Prosecution Insights
Last updated: April 19, 2026
Application No. 18/784,456

Post Package Repair of Memory with Data Corruption Systems and Methods

Non-Final OA §103
Filed
Jul 25, 2024
Examiner
BARNETT, JACK KENSINGTON
Art Unit
2111
Tech Center
2100 — Computer Architecture & Software
Assignee
Micron Technology, Inc.
OA Round
1 (Non-Final)
87%
Grant Probability
Favorable
1-2
OA Rounds
2y 0m
To Grant
88%
With Interview

Examiner Intelligence

Grants 87% — above average
87%
Career Allow Rate
13 granted / 15 resolved
+31.7% vs TC avg
Minimal +2% lift
Without
With
+1.8%
Interview Lift
resolved cases with interview
Fast prosecutor
2y 0m
Avg Prosecution
19 currently pending
Career history
34
Total Applications
across all art units

Statute-Specific Performance

§101
11.2%
-28.8% vs TC avg
§103
53.4%
+13.4% vs TC avg
§102
22.8%
-17.2% vs TC avg
§112
10.2%
-29.8% vs TC avg
Black line = Tech Center average estimate • Based on career data from 15 resolved cases

Office Action

§103
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. The factual inquiries for establishing a background for determining obviousness under 35 U.S.C. 103 are summarized as follows: 1. Determining the scope and contents of the prior art. 2. Ascertaining the differences between the prior art and the claims at issue. 3. Resolving the level of ordinary skill in the pertinent art. 4. Considering objective evidence present in the application indicating obviousness or nonobviousness. Claims 1, 3-5, 7-14, 16-20 are rejected under 35 U.S.C. 103 as being unpatentable over Rooney (US Publication No. 2022/0147267) in view of Caraccio (US Publication No. 2023/0395184). Regarding claim 1, Rooney teaches: A device comprising: a command interface (see fig. 1B: Address Command Input Circuit 105) operable to: receive a post package repair command and an indication of a target memory address from a host controller; (see fig. 1B: Address Command Input Circuit 105 receives ADDR and CMD) … and a command decoder coupled to the command interface via a command/address bus (see fig. 1B: Command Decoder 115 and Address Decoder 110 collectively are considered to be a command decoder), wherein the command decoder is operable to: corrupt data corresponding to a target portion of memory based on the target memory address; (see para. 52: The method 240 begins at block 241 by poisoning data stored to a memory array of the memory device. And see para. 20: the present technology allows a host device of the system, in conjunction with the memory device coupled therewith, to control which bits to invert (to poison) during write or read operations.) and perform post package repair on the target portion of memory based on the target memory address. (see para. 58: the method 250 begins at block 251 by remapping a first logical address from a first physical address to a second physical address of the memory device. In some embodiments, the remapping is performed in response to a command to enable and/or execute an sPPR operation on the memory device. And see para. 20: the present technology allows a host device of the system, in conjunction with the memory device coupled therewith, to control which bits to invert (to poison) during write or read operations. In some embodiments, the host device may enable and utilize a sPPR function of the memory device to remap a logical address of a memory array between different physical addresses at which known-good and known-bad (e.g., poisoned) data are written.) However, Rooney does not explicitly disclose: Disable an input to the command interface based on the post package repair command; In the analogous art of post package repair, Caraccio teaches: Disable an input to the command interface based on the post package repair command; (see fig. 3: operation 352, detecting a sPPR request -> operation 354, suspending execution of non-maintenance requests on the target row.) This effectively disables any input that would cause the execution of a non-maintenance request on the target row, for example an additional sPPR request/command. It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate disabling an input based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42). Regarding claim 3, the combination of Rooney and Caraccio teaches the device of claim 1. Caraccio further teaches: Wherein the command interface is operable to enable the input based on an indication that the command decoder has completed performing the post package repair. (see fig. 3: operation 356, subsequent to completion of the sPPR request, resuming execution of non-maintenance requests on the target row.) It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate disabling an input based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42). Regarding claim 4, the combination of Rooney and Caraccio teaches the device of claim 3. Caraccio further teaches: Wherein the command decoder is operable to generate the indication that the command decoder has completed performing the post package repair. (see claim 12: a control circuitry configured to: suspend execution of requests associated with a target address associated with a memory device and a post package repair (PPR) request; … execute the PPR request.) The control circuitry is considered to be a command decoder because it receives and processes commands. It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate disabling an input based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42). Regarding claim 5, the combination of Rooney and Caraccio teaches the device of claim 1. Rooney further teaches: The command decoder is operable to: Corrupt the data corresponding to a plurality of portions of the target portion of memory; (see para 20: the present technology allows a host device of the system, in conjunction with the memory device coupled therewith, to control which bits to invert (to poison).) Each bit can effectively be considered a portion of the target portion of memory. Perform the post package repair on a subset of the plurality of portions based on the post package repair being performed for a respective portion of the plurality of portions after corrupting the data corresponding to that respective portion. (para. 20: the host device may enable and utilize an sPPR function of the memory device to remap a logical address of a memory