The present invention relates generally to data storage, and particularly to methods and systems for data scrambling in memory devices.
Several types of memory devices, such as Flash memories, use arrays of analog memory cells for storing data. Each analog memory cell stores a quantity of an analog value, also referred to as a storage value, such as an electrical charge or voltage. This analog value represents the information stored in the cell. In Flash memories, for example, each analog memory cell holds a certain amount of electrical charge. The range of possible analog values is typically divided into intervals, each interval corresponding to one or more data bit values. Data is written to an analog memory cell by writing a nominal analog value that corresponds to the desired bit or bits.
Some memory devices, commonly referred to as Single-Level Cell (SLC) devices, store a single bit of information in each memory cell, i.e., each memory cell can be programmed to assume two possible programming levels. Higher-density devices, often referred to as Multi-Level Cell (MLC) devices, store two or more bits per memory cell, i.e., can be programmed to assume more than two possible programming levels.
Flash memory devices are described, for example, by Bez et al., in “Introduction to Flash Memory,” Proceedings of the IEEE, volume 91, number 4, April, 2003, pages 489-502, which is incorporated herein by reference. Multi-level Flash cells and devices are described, for example, by Eitan et al., in “Multilevel Flash Cells and their Trade-Offs,” Proceedings of the 1996 IEEE International Electron Devices Meeting (IEDM), New York, N.Y., pages 169-172, which is incorporated herein by reference. The paper compares several kinds of multilevel Flash cells, such as common ground, DINOR, AND, NOR and NAND cells.
Eitan et al., describe another type of analog memory cell called Nitride Read Only Memory (NROM) in “Can NROM, a 2-bit, Trapping Storage NVM Cell, Give a Real Challenge to Floating Gate Cells?” Proceedings of the 1999 International Conference on Solid State Devices and Materials (SSDM), Tokyo, Japan, Sep. 21-24, 1999, pages 522-524, which is incorporated herein by reference. NROM cells are also described by Maayan et al., in “A 512 Mb NROM Flash Data Storage Memory with 8 MB/s Data Rate”, Proceedings of the 2002 IEEE International Solid-State Circuits Conference (ISSCC 2002), San Francisco, Calif., Feb. 3-7, 2002, pages 100-101, which is incorporated herein by reference. Other exemplary types of analog memory cells are Floating Gate (FG) cells, Ferroelectric RAM (FRAM) cells, magnetic RAM (MRAM) cells, Charge Trap Flash (CTF) and phase change RAM (PRAM, also referred to as Phase Change Memory—PCM) cells. FRAM, MRAM and PRAM cells are described, for example, by Kim and Koh in “Future Memory Technology including Emerging New Memories,” Proceedings of the 24th International Conference on Microelectronics (MIEL), Nis, Serbia and Montenegro, May 16-19, 2004, volume 1, pages 377-384, which is incorporated herein by reference.
Some memory systems scramble, or randomize, the data before storing it in memory. For example, U.S. Patent Application Publication 2008/0215798, whose disclosure is incorporated herein by reference, describes randomization schemes, in which original data to be stored in a non-volatile memory are first randomized while preserving the size of the original data. In response for a request for the original data, the randomized data are retrieved, de-randomized and exported without authenticating the requesting entity. ECC encoding is applied either before or after randomizing. Correspondingly, ECC decoding is applied either after or before de-randomizing.
U.S. Patent Application Publication 2009/0204824, whose disclosure is incorporated herein by reference, describes data scrambling techniques implemented externally to a Flash memory device. The data scrambling technique preferably uses a logical address, such as logical block address or logical page address, rather than a physical address, to determine a seed scrambling key.
PCT International Publication WO 2008/099958, whose disclosure is incorporated herein by reference, describes a method of writing data into a semiconductor memory, in which nonvolatile memory cells each having a gate connected to a word line are connected in series. A scrambling method for the data is selected according to a word line address of the memory cells into which the data is to be written. The data is scrambled using the selected scrambling method, and the scrambled data is written into the memory cells according to the word line address.
U.S. Pat. No. 4,993,029, whose disclosure is incorporated herein by reference, describes a method and apparatus for randomizing data in a direct access storage device. The data is randomized, and subsequently de-randomized, in a repeating or pseudo-random, complementary sequence for each byte. The complementary randomizing/de-randomizing sequence is determined by the count contained in a counter. This counter is initialized at the beginning of a record, and is progressively incremented to the predetermined next count as each byte is processed.
An embodiment of the present invention provides a method for data storage, including:
defining a set of scrambling sequences, each sequence including bits in respective bit positions having bit values, such that a distribution of the bit values in any give bit position satisfies a predefined statistical criterion;
scrambling each data word using a respective scrambling sequence selected from the set; and
storing the scrambled data words in the memory device.
In some embodiments, the statistical criterion specifies that half of the bit values in any given bit position are “0” and the other half of the bit values are “1”. In an embodiment, defining the set includes specifying the set to include a group of the scrambling sequences, and respective inverses of the scrambling sequences in the group.
In a disclosed embodiment, specifying the set includes defining a scrambling seed including multiple bits, each combination of values of the bits defining a respective scrambling sequence, adding to the scrambling seed an additional bit, which selects between the respective scrambling sequence and an inverse of the respective scrambling sequence, and generating the scrambling sequences in the set using the scrambling seed, including the additional bit.
There is additionally provided, in accordance with an embodiment of the present invention, a method for data storage, including:
storing in a memory controller at least a part of a scrambling sequence that was used in scrambling a given memory page that is stored in a memory device;
accepting in the memory controller a request to access a specified portion of the given memory page in the memory device; and
in response to the request, accessing the specified portion of the memory page by retrieving a corresponding portion of the scrambling sequence stored in the memory controller, and applying the retrieved portion of the scrambling sequence to the portion of the memory page.
In some embodiments, accessing the portion includes one of reading the portion and writing into the portion. In an embodiment, the scrambling sequence is generated by a sequence generator, storing the part of the scrambling sequence includes storing multiple states of the sequence generator at respective multiple offsets along the scrambling sequence, and accessing the portion includes retrieving a given state of the sequence generator, which corresponds to an offset that is smaller than a beginning of the portion, and causing the sequence generator to generate the scrambling sequence starting from the given offset.
There is also provided, in accordance with an embodiment of the present invention, a method for data storage, including:
encoding data for storage in a memory device using an Error Correction Code (ECC) so as to produce ECC-encoded data;
encoding a scrambling sequence with the ECC so as to produce an ECC-encoded scrambling sequence;
calculating a bit-wise Exclusive Or (XOR) between the ECC-encoded data and the ECC-encoded scrambling sequence so as to produce a result; and
storing the result in the memory device.
In some embodiment, encoding the scrambling sequence includes scrambling the data using two or more candidate scrambling sequences so as to produce respective scrambled data sequences, selecting one of the scrambling sequences based on a condition defined over the scrambled data sequences, and encoding the selected scrambling sequence to produce the ECC-encoded scrambling sequence. In some embodiments, scrambling the data and selecting the scrambling sequence are performed at least partly in parallel to encoding the data with the ECC.
There is further provided, in accordance with an embodiment of the present invention, a method for data storage, including:
scrambling data for storage using a scrambling seed;
encoding both the scrambled data and the scrambling seed using an Error Correction Code (ECC); and
storing the encoded scrambled data and the encoded scrambling seed in a memory.
In some embodiments, the method includes, after storing the data, retrieving the data by reading the encoded scrambled data and the encoded scrambling seed from the memory, decoding the ECC-encoded scrambled data and ECC-encoded scrambling seed read from the memory, and de-scrambling the scrambled data using the decoded scrambling seed. In an embodiment, encoding the scrambled data and the scrambling seed includes producing a single ECC code word that encodes both the scrambled data and the scrambling seed. In a disclosed embodiment, storing the encoded scrambled data and the encoded scrambling seed includes storing both the encoded scrambled data and the encoded scrambling seed in a single memory page.
There is also provided, in accordance with an embodiment of the present invention, apparatus for data storage, including:
an interface, which is configured to communicate with a memory device; and
a processor, which is configured to define a set of scrambling sequences, each sequence including bits in respective bit positions having bit values, such that a distribution of the bit values in any give bit position satisfies a predefined statistical criterion, to scramble each data word using a respective scrambling sequence selected from the set, and to store the scrambled data words in the memory device.
There is further provided, in accordance with an embodiment of the present invention, apparatus for data storage, including:
an interface, which is configured to communicate with a memory device; and
a processor, which is configured to hold at least a part of a scrambling sequence that was used in scrambling a given memory page that is stored in the memory device, to accept a request to access a specified portion of the given memory page in the memory device, and, in response to the request, to access the specified portion of the memory page by retrieving a corresponding portion of the scrambling sequence stored in the memory controller and applying the retrieved portion of the scrambling sequence to the portion of the memory page.
There is additionally provided, in accordance with an embodiment of the present invention, apparatus for data storage, including:
an interface, which is configured to communicate with a memory device; and
a processor, which is configured to encode data for storage in the memory device using an Error Correction Code (ECC) so as to produce ECC-encoded data, to encode a scrambling sequence with the ECC so as to produce an ECC-encoded scrambling sequence, to calculate a bit-wise Exclusive Or (XOR) between the ECC-encoded data and the ECC-encoded scrambling sequence so as to produce a result, and to store the result in the memory device.
