|Publication number||US20030021155 A1|
|Application number||US 09/829,193|
|Publication date||Jan 30, 2003|
|Filing date||Apr 9, 2001|
|Priority date||Apr 9, 2001|
|Also published as||CN1494720A, CN100365735C, DE60115716D1, DE60115716T2, EP1415302A2, EP1415302B1, US6493266, WO2002082447A2, WO2002082447A3|
|Publication number||09829193, 829193, US 2003/0021155 A1, US 2003/021155 A1, US 20030021155 A1, US 20030021155A1, US 2003021155 A1, US 2003021155A1, US-A1-20030021155, US-A1-2003021155, US2003/0021155A1, US2003/021155A1, US20030021155 A1, US20030021155A1, US2003021155 A1, US2003021155A1|
|Inventors||Santosh Yachareni, Darlene Hamilton, Binh Le, Kazuhiro Kurihara|
|Original Assignee||Yachareni Santosh K., Hamilton Darlene G., Le Binh Q., Kazuhiro Kurihara|
|Export Citation||BiBTeX, EndNote, RefMan|
|Referenced by (56), Classifications (11), Legal Events (11)|
|External Links: USPTO, USPTO Assignment, Espacenet|
 The present invention relates generally to memory systems and in particular, to flash memory systems and methods wherein a new reference cell structure, and the application of unique reference voltages during soft program and soft program verify operations, eliminates previous problems of trimming a reference cell to a low threshold voltage, and tightens the erased core cell threshold voltage distribution, which also facilitates faster programming times.
 Flash memory is a type of electronic memory media which can be rewritten and hold its data without power. Flash memory devices generally have life spans from 100K to 1 MEG write cycles. Unlike dynamic random access memory (DRAM) and static random access memory (SRAM) memory chips, in which a single byte can be erased, flash memory is typically erased and written in fixed multi-bit blocks or sectors. Evolving out of electrically erasable read only memory (EEPROM) chip technology, which can be erased in place, flash memory is less expensive and more dense. This new category of EEPROMs has emerged as an important non-volatile memory which combines the advantages of EPROM density with EEPROM electrical erasability.
 Conventional flash memories are constructed in a cell structure wherein a single bit of information is stored in each cell, for example, as illustrated in prior art FIG. 1a, and designated at reference numeral 10. In such single bit memory architectures, each cell 10 typically includes a metal oxide semiconductor (MOS) transistor structure having a source 12, a drain 14, and a channel 16 in a substrate or P-well 18, as well as a stacked gate structure 20 overlying the channel 16. The stacked gate 20 may further include a thin gate dielectric layer 22 (sometimes referred to as a tunnel oxide) formed on the surface of the P-well. The stacked gate 20 also includes a polysilicon floating gate 24 overlying the tunnel oxide 22 and an interpoly dielectric layer 26 overlying the floating gate. The interpoly dielectric layer 26 is often a multilayer insulator such as an oxide-nitride-oxide (ONO) layer having two oxide layers sandwiching a nitride layer. Lastly, a polysilicon control gate 28 overlies the interpoly dielectric layer 26.
 The control gate 28 is connected to a word line associated with a row of such cells to form sectors of such cells in a typical NOR configuration. In addition, the drain regions 14 of the cells are connected together by a conductive bit line. The channel 16 of the cell conducts current between the source 12 and the drain 14 in accordance with an electric field developed in the channel 16 by the stacked gate structure 20. In the NOR configuration, each drain terminal 14 of the transistors within a single column is connected to the same bit line. In addition, each flash cell associated with a given bit line has its stacked gate terminal 28 coupled to a different word line, while all the flash cells in the array have their source terminals 12 coupled to a common source terminal. In operation, individual flash cells are addressed via the respective bit line and word line using peripheral decoder and control circuitry (not shown) for programming (writing), reading or erasing functions.
 Such a conventional single bit stacked gate flash memory cell 10 is programmed by applying a relatively high voltage to the control gate 28 and connecting the source 12 to ground and the drain 14 to a predetermined potential above the source. A resulting high electric field across the tunnel oxide 22 leads to a phenomena called “Fowler-Nordheim” tunneling. During this process, electrons in the core cell channel region 16 tunnel through the gate or tunnel oxide 22 into the floating gate 24 and become trapped in the floating gate since the floating gate is surrounded by the interpoly dielectric 26 and the tunnel oxide 22. As a result of the trapped electrons, the threshold voltage of the cell 10 increases. This change in the threshold voltage (and thereby the channel conductance) of the cell created by the trapped electrons is what causes the cell to be programmed.
 In order to erase a conventional single bit stacked gate flash memory cell 10, a relatively high voltage is applied to the source 12, and the control gate 28 is held at a negative potential, while the drain 14 is allowed to float. Under these conditions, a strong electric field is developed across the tunnel oxide 22 between the floating gate 24 and the source 12. The electrons that are trapped in the floating gate 24 flow toward and cluster at the portion of the floating gate overlying the source region 12 and are extracted from the floating gate and into the source region by way of Fowler-Nordheim tunneling through the tunnel oxide 22. As the electrons are removed from the floating gate 24, the cell 10 is erased.
