Micron Technology, Inc.
IDENTIFICATION AND CACHING OF FREQUENT READ DISTURB AGGRESSORS

Last updated:

Abstract:

Exemplary methods, apparatuses, and systems include receiving a read operation directed to an aggressor location. An integrity scan of a victim location of the aggressor location is performed to determine an error value for the victim location. Data from the aggressor location is copied to a cache in response to determining the error value for the victim location satisfies a first error value threshold. The cache is a different type of memory from the aggressor location.

Status:
Application
Type:

Utility

Filling date:

4 Dec 2020

Issue date:

9 Jun 2022