array between different physical addresses at which known-good and known-bad (e.g., poisoned) data are written, to permit the poisoning of data without reliance upon test modes or direct data manipulation.) Regarding claim 7, the combination of Rooney and Caraccio teaches the device of claim 1. Rooney further teaches: Wherein the command decoder is operable to start performing the post package repair after beginning to corrupt the data. (para. 20: the host device may enable and utilize an sPPR function of the memory device to remap a logical address of a memory array between different physical addresses at which known-good and known-bad (e.g., poisoned) data are written, to permit the poisoning of data without reliance upon test modes or direct data manipulation.) Regarding claim 8, the combination of Rooney and Caraccio teaches the device of claim 1. Rooney further teaches: Wherein the command decoder is operable to start performing the post package repair after the data is corrupted. (para. 20: the host device may enable and utilize an sPPR function of the memory device to remap a logical address of a memory array between different physical addresses at which known-good and known-bad (e.g., poisoned) data are written, to permit the poisoning of data without reliance upon test modes or direct data manipulation.) Regarding claim 9, the combination of Rooney and Caraccio teaches the device of claim 1. Rooney further teaches: Wherein the target memory address corresponds to A portion of an emerging memory device memory bank, a random access memory (RAM), a dynamic random access memory (DRAM), (see para. 21: in some embodiments, the memory devices 100 can be DRAM memory devices) Double Data Rate Five Synchronous Dynamic Random-Access Memory (DDR5), Low Power Double Data Rate (LPDDR5) memory, or any combination thereof. Regarding claim 10, the combination of Rooney and Caraccio teaches the device of claim 1. Caraccio further teaches: Wherein the command decoder is operable to continue performing normal memory operations after the command interface enables the input. (see fig. 3: operation 356, subsequent to completion of the sPPR request, resuming execution of non-maintenance requests on the target row.) It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate disabling an input based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42). Claim 11 corresponds to claim 1, and is rejected accordingly, but for the following added limitations. Rooney teaches: Securing an indication of a mapping of logical to physical addressing associated with the target memory address based on corrupting data corresponding to a target portion of memory based on the target memory address; (see para. 20: the host device may enable and utilize a sPPR function of the memory device to remap a logical address of a memory array between different physical addresses at which known-good and known-bad (e.g., poisoned) data are written.) However, Rooney does not explicitly teach: Enabling the input based on the post package repair and the data being corrupted Carracio teaches: Enabling the input based on the post package repair and the data being corrupted (see fig. 3: operation 356, subsequent to completion of the sPPR request, resuming execution of non-maintenance requests on the target row.) It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate disabling (and reenabling) an input based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42). Regarding claim 12, the combination of Rooney and Caraccio teaches the method of claim 11. Rooney further teaches: Corrupting the data comprises: corrupting the data corresponding to a target memory bank associated with the target memory address that is to undergo the post package repair at least in part by leaving one or more other memory banks uncorrupted. (para. 9: there are multiple memory arrays in the memory system. And see para. 30: the memory array 150 includes a plurality of banks. And see para. 52: the method 240 begins at block 241 by poisoning data stored to a memory array of a memory device.) If there are multiple memory arrays, each including multiple banks, and only data from one array is corrupted, then there must be at least one other memory bank that is left uncorrupted. Additionally, a memory bank containing target memory address is considered to be a target memory bank. Claim 13 and 14 correspond to claims 7 and 8 (respectively), and are rejected accordingly. Claim 16 corresponds to claim 1, and is rejected accordingly, but for the following added limitations. Caraccio teaches: Applying a command mask to a command interface based on the post package repair command. (fig. 3, operation 352: detecting an sPPR request -> operation 354: suspending execution of non-maintenance requests on the target row.) This effectively applies a mask to the command interface by blocking any future non-maintenance commands for the target row. Removing the command mask based on the post package repair being performed. (fig. 3, operation 356: subsequent to completion of the sPPR request, resuming execution of non-maintenance requests on the target row.) It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate applying (and removing) a command mask based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42). Claims 17 and 18 correspond to claim 8 and are rejected accordingly. Regarding claim 19, the combination of Rooney and Caraccio teaches claim 16. Rooney teaches: performing the data corruption comprises: [receiving sPPR commands]… (para. 52: poisoning data includes issuing or receiving one or more commands to poison the data. The commands can include… one or more commands to execute an sPPR operation.) Caraccio teaches: [receiving an sPPR command causes:] writing the target portion of memory to ones or zeros; (fig. 3: operation 352, detecting an sPPR request -> operation 353, writing data stored in target row of a memory array associated with the sPPR request to a buffer) It is well known in the art that writing computer information to a buffer is essentially writing information to ones or zeros. Generating a new scramble key and wear leveling pointers for an associated memory bank; Or a combination thereof. It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate applying (and removing) a command mask