US20180151224A1 - Rram-based authentication circuit - Google Patents
Rram-based authentication circuit Download PDFInfo
- Publication number
- US20180151224A1 US20180151224A1 US15/435,082 US201715435082A US2018151224A1 US 20180151224 A1 US20180151224 A1 US 20180151224A1 US 201715435082 A US201715435082 A US 201715435082A US 2018151224 A1 US2018151224 A1 US 2018151224A1
- Authority
- US
- United States
- Prior art keywords
- bit
- rram
- circuit
- coupled
- memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C13/00—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00
- G11C13/0002—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00 using resistive RAM [RRAM] elements
- G11C13/0021—Auxiliary circuits
- G11C13/0059—Security or protection circuits or methods
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C13/00—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00
- G11C13/0002—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00 using resistive RAM [RRAM] elements
- G11C13/0007—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00 using resistive RAM [RRAM] elements comprising metal oxide memory material, e.g. perovskites
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C13/00—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00
- G11C13/0002—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00 using resistive RAM [RRAM] elements
- G11C13/0021—Auxiliary circuits
- G11C13/003—Cell access
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C13/00—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00
- G11C13/0002—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00 using resistive RAM [RRAM] elements
- G11C13/0021—Auxiliary circuits
- G11C13/004—Reading or sensing circuits or methods
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C13/00—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00
- G11C13/0002—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00 using resistive RAM [RRAM] elements
- G11C13/0021—Auxiliary circuits
- G11C13/0069—Writing or programming circuits or methods
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C7/00—Arrangements for writing information into, or reading information out from, a digital store
- G11C7/24—Memory cell safety or protection circuits, e.g. arrangements for preventing inadvertent reading or writing; Status cells; Test cells
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C13/00—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00
- G11C13/0002—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00 using resistive RAM [RRAM] elements
- G11C13/0021—Auxiliary circuits
- G11C13/0069—Writing or programming circuits or methods
- G11C2013/0083—Write to perform initialising, forming process, electro forming or conditioning
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C2029/4402—Internal storage of test result, quality data, chip identification, repair information
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C2213/00—Indexing scheme relating to G11C13/00 for features not covered by this group
- G11C2213/70—Resistive array aspects
- G11C2213/79—Array wherein the access device being a transistor
Definitions
- a physically unclonable function is a physical structure generally within an integrated circuit that provides a number of corresponding outputs (e.g., responses) in response to inputs (e.g., challenges/requests) to the PUF.
- Each PUF provides one or more sets of request-response pairs.
- An identity of the integrated circuit may be established by such request-response pairs provided by the PUF. With the establishment of the identity, secure communication can be provided between devices.
- the PUF can also be used for existing authentication purposes to replace the current method of assigning an identity to an electronic device. Since the PUF is based on intrinsic properties of a manufacturing process, the PUF has various advantages over conventional authentication approaches that inscribe an identity on a device that may be mimicked and/or reverse engineered more easily.
- FIG. 1 illustrates an exemplary block diagram of a memory device that includes a resistive random access memory (RRAM) array, in accordance with some embodiments.
- RRAM resistive random access memory
- FIG. 2A illustrates an exemplary hybrid layout of an RRAM cell in the RRAM array of FIG. 1 , in accordance with some embodiments.
- FIG. 2B illustrates an exemplary operation of the RRAM cell of FIG. 2A , in accordance with some embodiments.
- FIG. 3A illustrates an exemplary hybrid layout of a bit in the RRAM array and a part of a formation circuit of FIG. 1 , in accordance with some embodiments.
- FIG. 3B illustrates an exemplary hybrid layout of the bit of the FIG. 3A and another part of the formation circuit of FIG. 1 , in accordance with some embodiments.
- FIG. 3C illustrates an exemplary layout of another bit in the RRAM array and yet another part of the formation circuit of FIG. 1 , in accordance with some embodiments.
- FIG. 4A illustrates an exemplary circuit diagram of the RRAM array of FIG. 1 , in accordance with some embodiments.
- FIG. 4B illustrates another exemplary circuit diagram of the RRAM array of FIG. 1 , in accordance with some embodiments.
- FIG. 4C illustrates yet another exemplary circuit diagram of the RRAM array of FIG. 1 , in accordance with some embodiments.
- FIG. 5 illustrates a flow chart of a method to use the RRAM array of FIG. 1 to generate a PUF signature, in accordance with some embodiments.
- a physical unclonable function is generally used for authentication and secret key storage without requiring secure electrically erasable programmable read-only memory (EEPROMs) (or any of other non-volatile memory) and/or other expensive hardware (e.g., battery-backed static random-access memory).
- EEPROMs electrically erasable programmable read-only memory
- the PUF derives a secret from physical characteristics of an integrated circuit (IC).
- IC integrated circuit
- the PUF is based on an idea that even though an identical manufacturing process is used to fabricate a plurality of ICs, each IC may be slightly different due to manufacturing variability. PUFs leverage this variability to derive “secret” information that is unique to each of the ICs (e.g., a silicon “biometric”).
- such secret information is referred to as a “signature” of the IC.
- signature due to the manufacturing variability that defines the signature, one cannot manufacture two identical ICs even with full knowledge of the IC's design.
- Various types of variability of an IC can be used to define such a signature such as, for example, gate delay(s), power-on state(s) of a memory device (e.g., a static random-access memory (SRAM) device), and/or any of a variety of physical characteristics of an IC.
- SRAM static random-access memory
- NVM nonvolatile memory
- FRAM ferroelectric random access memory
- MRAM magnetic random access memory
- PRAM phase-change random access memory
- RRAM resistive random access memory
- advantages include, for example, compatible fabrication steps with current complementary-metal-oxide-semiconductor (CMOS) technologies, low-cost fabrication, a compact structure, flexible scalability, fast switching, high integration density, etc.
- CMOS complementary-metal-oxide-semiconductor
- an RRAM device or more particularly an RRAM cell, includes a top electrode (e.g., an anode) and a bottom electrode (e.g., a cathode) with a variable resistance dielectric layer interposed therebetween.
- an RRAM cell may further include a capping layer interposed between the top electrode and the variable resistance dielectric layer thereby causing the RRAM cell to have a bipolar switching behavior.
- bipolar refers to the two voltage polarities of an RRAM cell that exhibits a first conductive behavior with a first polarity of voltage applied across the top and bottom electrodes, and a second conductive behavior with a second polarity (a polarity opposite to the first polarity) of voltage applied across the top and bottom electrodes.
- a ‘set’ voltage is applied across the top and bottom electrodes to change the variable resistance dielectric layer from a first resistivity (e.g., a high resistance state (HRS)) to a second resistivity (e.g., a low resistance state (LRS)).
- HRS high resistance state
- LRS low resistance state
- a ‘reset’ voltage (e.g., opposite to the set voltage in polarity) may be applied across the top and bottom electrodes to change the variable resistance dielectric layer from the second resistivity back to the first resistivity, for example, from LRS to HRS. Therefore, the LRS and HRS may correspond to a logical “1” and a logical “0” (or vice versa), respectively.
- the present disclosure provides various embodiments of systems and methods to generate a PUF signature, by an authentication circuit, for an RRAM cell array via utilizing randomly distributed characteristics of plural RRAM cells across the RRAM cell array.
- the RRAM array includes a plurality of RRAM memory bits (hereinafter “bits”), and each bit includes two RRAM cells.
- bits RRAM memory bits
- each bit includes two RRAM cells.
- the respective different characteristics of the two RRAM cells in a single bit allows the authentication circuit to designate the two RRAM cells as a logical 1 and a logical 0, respectively. Further, corresponding locations (e.g., address of each bit) of the designated logical 1 and logical 0 are randomly distributed (i.e., unpredictable), again because of the manufacturing variability. As such, the authentication circuit may choose either a logical 1 or a logical 0 from each bit to generate a PUF signature. Consequently, such a PUF signature generated by the disclosed authentication circuit may advantageously be more “unpredictable,” and thus more “reliable.”
- FIG. 1 illustrates an exemplary block diagram of a memory device 100 , in accordance with various embodiments.
- the memory device 100 includes an RRAM cell array 102 (hereinafter “array”), a bit line (BL) driver 104 , a word line (WL) driver 106 , a select line (SL) driver 108 , a formation circuit 110 , an input/output (I/O) circuit 112 , an authentication circuit 114 , and a control logic circuit 116 .
- the array 102 includes a plurality of bits, and, more specifically, each bit includes two RRAM cells, wherein each bit's respective RRAM cells are substantially similar to each other.
- each RRAM cell in addition to the top electrode, the optional capping layer, the variable resistance dielectric layer, and the bottom electrode that form a resistor (with variable resistance), each RRAM cell further includes a transistor coupled, in series, to the resistor.
- each RRAM cell may include three nodes/terminals that are each coupled to a bit line (BL), a word line (WL), and a selector line (SL), respectively.
- each bit, comprising two RRAM cells may include six terminals that are coupled to a first set of BL, WL, and SL, and a second set of BL, WL, and SL, respectively.
- the plurality of bits in the array 102 are arranged in a three-dimensional column-row configuration, wherein the array 102 includes a plurality of BL's that are arranged along a first horizontal direction (i.e., the column), and pluralities of WL's and SL's that are arranged along a second horizontal direction (i.e., the row) that is perpendicular to the first horizontal direction.
- the array 102 includes a plurality of BL's that are arranged along a first horizontal direction (i.e., the column), and pluralities of WL's and SL's that are arranged along a second horizontal direction (i.e., the row) that is perpendicular to the first horizontal direction.
- each BL intersects with plural pairs of WL's and SL's, and at each intersection, a bit comprising two RRAM cells is disposed vertically between one or more respective BL's and one or more respective SL's (and/or WL's).
- Various embodiments of the physical configuration of the array 102 will be discussed in further detail below with respect to FIGS. 4A, 4B, and 4C .
- the bits of the array 102 are each coupled to the BL driver 104 , the WL driver 106 , the SL driver 108 , respectively.
- the BL driver 104 may include one or more multiplexers, switch devices, and/or the like that are each configured to select one or more of the BL's so as to assert respectively coupled bit(s).
- the WL driver 106 and the SL driver 108 may each include one or more multiplexers, switch devices, and/or the like that are each configured to select one or more of the WL's and SL's so as to assert coupled bit(s), respectively.
- each bit may be further coupled to the formation circuit 110 .
- the formation circuit 110 may include one or more voltage source circuits and/or current source circuits that are configured to “form” one of the two RRAM cells of the respective bit, which will be discussed in further detail below with respect to FIGS. 3A, 3B, and 3C .
- each of the bits of the array 102 may be further coupled to the I/O circuit 112 through respective BL or BL's.
- the I/O circuit 112 includes a plurality of sensing amplifiers (SA's) that are each configured to “read” a data bit (either a logical 1 or a logical 0) from one or more bits of the array 102 .
- SA's sensing amplifiers
- such read data bit may be used by the authentication circuit 114 to generate one or more PUF signatures.
- the authentication circuit 114 may include a PUF generator, an error correction circuit, a compiler, etc.
- control logic circuit 116 may be coupled to the BL driver 104 , the WL driver 106 , and the SL driver 108 , and is configured to control each of them.
- the control logic circuit 116 may provide a column address to the BL driver 104 so as to cause the BL driver 104 to assert one or more corresponding bit(s) that are arranged in the column address;
- the control logic circuit 116 may provide a row address to the WL driver 106 so as to cause the WL driver 106 to provide a WL assertions signal to activate one or more selection transistors that are arranged in the row address;
- the control logic circuit 116 may provide a selector address to the SL driver 108 so as to cause the SL driver 108 to assert one or more corresponding bit(s) that are arranged in the selector address.