 In conventional single bit flash memory devices, an erase verification is performed to determine whether each cell in a block or set of such cells has been properly erased. Current single bit erase verification methodologies provide for verification of bit or cell erasure, and application of supplemental erase pulses to individual cells which fail the initial verification. Thereafter, the erased status of the cell is again verified, and the process continues until the cell or bit is successfully erased or the cell is marked as unusable.
 After erasure, some cells may have been over erased, producing an excessively low threshold voltage and corresponding high drain current leakage which may cause problems with later read, program verify, or even erase operations. The process of soft programming has typically been adopted as a means to correct the over erased cells. Usually this process involves applying one or more program pulses to the over erased cells. The soft program process raises (or corrects) the low threshold voltages of the identified cells, to effectively narrow the distribution of erased cell threshold voltages across a flash memory array.
 Recently, dual bit flash memory cells have been introduced, which allow the storage of two bits of information in a single memory cell. FIG. 1b illustrates an exemplary prior art dual bit memory cell 50. The memory cell 50 comprises a silicon dioxide layer 52, a P-type substrate 54 has buried N+ source 56 and N+ drain 58 regions. The silicon dioxide 52 is sandwiched between two layers of silicon nitride 60, and 62. Alternatively, the layer 52 may comprise buried polysilicon islands or any other form of charge trapping layer.
 Overlying the nitride layer 60 is a polysilicon gate 64. This gate 64 is doped with an N-type impurity (e.g., phosphorus). The memory cell 50 is capable of storing two data bits, a left bit represented by the dashed circle A and a right bit represented by the dashed circle B. The dual bit memory cell 50 is generally symmetrical, thus the drain 58 and the source 56 are interchangeable. Thus, the left junction 56 may serve as the source terminal and the right junction 58 as the drain terminal with respect to the right bit B. Likewise, the right junction 58 may serve as the source terminal and the left junction 56 as the drain terminal for the left bit A.
 After erasure of a dual bit cell, the conventional soft programming, and soft program verification methods employed with single bit stacked gate architectures may be applied in certain circumstances to such dual bit devices, but are problematic at best because the end of the erase distribution VT's are not close to zero, but are at 0.7 volts. Therefore, there is a need for new and improved soft programming, and soft program verification methods and systems, which ensure proper control of the erased cell threshold voltage distribution of data bits in a dual bit memory architecture, and which account for the structural characteristics thereof.
 A system and methodology are provided which overcome or minimize the problems and shortcomings of conventional memory cell soft program verification schemes and systems. The invention includes methods and systems for verifying an erased cell threshold voltage of one or more dual bit cells in a memory device, such as a flash memory. The invention allows for efficient and thorough soft program verification, which minimizes inadvertent, undesired data retention, over-erase and cell read leakage issues associated with the dual bit cell architecture. The invention provides significant advantages when employed in association with dual bit memory cells wherein only one bit thereof is actively used for data storage. However, it will be recognized that the invention finds utility in association with dual bit memory cell architectures generally, and that the invention is thus not limited to any particular dual bit cell usage implementation or configuration.
 In accordance with one aspect of the invention, there is provided a method of verifying an erased cell threshold voltage of a dual bit memory cell. The erased cell threshold voltage verification method comprises the steps of performing a determination of whether a first, or second bit in the dual bit memory cell is properly soft programmed.
 Verification of proper soft programming in a dual bit memory cell configuration according to the inventive method ensures that undesirable data retention or bit over-erase problems (resulting in a low threshold voltage, and consequent high leakage current) do not adversely affect the operation (e.g., proper erasure, read/write functionality) of the core cell. In this manner, the invention provides significant performance advantages over conventional methods typically utilized in soft programming of single bit (e.g., stacked gate) memory cell types. The method may further comprise repeating the method for another dual bit memory cell, whereby a byte-wise soft programming verification may be accomplished, for example, in association with a chip erase or sector erase operation.
 A soft program verification of a core cell threshold voltage may be performed through the application of a voltage to the memory cell being verified along with an application of a different voltage to a reference cell with a known threshold voltage, then comparing the currents of the core cell under analysis and the reference cell, respectively. When this comparison indicates that one or more of the soft programming pulses have reduced the current in the cell being verified to less than that of the reference cell, the core cell threshold voltage is above a target minimum erased cell threshold voltage. Moreover, according to one aspect of the invention, the process may be repeated for each cell in the array until each erased cell threshold voltage is above a target minimum.
 In addition, the method may also include an accounting of the number of soft program pulses which are applied to any one core cell, or block of core cells, in the event the cell, or block of cells are not responding to soft program verify. In this case, where a predetermined maximum soft program pulse count is exceeded, the cell, or block of cells is identified as having failed soft programming, and therefore avoid an endless soft program loop. For example, this method may include steps of initializing a pulse counter before each new cell address is selected, performing the soft program verification, determining whether the pulse counter has exceeded the preset maximum pulse count, then, if the count has not been exceeded, continuing to a step of incrementing the pulse counter as another soft program pulse is applied, or if the pulse count has been exceeded, a further step may be to proceed with appropriate actions for a failed soft programming.
 According to another aspect of the invention, there is provided a method to custom tailor a subsequent soft programming pulse (e.g., pulse width, pulse height) according to the differential current in the comparator, to greatly speed up the overall soft programming process, or to minimize the effects of over soft programming.