There is further provided, in accordance with an embodiment of the present invention, apparatus for data storage, including:
an interface, which is configured to communicate with a memory; and
a processor, which is configured to scramble data for storage in the memory using a scrambling seed, to encode both the scrambled data and the scrambling seed using an Error Correction Code (ECC), and to store the encoded scrambled data and the encoded scrambling seed in a memory.
The present invention will be more fully understood from the following detailed description of the embodiments thereof, taken together with the drawings in which:
Data storage systems sometimes scramble data before storing it in memory. Data scrambling (also referred to as data randomization) can be carried out, for example, by performing a bit-wise Exclusive Or (XOR) between the data and a pseudo-random scrambling sequence. Storage of scrambled data has a number of important advantages, such as elimination of severe and repetitive interference effects, and balancing of data-dependent cell wearing across the memory. Some signal processing schemes, such as adaptive estimation of read thresholds, perform better when operating on scrambled data. Although in some cases the data provided for storage already has random statistical properties (e.g., when storing compressed or encrypted data), in other cases the data may not be sufficiently randomized (e.g., in homogeneous areas of an uncompressed image, or when the data is padded with zeros).
Embodiments of the present invention that are described hereinbelow provide improved methods and systems for data scrambling and de-scrambling in storage applications. The embodiments described herein refer mainly to data scrambling in solid-state memory devices, such as Flash devices, but the disclosed techniques are equally applicable to a wide variety of other storage devices and applications.
Some of these methods relate to generation and manipulation of scrambling seeds, which are used for generating the pseudo-random scrambling sequences. In one disclosed technique, a memory controller encodes the scrambling seed with an Error Correction Code (ECC) together with the scrambled data, and stores the encoded data and seed in the memory. In another disclosed method, the memory controller generates the scrambling seed based on a global counter, which is modified (e.g., incremented) per each programming operation.
In some embodiments, the memory controller assesses the statistical distribution of bit values in the scrambled data, and estimates the level of randomness of the distribution. If the scrambled data is not sufficiently random, the memory controller modifies the scrambling configuration. Several techniques for assessing and improving data randomness are described. For example, the memory controller may operate multiple different scramblers in parallel and select the best-performing scrambler, and/or pad the scrambled data with dummy bits.
In some embodiments, the memory controller uses a balanced set of scrambling sequences. In a balanced set, any given bit position in the sequence has a substantially equal probability of being “0” and “1”, when calculated over the entire set of sequences. The use of a balanced set of scrambling sequences distributes data-dependent wearing evenly among the memory cells, assuming that programming operations applied to a given cell group use different sequences selected from the set. Several techniques for generating and using balanced sets of scrambling sequences are described herein.
Other embodiments that are described herein provide alternative scrambler/de-scrambler configurations, which provide different trade-offs between storage latency and memory size requirements. Yet another disclosed method uses linearity properties of the ECC in order to perform scrambling concurrently with ECC encoding.
System 20 comprises a memory controller 24, which stores data in a memory device 28 and retrieves data stored in the memory device. Memory controller 24 communicates with a host 32, for accepting data for storage in the memory device and for outputting data retrieved from the memory device.
Memory device 28 stores the data received from the memory controller in a memory cell array 36. The memory array comprises multiple analog memory cells 40. In the context of the present patent application and in the claims, the term “analog memory cell” is used to describe any memory cell that holds a continuous, analog value of a physical parameter, such as an electrical voltage or charge. Array 36 may comprise analog memory cells of any kind, such as, for example, NAND, NOR and Charge Trap Flash (CTF) Flash cells, phase change RAM (PRAM, also referred to as Phase Change Memory—PCM), Nitride Read Only Memory (NROM), Ferroelectric RAM (FRAM), magnetic RAM (MRAM) and/or Dynamic RAM (DRAM) cells.
The charge levels stored in the cells and/or the analog voltages or currents written into and read out of the cells are referred to herein collectively as analog values or storage values. Although the embodiments described herein mainly address threshold voltages, the methods and systems described herein may be used with any other suitable kind of storage values.
System 20 stores data in the analog memory cells by programming the cells to assume respective memory states, which are also referred to as programming levels. The programming levels are selected from a finite set of possible levels, and each level corresponds to a certain nominal storage value. For example, a 2 bit/cell MLC can be programmed to assume one of four possible programming levels by writing one of four possible nominal storage values into the cell.
Memory device 28 comprises a reading/writing (R/W) unit 44, which converts data for storage in the memory device to analog storage values and writes them into memory cells 40. In alternative embodiments, the R/W unit does not perform the conversion, but is provided with voltage samples, i.e., with the storage values for storage in the cells. When reading data out of array 36, R/W unit 44 converts the storage values of memory cells 40 into digital samples having a resolution of one or more bits. Data is typically written to and read from the memory cells in groups that are referred to as pages. In some embodiments, the R/W unit can erase a group of cells 40 by applying one or more negative erasure pulses to the cells.
Memory controller 24 comprises a host interface 48 for communicating with host 32. The data accepted from the host is scrambled, or randomized, using a scrambling/de-scrambling unit 52 before it is sent to memory device 28 for storage. Data scrambling is desirable, for example, in order to avoid severe interference scenarios and to balance the wear of memory cells 40. Data retrieved from memory device 28 is de-scrambled by unit 52 before it is provided to the host. The operation of unit 52, as well as several techniques for data scrambling and de-scrambling, are described in detail below.
In some embodiments, memory controller 24 comprises an Error Correction Code (ECC) unit 56, which encodes the data for storage using a suitable ECC and decodes the ECC of data retrieved from the memory. Any suitable type of ECC, such as, for example, Low Density Parity Check (LDPC), Reed-Solomon (RS) or Bose-Chaudhuri-Hocquenghem (BCH), can be used. Memory controller 24 communicates with memory device 28 using a memory interface 60.
Some or all of the elements of memory controller 24, and in particular scrambling/descrambling unit 52, may be implemented in hardware. An example implementation of unit 52 is shown in
The configuration of
In the exemplary system configuration shown in
In some embodiments, memory controller 24 comprises a general-purpose processor, which is programmed in software to carry out the functions described herein. The software may be downloaded to the processor in electronic form, over a network, for example, or it may, alternatively or additionally, be provided and/or stored on tangible media, such as magnetic, optical, or electronic memory.
In an example configuration of array 36, memory cells 40 are arranged in multiple rows and columns, and each memory cell comprises a floating-gate transistor. The gates of the transistors in each row are connected by word lines, and the sources of the transistors in each column are connected by bit lines. The memory array is typically divided into multiple pages, i.e., groups of memory cells that are programmed and read simultaneously. Pages are sometimes sub-divided into sectors. In some embodiments, each page comprises an entire row of the array. In alternative embodiments, each row (word line) can be divided into two or more pages. For example, in some devices each row is divided into two pages, one comprising the odd-order cells and the other comprising the even-order cells. In a typical implementation, a two-bit-per-cell memory device may have four pages per row, a three-bit-per-cell memory device may have six pages per row, and a four-bit-per-cell memory device may have eight pages per row.
Erasing of cells is usually carried out in blocks that contain multiple pages. Typical memory devices may comprise several thousand erasure blocks. In a typical two-bit-per-cell MLC device, each erasure block is on the order of thirty-two word lines, each comprising several thousand cells. Each word line of such a device is often partitioned into four pages (odd/even order cells, least/most significant bit of the cells). Three-bit-per cell devices having thirty-two word lines per erasure block would have 192 pages per erasure block, and four-bit-per-cell devices would have 256 pages per block. Alternatively, other block sizes and configurations can also be used.
Some memory devices comprise two or more separate memory cell arrays, often referred to as planes. Since each plane has a certain “busy” period between successive write operations, data can be written alternately to the different planes in order to increase programming speed.
In the present example, unit 52 produces the scrambling sequence using a Linear Feedback Shift Register (LFSR). Unit 52 comprises an N-bit shift register 64. The content of shift register 64 is shifted one bit to the right in each clock cycle. A XOR gate 68 computes a XOR of a predefined subset of the shift register bits, and the XOR result is fed-back to the shift register input. The output of shift register 64 is used as a scrambling sequence. Given an appropriate selection of feedback taps (i.e., selection of shift register bits to be XOR'ed and fed-back to the input), the scrambling sequence has pseudo-random properties.
A XOR gate 72 calculates bit-wise XOR between an input data sequence and the scrambling sequence, to produce an output data sequence. When unit 52 performs scrambling, the input data comprises data accepted from the host, and the output data comprises scrambled data to be sent to the memory device. When unit 52 performs de-scrambling, the input data comprises scrambled data read from the memory device, and the output data comprises de-scrambled data to be sent to the host.
When unit 52 initiates scrambling or de-scrambling certain data, the memory controller initializes shift register 64 to a certain N-bit initial value, referred to as a seed. The scrambling seed can be viewed as an initial offset along the scrambling sequence, from which the sequence generation begins. Therefore, setting an N-bit seed value can be viewed as selecting a scrambling sequence from a set of 2N possible scrambling sequences. Several methods for generating and manipulating scrambling seeds and sequences are described below.
