This application is a National Stage of International Application No. PCT/KR2018/003067 filed Mar. 16, 2018, claiming priority based on Korean Patent Application No. 10-2017-0033701 filed Mar. 17, 2017.
The present invention relates to a circuit for bypassing a defect area of a spin transfer torque-magnetic random access memory (STT-MRAM) and an STT-MRAM device including the circuit.
Among semiconductor memories, dynamic random access memories (DRAMs) currently occupy the largest portion. However, DRAMs have a problem with scaling down and the resulting problem of maintaining the capacitance of a capacitor for storing information. To overcome these limitations, new forms of devices have been developed. A next-generation device which attracts the most attention is a magnetic random access memory (MRAM) based on tunneling magnetoresistance.
The MRAM is a non-volatile device which takes advantage of a change in magnetic resistance caused by the arrangement of two ferromagnetic layers constituting a magnetic tunnel junction (MTJ), which is basically composed of a laminated structure of a ferromagnetic layer, an insulating layer, and a ferromagnetic layer. One of the two ferromagnetic layers is a pinned layer (PL) having a fixed magnetization direction, and the other is a free layer (FL) having a magnetization direction which is changed by a current flowing therethrough.
When electrons passing through the first ferromagnetic layer pass through the insulating layer used as a tunneling barrier, a tunneling probability varies according to the magnetization direction of the second ferromagnetic layer. In other words, when the magnetization directions of the two ferromagnetic layers are parallel to each other, a tunneling current is maximized, and when the magnetization directions are antiparallel, the tunneling current is minimized. Therefore, it is possible to read stored data on the basis of a difference in current of each case.
The MRAM generally uses the spin transfer torque (STT) phenomenon to write data therein. The STT phenomenon refers to the phenomenon where a change in angular momentum is instantaneously caused when a spin-polarized current goes through a ferromagnetic body. In other words, data is written using the phenomenon where the magnetization direction of a ferromagnetic body is aligned in the spin direction of a high-density current having a polarized spin direction unless the magnetization direction of the ferromagnetic body does not coincide with the spin direction of the current when the current flows into the ferromagnetic body.
In an MTJ used in a semiconductor memory, when electrons of a current of a threshold or higher flow from a PL to an FL, the magnetization direction of the FL becomes identical to the magnetization direction of the PL due to the flow of electrons whose spin directions are aligned in the magnetization direction of the PL. On the contrary, when electrons of a current of the threshold or higher flow from the FL to the PL, spin accumulation occurs in the interface between the PL and the FL, and the magnetization direction of the FL becomes antiparallel to that of the PL. Therefore, it is possible to record data using the magnetization direction of the FL.
When a magnetic random access memory (MRAM) device is formed of an integrated high-density array, a defect may occur in device reading and/or writing for several reasons. In devices such as a conventional dynamic random access memory (DRAM), there are circuits for bypassing a memory area at which a defect has occurred and taking a detour to another area when an attempt is made to access the address.
Conventional devices store an address of an area at which a defect has occurred in a fuse or an electrically erasable programmable read-only memory (EEPROM) which is a non-volatile memory. In the case of storing an address of an area at which a defect has occurred in a fuse, it is difficult to handle a defect which is newly detected when memory packaging is finished after initial operation. In the case of storing an address of an area at which a defect has occurred in an EEPROM, it is necessary to generate a high voltage by additionally forming a circuit, which is uneconomical in terms of die size and power consumption.
The present invention is directed to providing a MRAM device which solves the above-described problems of the conventional art and provides unique technical effects that the conventional art does not have.
One aspect of the present invention provides a spin transfer torque magnetic random access memory (STT-MRAM) device including: an STT-MRAM memory array including a data storage unit for storing data, a defect area address storage unit for storing a defect area address, and a spare area for storing data of a defect area; and a bypass determination unit including a volatile information storage element for storing the defect area address, which is stored in the defect area address storage unit and provided, and configured to compare, when memory array access occurs, an access address with the defect area address stored in the volatile information storage element and cause the memory array access to take a detour to the spare area.
Another aspect of the present invention provides a circuit for bypassing a defect area of an STT-MRAM, the circuit including address storage capacitors configured to store respective bits of a defect area address, address comparison units having one end to which one bit of an access address is provided and the other end to which one bit stored in the address capacitor is provided and configured to perform an address comparison logic operation, and an address coincidence logic operation unit configured to receive output signals of the address comparison units and determine whether the access address coincides with the defect area address. When the access address coincides with the defect area address, the address coincidence logic operation unit activates a spare area and causes access to the defect area address to take a detour to the activated spare area.
According to the present embodiment, since the address of a defect area is stored in an information storage element in a memory array, it is unnecessary to form an additional component. Also, since it is unnecessary to form an additional power providing circuit required for operation, it is economical in terms of die size and power consumption.
