Self-seeded randomizer for data randomization in flash memory

ABSTRACT

Disclosed in some examples are methods, systems, devices, and machine-readable mediums that provide for techniques for scrambling and/or updating meta-data that enable an efficient internal copyback operation. In some examples, improved data distribution techniques decouple the scrambling key from a physical address to allow for copyback operations while maintaining data distribution requirements across a memory device. The controller may generate a seed value that is used by a scrambling algorithm to scramble the host-data and meta-data prior to the data being written. The seed value is then encoded and written to the page with encoded versions of the scrambled user data and meta-data—the random seed is written without scrambling the random seed.

PRIORITY APPLICATION

This application is a continuation of U.S. application Ser. No.17/739,578, filed May 9, 2022, which is a continuation of U.S.application Ser. No. 16/837,315, filed Apr. 1, 2020, now issued as U.S.Pat. No. 11,327,884, all of which are incorporated herein by referencein their entirety.

FIELD OF INVENTION

Embodiments pertain to memory devices. Some embodiments relate toenabling efficient internal copyback operations for copying data betweentwo different locations within a same memory die in a memory devicewhile also maintaining data randomization and updating meta-data of datasubject to copyback operations

BACKGROUND

Memory devices for computers or other electronic devices may becategorized as volatile and non-volatile memory. Volatile memoryrequires power to maintain its data, and includes random-access memory(RAM), dynamic random-access memory (DRAM), or synchronous dynamicrandom-access memory (SDRAM), among others. Non-volatile memory canretain stored data when not powered, and includes flash memory,read-only memory (ROM), electrically erasable programmable ROM (EEPROM),static RAM (SRAM), erasable programmable ROM (EPROM), resistancevariable memory, phase-change memory, storage class memory, resistiverandom-access memory (RRAM), and magnetoresistive random-access memory(MRAM), among others.

Flash memory is utilized as non-volatile memory for a wide range ofelectronic applications. Flash memory devices typically include one ormore groups of transistors such as floating gate or charge trap memorycells that allow for high memory densities, high reliability, and lowpower consumption.

BRIEF DESCRIPTION OF THE DRAWINGS

In the drawings, which are not necessarily drawn to scale, like numeralscan describe similar components in different views. Like numerals havingdifferent letter suffixes can represent different instances of similarcomponents. The drawings illustrate generally, by way of example, butnot by way of limitation, various embodiments discussed in the presentdocument.

FIG. 1 illustrates a diagram of a memory device, such as a storagedevice according to some examples of the present disclosure.

FIG. 2 illustrates an example schematic diagram of a portion of a NANDarchitecture semiconductor memory array according to some examples ofthe present disclosure.

FIG. 3 illustrates an example schematic diagram of a 3D NANDarchitecture semiconductor memory according to some examples of thepresent disclosure.

FIG. 4 illustrates an example block diagram of a memory die according tosome examples of the present disclosure.

FIG. 5 illustrates a data flow of a write operation according to someexamples of the present disclosure.

FIG. 6 illustrates a data flow of a read operation according to someexamples of the present disclosure.

FIG. 7 illustrates a flowchart of a method of writing data to a memorydevice according to some examples of the present disclosure.

FIG. 8 illustrates a flowchart of a method of read data from a memorydevice according to some examples of the present disclosure.

FIG. 9 illustrates a data flow of a write operation according to someexamples of the present disclosure where the meta-data and host-data areseparately encoded.

FIG. 10 illustrates a data flow of an internal copyback operation withmeta-data update according to some examples of the present disclosurewhere the meta-data and host-data are separately encoded.

FIG. 11 illustrates a flowchart of a method of writing data to a memorydevice according to some examples of the present disclosure.

FIG. 12 illustrates a flowchart of a method of writing data to a memorydevice during an internal copyback operation according to some examplesof the present disclosure.

FIG. 13 illustrates a flowchart of a method of an internal copybackoperation on a memory device according to some examples of the presentdisclosure.

FIG. 14 illustrates a block diagram of an example machine upon which anyone or more of the techniques (e.g., methodologies) discussed herein maybe performed.

DETAILED DESCRIPTION

Memory devices are often composed of multiple physical memory diesconnected to a controller via an internal communication interface suchas a bus. Certain operations of the memory device require copying datafrom cells in one location on a die to another location on a same die.One example is a copy operation from an SLC cache block to a TLC/QLCstorage block. Many TLC/QLC memory systems use SLC blocks as a writecache for performance reasons. When data in these SLC cache blocks needto be moved to slower (but denser) TLC/QLC blocks, a copy operation isneeded. Traditional approaches have transferred the data from the die tothe controller over the internal communication interface for processing,and then back over the internal I/O bus to a die for storage in thedifferent location.

In order to reduce I/O bus traffic and to reduce the utilization of thecontroller, internal copyback operations can be performed where data ismoved from one location to another location in a same memory die of thememory device without transferring the data to the controller over thecommunication interface. Use of internal copyback operations savescontroller resources (e.g., processing cycles and working memory),interface bandwidth, lowers energy consumption, and has lower latency incompleting the operations. As the memory die does not have the resourcesto process the data in the same way as the controller, an internalcopyback operation does not process the data in anycomputation-intensive way. Typically, the internal copyback copies thedata without any modifications or processing.

Writing the data without modifications or processing may impactreliability of the memory device and the data written. This lack ofprocessing may cause issues for internal copyback operations. Whileindividual memory dies may be modified to perform these processingsteps, this would unacceptably increase the cost and complexity of thesedevices.

For example, a randomizer is typically used in memory devices becausethe data pattern stored in the memory cells must satisfy certainrequirements to meet reliability targets. As will be described later,NAND flash memory cells are arranged in a grid with wordlines (WL)connecting memory cells in rows and bitlines (BL) connecting cells incolumns. NAND memory devices typically ensure that the bits stored ineach WL have an approximately equal number of 0s and 1s, and the bitsstored in each BL to have approximately equal number of 0s and 1s. Inaddition, if each memory cell stores more than 1 bit, such as inMLC/TLC/QLC, there're more than two threshold voltage states in eachcell. In these examples, memory devices ensure that the number of cellsin each state are approximately equal within a same WL. By ensuring thisdata pattern distribution, it reduces storage errors.

These data pattern distribution requirements are typically met throughuse of a scrambler. While the memory system cannot control what datapattern the user may choose to write, a scrambler “scrambles” the datato be written, such that a balanced number of 0s/1s are more likely tobe programed to the media. The scrambler can be implemented in acontroller, or within a memory die itself.

Increased reliability is gained by storing a balanced number of ones andzeros across both the wordlines and the bitlines. Typically, thedistribution requirements along the BL and for multiple pages in thesame WL are met by ensuring proper scrambler seeding. Physicaladdress-based seeding is widely used for this purpose. For example, anincoming word to be written is XORed with a random sequence seeded bythe physical address of the page to which the word is written. Whenreading the data, the data that is read is then XORed again with thephysical address to produce the unscrambled data. Using physical pageaddress as part of or the entirety of the scrambler seed generallyensures that even if the same data pattern is written to each page inthe block, the data programmed to the media is randomized across thebitlines.

Physical address-based scrambler seeding is not compatible with internalcopyback. As already discussed, internal copyback normally does notalter the data that is copied. If the scrambler were to use a physicalpage address to perform the scrambling (e.g., the scrambler is “seeded”with the physical page), after an internal copyback operation completesthe physical address of the page will have changed. Attempts tounscramble the data during a read operation will fail if the currentphysical address of the data (e.g., the physical address after theinternal copyback) is used to unscramble the data instead of theoriginal physical address. While memory devices could provide amechanism to track the original physical page of the data for decodingpurposes, this may be too expensive in terms of the memory needed tostore such data.

Another issue with internal copyback operations is updating meta-datacreated when the data was first written. This meta-data is written alongwith the data received from the host (host-data). The meta-data may bedata specific to conditions of the memory device at the time of thewrite operation. For example, the time the data was written, thetemperature of the memory device during the initial write, writevoltage, initial write verify indicators, and the like. These fieldsallow the memory device to more reliably read the host-data. As theinternal copyback operation does not decode and unscramble the data, itcannot update this meta-data. Failure to update the meta-data can resultin reliability and/or performance issues later (e.g., when trying toread the data later). While the memory die could decode the meta-data,update the values, and restore the data—this would require additionalprocessing and volatile memory resources on the memory die. Thisincrease the expense and complexity of each memory die.

Disclosed in some examples are methods, systems, devices, andmachine-readable mediums that provide for techniques for scramblingand/or updating meta-data that enable an efficient internal copybackoperation. In some examples, improved data distribution techniquesdecouple the scrambling key from a physical address to allow forcopyback operations while maintaining data distribution requirementsacross a memory device. The controller may generate a seed value that isused by an algorithm to scramble the host-data and meta-data prior tothe data being written. The seed value is then encoded and written tothe page with encoded versions of the scrambled user data andmeta-data—the random seed is written without scrambling the random seed.When reading the data, because the seed is stored with the data, it canbe unscrambled easily. In some examples, the seed value is a randomvalue generated by a random number generator.

In some examples, in order to update the meta-data, the meta-data andhost-data are separated and the only the meta-data is sent to thecontroller to be updated during a modified internal copyback operation.The host-data is not transmitted to the controller. While sending themeta-data utilizes resources of the communication link between thememory dies and the controller, it uses much fewer resources than if thehost-data were also transmitted. In order for the host-data andmeta-data to be separately sent, the meta-data and the host-data arescrambled and encoded such that the meta-data can be separatelyunscrambled and decoded without the presence of the host-data. Forexample, by separately encoding and/or scrambling the host-data andmeta-data.

By employing the above techniques, various issues with internal copybackoperations may be avoided. First, since the physical address is not usedas the key to the scrambler, the host-data and meta-data may be copiedwithout modification from one memory location to another. Thus, datareliability gains made possible by scrambling the data may be retainedwhile at the same time allowing for unscrambling of data that wassubject to an internal copyback operation. Second, since the meta-dataand host-data scrambled and encoded such that they can be separatelyunscrambled and decoded, the meta-data may be sent back to thecontroller for updating prior to completion of the internal copyback.This updates the meta-data while using a very small fraction of thecommunication and processing resources of the controller and theinterface bandwidth between the memory dies and the controller.

Memory Device Overview

As previously noted, flash memory is utilized as non-volatile memory fora wide range of electronic applications. Flash memory typically includesone or more groups of transistors such as floating gate or charge trapmemory cells that allow for high memory densities, high reliability, andlow power consumption. Two common types of flash memory arrayarchitectures include NAND and NOR architectures, named after the logicform in which the basic memory cell configuration of each is arranged.The memory cells of the memory array are typically arranged in a matrix.In an example, the gates of each memory cell in a row of the array arecoupled to an access line (e.g., a word line). In a NOR architecture,the drains of each memory cell in a column of the array are coupled to adata line (e.g., a bit line). In a NAND architecture, the drains of eachmemory cell in a string of the array are coupled together in series,source to drain, between a source line and a bit line.

Both NOR and NAND architecture semiconductor memory arrays are accessedthrough decoders that activate specific memory cells by selecting theword line coupled to their gates. In a NOR architecture semiconductormemory array, once activated, the selected memory cells place their datavalues on bit lines, causing different currents to flow depending on thestate at which a particular cell is programmed. In a NAND architecturesemiconductor memory array, a high bias voltage is applied to adrain-side select gate (SGD) line. Word lines coupled to the gates ofthe unselected memory cells of each group are driven at a specified passvoltage (e.g., Vpass) to operate the unselected memory cells of eachgroup as pass transistors (e.g., to pass current in a mannerunrestricted by their stored data values). Current then flows from thesource line to the bit line through each series coupled group,restricted only by the selected memory cells of each group, placingcurrent encoded data values of selected memory cells on the bit lines.

Flash memory cells in a NOR or NAND architecture semiconductor memoryarray can be programmed individually or collectively to one or a numberof programmed states. For example, a single-level cell (SLC) canrepresent one of two programmed states (e.g., 1 or 0), representing onebit of data. However, flash memory cells can also represent one of morethan two programmed states, allowing the manufacture of higher densitymemories without increasing the number of memory cells, as each cell canrepresent more than one binary digit (e.g., more than one bit). Suchcells can be referred to as multi-state memory cells, multi-digit cells,or multi-level cells (MLCs). In certain examples, MLC can refer to amemory cell that can store two bits of data per cell (e.g., one of fourprogrammed states), a triple-level cell (TLC) can refer to a memory cellthat can store three bits of data per cell (e.g., one of eightprogrammed states), and a quad-level cell (QLC) can store four bits ofdata per cell. MLC is used herein in its broader context, to can referto any memory cell that can store more than one bit of data per cell(i.e., that can represent more than two programmed states).