 The method of the present invention may include several selected core cells, or blocks of cells for soft programming operations, as well as selected core cells, or blocks of cells for soft program verifications.
 According to another aspect of the invention, there is provided a method for soft programming and soft program verifying a plurality of dual bit flash memory cells, which includes the steps of soft programming the plurality of dual bit flash memory cells, verifying proper soft programming of a first bit in at least one of the plurality of dual bit flash memory cells, verifying proper soft programming of a second bit in the at least one of the plurality of dual bit flash memory cells, and determining that the cell is properly soft programmed if the first and second bits are properly soft programmed.
 To the accomplishment of the foregoing and related ends, the invention comprises the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative aspects and implementations of the invention. These are indicative, however, of but a few of the various ways in which the principles of the invention may be employed. Other objects, advantages and novel features of the invention will become apparent from the following detailed description of the invention when considered in conjunction with the drawings.
FIG. 1a is a fragmentary cross section view of an exemplary prior art, single bit flash memory cell;
FIG. 1b is a fragmentary cross section view of an exemplary prior art dual bit memory cell in which various aspects of the present invention may be implemented;
FIG. 2 is a distribution plot illustrating an erased cell threshold voltage distribution of a number of core cells of an exemplary prior art flash memory array;
FIG. 3 is a distribution plot illustrating an erased cell threshold voltage distribution and a programmed cell threshold voltage distribution of a number of core cells of an exemplary dual bit memory array, together with over-erased bits which require soft programming according to the invention;
FIG. 4 is a system level functional block diagram illustrating an exemplary soft program and soft program verification system in which various aspects of the invention may be carried out;
FIG. 5a is a schematic diagram illustrating an exemplary core cell, core current, and gate voltage in the system of FIG. 4;
FIG. 5b is a schematic diagram illustrating an exemplary reference cell, reference current, and gate voltage in the system of FIG. 4;
FIG. 6 is a functional block diagram illustrating a soft program reference voltage and charge pump logic circuit of the system of FIG. 4;
FIG. 7 is a schematic diagram illustrating an exemplary soft program multiplexer (hereinafter referred to as “mux”) logic circuit of the system of FIG. 4;
FIG. 8 is a schematic diagram illustrating details of an exemplary soft program reference voltage logic circuit, and voltage divider circuit of the system of FIG. 6; and
FIG. 9 is a flow diagram illustrating an exemplary method for verifying memory cell soft programming according to the invention.
 The following is a detailed description of the present invention made in conjunction with the attached figures, wherein like reference numerals will refer to like elements throughout. The invention provides a method and a system for soft programming, and verifying proper soft programming of one or more dual bit memory cells, and may be used in conjunction with a chip or sector soft program and soft program verification operation in a flash memory device. For example, a sector soft programming verify operation may be performed in order to apply soft programming pulses to each such cell in a flash memory device. Thereafter, the invention may be employed in order to verify which cells in the device have been properly soft programmed.
 In addition, the invention selectively attempts to re-soft program cells (e.g., via selective application of soft program voltage pulses to one or both individual bits in a dual bit memory cell) which have been over erased during the erase part of the algorithm that is performed before the soft program verify operation. The invention also provides for selective re-verification of proper soft programming of one or both bits in a dual bit cell.
 According to one aspect of the invention, proper soft program verification may be accomplished through generating a soft program core cell verification voltage and generating a reference cell verification voltage having a value which is different from the core cell verification voltage. The method further includes applying the core cell verification voltage to a gate portion of an over erased core cell to thereby generate a core cell current, and applying the reference cell voltage verification voltage to a gate portion of a reference cell to thereby generate a reference cell current. Lastly, the method includes determining whether a threshold voltage associated with the erased core cell is less than a predetermined threshold based on a comparison of the core cell current and the reference cell current.
 Although the invention is hereinafter illustrated and described in association with a dual bit memory cell architecture wherein only one bit of each cell is used for data storage, it will be appreciated that the invention is applicable to other type architectures and other dual bit architecture usage schemes.
 Referring again to the drawings, FIG. 2 illustrates a characteristic curve known as the erased core cell threshold voltage distribution. FIG. 2 illustrates how the core cell threshold voltages in a flash memory array can differ from one another following an erase operation as shown by curve 200 that represents the number of cells having particular values of threshold voltage VT. It has been found that the least erased cells will have relatively high threshold voltages in the region of VTMAX, whereas the most erased cells (sometimes referred to as “over-erased cells”) will have low threshold voltages in the region of VTMIN that can be zero or negative. However, the threshold voltage distribution curve segment 210 indicates that there is still a number of erased cells that have a relatively low threshold voltage. After correcting the VT of the most over erased cells thru the soft program and soft program verify operations, the erased core cell threshold voltage distribution curve 200 will narrow on the low end of the curve (shown by curve segment 210) to approximately 0 Volts.
 Since the background leakage current of a cell varies as a function of threshold voltage, the lower the threshold voltage of an erased cell, the higher the leakage current will be. Because there may be as many as 512 cells connected to a bitline, the total background leakage current may disadvantageously exceed the cell read current thereby leading to a subsequent read error. It is therefore desirable to prevent cells from not only being over-erased, but to reduce the threshold voltage distribution to as low a range as possible, with ideally all cells having the same high threshold voltage after erase.