Typically although not necessarily, a given scrambling sequence originating from a given seed is used for scrambling (or de-scrambling) a memory page. For example, a page having 34,368 bits can be scrambles by bit-wise XOR with a 34,368-bit scrambling sequence. In some embodiments, unit 52 supports a set of K<2N possible seed values. Each seed value causes unit 52 to generate a respective pseudo-random scrambling sequence, which typically has small cross-correlation with the scrambling sequences of the other seed values. In an example embodiment, N=16 and K=127. Alternatively, any other suitable values can also be used.
The configuration of
In the embodiments described herein, scrambling and de-scrambling are performed per memory page. In other words, unit 52 in memory controller 24 scrambles the data of a given memory page using a certain seed, and stores the scrambled data in a certain memory page of device 28. When retrieving the memory page in question, unit 52 de-scrambles the data read from this memory page using the appropriate seed. Alternatively, however, scrambling and de-scrambling can be applied to any other suitable unit of data, such as to erasure blocks or sectors.
In order to de-scramble the data properly, de-scrambling should begin with the same seed used for scrambling the data. In some embodiments, memory controller 24 stores the seed together with the scrambled data in memory device 28. When the data is encoded with ECC prior to storage, the memory controller applies ECC encoding to the seed, as well. When requested to retrieve the data, the memory controller reads the scrambled data and the seed from the memory device, decodes the ECC that encodes both data and seed, and then de-scrambles the retrieved data using the retrieved seed. Using this scheme, de-scrambling is performed using the same seed used for scrambling. Since the seed is also encoded with ECC, it is provided the same level of reliability and error-resilience as the data.
When retrieving the data, the memory controller performs the operations of
Note that in the scheme of
In some embodiments, the memory controller uses a given scrambling seed per erasure block rather than per page. In an example embodiment, the memory controller changes the seed of a given block each time the block is erased. The memory controller may store the currently-used seed in memory device 28, either in the corresponding block or separately. When erasing a given block, the memory controller may read the currently-used seed, specify a different seed for subsequent programming in that block, and store the new seed. In these embodiments, scrambling can still be performed per-page, with a different seed for each page in the block. For example, the seed assigned to a particular page in the block can be derived from the block's seed through some predefined relation (e.g. a function of the block seed and the page address).
In many memory devices, it is desirable that different programming operations to a given physical location (e.g., physical memory page) will use different scrambling seeds. In particular, it is desirable that different programming operations to a given physical location will use the different possible seed values approximately evenly. Varying the scrambling seed in different programming operations to the same physical location balances the wear of the memory cells at this location. As a result, the variance of the cells' analog storage values (e.g., threshold voltages or charge levels) is reduced, and readout performance is improved.
In some embodiments, memory controller 24 derives the seed value from a global counter, which is incremented (modulo K, which is a prime number) per each programming operation carried out by the memory controller. This scheme causes, with high likelihood, different programming operations to the same physical page to be performed with different seed values. Note that the global counter is associated with the memory controller, and not necessarily with the memory device. Thus, when memory controller 24 controls multiple memory devices 28 (e.g., different devices and/or different dies or planes in the same device), the global counter is incremented per each programming operation applied to any of these devices. As a result, the likelihood of using different seeds in different programming operations is further increased.
When preparing to program a page, the memory controller selects a scrambling seed for this page based on the global counter value, at a seed selection step 104. For example, the memory controller may select the seed value using the following operations:
seed_counter=(seed_counter+1)mod 127;
seed_index=(wordline_index*15+seed_counter)mod 128;
seed=seed_table[seed_index];
wherein seed_counter denotes the global counter, seed_table denotes a table holding 128 possible seed values, seed_index denotes the index of the selected seed, wordline_index denotes the index of the word line (an example of a physical location) in which the page is to be stored, and seed denotes the selected seed value extracted from seed_table.
Having selected a seed value for programming the next page, memory controller 24 scrambles the page using the selected seed value, at a page scrambling step 108. Typically, unit 52 in the memory controller generates a scrambling sequence using the selected seed value, and scrambles the page data using the scrambling sequence. The memory controller then stores the scrambled page at the desired location in memory device 28, at a programming step 112. Memory controller 24 increments the global counter (modulo K), at a counter incrementing step 116. The method then loops back to step 104 above, in which the memory controller selects a seed value for the next page to be programmed based on the new global counter value.
In the description above, the global counter is incremented per each programming operation performed by the memory controller. In alternative embodiments, however, the global counter can be decremented or otherwise modified in response to the respective programming operations performed by the memory controller.
In some embodiments, after scrambling a given page, memory controller 24 assesses the statistical distribution of the bit values in the scrambled page, and estimates the level of randomness of the distribution. The memory controller verifies whether the randomness meets a certain expected level. If not, the memory controller modifies the scrambling configuration in order to increase the randomness in the page. In some embodiments, the scrambling configuration may be modified more than once, e.g., until reaching a satisfactory level of randomness.
In some embodiments, memory controller 24 assesses the level of randomness (at step 128) by comparing the number of “0” and “1” bit values in the scrambled page. If the number of “0” bit values is similar to the number of “1” bit values, the page is regarded as scrambled with sufficient randomness, and vice versa. For example, the memory controller may set a threshold on the difference between the number of “0” and “1” bit values in the scrambled page. If the difference is smaller than the threshold the page is regarded as sufficiently random, and vice versa. Alternatively, the memory controller may use any other technique or logic for assessing the randomness in the scrambled page.
Upon detecting an insufficiently-random page, the memory controller may modify the scrambling scheme (at step 136) in various ways. For example, the memory controller may add one or more dummy bits to the scrambled data, in order to reduce the difference between the number of “0” and “1” bit values. In an example embodiment, a group of dummy bits (e.g., sixteen bits) is assigned for this purpose in each page. The memory controller can set these bits to any desired value, in order to eliminate (or at least reduce) the difference between the total number of “0” and “1” bit values in the page. (Note that dummy bits can be added to the data regardless of whether the level of randomness is considered sufficient or not. For example, the memory controller may add dummy bits in every page, unconditionally. Unconditional addition of dummy bits is especially suitable for implementations in which a portion of the page is assigned to dummy bits and is not used for other purposes.)
As another example, upon detecting an insufficiently-random page, the memory controller may select a different scrambling seed and re-scramble the page using the new seed. In some embodiments, the memory controller may change the seed until a certain satisfactory randomness level is reached. Alternatively, the memory controller may scramble the page multiple times using different candidate seed values, and select the seed value that provides the best randomness. In these embodiments, the memory controller may comprise multiple scrambling/de-scrambling units (e.g., unit 52 of
As yet another example, the memory controller may balance the number of “0” and “1” bit values in the page by dividing the page data into multiple sections, scrambling one or more sections using the scrambling sequence generated by the selected seed, and scrambling the remaining (one or more) sections using an inverse of this scrambling sequence. (In the present context, an inverse of a sequence is produced by flipping the bit values of the sequence, replacing “1” with “0” and vice versa.) Typically, if a given scrambling sequence causes a certain imbalance in the number of “0” and “1” bit values, the inverse of this sequence is likely to cause the opposite effect. Thus scrambling part of the page with a certain scrambling sequence, and another part with the inverse of this sequence, can improve the balance of “0” and “1” bit values. Typically, the memory controller stores information regarding the scrambling sequence polarity (i.e., whether scrambling was performed using the sequence or its inverse) in each section together with the scrambled data.
In some embodiments, the memory controller may decide whether to scramble each section with the sequence or its inverse in a progressive manner. In these embodiments, the memory controller typically scrambles the first section using the sequence, checks whether the data scrambled so far is balanced, and accordingly decides whether to use the sequence or its inverse in the next section.
When intending to scramble a given section, the memory controller typically attempts both possibilities (the sequence or its inverse) and selects the best-performing option. In other words, the memory controller scrambles the current section with the scrambling sequence, and then assesses the balance (randomness) of the data scrambled so far (including the previous sections and the current section). The memory controller then scrambles the current section using the inverse of the scrambling sequence, and again assesses the balance of the data scrambled so far, including the current section. The memory selects whether to scramble the current section using the sequence or its inverse based on the two assessments.
The progressive selection process described above is not limited to the use of a sequence and its inverse. For example, the memory controller may hold a set of section-size candidate scrambling sequences (or corresponding seeds). At each stage, the memory controller selects one of the candidate seeds for scrambling the next section. The selected seed is the one that, once applied to the current section, causes the entire data scrambled so far to have the highest level of randomness.
In some embodiments, the memory controller may combine two or more of the above-described balancing mechanisms. For example, the memory controller may run several scramblers in parallel and select the best-performing scrambling sequence. Then, if the selected sequence does not balance the “0” and “1” bit values completely, the memory controller can insert one or more dummy bits in order to eliminate the residual imbalance.
Additionally or alternatively, the memory controller may use any other suitable method for assessing the statistical distribution of bit values in the scrambled data, assessing the level of randomness of the distribution, and modifying the scrambling configuration if necessary. In some embodiments, the memory controller may modify the scrambling configuration more than once, using any of the techniques described above. For example, after performing scrambling modification step 136 of
The above description refers mainly to Single-Level Cell (SLC) memory, in which each memory cell stores a single data bit. Many memory systems, however, use Multi-Level Cells (MLC), each storing P≧2 bits in multiple memory states. Typically, in a group of memory cells, different MLC bits are associated with different memory pages. For example, in an eight-level 3 bits/cell memory, the Least Significant Bits (LSB) of a given memory cell group store one page, the Center Significant Bits (CSB) store another page, and the Most Significant Bits (MSB) store a third page.
