Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Claim Rejections - 35 USC § 103
In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status.
The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows:
1. Determining the scope and contents of the prior art.
2. Ascertaining the differences between the prior art and the claims at issue.
3. Resolving the level of ordinary skill in the pertinent art.
4. Considering objective evidence present in the application indicating obviousness or nonobviousness.
Claims 1, 3-5, 7-14, 16-20 are rejected under 35 U.S.C. 103 as being unpatentable over Rooney (US Publication No. 2022/0147267) in view of Caraccio (US Publication No. 2023/0395184).
Regarding claim 1, Rooney teaches:
A device comprising:
a command interface (see fig. 1B: Address Command Input Circuit 105) operable to:
receive a post package repair command and an indication of a target memory address from a host controller; (see fig. 1B: Address Command Input Circuit 105 receives ADDR and CMD) …
and a command decoder coupled to the command interface via a command/address bus (see fig. 1B: Command Decoder 115 and Address Decoder 110 collectively are considered to be a command decoder), wherein the command decoder is operable to:
corrupt data corresponding to a target portion of memory based on the target memory address; (see para. 52: The method 240 begins at block 241 by poisoning data stored to a memory array of the memory device. And see para. 20: the present technology allows a host device of the system, in conjunction with the memory device coupled therewith, to control which bits to invert (to poison) during write or read operations.)
and perform post package repair on the target portion of memory based on the target memory address. (see para. 58: the method 250 begins at block 251 by remapping a first logical address from a first physical address to a second physical address of the memory device. In some embodiments, the remapping is performed in response to a command to enable and/or execute an sPPR operation on the memory device. And see para. 20: the present technology allows a host device of the system, in conjunction with the memory device coupled therewith, to control which bits to invert (to poison) during write or read operations. In some embodiments, the host device may enable and utilize a sPPR function of the memory device to remap a logical address of a memory array between different physical addresses at which known-good and known-bad (e.g., poisoned) data are written.)
However, Rooney does not explicitly disclose:
Disable an input to the command interface based on the post package repair command;
In the analogous art of post package repair, Caraccio teaches:
Disable an input to the command interface based on the post package repair command; (see fig. 3: operation 352, detecting a sPPR request -> operation 354, suspending execution of non-maintenance requests on the target row.) This effectively disables any input that would cause the execution of a non-maintenance request on the target row, for example an additional sPPR request/command.
It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate disabling an input based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42).
Regarding claim 3, the combination of Rooney and Caraccio teaches the device of claim 1. Caraccio further teaches:
Wherein the command interface is operable to enable the input based on an indication that the command decoder has completed performing the post package repair. (see fig. 3: operation 356, subsequent to completion of the sPPR request, resuming execution of non-maintenance requests on the target row.)
It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate disabling an input based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42).
Regarding claim 4, the combination of Rooney and Caraccio teaches the device of claim 3. Caraccio further teaches:
Wherein the command decoder is operable to generate the indication that the command decoder has completed performing the post package repair. (see claim 12: a control circuitry configured to: suspend execution of requests associated with a target address associated with a memory device and a post package repair (PPR) request; … execute the PPR request.) The control circuitry is considered to be a command decoder because it receives and processes commands.
It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate disabling an input based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42).
Regarding claim 5, the combination of Rooney and Caraccio teaches the device of claim 1. Rooney further teaches:
The command decoder is operable to:
Corrupt the data corresponding to a plurality of portions of the target portion of memory; (see para 20: the present technology allows a host device of the system, in conjunction with the memory device coupled therewith, to control which bits to invert (to poison).) Each bit can effectively be considered a portion of the target portion of memory.
Perform the post package repair on a subset of the plurality of portions based on the post package repair being performed for a respective portion of the plurality of portions after corrupting the data corresponding to that respective portion. (para. 20: the host device may enable and utilize an sPPR function of the memory device to remap a logical address of a memory array between different physical addresses at which known-good and known-bad (e.g., poisoned) data are written, to permit the poisoning of data without reliance upon test modes or direct data manipulation.)
Regarding claim 7, the combination of Rooney and Caraccio teaches the device of claim 1. Rooney further teaches:
Wherein the command decoder is operable to start performing the post package repair after beginning to corrupt the data. (para. 20: the host device may enable and utilize an sPPR function of the memory device to remap a logical address of a memory array between different physical addresses at which known-good and known-bad (e.g., poisoned) data are written, to permit the poisoning of data without reliance upon test modes or direct data manipulation.)