Traditional memory arrays are two-dimensional (2D) structures arrangedon a surface of a semiconductor substrate. To increase memory capacityfor a given area, and to decrease cost, the size of the individualmemory cells has decreased. However, there is a technological limit tothe reduction in size of the individual memory cells, and thus, to thememory density of 2D memory arrays. In response, three-dimensional (3D)memory structures, such as 3D NAND architecture semiconductor memorydevices, are being developed to further increase memory density andlower memory cost.

Such 3D NAND devices often include strings of storage cells, coupled inseries (e.g., drain to source), between one or more source-side selectgates (SGSs) proximate a source, and one or more drain-side select gates(SGDs) proximate a bit line. In an example, the SGSs or the SGDs caninclude one or more field-effect transistors (FETs) or metal-oxidesemiconductor (MOS) structure devices, etc. In some examples, thestrings will extend vertically, through multiple vertically spaced tierscontaining respective word lines. A semiconductor structure (e.g., apolysilicon structure) can extend adjacent a string of storage cells toform a channel for the storage cells of the string. In the example of avertical string, the polysilicon structure can be in the form of avertically extending pillar. In some examples the string can be“folded,” and thus arranged relative to a U-shaped pillar. In otherexamples, multiple vertical structures can be stacked upon one anotherto form stacked arrays of storage cell strings.

Memory arrays or devices can be combined together to form a storagevolume of a memory system, such as a solid-state drive (SSD), or one ofvarious forms of managed memory device. Managed memory devices may beconfigured and operated in accordance with recognized industrystandards. For example, managed NAND devices may be (as non-limitingexamples), a Universal Flash Storage (UFS™) device, or an embedded MMCdevice (eMMC™), etc. For example, in the case of the above examples, UFSdevices may be configured in accordance with Joint Electron DeviceEngineering Council (JEDEC) standards such as JEDEC standard JESD223D,entitled “JEDEC UFS Flash Storage 3.0,” and/or updates or subsequentversions to such standard. Similarly, identified eMMC devices may beconfigured in accordance with JEDEC standard JESD84-A51, entitled “JEDECeMMC standard 5.1”, again, and/or updates or subsequent versions to suchstandard.

An SSD can be used as, among other things, the main storage device of acomputer, having advantages over traditional hard drives with movingparts with respect to, for example, performance, size, weight,ruggedness, operating temperature range, and power consumption. Forexample, SSDs can have reduced seek time, latency, or other delayassociated with magnetic disk drives (e.g., electromechanical, etc.).SSDs use non-volatile memory cells, such as flash memory cells toobviate internal battery supply requirements, thus allowing the drive tobe more versatile and compact.

An SSD can include a number of memory devices, including a number ofdies or logical units (e.g., logical unit numbers or LUNs), and caninclude one or more processors or other controllers performing logicfunctions required to operate the memory devices or interface withexternal systems. Such SSDs can include one or more flash memory die,including a number of memory arrays and peripheral circuitry thereon.The flash memory arrays can include a number of blocks of memory cellsorganized into a number of physical pages. In many examples, the SSDswill also include DRAM or SRAM (or other forms of memory die or othermemory structures). The SSD can receive commands from a host inassociation with memory operations, such as read or write operations totransfer data (e.g., user data and associated integrity data, such aserror data and address data, etc.) between the memory devices and thehost, or erase operations to erase data from the memory devices.

Memory devices include individual memory die, which may, for example,include including a storage region comprising one or more arrays ofmemory cells, implementing one (or more) selected storage technologies.Such memory die will often include support circuitry for operating thememory array(s). Other examples, sometimes known generally as “managedmemory devices,” include assemblies of one or more memory die associatedwith controller functionality configured to control operation of the oneor more memory die. Such controller functionality can simplifyinteroperability with an external device, such as a “host” as discussedlater herein. In such managed memory devices, the controllerfunctionality may be implemented on one or more die also incorporating amemory array, or on a separate die). In other examples, one or morememory devices may be combined with controller functionality to form asolid-stage drive (SSD) storage volume. The term “memory system,” isused herein as inclusive of one or more memory die, and any controllerfunctionality for such memory die, when present; and thus, includesindividual memory devices, managed memory devices, and SSDs.

For purposes of the present description, example embodiments includemanaged memory devices implementing NAND flash memory cells, termed“managed NAND” devices. Such managed NAND devices may be constructed andoperated generally in accordance with the described JEDEC UFS FlashStorage 3.0 specification, as may be modified as appropriate toincorporate the structures and functionality described herein. However,the described functionality may be implemented with other types ofmemory devices, as described above, which may incorporate other storagetechnologies, a few non-limiting examples of which were discussedearlier herein; and may be configured for operation in accordance withother industry standards, as discussed above; or in accordance withnon-industry standard protocols.

Electronic devices, such as mobile electronic devices (e.g., smartphones, tablets, etc.), electronic devices for use in automotiveapplications (e.g., automotive sensors, control units, driver-assistancesystems, passenger safety or comfort systems, etc.), andinternet-connected appliances or devices (e.g., internet-of-things (IoT)devices, etc.), have varying storage needs depending on, among otherthings, the type of electronic device, use environment, performanceexpectations, etc.

Electronic devices can be broken down into several main components: aprocessor (e.g., a central processing unit (CPU) or other mainprocessor); memory (e.g., one or more volatile or non-volatilerandom-access memory (RAM) memory device, such as dynamic RAM (DRAM),mobile or low-power double-data-rate synchronous DRAM (DDR SDRAM),etc.); and a storage device (e.g., non-volatile memory (NVM) device,such as flash memory, read-only memory (ROM), an SSD, an MMC, or othermemory card structure or assembly, etc.). In certain examples,electronic devices can include a user interface (e.g., a display,touchscreen, keyboard, one or more buttons, etc.), a graphics processingunit (GPU), a power management circuit, a baseband processor or one ormore transceiver circuits, etc.

FIG. 1 illustrates a diagram of a memory device 100, such as a storagedevice according to some examples of the present disclosure. Memorydevice 100 may include one or more host interfaces 123 which may utilizeone or more protocols such as a Serial Advanced Technology Attachment(SATA) interface, a Peripheral Component Interconnect Express (PCIe)interface, a Universal Serial Bus (USB) interface, a Universal FlashStorage (UFS) interface, an eMMC™ interface, or one or more otherconnectors or interfaces to communicate with a host device 135. Host 135may send one or more commands, such as read comments, write commands,erase commands, and the like to the memory device 100 through the hostinterface 123. Host interface 123 may be part of controller 105 or maybe implemented by separate circuitry.

Memory device 100 may include one or more controllers 105. Controller105 may include processing circuitry 110 which may include one or moreprocessors 115. Processors 115 may be general purpose hardwareprocessors that execute firmware or other software instructions forperforming operations of the memory device, including implementing thehost interface 123 and memory die interface 125. In other examples, theprocessor(s) 115 may be special purpose hardware processors that arespecifically designed to perform the operations of the memory device 100through hardware logic and/or through the execution of softwareinstructions. Processing circuitry 110 may also include logic circuitsand other circuit components configured to perform various controlfunctionality and memory management operations, or portions thereof,examples of which are described below.

In the depicted example, memory device 100 includes a host interface 123providing communication through a host bus 137 to external host device135. The configuration of host interface 123 may be of various formsdepending upon the specific configuration of memory device 100 (whichmay also be termed a “memory system”). For example, in an example inwhich memory device 100 is a UFS device, the host interface will be inaccordance with the applicable UFS standard.

Memory device 100 also incorporates one or more memory die interfaces125 between the processing circuitry 110 of the controller 105 and atleast some portion of the memory dies 130-A-130N+1 within memory device100. Memory die interface 125 may be part of controller 105 or may beimplemented by separate circuitry. For example, in the example of a UFSdevice, one or more of the memory die interfaces 125 will be a suitablememory interface, for example an Open NAND Flash Interface (“ONFI”),such as that defined by the ONFI 4.0 Specification, or later versions orrevisions thereof.

Components of the memory device 100, such as controller 105, may includea random-access memory 120 for performing the operations of the memorydevice 100. The random-access memory 120 may be separate from thecontroller 105 or, as shown, may be integrated in the controller 105. Insome examples, there may be random-access memory 120 both in thecontroller 105 and separate from the controller 105.

Controller 105 may handle one or more functions of the memory byinteracting with the memory cells of the memory device that are part ofone or more memory dies 130-A-130N+1. A schematic of an exampleimplementation of a memory die 130 is shown in FIG. 4 . The controller105 may communicate with these memory dies through the memory dieinterface 125 across an internal communication interface 127, such as anI/O bus. In some examples, the memory dies may have their own devicecontrollers, including processing circuitry and processors, to controloperations on the respective memory die. Such device controllers may beformed on a common die with the device storage array or may be on aseparate die from that containing the device storage array. Bothconfigurations are embraced by the identified “memory die” (130A-N+1)described herein. Memory dies may be NAND dies, three-dimensional NANDdies, phase change memory dies, and the like.

The host device 135 may be a personal computer, a smartphone, a tablet,a portion of an integrated circuit, an Internet of Things (IoT) device(e.g., a refrigerator or other appliance, sensor, motor or actuator,mobile communication device, automobile, drone, etc.), or the like.

For purposes of the present description example memory operation andmanagement functions may be described in the context of NAND memory.Persons skilled in the art will recognize that other forms ofnon-volatile memory may have analogous memory operations or managementfunctions. Such NAND management functions include wear leveling (e.g.,garbage collection or reclamation), error detection or correction, blockretirement, or one or more other memory management functions.

The memory dies 130-A-130-N+1 can include several memory cells arrangedin, for example, a number of planes, sub-blocks, blocks, or pages. Asone example, a 48 GB TLC NAND memory device can include 18,592 bytes (B)of data per page (16,384+2208 bytes), 1536 pages per block, 548 blocksper plane, and 4 or more planes per device. As another example, a 32 GBMLC memory device (storing two bits of data per cell (i.e., 4programmable states)) can include 18,592 bytes (B) of data per page(16,384+2208 bytes), 1024 pages per block, 548 blocks per plane, and 4planes per device, but with half the required write time and twice theprogram/erase (P/E) cycles as a corresponding TLC memory device. Otherexamples can include other numbers or arrangements. In some examples, amemory device, or a portion thereof, can be selectively operated in SLCmode, or in a desired MLC mode (such as TLC, QLC, etc.).

In operation, data is typically written to or read from the memorydevice 100 in pages and erased in blocks. However, one or more memoryoperations (e.g., read, write, erase, etc.) can be performed on largeror smaller groups of memory cells, as desired. The data transfer size ofa memory device 100 is typically referred to as a page, whereas the datatransfer size of a host is typically referred to as a sector.

Although a page of data can include a number of bytes of user data(e.g., a data payload including a number of sectors of data) and itscorresponding meta-data, the size of the page often refers only to thenumber of bytes used to store the user data. As an example, a page ofdata having a page size of 4 KB can include 4 KB of user data (e.g., 8sectors assuming a sector size of 512 B) as well as a number of bytes(e.g., 32 B, 54 B, etc.) of meta-data corresponding to the user data,such as integrity data, address data (e.g., logical address data, etc.),or other meta-data associated with the user data.

Different types of memory cells can provide for different page sizes orcan require different amounts of meta-data associated therewith. Forexample, different memory device types can have different bit errorrates, which can lead to different amounts of meta-data necessary toensure integrity of the page of data (e.g., a memory device with ahigher bit error rate can require more bytes of error correction codedata than a memory device with a lower bit error rate). As an example, amulti-level cell (MLC) NAND flash device can have a higher bit errorrate than a corresponding single-level cell (SLC) NAND flash device. Assuch, the MLC device can require more meta-data bytes for error datathan the corresponding SLC device.

FIG. 2 illustrates an example schematic diagram of a portion of a NANDarchitecture semiconductor memory array 300 including a plurality ofmemory cells 202 arranged in a two-dimensional array of strings (e.g.,strings 205-207) and tiers (e.g., illustrated as respective word lines(WL) WL0-WL7 210-217, a drain-side select gate (SGD) line 225, asource-side select gate (SGS) line 230, etc.), and sense amplifiers ordevices 260 according to some examples of the present disclosure. Forexample, the memory array 200 can illustrate an example schematicdiagram of a portion of one physical page of memory cells of a memorydie 130 from FIG. 1 .