In MLC devices, the randomness requirement can be generalized to a requirement that the number of memory cells programmed to each memory state (i.e., to a specific combination of P bit values) be approximately the same after scrambling. Balancing the number of “0” and “1” bit values separately in each page, however, does not guarantee that the MLC memory states are balanced. In some embodiments, the memory controller checks whether the above-mentioned MLC balancing requirement holds for a given group of multi-level cells (e.g., a word line). If not, the memory controller modifies the scrambling configuration, so as to balance the number of memory cells corresponding to the different programming states.
In some embodiments, the memory controller selects the scrambling seeds for pages mapped to different MLC bits (e.g., for the LSB, CSB and MSB pages of a 3 bits/cell word line) from disjoint sets of candidate seeds. This feature helps to distribute the number of memory cells in the word line approximately evenly among the different memory states. This sort of selection avoids scenarios in which two or more pages in the same word line are scrambled with the same seed, a scenario that causes uneven distribution among memory states.
As explained above with respect to
Consider, for example, a memory system that uses a 7-bit seed, i.e., a set of 128 scrambling sequences. The length of each sequence is denoted L, which also denotes the number of data bits in each page. In order to ensure uniform wear of memory cells, it is desirable that the ith bit in the scrambling sequence will be “0” in 50% of the scrambling sequences and “1” in the other 50%. This condition should be met for all i, i=1 . . . L. Otherwise, a memory cell that stores the ith bits of the different scrambling sequences, and another memory cell that stores the jth bits of the different scrambling sequences, may have different probabilities of assuming “0” or “1” values.
In order to meet the above-described condition, in some embodiments memory controller 24 uses a balanced set of L-bit scrambling sequences. The set is balanced by defining the scrambling sequences such that the distribution of the bit values in any given bit position satisfies a predefined statistical criterion. In a typical embodiment, the criterion specifies that for any 1≦i≦L, the ith bit in the sequence is “0” in half of the scrambling sequences, and is “1” in the other half. The balancing criterion can be somewhat relaxed by specifying that the ith bit in the sequence is “0” in a predefined portion of the scrambling sequences, which may deviate from 50%. For example, a set of scrambling sequences in which (for any i) the ith bit in the sequence is “0” in i 40%-60% of the sequences can also be regarded as a balanced set of sequences. Further alternatively, any other suitable statistical criterion can also be used.
In some embodiments, the memory controller produces a balanced set of scrambling sequences by adding another bit to the seed value. The additional bit (denoted “flip-bit”) indicates to unit 52 whether scrambling is to be performed using the scrambling sequence or using its inverse. Thus, the flip-bit mechanism is equivalent to doubling the set of scrambling sequences, by adding the inverse of each scrambling sequence to the set. For example, adding an eighth flip-bit to the above-described 7-bit seed would double the set of scrambling sequences from 128 to 256. Since the ith bit in a given sequence is by-definition the opposite of the ith bit in the corresponding inverse sequence, the flip-bit mechanism causes the set of sequences to be balanced. In alternative embodiments, memory controller 24 may use any other suitable mechanism for generating a balanced set of scrambling sequences.
(The statistical properties of the scrambling sequences are especially important when the data provided for storage is not sufficiently randomized, e.g., in homogeneous areas of an uncompressed image, or when the data is padded with zeros. In these cases, the statistics of the scrambled data is determined by the statistics of the scrambling sequence. When the data provided for storage already has random statistical properties, e.g., when storing compressed or encrypted data, the statistics of the scrambled data will usually be random regardless of the statistics of the scrambling sequence.)
Unit 52 generates a scrambling sequence using the seed provided at step 140, at a sequence generation step 144. Unit 52 checks whether the flip-bit provided at step 140 equals “0” or “1”, at a flip-bit checking step 148. If the flip-bit equals “0”, unit 52 scrambles the page using the scrambling sequence generated at step 144 above, without reversing the sequence, at a scrambling step 152. Otherwise, i.e., if the flip-bit equals “1”, unit 52 flips (i.e., negates or reverses) the bits of the scrambling sequence, at a sequence inversing step 156. Unit 52 then scrambles the page using the inverse scrambling sequence, at scrambling step 152. Typically, the value of the flip-bit is stored (usually as part of the seed) with the page data in memory device 28, in order to enable correct de-scrambling.
Note that in the description above a flip-bit value of “0” indicates that no inversing is to be performed, and “1” indicates that the inverse sequence is to be used. This choice, however, is made purely by way of example. In alternative embodiments, any other mechanism can be used to indicate to unit 52 whether to use the scrambling sequence or its inverse. The description above referred to scrambling of memory pages. Generally, however, any other type of L-bit data words can be scrambled using this method.
As explained with respect to
In the configuration of
In some embodiments, memory controller 24 stores a previously-generated copy of a scrambling sequence in memory, instead of generating the sequence serially during programming or readout. The sequence can be stored in a suitable on-chip memory of the memory controller, such as in a Look-Up Table (LUT). When performing a random access (read or write) of a partial part of a page, the memory controller can retrieve the corresponding part of the scrambling sequence from the LUT, and thus perform scrambling or de-scrambling using only the relevant part of the scrambling sequence without unnecessary delay. This technique can be applied to any desired number of scrambling sequences.
In order to scramble or de-scramble the data of the part of the page being written or read, the memory controller accesses the LUT at the relevant offset, at a sequence access step 168. The memory controller retrieves the relevant part of the scrambling sequence (the part that corresponds to the part of the page being read or written), without a need to generate the sequence from the beginning. The memory controller then scrambles or de-scrambles the data using the retrieved part of the scrambling sequence.
The method of
For example, consider a scenario in which the memory controller stores the LFST state at offsets 0, 100, 200, 300 . . . in the scrambling sequence. If the memory controller is requested to perform random write starting at an offset of 214 bits in the page, the memory controller initializes shift register 64 with the state of offset 200, and then runs the shift register for 14 clock cycles. As can be appreciated, this technique trades-off memory size for latency. Storing the LFSR state at more offset values increases the required memory size, but enables reaching any desired offset at fewer clock cycles.
As explained with respect to
When the ECC used in system 20 is linear, the scrambling and ECC encoding tasks can be separated and parallelized. For a linear ECC, the scrambling and ECC encoding operation can be re-written as
ECC(DATA XOR SCRAMBLINGSEQ)=(ECC(DATA)XOR ECC(SCRAMBLINGSEQ))
wherein DATA denotes the page data, SCRAMBLINGSEQ denotes a scrambling sequence, and ECC( ) denotes the ECC encoding operation.
In other words, instead of scrambling the data and then encoding the scrambled data, it is possible to encode the un-scrambled data, separately encode the scrambling sequence, and then calculate a bit-wise XOR between the encoded data and the encoded scrambling sequence. Memory controller 24 may use this equivalence to reduce the total latency of the scrambling and ECC encoding process.
In some embodiments, the memory controller encodes the different possible scrambling sequences with ECC, and stores the encoded scrambling sequences for future use. The terms (ECC(SCRAMBLINGSEQ)) are data-independent. When receiving a data page for storage, the memory controller encodes the page data with ECC (i.e., produces ECC(DATA)) irrespective of scrambling. At least partially in parallel, the memory controller scrambles the data with the different scrambling sequences and identifies the best-performing scrambling sequence. Then, the memory controller calculates the XOR between ECC(DATA) and the previously-stored ECC(SCRAMBLINGSEQ) of the selected scrambling sequence. Since ECC encoding of the data is performed in parallel to scrambling, the overall storage latency is reduced.
At the end of step 178, the memory controller has computed ECC(DATA) and has selected the scrambling sequence producing the best randomness. The memory controller calculates a XOR between ECC(DATA) and the pre-computed ECC of the selected scrambling sequence (ECC(SCRAMBLINGSEQ)), at a XOR step 182. The result of step 182 is equivalent to ECC(DATA XOR SCRAMBLINGSEQ), i.e., the ECC of the data after scrambling with the optimum scrambling sequence. The memory controller stores this result in memory device 28, at a result storage step 186.
Although the embodiments described herein mainly address data scrambling for storage in non-volatile solid state memory devices, the methods and systems described herein can also be used for storage in other types of memory devices, such as Hard Disk Drives (HDD).
It will thus be appreciated that the embodiments described above are cited by way of example, and that the present invention is not limited to what has been particularly shown and described hereinabove. Rather, the scope of the present invention includes both combinations and sub-combinations of the various features described hereinabove, as well as variations and modifications thereof which would occur to persons skilled in the art upon reading the foregoing description and which are not disclosed in the prior art.
