Micron Technology, Inc.
UNAUTHORIZED ACCESS COMMAND LOGGING FOR MEMORY

Last updated:

Abstract:

Apparatuses and methods related to tracking unauthorized access commands for memory. Identifying unauthorized memory access can include verifying whether an access command is authorized to access a protected region of a memory array. The authorization can be verified utilizing a key and a memory address corresponding to the access command. If an access command is authorized to access a protected region, then a row of the memory array corresponding to the access command can be activated. If an access command is not authorized to access the protected region, then an access count can be incremented to signify the unauthorized access command.

Status:
Application
Type:

Utility

Filling date:

5 Nov 2021

Issue date:

24 Feb 2022