Each string of memory cells is coupled to a source line (SRC) 235 usinga respective source-side select gate (SGS) (e.g., SGS 231-233), and to arespective data line (e.g., bit lines (BL) BL0-BL2 220-222) using arespective drain-side select gate (SGD) (e.g., SGDs 226-228). Althoughillustrated with 8 tiers (e.g., using word lines (WL) WL0-WL7 210-217)and three data lines (BL0-BL2 226-228) in the example of FIG. 2 , otherexamples can include strings of memory cells having more or fewer tiersor data lines, as desired.

In a NAND architecture semiconductor memory array, such as the examplememory array 200, the state of a selected memory cell 202 can beaccessed by sensing a current or voltage variation associated with aparticular data line containing the selected memory cell. The memoryarray 200 can be accessed (e.g., by a control circuit, one or moreprocessors, digital logic, etc.) using one or more drivers. In anexample, one or more drivers can activate a specific memory cell, or setof memory cells, by driving a particular potential to one or more datalines (e.g., bit lines BL0-BL2), access lines (e.g., word linesWL0-WL7), or select gates, depending on the type of operation desired tobe performed on the specific memory cell or set of memory cells.

To program or write data to a memory cell, a programming voltage (Vpgm)(e.g., one or more programming pulses, etc.) can be applied to selectedword lines (e.g., WL4), and thus, to a control gate of each memory cellcoupled to the selected word lines (e.g., control gates (CGs) 241-243 ofthe memory cells coupled to WL4). Programming pulses can begin, forexample, at or near 15V, and, in certain examples, can increase inmagnitude during each programming pulse application. While the programvoltage is applied to the selected word lines, a potential, such as aground potential (e.g., Vss), can be applied to the data lines (e.g.,bit lines) and substrates (and thus the channels, between the sourcesand drains) of the memory cells targeted for programming, resulting in acharge transfer (e.g., direct injection or Fowler-Nordheim (FN)tunneling, etc.) from the channels to the charge storage structures ofthe targeted memory cells. Such charge storage structures may include,for example floating gates or charge trap regions of the respectivememory cells. In floating gate memory cells charge is stored in anisolated polysilicon structure; while in charge trap memory cells thecharge is typically stored in a dielectric structure.

In contrast, a pass voltage (Vpass) can be applied to one or more wordlines having memory cells that are not targeted for programming, or aninhibit voltage (e.g., Vcc) can be applied to data lines (e.g., bitlines) having memory cells that are not targeted for programming, forexample, to inhibit charge from being transferred from the channels tothe charge storage structures of such non-targeted memory cells. Thepass voltage can be variable, depending, for example, on the proximityof the applied pass voltages to a word line targeted for programming.The inhibit voltage can include a supply voltage (Vcc), such as avoltage from an external source or supply (e.g., a battery, an AC-to-DCconverter, etc.), relative to a ground potential (e.g., Vss).

As an example, if a programming voltage (e.g., 15V or more) is appliedto a specific word line, such as WL4, a pass voltage of 10 V can beapplied to one or more other word lines, such as WL3, WL5, etc., toinhibit programming of non-targeted memory cells, or to retain thevalues stored on such memory cells not targeted for programming. As thedistance between an applied program voltage and the non-targeted memorycells increases, the pass voltage required to refrain from programmingthe non-targeted memory cells can decrease. For example, where aprogramming voltage of 15V is applied to WL4, a pass voltage of 10V canbe applied to WL3 and WL5, a pass voltage of 8V can be applied to WL2and WL6, a pass voltage of 7V can be applied to WL1 and WL7, etc. Inother examples, the pass voltages, or number of word lines, etc., can behigher or lower, or more or less.

The sense amplifiers 260, coupled to one or more of the data lines(e.g., first, second, or third bit lines (BL0-BL2) 220-222), can detectthe state of each memory cell in respective data lines by sensing avoltage or current on a particular data line.

Between applications of one or more programming pulses (e.g., Vpgm), averify operation can be performed to determine if a selected memory cellhas reached its intended programmed state. If the selected memory cellhas reached its intended programmed state, it can be inhibited fromfurther programming. If the selected memory cell has not reached itsintended programmed state, additional programming pulses can be applied.If the selected memory cell has not reached its intended programmedstate after a particular number of programming pulses (e.g., a maximumnumber), the selected memory cell, or a string, block, or pageassociated with such selected memory cell, can be marked as defective.

For Single Level Cells (SLC), there are two possible voltage levelsprogrammed into the cell, one voltage level represents a binary ‘1’ andanother voltage level represents a binary ‘0’ For Multi-Level Cells(MLC), there are four possible voltage levels programmed into the cell.The four possible voltage levels represent ‘00’, ‘01’, ‘10’, and ‘11’.To program an MLC cell, multiple programming pulses are applied. A firstpulse programs a first “page” of data that represents either the mostsignificant bit or least significant bit of the cell. A second pulseprograms the second “page” of data that represents the other bit of thecell that was not programmed by the first pulse. Similarly, Triple LevelCells (TLC) store eight possible voltage levels and Quad Level Cells(QLCs) store 16 possible voltage levels.

To read a value stored in one or more memory cells, a read voltage isapplied to the wordline of the selected cells. If the voltage stored inthe cells of the wordline is greater than the read voltage, the cellpasses a voltage to the sense amplifier. For an SLC cell, the readvoltage is selected to be between the two voltages representing a ‘1’and a ‘0.’ For MLC, TLC, and QLC, multiple read operations are used toread each bit stored in the cell—each read operation utilizes adifferent read voltage.

To erase a memory cell or a group of memory cells (e.g., erasure istypically performed in blocks or sub-blocks), an erasure voltage (Vers)can be applied to the substrates (and thus the channels, between thesources and drains) of the memory cells targeted for erasure (e.g.,using one or more bit lines, select gates, etc.), while the word linesof the targeted memory cells are kept at a potential, such as a groundpotential (e.g., Vss), resulting in a charge transfer (e.g., directinjection or Fowler-Nordheim (FN) tunneling, etc.) from the chargestorage structures of the targeted memory cells to the channels.

FIG. 3 illustrates an example schematic diagram of a 3D NANDarchitecture semiconductor memory array 300 including a number ofstrings of memory cells (e.g., A₀ memory strings 305A₀-307A₀, A_(n)memory strings 305A_(n)-307A_(n), B₀ memory strings 305B₀-307B₀, B_(n)memory strings 305B_(n)-307B_(n), etc.), organized in blocks (e.g.,block A 301A, block B 301B, etc.) and sub-blocks (e.g., sub-block A₀301A₀, sub-block A_(n) 301A_(n), sub-block B₀ 301B₀, sub-block B_(n)301B_(n), etc.). The memory array 300 represents a portion of a greaternumber of similar structures that would typically be found in a block,device, or other unit of a memory device.

Each string of memory cells includes a number of tiers of charge storagetransistors (e.g., floating gate transistors, charge-trappingstructures, etc.) stacked in the Z direction, source to drain, between asource line (SRC) 335 or a source-side select gate (SGS) (e.g., A₀ SGS331A₀-333A₀, A_(n) SGS 331A_(n)-333A_(n), B₀ SGS 331B₀-333B₀, B_(n) SGS231B_(n)-233B_(n), etc.) and a drain-side select gate (SGD) (e.g., A₀SGD 326A₀-328A₀, A_(n) SGD 326A_(n)-328A_(n), B₀ SGD 326B₀-328B₀, B_(n)SGD 326B_(n)-328B_(n), etc.). Each string of memory cells in the 3Dmemory array can be arranged along the X direction as data lines (e.g.,bit lines (BL) BL0-BL2 320-322), and along the Y direction as physicalpages.

Within a physical page, each tier represents a row of memory cells, andeach string of memory cells represents a column. A sub-block can includeone or more physical pages. A block can include a number of sub-blocks(or physical pages) (e.g., 128, 256, 384, etc.). Although illustratedherein as having two blocks, each block having two sub-blocks, eachsub-block having a single physical page, each physical page having threestrings of memory cells, and each string having 8 tiers of memory cells,in other examples, the memory array 300 can include more or fewerblocks, sub-blocks, physical pages, strings of memory cells, memorycells, or tiers. For example, each string of memory cells can includemore or fewer tiers (e.g., 16, 32, 64, 128, etc.), as well as one ormore additional tiers of semiconductor material above or below thecharge storage transistors (e.g., select gates, data lines, etc.), asdesired. As an example, a 48 GB TLC NAND memory device can include18,592 bytes (B) of data per page (16,384+2208 bytes), 1536 pages perblock, 548 blocks per plane, and 4 or more planes per device.

Each memory cell in the memory array 300 includes a control gate (CG)coupled to (e.g., electrically or otherwise operatively connected to) anaccess line (e.g., word lines (WL) WL0 ₀-WL7 ₀ 310A-317A, WL0 ₁-WL7 ₁310B-317B, etc.), which collectively couples the control gates (CGs)across a specific tier, or a portion of a tier, as desired. Specifictiers in the 3D memory array, and accordingly, specific memory cells ina string, can be accessed or controlled using respective access lines.Groups of select gates can be accessed using various select lines. Forexample, A₀ SGD 326A₀-328A₀ can be accessed using an A₀ SGD line SGDA₀325A₀, A_(n) SGD 326A_(n)-328A_(n) can be accessed using an SGD lineSGDA_(n) 325A_(n), B₀ SGD 326B₀-328B₀ can be accessed using an B₀ SGDline SGDB₀ 325B₀, and B_(n) SGD 326B_(n)-328B_(n) can be accessed usingan B_(n) SGD line SGDB_(n) 325B_(n). A₀ SGS 331A₀-333A₀ and A_(n) SGS331A_(n)-333A_(n) can be accessed using a gate select line SGS₀ 330A,and B₀ SGS 331B₀-333B₀ and B_(n) SGS 331B_(n)-333B_(n) can be accessedusing a gate select line SGS₁ 330B.

In an example, the memory array 300 can include a number of levels ofsemiconductor material (e.g., polysilicon, etc.) configured to couplethe control gates (CGs) of each memory cell or select gate (or a portionof the CGs or select gates) of a respective tier of the array. Specificstrings of memory cells in the array can be accessed, selected, orcontrolled using a combination of bit lines (BLs) and select gates,etc., and specific memory cells at one or more tiers in the specificstrings can be accessed, selected, or controlled using one or moreaccess lines (e.g., word lines).

FIG. 4 illustrates an example block diagram of a memory die 400including a memory array 402 having a plurality of memory cells 404, andone or more circuits or components to provide communication with, orperform one or more memory operations on, the memory array 402 accordingto some examples of the present disclosure. The memory die 400 caninclude a row decoder 412, a column decoder 414, sense amplifiers 420, apage buffer 422, a selector 424, an input/output (I/O) circuit 426, anda memory control unit 430.

The memory cells 404 of the memory array 402 can be arranged in blocks,such as first and second blocks 402A, 402B. Each block can includesub-blocks. For example, the first block 402A can include first andsecond sub-blocks 402A₀, 402A_(n), and the second block 402B can includefirst and second sub-blocks 402B₀, 402B_(n). Each sub-block can includea number of physical pages, each page including a number of memory cells404. Although illustrated herein as having two blocks, each block havingtwo sub-blocks, and each sub-block having a number of memory cells 404,in other examples, the memory array 402 can include more or fewerblocks, sub-blocks, memory cells, etc. In other examples, the memorycells 404 can be arranged in a number of rows, columns, pages,sub-blocks, blocks, etc., and accessed using, for example, access lines406, first data lines 410, or one or more select gates, source lines,etc.

The memory control unit 430 can control memory operations of the memorydie 400 according to one or more signals and/or instructions/commandsreceived on control lines 432 at a memory interface with a memorycontroller (as described relative to controller 105 and host interface123 of memory device 100 of FIG. 1 . Such signals and/or instructionsmay include, for example, one or more clock signals and/or controlsignals that indicate a desired operation (e.g., write, read, erase,etc.), or address signals (A0-AX) received on one or more address lines416. One or more devices external to the memory die 400 can control thevalues of the control signals on the control lines 432, or the addresssignals on the address line 416. Examples of devices external to thememory die 400 can include, but are not limited to, a host, a memorycontroller, a processor, or one or more circuits or components notillustrated in FIG. 4 .