- FIG. 2A illustrates an exemplary structure of an RRAM cell 200 of a bit of the array 102 ( FIG. 1 ), in accordance with some embodiments.
- the RRAM cell 200 is implemented as a 1-transistor-1-resistor (1T1R) structure. More specifically, a resistor 202 with variable resistance is serially connected to a transistor 204 .
- any of a variety of structures that exhibits the characteristic of variable resistance may be included in the RRAM cell such as, for example, an 1-diode-1-resistor (1D1R) structure, a 1-transistor-many resistors (1T-manyR) structure, a cross-bar structure, an eFuse device, an anti-eFuse device, etc., while remaining within the scope of the present disclosure.
- an 1-diode-1-resistor (1D1R) structure such as, for example, an 1-diode-1-resistor (1D1R) structure, a 1-transistor-many resistors (1T-manyR) structure, a cross-bar structure, an eFuse device, an anti-eFuse device, etc.
- the RRAM cell 200 includes a resistor 202 and a transistor 204 coupled to the resistor 202 , in series.
- the resistor 202 is formed as a multi-layer stack that includes a top electrode (TE) 212 , a capping layer 222 , a variable resistance dielectric (VRD) layer 232 , and a bottom electrode (BE) 242 .
- the TE 212 may be formed from at least one of the materials selected from: Pt, TiN/Ti, TiN, Ru, Ni, and combinations thereof;
- the capping layer 222 may be formed from at least one of the transition metal materials such as, Ti, Ni, Hf, Nb, Co, Fe, Cu, V, Ta, W, Cr, and combinations thereof;
- the VRD layer 232 may be formed from at least one of the transition metal oxide materials such as, TiO x , NiO x , HfO x , NbO x , CoO x , FeO x , CuO x , VO x , TaO x , WO x , CrO x , and combinations thereof;
- the BE 242 may be formed of at least one of the materials selected from: TiN, TaN, W, Pt, and combinations thereof.
- the VRD layer 232 may include a high-k dielectric layer.
- the VRD layer 232 may be formed by deposition, for example, atomic layer deposition (ALD), chemical vapor deposition (CVD), meta-organic chemical vapor deposition (MOCVD), etc., to have a particular thickness and crystalline structure using a particular manufacturing process recipe.
- ALD atomic layer deposition
- CVD chemical vapor deposition
- MOCVD meta-organic chemical vapor deposition
- an identical process recipe may be used to form two or more VRD layers 232 for respective RRAM cells, due to the manufacturing variability, these RRAM cells may not present identical characteristics when compared to one another.
- each RRAM cell further includes a transistor coupled to the respective resistor, in series.
- a transistor is typically referred to as a “selection transistor,” or an “enablement transistor” that is configured to enable a conduction path to flow through the coupled resistor.
- the selection transistor 204 is coupled to the resistor 202 , in series.
- the TE 212 is coupled to a BL and is configured to receive the above-mentioned set/reset voltage; a drain of the selection transistor 204 is coupled to the BE 242 , a gate of the selection transistor 204 is coupled to a WL and is configured to receive one or more WL assertion signals so as to enable the corresponding RRAM cell 200 to be accessed, and a source of the transistor 204 is coupled to a SL and is configured to receive the above-mentioned set/reset voltage.
- the transistor 204 is activated (i.e., turned on) by an assertion signal through the WL, and then a voltage with a polarity (e.g., BL is provided with a positive voltage and SL is ground) is applied across the RRAM cell 200 .
- a voltage with a polarity e.g., BL is provided with a positive voltage and SL is ground
- the higher voltage at BL (and TE 212 ) pulls negatively charged oxygen ions 235 from the VRD layer 232 to the capping layer 222 and thus leaves oxygen vacancies 233 within the VRD layer 232 , which allows electron(s) that are present in the BE 242 to travel (hop) from the BE 242 through the VRD and capping layers 232 and 222 , respectively, and ultimately to the TE 212 . Consequently, a conduction path through the VRD layer 232 is “formed.” Before such a conduction path is formed, the resistor 202 remains at the HRS. In some embodiments, upon formation of the conduction path, the resistor 202 transitions from the HRS to the LRS, and a relatively higher magnitude of current flows between the BL and the SL.
- each bit of the array 102 includes two RRAM cells. More specifically, in the illustrated embodiment of FIG. 3A , the bit 300 includes two RRAM cells 302 and 322 that are disposed in parallel with each other.
- the RRAM cells 302 and 322 are each substantially similar to the RRAM cell 200 of FIG. 2A .
- the RRAM cell 302 includes: a variable resistance resistor 304 , and a serially coupled transistor 306 ;
- the RRAM cell 322 includes: a variable resistance resistor 324 , and a serially coupled transistor 326 .
- the RRAM cell 302 is coupled to each of BL 303 , WL 305 and SL 307 via a TE of the resistor 304 , a gate of the transistor 306 and a source of the transistor 306 , respectively; the RRAM cell 322 is coupled to each of BL 323 , WL 325 and SL 327 via a TE of the resistor 324 , a gate of the transistor 326 and a source of the transistor 326 , respectively.
- the BL's 303 and 323 are coupled to the formation circuit 110 through the BL driver 104 .
- the formation circuit 110 includes a current source circuit 310 .
- Such a current source circuit 310 is configured to provide a constant current 310 ′ to the RRAM cells 302 and 322 through respective BL's 303 and 323 .
- the constant current 310 ′ may serve as a “winner-takes-all” current for the RRAM cells 302 and 322 to compete with each other so as to allow the bit 300 to be written as a logical 1 and a logical 0, which will be discussed in further detail below.
- the selections transistors 306 and 326 may be turned on by assertion signals through respective WL's 305 and 325 .
- the assertion signals may be provided by the WL driver 106 .
- the SL's 307 and 327 may be each pulled to ground by the SL driver 108 .
- the RRAM cell may transition from the HRS to the LRS, and when the RRAM cell is not yet formed, the RRAM cell may remain at the HRS.
- most of the applied constant current 310 ′ may flow through the RRAM cell at the LRS based on the principle of the Ohm's Law.
- the RRAM cell 302 now at the LRS
- wins over the RRAM cell 304 still at the HRS
- such an initial “forming” process may be self-terminated upon one of the RRAM cells in each bit transitioning to the LRS.
- the formation circuit 110 may include voltage source circuit (not shown) coupled with a current limiter (not shown).
- the current limiter may be coupled between the voltage source circuit and respectively coupled RRAM cells, e.g., 302 and 322 .
- the voltage source circuit may be configured to provide a formation voltage to the RRAM cells 302 and 322 so as to perform an initial forming process while the current limiter may be configured to concurrently monitor a level of current flowing through either the RRAM cell 302 or RRAM cell 322 based on a pre-determined threshold (e.g., a maximum current level).
- a pre-determined threshold e.g., a maximum current level
- the RRAM cell 302 transitions from the HRS to the LRS. Accordingly, the formation voltage is won by the formed RRAM cell 302 and a current with a relatively large level flows from the voltage source circuit, and through the current limiter and the RRAM cell 302 . In some embodiments, in response to the current limiter detecting such a current with the relatively large level exceeds the pre-determined threshold, the current limiter may terminate the initial forming process.
- the formation circuit 110 may use an included voltage source (e.g., 350 of FIG. 3B ) to provide a first voltage (e.g., about 1 ⁇ 2 V) to both of the SRAM cells 302 and 322 so as to cause the I/O circuit 112 to discriminate which RRAM cell is at the LRS and which RRAM cell is at the HRS.
- an included voltage source e.g., 350 of FIG. 3B
- a first voltage e.g., about 1 ⁇ 2 V
- the I/O circuit 112 may detect a higher current flowing through the RRAM cell 302 (LRS) and a lower current through the RRAM cell 322 (HRS).
- the I/O circuit 112 may monitor voltages present on the respective BL's ( 303 and 323 ) or SL's ( 307 and 327 ). That is, because of the different states (different resistance), at a particular time, the voltage present on the BL 303 or SL 307 may be higher than the voltage present on the BL 323 or SL 327 .
- the I/O circuit 112 may compare the voltages present on the BL's ( 303 and 323 ) or SL's ( 307 and 327 ) with a reference voltage so as to discriminate the respective states of the RRAM cells. Accordingly, the I/O circuit 112 may inform the formation circuit 110 and the authentication circuit 114 of the state that each RRAM cell presents.
- the formation circuit 110 may further apply a second voltage (e.g., about 3V) to the RRAM cell at the LRS.
- the second voltage is substantially higher than the first voltage so as to provide an additional forming process to the RRAM cell at the LRS (e.g., 302 in the above example).
- the provision of such an additional forming process may advantageously provide better data retention.
- the authentication circuit 114 may designate the RRAM cells 302 and 322 with respective logical states. In some embodiments, the authentication circuit 114 may designate the RRAM cell 302 with a logical 1, and the RRAM cell 304 with a logical 0.
- the authentication circuit 114 may designate the RRAM cell 302 with a logical 0, and the RRAM cell 304 with a logical 1.
- the following discussion will use the former designation, i.e., the LRS corresponds to a logical 1 and the HRS corresponds to a logical 0.
- the RRAM cells 302 and 324 of the bit 300 then are each written to a respective bit data (a logical 1 and a logical 0, respectively).
- the authentication circuit 114 may designate the logical states to the RRAM cells of each bit before the second voltage is applied to the RRAM cell in the LRS. As such, the authentication circuit 114 may perform the designation after the authentication circuit 114 is informed of the state that each RRAM cell presents (i.e., right after the first voltage is applied).
- bit 360 is substantially similar to the bit 300 except that the bit 360 further includes a forming detection circuit 390 and RRAM cells of the bit 360 are each coupled to a respective current source circuit, which will be described below.
- the bit 360 includes two RRAM cells 362 and 382 that are disposed in parallel with each other.
- the RRAM cell 362 includes: a variable resistance resistor 364 , and a serially coupled transistor 366 .
- the RRAM cell 382 includes: a variable resistance resistor 384 , and a serially coupled transistor 386 .
- the RRAM cell 362 is also coupled to each of BL 363 , WL 365 and SL 367 via a TE of the resistor 364 , a gate of the transistor 366 and a source of the transistor 366 , respectively.
- the RRAM cell 382 is coupled to each of BL 383 , WL 385 and SL 387 via a TE of the resistor 384 , a gate of the transistor 386 and a source of the transistor 386 , respectively.
- each RRAM cell of the bit 360 is coupled to a respective current source circuit of the formation circuit 110 .
- the RRAM cell 362 is coupled to the current source circuit 312 via the BL 363
- the RRAM cell 382 is coupled to the current source circuit 314 via the BL 383 .
- the forming detection circuit 390 includes two inputs 391 and 393 that are coupled to the RRAM cells 362 and 382 , respectively. More specifically, the input 391 is coupled between a BE of the resistor 364 and a drain of the transistor 366 , and the input 393 is coupled between a BE of the resistor 384 and a drain of the transistor 386 .
- the forming detection circuit 390 includes an output 395 that is coupled to the current source circuits 312 and 314 of the formation circuit 110 .
- each of the current source circuits 312 and 314 is substantially similar to the current source circuit 310 . That is, the current source circuit 312 is configured to provide a constant current 312 ′ to the RRAM cell 362 , and the current source circuit 314 is configured to provide a constant current 314 ′ to the RRAM cell 382 .