 Similarly, FIG. 3 illustrates characteristic cell threshold voltage distribution curves of an exemplary dual bit memory array illustrating a desired erased cell threshold voltage distribution 350, and a programmed cell threshold voltage distribution 360. As discussed earlier, after erasure, some cells may have been over erased, producing an excessively low threshold voltage (shaded region 370) and corresponding high drain current leakage which may cause problems with later read, program verify, or even erase operations. Conventional methods of chip, sector, or cell soft programming typically used in the single bit stacked gate cell, attempted to correct the over erased cells, by applying one or more program pulses to the over erased cells. Soft programming raises (or corrects) the low threshold voltages on these cells, to effectively narrow the distribution of cell threshold voltages across a flash memory array. Soft program verification was done by comparing the current produced in the selected core cell, and its' associated erased cell threshold voltage, to that of a reference cell with an acceptable threshold voltage.
 Comparing FIGS. 2 and 3, one sees that the prior art single bit cell was typically soft program corrected to a VTMIN of about 0 volts, whereas the dual bit erased cell, soft program corrected VTMIN increases to about 0.7 volt. In the stacked gate cell prior art, the reference cell was manufactured similar to the selected core cell(s) they were compared to, and both the reference and core cells were given the same gate voltages during the soft program verify. In the dual bit cell architecture, however, the reference cell structure can not readily be made the same as the core cells, yet a soft program verification must still be made to produce a desired erased core cell VT (e.g., VT>0.7 volts). The inventors have found in the trimming of the VT of the new reference cell structure, that attempts to trim the VT to less than about 1.7 volts results in unusably high cell leakage current.
 In accordance with the invention, and the solutions to these problems, the inventors devised methods and systems to generate different voltages to be applied to the gate of the new reference cell structure and the core cell structure, respectively, to allow the reference cell to produce a current which compares to an erased core cell current associated with a VT>0.7 volts.
 The present invention may be understood and its advantages appreciated in FIG. 4 which illustrates a system level functional block diagram of an exemplary soft program and soft program verification system 400 in which various aspects of the invention may be accomplished. For example, the system of FIG. 4 prevents erased memory cells from exhibiting an erased cell threshold voltage below a predetermined level, may be comprised of the three functional blocks shown.
 A flash memory array system 402 of FIG. 4, includes an array of core cells 405 which are typically subdivided into sectors, blocks, and individual core cells. The cells are arranged in rows and columns, with all of the cells in a row having their control gate connected to a common word line. The drains of the cells located in a particular column are all connected to a common bit line while all the cells of the array have their sources coupled to a common source line 490 to enable the measurement of drain current in the core cells (ICORE) at 490. The memory system 402, also has address controls 410 which acts as a matrix of multiplexors working in conjunction with bit - column controls 415 and word- row controls 420 used to select a sector, block, or individual cells of the core 405. The row control block 420 is connected to the word lines of the cells of the array and a column control block 415 is connected to the bit lines of the array. In operation, individual flash cells may be individually addressed via the respective bit line and word line using peripheral decoder and control circuitry for programming (writing), reading or erasing functions. These flash core cells 405 will be the object of the soft program and soft program verify operations of the present invention, and discussed in greater detail in the following sections.
 A soft program control circuit 430 of FIG. 4, is configured with a soft program multiplexer 435 charge pumps 440 and a soft program reference voltage circuit 445 to generate a soft program voltage (V1) at 450, a soft program core cell verify voltage (V3) at 455, and a reference cell verification voltage (V2) at 460. In response to a logic command to enter the soft program mode (or for example, as the result of a soft program verify comparison command 487), the multiplexer circuit 430 generates a soft program enable signal 436 to control the reference logic circuit 445 or for example, the next core address selection 437. The multiplexer circuit 435 also generates a regulated, clamped supply voltage 438 to the wordline charge pump circuit of 440. The charge pumps of 440 include a Drain charge pump which generates a supply voltage for program verify operations, and a wordline charge pump circuit configured to generate a boosted wordline supply voltage for the voltage divider within the soft program reference voltage circuit 445. The soft program reference voltage circuit 445 takes the soft program enable signals 436 and 486, and charge pump voltages 442 and 444, used in a reference logic circuit multiplexer within 445 to generate the discrete soft program and soft program verify voltages V1, V2, & V3 via, for example, a voltage divider.
 A soft program verify control circuit 470 according to one exemplary aspect of the present invention of FIG. 4, is configured with a reference cell 480 which uses V2, the reference cell verification voltage 460 to generate the reference cell current (IREF) at 495. The control circuit 470 further includes a soft program verify comparator circuit 475 which is configured to compare the over erased core cell verification current (ICORE) at 490 to the reference cell current (IREF) at 495 to generate an output indication on 477 of whether the selected erased core cell threshold voltage is below a predetermined level. The soft program verify comparator circuit is further operable to transfer the VT indication to a verify controls circuit 485 which is configured to output one or more soft program control signals 486 and 487 for use in soft programming based on the indication.
 During operation, when comparator 475 of the soft program verify control circuit 470, has made the determination that the selected core cell VT is less than 0.7 volts, comparator 475 provides signal 477 to initiate a predetermined soft program pulse from verify controls circuit 485 via 487 back to the soft program control circuit 430.