This application claims the benefit of U.S. Provisional Patent Application 61/109,767, filed Oct. 30, 2008, and U.S. Provisional Patent Application 61/115,085, filed Nov. 16, 2008, whose disclosures are incorporated herein by reference. This application is related to a U.S. patent application entitled “Data Scrambling in Memory Devices,” filed on even date, which is assigned to the assignee of the present patent application and whose disclosure is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
3668631 | Griffith et al. | Jun 1972 | A |
3668632 | Oldham | Jun 1972 | A |
4058851 | Scheuneman | Nov 1977 | A |
4112502 | Scheuneman | Sep 1978 | A |
4394763 | Nagano et al. | Jul 1983 | A |
4413339 | Riggle et al. | Nov 1983 | A |
4556961 | Iwahashi et al. | Dec 1985 | A |
4558431 | Satoh | Dec 1985 | A |
4608687 | Dutton | Aug 1986 | A |
4654847 | Dutton | Mar 1987 | A |
4661929 | Aoki et al. | Apr 1987 | A |
4768171 | Tada | Aug 1988 | A |
4811285 | Walker et al. | Mar 1989 | A |
4899342 | Potter et al. | Feb 1990 | A |
4910706 | Hyatt | Mar 1990 | A |
4993029 | Galbraith et al. | Feb 1991 | A |
5056089 | Mehrotta et al. | Oct 1991 | A |
5077722 | Geist et al. | Dec 1991 | A |
5126808 | Montalvo et al. | Jun 1992 | A |
5163021 | Mehrotra et al. | Nov 1992 | A |
5172338 | Mehrotra et al. | Dec 1992 | A |
5182558 | Mayo | Jan 1993 | A |
5182752 | DeRoo et al. | Jan 1993 | A |
5191584 | Anderson | Mar 1993 | A |
5200959 | Gross et al. | Apr 1993 | A |
5237535 | Mielke et al. | Aug 1993 | A |
5272669 | Samachisa et al. | Dec 1993 | A |
5276649 | Hoshita et al. | Jan 1994 | A |
5287469 | Tsuboi | Feb 1994 | A |
5365484 | Cleveland et al. | Nov 1994 | A |
5388064 | Khan | Feb 1995 | A |
5416646 | Well et al. | May 1995 | A |
5416782 | Wells et al. | May 1995 | A |
5446854 | Khalidi et al. | Aug 1995 | A |
5450424 | Okugaki et al. | Sep 1995 | A |
5469444 | Endoh et al. | Nov 1995 | A |
5473753 | Wells et al. | Dec 1995 | A |
5479170 | Cauwenberghs et al. | Dec 1995 | A |
5508958 | Fazio et al. | Apr 1996 | A |
5519831 | Holzhammer | May 1996 | A |
5532962 | Auclair et al. | Jul 1996 | A |
5533190 | Binford et al. | Jul 1996 | A |
5541886 | Hasbun | Jul 1996 | A |
5600677 | Citta et al. | Feb 1997 | A |
5638320 | Wong et al. | Jun 1997 | A |
5657332 | Auclair et al. | Aug 1997 | A |
5675540 | Roohparvar | Oct 1997 | A |
5682352 | Wong et al. | Oct 1997 | A |
5687114 | Khan | Nov 1997 | A |
5696717 | Koh | Dec 1997 | A |
5726649 | Tamaru et al. | Mar 1998 | A |
5726934 | Tran et al. | Mar 1998 | A |
5742752 | De Koening | Apr 1998 | A |
5748533 | Dunlap et al. | May 1998 | A |
5748534 | Dunlap et al. | May 1998 | A |
5751637 | Chen et al. | May 1998 | A |
5761402 | Kaneda et al. | Jun 1998 | A |
5798966 | Keeney | Aug 1998 | A |
5799200 | Brant et al. | Aug 1998 | A |
5801985 | Roohparvar et al. | Sep 1998 | A |
5838832 | Barnsley | Nov 1998 | A |
5860106 | Domen et al. | Jan 1999 | A |
5867114 | Barbir | Feb 1999 | A |
5867428 | Ishii et al. | Feb 1999 | A |
5867429 | Chen et al. | Feb 1999 | A |
5877986 | Harari et al. | Mar 1999 | A |
5889937 | Tamagawa | Mar 1999 | A |
5901089 | Korsh et al. | May 1999 | A |
5909449 | So et al. | Jun 1999 | A |
5912906 | Wu et al. | Jun 1999 | A |
5930167 | Lee et al. | Jul 1999 | A |
5937424 | Leak et al. | Aug 1999 | A |
5942004 | Cappelletti | Aug 1999 | A |
5946716 | Karp et al. | Aug 1999 | A |
5969986 | Wong et al. | Oct 1999 | A |
5982668 | Ishii et al. | Nov 1999 | A |
5991517 | Harari et al. | Nov 1999 | A |
5995417 | Chen et al. | Nov 1999 | A |
6009014 | Hollmer et al. | Dec 1999 | A |
6009016 | Ishii et al. | Dec 1999 | A |
6023425 | Ishii et al. | Feb 2000 | A |
6034891 | Norman | Mar 2000 | A |
6040993 | Chen et al. | Mar 2000 | A |
6041430 | Yamauchi | Mar 2000 | A |
6073204 | Lakhani et al. | Jun 2000 | A |
6101614 | Gonzales et al. | Aug 2000 | A |
6128237 | Shirley et al. | Oct 2000 | A |
6134140 | Tanaka et al. | Oct 2000 | A |
6134143 | Norman | Oct 2000 | A |
6134631 | Jennings | Oct 2000 | A |
6141261 | Patti | Oct 2000 | A |
6151246 | So et al. | Nov 2000 | A |
6157573 | Ishii et al. | Dec 2000 | A |
6166962 | Chen et al. | Dec 2000 | A |
6169691 | Pasotti et al. | Jan 2001 | B1 |
6178466 | Gilbertson et al. | Jan 2001 | B1 |
6185134 | Tanaka et al. | Feb 2001 | B1 |
6209113 | Roohparvar | Mar 2001 | B1 |
6212654 | Lou et al. | Apr 2001 | B1 |
6219276 | Parker | Apr 2001 | B1 |
6219447 | Lee et al. | Apr 2001 | B1 |
6222762 | Guterman et al. | Apr 2001 | B1 |
6230233 | Lofgren et al. | May 2001 | B1 |
6240458 | Gilbertson | May 2001 | B1 |
6259627 | Wong | Jul 2001 | B1 |
6275419 | Guterman et al. | Aug 2001 | B1 |
6278632 | Chevallier | Aug 2001 | B1 |
6279069 | Robinson et al. | Aug 2001 | B1 |
6288944 | Kawamura | Sep 2001 | B1 |
6292394 | Cohen et al. | Sep 2001 | B1 |
6301151 | Engh et al. | Oct 2001 | B1 |
6304486 | Yano | Oct 2001 | B1 |
6307776 | So et al. | Oct 2001 | B1 |
6314044 | Sasaki et al. | Nov 2001 | B1 |
6317363 | Guterman et al. | Nov 2001 | B1 |
6317364 | Guterman et al. | Nov 2001 | B1 |
6345004 | Omura et al. | Feb 2002 | B1 |
6360346 | Miyauchi et al. | Mar 2002 | B1 |
6363008 | Wong | Mar 2002 | B1 |
6363454 | Lakhani et al. | Mar 2002 | B1 |
6366496 | Torelli et al. | Apr 2002 | B1 |
6385092 | Ishii et al. | May 2002 | B1 |
6392932 | Ishii et al. | May 2002 | B1 |
6396742 | Korsh et al. | May 2002 | B1 |
6397364 | Barkan | May 2002 | B1 |
6405323 | Lin et al. | Jun 2002 | B1 |
6405342 | Lee | Jun 2002 | B1 |
6418060 | Yong et al. | Jul 2002 | B1 |
6442585 | Dean et al. | Aug 2002 | B1 |
6445602 | Kokudo et al. | Sep 2002 | B1 |
6452838 | Ishii et al. | Sep 2002 | B1 |
6456528 | Chen | Sep 2002 | B1 |
6466476 | Wong et al. | Oct 2002 | B1 |
6467062 | Barkan | Oct 2002 | B1 |
6469931 | Ban et al. | Oct 2002 | B1 |
6480948 | Virajpet et al. | Nov 2002 | B1 |
6490236 | Fukuda et al. | Dec 2002 | B1 |
6522580 | Chen et al. | Feb 2003 | B2 |
6525952 | Araki et al. | Feb 2003 | B2 |
6532556 | Wong et al. | Mar 2003 | B1 |
6538922 | Khalid et al. | Mar 2003 | B1 |
6558967 | Wong | Mar 2003 | B1 |
6549464 | Tanaka et al. | Apr 2003 | B2 |
6553510 | Pekny | Apr 2003 | B1 |
6560152 | Cernea | May 2003 | B1 |