- the operation of the bit 360 is substantially similar to the above-described operation of the bit 300 except that the initial forming process in the bit 360 is determined by the forming detection circuit 390 .
- the selections transistors 366 and 386 may be turned on by respective assertion signals through WL's 365 and 385 .
- the assertion signals may be provided by the WL driver 106 .
- the SL's 367 and 387 may be each pulled to ground by the SL driver 108 .
- the constant current 312 ′ and 314 ′ are approximately at a same current level, e.g., about 50 ⁇ 100 ⁇ A.
- one of the RRAM cells for example, the RRAM cell 362 , may be “formed” first. Based on the above-described operation of the RRAM cells, once an RRAM cell is formed, the RRAM cell may transition from the HRS to the LRS, and when the RRAM cell is not yet formed, the RRAM cell may remain at the HRS.
- the forming detection circuit 390 is configured to monitor resistances of the resistors 364 and 384 . Once the forming detection circuit 390 detects a substantial difference of the resistances between the resistors 364 and 384 , the forming detection circuit 390 may cause the current source circuits 312 and 314 to cease providing currents 312 ′ and 314 ′. As such, the initial forming process of one of the RRAM cells (i.e., the cell that transitions to the LRS state) is terminated based on detection of a substantial difference of the resistances.
- the RRAM cells 362 and 382 may be each designated with a respective logical state. Continuing with the above example, the RRAM cells 362 (now at the LRS) is written to a logical 1, and the RRAM cell 382 (still at the HRS) is written to a logical 0.
- the formation circuit 110 may include two voltage source circuits (not shown) coupled to the RRAM cells 362 and 382 , respectively, and further include two current limiters coupled between the respective voltage source circuit and RRAM cell. Functionalities of such voltage source circuits and current limiters are substantially similar to the voltage source circuit and current limiter coupled to the bit 300 so that discussions of operations of the voltage source circuits and current limiters coupled to the bit 360 are omitted.
- each of the plurality of the bits across the array 102 may follow the above-described operations to be written to a logical 1 and a logical 0.
- the authentication circuit 114 may pick either the written logical 1's or the logical 0's to generate an unique and unpredictable PUF signature, which advantageously makes the PUF signature more reliable.
- FIGS. 4A, 4B, and 4C are exemplary circuit diagrams each illustrating part of the array 102 , in accordance with various embodiments of the present disclosure. It is noted that the circuit diagrams of FIGS. 4A-4C are merely examples for purposes of illustration. Thus, any of a variety of other configurations may be used to implement the array 102 while remaining within the scope of the present disclosure.
- the array 102 includes eight bits: 402 , 404 , 406 , 408 , 410 , 412 , 414 , and 416 , wherein each bit includes two RRAM cells. Although only eight bits are shown in FIG. 4A , any desired number of bits may be included in the array 102 while remaining within the scope of the present disclosure.
- the bit 402 includes RRAM cells 402 - 1 and 402 - 2 ; the bit 404 includes RRAM cells 404 - 1 and 404 - 2 ; the bit 404 includes RRAM cells 406 - 1 and 406 - 2 ; the bit 408 includes RRAM cells 408 - 1 and 408 - 2 ; the bit 410 includes RRAM cells 410 - 1 and 410 - 2 ; the bit 412 includes RRAM cells 412 - 1 and 412 - 2 ; the bit 414 includes RRAM cells 414 - 1 and 414 - 2 ; the bit 416 includes RRAM cells 416 - 1 and 416 - 2 .
- each RRAM cell includes a resistor and a transistor that are coupled in series, as shown in the exemplary RRAM cell 200 of FIG. 2A .
- numerals for each RRAM cell's respective resistor and transistor are not shown in FIG. 4A (and FIGS. 4B and 4C ).
- the array 102 further includes BL's: 401 - 1 , 401 - 2 , 401 - 3 , and 401 - 4 , WL's: 403 - 1 , 403 - 2 , 403 - 3 , and 403 - 4 , and SL's: 405 - 1 , 405 - 2 , 405 - 3 , and 405 - 4 .
- the BL's 401 - 1 , 401 - 2 , 401 - 3 , and 401 - 4 are arranged horizontally along the Y direction (e.g., columns), the WL's 403 - 1 , 403 - 2 , 403 - 3 , and 403 - 4 , and SL's 405 - 1 , 405 - 2 , 405 - 3 , and 405 - 4 are respectively arranged horizontally along the X direction (e.g., rows).
- each BL intersects with plural pairs of WL's and SL's, and at each intersection, one RRAM cell is vertically (i.e., along the Z direction) disposed between the common BL and respective SL with the respective WL being disposed between the SL and the common BL.
- the RRAM cells 402 - 1 , 402 - 2 , 410 - 1 , and 410 - 2 are disposed between the intersection of the BL 401 - 1 and the pairs of WL and SL ( 403 - 1 and 405 - 1 ), ( 403 - 2 and 405 - 2 ), ( 403 - 3 and 405 - 3 ), and ( 403 - 4 and 405 - 4 ), respectively.
- the WL 403 - 1 is disposed between the BL 401 - 1 and 405 - 1 ; the WL 403 - 2 is disposed between the BL 401 - 1 and 405 - 2 ; the WL 403 - 3 is disposed between the BL 401 - 1 and 405 - 3 ; the WL 403 - 4 is disposed between the BL 401 - 1 and 405 - 4 .
- FIGS. 4A-4C are merely examples for illustration purpose.
- the BL's ( 401 - 1 , 401 - 2 , 401 - 3 , 401 - 4 , etc.), WL's ( 403 - 1 , 403 - 2 , 403 - 3 , 403 - 4 , etc.), and SL's ( 405 - 1 , 405 - 2 , 405 - 3 , 405 - 4 , etc.) may be laid out in any of a variety of configurations.
- the BL's ( 401 - 1 , 401 - 2 , 401 - 3 , 401 - 4 , etc.) are arranged along the X direction
- the SL's ( 405 - 1 , 405 - 2 , 405 - 3 , 405 - 4 , etc.) are arranged in parallel with the BL's, i.e., also along the X direction
- the WL's 403 - 1 , 403 - 2 , 403 - 3 , 403 - 4 , etc.
- the WL's ( 403 - 1 , 403 - 2 , 403 - 3 , 403 - 4 , etc.) are arranged perpendicularly to the SL's and BL's, i.e., along the Y direction.
- each bit may be written to a logical 1 and a logical 0 by applying a constant current through the respective BL, as described above.
- a constant current is applied to the bits 402 and 410 through the BL 401 - 1 , and then, for example, the RRAM cell 402 - 1 of the bit 402 and the RRAM cell 410 - 2 of the bit 410 are formed (i.e., at the LRS), respectively.
- the state of each RRAM cell is determined by the I/O circuit 112 . In this example of FIG.
- the I/O circuit 112 may determine the state of each RRAM cell by monitoring a voltage present on a respectively coupled SL (e.g., 405 - 1 , 405 - 2 , 405 - 3 , 405 - 4 , etc.). Accordingly, the logical 1's are designated to the RRAM cells 402 - 1 and 410 - 2 , respectively, and the logical 0's are designated to the RRAM cells 402 - 2 and 410 - 1 , respectively.
- the authentication circuit 114 uses either the logical 1's present on the RRAM cells 402 - 1 and 410 - 2 or the logical 0's present on the RRAM cells 402 - 2 and 410 - 1 for generating a PUF signature, or part of the PUF signature.
- FIG. 4B illustrates a substantially similar circuit diagram to FIG. 4A except that bits 418 , 420 , 422 , 424 , 426 , 428 , 430 , and 432 each includes two RRAM cells that are each coupled to a respective and different BL.
- bits 418 , 420 , 422 , 424 , 426 , 428 , 430 , and 432 each includes two RRAM cells that are each coupled to a respective and different BL.
- the numerals of the BL's WL's and SL's in FIG. 4A are continued to be used in FIG. 4B .
- RRAM cells 418 - 1 and 418 - 2 of the bit 418 are each coupled to BL's 401 - 1 and 401 - 2 , respectively, but are coupled to common WL's 403 - 1 and SL's 405 - 1 ;
- RRAM cells 420 - 1 and 420 - 2 of the bit 420 are each coupled to BL's 401 - 1 and 401 - 2 , respectively, but are coupled to common WL's 403 - 2 and SL's 405 - 2 ;
- RRAM cells 422 - 1 and 422 - 2 of the bit 422 are each coupled to BL's 401 - 1 and 401 - 2 , respectively, but are coupled to common WL's 403 - 3 and SL's 405 - 3 ;
- RRAM cells 424 - 1 and 424 - 2 of the bit 424 are each coupled to BL's 401 - 1 and 401 - 2 , respectively, but are
- FIG. 4C illustrates another substantially similar circuit diagram to FIG. 4A except that bits 434 , 436 , 438 , and 440 each includes two RRAM cells that are each coupled to respective and different BL, WL, and SL.
- the RRAM cells 434 - 1 and 434 - 2 of the bit 434 are each coupled to the BL 401 - 1 , WL 403 - 1 , and SL 405 - 1 , and BL 401 - 2 , WL 403 - 2 , and SL 405 - 2 , respectively;
- the RRAM cells 436 - 1 and 436 - 2 of the bit 436 are each coupled to the BL 401 - 1 , WL 403 - 3 , and SL 405 - 3 , and BL 401 - 2 , WL 403 - 4 , and SL 405 - 4 , respectively;
- the RRAM cells 438 - 1 and 438 - 2 of the bit 438 are each
- FIG. 5 illustrates a flow chart of a method 500 to generate a PUF signature using an RRAM array that includes two RRAM cells per bit, in accordance with various embodiments.
- the operations of the method 500 are performed by the respective components illustrated in FIGS. 1-4C .
- the following embodiment of the method 500 will be described in conjunction with FIGS. 1-4C .
- the illustrated embodiment of the method 500 is merely an example. Therefore, it should be understood that any of a variety of operations may be omitted, re-sequenced, and/or added while remaining within the scope of the present disclosure
- the method 500 starts with operation 502 in which an RRAM array wherein each bit of the RRAM array includes two RRAM cells, in accordance with various embodiments.
- an RRAM array may be illustrated as one of the circuit diagrams with respect to FIGS. 4A-4C .
- each bit of the RRAM array is applied with one or more constant currents, in accordance with various embodiments.
- the RRAM cells of the bit 300 are provided with a common constant current.
- the forming process may be self-terminated upon one of the RRAM cells being formed (as the LRS).
- the RRAM cells of the bit 360 are each applied with a respective different constant current. As such, the forming process may be terminated when the forming detection circuit 390 determines a substantial difference presents between the two RRAM cells.
- the method 500 continues to operation 506 in which an I/O circuit coupled to the RRAM array determines which RRAM cell in each bit is formed, in accordance with various embodiments.
- a first voltage (about 1 ⁇ 2V) may be applied, by a formation circuit (e.g., 110 ), to both of the RRAM cells in each bit, and then the I/O circuit (e.g., 112 ) discriminates the states (i.e., HRS and LRS) of the two RRAM cells by monitoring either the currents flowing through the RRAM cells or voltages present on the respectively coupled BL's or SL's.
- the determined states of the RRAM cells in each bit may be provided to the authentication circuit 114 for designation of respective logical states (e.g., a logical 1 or a logical 0).
- the method 500 continues to operation 508 in which a second voltage, substantially higher than the first voltage (the operation 506 ), is applied to the formed RRAM cell of each bit, in accordance with various embodiments. That is, the second voltage is applied to the RRAM cell of each bit that has transitioned from the HRS to the LRS. In some embodiments, the second voltage is about 3 V. Such a substantially higher voltage applied to the formed RRAM cell may advantageously provide better data retention to the formed RRAM cell. In some embodiments, after the second voltage is applied to the formed RRAM cell of each bit, authentication circuit 114 may designate the formed RRAM cell a logical 1 and the unformed RRAM cell a logical 0 (or vice versa).