Regarding claim 8, the combination of Rooney and Caraccio teaches the device of claim 1. Rooney further teaches:
Wherein the command decoder is operable to start performing the post package repair after the data is corrupted. (para. 20: the host device may enable and utilize an sPPR function of the memory device to remap a logical address of a memory array between different physical addresses at which known-good and known-bad (e.g., poisoned) data are written, to permit the poisoning of data without reliance upon test modes or direct data manipulation.)
Regarding claim 9, the combination of Rooney and Caraccio teaches the device of claim 1. Rooney further teaches:
Wherein the target memory address corresponds to
A portion of an emerging memory device memory bank, a random access memory (RAM), a dynamic random access memory (DRAM), (see para. 21: in some embodiments, the memory devices 100 can be DRAM memory devices) Double Data Rate Five Synchronous Dynamic Random-Access Memory (DDR5), Low Power Double Data Rate (LPDDR5) memory, or any combination thereof.
Regarding claim 10, the combination of Rooney and Caraccio teaches the device of claim 1. Caraccio further teaches:
Wherein the command decoder is operable to continue performing normal memory operations after the command interface enables the input. (see fig. 3: operation 356, subsequent to completion of the sPPR request, resuming execution of non-maintenance requests on the target row.)
It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate disabling an input based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42).
Claim 11 corresponds to claim 1, and is rejected accordingly, but for the following added limitations. Rooney teaches:
Securing an indication of a mapping of logical to physical addressing associated with the target memory address based on corrupting data corresponding to a target portion of memory based on the target memory address; (see para. 20: the host device may enable and utilize a sPPR function of the memory device to remap a logical address of a memory array between different physical addresses at which known-good and known-bad (e.g., poisoned) data are written.)
However, Rooney does not explicitly teach:
Enabling the input based on the post package repair and the data being corrupted
Carracio teaches:
Enabling the input based on the post package repair and the data being corrupted (see fig. 3: operation 356, subsequent to completion of the sPPR request, resuming execution of non-maintenance requests on the target row.)
It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate disabling (and reenabling) an input based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42).
Regarding claim 12, the combination of Rooney and Caraccio teaches the method of claim 11. Rooney further teaches:
Corrupting the data comprises: corrupting the data corresponding to a target memory bank associated with the target memory address that is to undergo the post package repair at least in part by leaving one or more other memory banks uncorrupted. (para. 9: there are multiple memory arrays in the memory system. And see para. 30: the memory array 150 includes a plurality of banks. And see para. 52: the method 240 begins at block 241 by poisoning data stored to a memory array of a memory device.) If there are multiple memory arrays, each including multiple banks, and only data from one array is corrupted, then there must be at least one other memory bank that is left uncorrupted. Additionally, a memory bank containing target memory address is considered to be a target memory bank.
Claim 13 and 14 correspond to claims 7 and 8 (respectively), and are rejected accordingly.
Claim 16 corresponds to claim 1, and is rejected accordingly, but for the following added limitations. Caraccio teaches:
Applying a command mask to a command interface based on the post package repair command. (fig. 3, operation 352: detecting an sPPR request -> operation 354: suspending execution of non-maintenance requests on the target row.) This effectively applies a mask to the command interface by blocking any future non-maintenance commands for the target row.
Removing the command mask based on the post package repair being performed. (fig. 3, operation 356: subsequent to completion of the sPPR request, resuming execution of non-maintenance requests on the target row.)
It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate applying (and removing) a command mask based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42).
Claims 17 and 18 correspond to claim 8 and are rejected accordingly.
Regarding claim 19, the combination of Rooney and Caraccio teaches claim 16.
Rooney teaches: performing the data corruption comprises: [receiving sPPR commands]… (para. 52: poisoning data includes issuing or receiving one or more commands to poison the data. The commands can include… one or more commands to execute an sPPR operation.)
Caraccio teaches:
[receiving an sPPR command causes:] writing the target portion of memory to ones or zeros; (fig. 3: operation 352, detecting an sPPR request -> operation 353, writing data stored in target row of a memory array associated with the sPPR request to a buffer) It is well known in the art that writing computer information to a buffer is essentially writing information to ones or zeros.