6567311 | Ishii et al. | May 2003 | B2 |
6577539 | Iwahashi | Jun 2003 | B2 |
6584012 | Banks | Jun 2003 | B2 |
6615307 | Roohparvar | Sep 2003 | B1 |
6621739 | Gonzales et al. | Sep 2003 | B2 |
6640326 | Buckingham et al. | Oct 2003 | B1 |
6643169 | Rudelic et al. | Nov 2003 | B2 |
6646913 | Micheloni et al. | Nov 2003 | B2 |
6678192 | Gongwer et al. | Jan 2004 | B2 |
6683811 | Ishii et al. | Jan 2004 | B2 |
6687155 | Nagasue | Feb 2004 | B2 |
6707748 | Lin et al. | Mar 2004 | B2 |
6708257 | Bao | Mar 2004 | B2 |
6714449 | Khalid | Mar 2004 | B2 |
6717847 | Chen | Apr 2004 | B2 |
6731557 | Beretta | May 2004 | B2 |
6732250 | Durrant | May 2004 | B2 |
6738293 | Iwahashi | May 2004 | B1 |
6751766 | Guterman et al. | Jun 2004 | B2 |
6757193 | Chen et al. | Jun 2004 | B2 |
6774808 | Hibbs et al. | Aug 2004 | B1 |
6781877 | Cernea et al. | Aug 2004 | B2 |
6804805 | Rub | Oct 2004 | B2 |
6807095 | Chen et al. | Oct 2004 | B2 |
6807101 | Ooishi et al. | Oct 2004 | B2 |
6809964 | Moschopoulos et al. | Oct 2004 | B2 |
6819592 | Noguchi et al. | Nov 2004 | B2 |
6829167 | Tu et al. | Dec 2004 | B2 |
6845052 | Ho et al. | Jan 2005 | B1 |
6851018 | Wyatt et al. | Feb 2005 | B2 |
6851081 | Yamamoto | Feb 2005 | B2 |
6856546 | Guterman et al. | Feb 2005 | B2 |
6862218 | Guterman et al. | Mar 2005 | B2 |
6870767 | Rudelic et al. | Mar 2005 | B2 |
6870773 | Noguchi et al. | Mar 2005 | B2 |
6873552 | Ishii et al. | Mar 2005 | B2 |
6879520 | Hosono et al. | Apr 2005 | B2 |
6882567 | Wong | Apr 2005 | B1 |
6894926 | Guterman et al. | May 2005 | B2 |
6907497 | Hosono et al. | Jun 2005 | B2 |
6925009 | Noguchi et al. | Aug 2005 | B2 |
6930925 | Guo et al. | Aug 2005 | B2 |
6934188 | Roohparvar | Aug 2005 | B2 |
6937511 | Hsu et al. | Aug 2005 | B2 |
6958938 | Noguchi et al. | Oct 2005 | B2 |
6963505 | Cohen | Nov 2005 | B2 |
6972993 | Conley et al. | Dec 2005 | B2 |
6988175 | Lasser | Jan 2006 | B2 |
6992932 | Cohen | Jan 2006 | B2 |
6999344 | Hosono et al. | Feb 2006 | B2 |
7002843 | Guterman et al. | Feb 2006 | B2 |
7006379 | Noguchi et al. | Feb 2006 | B2 |
7012835 | Gonzales et al. | Mar 2006 | B2 |
7020017 | Chen et al. | Mar 2006 | B2 |
7023735 | Ban et al. | Apr 2006 | B2 |
7031210 | Park et al. | Apr 2006 | B2 |
7031214 | Tran | Apr 2006 | B2 |
7031216 | You | Apr 2006 | B2 |
7039846 | Hewitt et al. | May 2006 | B2 |
7042766 | Wang et al. | May 2006 | B1 |
7054193 | Wong | May 2006 | B1 |
7054199 | Lee et al. | May 2006 | B2 |
7057958 | So et al. | Jun 2006 | B2 |
7065147 | Ophir et al. | Jun 2006 | B2 |
7068539 | Guterman et al. | Jun 2006 | B2 |
7071849 | Zhang | Jul 2006 | B2 |
7072222 | Ishii et al. | Jul 2006 | B2 |
7079555 | Baydar et al. | Jul 2006 | B2 |
7088615 | Guterman et al. | Aug 2006 | B2 |
7099194 | Tu et al. | Aug 2006 | B2 |
7102924 | Chen et al. | Sep 2006 | B2 |
7113432 | Mokhlesi | Sep 2006 | B2 |
7130210 | Bathul et al. | Oct 2006 | B2 |
7139192 | Wong | Nov 2006 | B1 |
7139198 | Guterman et al. | Nov 2006 | B2 |
7145805 | Ishii et al. | Dec 2006 | B2 |
7151692 | Wu | Dec 2006 | B2 |
7158058 | Yu | Jan 2007 | B1 |
7170781 | So et al. | Jan 2007 | B2 |
7170802 | Cernea et al. | Jan 2007 | B2 |
7173859 | Hemink | Feb 2007 | B2 |
7177184 | Chen | Feb 2007 | B2 |
7177195 | Gonzales et al. | Feb 2007 | B2 |
7177199 | Chen et al. | Feb 2007 | B2 |
7177200 | Ronen et al. | Feb 2007 | B2 |
7184338 | Nakagawa et al. | Feb 2007 | B2 |
7187195 | Kim | Mar 2007 | B2 |
7187592 | Guterman et al. | Mar 2007 | B2 |
7190614 | Wu | Mar 2007 | B2 |
7193898 | Cernea | Mar 2007 | B2 |
7193921 | Choi et al. | Mar 2007 | B2 |
7196644 | Anderson et al. | Mar 2007 | B1 |
7196928 | Chen | Mar 2007 | B2 |
7196933 | Shibata | Mar 2007 | B2 |
7197594 | Raz et al. | Mar 2007 | B2 |
7200062 | Kinsely et al. | Apr 2007 | B2 |
7210077 | Brandenberger et al. | Apr 2007 | B2 |
7221592 | Nazarian | May 2007 | B2 |
7224613 | Chen et al. | May 2007 | B2 |
7231474 | Helms et al. | Jun 2007 | B1 |
7231562 | Ohlhoff et al. | Jun 2007 | B2 |
7243275 | Gongwer et al. | Jul 2007 | B2 |
7254690 | Rao | Aug 2007 | B2 |
7254763 | Aadsen et al. | Aug 2007 | B2 |
7257027 | Park | Aug 2007 | B2 |
7259987 | Chen et al. | Aug 2007 | B2 |
7266026 | Gongwer et al. | Sep 2007 | B2 |
7266069 | Chu | Sep 2007 | B2 |
7269066 | Nguyen et al. | Sep 2007 | B2 |
7272757 | Stocken | Sep 2007 | B2 |
7274611 | Roohparvar | Sep 2007 | B2 |
7277355 | Tanzana | Oct 2007 | B2 |
7280398 | Lee et al. | Oct 2007 | B1 |
7280409 | Misumi et al. | Oct 2007 | B2 |
7280415 | Hwang et al. | Oct 2007 | B2 |
7283399 | Ishii et al. | Oct 2007 | B2 |
7289344 | Chen | Oct 2007 | B2 |
7301807 | Khalid et al. | Nov 2007 | B2 |
7301817 | Li et al. | Nov 2007 | B2 |
7308525 | Lasser et al. | Dec 2007 | B2 |
7310255 | Chan | Dec 2007 | B2 |
7310269 | Shibata | Dec 2007 | B2 |
7310271 | Lee | Dec 2007 | B2 |
7310272 | Mokhlesi et al. | Dec 2007 | B1 |
7310347 | Lasser | Dec 2007 | B2 |
7312727 | Feng et al. | Dec 2007 | B1 |
7321509 | Chen et al. | Jan 2008 | B2 |
7328384 | Kulkarni et al. | Feb 2008 | B1 |
7342831 | Mokhlesi et al. | Mar 2008 | B2 |
7343330 | Boesjes et al. | Mar 2008 | B1 |
7345924 | Nguyen et al. | Mar 2008 | B2 |
7345928 | Li | Mar 2008 | B2 |
7349263 | Kim et al. | Mar 2008 | B2 |
7356755 | Fackenthal | Apr 2008 | B2 |
7363420 | Lin et al. | Apr 2008 | B2 |
7365671 | Anderson | Apr 2008 | B1 |
7388781 | Litsyn et al. | Jun 2008 | B2 |
7397697 | So et al. | Jul 2008 | B2 |
7405974 | Yaoi et al. | Jul 2008 | B2 |
7405979 | Ishii et al. | Jul 2008 | B2 |
7408804 | Hemink et al. | Aug 2008 | B2 |
7408810 | Aritome et al. | Aug 2008 | B2 |
7409473 | Conley et al. | Aug 2008 | B2 |
7409623 | Baker et al. | Aug 2008 | B2 |
7420847 | Li | Sep 2008 | B2 |
7433231 | Aritome | Oct 2008 | B2 |
7433697 | Karaoguz et al. | Oct 2008 | B2 |
7434111 | Sugiura et al. | Oct 2008 | B2 |
7437498 | Ronen | Oct 2008 | B2 |
7440324 | Mokhlesi | Oct 2008 | B2 |
7440331 | Hemink | Oct 2008 | B2 |
7441067 | Gorobetz et al. | Oct 2008 | B2 |
7447970 | Wu et al. | Nov 2008 | B2 |
7450421 | Mokhlesi et al. | Nov 2008 | B2 |
7453737 | Ha | Nov 2008 | B2 |
7457163 | Hemink | Nov 2008 | B2 |
7457897 | Lee et al. | Nov 2008 | B1 |
7460410 | Nagai et al. | Dec 2008 | B2 |