 Alternately, according to another aspect of the present invention, there is provided a system and method to custom tailor a subsequent soft programming pulse (e.g., pulse width, pulse height) according to the differential current in the comparator 475, to greatly speed up the overall soft programming process, or to minimize the effects of over soft programming. To accomplish this, the differential current could be measured in a sense amplifier (e.g., differential current amplifier) at 475 which would be conveyed via 477 to the verify controls 485 configured to convert the differential current produced at 475 into some combination of proportional pulse width, or pulse height modulation of the soft program pulse.
 In another variation of the present invention, there is provided a system and method to custom tailor a subsequent soft programming pulse (e.g., pulse width, pulse height) through the use of a look-up table located in a portion of the core memory array 405, or in a separate memory, wherein the differential current produced at 475 may be bracketed into two or more levels which would result in the selection of an appropriate optimized pulse width/height modulation of the soft programming pulse. Yet another variation and aspect of the invention is provided by the method, wherein the flash memory array as a whole is selected, and the differential current produced at 475 may be used to generate some combination of proportional pulse width, or pulse height modulation of the soft program pulse, or a whole series of pulses as a pulse string which is thereby tailored to the flash memory array as a whole for subsequent soft program operations.
 The inventors found, as shown in FIGS. 5a, and 5 b, that if they supplied a predetermined drain-source bias of about 1.2 volts to both the core cell and reference cell drains, and approximately 2.7 volts to the core cell gate, and about 3.7 volts to the reference cell gate, the currents would be equivalent if the core cell VT was equal to 0.7 volt.
 The development of this reference cell voltage is as follows:
Using the equation: ID = k(VGS − VT)2 for the erased core IDCORE = k(VGSCORE − VTCORE)2 cell: for the reference IDREF = k(VGSREF − VTREF)2 cell: given we want: VTCORE ≧ 0.7 V and VTREF 1.7 V now, for the ref- IDREF = IDCORE erence cell and the core cell currents to compare equally: and: k(VGSREF − VTREF)2 = k(VGSCORE − VTCORE)2 dividing thru: VGSREF − VTREF = VGSCORE − VTCORE solving for the VGSREF = VGSCORE − VTCORE + VTREF new ref.: substituting given VGSREF = VGSCORE − 0.7 + 1.7 values: plug in a core cell VGSREF = 2.7 − 0.7 + 1.7 value: we have: VGSREF = 3.7 volts
 Therefore, if the currents through the core cell and reference cell are equal, then the core cell VT is 0.7 volt. Otherwise, if the core cell current exceeds the reference cell current, the core cell VT is less than 0.7 volts (a predetermined threshold) and requires another soft programming pulse.
 Referring now to the functional block diagram of FIG. 6, an exemplary method and system 600 is illustrated for generating the various voltages required in the soft program control circuit 430 of FIG. 4; for example, voltages for soft programming 610, soft programming verify 620, wordline (core cell) gate 630, and the reference cell gate reference voltage 640. A wordline charge pump circuit 650 generates a boosted supply voltage 670, through a reference logic circuit 680, for the soft program verify supply 620, in response to a soft program mode enable signal 690. The drain charge pump circuit 660 generates a boosted programming voltage 610 to the reference logic circuit 680 in response to a program mode signal (not shown). As can be seen from FIG. 6, the soft program control system 600 is operable to generate multiple voltages (for example, via a resistor network) having different values (e.g., V1≠V2≠V3) for use in a soft program verify mode. In the above manner, unique voltages are provided for the core cell and reference cell, respectively.
FIG. 7 is a schematic diagram illustrating an exemplary soft program mux logic circuit 700 (e.g., relating to the program mux 435 of FIG. 4). This multiplexer circuit 700 uses a network of logic gates 702 to generate a soft program enable signal 710 to the reference logic circuit 680 of FIG. 6 in response to the soft program mode signal fed thru 702. The multiplexer circuit 700 also uses the program supply voltage 705 controlled by a regulator transistor 720 which is held in state by a latch 715 to generate a supply voltage 740 which is clamped by a diode 730 and fed to the wordline charge pump circuit 650 of FIG. 6.
FIG. 8 is a schematic diagram 800 illustrating more of the details of an exemplary soft program reference voltage logic circuit 805, and voltage divider circuit 850 (e.g., relating to the circuit 600 of FIG. 6). The charge pump boosted wordline voltage 810 is held by latch 825 to supply the soft program verify supply 820 (or 620 of FIG. 6), which enters at regulator transistor 830, and at the gate of the soft program mode transistor 840, to set-up the voltage divider 850 ratios to produce the 3.7 volt reference cell gate reference voltage 860, and the 2.7 volt erased core cell gate reference voltage 870. In the above exemplary manner, voltages having different values are provided so that the core cell and the reference cell will have their necessary gate voltages applied thereto in order to evaluate whether the erased core cell VT is above a predetermined value.
 According to another aspect of the present invention, a method of preventing erased memory cells from exhibiting an erased cell threshold voltage below a predetermined level is provided.
FIG. 9 is a flow diagram 900 illustrating an exemplary method for verifying memory cell soft programming according to the invention, and will be discussed in conjunction with the exemplary system of FIG. 4 for purposes of explanation. For example, once an erase or erase verify operation has been performed to erase the data bits of a sector of memory (e.g., by writing a 1 value thereto), the method 900 begins at step 910, after which the soft program, and soft program verify modes are enabled at step 920.