The memory die 400 can use access lines 406 and first data lines 410 totransfer data to (e.g., write or erase) or from (e.g., read) one or moreof the memory cells 404. The row decoder 412 and the column decoder 414can receive and decode the address signals (A0-AX) from the address line416, can determine which of the memory cells 404 are to be accessed, andcan provide signals to one or more of the access lines 406 (e.g., one ormore of a plurality of word lines (WL0-WLm)) or the first data lines 410(e.g., one or more of a plurality of bit lines (BL0-BLn)), such asdescribed above.

The memory die 400 can include sense circuitry, such as the senseamplifiers 420, configured to determine the values of data on (e.g.,read), or to determine the values of data to be written to, the memorycells 404 using the first data lines 410. For example, in a selectedstring of memory cells 404, one or more of the sense amplifiers 420 canread a logic level in the selected memory cell 404 in response to a readcurrent flowing in the memory array 402 through the selected string tothe data lines 410.

One or more devices external to the memory die 400, such as a controller105, can communicate with the memory die 400 using the I/O lines(DQ0-DQN) 408, address lines 416 (A0-AX), or control lines 432. Theinput/output (I/O) circuit 426 can transfer values of data in or out ofthe memory die 400, such as in or out of the page buffer 422 or thememory array 402, using the I/O lines 408, according to, for example,the control lines 432 and address lines 416. The page buffer 422 canstore data received from the one or more devices external to the memorydie 400 before the data is programmed into relevant portions of thememory array 402 or can store data read from the memory array 402 beforethe data is transmitted to the one or more devices external to thememory die 400.

The column decoder 414 can receive and decode address signals (A0-AX)into one or more column select signals (CSEL1-CSELn). The selector 424(e.g., a select circuit) can receive the column select signals(CSEL1-CSELn) and select data in the page buffer 422 representing valuesof data to be read from or to be programmed into memory cells 404.Selected data can be transferred between the page buffer 422 and the I/Ocircuit 426 using second data lines 418. In some examples a flashtranslation layer (not shown) can map addresses provided by a host tophysical memory addresses used by the row decoder 412 and column decoder414 to read data in the memory array 402.

The memory control unit 430 can receive positive and negative supplysignals, such as a supply voltage (Vcc) 434 and a negative supply (Vss)436 (e.g., a ground potential), from an external source or supply (e.g.,an internal or external battery, an AC-to-DC converter, etc.). Incertain examples, the memory control unit 430 can include a regulator428 to internally provide positive or negative supply signals.

Internal Copyback-Enabled Scrambler

As previously described, utilizing a physical page address to scrambledata when writing to the memory device to meet data pattern requirementsdoes not allow internal copyback operations when the internal copybackoperations do not modify the data and instead directly copy data locatedin one location to another location on the die. As the address changesfrom the address at which the data was original written, the physicaladdress of the cells in which the data is currently stored cannot beused to unscramble the data after the internal copyback operation.

As previously described, the present disclosure recites methods,systems, and machine-readable mediums which provide for a seed generatorto generate a seed value, the seed value used by a scrambler to scrambleone or both of the host-data and meta-data, either together orseparately. The seed is then appended to the scrambled host-data andmeta-data and written to the memory device. Any subsequent internalcopyback operation may copy the data exactly as its written—includingthe seed. A read operation then unscrambles the data read from thememory device by reading the seed first (which is stored unscrambled),then using that seed to reverse the scrambling operation to obtain thehost-data and meta-data. This read operation works even after aninternal copyback operation due to the storage of the seed for thescrambler in an unscrambled state along with the data written to thememory device.

As noted, in some examples, a same seed value is used by the scramblerto scramble and unscramble the data, but in other examples, a differentvalue is used to unscramble the data than was used to scramble the data.For example, a first cryptographic key of a key pair may be used toscramble (by encrypting) one or both of the host-data and meta-data anda second cryptographic key of a keypair may be used to unscramble thedata. In these examples, the value used by the unscrambler to unscramblethe data (e.g., the second key) is stored with the data.

FIG. 5 illustrates a data flow of a write operation according to someexamples of the present disclosure. Host-data 615 is received from thehost for writing to the memory device. The meta-data 610 is created bythe memory device such as by the controller 105, memory die 130, orportions of the meta-data 610 may be created by both controller 105 andmemory die 130. Meta-data may include information about the host-dataand the conditions on which it was stored—such as the write temperatureand other details.

The host-data 615 and meta-data 610 are then input to the scrambler 620.Scrambler 620 may be any algorithm that may reversibly transform thehost-data 615 and meta-data 610 into different values using one or moreseed values. For example, an XOR operation, an encryption operation(e.g., RSA, Data Encryption Standard, Triple DES, RSA, Blowfish,Advanced Encryption Standard (AES), etc), or the like. One of ordinaryskill will appreciate that multiple seed values may be utilized, e.g.,for scrambler algorithms that utilize multiple keys or other values thatare utilized for unscrambling the meta-data and host-data, or in someexamples, the meta-data and host-data may be split up and scrambled withdifferent seeds. In examples in which multiple seeds are utilized, eachseed that is used for unscrambling the data may be stored with thescrambled host-data and meta-data.

The seed 630 may be used by the scrambler to produce a scrambledmeta-data and host-data 635. The seed 630 may be generated by a seedgenerator 625. In some examples, the seed generator 625 may be a randomnumber generator. Seed generator 625 may be a hardware random numbergenerator, a software random number generator or the like. The seedgenerator 625 may be a true random number generator or a pseudo randomnumber generator. In other examples, the seed generator 625 may be acryptographic key generator, or the like. Seed generator 625 may selectfrom a previously determined list of seed values or may generate newseed values (e.g., based upon a formula or execution of hardware logic).Each seed may be generated specifically in response to the receipt ofthe host-data 615 such that a first seed for first host-data may bedifferent than a second seed for a later received host-data.

In some examples, the seed generator 625 may need to be seeded. Forexample, if the seed generator 625 is a pseudo-random number generator,the seed generator may be seeded initially, at each startup of thememory device, periodically, and/or the like. The seed generator 625 maybe seeded by a current time, a current temperature, a physical addressthat corresponds to a last written word of the memory device or aportion of the memory device (e.g., a die), a physical address that isnext to be written, and the like. As noted, the seed generator may havethe seed periodically refreshed (e.g., after a predetermined timeperiod).

Each page written to the memory device may have a seed generated orselected for that page and used by the scrambler to scramble thehost-data and/or meta-data. In some examples a single seed is generatedfor both the meta-data and host-data, but in other examples a differentseed is generated for the meta-data and the host-data. In some examples,the seed 630 and scrambler 620 are operable to scramble the host-dataand meta-data such that the host-data and meta-data may be unscrambledindependently of the other such that the meta-data can be unscrambledwithout knowing the host-data.

Once the seed is generated and used, it is appended to the scrambledmeta-data and host-data (as shown, before the scrambled meta-data andhost-data, but it could be after the scrambled meta-data and host-data).The combined seed and scrambled meta-data and host-data is then encodedwith an Error Correction Coding Encoder 640 to produce encoded data 645which is programmed to the memory cells of the memory device.

FIG. 6 illustrates a data flow of a read operation according to someexamples of the present disclosure. A host sends a read request with alogical address to the memory device. The memory device converts this toa physical address using a logical-to-physical (L2P) table. The commandis then issued to the appropriate memory die corresponding to thatphysical address. The memory cells at that physical address are thenread by applying appropriate read voltages to the memory cells. Theresulting encoded data 645 is then decoded with an ECC decoder 650. Ifthe ECC decoding succeeds, the scrambled meta-data and host-data 635 andseed 630 are recovered. The seed is then used by the unscrambler 655 tounscramble the scrambled meta-data and host-data 635 into the originalmeta-data 610 and host-data 615. Unscrambler 655 may apply an inverseoperation to the operation performed by the scrambler 620. For example,if scrambler 620 applies an XOR operation to XOR the meta-data 610 andhost-data 615 with the random sequence with seed 630; the unscrambler655 applies the XOR operation and XORs the random sequence with the seedand the scrambled meta-data and host-data 635 to obtain the unscrambledmeta-data 610 and host-data 615.

FIG. 7 illustrates a flowchart of a method 700 of writing data to amemory device according to some examples of the present disclosure. Atoperation 710 the memory device may receive data to write to the memorycells. For example, a host may instruct the memory device to writehost-data to the memory device. With this instruction, the host mayprovide host-data to write to the memory device.

At operation 715, a seed value may be generated. The seed value may begenerated responsive to the receipt of data to write (e.g., by beinggenerated contemporaneously with the time the data is received). Theseed value may be an integer value. The seed value may be newlygenerated or selected each time the memory devices writes new data tothe memory cells. A particular seed value may be different than apreviously generated seed value. In some examples, seed values may beunique within a particular plane, a particular die, a particular memorydevice, or the like. In other examples, seed values may not be unique,but may be repeated eventually after a sequence of different seedvalues. Seed values may be random, or pseudorandom. As noted, the seedvalue may be a randomly generated value, an encryption key, or the like.

At operation 720 the data to be written may be scrambled using the seedvalue. For example, the data received in operation 710 may be combinedwith meta-data generated by the memory device and may be transformed bya scrambling algorithm using the seed value. For example, the algorithmmay be an XOR algorithm and the data and the meta-data may be XORd withthe seed to produce a scrambled value. In other examples, the data andthe meta-data may be encrypted with the seed. The scrambling algorithmmay be any algorithm that takes at least two inputs (the data (e.g., thecombined host-data and meta-data), and the seed value), and produces anoutput that is different than the data while also being reversible inthat a function may convert the scrambled data using the seed value tothe original data. In some examples, the meta-data and host-data may bescrambled such that the meta-data may be unscrambled without knowledgeof the host-data. In some examples, to accomplish this, the meta-dataand host-data may be separately scrambled with a same or a differentseed. If the host-data and meta-data are scrambled with different seeds,each seed may be stored along with the encoded and scrambled meta-dataand host-data (e.g., operation 730).

At operation 725, the seed value may be concatenated with the scrambleddata (e.g., the host-data and the meta-data) and encoded. For example,using an Error Correction Coding (ECC) scheme. This encoded data maythen be caused to be written to a first plurality of memory cells of adie of the memory device (e.g., denoted as a first die) at operation730. For example, the encoded data may be written to a series of memorycells forming a word of the memory device. As noted, if multiple seedvalues are utilized, multiple seed values may be concatenated and storedwith the host-data and meta-data.

At operation 735, the memory device may later identify that the data isto be copied to a second plurality of memory cells of the first die—thefirst and second pluralities being different memory cells. For example,the first plurality of memory cells may comprise an SLC cache and thedata may need to be moved out of the cache to MLC, TLC, or QLC storage.At operation 740, the data may be copied to the second plurality ofmemory cells. In some examples, none of the data is transferred over aninternal communications interface of the memory device (e.g., to acontroller). In some examples, as will be discussed below, a meta-dataportion may be transferred across an internal communications interfaceof the memory device (e.g., to a controller) where the meta-data isupdated and transferred back where it is combined with the host-data forstorage during the internal copyback. In these examples, the host-dataportion is not transferred across the internal communications interfaceof the memory device (e.g., the controller)—only the meta-data. In stillother examples, both the host-data and the meta-data may be transferredover the internal communications interface of the memory device (e.g.,to the controller) and then transferred back to be stored in the secondplurality of cells. Operations 735 and 740 may happen independently ofoperations 710-730. That is, the copyback operations described inoperations 735-740 may happen at a later time, or not at all.

FIG. 8 illustrates a flowchart of a method 800 of read data from amemory device according to some examples of the present disclosure. Atoperation 810 the memory device may receive a request to read datastored in the memory device. For example, a host may request the datastored in a particular logical address of the memory device. Atoperation 815, data is read from the memory device at the indicatedlocation. The data that is read is encoded. At operation 820, theencoded data is decoded. The decoded data includes one or more seedvalues and the scrambled data (host-data and meta-data). At operation825, the seed value(s) are extracted from the decoded data. For example,the seed value may be stored before, after, or adjacent to the scrambleddata (e.g., the host-data and meta-data). At operation 830, thescrambled data may be unscrambled with the seed value by theunscrambler. The unscrambler may be any algorithm that applies a reversetransformation to the scrambler. The host-data is then sent to the hostat operation 835. In some examples, the host-data may be furtherprocessed prior to sending to the host at operation 835.

Meta-Data Update

As previously described, traditional internal copyback operations do notdecode and unscramble the data and therefore do not update theappropriate meta-data associated with the host-data. This may causereliability issues as these metadata values may be used to properly readthe host-data. In some examples, to solve this problem, the meta-datamay be separated from the host-data and only the meta-data may be sentacross the internal I/O interfaces to be updated by the controller. Theupdated meta-data is then sent back to the memory die and combined withthe host-data (which may be stored in a memory buffer while waiting forthe updated host-data) and written to the new location on the die. Whilesending the meta-data does impact the internal I/O interfaces, theamount of I/O utilized is typically less than 1% of the I/O required tosend both the meta-data and host-data back to the controller.

