Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Data Integrity Method for Complement/Recomplement

IP.com Disclosure Number: IPCOM000119888D
Original Publication Date: 1991-Mar-01
Included in the Prior Art Database: 2005-Apr-02
Document File: 3 page(s) / 59K

Publishing Venue

IBM

Related People

Aichelmann Jr, FJ: AUTHOR

Abstract

A method is proposed which prevents the complement/recomplement procedure from contaminating data in a multiple-bit output chip which has multiple parallel data paths. (Image Omitted)

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 97% of the total text.

Data Integrity Method for Complement/Recomplement

      A method is proposed which prevents the
complement/recomplement procedure from contaminating data in a
multiple-bit output chip which has multiple parallel data paths.

                            (Image Omitted)

      Conventional memory applications deploy a
complement/recomplement procedure to recover from uncorrectable
errors.

      This procedure utilizes an error checking and correction (ECC)
facility to detect and recover uncorrectable errors in a single ECC
word.  This proposal limits invoking the complement/recomplement
procedure for parallel paths within the same array chip to the
individual path with an uncorrectable error, preventing a data
integrity problem resulting from hidden faults.

      Case I depicts two paths with faults in both paths. Path 1
detects an uncorrectable error and decoders with
complement/recomplement.  Path 2 detects no errors with a single
hidden fault.  The parallel recovery procedure results in producing a
correctable error.

      Case II depicts another example with faults in both paths.
Path 1 again is recovered by complement/recomplement.  However, path
2 produces an uncorrectable error resulting from two hidden faults.
The data in the second path is now contaminated.

      Case III is the same example in which the path 1 is recovered
and path 2 is not contaminated because the complement/recomplement
procedure is only in...