Micron Technology, Inc.
UNAUTHORIZED MEMORY ACCESS MITIGATION

Last updated:

Abstract:

Apparatuses and methods related to mitigating unauthorized memory access are described. Mitigating unauthorized memory access can include verifying whether an access command is authorized to access a protected region of a memory array. The authorization can be verified utilizing a key and a memory address corresponding to the access command. If an access command is authorized to access a protected region, then a row of the memory array corresponding to the access command can be activated. If an access command is not authorized to access the protected region, then a row of the memory array corresponding to the access command may not be activated.

Status:
Application
Type:

Utility

Filling date:

4 Feb 2022

Issue date:

19 May 2022