Micron Technology, Inc.
Unauthorized access command logging using a key for a protected region of memory

Last updated:

Abstract:

Apparatuses and methods related to tracking unauthorized access commands for memory. Identifying unauthorized memory access can include verifying whether an access command is authorized to access a protected region of a memory array. The authorization can be verified utilizing a key and a memory address corresponding to the access command. If an access command is authorized to access a protected region, then a row of the memory array corresponding to the access command can be activated. If an access command is not authorized to access the protected region, then an access count can be incremented to signify the unauthorized access command.

Status:
Grant
Type:

Utility

Filling date:

28 Dec 2018

Issue date:

9 Nov 2021