US 12,014,087 B2
Method and apparatus for performing data management of memory device with aid of targeted protection control
Tsung-Chieh Yang, Hsinchu (TW)
Assigned to Silicon Motion, Inc., Hsinchu County (TW)
Filed by Silicon Motion, Inc., Hsinchu County (TW)
Filed on Jul. 20, 2022, as Appl. No. 17/869,735.
Prior Publication US 2024/0028258 A1, Jan. 25, 2024
Int. Cl. G06F 3/06 (2006.01)
CPC G06F 3/0659 (2013.01) [G06F 3/0604 (2013.01); G06F 3/0679 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A method for performing data management of a memory device with aid of targeted protection control, the method being applied to a memory controller of the memory device, the memory device comprising the memory controller and a non-volatile (NV) memory, the NV memory comprising at least one NV memory element, the method comprising:
receiving a first host command from a host device, wherein the first host command indicates that reading first stored data is requested, and the first stored data is stored at a first location within the NV memory;
in response to the first host command, sending a first operating command to the NV memory to read the first stored data from the first location within the NV memory, for being returned to the host device;
monitoring a read count of the first location to determine whether the read count of the first location reaches a read count threshold, wherein the read count of the first location is recorded in a read count table within the NV memory;
in response to the read count of the first location reaching the read count threshold, monitoring at least one error bit count of other stored data of at least one other location within the NV memory to determine whether the at least one error bit count reaches an error bit count threshold, wherein the at least one other location comprises a second location within the NV memory, and the other stored data comprises second stored data stored at the second location; and
in response to the at least one error bit count reaching the error bit count threshold, starting a targeted protection procedure to process the second stored data, for preventing the second stored data from being damaged by at least one reading behavior of the host device, wherein the at least one reading behavior of the host device comprises sending at least one host command which is equivalent to the first host command for reading the first stored data, and starting the targeted protection procedure to process the second stored data further comprises:
starting the targeted protection procedure to process the second stored data, while leaving the first stored data at the first location.