 The method 900 proceeds to step 925, whereat a cell address is initialized to a first address, and, for example, a pulse counter is initialized to zero at step 930. Following step 930 the first cell address is selected at step 940. The first memory cell is then soft program verified at step 950. At decision step 950, a determination is made as to whether a core cell has been properly erased, but not over erased. As illustrated and described in greater detail hereinafter with respect to FIG. 4, the soft program verification operations performed at steps 950 and 965 of the method 900, may be carried out via the application of about a 2.7 volt reference voltage to the selected core cell gate, and the application of a different reference voltage to the reference cell gate (e.g., about 3.7 volts), and then comparing the two currents, and making a determination based on that comparison whether the associated erased core cell threshold voltage is greater than 0.7 volts.
 If, for example, at step 950 the selected core cell current is not less than the reference cell current, a determination is made that the core cell has a threshold voltage which is less than 0.7 volt, and the method 900 proceeds to step 955, whereat an accounting may be performed of the current number of soft program pulses which have already been applied to the core cell in an attempt to correct the erase cell threshold voltage. If a predetermined number of pulses NP has been exceeded, a determination may be made at step 955 to identify the core cell as having failed the soft program process and proceeds to step 970. In this manner, the core cell will not be subjected to repeated soft program pulses without being re-verified; the program will not hang in a never ending loop, should a selected cell be defective; and most importantly, the soft program pulse widths can be made shorter, resulting in a faster overall soft programming time, as soft programming time only need be spent in the areas of greatest need. If, however in step 955, a predetermined pulse count has not exceeded NP, the method 900 proceeds to step 960, whereat the current pulse count is incremented.
 After step 960, method 900 continues to step 965 for the application of a soft program pulse to core cell, and a return to step 950 for another soft program verification.
 Where it is found at decision step 950 that the cell has been properly soft programmed, the method 900 proceeds to step 980, whereat it is determined whether the last cell address has been reached (e.g., in a given cell memory block or sector, or in a given multiple cell memory block or sector). For example, the method may be selectively employed to verify erasure of a certain number of the cells (e.g., eight or sixteen), which are connected in a NOR configuration, although other implementations are possible wherein any number of such cells may be serially verified according to the invention.
 If the last cell address has not been reached at decision step 980, the method proceeds to step 985, whereat a soft program pulse counter may be reset prior to proceeding to step 990. At step 990 the current address is incremented before proceeding to step 940 again, whereat the next cell address is selected as before. Otherwise (e.g., all such cells have been verified), the method 900 ends at step 995.
 Thus, the method 900 selectively verifies, re-verifies, soft programs, and re-soft programs each cell of a dual bit memory cell in order to ensure proper soft programming prior to proceeding to another such cell at step 985, or ending at step 995.
 It will be appreciated in this regard, that the method 900 may include internal counters or other steps by which a cell may be determined to be unuseable (e.g., unable to be properly soft program) after a number of unsuccessful attempts at soft programming/verification, whereby the cell (e.g., or a number of related cells, such as a byte or word) may be marked as bad, or the part itself may hang as part of a failed sector erase operation. Further in this regard, if the method 900 is employed in a manufacturing process (e.g., before or after packaging, but before shipment to a customer), redundancy may be employed to mark a cell or a number of cells as bad, and to provide alternate or redundant storage cells as a replacement, whereby acceptable manufacturing yield may be achieved. The method 900 may also be employed in association with a sector or chip soft program/verification operation initiated by an end-user, wherein a cell failure may be indicated to the user via the memory device hanging as a result.
 Although the invention has been shown and described with respect to one or more implementations, equivalent alterations and modifications will occur to others skilled in the art upon the reading and understanding of this specification and the annexed drawings. In particular regard to the various functions performed by the above described components (assemblies, devices, circuits, etc.), the terms (including a reference to a “means”) used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (i.e., that is functionally equivalent), even though not structurally equivalent to the disclosed structure which performs the function in the herein illustrated exemplary implementations of the invention. In addition, while a particular feature of the invention may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application. Furthermore, to the extent that the term “includes” is used in either the detailed description and the claims, such term is intended to be inclusive in a manner similar to the term “comprising.”