based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42). Regarding claim 20, the combination of Rooney and Caraccio teaches claim 16. Rooney further teaches: Corrupting the data for a first time period; and performing the post package repair for a second time period, wherein the first time period and the second time period at least partially overlap. (para. 52: poisoning data includes issuing or receiving one or more commands to poison the data. The commands can include… one or more commands to execute an sPPR operation.) Claim 2 is rejected under 35 U.S.C. 103 as being unpatentable over Rooney, Caraccio, and Tekumalla (US Publication No. 2014/0281703). Regarding claim 2, the combination of Rooney and Caraccio teaches the device of claim 1. Caraccio further teaches: Wherein the command interface is operable to disable the input and enable the input based on: … Ignoring a repair address in response to the post package repair command being issued as a command following a most recent command of alert soft post package repair (ASPPR). (see fig. 3: operation 352, detecting a sPPR request -> operation 354, suspending execution of non-maintenance requests on the target row.) Examiner notes that ASPPR is not a term well known in the art, and upon consulting the specification was unable to find a limiting definition of ASPPR that distinguishes it from sPPR. Therefore, ASPPR is interpreted as a kind of sPPR. Suspending execution of non-maintenance requests on the target row effectively ignores future PPR commands, including the repair addresses associated with them. It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney and Caraccio before them, before the effective filing date of the claimed invention, to incorporate enabling (and disabling) an input to the command interface based on an sPPR command (taught by Caraccio) into the system for performing post package repair (taught by Rooney), to allow for benefits such as: remedying the potential hazard of losing data and/or data being unavailable during PPR (Caraccio, para. 42). However, Rooney and Caraccio do not explicitly teach: [in response to a repair operation being performed] holding an internal chip select (CS) enable signal at a logic low value; In the analogous art of memory repair, Tekumalla teaches: [in response to a repair operation being performed] holding an internal chip select (CS) enable signal at a logic low value; (Abstract: during repair [operations], the method disables the chip select for the memory to prevent memory operations until [the repair operations are complete].) It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney, Caraccio, and Tekumalla before them, before the effective filing date of the claimed invention, to incorporate holding an internal chip select signal low while repair operations are being performed (taught by Tekumalla) into the system for performing post package repair (taught by Rooney and Caraccio), to allow for the benefit of preventing memory operations during repair (Tekumalla, abstract) so that the hazard of losing data during PPR (described by Caraccio, para. 42) may be guaranteed to be avoided. Claims 6 and 15 are rejected under 35 U.S.C. 103 as being unpatentable over Rooney, Caraccio, and Chu (CN 117095733). Regarding claim 6, the combination of Rooney and Caraccio teaches the device of claim 1. Rooney further teaches: The command decoder is operable to corrupt the data corresponding to the target portion of memory based on the target memory address. (see para. 52: The method 240 begins at block 241 by poisoning data stored to a memory array of the memory device. And see para. 20: the present technology allows a host device of the system, in conjunction with the memory device coupled therewith, to control which bits to invert (to poison) during write or read operations.) However, the combination of Rooney and Caraccio does not explicitly teach: [PPR operations are performed based on] determining that sensed temperature data is less than or equal to a temperature threshold. In the analogous art of post package repair operations, Chu teaches: [PPR operations are performed based on] determining that sensed temperature data is less than or equal to a temperature threshold. (para. 1, page. 5 of attached translation: The temperature adjustment range of the cryogenic box is -40°C-40°C, that is, the DDR4 DRAM repair verification method is performed at -40°C-40°C.) It would have been obvious, to one of ordinary skill in the art, having the teachings of Rooney, Caraccio, and Chu before them, before the effective filing date of the claimed invention, to incorporate only performing PPR operations when the temperature is less than or equal to 40°C into the system for performing post package repair (taught by Rooney and Caraccio), to allow for the benefit of ensuring data will not be lost (Chu, pg. 5, para. 1). Claim 15 corresponds to claim 6, and is rejected accordingly. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to JACK K BARNETT whose telephone number is (571)270-0431. The examiner can normally be reached M-Th 8-5, F 8-4 EST. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Mark Featherstone can be reached at 571-270-3750. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /JACK KENSINGTON BARNETT/ Examiner, Art Unit 2111 /GUERRIER MERANT/ Primary Examiner, Art Unit 2111 1/21/2026
Read full office action

Prosecution Timeline

Jul 25, 2024
Application Filed
May 01, 2025
Response after Non-Final Action
Jan 21, 2026
Non-Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12597948
Data Validation and Correction using Hybrid Parity and Error Correcting Codes
2y 5m to grant Granted Apr 07, 2026
Patent 12596150
X-Masking for In-System Deterministic Test
2y 5m to grant Granted Apr 07, 2026
Patent 12579028
MEMORY SYSTEM AND CONTROL METHOD
2y 5m to grant Granted Mar 17, 2026
Patent 12567476
MULTIPLE TEST MODES FOR A MEMORY IN AN INTEGRATED CIRCUIT
2y 5m to grant Granted Mar 03, 2026
Patent 12553944
BUILT-IN SELF TEST CIRCUIT FOR MEASURING PERFORMANCE OF CLOCK DATA RECOVERY AND SYSTEM-ON-CHIP INCLUDING THE SAME
2y 5m to grant Granted Feb 17, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
87%
Grant Probability
88%
With Interview (+1.8%)
2y 0m
Median Time to Grant
Low
PTA Risk
Based on 15 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month