filed Jun. 15, 2021, pp. all pages of application as filed. |
International Application No. PCT/US19/40169 titled “Apparatus and Methods for Triggering Row Hammer Address Sampling” filed Jul. 1, 2019, pp. all pages of application as filed. |
International Application No. PCT/US19/64028, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, dated Dec. 2, 2019, pp. all pages of application as filed. |
International Application No. PCT/US20/26689, titled “Apparatuses and Methods for Staggered Timing of Targeted Refresh Operations”, dated Apr. 3, 2020, pp. all pages of application as filed. |
International Application No. PCT/US20/32931, titled “Apparatuses and Methods for Controlling Steal Rates”, dated May 14, 2029, pp. all pages of application as filed. |
U.S. Appl. No. 16/788,657, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, dated Feb. 12, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 17/324,621 titled “Apparatuses and Methods for Pure-Time, Self-Adopt Sampling for Row Hammer Refresh Sampling” filed May 19, 2021, pp. all pages of application as filed. |
U.S. Appl. No. 15/881,256 entitled ‘Apparatuses and Methods for Detecting a Row Hammer Attack With a Bandpass Filter’ filed Jan. 26, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 16/425,525 titled “Apparatuses and Methods for Tracking All Row Accesses” filed May 29, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/427,105 titled “Apparatuses and Methods for Priority Targeted Refresh Operations” filed May 30, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/427,140 titled “Apparatuses and Methods for Tracking Row Access Counts Between Multiple Register Stacks” filed May 30, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/437,811 titled “Apparatuses, Systems, and Methods for Determining Extremum Numerical Values” filed Jun. 11, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/537,981 titled “Apparatuses and Methods for Controlling Targeted Refresh Rates” filed Aug. 12, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/994,338 titled “Apparatuses, Systems, and Methods for Memory Directed Access Pause” filed Aug. 14, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 16/997,766 titled “Refresh Logic Circuit Layouts Thereof” filed Aug. 19, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 16/997,659 titled “Apparatuses, Systems, and Methods for Refresh Modes” filed Aug. 19, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 17/095,978 titled “Apparatuses and Methods for Controlling Refresh Timing” filed Nov. 12, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 17/127,654 titled “Apparatuses and Methods for Row Hammer Based Cache Lockdown” filed Dec. 18, 2020, pp. all pages of application as fifed. |
U.S. Appl. No. 17/175,485 titled “Apparatuses and Methods for Distributed Targeted Refresh Operations” filed Feb. 12, 2021, pp. all pages of application as filed. |
U.S. Appl. No. 15/789,897, entitled “Apparatus and Methods for Refreshing Memory”, filed Oct. 20, 2017, pp. all pages of application as filed. |
U.S. Appl. No. 15/796,340, entitled: “Apparatus and Methods for Refreshing Memory” filed Oct. 27, 2017, pp. all pages of application as filed. |
U.S. Appl. No. 16/012,679, titled “Apparatuses and Methods for Multiple Row Hammer Refresh Address Sequences”, filed Jun. 19, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 16/020,863, titled “Semiconductor Device”, filed Jun. 27, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 16/112,471 titled “Apparatuses and Methods for Controlling Refresh Operations” filed Aug. 24, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 16/160,801, titled “Apparatuses and Methods for Selective Row Refreshes” filed Oct. 15, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 16/176,932, titled “Apparatuses and Methods for Access Based Refresh Timing”, filed Oct. 31, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 16/208,217, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, filed Dec. 3, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 16/230,300, titled “Apparatuses and Methods for Staggered Timing of Targeted Refresh Operations” filed Dec. 21, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 16/231,327 titled “Apparatuses and Methods for Selective Row Refreshes”, filed Dec. 21, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 16/237,291, titled “Apparatus and Methods for Refreshing Memory”, filed Dec. 31, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 16/290,730, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, filed Mar. 1, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/374,623, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, filed Apr. 3, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/411,698 titled “Semiconductor Device” filed May 14, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/427,330 titled “Apparatuses and Methods for Storing Victim Row Data” filed May 30, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/431,641 titled “Apparatuses and Methods for Controlling Steal Rates” filed Jun. 4, 2019, pp. all pages of application as filed. |
U.S. Appl. No. 16/682,606, titled “Apparatuses and Methods for Distributing Row Hammer Refresh Events Across a Memory Device”, filed Nov. 13 2019, pp. all pages of application as filed. |
U.S. Appl. No. 15/876,566 entitled ‘Apparatuses and Methods for Calculating Row Hammer Refresh Addresses in a Semiconductor Device’ filed Jan. 22, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 15/656,084, titled “Apparatuses and Methods for Targeted Refreshing of Memory”, filed Jul. 21, 2017, pp. all pages of application as filed. |
U.S. Appl. No. 17/226,975, titled “Apparatuses and Methods for Staggered Timing of Skipped Refresh Operations” filed Apr. 9, 2021, pp. all pages of application as filed. |
U.S. Appl. No. 16/459,520 titled “Apparatuses and Methods for Monitoring Word Line Accesses”, filed Jul. 1, 2019, pp. all pages of application as filed. |
PCT Application No. PCT/US18/55821 “Apparatus and Methods for Refreshing Memory” filed Oct. 15, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 15/715,846, entitled “Semiconductor Device”, filed Sep. 26, 2017, pp. all pages of application as filed. |
U.S. Appl. No. 15/888,993, entitled “Apparatuses and Methods for Controlling Refresh Operations”, filed Feb. 5, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 16/190,627 titled “Apparatuses and Methods for Targeted Refreshing of Memory” filed Nov. 14, 2018, pp. all pages of application as filed. |
U.S. Appl. No. 17/030,018, titled “Apparatuses and Methods for Controlling Refresh Operations”, filed Sep. 23, 2020, pp. all pages of application as filed. |
U.S. Appl. No. 15/281,818, entitled: “Semiconductor Device” filed Sep. 30, 2016, pp. all pages of application as filed. |
Kim, et al., “Flipping Bits in MemoryWithout Accessing Them: An Experimental Study of DRAM Disturbance Errors”, IEEE, Jun. 2014, 12 pgs. |
Number | Date | Country | |
---|---|---|---|
20220189539 A1 | Jun 2022 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16655110 | Oct 2019 | US |
Child | 17654035 | US |