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US6901010 *||Apr 8, 2002||May 31, 2005||Advanced Micro Devices, Inc.||Erase method for a dual bit memory cell|
|US6903980 *||May 27, 2003||Jun 7, 2005||Fujitsu Limited||Nonvolatile semiconductor memory device capable of correcting over-erased memory cells|
|US6930926 *||Jan 30, 2003||Aug 16, 2005||Macronix International Co., Ltd.||Method for erasing a flash EEPROM|
|US7079420||Dec 30, 2003||Jul 18, 2006||Saifun Semiconductors Ltd.||Method for operating a memory device|
|US7266019 *||Aug 30, 2005||Sep 4, 2007||Spansion Llc||Non-volatile memory device and erasing method therefor|
|US7301817||Oct 27, 2005||Nov 27, 2007||Sandisk Corporation||Method for programming of multi-state non-volatile memory using smart verify|
|US7310347 *||Jan 18, 2005||Dec 18, 2007||Sandisk, Il Ltd.||States encoding in multi-bit flash cells|
|US7366022||Oct 27, 2005||Apr 29, 2008||Sandisk Corporation||Apparatus for programming of multi-state non-volatile memory using smart verify|
|US7366025||Jun 10, 2004||Apr 29, 2008||Saifun Semiconductors Ltd.||Reduced power programming of non-volatile cells|
|US7489560||Apr 5, 2006||Feb 10, 2009||Spansion Llc||Reduction of leakage current and program disturbs in flash memory devices|
|US7492634||Sep 26, 2007||Feb 17, 2009||Sandisk Corporation||Method for programming of multi-state non-volatile memory using smart verify|
|US7630253||Apr 5, 2006||Dec 8, 2009||Spansion Llc||Flash memory programming and verification with reduced leakage current|
|US7652930||Apr 3, 2005||Jan 26, 2010||Saifun Semiconductors Ltd.||Method, circuit and system for erasing one or more non-volatile memory cells|
|US7668017||Aug 17, 2005||Feb 23, 2010||Saifun Semiconductors Ltd.||Method of erasing non-volatile memory cells|
|US7675782||Oct 17, 2006||Mar 9, 2010||Saifun Semiconductors Ltd.||Method, system and circuit for programming a non-volatile memory array|
|US7692961||Aug 2, 2006||Apr 6, 2010||Saifun Semiconductors Ltd.||Method, circuit and device for disturb-control of programming nonvolatile memory cells by hot-hole injection (HHI) and by channel hot-electron (CHE) injection|
|US7701779||Sep 11, 2006||Apr 20, 2010||Sajfun Semiconductors Ltd.||Method for programming a reference cell|
|US7738304||Oct 11, 2005||Jun 15, 2010||Saifun Semiconductors Ltd.||Multiple use memory chip|
|US7743230||Feb 12, 2007||Jun 22, 2010||Saifun Semiconductors Ltd.||Memory array programming circuit and a method for using the circuit|
|US7760554||Aug 2, 2006||Jul 20, 2010||Saifun Semiconductors Ltd.||NROM non-volatile memory and mode of operation|
|US7786512||Jul 18, 2006||Aug 31, 2010||Saifun Semiconductors Ltd.||Dense non-volatile memory array and method of fabrication|
|US7808818||Dec 28, 2006||Oct 5, 2010||Saifun Semiconductors Ltd.||Secondary injection for NROM|
|US7808833||Jan 28, 2008||Oct 5, 2010||Qimonda Flash Gmbh||Method of operating an integrated circuit, integrated circuit and method to determine an operating point|
|US7964459||Dec 10, 2009||Jun 21, 2011||Spansion Israel Ltd.||Non-volatile memory structure and method of fabrication|
|US8031528||Sep 11, 2009||Oct 4, 2011||Spansion Llc||Flash memory programming and verification with reduced leakage current|
|US8053812||Mar 13, 2006||Nov 8, 2011||Spansion Israel Ltd||Contact in planar NROM technology|
|US8245099||Sep 23, 2011||Aug 14, 2012||Sandisk Il Ltd.||States encoding in multi-bit flash cells for optimizing error rate|
|US8253452||Feb 21, 2006||Aug 28, 2012||Spansion Israel Ltd||Circuit and method for powering up an integrated circuit and an integrated circuit utilizing same|
|US8400841||Jun 15, 2005||Mar 19, 2013||Spansion Israel Ltd.||Device to program adjacent storage cells of different NROM cells|
|US8644082 *||Aug 27, 2011||Feb 4, 2014||SK Hynix Inc.||Memory apparatus and method for controlling erase operation of the same|
|US8654589 *||Dec 16, 2010||Feb 18, 2014||Taiwan Semiconductor Manufacturing Company, Ltd.||Charge pump control scheme for memory word line|
|US8760923 *||Aug 28, 2012||Jun 24, 2014||Freescale Semiconductor, Inc.||Non-volatile memory (NVM) that uses soft programming|
|US8830756 *||Jan 23, 2013||Sep 9, 2014||Freescale Semiconductor, Inc.||Dynamic detection method for latent slow-to-erase bit for high performance and high reliability flash memory|
|US8947958||Oct 9, 2012||Feb 3, 2015||Freescale Semiconductor, Inc.||Latent slow bit detection for non-volatile memory|
|US8995198||Oct 10, 2013||Mar 31, 2015||Spansion Llc||Multi-pass soft programming|
|US8995202||May 21, 2012||Mar 31, 2015||Freescale Semiconductor, Inc.||Test flow to detect a latent leaky bit of a non-volatile memory|