Under prior methods, the host-data and the meta-data are scrambled andencoded together. If the host-data is not transferred along with themeta-data, the controller cannot properly update the ECC informationstored with the data (e.g., ECC parity bits). This will lead toincorrect decoding as the ECC information is calculated based upon boththe host-data and meta-data. In some examples, to solve this problem,the memory device may apply a separate ECC process to the meta-data andthe host-data along with storing separate ECC information for themeta-data and host-data (e.g., separate parity bits). When the meta-datais updated and encoded, the parity bits associated with the meta-dataare updated. The host-data ECC information is not affected and need notbe updated as the host-data was not affected. Thus, the host-data may beproperly decoded even though the meta-data has been modified.

FIG. 9 illustrates a data flow of a write operation according to someexamples of the present disclosure where the meta-data and host-data areseparately encoded. Meta-data 910 and host-data 915 are input into thescrambler 920. Seed generator 925 generates seed 930 that is used toscramble the meta-data and the host-data to generate scrambled host-data937. The meta-data and host-data may need to be scrambled in a mannerthat allows for unscrambling of the meta-data without the presence ofthe scrambled host-data to allow for updating the meta-data without alsoreceiving the host-data.

This may be accomplished by utilizing a scrambling algorithm that doesnot utilize the host-data in calculating the scrambled meta-data. Forexample, an XOR operation that XORs the random sequence with the seedwith the data in a bit-by-bit fashion can be reversed by applying a sameXOR value with the scrambled data. In these examples, even if themetadata is separated from the host-data the unscrambling will stillwork. In these examples, a same seed value may be used to scramble themeta-data and the host-data.

In other examples, the meta-data 910 and host data 915 may be scrambledwith different seed values. For example, if the scrambler 920 performsan operation (e.g., some encryption algorithms) where a both themeta-data and host-data would need to be present to unscramble (e.g.,unencrypt) the data (e.g., a value of the unscrambled metadata, themeta-data and host-data may be separately scrambled with separate seeds.In these examples, both seeds may be stored, or, if one seed can bededuced from the other, only one seed may be stored. In other examples,they may be a same seed value, but the scrambling operation is done suchthat knowledge of the host-data (either scrambled or unscrambled) is notrequired to unscramble the meta-data.

Scrambled meta-data 935 and seed 930 may be input to the ECC encoder 940to produce encoded meta-data 945. Separately, the scrambled host-data937 may be fed to the ECC encoder 940 to produce encoded host-data 947.The encoded meta-data 950 and encoded host-data 952 (along with ECCinformation such as parity bits) may then be written to the memory cellsof the memory device. As shown, the seed 930 is encoded with thescrambled meta-data 935, but in other examples, the seed 930 may beencoded with the scrambled host-data 937, or both the scrambledmeta-data 935 and the scrambled host-data 937.

FIG. 10 illustrates a data flow 1000 of an internal copyback operationwith meta-data update according to some examples of the presentdisclosure where the meta-data and host-data are separately encoded. Theencoded meta-data 1010 and encoded host-data 1015 are read from themedia. The encoded host-data 1015 is stored in a memory buffer—such as apage buffer 1020. In some examples, the encoded meta-data 1010 is alsostored in the buffer (for cases where the meta-data does not need to beupdated).

The encoded meta-data 1010 is transferred across a communicationinterface to a controller where the encoded meta-data 1010 is decoded bya decoder 1025 and unscrambled by a unscrambler 1030. ECC informationsuch as parity data and the seed for the scrambler (which may be encodedwith the meta-data, host-data, or both) may also be transferred to beused with the decoder 1025 and unscrambler 1030. If the meta-data failsECC checks, the memory device may abort the internal copyback operationand enter recovery steps for the data.

The meta-data may be read, and at 1035 it may be determined whether themeta-data needs to be updated. For example, to update a drive writetemperature, a write time, or the like. In the event that the meta-datadoes not need to be updated, an indication may or may not be sent backto the memory die. For example, a message indicating that no change isnecessary. In other examples, even for cases in which the meta-data isnot updated, the meta-data may be re-randomized, re-encoded and sentback. This has the benefit of ensuring the meta-data is error free. Insome examples, if the meta-data that was written is sufficiently close(e.g., within a specified distance) the system may decide not to updatethe metadata. Thus, if the drive temperature at which the data waswritten initially is close to the current temperature, the meta-data maynot be updated. In some examples, this determination is optional as thesystem may be configured to always update the metadata (e.g., update thewrite timestamp). In some examples, all meta-data is updated, and inother examples, only some fields of the meta-data are updated. In someexamples, whether a particular field of meta-data is updated may dependon certain rules. For example, one particular field may always beupdated, but other fields may only be updated if the rules evaluate to aresult that indicates that the meta-data field should be updated. Forexample, the rule may be that if the current temperature is over athreshold difference than the temperature at which the data wasinitially written, then the write temperature may be updated, otherwisethe write temperature may not be updated.

If it is determined that the meta-data needs to be updated at 1035, thenthe meta-data is updated by the meta-data updater 1040. For example, byincorporating various measurements from various sensors at the memorydevice (e.g., temperature, time, and the like). The scrambler 1045 thenscrambles the updated meta-data using the same key that was originallyused to scramble the meta-data. Encoder 1050 then encodes the scrambledand updated meta-data and generates new ECC information. The encodedmeta-data with the associated updated ECC information (e.g., paritybits) are then sent back to the memory die, where it is combined in thepage buffer 1020 with the encoded host-data. This combined updatedmeta-data and host-data is then written to the media.

FIG. 11 illustrates a flowchart of a method 1100 of writing data to amemory device according to some examples of the present disclosure. FIG.11 may be performed by a controller of the memory device, such ascontroller 105 of FIG. 1 . At operation 1110, the controller may receivea write request including host-data. At operation 1115 the controllermay determine meta-data corresponding to the host-data. For example,write temperature, time the data was written, and the like. At operation1120, the controller scrambles the meta-data and host-data such that themeta-data may be unscrambled without knowing the host-data. Stateddifferently, the scrambling process does not utilize the host-data suchthat knowledge of the host-data is not required for unscrambling themeta-data. For example, the meta-data may be scrambled with a seed orkey (either the same seed or key that is used to scramble the host-dataor a different seed or key) in an operation separate from the host-data.In still other examples, for certain scrambling algorithms, no separateprocessing may be needed—that is, due to the nature of the scramblingalgorithm, it allows independent unscrambling of the bits given theseed. For example, the values of the unscrambled bits of the meta-datado not depend on the values of any bits outside the meta-data (such ashost-data) except for the value of the key.

At operation 1125, the scrambled host-data and meta-data are separatelyencoded with separate encoding information. At operation 1130, thecontroller may cause the encoded meta-data and encoded host-data to bestored in the memory device. For example, the controller may send acommand across an internal communication interface to instruct a memorydie to program physical word line(s) of memory cells to store theencoded meta-data and encoded host-data.

FIG. 12 illustrates a flowchart of a method 1200 of writing data to amemory device during an internal copyback operation according to someexamples of the present disclosure. FIG. 12 may be performed by acontroller of the memory device, such as controller 105 of FIG. 1 . Atoperation 1210, in response to an internal copyback command (eitherissued by the controller or generated within the memory die) the memorydie may transmit, and the controller may receive meta-data that isencoded and scrambled. This meta-data is encoded and/or scrambled suchthat it can be decoded and/or unscrambled without the host-data. Thatis, the host-data is not transmitted by the memory die to thecontroller.

At operation 1215 the meta-data is decoded using the encodinginformation. As previously noted, if the decoding fails (e.g., there areuncorrectable ECC errors in the meta-data) the memory device cancels theinternal copyback operation and tries to recover the data through arecovery operation. At operation 1220 the controller unscrambles thedecoded meta-data from operation 1215. For example, by using a seedappended to the decoded meta-data, or a seed sent by the memory die. Aspreviously described, the seed may not be scrambled. Operation 1220unscrambles the decoded meta-data without knowledge of the host-data ordata corresponding to the host-data. That is the unscrambling ofoperation 1220 does not need knowledge of the host-data, encodedhost-data, scrambled host-data, encoded scrambled host-data, and thelike.

At operation 1225 the unscrambled and decoded meta-data is then updated.For example, an updated write temperature, an updated write time, andthe like. As previously noted, in some examples, the meta-data or fieldsof the meta-data may be selectively updated based upon the results ofevaluation of one or more rules, the current meta-data, current memorydevice conditions (e.g., temperature, time, and the like), and the like.The meta-data may be updated with current memory device conditions. Atoperation 1230 the updated meta-data is scrambled with the seed. Atoperation 1235 the scrambled updated meta-data is encoded. At operation1240 the encoded and scrambled updated meta-data is sent back to thememory die for combining with the stored scrambled and encoded host-dataand writing to the memory cells.

FIG. 13 illustrates a flowchart of a method 1300 of an internal copybackoperation on a memory device according to some examples of the presentdisclosure. FIG. 13 may be performed by a memory die of the memorydevice, such as memory die 130 of FIG. 1 . The memory die 130 may haveprocessing circuitry and working memory (e.g., volatile memory). Theprocessing circuitry may be one or more processors which may beconfigured to perform the method 1300. At operation 1310, the memory die130 may identify an internal copyback command for one or more memorylocations in the memory die. For example, a command may be issued by thecontroller, various triggers may be identified to move data stored inmemory cells corresponding to an SLC cache to MLC, TLC, or QLC storage,or the like. Various triggers may include idle time, SLC cacheutilization, a controller command, or the like. Both the SLC cache andthe eventual target MLC, TLC, or QLC storage may be on the same memorydie. In these examples (e.g., the source and destination are identifiedto be on a same memory die), an internal copyback operation may beexecuted to copy the data (host-data and meta-data) from a firstlocation on the die to a second location on the same die withouttransferring the entire data over the communications interface with thecontroller.

At operation 1315, the source memory location of the internal copybackis read to obtain the meta-data and host-data. This meta-data andhost-data are both scrambled and encoded. At operation 1320 the encodedand scrambled host-data read from the source memory location is copiedto a buffer—such as a page buffer. In some examples, the encoded andscrambled meta-data may also be copied to a buffer, such as a same pagebuffer as the encoded and scrambled host-data.

At operation 1325 the encoded and scrambled meta-data may be sent to thecontroller for updating over the internal communication interface (e.g.,a communication bus). At operation 1330 the memory die may receive theupdated meta-data or an indication that the meta-data does not need tobe updated. At operation 1335, the memory die may write the encoded andscrambled updated meta-data (or the original meta-data if the meta-datadoes not need to be updated) along with the encoded and scrambledhost-data to the destination memory cells.

FIG. 14 illustrates a block diagram of an example machine 1400 uponwhich any one or more of the techniques (e.g., methodologies) discussedherein may be performed. For example, the memory device 100 may include,or be implemented by one or more components of FIG. 14 . Host 135 may beor include one or more components of machine 1400. In these examples,the memory device 100 may be the mass storage 1421. One or morecomponents of machine 1400 may implement one or more of the methods orstructures of FIGS. 1-13 . For example, through operations ofinstructions 1424.

In alternative embodiments, the machine 1400 can operate as a standalonedevice or can be connected (e.g., networked) to other machines. In anetworked deployment, the machine 1400 can operate in the capacity of aserver machine, a client machine, or both in server-client networkenvironments. In an example, the machine 1400 can act as a peer machinein peer-to-peer (P2P) (or other distributed) network environment. Themachine 1400 can be a personal computer (PC), a tablet PC, a set-top box(STB), a personal digital assistant (PDA), a mobile telephone, a webappliance, an IoT device, automotive system, a host device, a memorydevice, or any machine capable of executing instructions (sequential orotherwise) that specify actions to be taken by that machine. Componentsof machine 1400 can be present in a memory device (e.g., a processor,main memory, mass storage and the like). Further, while only a singlemachine is illustrated, the term “machine” shall also be taken toinclude any collection of machines that individually or jointly executea set (or multiple sets) of instructions to perform any one or more ofthe methodologies discussed herein, such as cloud computing, software asa service (SaaS), other computer cluster configurations.