- the method 500 continues to operation 510 in which the authentication circuit 114 uses either logical 1's or logical 0's across the RRAM array to generate a PUF signature, in accordance with various embodiments.
- the authentication circuit 114 uses either logical 1's or logical 0's across the RRAM array to generate a PUF signature, in accordance with various embodiments.
- the PUF signature generated based on such randomly distributed logical 1's or 0's may be more reliable.
- a memory device in an embodiment, includes a memory array comprising a plurality of bits, wherein each bit comprises two memory cells each having a variable resistance; a formation circuit, coupled to the plurality of bits, and configured to cause a first memory cell of a first bit to be at a low resistance state; and an authentication circuit, coupled to the plurality of bits, configured to designate a logical state to the first memory cell of the first bit and use the logical state of the first memory cell of the first bit to generate a physically unclonable function (PUF) signature.
- PAF physically unclonable function
- a memory device in another embodiment, includes a memory array comprising a plurality of bits, wherein each bit comprises two resistive random access memory (RRAM) cells that each having a variable resistance; a formation circuit, coupled to the plurality of bits, and configured to cause a first RRAM cell of a first bit to be at a low resistance state; and an authentication circuit, coupled to the plurality of bits, configured to designate a logical state to the first RRAM cell of the first bit and use the logical states of the first RRAM cells of the first bit to generate a physically unclonable function (PUF) signature.
- RRAM resistive random access memory
- a memory device includes a memory array comprising a plurality of bits, wherein each bit comprises two memory cells each having a variable resistance; a formation circuit, coupled to the plurality of bits, and configured to cause first and second memory cells of a first bit to transition to a low resistance state and remain at a high resistance state, respectively; and an authentication circuit, coupled to the plurality of bits, configured to designate first and second logical states to the first and second memory cells, respectively, of the first bit, and use either the first or the second logical states of the first bit to generate a physically unclonable function (PUF) signature.
- PAF physically unclonable function
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Chemical & Material Sciences (AREA)
- Materials Engineering (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Static Random-Access Memory (AREA)
- Semiconductor Memories (AREA)
Abstract
Description
- The present application claims priority to U.S. Provisional Patent Application No. 62/427,550, filed on Nov. 29, 2016, which is incorporated by reference herein in its entirety.
- With the increasing use of integrated circuits in electronic devices that provide different types of information for a variety of different applications, there has been an increasing need to adequately protect sensitive and/or critical information that may be stored within an electronic device to limit access to such information to only other devices that have permission to access the information. Some examples of applications include the authentication of devices, protection of confidential information within a device, and securing a communication between two or more devices.
- A physically unclonable function (PUF) is a physical structure generally within an integrated circuit that provides a number of corresponding outputs (e.g., responses) in response to inputs (e.g., challenges/requests) to the PUF. Each PUF provides one or more sets of request-response pairs. An identity of the integrated circuit may be established by such request-response pairs provided by the PUF. With the establishment of the identity, secure communication can be provided between devices. The PUF can also be used for existing authentication purposes to replace the current method of assigning an identity to an electronic device. Since the PUF is based on intrinsic properties of a manufacturing process, the PUF has various advantages over conventional authentication approaches that inscribe an identity on a device that may be mimicked and/or reverse engineered more easily.
- Aspects of the present disclosure are best understood from the following detailed description when read with the accompanying figures. It is noted that various features are not necessarily drawn to scale. In fact, the dimensions of the various features may be arbitrarily increased or reduced for clarity of discussion.
-
FIG. 1 illustrates an exemplary block diagram of a memory device that includes a resistive random access memory (RRAM) array, in accordance with some embodiments. -
FIG. 2A illustrates an exemplary hybrid layout of an RRAM cell in the RRAM array ofFIG. 1 , in accordance with some embodiments. -
FIG. 2B illustrates an exemplary operation of the RRAM cell ofFIG. 2A , in accordance with some embodiments. -
FIG. 3A illustrates an exemplary hybrid layout of a bit in the RRAM array and a part of a formation circuit ofFIG. 1 , in accordance with some embodiments. -
FIG. 3B illustrates an exemplary hybrid layout of the bit of theFIG. 3A and another part of the formation circuit ofFIG. 1 , in accordance with some embodiments. -
FIG. 3C illustrates an exemplary layout of another bit in the RRAM array and yet another part of the formation circuit ofFIG. 1 , in accordance with some embodiments. -
FIG. 4A illustrates an exemplary circuit diagram of the RRAM array ofFIG. 1 , in accordance with some embodiments. -
FIG. 4B illustrates another exemplary circuit diagram of the RRAM array ofFIG. 1 , in accordance with some embodiments. -
FIG. 4C illustrates yet another exemplary circuit diagram of the RRAM array ofFIG. 1 , in accordance with some embodiments. -
FIG. 5 illustrates a flow chart of a method to use the RRAM array ofFIG. 1 to generate a PUF signature, in accordance with some embodiments. - The following disclosure describes various exemplary embodiments for implementing different features of the subject matter. Specific examples of components and arrangements are described below to simplify the present disclosure. These are, of course, merely examples and are not intended to be limiting. For example, it will be understood that when an element is referred to as being “connected to” or “coupled to” another element, it may be directly connected to or coupled to the other element, or one or more intervening elements may be present.
- A physical unclonable function (PUF) is generally used for authentication and secret key storage without requiring secure electrically erasable programmable read-only memory (EEPROMs) (or any of other non-volatile memory) and/or other expensive hardware (e.g., battery-backed static random-access memory). Instead of storing secrets in a digital memory, the PUF derives a secret from physical characteristics of an integrated circuit (IC). The PUF is based on an idea that even though an identical manufacturing process is used to fabricate a plurality of ICs, each IC may be slightly different due to manufacturing variability. PUFs leverage this variability to derive “secret” information that is unique to each of the ICs (e.g., a silicon “biometric”). Generally, such secret information is referred to as a “signature” of the IC. In addition, due to the manufacturing variability that defines the signature, one cannot manufacture two identical ICs even with full knowledge of the IC's design. Various types of variability of an IC can be used to define such a signature such as, for example, gate delay(s), power-on state(s) of a memory device (e.g., a static random-access memory (SRAM) device), and/or any of a variety of physical characteristics of an IC.
- In recent years, unconventional nonvolatile memory (NVM) devices, such as ferroelectric random access memory (FRAM) devices, magnetic random access memory (MRAM) devices, phase-change random access memory (PRAM) devices, and resistive random access memory (RRAM) devices, have emerged. In particular, RRAM devices, which exhibit a switching behavior between a high resistance state and a low resistance state, have various advantages over conventional NVM devices. Such advantages include, for example, compatible fabrication steps with current complementary-metal-oxide-semiconductor (CMOS) technologies, low-cost fabrication, a compact structure, flexible scalability, fast switching, high integration density, etc.
- Generally, an RRAM device, or more particularly an RRAM cell, includes a top electrode (e.g., an anode) and a bottom electrode (e.g., a cathode) with a variable resistance dielectric layer interposed therebetween. In some examples, an RRAM cell may further include a capping layer interposed between the top electrode and the variable resistance dielectric layer thereby causing the RRAM cell to have a bipolar switching behavior. The term “bipolar” as used herein refers to the two voltage polarities of an RRAM cell that exhibits a first conductive behavior with a first polarity of voltage applied across the top and bottom electrodes, and a second conductive behavior with a second polarity (a polarity opposite to the first polarity) of voltage applied across the top and bottom electrodes. In some embodiments, during a write operation to the RRAM cell, a ‘set’ voltage is applied across the top and bottom electrodes to change the variable resistance dielectric layer from a first resistivity (e.g., a high resistance state (HRS)) to a second resistivity (e.g., a low resistance state (LRS)). Similarly, a ‘reset’ voltage (e.g., opposite to the set voltage in polarity) may be applied across the top and bottom electrodes to change the variable resistance dielectric layer from the second resistivity back to the first resistivity, for example, from LRS to HRS. Therefore, the LRS and HRS may correspond to a logical “1” and a logical “0” (or vice versa), respectively.
- The present disclosure provides various embodiments of systems and methods to generate a PUF signature, by an authentication circuit, for an RRAM cell array via utilizing randomly distributed characteristics of plural RRAM cells across the RRAM cell array. More specifically, the RRAM array includes a plurality of RRAM memory bits (hereinafter “bits”), and each bit includes two RRAM cells. By leveraging the above-mentioned manufacturing variability while forming the RRAM cells, in some embodiments, even though two RRAM cells in a single bit are applied with an identical bias condition (e.g., an identical voltage and/or an identical current), these two RRAM cells may still present respective different characteristics such as, for example, respective set voltages, respective reset voltages, etc. The respective different characteristics of the two RRAM cells in a single bit allows the authentication circuit to designate the two RRAM cells as a logical 1 and a logical 0, respectively. Further, corresponding locations (e.g., address of each bit) of the designated logical 1 and logical 0 are randomly distributed (i.e., unpredictable), again because of the manufacturing variability. As such, the authentication circuit may choose either a logical 1 or a logical 0 from each bit to generate a PUF signature. Consequently, such a PUF signature generated by the disclosed authentication circuit may advantageously be more “unpredictable,” and thus more “reliable.”
