Micron Technology, Inc.
Unauthorized memory access mitigation

Last updated:

Abstract:

Apparatuses and methods related to mitigating unauthorized memory access are described. Mitigating unauthorized memory access can include verifying whether an access command is authorized to access a protected region of a memory array. The authorization can be verified utilizing a key and a memory address corresponding to the access command. If an access command is authorized to access a protected region, then a row of the memory array corresponding to the access command can be activated. If an access command is not authorized to access the protected region, then a row of the memory array corresponding to the access command may not be activated.

Status:
Grant
Type:

Utility

Filling date:

28 Dec 2018

Issue date:

22 Feb 2022