Generating a new scramble key and wear leveling pointers for an associated memory bank;
Or a combination thereof.
It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate applying (and removing) a command mask based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42).
Regarding claim 20, the combination of Rooney and Caraccio teaches claim 16. Rooney further teaches:
Corrupting the data for a first time period; and performing the post package repair for a second time period, wherein the first time period and the second time period at least partially overlap. (para. 52: poisoning data includes issuing or receiving one or more commands to poison the data. The commands can include… one or more commands to execute an sPPR operation.)
Claim 2 is rejected under 35 U.S.C. 103 as being unpatentable over Rooney, Caraccio, and Tekumalla (US Publication No. 2014/0281703).
Regarding claim 2, the combination of Rooney and Caraccio teaches the device of claim 1. Caraccio further teaches:
Wherein the command interface is operable to disable the input and enable the input based on:
…
Ignoring a repair address in response to the post package repair command being issued as a command following a most recent command of alert soft post package repair (ASPPR). (see fig. 3: operation 352, detecting a sPPR request -> operation 354, suspending execution of non-maintenance requests on the target row.) Examiner notes that ASPPR is not a term well known in the art, and upon consulting the specification was unable to find a limiting definition of ASPPR that distinguishes it from sPPR. Therefore, ASPPR is interpreted as a kind of sPPR. Suspending execution of non-maintenance requests on the target row effectively ignores future PPR commands, including the repair addresses associated with them.
It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate enabling (and disabling) an input to the command interface based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42).
However, Rooney and Caraccio do not explicitly teach:
[in response to a repair operation being performed] holding an internal chip select (CS) enable signal at a logic low value;
In the analogous art of memory repair, Tekumalla teaches:
[in response to a repair operation being performed] holding an internal chip select (CS) enable signal at a logic low value; (Abstract: during repair [operations], the method disables the chip select for the memory to prevent memory operations until [the repair operations are complete].)
It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney, Caraccio, and Tekumalla before them, before the effective filing date of the claimed invention, to incorporate holding an internal chip select signal low while repair operations are being performed (taught by Tekumalla) into the system for performing post package repair (taught by Rooney and Caraccio), to allow for the benefit of preventing memory operations during repair (Tekumalla, abstract) so that the hazard of losing data during PPR (described by Caraccio, para. 42) may be guaranteed to be avoided.
Claims 6 and 15 are rejected under 35 U.S.C. 103 as being unpatentable over Rooney, Caraccio, and Chu (CN 117095733).
Regarding claim 6, the combination of Rooney and Caraccio teaches the device of claim 1. Rooney further teaches:
The command decoder is operable to corrupt the data corresponding to the target portion of memory based on the target memory address. (see para. 52: The method 240 begins at block 241 by poisoning data stored to a memory array of the memory device. And see para. 20: the present technology allows a host device of the system, in conjunction with the memory device coupled therewith, to control which bits to invert (to poison) during write or read operations.)
However, the combination of Rooney and Caraccio does not explicitly teach:
[PPR operations are performed based on] determining that sensed temperature data is less than or equal to a temperature threshold.
In the analogous art of post package repair operations, Chu teaches:
[PPR operations are performed based on] determining that sensed temperature data is less than or equal to a temperature threshold. (para. 1, page. 5 of attached translation: The temperature adjustment range of the cryogenic box is -40°C-40°C, that is, the DDR4 DRAM repair verification method is performed at -40°C-40°C.)
It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney, Caraccio, and Chu before them, before the effective filing date of the claimed invention, to incorporate only performing PPR operations when the temperature is less than or equal to 40°C into the system for performing post package repair (taught by Rooney and Caraccio), to allow for the benefit of ensuring data will not be lost (Chu, pg. 5, para. 1).
Claim 15 corresponds to claim 6, and is rejected accordingly.
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to JACK K BARNETT whose telephone number is (571)270-0431. The examiner can normally be reached M-Th 8-5, F 8-4 EST.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Mark Featherstone can be reached at 571-270-3750. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/JACK KENSINGTON BARNETT/ Examiner, Art Unit 2111
/GUERRIER MERANT/ Primary Examiner, Art Unit 2111 1/21/2026