-
FIG. 1 illustrates an exemplary block diagram of amemory device 100, in accordance with various embodiments. As shown, thememory device 100 includes an RRAM cell array 102 (hereinafter “array”), a bit line (BL)driver 104, a word line (WL)driver 106, a select line (SL)driver 108, aformation circuit 110, an input/output (I/O)circuit 112, anauthentication circuit 114, and acontrol logic circuit 116. - In some embodiments, the
array 102 includes a plurality of bits, and, more specifically, each bit includes two RRAM cells, wherein each bit's respective RRAM cells are substantially similar to each other. In general, as discussed in further detail below with respect toFIGS. 2A and 2B , in addition to the top electrode, the optional capping layer, the variable resistance dielectric layer, and the bottom electrode that form a resistor (with variable resistance), each RRAM cell further includes a transistor coupled, in series, to the resistor. As such, in some embodiments of the present disclosure, each RRAM cell may include three nodes/terminals that are each coupled to a bit line (BL), a word line (WL), and a selector line (SL), respectively. Accordingly, in some embodiments, each bit, comprising two RRAM cells, may include six terminals that are coupled to a first set of BL, WL, and SL, and a second set of BL, WL, and SL, respectively. - As discussed in further detail below with respect to
FIGS. 4A, 4B, and 4C , in some embodiments, the plurality of bits in thearray 102 are arranged in a three-dimensional column-row configuration, wherein thearray 102 includes a plurality of BL's that are arranged along a first horizontal direction (i.e., the column), and pluralities of WL's and SL's that are arranged along a second horizontal direction (i.e., the row) that is perpendicular to the first horizontal direction. Further, each BL intersects with plural pairs of WL's and SL's, and at each intersection, a bit comprising two RRAM cells is disposed vertically between one or more respective BL's and one or more respective SL's (and/or WL's). Various embodiments of the physical configuration of thearray 102 will be discussed in further detail below with respect toFIGS. 4A, 4B, and 4C . - Through the BL's, WL's, and SL's, the bits of the
array 102 are each coupled to theBL driver 104, theWL driver 106, theSL driver 108, respectively. In some embodiments, theBL driver 104 may include one or more multiplexers, switch devices, and/or the like that are each configured to select one or more of the BL's so as to assert respectively coupled bit(s). Similarly, theWL driver 106 and theSL driver 108 may each include one or more multiplexers, switch devices, and/or the like that are each configured to select one or more of the WL's and SL's so as to assert coupled bit(s), respectively. In some embodiments, through the respective BL or BL's, each bit may be further coupled to theformation circuit 110. Theformation circuit 110 may include one or more voltage source circuits and/or current source circuits that are configured to “form” one of the two RRAM cells of the respective bit, which will be discussed in further detail below with respect toFIGS. 3A, 3B, and 3C . - In accordance with various embodiments, each of the bits of the
array 102 may be further coupled to the I/O circuit 112 through respective BL or BL's. The I/O circuit 112 includes a plurality of sensing amplifiers (SA's) that are each configured to “read” a data bit (either a logical 1 or a logical 0) from one or more bits of thearray 102. In some embodiments, such read data bit may be used by theauthentication circuit 114 to generate one or more PUF signatures. Accordingly, theauthentication circuit 114 may include a PUF generator, an error correction circuit, a compiler, etc. - In some embodiments, the
control logic circuit 116 may be coupled to theBL driver 104, theWL driver 106, and theSL driver 108, and is configured to control each of them. For example, thecontrol logic circuit 116 may provide a column address to theBL driver 104 so as to cause theBL driver 104 to assert one or more corresponding bit(s) that are arranged in the column address; thecontrol logic circuit 116 may provide a row address to theWL driver 106 so as to cause theWL driver 106 to provide a WL assertions signal to activate one or more selection transistors that are arranged in the row address; thecontrol logic circuit 116 may provide a selector address to theSL driver 108 so as to cause theSL driver 108 to assert one or more corresponding bit(s) that are arranged in the selector address. -
FIG. 2A illustrates an exemplary structure of anRRAM cell 200 of a bit of the array 102 (FIG. 1 ), in accordance with some embodiments. In the illustrated embodiment ofFIG. 2A , theRRAM cell 200 is implemented as a 1-transistor-1-resistor (1T1R) structure. More specifically, aresistor 202 with variable resistance is serially connected to atransistor 204. However, any of a variety of structures that exhibits the characteristic of variable resistance may be included in the RRAM cell such as, for example, an 1-diode-1-resistor (1D1R) structure, a 1-transistor-many resistors (1T-manyR) structure, a cross-bar structure, an eFuse device, an anti-eFuse device, etc., while remaining within the scope of the present disclosure. - Referring still to
FIG. 2A , theRRAM cell 200 includes aresistor 202 and atransistor 204 coupled to theresistor 202, in series. In some embodiments, theresistor 202 is formed as a multi-layer stack that includes a top electrode (TE) 212, acapping layer 222, a variable resistance dielectric (VRD)layer 232, and a bottom electrode (BE) 242. In some embodiments, theTE 212 may be formed from at least one of the materials selected from: Pt, TiN/Ti, TiN, Ru, Ni, and combinations thereof; thecapping layer 222 may be formed from at least one of the transition metal materials such as, Ti, Ni, Hf, Nb, Co, Fe, Cu, V, Ta, W, Cr, and combinations thereof; theVRD layer 232 may be formed from at least one of the transition metal oxide materials such as, TiOx, NiOx, HfOx, NbOx, CoOx, FeOx, CuOx, VOx, TaOx, WOx, CrOx, and combinations thereof; and theBE 242 may be formed of at least one of the materials selected from: TiN, TaN, W, Pt, and combinations thereof. In some embodiments, theVRD layer 232 may include a high-k dielectric layer. In general, theVRD layer 232 may be formed by deposition, for example, atomic layer deposition (ALD), chemical vapor deposition (CVD), meta-organic chemical vapor deposition (MOCVD), etc., to have a particular thickness and crystalline structure using a particular manufacturing process recipe. Although an identical process recipe may be used to form two or more VRD layers 232 for respective RRAM cells, due to the manufacturing variability, these RRAM cells may not present identical characteristics when compared to one another. - As described above, each RRAM cell further includes a transistor coupled to the respective resistor, in series. In some embodiments, such a transistor is typically referred to as a “selection transistor,” or an “enablement transistor” that is configured to enable a conduction path to flow through the coupled resistor. As shown in
FIG. 2 , theselection transistor 204 is coupled to theresistor 202, in series. Further, in some embodiments, theTE 212 is coupled to a BL and is configured to receive the above-mentioned set/reset voltage; a drain of theselection transistor 204 is coupled to theBE 242, a gate of theselection transistor 204 is coupled to a WL and is configured to receive one or more WL assertion signals so as to enable thecorresponding RRAM cell 200 to be accessed, and a source of thetransistor 204 is coupled to a SL and is configured to receive the above-mentioned set/reset voltage. - Referring now to
FIG. 2B , to operate theRRAM cell 200, thetransistor 204 is activated (i.e., turned on) by an assertion signal through the WL, and then a voltage with a polarity (e.g., BL is provided with a positive voltage and SL is ground) is applied across theRRAM cell 200. As such, the higher voltage at BL (and TE 212) pulls negatively chargedoxygen ions 235 from theVRD layer 232 to thecapping layer 222 and thus leavesoxygen vacancies 233 within theVRD layer 232, which allows electron(s) that are present in theBE 242 to travel (hop) from theBE 242 through the VRD and capping 232 and 222, respectively, and ultimately to thelayers TE 212. Consequently, a conduction path through theVRD layer 232 is “formed.” Before such a conduction path is formed, theresistor 202 remains at the HRS. In some embodiments, upon formation of the conduction path, theresistor 202 transitions from the HRS to the LRS, and a relatively higher magnitude of current flows between the BL and the SL. - Referring now to
FIG. 3A , an exemplary diagram of abit 300 of thearray 102 is illustrated, in accordance with various embodiments. As mentioned above, in some embodiments, each bit of thearray 102 includes two RRAM cells. More specifically, in the illustrated embodiment ofFIG. 3A , thebit 300 includes two 302 and 322 that are disposed in parallel with each other. TheRRAM cells 302 and 322 are each substantially similar to theRRAM cells RRAM cell 200 ofFIG. 2A . As such, theRRAM cell 302 includes: avariable resistance resistor 304, and a serially coupledtransistor 306; theRRAM cell 322 includes: avariable resistance resistor 324, and a serially coupledtransistor 326. TheRRAM cell 302 is coupled to each ofBL 303,WL 305 andSL 307 via a TE of theresistor 304, a gate of thetransistor 306 and a source of thetransistor 306, respectively; theRRAM cell 322 is coupled to each ofBL 323,WL 325 andSL 327 via a TE of theresistor 324, a gate of thetransistor 326 and a source of thetransistor 326, respectively. - In some embodiments, the BL's 303 and 323 are coupled to the
formation circuit 110 through theBL driver 104. As shown, theformation circuit 110 includes acurrent source circuit 310. Such acurrent source circuit 310 is configured to provide a constant current 310′ to the 302 and 322 through respective BL's 303 and 323. In some embodiments, the constant current 310′ may serve as a “winner-takes-all” current for theRRAM cells 302 and 322 to compete with each other so as to allow theRRAM cells bit 300 to be written as a logical 1 and a logical 0, which will be discussed in further detail below. - In some embodiments, before the constant current 310′ is applied to the
302 and 322, theRRAM cells 306 and 326 may be turned on by assertion signals through respective WL's 305 and 325. In some embodiments, the assertion signals may be provided by theselections transistors WL driver 106. Moreover, the SL's 307 and 327 may be each pulled to ground by theSL driver 108. When the constant current 310′ (e.g., about 50˜100 μA) is applied to both of the 302 and 322, due to the above-mentioned manufacturing variability, one of the RRAM cells, for example, theRRAM cells RRAM cell 302, may be “formed” first, as described inFIG. 2B . Based on the above-described operation of the RRAM cells, once an RRAM cell is formed, the RRAM cell may transition from the HRS to the LRS, and when the RRAM cell is not yet formed, the RRAM cell may remain at the HRS. As such, in some embodiments, most of the applied constant current 310′ may flow through the RRAM cell at the LRS based on the principle of the Ohm's Law. Continuing with the above example, consequently, the RRAM cell 302 (now at the LRS) wins over the RRAM cell 304 (still at the HRS) and thus takes most of the current 310′. Accordingly, in some embodiments, such an initial “forming” process may be self-terminated upon one of the RRAM cells in each bit transitioning to the LRS. - In some alternative embodiments, the
formation circuit 110 may include voltage source circuit (not shown) coupled with a current limiter (not shown). The current limiter may be coupled between the voltage source circuit and respectively coupled RRAM cells, e.g., 302 and 322. In such embodiments, the voltage source circuit may be configured to provide a formation voltage to the 302 and 322 so as to perform an initial forming process while the current limiter may be configured to concurrently monitor a level of current flowing through either theRRAM cells RRAM cell 302 orRRAM cell 322 based on a pre-determined threshold (e.g., a maximum current level). As such, when either of the 302 and 322 is formed first, e.g., theRRAM cells RRAM cell 302, theRRAM cell 302 transitions from the HRS to the LRS. Accordingly, the formation voltage is won by the formedRRAM cell 302 and a current with a relatively large level flows from the voltage source circuit, and through the current limiter and theRRAM cell 302. In some embodiments, in response to the current limiter detecting such a current with the relatively large level exceeds the pre-determined threshold, the current limiter may terminate the initial forming process. - Because of the unpredictable nature regarding which of the RRAM cells in a bit will be fainted first, in some embodiments, the