|US20040153620 *||Jan 30, 2003||Aug 5, 2004||Shai Eisen||Address scramble|
|US20040222437 *||Dec 7, 2000||Nov 11, 2004||Dror Avni||Programming and erasing methods for an NROM array|
|US20050058005 *||Dec 30, 2003||Mar 17, 2005||Assaf Shappir||Method for operating a memory device|
|US20050117395 *||Jan 6, 2005||Jun 2, 2005||Saifun Semiconductors Ltd.||Method for operating a memory device|
|US20050201401 *||Jan 18, 2005||Sep 15, 2005||M-Systems Flash Disk Pioneers, Ltd.||States encoding in multi-bit flash cells|
|US20050276118 *||Jun 10, 2004||Dec 15, 2005||Eduardo Maayan||Reduced power programming of non-volatile cells|
|US20060044919 *||Aug 30, 2005||Mar 2, 2006||Spansion Llc||Non-volatile memory device and erasing method therefor|
|US20060056240 *||Apr 3, 2005||Mar 16, 2006||Saifun Semiconductors, Ltd.||Method, circuit and system for erasing one or more non-volatile memory cells|
|US20060068551 *||May 25, 2005||Mar 30, 2006||Saifun Semiconductors, Ltd.||Method for embedding NROM|
|US20060126396 *||Jan 9, 2006||Jun 15, 2006||Saifun Semiconductors, Ltd.||Method, system, and circuit for operating a non-volatile memory array|
|US20060152975 *||Oct 11, 2005||Jul 13, 2006||Eduardo Maayan||Multiple use memory chip|
|US20060158940 *||Jan 19, 2006||Jul 20, 2006||Saifun Semiconductors, Ltd.||Partial erase verify|
|US20060211188 *||May 24, 2006||Sep 21, 2006||Saifun Semiconductors Ltd.||Non-volatile memory structure and method of fabrication|
|US20060285386 *||Jun 15, 2005||Dec 21, 2006||Saifun Semiconductors, Ltd.||Accessing an NROM array|
|US20060285408 *||Jun 17, 2005||Dec 21, 2006||Saifun Semiconductors, Ltd.||Method circuit and system for compensating for temperature induced margin loss in non-volatile memory cells|
|US20120134228 *||May 31, 2012||Taiwan Semiconductor Manufacturing Company, Ltd.||Charge pump control scheme for memory word line|
|US20120218827 *||Aug 30, 2012||Hynix Semiconductor Inc.||Memory apparatus and method for controlling erase operation of the same|
|US20140063946 *||Aug 28, 2012||Mar 6, 2014||Fuchen Mu||Non-volatile memory (nvm) that uses soft programming|
|DE102006005077B3 *||Feb 3, 2006||Jun 14, 2007||Infineon Technologies Flash Gmbh & Co. Kg||Verfahren zum Betreiben einer Halbleiterspeicheranordnung und Halbleiterspeicheranordnung|
|WO2005086576A2 *||Mar 3, 2005||Sep 22, 2005||Milsys Ltd||States encoding in multi-bit flash cells|
|International Classification||G11C16/06, G11C16/34, G11C16/02|
|Cooperative Classification||G11C16/3409, G11C16/0475, G11C16/3436, G11C16/3404|
|European Classification||G11C16/34C2, G11C16/34V, G11C16/34C|
|Apr 9, 2001||AS||Assignment|
|Jun 21, 2004||AS||Assignment|
Owner name: FASL, LLC, CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:AMD INVESTMENTS, INC.;FUJITSU LIMITED;REEL/FRAME:015487/0501;SIGNING DATES FROM 20040330 TO 20040514
|Jun 24, 2004||AS||Assignment|
|May 24, 2006||FPAY||Fee payment|
Year of fee payment: 4
|Apr 1, 2010||AS||Assignment|
Owner name: SPANSION LLC,CALIFORNIA
Free format text: CHANGE OF NAME;ASSIGNOR:FASL LLC;REEL/FRAME:024170/0300
Effective date: 20100401
|May 21, 2010||FPAY||Fee payment|
Year of fee payment: 8
|Jun 4, 2010||AS||Assignment|
Owner name: BARCLAYS BANK PLC,NEW YORK
Free format text: SECURITY AGREEMENT;ASSIGNORS:SPANSION LLC;SPANSION INC.;SPANSION TECHNOLOGY INC.;AND OTHERS;REEL/FRAME:024522/0338
Effective date: 20100510
Owner name: BARCLAYS BANK PLC, NEW YORK
Free format text: SECURITY AGREEMENT;ASSIGNORS:SPANSION LLC;SPANSION INC.;SPANSION TECHNOLOGY INC.;AND OTHERS;REEL/FRAME:024522/0338
Effective date: 20100510
|Jun 10, 2014||FPAY||Fee payment|
Year of fee payment: 12
|Mar 13, 2015||AS||Assignment|
Owner name: SPANSION INC., CALIFORNIA
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BARCLAYS BANK PLC;REEL/FRAME:035201/0159
Effective date: 20150312
Owner name: SPANSION TECHNOLOGY LLC, CALIFORNIA
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BARCLAYS BANK PLC;REEL/FRAME:035201/0159
Effective date: 20150312
Owner name: SPANSION LLC, CALIFORNIA
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BARCLAYS BANK PLC;REEL/FRAME:035201/0159
Effective date: 20150312
|Mar 21, 2015||AS||Assignment|
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., NEW YORK
Free format text: SECURITY INTEREST;ASSIGNORS:CYPRESS SEMICONDUCTOR CORPORATION;SPANSION LLC;REEL/FRAME:035240/0429
Effective date: 20150312
|Jun 29, 2015||AS||Assignment|
Owner name: CYPRESS SEMICONDUCTOR CORPORATION, CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SPANSION, LLC;REEL/FRAME:036034/0058
Effective date: 20150601