Examples, as described herein, can include, or can operate by, logic,components, devices, packages, or mechanisms. Circuitry is a collection(e.g., set) of circuits implemented in tangible entities that includehardware (e.g., simple circuits, gates, logic, etc.). Circuitrymembership can be flexible over time and underlying hardwarevariability. Circuitries include members that can, alone or incombination, perform specific tasks when operating. In an example,hardware of the circuitry can be immutably designed to carry out aspecific operation (e.g., hardwired). In an example, the hardware of thecircuitry can include variably connected physical components (e.g.,execution units, transistors, simple circuits, etc.) including acomputer readable medium physically modified (e.g., magnetically,electrically, moveable placement of invariant massed particles, etc.) toencode instructions of the specific operation. In connecting thephysical components, the underlying electrical properties of a hardwareconstituent are changed, for example, from an insulator to a conductoror vice versa. The instructions enable participating hardware (e.g., theexecution units or a loading mechanism) to create members of thecircuitry in hardware via the variable connections to carry out portionsof the specific tasks when in operation. Accordingly, the computerreadable medium is communicatively coupled to the other components ofthe circuitry when the device is operating. In an example, any of thephysical components can be used in more than one member of more than onecircuitry. For example, under operation, execution units can be used ina first circuit of a first circuitry at one point in time and reused bya second circuit in the first circuitry, or by a third circuit in asecond circuitry at a different time.

The machine (e.g., computer system) 1400 (e.g., the host device 135, thememory device 100, etc.) can include a hardware processor 1402 (e.g., acentral processing unit (CPU), a graphics processing unit (GPU), ahardware processor core, or any combination thereof, such as theprocessors 115 of memory controller 105, etc.), a main memory 1404 and astatic memory 1406, some or all of which can communicate with each othervia an interlink (e.g., bus) 1408. The machine 1400 can further includea display unit 1410, an alphanumeric input device 1412 (e.g., akeyboard), and a user interface (UI) navigation device 1414 (e.g., amouse). In an example, the display unit 1410, input device 1412 and UInavigation device 1414 can be a touch screen display. The machine 1400can additionally include sensors 1416, a signal generation device 1418(e.g., a speaker), and a network interface device 1420. Sensors 1416 mayinclude a global positioning system (GPS) sensor, compass,accelerometer, and/or other sensors. The machine 1400 can include anoutput controller 1428, such as a serial (e.g., universal serial bus(USB), parallel, or other wired or wireless (e.g., infrared (IR), nearfield communication (NFC), etc.) connection to communicate or controlone or more peripheral devices (e.g., a printer, card reader, etc.).

The mass storage device 1421 can include a machine readable medium 1422on which is stored one or more sets of data structures or instructions1424 (e.g., software) embodying or utilized by any one or more of thetechniques or functions described herein. The instructions 1424 can alsoreside, completely or at least partially, within the main memory 1404,within static memory 1406, or within the hardware processor 1402 duringexecution thereof by the machine 1400. In an example, one or anycombination of the hardware processor 1402, the main memory 1404, thestatic memory 1406, or the mass storage device 1416 can constitute themachine readable medium 1422.

While the machine readable medium 1422 is illustrated as a singlemedium, the term “machine readable medium” can include a single mediumor multiple media (e.g., a centralized or distributed database, orassociated caches and servers) configured to store the one or moreinstructions 1424.

The term “machine readable medium” can include any medium capable ofstoring, encoding, or carrying instructions for execution by the machine1400 and that cause the machine 1400 to perform any one or more of thetechniques of the present disclosure, or capable of storing, encoding orcarrying data structures used by or associated with such instructions.Non-limiting machine readable medium examples can include solid-statememories, and optical and magnetic media. In some examples, the machinereadable medium 1422 is a non-transitory machine-readable medium. In anexample, a massed machine-readable medium comprises a machine-readablemedium with a plurality of particles having invariant (e.g., rest) mass.Accordingly, massed machine-readable media are not transitorypropagating signals. Specific examples of massed machine-readable mediacan include: non-volatile memory, such as semiconductor memory devices(e.g., Electrically Programmable Read-Only Memory (EPROM), ElectricallyErasable Programmable Read-Only Memory (EEPROM)) and flash memorydevices; magnetic disks, such as internal hard disks and removabledisks; magneto-optical disks; and CD-ROM and DVD-ROM disks.

The instructions 1424 (e.g., software, programs, an operating system(OS), etc.) or other data are stored on the mass storage device 1421,can be accessed by the memory 1404 for use by the processor 1402. Thememory 1404 (e.g., DRAM) is typically fast, but volatile, and thus adifferent type of storage than the storage device 1421 (e.g., an SSD),which is suitable for long-term storage, including while in an “off”condition. The instructions 1424 or data in use by a user or the machine1400 are typically loaded in the memory 1404 for use by the processor1402. When the memory 1404 is full, virtual space from the storagedevice 1421 can be allocated to supplement the memory 1404; however,because the storage 1421 device is typically slower than the memory1404, and write speeds are typically at least twice as slow as readspeeds, use of virtual memory can greatly reduce user experience due tostorage device latency (in contrast to the memory 1404, e.g., DRAM).Further, use of the storage device 1421 for virtual memory can greatlyreduce the usable lifespan of the storage device 1421.

In contrast to virtual memory, virtual memory compression (e.g., theLinux® kernel feature “ZRAM”) uses part of the memory as compressedblock storage to avoid paging to the storage device 1421. Paging takesplace in the compressed block until it is necessary to write such datato the storage device 1421. Virtual memory compression increases theusable size of memory 1404, while reducing wear on the storage device1421.

Storage devices, such as mass storage 1421 may be memory devices, suchas NAND memory devices. Storage devices such as mass storage 1421 may beoptimized for mobile electronic devices, or mobile storage, includingMMC solid-state storage devices (e.g., micro Secure Digital (microSD™)cards, etc.). MMC devices include a number of parallel interfaces (e.g.,an 8-bit parallel interface) with a host device and are often removableand separate components from the host device. In contrast, eMMC™ devicesare attached to a circuit board and considered a component of the hostdevice, with read speeds that rival serial ATA™ (Serial AT (AdvancedTechnology) Attachment, or SATA) based SSD devices. However, demand formobile device performance continues to increase, such as to fully enablevirtual or augmented-reality devices, utilize increasing networksspeeds, etc. In response to this demand, storage devices have shiftedfrom parallel to serial communication interfaces. Universal FlashStorage (UFS) devices, including controllers and firmware, communicatewith a host device using a low-voltage differential signaling (LVDS)serial interface with dedicated read/write paths, further advancinggreater read/write speeds.

The instructions 1424 can further be transmitted or received over acommunications network 1426 using a transmission medium via the networkinterface device 1420 utilizing any one of a number of transferprotocols (e.g., frame relay, internet protocol (IP), transmissioncontrol protocol (TCP), user datagram protocol (UDP), hypertext transferprotocol (HTTP), etc.). Example communication networks can include alocal area network (LAN), a wide area network (WAN), a packet datanetwork (e.g., the Internet), mobile telephone networks (e.g., cellularnetworks), Plain Old Telephone (POTS) networks, and wireless datanetworks (e.g., Institute of Electrical and Electronics Engineers (IEEE)802.11 family of standards known as Wi-Fi®, IEEE 802.16 family ofstandards known as WiMax®), IEEE 802.15.4 family of standards,peer-to-peer (P2P) networks, among others. In an example, the networkinterface device 1420 can include one or more physical jacks (e.g.,Ethernet, coaxial, or phone jacks) or one or more antennas to connect tothe communications network 1426. In an example, the network interfacedevice 1420 can include a plurality of antennas to wirelesslycommunicate using at least one of single-input multiple-output (SIMO),multiple-input multiple-output (MIMO), or multiple-input single-output(MISO) techniques. The term “transmission medium” shall be taken toinclude any intangible medium capable of storing, encoding or carryinginstructions for execution by the machine 1400, and includes digital oranalog communications signals or other intangible medium to facilitatecommunication of such software.

The above detailed description includes references to the accompanyingdrawings, which form a part of the detailed description. The drawingsshow, by way of illustration, specific embodiments in which theinvention can be practiced. These embodiments are also referred toherein as “examples”. Such examples can include elements in addition tothose shown or described. However, the present inventors alsocontemplate examples in which only those elements shown or described areprovided. Moreover, the present inventors also contemplate examplesusing any combination or permutation of those elements shown ordescribed (or one or more aspects thereof), either with respect to aparticular example (or one or more aspects thereof), or with respect toother examples (or one or more aspects thereof) shown or describedherein.

In this document, the terms “a” or “an” are used, as is common in patentdocuments, to include one or more than one, independent of any otherinstances or usages of “at least one” or “one or more.” In thisdocument, the term “or” is used to refer to a nonexclusive or, such that“A or B” can include “A but not B,” “B but not A,” and “A and B,” unlessotherwise indicated. In the appended claims, the terms “including” and“in which” are used as the plain-English equivalents of the respectiveterms “comprising” and “wherein”. Also, in the following claims, theterms “including” and “comprising” are open-ended, i.e., a system,device, article, or process that includes elements in addition to thoselisted after such a term in a claim are still deemed to fall within thescope of that claim. Moreover, in the following claims, the terms“first,” “second,” and “third,” etc. are used merely as labels, and arenot intended to impose numerical requirements on their objects.

In various examples, the components, controllers, processors, units,engines, or tables described herein can include, among other things,physical circuitry or firmware stored on a physical device. As usedherein, “processor” means any type of computational circuit such as, butnot limited to, a microprocessor, a microcontroller, a graphicsprocessor, a digital signal processor (DSP), or any other type ofprocessor or processing circuit, including a group of processors ormulti-core devices.

Various embodiments according to the present disclosure and describedherein include memory utilizing a vertical structure of memory cells(e.g., NAND strings of memory cells). As used herein, directionaladjectives will be taken relative a surface of a substrate upon whichthe memory cells are formed (i.e., a vertical structure will be taken asextending away from the substrate surface, a bottom end of the verticalstructure will be taken as the end nearest the substrate surface and atop end of the vertical structure will be taken as the end farthest fromthe substrate surface).

As used herein, directional adjectives, such as horizontal, vertical,normal, parallel, perpendicular, etc., can refer to relativeorientations, and are not intended to require strict adherence tospecific geometric properties, unless otherwise noted. For example, asused herein, a vertical structure need not be strictly perpendicular toa surface of a substrate, but can instead be generally perpendicular tothe surface of the substrate, and can form an acute angle with thesurface of the substrate (e.g., between 60 and 120 degrees, etc.).

In some embodiments described herein, different doping configurationscan be applied to a source-side select gate (SGS), a control gate (CG),and a drain-side select gate (SGD), each of which, in this example, canbe formed of or at least include polysilicon, with the result such thatthese tiers (e.g., polysilicon, etc.) can have different etch rates whenexposed to an etching solution. For example, in a process of forming amonolithic pillar in a 3D semiconductor device, the SGS and the CG canform recesses, while the SGD can remain less recessed or even notrecessed. These doping configurations can thus enable selective etchinginto the distinct tiers (e.g., SGS, CG, and SGD) in the 3D semiconductordevice by using an etching solution (e.g., tetramethylammonium hydroxide(TMCH)).

Operating a memory cell, as used herein, includes reading from, writingto, or erasing the memory cell. The operation of placing a memory cellin an intended state is referred to herein as “programming,” and caninclude both writing to or erasing from the memory cell (e.g., thememory cell can be programmed to an erased state).

According to one or more embodiments of the present disclosure, a memorycontroller (e.g., a processor, controller, firmware, etc.) locatedinternal or external to a memory device, is capable of determining(e.g., selecting, setting, adjusting, computing, changing, clearing,communicating, adapting, deriving, defining, utilizing, modifying,applying, etc.) a quantity of wear cycles, or a wear state (e.g.,recording wear cycles, counting operations of the memory device as theyoccur, tracking the operations of the memory device it initiates,evaluating the memory device characteristics corresponding to a wearstate, etc.)

According to one or more embodiments of the present disclosure, a memoryaccess device can be configured to provide wear cycle information to thememory device with each memory operation. The memory device controlcircuitry (e.g., control logic) can be programmed to compensate formemory device performance changes corresponding to the wear cycleinformation. The memory device can receive the wear cycle informationand determine one or more operating parameters (e.g., a value,characteristic) in response to the wear cycle information.

It will be understood that when an element is referred to as being “on,”“connected to” or “coupled with” another element, it can be directly on,connected, or coupled with the other element or intervening elements canbe present. In contrast, when an element is referred to as being“directly on,” “directly connected to” or “directly coupled with”another element, there are no intervening elements or layers present. Iftwo elements are shown in the drawings with a line connecting them, thetwo elements can be either be coupled, or directly coupled, unlessotherwise indicated.