A subscript may be added to reference symbols of components which perform identical or similar functions. However, when it is unnecessary to distinguish between the components, the components may be collectively indicated by a symbol excluding the subscript, and when it is necessary to distinguish between the components, the subscript may be added for description.
Elements, such as a switch, included in the drawings which are appended and described herein show elements that are turned on or activated by a high-state signal as examples. However, this is for the purpose of facilitating description and not for limiting the scope of the present invention. Therefore, an N-type metal oxide semiconductor field effect transistor (MOSFET) can be replaced by a P-type MOSFET, which is easily understood by those of ordinary skill in the art.
Hereinafter, a spin transfer torque magnetic random access memory (STT-MRAM) device 10 and a circuit 200 for bypassing a defect area of an STT-MRAM according to the present embodiment will be described with reference to the accompanying drawings.
The circuit 200 for bypassing a defect area of an STT-MRAM according to the present embodiment includes the address storage capacitors CA configured to store respective bits of a defect area address, address comparison units 210 having one end to which one bit of an access address A is provided and the other end to which one bit stored in the address storage capacitors CA is provided and configured to perform an address comparison logic operation, and an address coincidence logic operation unit 220 configured to receive output signals of the address comparison units and determine whether the access address coincides with the defect area address. When the access address coincides with the defect area address, the address coincidence logic operation unit 220 activates a spare area and causes access to the defect area address to take a detour to the activated spare area.
Referring to
The data storage unit 110 includes storage elements U disposed in an array to read or write one logic bit. In the embodiment shown as an example in
According to an embodiment not shown in the drawings, the data storage unit 110 may include a storage element having a 1T1M structure in which one transistor and one MTJ are used to read or write any one logic bit. According to this embodiment, it is possible to increase data storage density.
The 2T2M structure and 1T1M structure have been taken as examples above. However, the present embodiment is not limited to the structures and may use various structures of unit storage elements which have not been taken as examples.
The defect area address storage unit 120 stores an address of a defect area in the memory array 100. In an embodiment, the defect area may indicate a row, a column, etc. including a storage element in which it is not possible to read or write target data. In
For example, after a manufacturing process of the STT-MRAM device 10 is finished, a defect area may be detected in a test process of performing writing and reading. An address of the detected defect area may be stored in the defect area address storage unit 120 in the test process.
According to an embodiment, the defect area address storage unit 120 may further store an activation flag bit. The storage elements included in the defect area address storage unit 120 store the address of the defect area detected in the test. Before the address of the defect area is stored, random bits may be stored in the defect area address storage unit 120, and the random bits may coincide with an address of an area which operates normally. The activation flag bit prevents malfunction caused when an address randomly stored in the defect area address storage unit 120 coincides with an address to be accessed. The activation flag bit indicates that an address stored in the defect area address storage unit 120 is the address of the defect area detected and written therein and may be written as a logic high or a logic low. As an example, the activation flag bit may be a single bit. As another example, the activation flag bit may be a plurality of bits.
The spare area (not shown) is an area for storing data to be written in the defect area and may be included in the memory array 100 together with the data storage unit 110. As will be described below, the spare area may be activated by an activation signal SRE provided by the bypass determination unit 200. In an embodiment, the spare area may store data in the same structure in which the data storage unit 110 stores data.
A read/write (R/W) driver 400 reads or writes information by providing an electrical signal to the storage elements U included in the data storage unit 110. In the process of the driver 400 reading information, a voltage formed by providing an electrical signal to the storage elements U is read by a sense amplifier 300.
The sense amplifier 300 provides a read result as corresponding outputs OUT and OUTB. In an embodiment, the sense amplifier 300 may latch up the provided signal with a signal SE and output the latched signal.
In
In the embodiment shown as an example in
In the embodiment shown as an example in
When a magnetization direction of the FL (↔) coincides with a magnetization direction of the PL (←), a resistance value of the MTJ is smaller than that of a case in which the magnetization direction of the FL (↔) differs from the magnetization direction of the PL (←). Therefore, the sense amplifier may detect information stored in the storage element by sensing the change. However, the above-described process is only an example of operations, and operations may be performed in another sequence.
Operation of the bypass determination unit 200 will be described below with reference to
The control unit controls a switch RL so that respective bits of information output by the sense amplifier 300 may be stored in the address information storage capacitors CA. Also, the control unit stores an activation flag bit, which is included in the defect area address storage unit 120, in an activation capacitor CB. In the embodiment shown in the drawing, when there is a single activation flag bit, the activation capacitor CB may be one capacitor. In another embodiment not shown in the drawings, when there are a plurality of activation flag bits, the activation capacitor CB may be a plurality of capacitors.
The address information storage capacitors CA and the activation capacitor CB included in the STT-MRAM device 10 may be actual capacitors that may have a non-ideal characteristic such as charge leakage. To prevent information loss caused by the unideal characteristic, the address information storage capacitors CA and the activation capacitor CB may be refreshed. As an embodiment, the control unit may perform the refresh by reading an address stored in the defect area address storage unit 120 and the activation flag bit and storing the address and the activation flag bit respectively in the address information storage capacitors CA and the activation capacitor CB. As another embodiment, the bypass determination unit may further include a refresh unit for refreshing information stored in the address information storage capacitors CA and the activation capacitor CB.