7460412 | Lee et al. | Dec 2008 | B2 |
7466592 | Mitani et al. | Dec 2008 | B2 |
7468907 | Kang et al. | Dec 2008 | B2 |
7468911 | Lutze et al. | Dec 2008 | B2 |
7469049 | Feng | Dec 2008 | B1 |
7471581 | Tran et al. | Dec 2008 | B2 |
7483319 | Brown | Jan 2009 | B2 |
7487329 | Hepkin et al. | Feb 2009 | B2 |
7487394 | Forhan et al. | Feb 2009 | B2 |
7492641 | Hosono et al. | Feb 2009 | B2 |
7508710 | Mokhlesi | Mar 2009 | B2 |
7526711 | Orio | Apr 2009 | B2 |
7539061 | Lee | May 2009 | B2 |
7539062 | Doyle | May 2009 | B2 |
7551492 | Kim | Jun 2009 | B2 |
7558109 | Brandman et al. | Jul 2009 | B2 |
7558839 | McGovern | Jul 2009 | B1 |
7568135 | Cornwell et al. | Jul 2009 | B2 |
7570520 | Kamei et al. | Aug 2009 | B2 |
7574555 | Porat et al. | Aug 2009 | B2 |
7590002 | Mokhlesi et al. | Sep 2009 | B2 |
7593259 | Kim et al. | Sep 2009 | B2 |
7594093 | Kancherla | Sep 2009 | B1 |
7596707 | Vemula | Sep 2009 | B1 |
7609787 | Jahan et al. | Oct 2009 | B2 |
7613043 | Cornwell et al. | Nov 2009 | B2 |
7616498 | Mokhlesi et al. | Nov 2009 | B2 |
7619918 | Aritome | Nov 2009 | B2 |
7631245 | Lasser | Dec 2009 | B2 |
7633798 | Sarin et al. | Dec 2009 | B2 |
7633802 | Mokhlesi | Dec 2009 | B2 |
7639532 | Roohparvar et al. | Dec 2009 | B2 |
7644347 | Alexander et al. | Jan 2010 | B2 |
7656734 | Thorp et al. | Feb 2010 | B2 |
7660158 | Aritome | Feb 2010 | B2 |
7660183 | Ware et al. | Feb 2010 | B2 |
7661000 | Ueda et al. | Feb 2010 | B2 |
7661054 | Huffman et al. | Feb 2010 | B2 |
7665007 | Yang et al. | Feb 2010 | B2 |
7680987 | Clark et al. | Mar 2010 | B1 |
7733712 | Walston et al. | Jun 2010 | B1 |
7742351 | Inoue et al. | Jun 2010 | B2 |
7761624 | Karamcheti et al. | Jul 2010 | B2 |
7797609 | Neuman | Sep 2010 | B2 |
7810017 | Radke | Oct 2010 | B2 |
7848149 | Gonzales et al. | Dec 2010 | B2 |
7869273 | Lee et al. | Jan 2011 | B2 |
7885119 | Li | Feb 2011 | B2 |
7904783 | Brandman et al. | Mar 2011 | B2 |
7928497 | Yaegashi | Apr 2011 | B2 |
7929549 | Talbot | Apr 2011 | B1 |
7930515 | Gupta et al. | Apr 2011 | B2 |
7945825 | Cohen et al. | May 2011 | B2 |
7978516 | Olbrich et al. | Jul 2011 | B2 |
8014094 | Jin | Sep 2011 | B1 |
8037380 | Cagno et al. | Oct 2011 | B2 |
8040744 | Gorobets et al. | Oct 2011 | B2 |
8065583 | Radke | Nov 2011 | B2 |
20010002172 | Tanaka et al. | May 2001 | A1 |
20010006479 | Ikehashi et al. | Jul 2001 | A1 |
20020038440 | Barkan | Mar 2002 | A1 |
20020056064 | Kidorf et al. | May 2002 | A1 |
20020118574 | Gongwer et al. | Aug 2002 | A1 |
20020133684 | Anderson | Sep 2002 | A1 |
20020166091 | Kidorf et al. | Nov 2002 | A1 |
20020174295 | Ulrich et al. | Nov 2002 | A1 |
20020196510 | Hietala et al. | Dec 2002 | A1 |
20030002348 | Chen et al. | Jan 2003 | A1 |
20030103400 | Van Tran | Jun 2003 | A1 |
20030161183 | Van Tran | Aug 2003 | A1 |
20030189856 | Cho et al. | Oct 2003 | A1 |
20040057265 | Mirabel et al. | Mar 2004 | A1 |
20040057285 | Cernea et al. | Mar 2004 | A1 |
20040083333 | Chang et al. | Apr 2004 | A1 |
20040083334 | Chang et al. | Apr 2004 | A1 |
20040105311 | Cernea et al. | Jun 2004 | A1 |
20040114437 | Li | Jun 2004 | A1 |
20040160842 | Fukiage | Aug 2004 | A1 |
20040223371 | Roohparvar | Nov 2004 | A1 |
20050007802 | Gerpheide | Jan 2005 | A1 |
20050013165 | Ban | Jan 2005 | A1 |
20050024941 | Lasser et al. | Feb 2005 | A1 |
20050024978 | Ronen | Feb 2005 | A1 |
20050030788 | Parkinson et al. | Feb 2005 | A1 |
20050086574 | Fackenthal | Apr 2005 | A1 |
20050121436 | Kamitani et al. | Jun 2005 | A1 |
20050144361 | Gonzalez et al. | Jun 2005 | A1 |
20050157555 | Ono et al. | Jul 2005 | A1 |
20050162913 | Chen | Jul 2005 | A1 |
20050169051 | Khalid et al. | Aug 2005 | A1 |
20050189649 | Maruyama et al. | Sep 2005 | A1 |
20050213393 | Lasser | Sep 2005 | A1 |
20050224853 | Ohkawa | Oct 2005 | A1 |
20050240745 | Iyer et al. | Oct 2005 | A1 |
20050243626 | Ronen | Nov 2005 | A1 |
20060004952 | Lasser | Jan 2006 | A1 |
20060028875 | Avraham et al. | Feb 2006 | A1 |
20060028877 | Meir | Feb 2006 | A1 |
20060101193 | Murin | May 2006 | A1 |
20060106972 | Gorobets et al. | May 2006 | A1 |
20060107136 | Gongwer et al. | May 2006 | A1 |
20060129750 | Lee et al. | Jun 2006 | A1 |
20060133141 | Gorobets | Jun 2006 | A1 |
20060156189 | Tomlin | Jul 2006 | A1 |
20060179334 | Brittain et al. | Aug 2006 | A1 |
20060190699 | Lee | Aug 2006 | A1 |
20060203546 | Lasser | Sep 2006 | A1 |
20060218359 | Sanders et al. | Sep 2006 | A1 |
20060221692 | Chen | Oct 2006 | A1 |
20060221705 | Hemink et al. | Oct 2006 | A1 |
20060221714 | Li et al. | Oct 2006 | A1 |
20060239077 | Park et al. | Oct 2006 | A1 |
20060239081 | Roohparvar | Oct 2006 | A1 |
20060256620 | Nguyen et al. | Nov 2006 | A1 |
20060256626 | Werner et al. | Nov 2006 | A1 |
20060256891 | Yuan et al. | Nov 2006 | A1 |
20060271748 | Jain et al. | Nov 2006 | A1 |
20060285392 | Incarnati et al. | Dec 2006 | A1 |
20060285396 | Ha | Dec 2006 | A1 |
20070006013 | Moshayedi et al. | Jan 2007 | A1 |
20070019481 | Park | Jan 2007 | A1 |
20070033581 | Tomlin et al. | Feb 2007 | A1 |
20070047314 | Goda et al. | Mar 2007 | A1 |
20070047326 | Nguyen et al. | Mar 2007 | A1 |
20070050536 | Kolokowsky | Mar 2007 | A1 |
20070058446 | Hwang et al. | Mar 2007 | A1 |
20070061502 | Lasser et al. | Mar 2007 | A1 |
20070067667 | Ikeuchi et al. | Mar 2007 | A1 |
20070074093 | Lasser | Mar 2007 | A1 |
20070086239 | Litsyn et al. | Apr 2007 | A1 |
20070086260 | Sinclair | Apr 2007 | A1 |
20070089034 | Litsyn et al. | Apr 2007 | A1 |
20070091677 | Lasser et al. | Apr 2007 | A1 |
20070091694 | Lee et al. | Apr 2007 | A1 |
20070103978 | Conley et al. | May 2007 | A1 |
20070103986 | Chen | May 2007 | A1 |
20070104211 | Opsasnick | May 2007 | A1 |
20070109845 | Chen | May 2007 | A1 |
20070109849 | Chen | May 2007 | A1 |
20070115726 | Cohen et al. | May 2007 | A1 |
20070118713 | Guterman et al. | May 2007 | A1 |
20070143378 | Gorobets | Jun 2007 | A1 |
20070143531 | Atri | Jun 2007 | A1 |
20070159889 | Kang et al. | Jul 2007 | A1 |
20070159892 | Kang et al. | Jul 2007 | A1 |
20070159907 | Kwak | Jul 2007 | A1 |
20070168837 | Murin | Jul 2007 | A1 |
20070171714 | Wu et al. | Jul 2007 | A1 |
20070183210 | Choi et al. | Aug 2007 | A1 |