Method examples described herein can be machine or computer-implementedat least in part. Some examples can include a computer-readable mediumor machine-readable medium encoded with instructions operable toconfigure an electronic device to perform methods as described in theabove examples. An implementation of such methods can include code, suchas microcode, assembly language code, a higher-level language code, orthe like. Such code can include computer readable instructions forperforming various methods. The code can form portions of computerprogram products. Further, the code can be tangibly stored on one ormore volatile or non-volatile tangible computer-readable media, such asduring execution or at other times. Examples of these tangiblecomputer-readable media can include, but are not limited to, hard disks,removable magnetic disks, removable optical disks (e.g., compact discsand digital video disks), magnetic cassettes, memory cards or sticks,random access memories (RAMS), read only memories (ROMs), solid statedrives (SSDs), Universal Flash Storage (UFS) device, embedded MMC (eMMC)device, and the like.

The above description is intended to be illustrative, and notrestrictive. For example, the above-described examples (or one or moreaspects thereof) can be used in combination with each other. Otherembodiments can be used, such as by one of ordinary skill in the artupon reviewing the above description. It is submitted with theunderstanding that it will not be used to interpret or limit the scopeor meaning of the claims. Also, in the above Detailed Description,various features can be grouped together to streamline the disclosure.This should not be interpreted as intending that an unclaimed disclosedfeature is essential to any claim. Rather, inventive subject matter canlie in less than all features of a particular disclosed embodiment.Thus, the following claims are hereby incorporated into the DetailedDescription, with each claim standing on its own as a separateembodiment, and it is contemplated that such embodiments can be combinedwith each other in various combinations or permutations. The scope ofthe invention should be determined with reference to the appendedclaims, along with the full scope of equivalents to which such claimsare entitled.

OTHER NOTES AND EXAMPLES

Example 1 is a method for storing data on a non-volatile memory device,the method comprising: receiving data to write to a plurality of memorycells of the memory device; responsive to receiving the data, generatinga scrambler seed value for the data; scrambling the data by transformingthe data using a scrambling algorithm and the seed value to producescrambled data; encoding both the seed value and the scrambled data tocreate encoded data; causing the encoded data to be written to a firstplurality of memory cells of a first die the memory device; identifyingthat the encoded data is to be copied to a second plurality of memorycells within the first die; and responsive to identifying that theencoded data is to be copied to the second plurality of memory cells,causing the encoded data to be copied to the second plurality of memorycells without transferring a host data portion of the encoded data fromthe first die to a controller of the memory device.

In Example 2, the subject matter of Example 1 includes, whereingenerating the seed value comprises obtaining a random number.

In Example 3, the subject matter of Example 2 includes, whereinobtaining the random number comprises using a hardware random numbergenerator.

In Example 4, the subject matter of Examples 2-3 includes, wherein therandom number is a pseudo-random number generated from a pseudo-randomnumber generator.

In Example 5, the subject matter of Examples 1-4 includes, wherein theseed value is an encryption key.

In Example 6, the subject matter of Examples 1-5 includes, wherein thescrambling algorithm is an XOR algorithm and wherein scrambling the datacomprises XORing the data with a random sequence generated with the seedvalue to produce the scrambled data.

In Example 7, the subject matter of Examples 1-6 includes, wherein thescrambling algorithm is an encryption algorithm and wherein scramblingthe data by transforming the data using the encryption algorithm and theseed value to produce the scrambled data comprises encrypting the datawith the seed value.

In Example 8, the subject matter of Examples 1-7 includes, receiving aread request for the data; reading the encoded data from the secondplurality of memory cells; decoding the encoded data to produce thescrambled data and the seed value; and unscrambling the scrambled datawith the seed value to produce the data.

Example 9 is a memory device comprising: a first memory die including aplurality of memory cells; a controller, configured to performoperations comprising: receiving data to write to the plurality ofmemory cells; responsive to receiving the data, generating a scramblerseed value for the data; scrambling the data by transforming the datausing a scrambling algorithm and the seed value to produce scrambleddata; encoding both the seed value and the scrambled data to createencoded data; causing the encoded data to be written to a firstplurality of memory cells of the first die; identifying that the encodeddata is to be copied to a second plurality of memory cells within thefirst die; and responsive to identifying that the encoded data is to becopied to the second plurality of memory cells, causing the encoded datato be copied to the second plurality of memory cells withouttransferring a host data portion of the encoded data from the first dieto a controller of the memory device.

In Example 10, the subject matter of Example 9 includes, wherein theoperations of generating the seed value comprises obtaining a randomnumber.

In Example 11, the subject matter of Example 10 includes, wherein thememory device comprises a hardware random number generator and whereinthe operations of obtaining the random number comprises obtaining therandom number from the hardware random number generator.

In Example 12, the subject matter of Examples 10-11 includes, whereinthe random number is a pseudo-random number generated from apseudo-random number generator.

In Example 13, the subject matter of Examples 9-12 includes, wherein theseed value is an encryption key.

In Example 14, the subject matter of Examples 9-13 includes, wherein thescrambling algorithm is an XOR algorithm and wherein the operations ofscrambling the data comprises XORing the data with a random sequencegenerated with the seed value to produce the scrambled data.

In Example 15, the subject matter of Examples 9-14 includes, wherein thescrambling algorithm is an encryption algorithm and wherein theoperation of scrambling the data by transforming the data using theencryption algorithm and the seed value to produce the scrambled datacomprises encrypting the data with the seed value.

In Example 16, the subject matter of Examples 9-15 includes, wherein theoperations further comprise: receiving a read request for the data;reading the encoded data from the second plurality of memory cells;decoding the encoded data to produce the scrambled data and the seedvalue; and unscrambling the scrambled data with the seed value toproduce the data.

Example 17 is a non-transitory machine-readable medium, storinginstructions, which when executed, cause a memory device to performoperations comprising: receiving data to write to a plurality of memorycells of the memory device; responsive to receiving the data, generatinga scrambler seed value for the data; scrambling the data by transformingthe data using a scrambling algorithm and the seed value to producescrambled data; encoding both the seed value and the scrambled data tocreate encoded data; causing the encoded data to be written to a firstplurality of memory cells of the first die; identifying that the encodeddata is to be copied to a second plurality of memory cells within thefirst die; and responsive to identifying that the encoded data is to becopied to the second plurality of memory cells, causing the encoded datato be copied to the second plurality of memory cells withouttransferring a host data portion of the encoded data from the first dieto a controller of the memory device.

In Example 18, the subject matter of Example 17 includes, wherein theoperations of generating the seed value comprises obtaining a randomnumber.

In Example 19, the subject matter of Example 18 includes, wherein thememory device comprises a hardware random number generator and whereinthe operations of obtaining the random number comprises obtaining therandom number from the hardware random number generator.

In Example 20, the subject matter of Examples 18-19 includes, whereinthe random number is a pseudo-random number generated from apseudo-random number generator.

In Example 21, the subject matter of Examples 17-20 includes, whereinthe seed value is an encryption key.

In Example 22, the subject matter of Examples 17-21 includes, whereinthe scrambling algorithm is an XOR algorithm and wherein the operationsof scrambling the data comprises XORing the data with a random sequencegenerated with the seed value to produce the scrambled data.

In Example 23, the subject matter of Examples 17-22 includes, whereinthe scrambling algorithm is an encryption algorithm and wherein theoperation of scrambling the data by transforming the data using theencryption algorithm and the seed value to produce the scrambled datacomprises encrypting the data with the seed value.

In Example 24, the subject matter of Examples 17-23 includes, whereinthe operations further comprise: receiving a read request for the data;reading the encoded data from the second plurality of memory cells;decoding the encoded data to produce the scrambled data and the seedvalue; and unscrambling the scrambled data with the seed value toproduce the data.

Example 25 is at least one machine-readable medium includinginstructions that, when executed by processing circuitry, cause theprocessing circuitry to perform operations to implement of any ofExamples 1-24.

Example 26 is an apparatus comprising means to implement of any ofExamples 1-24.

Example 27 is a system to implement of any of Examples 1-24.

Example 28 is a method to implement of any of Examples 1-24.

Example 29 is a method for storing data on a non-volatile memory device,the method comprising: receiving data to write to a plurality of memorycells of the memory device; responsive to receiving the data, generatinga scrambler seed value for the data; scrambling the data by transformingthe data using a scrambling algorithm and the seed value to producescrambled data; encoding both the seed value and the scrambled data tocreate encoded data; causing the encoded data to be written to a firstplurality of memory cells of a first die the memory device; identifyingthat the encoded data is to be copied to a second plurality of memorycells within the first die; and responsive to identifying that theencoded data is to be copied to the second plurality of memory cells,causing the encoded data to be copied to the second plurality of memorycells without transferring a host data portion of the encoded data fromthe first die to a controller of the memory device.

In Example 30, the subject matter of Example 29 includes, whereingenerating the seed value comprises obtaining a random number.

In Example 31, the subject matter of Example 30 includes, whereinobtaining the random number comprises using a hardware random numbergenerator.

In Example 32, the subject matter of Examples 30-31 includes, whereinthe random number is a pseudo-random number generated from apseudo-random number generator.

In Example 33, the subject matter of Examples 29-32 includes, whereinthe seed value is an encryption key.

In Example 34, the subject matter of Examples 29-33 includes, whereinthe scrambling algorithm is an XOR algorithm and wherein scrambling thedata comprises XORing the data with a random sequence generated with theseed value to produce the scrambled data.

In Example 35, the subject matter of Examples 29-34 includes, whereinthe scrambling algorithm is an encryption algorithm and whereinscrambling the data by transforming the data using the encryptionalgorithm and the seed value to produce the scrambled data comprisesencrypting the data with the seed value.

In Example 36, the subject matter of Examples 29-35 includes, receivinga read request for the data; reading the encoded data from the secondplurality of memory cells; decoding the encoded data to produce thescrambled data and the seed value; and unscrambling the scrambled datawith the seed value to produce the data.

Example 37 is a memory device comprising: a first memory die including aplurality of memory cells; a controller, configured to performoperations comprising: receiving data to write to the plurality ofmemory cells; responsive to receiving the data, generating a scramblerseed value for the data; scrambling the data by transforming the datausing a scrambling algorithm and the seed value to produce scrambleddata; encoding both the seed value and the scrambled data to createencoded data; causing the encoded data to be written to a firstplurality of memory cells of the first die; identifying that the encodeddata is to be copied to a second plurality of memory cells within thefirst die; and responsive to identifying that the encoded data is to becopied to the second plurality of memory cells, causing the encoded datato be copied to the second plurality of memory cells withouttransferring a host data portion of the encoded data from the first dieto a controller of the memory device.

In Example 38, the subject matter of Example 37 includes, wherein theoperations of generating the seed value comprises obtaining a randomnumber.

In Example 39, the subject matter of Example 38 includes, wherein thememory device comprises a hardware random number generator and whereinthe operations of obtaining the random number comprises obtaining therandom number from the hardware random number generator.

In Example 40, the subject matter of Examples 38-39 includes, whereinthe random number is a pseudo-random number generated from apseudo-random number generator.

In Example 41, the subject matter of Examples 37-40 includes, whereinthe seed value is an encryption key.

In Example 42, the subject matter of Examples 37-41 includes, whereinthe scrambling algorithm is an XOR algorithm and wherein the operationsof scrambling the data comprises XORing the data with a random sequencegenerated with the seed value to produce the scrambled data.

In Example 43, the subject matter of Examples 37-42 includes, whereinthe scrambling algorithm is an encryption algorithm and wherein theoperation of scrambling the data by transforming the data using theencryption algorithm and the seed value to produce the scrambled datacomprises encrypting the data with the seed value.

In Example 44, the subject matter of Examples 37-43 includes, whereinthe operations further comprise: receiving a read request for the data;reading the encoded data from the second plurality of memory cells;decoding the encoded data to produce the scrambled data and the seedvalue; and unscrambling the scrambled data with the seed value toproduce the data.

Example 45 is a non-transitory machine-readable medium, storinginstructions, which when executed, cause a memory device to performoperations comprising: receiving data to write to a plurality of memorycells of the memory device; responsive to receiving the data, generatinga scrambler seed value for the data; scrambling the data by transformingthe data using a scrambling algorithm and the seed value to producescrambled data; encoding both the seed value and the scrambled data tocreate encoded data; causing the encoded data to be written to a firstplurality of memory cells of the first die; identifying that the encodeddata is to be copied to a second plurality of memory cells within thefirst die; and responsive to identifying that the encoded data is to becopied to the second plurality of memory cells, causing the encoded datato be copied to the second plurality of memory cells withouttransferring a host data portion of the encoded data from the first dieto a controller of the memory device.