The bypass determination unit 200 includes the address comparison units 210 to which one bit of the access address A is provided as one input and a bit stored in the address storage capacitors CA is provided as another input. In an embodiment, when the bit A0 of the access address coincides with the bit stored in the address information storage capacitor CA0, the address comparison unit 210 outputs an activation signal E0.
In the embodiment shown as an example in
The address coincidence logic operation unit 220 provides the spare area activation signal SRE in a high state when activation signals E provided by the address comparison units 210 and activation flag bits are all in logic high states.
In the embodiment shown as an example in
In the case of reading a defect area address stored in the defect area address storage unit 120 when the STT-MRAM device 10 is booted up or reset, the WLr signal is a logic high, and the WLrB signal is a logic low. Therefore, the bypass determination unit 200 may be deactivated.
However, in the process of comparing the address A provided for memory access with the defect area address, the WLrB signal is maintained in a logic high state. Therefore, the bypass determination unit 200 may provide the spare area activation signal SRE according to a comparison result between the access address A and an address stored in the capacitors.
In the embodiment shown as an example in
When the activation signal E is provided in a logic low state, the address coincidence logic operation unit 220 may be implemented as a NOR gate. For example, when activation signals E provided by the address comparison units 210 and activation flag bits are all in a logic low state, the address coincidence logic operation unit 220 may provide the spare area activation signal SRE for activating the spare area in a high state.
The address coincidence logic operation unit 220 may further include an AND gate, to which a WLrB signal obtained by inverting a WLr signal provided to a word line of the defect area address storage unit 120 may be provided when the STT-MRAM device 10 is booted up or reset. Since the WLrB signal is the same as the WLrB signal in the previous embodiment, description thereof is omitted.
The spare area (not shown) is activated by the spare area activation signal SRE. When the spare area is activated by the spare area activation signal SRE, the data storage unit 110 is deactivated to prevent access to a defect area included in the data storage 110. Therefore, the bypass determination unit 200 may prevent memory access to the defect area and cause the memory access to take a detour to the spare area.
It is assumed that an address of a defect area is [10] as a test result of the STT-MRAM device 10 and [10] is stored in the defect area address storage unit 120.
In the first phase P1, an activation signal is provided to the word line WLr connected to the defect area address storage unit 120, and the switches CL0 connected to the global bit line GBL and the global source line GSL are turned on. Subsequently, a signal RE is provided to provide information stored in a defect area address storage element to the sense amplifier 300, and the sense amplifier receives a signal SE and latches up and outputs the provided information
The corresponding information is stored by a signal RL0 in the address storage capacitor CA0. Through a like process, the information stored in the second defect area address storage element is stored in the address storage capacitor CA1 by turning on the switch CL1. Therefore, [10] is stored in each of the address storage capacitors CA0 and CAL Also, an activation flag bit is stored in the activation capacitor CB.
In the second phase P2 proceeding in succession, when the memory access address [10] is provided to A0 and A1, the bypass determination unit outputs the spare area activation signal SRE so that memory access to the defect area may take a detour to the spare area.
Although the present invention has been described above with reference to embodiments shown in the drawings to aid in understanding the present invention, the embodiments are merely examples, and those of ordinary skill in the art would understand that various modifications and equivalents can be made from the embodiments. Therefore, the technical scope of the present invention should be determined by the following claims.
Number | Date | Country | Kind |
---|---|---|---|
10-2017-0033701 | Mar 2017 | KR | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/KR2018/003067 | 3/16/2018 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2018/169335 | 9/20/2018 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
9412935 | Lin | Aug 2016 | B1 |
20040037112 | Ooishi | Feb 2004 | A1 |
20040109360 | Bateman | Jun 2004 | A1 |
20090003056 | Chun et al. | Jan 2009 | A1 |
20110063897 | Ong | Mar 2011 | A1 |
20130322160 | Kim | Dec 2013 | A1 |
20140078842 | Oh et al. | Mar 2014 | A1 |
20150143165 | Cho | May 2015 | A1 |
20160062830 | Cha et al. | Mar 2016 | A1 |
20180137916 | Salama | May 2018 | A1 |
Number | Date | Country |
---|---|---|
10-0888847 | Mar 2009 | KR |
10-1098302 | Dec 2011 | KR |
10-2012-0053953 | May 2012 | KR |
10-2014-0131207 | Nov 2014 | KR |
10-2015-0057155 | May 2015 | KR |
10-2016-0024472 | Mar 2016 | KR |
Entry |
---|
International Search Report of PCT/KR2018/003067 dated Jul. 12, 2018. |
Number | Date | Country | |
---|---|---|---|
20200013479 A1 | Jan 2020 | US |