formation circuit 110 may use an included voltage source (e.g., 350 ofFIG. 3B ) to provide a first voltage (e.g., about 1˜2 V) to both of the 302 and 322 so as to cause the I/SRAM cells O circuit 112 to discriminate which RRAM cell is at the LRS and which RRAM cell is at the HRS. More specifically, continuing with the above example, due to the difference of the states (i.e., LRS and HRS) that the 302 and 322 presents, respectively, the I/RRAM cells O circuit 112 may detect a higher current flowing through the RRAM cell 302 (LRS) and a lower current through the RRAM cell 322 (HRS). In alternative embodiments, instead of detecting differences in current magnitudes, the I/O circuit 112 may monitor voltages present on the respective BL's (303 and 323) or SL's (307 and 327). That is, because of the different states (different resistance), at a particular time, the voltage present on theBL 303 orSL 307 may be higher than the voltage present on theBL 323 orSL 327. Yet in some other embodiments, the I/O circuit 112 may compare the voltages present on the BL's (303 and 323) or SL's (307 and 327) with a reference voltage so as to discriminate the respective states of the RRAM cells. Accordingly, the I/O circuit 112 may inform theformation circuit 110 and theauthentication circuit 114 of the state that each RRAM cell presents. - Subsequently, in some embodiments, the
formation circuit 110 may further apply a second voltage (e.g., about 3V) to the RRAM cell at the LRS. The second voltage is substantially higher than the first voltage so as to provide an additional forming process to the RRAM cell at the LRS (e.g., 302 in the above example). In some embodiments, the provision of such an additional forming process may advantageously provide better data retention. And accordingly, theauthentication circuit 114 may designate the 302 and 322 with respective logical states. In some embodiments, theRRAM cells authentication circuit 114 may designate theRRAM cell 302 with a logical 1, and theRRAM cell 304 with a logical 0. In some other embodiments, theauthentication circuit 114 may designate theRRAM cell 302 with a logical 0, and theRRAM cell 304 with a logical 1. The following discussion will use the former designation, i.e., the LRS corresponds to a logical 1 and the HRS corresponds to a logical 0. As such, the 302 and 324 of theRRAM cells bit 300 then are each written to a respective bit data (a logical 1 and a logical 0, respectively). - Additionally or alternatively, in some embodiments, the
authentication circuit 114 may designate the logical states to the RRAM cells of each bit before the second voltage is applied to the RRAM cell in the LRS. As such, theauthentication circuit 114 may perform the designation after theauthentication circuit 114 is informed of the state that each RRAM cell presents (i.e., right after the first voltage is applied). - Referring now to
FIG. 3C , another exemplary diagram of abit 360 of thearray 102 is illustrated, in accordance with various embodiments. Thebit 360 is substantially similar to thebit 300 except that thebit 360 further includes a formingdetection circuit 390 and RRAM cells of thebit 360 are each coupled to a respective current source circuit, which will be described below. For example, in the illustrated embodiment ofFIG. 3C , thebit 360 includes two 362 and 382 that are disposed in parallel with each other. TheRRAM cells RRAM cell 362 includes: avariable resistance resistor 364, and a serially coupledtransistor 366. Similarly, theRRAM cell 382 includes: avariable resistance resistor 384, and a serially coupledtransistor 386. TheRRAM cell 362 is also coupled to each ofBL 363,WL 365 andSL 367 via a TE of theresistor 364, a gate of thetransistor 366 and a source of thetransistor 366, respectively. Similarly, theRRAM cell 382 is coupled to each ofBL 383,WL 385 andSL 387 via a TE of theresistor 384, a gate of thetransistor 386 and a source of thetransistor 386, respectively. - Different from the
bit 300 ofFIG. 3A , in some embodiments, each RRAM cell of thebit 360 is coupled to a respective current source circuit of theformation circuit 110. As shown, theRRAM cell 362 is coupled to thecurrent source circuit 312 via theBL 363, and theRRAM cell 382 is coupled to thecurrent source circuit 314 via theBL 383. In some embodiments, the formingdetection circuit 390 includes two 391 and 393 that are coupled to theinputs 362 and 382, respectively. More specifically, theRRAM cells input 391 is coupled between a BE of theresistor 364 and a drain of thetransistor 366, and theinput 393 is coupled between a BE of theresistor 384 and a drain of thetransistor 386. The formingdetection circuit 390 includes anoutput 395 that is coupled to the 312 and 314 of thecurrent source circuits formation circuit 110. In some embodiments, each of the 312 and 314 is substantially similar to thecurrent source circuits current source circuit 310. That is, thecurrent source circuit 312 is configured to provide a constant current 312′ to theRRAM cell 362, and thecurrent source circuit 314 is configured to provide a constant current 314′ to theRRAM cell 382. - In some embodiments, the operation of the
bit 360 is substantially similar to the above-described operation of thebit 300 except that the initial forming process in thebit 360 is determined by the formingdetection circuit 390. Similarly, before theconstant currents 312′ and 314′ are each applied to the 362 and 382, theRRAM cells 366 and 386 may be turned on by respective assertion signals through WL's 365 and 385. In some embodiments, the assertion signals may be provided by theselections transistors WL driver 106. Moreover, the SL's 367 and 387 may be each pulled to ground by theSL driver 108. In some embodiments, the constant current 312′ and 314′ are approximately at a same current level, e.g., about 50˜100 μA. When theconstant currents 312′ and 314′ are each applied to the 362 and 382, due to the above-mentioned manufacturing variances, one of the RRAM cells, for example, theRRAM cells RRAM cell 362, may be “formed” first. Based on the above-described operation of the RRAM cells, once an RRAM cell is formed, the RRAM cell may transition from the HRS to the LRS, and when the RRAM cell is not yet formed, the RRAM cell may remain at the HRS. - In some embodiments, the forming
detection circuit 390 is configured to monitor resistances of the 364 and 384. Once the formingresistors detection circuit 390 detects a substantial difference of the resistances between the 364 and 384, the formingresistors detection circuit 390 may cause the 312 and 314 to cease providingcurrent source circuits currents 312′ and 314′. As such, the initial forming process of one of the RRAM cells (i.e., the cell that transitions to the LRS state) is terminated based on detection of a substantial difference of the resistances. Following similar operations as described above (i.e., a first voltage is each applied to the 362 and 382 so as to allow the I/RRAM cells O circuit 112 to discriminate which RRAM cell is at the LRS and which RRAM cell is at the HRS, and a second voltage is applied to the RRAM cell at the LRS for better data retention), the 362 and 382 may be each designated with a respective logical state. Continuing with the above example, the RRAM cells 362 (now at the LRS) is written to a logical 1, and the RRAM cell 382 (still at the HRS) is written to a logical 0.RRAM cells - Similarly, in some alternative embodiments, the
formation circuit 110 may include two voltage source circuits (not shown) coupled to the 362 and 382, respectively, and further include two current limiters coupled between the respective voltage source circuit and RRAM cell. Functionalities of such voltage source circuits and current limiters are substantially similar to the voltage source circuit and current limiter coupled to theRRAM cells bit 300 so that discussions of operations of the voltage source circuits and current limiters coupled to thebit 360 are omitted. - In some embodiments, each of the plurality of the bits across the
array 102 may follow the above-described operations to be written to a logical 1 and a logical 0. To recap, due to the unpredictable nature of the initial forming process, one cannot predict which of the RRAM cells in each bit will be formed first, that is, which RRAM cell will be written to a logical 1. As such, the logical 1's and the logical 0's are randomly distributed across thearray 102. In accordance with some embodiments of the present disclosure, the authentication circuit 114 (FIG. 1 ) may pick either the written logical 1's or the logical 0's to generate an unique and unpredictable PUF signature, which advantageously makes the PUF signature more reliable. - As mentioned above, the plurality of bits across the
array 102 is arranged in a three-dimensional column-row configuration.FIGS. 4A, 4B, and 4C are exemplary circuit diagrams each illustrating part of thearray 102, in accordance with various embodiments of the present disclosure. It is noted that the circuit diagrams ofFIGS. 4A-4C are merely examples for purposes of illustration. Thus, any of a variety of other configurations may be used to implement thearray 102 while remaining within the scope of the present disclosure. - Referring now to
FIG. 4A , thearray 102 includes eight bits: 402, 404, 406, 408, 410, 412, 414, and 416, wherein each bit includes two RRAM cells. Although only eight bits are shown inFIG. 4A , any desired number of bits may be included in thearray 102 while remaining within the scope of the present disclosure. Thebit 402 includes RRAM cells 402-1 and 402-2; thebit 404 includes RRAM cells 404-1 and 404-2; thebit 404 includes RRAM cells 406-1 and 406-2; thebit 408 includes RRAM cells 408-1 and 408-2; thebit 410 includes RRAM cells 410-1 and 410-2; thebit 412 includes RRAM cells 412-1 and 412-2; thebit 414 includes RRAM cells 414-1 and 414-2; thebit 416 includes RRAM cells 416-1 and 416-2. More specifically, each RRAM cell includes a resistor and a transistor that are coupled in series, as shown in theexemplary RRAM cell 200 ofFIG. 2A . For clarity, numerals for each RRAM cell's respective resistor and transistor are not shown inFIG. 4A (andFIGS. 4B and 4C ). - As shown, the
array 102 further includes BL's: 401-1, 401-2, 401-3, and 401-4, WL's: 403-1, 403-2, 403-3, and 403-4, and SL's: 405-1, 405-2, 405-3, and 405-4. In some embodiments, the BL's 401-1, 401-2, 401-3, and 401-4 are arranged horizontally along the Y direction (e.g., columns), the WL's 403-1, 403-2, 403-3, and 403-4, and SL's 405-1, 405-2, 405-3, and 405-4 are respectively arranged horizontally along the X direction (e.g., rows). Moreover, each BL intersects with plural pairs of WL's and SL's, and at each intersection, one RRAM cell is vertically (i.e., along the Z direction) disposed between the common BL and respective SL with the respective WL being disposed between the SL and the common BL. For example, the RRAM cells 402-1, 402-2, 410-1, and 410-2 are disposed between the intersection of the BL 401-1 and the pairs of WL and SL (403-1 and 405-1), (403-2 and 405-2), (403-3 and 405-3), and (403-4 and 405-4), respectively. Further, the WL 403-1 is disposed between the BL 401-1 and 405-1; the WL 403-2 is disposed between the BL 401-1 and 405-2; the WL 403-3 is disposed between the BL 401-1 and 405-3; the WL 403-4 is disposed between the BL 401-1 and 405-4. - However, it is understood that the illustrated embodiments of
FIGS. 4A-4C are merely examples for illustration purpose. The BL's (401-1, 401-2, 401-3, 401-4, etc.), WL's (403-1, 403-2, 403-3, 403-4, etc.), and SL's (405-1, 405-2, 405-3, 405-4, etc.) may be laid out in any of a variety of configurations. For example, in some embodiments, the BL's (401-1, 401-2, 401-3, 401-4, etc.) are arranged along the X direction, the SL's (405-1, 405-2, 405-3, 405-4, etc.) are arranged in parallel with the BL's, i.e., also along the X direction, and the WL's (403-1, 403-2, 403-3, 403-4, etc.) are arranged perpendicularly to the SL's and BL's, i.e., along the Y direction. - In some embodiments, when the bits of the