20070189073 | Aritome | Aug 2007 | A1 |
20070195602 | Fong et al. | Aug 2007 | A1 |
20070206426 | Mokhlesi | Sep 2007 | A1 |
20070208904 | Hsieh et al. | Sep 2007 | A1 |
20070226599 | Motwani | Sep 2007 | A1 |
20070236990 | Aritome | Oct 2007 | A1 |
20070253249 | Kang et al. | Nov 2007 | A1 |
20070256620 | Viggiano et al. | Nov 2007 | A1 |
20070263455 | Cornwell et al. | Nov 2007 | A1 |
20070266232 | Rodgers et al. | Nov 2007 | A1 |
20070271424 | Lee et al. | Nov 2007 | A1 |
20070280000 | Fujiu et al. | Dec 2007 | A1 |
20070291571 | Balasundaram | Dec 2007 | A1 |
20070297234 | Cernea et al. | Dec 2007 | A1 |
20080010395 | Mylly et al. | Jan 2008 | A1 |
20080025121 | Tanzawa | Jan 2008 | A1 |
20080043535 | Roohparvar | Feb 2008 | A1 |
20080049504 | Kasahara et al. | Feb 2008 | A1 |
20080049506 | Guterman | Feb 2008 | A1 |
20080052446 | Lasser et al. | Feb 2008 | A1 |
20080055993 | Lee | Mar 2008 | A1 |
20080080243 | Edahiro et al. | Apr 2008 | A1 |
20080082730 | Kim et al. | Apr 2008 | A1 |
20080089123 | Chae et al. | Apr 2008 | A1 |
20080104309 | Cheon et al. | May 2008 | A1 |
20080104312 | Lasser | May 2008 | A1 |
20080109590 | Jung et al. | May 2008 | A1 |
20080115017 | Jacobson | May 2008 | A1 |
20080123420 | Brandman et al. | May 2008 | A1 |
20080123426 | Lutze et al. | May 2008 | A1 |
20080126686 | Sokolov et al. | May 2008 | A1 |
20080130341 | Shalvi et al. | Jun 2008 | A1 |
20080148115 | Sokolov et al. | Jun 2008 | A1 |
20080151618 | Sharon et al. | Jun 2008 | A1 |
20080151667 | Miu et al. | Jun 2008 | A1 |
20080158958 | Sokolov et al. | Jul 2008 | A1 |
20080181001 | Shalvi | Jul 2008 | A1 |
20080198650 | Shalvi et al. | Aug 2008 | A1 |
20080198654 | Toda | Aug 2008 | A1 |
20080209116 | Caulkins | Aug 2008 | A1 |
20080209304 | Winarski et al. | Aug 2008 | A1 |
20080215798 | Sharon et al. | Sep 2008 | A1 |
20080217598 | Sharon et al. | Sep 2008 | A1 |
20080219050 | Shalvi et al. | Sep 2008 | A1 |
20080239093 | Easwar et al. | Oct 2008 | A1 |
20080239812 | Abiko et al. | Oct 2008 | A1 |
20080253188 | Aritome | Oct 2008 | A1 |
20080263262 | Sokolov et al. | Oct 2008 | A1 |
20080263676 | Mo et al. | Oct 2008 | A1 |
20080270730 | Lasser et al. | Oct 2008 | A1 |
20080282106 | Shalvi et al. | Nov 2008 | A1 |
20080288714 | Salomon et al. | Nov 2008 | A1 |
20090013233 | Radke | Jan 2009 | A1 |
20090024905 | Shalvi et al. | Jan 2009 | A1 |
20090034337 | Aritome | Feb 2009 | A1 |
20090043831 | Antonopoulos et al. | Feb 2009 | A1 |
20090043951 | Shalvi et al. | Feb 2009 | A1 |
20090049234 | Oh et al. | Feb 2009 | A1 |
20090073762 | Lee et al. | Mar 2009 | A1 |
20090086542 | Lee et al. | Apr 2009 | A1 |
20090089484 | Chu | Apr 2009 | A1 |
20090091979 | Shalvi | Apr 2009 | A1 |
20090094930 | Schwoerer | Apr 2009 | A1 |
20090106485 | Anholt | Apr 2009 | A1 |
20090112949 | Ergan et al. | Apr 2009 | A1 |
20090132755 | Radke | May 2009 | A1 |
20090144600 | Perlmutter et al. | Jun 2009 | A1 |
20090150894 | Huang et al. | Jun 2009 | A1 |
20090157950 | Selinger | Jun 2009 | A1 |
20090157964 | Kasorla et al. | Jun 2009 | A1 |
20090158126 | Perlmutter et al. | Jun 2009 | A1 |
20090168524 | Golov et al. | Jul 2009 | A1 |
20090172257 | Prins et al. | Jul 2009 | A1 |
20090172261 | Prins et al. | Jul 2009 | A1 |
20090193184 | Yu et al. | Jul 2009 | A1 |
20090199074 | Sommer | Aug 2009 | A1 |
20090204824 | Lin et al. | Aug 2009 | A1 |
20090204872 | Yu et al. | Aug 2009 | A1 |
20090213653 | Perlmutter et al. | Aug 2009 | A1 |
20090213654 | Perlmutter et al. | Aug 2009 | A1 |
20090225595 | Kim | Sep 2009 | A1 |
20090228761 | Perlmutter et al. | Sep 2009 | A1 |
20090240872 | Perlmutter et al. | Sep 2009 | A1 |
20090265509 | Klein | Oct 2009 | A1 |
20090300227 | Nochimowski et al. | Dec 2009 | A1 |
20090323412 | Mokhlesi et al. | Dec 2009 | A1 |
20090327608 | Eschmann | Dec 2009 | A1 |
20100017650 | Chin et al. | Jan 2010 | A1 |
20100034022 | Dutta et al. | Feb 2010 | A1 |
20100057976 | Lasser | Mar 2010 | A1 |
20100061151 | Miwa et al. | Mar 2010 | A1 |
20100082883 | Chen et al. | Apr 2010 | A1 |
20100083247 | Kanevsky et al. | Apr 2010 | A1 |
20100110580 | Takashima | May 2010 | A1 |
20100131697 | Alrod et al. | May 2010 | A1 |
20100142268 | Aritome | Jun 2010 | A1 |
20100142277 | Yang et al. | Jun 2010 | A1 |
20100169547 | Ou | Jul 2010 | A1 |
20100169743 | Vogan et al. | Jul 2010 | A1 |
20100174847 | Paley et al. | Jul 2010 | A1 |
20100211803 | Lablans | Aug 2010 | A1 |
20100287217 | Borchers et al. | Nov 2010 | A1 |
20110010489 | Yeh | Jan 2011 | A1 |
20110060969 | Ramamoorthy et al. | Mar 2011 | A1 |
20110066793 | Burd | Mar 2011 | A1 |
20110075482 | Shepard et al. | Mar 2011 | A1 |
20110107049 | Kwon et al. | May 2011 | A1 |
20110149657 | Haratsch et al. | Jun 2011 | A1 |
20110199823 | Bar-Or et al. | Aug 2011 | A1 |
20110302354 | Miller | Dec 2011 | A1 |
Number | Date | Country |
---|---|---|
0783754 | Jul 1997 | EP |
1434236 | Jun 2004 | EP |
1605509 | Dec 2005 | EP |
9610256 | Apr 1996 | WO |
98028745 | Jul 1998 | WO |
02100112 | Dec 2002 | WO |
2003100791 | Dec 2003 | WO |
2007046084 | Apr 2007 | WO |
2007132452 | Nov 2007 | WO |
2007132453 | Nov 2007 | WO |
2007132456 | Nov 2007 | WO |
2007132457 | Nov 2007 | WO |
2007132458 | Nov 2007 | WO |
2007146010 | Dec 2007 | WO |
2008026203 | Mar 2008 | WO |
2008053472 | May 2008 | WO |
2008053473 | May 2008 | WO |
2008068747 | Jun 2008 | WO |
2008077284 | Jul 2008 | WO |
2008083131 | Jul 2008 | WO |
2008099958 | Aug 2008 | WO |
2008111058 | Sep 2008 | WO |
2008124760 | Oct 2008 | WO |
2008139441 | Nov 2008 | WO |
2009037691 | Mar 2009 | WO |
2009037697 | Mar 2009 | WO |
2009038961 | Mar 2009 | WO |
2009050703 | Apr 2009 | WO |
2009053961 | Apr 2009 | WO |
2009053962 | Apr 2009 | WO |
2009053963 | Apr 2009 | WO |
2009063450 | May 2009 | WO |
2009072100 | Jun 2009 | WO |
2009072101 | Jun 2009 | WO |
2009072102 | Jun 2009 | WO |
2009072103 | Jun 2009 | WO |
2009072104 | Jun 2009 | WO |
2009072105 | Jun 2009 | WO |
2009074978 | Jun 2009 | WO |
2009074979 | Jun 2009 | WO |
2009078006 | Jun 2009 | WO |
2009095902 | Aug 2009 | WO |
2011024015 | Mar 2011 | WO |
Number | Date | Country | |
---|---|---|---|
61109767 | Oct 2008 | US | |
61115085 | Nov 2008 | US |