In Example 46, the subject matter of Example 45 includes, wherein theoperations of generating the seed value comprises obtaining a randomnumber.

In Example 47, the subject matter of Example 46 includes, wherein thememory device comprises a hardware random number generator and whereinthe operations of obtaining the random number comprises obtaining therandom number from the hardware random number generator.

In Example 48, the subject matter of Examples 46-47 includes, whereinthe random number is a pseudo-random number generated from apseudo-random number generator.

In Example 49, the subject matter of Examples 45-48 includes, whereinthe seed value is an encryption key.

In Example 50, the subject matter of Examples 45-49 includes, whereinthe scrambling algorithm is an XOR algorithm and wherein the operationsof scrambling the data comprises XORing the data with a random sequencegenerated with the seed value to produce the scrambled data.

In Example 51, the subject matter of Examples 45-50 includes, whereinthe scrambling algorithm is an encryption algorithm and wherein theoperation of scrambling the data by transforming the data using theencryption algorithm and the seed value to produce the scrambled datacomprises encrypting the data with the seed value.

In Example 52, the subject matter of Examples 45-51 includes, whereinthe operations further comprise: receiving a read request for the data;reading the encoded data from the second plurality of memory cells;decoding the encoded data to produce the scrambled data and the seedvalue; and unscrambling the scrambled data with the seed value toproduce the data.

Example 53 is at least one machine-readable medium includinginstructions that, when executed by processing circuitry, cause theprocessing circuitry to perform operations to implement of any ofExamples 29-52.

Example 54 is an apparatus comprising means to implement of any ofExamples 29-52.

Example 55 is a system to implement of any of Examples 29-52.

Example 56 is a method to implement of any of Examples 29-52.

Example 57 is a method for performing a copyback operation a memorydevice, the method comprising: at a memory controller of the memorydevice: receiving encoded meta-data from a memory die over an internalcommunication interface of the memory device and responsive toinitiation of a copyback operation, wherein host-data corresponding tothe meta-data is not sent by the memory die over the internalcommunication interface; decoding the encoded meta-data to producedecoded meta-data; unscrambling the decoded meta-data to produceunscrambled meta-data using a key value, the key value stored as part ofthe decoded meta-data; updating the unscrambled meta-data to produceupdated meta-data; scrambling the updated meta-data with the key valueto produce scrambled updated meta-data; encoding the scrambled updatedmeta-data to produce encoded updated meta-data; and sending the encodedupdated meta-data to the memory die, the encoded updated meta-datacombined with encoded host-data and written to a new location on thememory die.

In Example 58, the subject matter of Example 57 includes, whereinupdating the unscrambled meta-data comprises updating a writetemperature.

In Example 59, the subject matter of Examples 57-58 includes, whereinupdating the unscrambled meta-data comprises updating a write time.

In Example 60, the subject matter of Examples 57-59 includes, at thememory die of the memory device: identifying an internal copybackcommand for a first memory location; read the first memory location toobtain the encoded meta-data and the encoded host-data; storing theencoded host-data in a memory buffer on the memory die; sending theencoded meta-data to the memory controller; receiving the encodedupdated meta-data from the memory controller; and writing the encodedupdated meta-data along with the encoded host-data stored in the memorybuffer to the new location on the memory die.

In Example 61, the subject matter of Examples 57-60 includes, whereinunscrambling the decoded meta-data to produce unscrambled meta-datausing the key value comprises applying an XOR operation to the decodedmeta-data and the key value.

In Example 62, the subject matter of Examples 57-61 includes, whereinthe encoded meta-data includes encoding information used in thedecoding.

In Example 63, the subject matter of Example 62 includes, wherein theencoding information is at least one parity bit.

In Example 64, the subject matter of Examples 62-63 includes, whereinthe encoding information of the encoded meta-data differs from secondencoding information included in encoded host-data corresponding to thehost-data.

Example 65 is a memory device comprising: a memory controller configuredto perform the operations comprising: receiving encoded meta-data from amemory die over an internal communication interface of the memory deviceand responsive to initiation of a copyback operation, wherein host-datacorresponding to the meta-data is not sent by the memory die over theinternal communication interface; decoding the encoded meta-data toproduce decoded meta-data; unscrambling the decoded meta-data to produceunscrambled meta-data using a key value, the key value stored as part ofthe decoded meta-data; updating the unscrambled meta-data to produceupdated meta-data; scrambling the updated meta-data with the key valueto produce scrambled updated meta-data; encoding the scrambled updatedmeta-data to produce encoded updated meta-data; and sending the encodedupdated meta-data to the memory die, the encoded updated meta-datacombined with encoded host-data and written to a new location on thememory die.

In Example 66, the subject matter of Example 65 includes, wherein theoperations of updating the unscrambled meta-data comprises updating awrite temperature.

In Example 67, the subject matter of Examples 65-66 includes, whereinthe operations of updating the unscrambled meta-data comprises updatinga write time.

In Example 68, the subject matter of Examples 65-67 includes, the memorydie, the memory die comprising a processor configured to performoperations comprising: identifying an internal copyback command for afirst memory location; read the first memory location to obtain theencoded meta-data and the encoded host-data; storing the encodedhost-data in a memory buffer on the memory die; sending the encodedmeta-data to the memory controller; receiving the encoded updatedmeta-data from the memory controller; and writing the encoded updatedmeta-data along with the encoded host-data stored in the memory bufferto the new location on the memory die.

In Example 69, the subject matter of Examples 65-68 includes, whereinthe operations of unscrambling the decoded meta-data to produceunscrambled meta-data using the key value comprises applying an XORoperation to the decoded meta-data and the key value.

In Example 70, the subject matter of Examples 65-69 includes, whereinthe encoded meta-data includes encoding information used in thedecoding.

In Example 71, the subject matter of Example 70 includes, wherein theencoding information is at least one parity bit.

In Example 72, the subject matter of Examples 70-71 includes, whereinthe encoding information of the encoded meta-data differs from secondencoding information included in encoded host-data corresponding to thehost-data.

Example 73 is a non-transitory machine-readable medium, storinginstructions, which when executed by a memory device, cause the memorydevice to perform operations comprising: receiving encoded meta-datafrom a memory die over an internal communication interface of the memorydevice and responsive to initiation of a copyback operation, whereinhost-data corresponding to the meta-data is not sent by the memory dieover the internal communication interface; decoding the encodedmeta-data to produce decoded meta-data; unscrambling the decodedmeta-data to produce unscrambled meta-data using a key value, the keyvalue stored as part of the decoded meta-data; updating the unscrambledmeta-data to produce updated meta-data; scrambling the updated meta-datawith the key value to produce scrambled updated meta-data; encoding thescrambled updated meta-data to produce encoded updated meta-data; andsending the encoded updated meta-data to the memory die, the encodedupdated meta-data combined with encoded host-data and written to a newlocation on the memory die.

In Example 74, the subject matter of Example 73 includes, wherein theoperations of updating the unscrambled meta-data comprises updating awrite temperature.

In Example 75, the subject matter of Examples 73-74 includes, whereinthe operations of updating the unscrambled meta-data comprises updatinga write time.

In Example 76, the subject matter of Examples 73-75 includes, whereinthe operations further comprise: at the memory die: identifying aninternal copyback command for a first memory location; read the firstmemory location to obtain the encoded meta-data and the encodedhost-data; storing the encoded host-data in a memory buffer on thememory die; sending the encoded meta-data to the memory controller;receiving the encoded updated meta-data from the memory controller; andwriting the encoded updated meta-data along with the encoded host-datastored in the memory buffer to the new location on the memory die.

Example 77 is at least one machine-readable medium includinginstructions that, when executed by processing circuitry, cause theprocessing circuitry to perform operations to implement of any ofExamples 57-76.

Example 78 is an apparatus comprising means to implement of any ofExamples 57-76.

Example 79 is a system to implement of any of Examples 57-76.

Example 80 is a method to implement of any of Examples 57-76.

1. A method for memory device storage, the method comprising:identifying data to be written to a first set of one or more memorycells of a memory device, the data including host-data from a host andmeta-data created by a controller of the memory device; responsive toreceiving the data, generating a first seed value for the host-data anda second seed value for the meta-data, the first and second seed valuesnot being generated based upon a physical address where the data is tobe placed; scrambling the host-data by transforming the host-data usinga scrambling algorithm and the first seed value to produce scrambledhost-data; scrambling the meta-data by transforming the meta-data usingthe scrambling algorithm and the second seed value to produce scrambledmeta-data; and causing the scrambled host-data and meta-data to bewritten to the first set of memory cells of a first die of the memorydevice along with the first and second seed values.
 2. The method ofclaim 1, further comprising receiving the host-data from a host.
 3. Themethod of claim 1, wherein the generating the first seed value comprisesgenerating a random seed value.
 4. The method of claim 3, whereingenerating the random seed value comprises seeding a random numbergenerator with one or more of: a current time or a current temperature.5. The method of claim 1, wherein the scrambling algorithm comprisesusing an XOR operation.
 6. The method of claim 1, wherein a third seedvalue generated for second data written to a second set of memory cellsis different than the first seed value and the second seed value.
 7. Themethod of claim 1, wherein the scrambling algorithm comprises one of: aRivest Shamir Adleman (RSA) encryption, a Blowfish cipher, an AdvancedEncryption Standard (AES) algorithm, or a Triple Data EncryptionAlgorithm (Triple DES).
 8. A memory device comprising: a hardwareprocessor, configured to perform operations comprising: identifying datato be written to a first set of one or more memory cells of the memorydevice, the data including host-data from a host and meta-data createdby a controller of the memory device; responsive to receiving the data,generating a first seed value for the host-data and a second seed valuefor the meta-data, the first and second seed values not being generatedbased upon a physical address where the data is to be placed; scramblingthe host-data by transforming the host-data using a scrambling algorithmand the first seed value to produce scrambled host-data; scrambling themeta-data by transforming the meta-data using the scrambling algorithmand the second seed value to produce scrambled meta-data; and causingthe scrambled host-data and meta-data to be written to the first set ofmemory cells of a first die of the memory device along with the firstand second seed values.
 9. The memory device of claim 8, furthercomprising receiving the host-data from a host.
 10. The memory device ofclaim 8, wherein the generating the first seed value comprisesgenerating a random seed value.
 11. The memory device of claim 10,wherein generating the random seed value comprises seeding a randomnumber generator with one or more of: a current time or a currenttemperature.
 12. The memory device of claim 8, wherein the scramblingalgorithm comprises using an XOR operation.
 13. The memory device ofclaim 8, wherein a third seed value generated for second data written toa second set of memory cells is different than the first seed value andthe second seed value.
 14. The memory device of claim 8, wherein thescrambling algorithm comprises one of: a Rivest Shamir Adleman (RSA)encryption, a Blowfish cipher, an Advanced Encryption Standard (AES)algorithm, or a Triple Data Encryption Algorithm (Triple DES).
 15. Anon-transitory, machine-readable medium, storing instructions, whichwhen executed by a processor, cause the memory device to performoperations comprising: identifying data to be written to a first set ofone or more memory cells of a memory device, the data includinghost-data from a host and meta-data created by a controller of thememory device; responsive to receiving the data, generating a first seedvalue for the host-data and a second seed value for the meta-data, thefirst and second seed values not being generated based upon a physicaladdress where the data is to be placed; scrambling the host-data bytransforming the host-data using a scrambling algorithm and the firstseed value to produce scrambled host-data; scrambling the meta-data bytransforming the meta-data using the scrambling algorithm and the secondseed value to produce scrambled meta-data; and causing the scrambledhost-data and meta-data to be written to the first set of memory cellsof a first die of the memory device along with the first and second seedvalues.
 16. The non-transitory machine-readable medium of claim 15,further comprising receiving the host-data from a host.
 17. Thenon-transitory machine-readable medium of claim 15, wherein thegenerating the first seed value comprises generating a random seedvalue.
 18. The non-transitory machine-readable medium of claim 17,wherein generating the random seed value comprises seeding a randomnumber generator with one or more of: a current time or a currenttemperature.
 19. The non-transitory machine-readable medium of claim 15,wherein the scrambling algorithm comprises using an XOR operation. 20.The non-transitory machine-readable medium of claim 15, wherein a thirdseed value generated for second data written to a second set of memorycells is different than the first seed value and the second seed value.