array 102 arranged as the embodiment ofFIG. 4A , each bit may be written to a logical 1 and a logical 0 by applying a constant current through the respective BL, as described above. For example, a constant current is applied to the 402 and 410 through the BL 401-1, and then, for example, the RRAM cell 402-1 of thebits bit 402 and the RRAM cell 410-2 of thebit 410 are formed (i.e., at the LRS), respectively. Subsequently, following the operation described with respect toFIG. 3B , the state of each RRAM cell is determined by the I/O circuit 112. In this example ofFIG. 4A , in some embodiments, the I/O circuit 112 may determine the state of each RRAM cell by monitoring a voltage present on a respectively coupled SL (e.g., 405-1, 405-2, 405-3, 405-4, etc.). Accordingly, the logical 1's are designated to the RRAM cells 402-1 and 410-2, respectively, and the logical 0's are designated to the RRAM cells 402-2 and 410-1, respectively. Consequently, theauthentication circuit 114 then uses either the logical 1's present on the RRAM cells 402-1 and 410-2 or the logical 0's present on the RRAM cells 402-2 and 410-1 for generating a PUF signature, or part of the PUF signature. -
FIG. 4B illustrates a substantially similar circuit diagram toFIG. 4A except that 418, 420, 422, 424, 426, 428, 430, and 432 each includes two RRAM cells that are each coupled to a respective and different BL. Thus, for purpose of clarity, the numerals of the BL's WL's and SL's inbits FIG. 4A are continued to be used inFIG. 4B . More specifically, RRAM cells 418-1 and 418-2 of the bit 418 are each coupled to BL's 401-1 and 401-2, respectively, but are coupled to common WL's 403-1 and SL's 405-1; RRAM cells 420-1 and 420-2 of the bit 420 are each coupled to BL's 401-1 and 401-2, respectively, but are coupled to common WL's 403-2 and SL's 405-2; RRAM cells 422-1 and 422-2 of the bit 422 are each coupled to BL's 401-1 and 401-2, respectively, but are coupled to common WL's 403-3 and SL's 405-3; RRAM cells 424-1 and 424-2 of the bit 424 are each coupled to BL's 401-1 and 401-2, respectively, but are coupled to common WL's 403-4 and SL's 405-4; RRAM cells 426-1 and 426-2 of the bit 426 are each coupled to BL's 401-3 and 401-4, respectively, but are coupled to common WL's 403-1 and SL's 405-1; RRAM cells 428-1 and 428-2 of the bit 428 are each coupled to BL's 401-3 and 401-4, respectively, but are coupled to common WL's 403-2 and SL's 405-2; RRAM cells 430-1 and 430-2 of the bit 430 are each coupled to BL's 401-3 and 401-4, respectively, but are coupled to common WL's 403-3 and SL's 405-3; RRAM cells 432-1 and 432-2 of the bit 432 are each coupled to BL's 401-3 and 401-4, respectively, but are coupled to common WL's 403-4 and SL's 405-4. -
FIG. 4C illustrates another substantially similar circuit diagram toFIG. 4A except that 434, 436, 438, and 440 each includes two RRAM cells that are each coupled to respective and different BL, WL, and SL. For example, the RRAM cells 434-1 and 434-2 of thebits bit 434 are each coupled to the BL 401-1, WL 403-1, and SL 405-1, and BL 401-2, WL 403-2, and SL 405-2, respectively; the RRAM cells 436-1 and 436-2 of thebit 436 are each coupled to the BL 401-1, WL 403-3, and SL 405-3, and BL 401-2, WL 403-4, and SL 405-4, respectively; the RRAM cells 438-1 and 438-2 of thebit 438 are each coupled to the BL 401-3, WL 403-1, and SL 405-1, and BL 401-4, WL 403-2, and SL 405-2, respectively; the RRAM cells 440-1 and 440-2 of thebit 440 are each coupled to the BL 401-3, WL 403-3, and SL 405-3, and BL 401-4, WL 403-4, and SL 405-4, respectively. -
FIG. 5 illustrates a flow chart of amethod 500 to generate a PUF signature using an RRAM array that includes two RRAM cells per bit, in accordance with various embodiments. In various embodiments, the operations of themethod 500 are performed by the respective components illustrated inFIGS. 1-4C . For purposes of discussion, the following embodiment of themethod 500 will be described in conjunction withFIGS. 1-4C . The illustrated embodiment of themethod 500 is merely an example. Therefore, it should be understood that any of a variety of operations may be omitted, re-sequenced, and/or added while remaining within the scope of the present disclosure - The
method 500 starts withoperation 502 in which an RRAM array wherein each bit of the RRAM array includes two RRAM cells, in accordance with various embodiments. Such an RRAM array may be illustrated as one of the circuit diagrams with respect toFIGS. 4A-4C . - The
method 500 continues tooperation 504 in which each bit of the RRAM array is applied with one or more constant currents, in accordance with various embodiments. In the illustrated embodiment ofFIG. 3A , for example, the RRAM cells of thebit 300 are provided with a common constant current. As such, the forming process may be self-terminated upon one of the RRAM cells being formed (as the LRS). In the illustrated embodiment ofFIG. 3C , for example, the RRAM cells of thebit 360 are each applied with a respective different constant current. As such, the forming process may be terminated when the formingdetection circuit 390 determines a substantial difference presents between the two RRAM cells. - The
method 500 continues tooperation 506 in which an I/O circuit coupled to the RRAM array determines which RRAM cell in each bit is formed, in accordance with various embodiments. In some embodiments, a first voltage (about 1˜2V) may be applied, by a formation circuit (e.g., 110), to both of the RRAM cells in each bit, and then the I/O circuit (e.g., 112) discriminates the states (i.e., HRS and LRS) of the two RRAM cells by monitoring either the currents flowing through the RRAM cells or voltages present on the respectively coupled BL's or SL's. In some embodiments, during theoperation 506, the determined states of the RRAM cells in each bit may be provided to theauthentication circuit 114 for designation of respective logical states (e.g., a logical 1 or a logical 0). - The
method 500 continues tooperation 508 in which a second voltage, substantially higher than the first voltage (the operation 506), is applied to the formed RRAM cell of each bit, in accordance with various embodiments. That is, the second voltage is applied to the RRAM cell of each bit that has transitioned from the HRS to the LRS. In some embodiments, the second voltage is about 3 V. Such a substantially higher voltage applied to the formed RRAM cell may advantageously provide better data retention to the formed RRAM cell. In some embodiments, after the second voltage is applied to the formed RRAM cell of each bit,authentication circuit 114 may designate the formed RRAM cell a logical 1 and the unformed RRAM cell a logical 0 (or vice versa). - The
method 500 continues tooperation 510 in which theauthentication circuit 114 uses either logical 1's or logical 0's across the RRAM array to generate a PUF signature, in accordance with various embodiments. As described above, since the logical 1's and 0's are randomly distributed across the RRAM array, the PUF signature generated based on such randomly distributed logical 1's or 0's may be more reliable. - In an embodiment, a memory device is disclosed. The memory device includes a memory array comprising a plurality of bits, wherein each bit comprises two memory cells each having a variable resistance; a formation circuit, coupled to the plurality of bits, and configured to cause a first memory cell of a first bit to be at a low resistance state; and an authentication circuit, coupled to the plurality of bits, configured to designate a logical state to the first memory cell of the first bit and use the logical state of the first memory cell of the first bit to generate a physically unclonable function (PUF) signature.
- In another embodiment, a memory device includes a memory array comprising a plurality of bits, wherein each bit comprises two resistive random access memory (RRAM) cells that each having a variable resistance; a formation circuit, coupled to the plurality of bits, and configured to cause a first RRAM cell of a first bit to be at a low resistance state; and an authentication circuit, coupled to the plurality of bits, configured to designate a logical state to the first RRAM cell of the first bit and use the logical states of the first RRAM cells of the first bit to generate a physically unclonable function (PUF) signature.
- Yet in another embodiment, a memory device includes a memory array comprising a plurality of bits, wherein each bit comprises two memory cells each having a variable resistance; a formation circuit, coupled to the plurality of bits, and configured to cause first and second memory cells of a first bit to transition to a low resistance state and remain at a high resistance state, respectively; and an authentication circuit, coupled to the plurality of bits, configured to designate first and second logical states to the first and second memory cells, respectively, of the first bit, and use either the first or the second logical states of the first bit to generate a physically unclonable function (PUF) signature.
- The foregoing outlines features of several embodiments so that those ordinary skilled in the art may better understand the aspects of the present disclosure. Those skilled in the art should appreciate that they may readily use the present disclosure as a basis for designing or modifying other processes and structures for carrying out the same purposes and/or achieving the same advantages of the embodiments introduced herein. Those skilled in the art should also realize that such equivalent constructions do not depart from the spirit and scope of the present disclosure, and that they may make various changes, substitutions, and alterations herein without departing from the spirit and scope of the present disclosure.
Claims (20)
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/435,082 US9997244B1 (en) | 2016-11-29 | 2017-02-16 | RRAM-based authentication circuit |
| TW106136562A TW201833922A (en) | 2016-11-29 | 2017-10-24 | Resistive random access memory based authentication circuit |
| CN201711033999.XA CN108122579A (en) | 2016-11-29 | 2017-10-30 | Authentication circuit based on resistance random access memory |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201662427550P | 2016-11-29 | 2016-11-29 | |
| US15/435,082 US9997244B1 (en) | 2016-11-29 | 2017-02-16 | RRAM-based authentication circuit |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20180151224A1 true US20180151224A1 (en) | 2018-05-31 |
| US9997244B1 US9997244B1 (en) | 2018-06-12 |
Family
ID=62190991
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/435,082 Active US9997244B1 (en) | 2016-11-29 | 2017-02-16 | RRAM-based authentication circuit |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US9997244B1 (en) |
| CN (1) | CN108122579A (en) |
| TW (1) | TW201833922A (en) |
Cited By (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180102907A1 (en) * | 2016-10-07 | 2018-04-12 | Taiwan Semiconductor Manufacturing Co., Ltd. | Sram-based authentication circuit |
| US20190080753A1 (en) * | 2017-09-11 | 2019-03-14 | Silicon Storage Technology, Inc. | Architectures and Layouts for an Array Of Resistive Random Access Memory Cells and Read and Write Methods Thereof |
| CN109817261A (en) * | 2019-01-17 | 2019-05-28 | 北京大学深圳研究生院 | A kind of PUF circuit and its control method based on resistive formula memory |
| US20190173008A1 (en) * | 2017-01-24 | 2019-06-06 | Arm Limited | Methods and processes for forming devices from correlated electron material (cem) |
| US20190229933A1 (en) * | 2018-01-23 | 2019-07-25 | Qualcomm Incorporated | Compact and reliable physical unclonable function devices and methods |
| TWI761140B (en) * | 2021-03-18 | 2022-04-11 | 旺宏電子股份有限公司 | Memmory chip |
| US11409915B2 (en) * | 2018-06-26 | 2022-08-09 | Taiwan Semiconductor Manufacturing Co., Ltd. | Method and apparatus for protecting a PUF generator |
| US20220310537A1 (en) * | 2021-03-25 | 2022-09-29 | Taiwan Semiconductor Manufacturing Company, Ltd. | Semiconductor memory devices and methods of manufacturing thereof |
| KR102467915B1 (en) * | 2021-05-17 | 2022-11-17 | 한국전자통신연구원 | Apparatus and Method for Gaussian Sampling based on Resistance Random Access Memory |
| US20220374302A1 (en) * | 2021-05-20 | 2022-11-24 | Electronics And Telecommunications Research Institute | Method for generating gaussian error data using flash memory and apparatus using the same |
Families Citing this family (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11416416B2 (en) | 2019-01-13 | 2022-08-16 | Ememory Technology Inc. | Random code generator with non-volatile memory |
| CN112086115B (en) * | 2019-06-14 | 2023-03-28 | 力旺电子股份有限公司 | Memory system |
| US11031779B2 (en) | 2019-06-14 | 2021-06-08 | Ememory Technology Inc. | Memory system with a random bit block |
| CN110706727B (en) * | 2019-09-30 | 2021-09-10 | 湖南大学 | Magnetic random access memory and STT MARM-based reconfigurable PUF method |
| US11521980B2 (en) | 2019-11-14 | 2022-12-06 | Ememory Technology Inc. | Read-only memory cell and associated memory cell array |
| CN112802519B (en) * | 2019-11-14 | 2024-07-19 | 力旺电子股份有限公司 | Random bit circuit |
| US11501023B2 (en) | 2020-04-30 | 2022-11-15 | International Business Machines Corporation | Secure chip identification using resistive processing unit as a physically unclonable function |
| CN113096709B (en) * | 2021-03-12 | 2022-03-29 | 华中科技大学 | A kind of physical unclonable function circuit and its operation method |
| TW202243109A (en) * | 2021-04-26 | 2022-11-01 | 華邦電子股份有限公司 | Semiconductor structure |
| CN115332184A (en) * | 2021-05-11 | 2022-11-11 | 华邦电子股份有限公司 | Semiconductor structure |
| US20230047939A1 (en) | 2021-08-13 | 2023-02-16 | Ememory Technology Inc. | Fuse-type one time programming memory cell |
| US11864474B2 (en) | 2022-03-17 | 2024-01-02 | International Business Machines Corporation | ReRAM analog PUF using filament location |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120140545A1 (en) * | 2010-12-07 | 2012-06-07 | Samsung Electronics Co., Ltd. | Semiconductor device and method of sensing data of the semiconductor device |
| US20120182786A1 (en) * | 2011-01-13 | 2012-07-19 | Samsung Electronics Co., Ltd. | Bidirectional resistive memory devices using selective read voltage polarity |
| US20140268994A1 (en) * | 2013-03-14 | 2014-09-18 | United States Of America As Represented By The Secretary Of The Air Force | Write-Time Based Memristive Physical Unclonable Function |
| US20140293674A1 (en) * | 2013-04-02 | 2014-10-02 | Micron Technology, Inc. | RRAM, and Methods of Storing and Retrieving Information for RRAM |
| US20150109849A1 (en) * | 2013-10-23 | 2015-04-23 | Taiwan Semiconductor Manufacturing Company Limited | Device and method for setting resistive random access memory cell |
| US20150364187A1 (en) * | 2014-06-17 | 2015-12-17 | Chan-kyung Kim | On-chip resistance measurement circuit and resistive memory device including the same |
| US20160276027A1 (en) * | 2015-03-20 | 2016-09-22 | Winbond Electronics Corp. | Resistive memory and data writing method for memory cell thereof |
Family Cites Families (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9847478B2 (en) | 2012-03-09 | 2017-12-19 | Taiwan Semiconductor Manufacturing Company, Ltd. | Methods and apparatus for resistive random access memory (RRAM) |
| US8593854B1 (en) | 2012-05-21 | 2013-11-26 | Taiwan Semiconductor Manufacturing Co., Ltd. | Structure and method for forming conductive path in resistive random-access memory device |
| US9053781B2 (en) | 2012-06-15 | 2015-06-09 | Taiwan Semiconductor Manufacturing Company, Ltd. | Structure and method for a forming free resistive random access memory with multi-level cell |
| US9019743B2 (en) | 2012-11-29 | 2015-04-28 | Taiwan Semiconductor Manufacturing Company, Ltd. | Method and structure for resistive switching random access memory with high reliable and high density |
| US9431604B2 (en) | 2012-12-14 | 2016-08-30 | Taiwan Semiconductor Manufacturing Company, Ltd. | Resistive random access memory (RRAM) and method of making |
| US9023699B2 (en) | 2012-12-20 | 2015-05-05 | Taiwan Semiconductor Manufacturing Company, Ltd. | Resistive random access memory (RRAM) structure and method of making the RRAM structure |
| US9331277B2 (en) | 2013-01-21 | 2016-05-03 | Taiwan Semiconductor Manufacturing Company, Ltd. | One transistor and one resistive random access memory (RRAM) structure with spacer |
| US8869436B2 (en) | 2013-02-27 | 2014-10-28 | Taiwan Semiconductor Manufacturing Company, Ltd. | Resistive switching random access memory structure and method to recreate filament and recover resistance window |
| US9478638B2 (en) | 2013-03-12 | 2016-10-25 | Taiwan Semiconductor Manufacturing Company, Ltd. | Resistive switching random access memory with asymmetric source and drain |
| US9312482B2 (en) | 2013-03-15 | 2016-04-12 | Taiwan Semiconductor Manufacturing Company, Ltd. | Resistance variable memory structure and method of forming the same |
| US9299927B2 (en) | 2013-08-16 | 2016-03-29 | Taiwan Semiconductor Manufacturing Company, Ltd. | Memory cell having resistance variable film and method of making the same |
| US9286973B2 (en) | 2013-09-24 | 2016-03-15 | Taiwan Semiconductor Manufacturing Company Limited | Device and method for forming resistive random access memory cell |
| US9076522B2 (en) | 2013-09-30 | 2015-07-07 | Taiwan Semiconductor Manufacturing Co., Ltd. | Memory cells breakdown protection |
| US9286974B2 (en) | 2013-10-23 | 2016-03-15 | Taiwan Semiconductor Manufacturing Co., Ltd. | Memory devices |
| US9153343B2 (en) | 2013-11-13 | 2015-10-06 | Taiwan Semiconductor Manufacturing Co., Ltd. | Memory device having RRAM-based non-volatile storage array |
| US9275732B2 (en) | 2013-12-13 | 2016-03-01 | Taiwan Semiconductor Manufacturing Company Ltd. | Write buffer for resistive random access memory |
| US9196360B2 (en) | 2014-01-22 | 2015-11-24 | Taiwan Semiconductor Manufacturing Co., Ltd. | Operating resistive memory cell |
| US9330746B2 (en) | 2014-03-19 | 2016-05-03 | Taiwan Semiconductor Manufacturing Co., Ltd. | Resistive memory array |
| US20150380063A1 (en) | 2014-06-29 | 2015-12-31 | Taiwan Semiconductor Manufacturing Company Limited | Semiconductor arrangement and methods of use |
| US9224470B1 (en) | 2014-08-05 | 2015-12-29 | Taiwan Semiconductor Manufacturing Company, Ltd. | Memory circuit and method of programming memory circuit |
-
2017
- 2017-02-16 US US15/435,082 patent/US9997244B1/en active Active
- 2017-10-24 TW TW106136562A patent/TW201833922A/en unknown
- 2017-10-30 CN CN201711033999.XA patent/CN108122579A/en active Pending
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120140545A1 (en) * | 2010-12-07 | 2012-06-07 | Samsung Electronics Co., Ltd. | Semiconductor device and method of sensing data of the semiconductor device |
| US20120182786A1 (en) * | 2011-01-13 | 2012-07-19 | Samsung Electronics Co., Ltd. | Bidirectional resistive memory devices using selective read voltage polarity |
| US20140268994A1 (en) * | 2013-03-14 | 2014-09-18 | United States Of America As Represented By The Secretary Of The Air Force | Write-Time Based Memristive Physical Unclonable Function |
| US20140293674A1 (en) * | 2013-04-02 | 2014-10-02 | Micron Technology, Inc. | RRAM, and Methods of Storing and Retrieving Information for RRAM |
| US20150109849A1 (en) * | 2013-10-23 | 2015-04-23 | Taiwan Semiconductor Manufacturing Company Limited | Device and method for setting resistive random access memory cell |
| US20150364187A1 (en) * | 2014-06-17 | 2015-12-17 | Chan-kyung Kim | On-chip resistance measurement circuit and resistive memory device including the same |
| US20160276027A1 (en) * | 2015-03-20 | 2016-09-22 | Winbond Electronics Corp. | Resistive memory and data writing method for memory cell thereof |
Cited By (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10880103B2 (en) * | 2016-10-07 | 2020-12-29 | Taiwan Semiconductor Manufacturing Co., Ltd. | SRAM-based authentication circuit |
| US10439827B2 (en) * | 2016-10-07 | 2019-10-08 | Taiwan Semiconductor Manufacturing Co., Ltd. | SRAM-based authentication circuit |
| US20180102907A1 (en) * | 2016-10-07 | 2018-04-12 | Taiwan Semiconductor Manufacturing Co., Ltd. | Sram-based authentication circuit |
| US20200044873A1 (en) * | 2016-10-07 | 2020-02-06 | Taiwan Semiconductor Manufacturing Co., Ltd. | Sram-based authentication circuit |
| US10707415B2 (en) * | 2017-01-24 | 2020-07-07 | Arm Limited | Methods and processes for forming devices from correlated electron material (CEM) |
| US20190173008A1 (en) * | 2017-01-24 | 2019-06-06 | Arm Limited | Methods and processes for forming devices from correlated electron material (cem) |
| US10755779B2 (en) * | 2017-09-11 | 2020-08-25 | Silicon Storage Technology, Inc. | Architectures and layouts for an array of resistive random access memory cells and read and write methods thereof |
| US20190080753A1 (en) * | 2017-09-11 | 2019-03-14 | Silicon Storage Technology, Inc. | Architectures and Layouts for an Array Of Resistive Random Access Memory Cells and Read and Write Methods Thereof |
| US11646078B2 (en) | 2017-09-11 | 2023-05-09 | Silicon Storage Technology, Inc. | Set-while-verify circuit and reset-while verify circuit for resistive random access memory cells |
| US10615988B2 (en) * | 2018-01-23 | 2020-04-07 | Qualcomm Incorporated | Compact and reliable physical unclonable function devices and methods |
| US20190229933A1 (en) * | 2018-01-23 | 2019-07-25 | Qualcomm Incorporated | Compact and reliable physical unclonable function devices and methods |
| US11899828B2 (en) | 2018-06-26 | 2024-02-13 | Taiwan Semiconductor Manufacturing Co., Ltd. | Method and apparatus for protecting a PUF generator |
| US11409915B2 (en) * | 2018-06-26 | 2022-08-09 | Taiwan Semiconductor Manufacturing Co., Ltd. | Method and apparatus for protecting a PUF generator |
| US12236001B2 (en) * | 2018-06-26 | 2025-02-25 | Taiwan Semiconductor Manufacturing Co., Ltd. | Method and apparatus for protecting a PUF generator |
| US20240202374A1 (en) * | 2018-06-26 | 2024-06-20 | Taiwan Semiconductor Manufacturing Co., Ltd. | Method and apparatus for protecting a puf generator |
| CN109817261A (en) * | 2019-01-17 | 2019-05-28 | 北京大学深圳研究生院 | A kind of PUF circuit and its control method based on resistive formula memory |
| TWI761140B (en) * | 2021-03-18 | 2022-04-11 | 旺宏電子股份有限公司 | Memmory chip |
| US20220310537A1 (en) * | 2021-03-25 | 2022-09-29 | Taiwan Semiconductor Manufacturing Company, Ltd. | Semiconductor memory devices and methods of manufacturing thereof |
| US12506093B2 (en) * | 2021-03-25 | 2025-12-23 | Taiwan Semiconductor Manufacturing Company, Ltd. | Back-end-of-line compatible physically unclonable function memory device and system |
| US11783894B2 (en) | 2021-05-17 | 2023-10-10 | Electronics And Telecommunications Research Institute | Gaussian sampling apparatus and method based on resistive random access memory |
| KR102467915B1 (en) * | 2021-05-17 | 2022-11-17 | 한국전자통신연구원 | Apparatus and Method for Gaussian Sampling based on Resistance Random Access Memory |
| US11880269B2 (en) * | 2021-05-20 | 2024-01-23 | Electronics And Telecommunications Research Institute | Method for generating Gaussian error data using flash memory and apparatus using the same |
| US20220374302A1 (en) * | 2021-05-20 | 2022-11-24 | Electronics And Telecommunications Research Institute | Method for generating gaussian error data using flash memory and apparatus using the same |
Also Published As
| Publication number | Publication date |
|---|---|
| CN108122579A (en) | 2018-06-05 |
| US9997244B1 (en) | 2018-06-12 |
| TW201833922A (en) | 2018-09-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9997244B1 (en) | RRAM-based authentication circuit | |
| US12322441B2 (en) | Resistive random access memory device | |
| US10410719B2 (en) | Non-volatile memory device including a memory cell in a variable state and a memory cell in an initial state | |
| US10049734B2 (en) | Data storing method of non-volatile memory device by assigning an initial state to data | |
| US9792985B2 (en) | Resistive volatile/non-volatile floating electrode logic/memory cell | |
| US9966139B2 (en) | Resistive random access memory device | |
| CN108369817B (en) | Resistive cross point memory array | |
| US9934854B2 (en) | Memory controllers comparing a difference between measured voltages with a reference voltage difference | |
| US10916305B2 (en) | RRAM-based monotonic counter | |
| US12494250B2 (en) | Resistive random access memory based one-time-programmable memory devices | |
| EP4345818A1 (en) | Devices and methods for operating a memristive element |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: TAIWAN SEMICONDUCTOR MANUFACTURING CO., LTD., TAIW Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHIH, YU-DER;LU, SHIH-LIEN LINUS;SIGNING DATES FROM 20170203 TO 20170212;REEL/FRAME:041281/0896 |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |