Starting program voltage shift with cycling of non-volatile memory

ABSTRACT

A system is disclosed for programming non-volatile storage that improves performance by setting the starting programming voltage to a first level for fresh parts and adjusting the starting programming voltage as the memory is cycled. For example, the system programs a set of non-volatile storage elements during a first period using an increasing program signal with a first initial value and subsequently programs the set of non-volatile storage elements during a second period using an increasing program signal with a second initial value, where the second period is subsequent to the first period and the second initial value is different than the first initial value.

CLAIM OF PRIORITY

This application is a continuation application of U.S. patentapplication Ser. No. 11/144,264, “Starting Program Voltage Shift withCycling of Non-Volatile Memory,” by Lutze, filed on Jun. 3, 2005,incorporated herein by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to programming non-volatile memory.

2. Description of the Related Art

Semiconductor memory has become more popular for use in variouselectronic devices. For example, non-volatile semiconductor memory isused in cellular telephones, digital cameras, personal digitalassistants, mobile computing devices, non-mobile computing devices andother devices. Electrical Erasable Programmable Read Only Memory(EEPROM) and flash memory are among the most popular non-volatilesemiconductor memories.

Both EEPROM and flash memory utilize a floating gate that is positionedabove and insulated from a channel region in a semiconductor substrate.The floating gate is positioned between the source and drain regions. Acontrol gate is provided over and insulated from the floating gate. Thethreshold voltage of the transistor is controlled by the amount ofcharge that is retained on the floating gate. That is, the minimumamount of voltage that must be applied to the control gate before thetransistor is turned on to permit conduction between its source anddrain is controlled by the level of charge on the floating gate.

When programming an EEPROM or flash memory device, such as a NAND flashmemory device, typically a program voltage is applied to the controlgate and the bit line is grounded. Electrons from the channel areinjected into the floating gate. When electrons accumulate in thefloating gate, the floating gate becomes negatively charged and thethreshold voltage of the memory cell is raised so that the memory cellis in a programmed state. More information about programming can befound in U.S. Pat. No. 6,859,397, titled “Source Side Self BoostingTechnique For Non-Volatile Memory,” and in U.S. Patent ApplicationPublication 2005/0024939, titled “Detecting Over Programmed Memory,”filed on Jul. 29, 2003; both applications are incorporated herein byreference in their entirety.

Some EEPROM and flash memory devices have a floating gate that is usedto store two ranges of charges and, therefore, the memory cell can beprogrammed/erased between two states (an erased state and a programmedstate). Such a flash memory device is sometimes referred to as a binaryflash memory device.

A multi-state (also called multi-level) flash memory device isimplemented by identifying multiple distinct allowed/valid programmedthreshold voltage ranges separated by forbidden ranges. Each distinctthreshold voltage range corresponds to a predetermined value for the setof data bits encoded in the memory device.

Typically, the program voltage applied to the control gate during aprogram operation is applied as a series of pulses. In one embodiment,the magnitude of the pulses is increased with each successive pulse by apredetermined step size (e.g. 0.2v, 0.3v, 0.2v, or others). FIG. 1 showsa program voltage signal Vpgm that can be applied to the control gates(or, in some cases, steering gates) of flash memory cells. The programvoltage signal Vpgm includes a series of pulses that increase inmagnitude over time. In the periods between the program pulses, verifyoperations are carried out. That is, the programming level of each cellof a group of cells being programmed in parallel is read betweensuccessive programming pulses to determine whether it is equal to orgreater than a verify level to which it is being programmed. For arraysof multi-state flash memory cells, the memory cells may perform averification step of each state to allow a determination of whether thecell has reached its data associated verify level. For example, amulti-state memory cell capable of storing data in four states may needto perform verify operations for three compare points.

The choice of the magnitude of program voltage Vpgm is a compromise. Toohigh of a value will result in some memory cells being over-programmed,while too low of a value will result in longer programming times.Typically, users of non-volatile memory desire that the memory programquickly.

In the prior art devices, the same program signal is used for newdevices that have not been significantly used (also called freshdevices) and heavily used devices. However, as a non-volatile memorydevice undergoes many programming cycles, charge becomes trapped in theinsulation between the floating gate and the channel region. Thistrapping of charge shifts the threshold voltage to a higher level, whichallows the memory cell to program quicker. If the magnitude of theprogram signal is set too high, even though it does not result in overprogramming of a fresh device, as that device becomes more heavily usedthen that device may experience over programming. Thus, new devices willhave their program voltage set low enough to avoid over programming whenthe device is older. This lowering of the magnitude of the programvoltage will reduce the speed at which the fresh device programs data.

SUMMARY OF THE INVENTION

The technology described herein provides a solution for programming datafaster, without increasing the risk of over programming. To achieve thisresult, one set of programming characteristics are used to program a newdevice, while another set of programming characteristics are used toprogram the device after use of that device.

In one embodiment, the system programs a set of non-volatile storageelements during a first period using an increasing program signal with afirst initial value and subsequently programs the set of non-volatilestorage elements during a second period using an increasing programsignal with a second initial value, where the second period issubsequent to the first period and the second initial value is differentthan the first initial value.

One implementation includes a set of non-volatile storage elements andone or more managing circuits in communication with said non-volatilestorage elements. The one or more managing circuits receive a request toprogram data. In response to that request, the one or more managingcircuits program the non-volatile storage elements using a programmingsignal having a first starting value if an indication of usage for thenon-volatile storage elements indicates a first usage and program thenon-volatile storage elements using a programming signal having a secondstarting value if the indication of usage indicates a second usage. Oneexample of an indication of usage is a flag (one or more bits) that isstored in the non-volatile storage, a controller, a state machine orelsewhere. The flag stores data reflecting a measure of usage of thenon-volatile storage elements.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts one example of a program voltage that can be applied toone or more control gates of flash memory devices.

FIG. 2 is a top view of a NAND string.

FIG. 3 is an equivalent circuit diagram of the NAND string.

FIG. 4 is a cross-sectional view of the NAND string.

FIG. 5 is a block diagram of a non-volatile memory system.

FIG. 6 is a block diagram of a non-volatile memory array.

FIG. 7 depicts an example set of threshold voltage distributions.

FIG. 8 depicts an example set of threshold voltage distributions.

FIGS. 9A-C show various threshold voltage distributions and describe aprocess for programming non-volatile memory.

FIG. 10 is a chart describing programming performance.

FIG. 11 is a flow chart describing one embodiment of a process forprogramming non-volatile storage.

FIGS. 11A-D depicts program signals with initial pulses having differentmagnitudes.

FIG. 12 is a chart describing programming performance.

FIG. 13 is a flow chart describing one embodiment of a process forprogramming non-volatile storage.

FIG. 14 is a flow chart describing one embodiment of a process forincrementing the cycle count.

FIG. 15 is a flow chart describing one embodiment of a process forsetting the initial value for the program signal Vpgm.

FIG. 16 is a flow chart describing one embodiment of a process forprogramming non-volatile storage.

FIG. 17 is a flow chart describing one embodiment of a process forperforming a soft programming process.

FIG. 18 is a flow chart describing one embodiment of a process forwriting data to a flag.

FIG. 19 is a flow chart describing one embodiment of a process forprogramming non-volatile storage.

FIG. 20 is a flow chart describing one embodiment of a process forreading data.

DETAILED DESCRIPTION

One example of a non-volatile memory system suitable for implementingthe present invention uses the NAND flash memory structure, whichincludes arranging multiple transistors in series between two selectgates. The transistors in series and the select gates are referred to asa NAND string. FIG. 2 is a top view showing one NAND string. FIG. 3 isan equivalent circuit thereof. The NAND string depicted in FIGS. 2 and 3includes four transistors, 100, 102, 104 and 106, in series andsandwiched between a first select gate 120 and a second select gate 122.Select gate 120 connects the NAND string to bit line contact 126. Selectgate 122 connects the NAND string to source line contact 128. Selectgate 120 is controlled by applying the appropriate voltages to controlgate 120CG. Select gate 122 is controlled by applying the appropriatevoltages to control gate 122CG. Each of the transistors 100, 102, 104and 106 has a control gate and a floating gate. Transistor 100 hascontrol gate 100CG and floating gate 100FG. Transistor 102 includescontrol gate 102CG and floating gate 102FG. Transistor 104 includescontrol gate 104CG and floating gate 104FG. Transistor 106 includes acontrol gate 106CG and floating gate 106FG. Control gate 100CG isconnected to word line WL3, control gate 102CG is connected to word lineWL2, control gate 104CG is connected to word line WL1, and control gate106CG is connected to word line WL0. In one embodiment, transistors 100,102, 104 and 106 are each memory cells. In other embodiments, the memorycells may include multiple transistors or may be different than thatdepicted in FIGS. 2 and 3. Select gate 120 is connected to select lineSGD. Select gate 122 is connected to select line SGS.

FIG. 4 provides a cross-sectional view of the NAND string describedabove. As depicted in FIG. 4, the transistors of the NAND string areformed in p-well region 140. Each transistor includes a stacked gatestructure that consists of a control gate (100CG, 102CG, 104CG and106CG) and a floating gate (100FG, 102FG, 104FG and 106FG). The floatinggates are formed on the surface of the p-well on top of an oxide orother dielectric film. The control gate is above the floating gate, withan inter-polysilicon dielectric layer separating the control gate andfloating gate. The control gates of the memory cells (100, 102, 104 and106) form the word lines. N+ doped layers 130, 132, 134, 136 and 138 areshared between neighboring cells, whereby the cells are connected to oneanother in series to form a NAND string. These N+ doped layers form thesource and drain of each of the cells. For example, N+ doped layer 130serves as the drain of transistor 122 and the source for transistor 106,N+ doped layer 132 serves as the drain for transistor 106 and the sourcefor transistor 104, N+ doped layer 134 serves as the drain fortransistor 104 and the source for transistor 102, N+ doped layer 136serves as the drain for transistor 102 and the source for transistor100, and N+ doped layer 138 serves as the drain for transistor 100 andthe source for transistor 120. N+ doped layer 126 connects to the bitline for the NAND string, while N+ doped layer 128 connects to a commonsource line for multiple NAND strings.

Note that although FIGS. 2-4 show four memory cells in the NAND string,the use of four transistors is provided only as an example. A NANDstring used with the technology described herein can have less than fourmemory cells or more than four memory cells. For example, some NANDstrings will include 8 memory cells, 16 memory cells, 32 memory cells,64 memory cells, etc. The discussion herein is not limited to anyparticular number of memory cells in a NAND string.

Each memory cell can store data represented in analog or digital form.When storing one bit of digital data, the range of possible thresholdvoltages of the memory cell is divided into two ranges, which areassigned logical data “1” and “0.” In one example of a NAND-type flashmemory, the voltage threshold is negative after the memory cell iserased, and defined as logic “1.” The threshold voltage is positiveafter a program operation, and defined as logic “0.” When the thresholdvoltage is negative and a read is attempted by applying 0 volts to thecontrol gate, the memory cell will turn on to indicate logic one isbeing stored. When the threshold voltage is positive and a readoperation is attempted by applying 0 volts to the control gate, thememory cell will not turn on, which indicates that logic zero is stored.

A memory cell can also store multiple states, thereby storing multiplebits of digital data. In the case of storing multiple states of data,the threshold voltage window is divided into the number of states. Forexample, if four states are used, there will be four threshold voltageranges assigned to the data values “11,” “10,” and “00.” In one exampleof a NAND-type memory, the threshold voltage after an erase operation isnegative and defined as “11.” Positive threshold voltages are used forthe states of “10,” “01,” and “00.” In some implementations, the datavalues (e.g., logical states) are assigned to the threshold ranges usinga Gray code assignment so that if the threshold voltage of a floatinggate erroneously shifts to its neighboring physical state, only one bitwill be affected. The specific relationship between the data programmedinto the memory cell and the threshold voltage ranges of the celldepends upon the data encoding scheme adopted for the memory cells. Forexample, U.S. Pat. No. 6,222,762 and U.S. patent application Ser. No.10/461,244, “Tracking Cells For A Memory System,” filed on Jun. 13,2003, both of which are incorporated herein by reference in theirentirety, describe various data encoding schemes for multi-state flashmemory cells.

Relevant examples of NAND-type flash memories and their operation areprovided in the following U.S. patents/patent applications, all of whichare incorporated herein by reference in their entirety: U.S. Pat. No.5,570,315; U.S. Pat. No. 5,774,397; U.S. Pat. No. 6,046,935; U.S. Pat.No. 5,386,422; U.S. Pat. No. 6,456,528; and U.S. patent application Ser.No. 09/893,277 (Publication No. U.S. 2003/0002348). Other types ofnon-volatile memory in addition to NAND flash memory can also be usedwith the present invention.

Another type of memory cell useful in flash EEPROM systems utilizes anon-conductive dielectric material in place of a conductive floatinggate to store charge in a non-volatile manner. Such a cell is describedin an article by Chan et al., “A True Single-TransistorOxide-Nitride-Oxide EEPROM Device,” IEEE Electron Device Letters, Vol.EDL-8, No. 3, March 1987, pp. 93-95. A triple layer dielectric formed ofsilicon oxide, silicon nitride and silicon oxide (“ONO”) is sandwichedbetween a conductive control gate and a surface of a semi-conductivesubstrate above the memory cell channel. The cell is programmed byinjecting electrons from the cell channel into the nitride, where theyare trapped and stored in a limited region. This stored charge thenchanges the threshold voltage of a portion of the channel of the cell ina manner that is detectable. The cell is erased by injecting hot holesinto the nitride. See also Nozaki et al., “A 1-Mb EEPROM with MONOSMemory Cell for Semiconductor Disk Application,” IEEE Journal ofSolid-State Circuits, Vol. 26, No. 4, April 1991, pp. 497-501, whichdescribes a similar cell in a split-gate configuration where a dopedpolysilicon gate extends over a portion of the memory cell channel toform a separate select transistor. The foregoing two articles areincorporated herein by reference in their entirety. The programmingtechniques mentioned in section 1.2 of “Nonvolatile Semiconductor MemoryTechnology,” edited by William D. Brown and Joe E. Brewer, IEEE Press,1998, incorporated herein by reference, are also described in thatsection to be applicable to dielectric charge-trapping devices. Thememory cells described in this paragraph can also be used with thepresent invention. Thus, the technology described herein also applies tocoupling between dielectric regions of different memory cells.

Another approach to storing two bits in each cell has been described byEitan et al., “NROM: A Novel Localized Trapping, 2-Bit NonvolatileMemory Cell,” IEEE Electron Device Letters, vol. 21, no. 11, November2000, pp. 543-545. An ONO dielectric layer extends across the channelbetween source and drain diffusions. The charge for one data bit islocalized in the dielectric layer adjacent to the drain, and the chargefor the other data bit localized in the dielectric layer adjacent to thesource. Multi-state data storage is obtained by separately readingbinary states of the spatially separated charge storage regions withinthe dielectric. The memory cells described in this paragraph can also beused with the present invention.

FIG. 5 is a block diagram of one embodiment of a flash memory systemthat can be used to implement the present invention. Memory cell array202 is controlled by column control circuit 204, row control circuit206, c-source control circuit 210 and p-well control circuit 208. Columncontrol circuit 204 is connected to the bit lines of memory cell array202 for reading data stored in the memory cells, for determining a stateof the memory cells during a program operation, and for controllingpotential levels of the bit lines to promote the programming or toinhibit the programming. Row control circuit 206 is connected to theword lines to select one of the word lines, to apply read voltages, toapply program voltages and to apply an erase voltage. For example,program voltage levels used in EPROM and flash memory circuits arehigher than the voltages normally used in memory circuits. They areoften higher than the voltage supplied to the circuit. These highervoltages are preferably produced by a charge pump in row control circuit206 (or elsewhere), which in one example essentially dumps charge intothe capacitive wordline to charge it to a higher voltage. The chargepump receives an input at a voltage V_(in) and provides an output at ahigher voltage V_(out) by boosting the input voltage progressively in aseries of voltage multiplier stages. The voltage output is supplied to aload, for example the word line of an EPROM memory circuit. In someimplementations, there is a feedback signal from the load to the chargepump. The conventional prior art pump turns off in response to a signalindicating that the load has reached a predetermined voltage.Alternatively, a shunt is used to prevent overcharging once the loadreaches the predetermined voltage. However, this consumes more power andis undesirable in low power applications. More information about chargepumps can be found in U.S. Pat. No. 6,734,718, incorporated herein byreference in its entirety.

C-source control circuit 210 controls a common source line (labeled as“C-source” in FIG. 6) connected to the memory cells. P-well controlcircuit 208 controls the p-well voltage.

The data stored in the memory cells are read out by the column controlcircuit 204 and are output to external I/O lines via data input/outputbuffer 212. Program data to be stored in the memory cells are input tothe data input/output buffer 212 via the external I/O lines, andtransferred to the column control circuit 204. The external I/O linesare connected to controller 218.

Command data for controlling the flash memory device is input tocontroller 218. The command data informs the flash memory of whatoperation is requested. The input command is transferred to statemachine 216, which controls column control circuit 204, row controlcircuit 206, c-source control 210, p-well control circuit 208 and datainput/output buffer 212. State machine 216 can also output status dataof the flash memory such as READY/BUSY or PASS/FAIL. In someembodiments, state machine 216 is responsible for managing theprogramming process, including the processes depicted in the flow chartsdescribed below.

Controller 218 is connected or connectable with a host system such as apersonal computer, a digital camera, personal digital assistant, etc.Controller 218 communicates with the host in order to receive commandsfrom the host, receive data from the host, provide data to the host andprovide status information to the host. Controller 218 converts commandsfrom the host into command signals that can be interpreted and executedby command circuits 214, which is in communication with state machine216. Controller 218 typically contains buffer memory for the user databeing written to or read from the memory array. In some embodiments, theprogramming process can be managed by the controller.

One exemplar memory system comprises one integrated circuit thatincludes controller 218, and one or more integrated circuit chips thateach contain a memory array and associated control, input/output andstate machine circuits. The trend is to integrate the memory arrays andcontroller circuits of a system together on one or more integratedcircuit chips. The memory system may be embedded as part of the hostsystem, or may be included in a memory card (or other package) that isremovably inserted into the host systems. Such a removable card mayinclude the entire memory system (e.g. including the controller) or justthe memory array(s) and associated peripheral circuits (with theController being embedded in the host). Thus, the controller (or controlcapability) can be embedded in the host or included within a removablememory system.

In some implementations, some of the components of FIG. 5 can becombined. In various designs, one or more of the components of FIG. 5,other than memory cell array 202, can be thought of as a managingcircuit. For example, one or more managing circuits may include any oneof or a combination of a command circuit, a state machine, a row controlcircuit, a column control circuit, a well control circuit, a sourcecontrol circuit or a data I/O circuit.

With reference to FIG. 6, an example structure of memory cell array 202is described. As one example, a NAND flash EEPROM is described that ispartitioned into 1,024 blocks. The data stored in each block issimultaneously erased. In one embodiment, the block is the minimum unitof cells that are simultaneously erased. In each block, in this example,there are 8,512 columns that are divided into even columns and oddcolumns. The bit lines are also divided into even bit lines (BLe) andodd bit lines (BLo). FIG. 6 shows four memory cells connected in seriesto form a NAND string. Although four cells are shown to be included ineach NAND string, more or less than four memory cells can be used. Oneterminal of the NAND string is connected to corresponding bit line via aselect transistor SGD, and another terminal is connected to c-source viaa second select transistor SGS.

During one embodiment of read and programming operations, 4,256 memorycells are simultaneously selected. The memory cells selected have thesame word line and the same kind of bit line (e.g. even bit lines or oddbit lines). Therefore, 532 bytes of data can be read or programmedsimultaneously. These 532 bytes of data that are simultaneously read orprogrammed form a logical page. Therefore, one block can store at leasteight logical pages (four word lines, each with odd and even pages).When each memory cell stores two bits of data (e.g., multi-state memorycells), wherein each of these two bits are stored in a different page,one block stores 16 logical pages. Other sized blocks and pages can alsobe used with the present invention. Additionally, architectures otherthan that of FIGS. 5 and 6 can also be used to implement the presentinvention. For example, in one embodiment the bit lines are not dividedinto odd and even bit lines so that all bit lines are programmed andread concurrently (or not concurrently).

Memory cells are erased by raising the p-well to an erase voltage (e.g.20 volts) and grounding the word lines of a selected block. The sourceand bit lines are floating. Erasing can be performed on the entirememory array, separate blocks, or another unit of cells. Electrons aretransferred from the floating gate to the p-well region and thethreshold voltage becomes negative (in one embodiment).

In the read and verify operations, the select gates (SGD and SGS) andthe unselected word lines (e.g., WL0, WL2 and WL3) are raised to a readpass voltage (e.g. 4.5 volts) to make the transistors operate as passgates. The selected word line (e.g. WL1) is connected to a voltage, alevel of which is specified for each read and verify operation in orderto determine whether a threshold voltage of the concerned memory cell isabove or below such level. For example, in a read operation for a twolevel memory cell, the selected word line WL1 may be grounded, so thatit is detected whether the threshold voltage is higher than 0V. In averify operation for a two level memory cell, the selected word line WL1is connected to 0.8V, for example, so that it is verified whether or notthe threshold voltage has reached at least 0.8V. The source and p-wellare at zero volts. The selected bit lines (BLe) are pre-charged to alevel of, for example, 0.7V. If the threshold voltage is higher than theread or verify level on the word line, the potential level of the bitline (BLe) associated with the cell of interest maintains the high levelbecause of the non-conductive memory cell. On the other hand, if thethreshold voltage is lower than the read or verify level, the potentiallevel of the concerned bit line (BLe) decreases to a low level, forexample less than 0.5V, because of the conductive memory celldischarging the bitline. The state of the memory cell is therebydetected by a voltage comparator sense amplifier that is connected tothe bit line.

The erase, read and verify operations described above are performedaccording to techniques known in the art. Thus, many of the detailsexplained can be varied by one skilled in the art. Other erase, read andverify techniques known in the art can also be used.

As described above, each block can be divided into a number of pages. Inone embodiment, a page is a unit of programming. In someimplementations, the individual pages may be divided into segments andthe segments may contain the fewest number of cells that are written atone time as a basic programming operation. One or more pages of data aretypically stored in one row of memory cells. A page can store one ormore sectors. A sector includes user data and overhead data. Overheaddata typically includes an Error Correction Code (ECC) that has beencalculated from the user data of the sector. A portion of the controllercalculates the ECC when data is being programmed into the array, andalso checks it when data is being read from the array. Alternatively,the ECCs and/or other overhead data are stored in different pages, oreven different blocks, than the user data to which they pertain. Inother embodiments, other parts of the memory device (e.g., statemachine) can calculate the ECC.

A sector of user data is typically 512 bytes, corresponding to the sizeof a sector in magnetic disk drives. Overhead data is typically anadditional 16-20 bytes. A large number of pages form a block, anywherefrom 8 pages, for example, up to 32, 64 or more pages.

FIG. 7 illustrates threshold voltage distributions for the memory cellarray when each memory cell stores two bits of data. FIG. 7 shows afirst threshold voltage distribution E for erased memory cells. Threethreshold voltage distributions, A, B and C for programmed memory cells,are also depicted. In one embodiment, the threshold voltages in the Edistribution are negative and the threshold voltages in the A, B and Cdistributions are positive.

Each distinct threshold voltage range of FIG. 7 corresponds topredetermined values for the set of data bits. The specific relationshipbetween the data programmed into the memory cell and the thresholdvoltage levels of the cell depends upon the data encoding scheme adoptedfor the cells. One example assigns “11” to threshold voltage range E(state E), “10” to threshold voltage range A (state A), “00” tothreshold voltage range B (state B) and “01” to threshold voltage rangeC (state C). However, in other embodiments, other schemes are used.

FIG. 7 also shows three read reference voltages, Vra, Vrb and Vrc, forreading data from memory cells. By testing whether the threshold voltageof a given memory cell is above or below Vra, Vrb and Vrc, the systemcan determine what state the memory cell is in. FIG. 7 also shows threeverify reference voltages, Vva, Vvb and Vvc. When programming memorycells to state A, the system will test whether those memory cells have athreshold voltage greater than or equal to Vva. When programming memorycells to state B, the system will test whether the memory cells havethreshold voltages greater than or equal to Vvb. When programming memorycells to state C, the system will determine whether memory cells havetheir threshold voltage greater than or equal to Vvc.

In one embodiment, known as full sequence programming, memory cells canbe programmed from the erase state E directly to any of the programmedstates A, B or C (as depicted by the curved arrows). For example, apopulation of memory cells to be programmed may first be erased so thatall memory cells in the population are in erased state E. While somememory cells are being programmed from state E to state A, other memorycells are being programmed from state E to state B and/or from state Eto state C.

FIG. 8 illustrates an example of a two-pass technique of programming amulti-state memory cell that stores data for two different pages: alower page and an upper page. Four states are depicted: state E (11),state A (10), state B (00) and state C (01). For state E, both pagesstore a “1.” For state A, the lower page stores a “0” and the upper pagestores a “1.” For state B, both pages store “0.” For state C, the lowerpage stores “1” and the upper page stores “0.” Note that althoughspecific bit patterns have been assigned to each of the states,different bit patterns may also be assigned. In a first programmingpass, the cell's threshold voltage level is set according to the bit tobe programmed into the lower logical page. If that bit is a logic “1,”the threshold voltage is not changed since it is in the appropriatestate as a result of having been earlier erased. However, if the bit tobe programmed is a logic “0,” the threshold level of the cell isincreased to be state A, as shown by arrow 230. That concludes the firstprogramming pass.

In a second programming pass, the cell's threshold voltage level is setaccording to the bit being programmed into the upper logical page. Ifthe upper logical page bit is to store a logic “1,” then no programmingoccurs since the cell is in one of the states E or A, depending upon theprogramming of the lower page bit, both of which carry an upper page bitof “1.” If the upper page bit is to be a logic “0,” then the thresholdvoltage is shifted. If the first pass resulted in the cell remaining inthe erased state E, then in the second phase the cell is programmed sothat the threshold voltage is increased to be within state C, asdepicted by arrow 234. If the cell had been programmed into state A as aresult of the first programming pass, then the memory cell is furtherprogrammed in the second pass so that the threshold voltage is increasedto be within state B, as depicted by arrow 232. The result of the secondpass is to program the cell into the state designated to store a logic“0” for the upper page without changing the data for the lower page.

In one embodiment, a system can be set up to perform full sequencewriting if enough data is written to fill up an entire page. If notenough data is written for a full page, then the programming process canprogram the lower page with the data received. When subsequent data isreceived, the system will then program the upper page. In yet anotherembodiment, the system can start writing in the mode that programs thelower page and convert to full sequence programming mode if enough datais subsequently received to fill up an entire (or most of a) word line'smemory cells. More details of such an embodiment are disclosed in U.S.patent application titled “Pipelined Programming of Non-VolatileMemories Using Early Data,” Ser. No. 11/013,125, filed on Dec. 14, 2004,inventors Sergy Anatolievich Gorobets and Yan Li, incorporated herein byreference in its entirety.

FIGS. 9A-C disclose another process for programming non-volatile memorythat reduces floating gate to floating gate coupling by, for anyparticular memory cell, writing to that particular memory cell withrespect to a particular page subsequent to writing to adjacent memorycells for previous pages. In one example of an implementation of theprocess taught by FIGS. 9A-C, the non-volatile memory cells store twobits of data per memory cell, using four data states. For example,assume that state E is the erased state and states A, B and C are theprogrammed states. State E stores data 11. State A stores data 01. StateB stores data 10. State C stores data 00. This is an example of non-Graycoding because both bits change between adjacent states A & B. Otherencodings of data to physical data states can also be used. Each memorycell stores two pages of data. For reference purposes these pages ofdata will be called upper page and lower page; however, they can begiven other labels. With reference to state A for the process of FIG. 9,the upper page stores bit 0 and the lower page stores bit 1. Withreference to state B, the upper page stores bit 1 and the lower pagestores bit 0. With reference to state C, both pages store bit data 0.The programming process of FIG. 9 is a two-step process. In the firststep, the lower page is programmed. If the lower page is to remain data1, then the memory cell state remains at state E. If the data is to beprogrammed to 0, then the threshold of voltage of the memory cell israised such that the memory cell is programmed to state B′. FIG. 9Atherefore shows the programming of memory cells from state E to stateB′. State B′ depicted in FIG. 9A is an interim state B; therefore, theverify point is depicted as Vvb′, which is lower than Vvb.

In one embodiment, after a memory cell is programmed from state E tostate B′, its neighbor memory cell on an adjacent word line will then beprogrammed with respect to its lower page. After programming theneighbor memory cell, the floating gate to floating gate coupling effectwill raise the apparent threshold voltage of memory cell underconsideration, which is in state B′. This will have the effect ofwidening the threshold voltage distribution for state B′ to thatdepicted as threshold voltage distribution 250 of FIG. 9B. This apparentwidening of the threshold voltage distribution will be remedied whenprogramming the upper page.

FIG. 9C depicts the process of programming the upper page. If the memorycell is in erased state E and the upper page is to remain at 1, then thememory cell will remain in state E. If the memory cell is in state E andits upper page data is to be programmed to 0, then the threshold voltageof the memory cell will be raised so that the memory cell is in state A.If the memory cell was in intermediate threshold voltage distribution250 and the upper page data is to remain at 1, then the memory cell willbe programmed to final state B. If the memory cell is in intermediatethreshold voltage distribution 250 and the upper page data is to becomedata 0, then the threshold voltage of the memory cell will be raised sothat the memory cell is in state C. The process depicted by FIGS. 9A-Creduces the effect of floating gate to floating gate coupling becauseonly the upper page programming of neighbor memory cells will have aneffect on the apparent threshold voltage of a given memory cell. Anexample of an alternate state coding is to move from distribution 250 tostate C when the upper page data is a 1, and to move to state B when theupper page data is a 0. Although FIGS. 9A-C provide an example withrespect to four data states and two pages of data, the concepts taughtby FIGS. 19A-C can be applied to other implementations with more or lessthan four states and different than two pages. More detail about variousprogramming schemes and floating gate to floating gate coupling can befound in U.S. patent application Ser. No. 11/099,133, titled“Compensating For Coupling During Read Operations Of Non-VolatileMemory,” filed on Apr. 5, 2005.

FIG. 10 provides a table that describes examples of performance duringprogramming of non-volatile memory. Data is provided for fresh devices(unused) and devices that have already performed 10,000 programmingcycles. In one embodiment, a programming cycle includes the actions ofprogramming and erasing (or erasing and then programming). In otherembodiments, the programming cycle can include programming withouterasing. The table of FIG. 10 shows how many programming pulses (Vpgm)are used to program data into the lower pages and upper pages accordingto the method described above with respect to FIG. 8. There's also datafor performing full sequence programming according to the methoddescribed with respect to FIG. 7. In both cases, the magnitude of theinitial pulse is 16.0 volts and the step size is 0.3 volts. As depictedin FIG. 10, the average programming time for a fresh device was 800 μsecand the average programming time for the used device is 650 μsec. Freshdevices required approximately 3 more programming pulses than cycleddevices. In addition, fresh devices required more program pulses duringthe soft programming process (described below).

To increase the speed of the programming process, without unreasonablyincreasing the risk of over-programming, it is proposed to use one setof programming parameters when programming a fresh device and anotherset of programming parameters when programming a device that has beensubject to a certain amount of use.

In one embodiment, fresh devices and used devices can be programmed withdifferent programming parameters by varying the magnitude of the initialprogramming pulse of the programming signal Vpgm (see e.g. FIG. 1). FIG.11 is a flow chart describing one embodiment of a process forprogramming non-volatile memory by varying the magnitude of the initialprogramming pulse over time. In step 300, the initial programmingvoltage is set. That is, the device determines the magnitude of thefirst pulse for the program signal Vpgm. In one example depicted in FIG.11A, the magnitude of the first pulse of the program voltage applied tothe controls gate is 16.9v. Each successive pulse has a magnitudeincreased by 0.3v in comparison to the previous pulse. In step 302, thedevice is operated for N cycles, where the number N is predetermined inadvance or determined on the fly. In step 304, after N cycles, themagnitude of the initial programming pulse for Vpgm is decreased. In oneexample depicted in FIG. 11B, the magnitude of the first pulse of theprogram voltage Vpgm applied to the controls gates is decreased to16.6v. Each successive pulse has a magnitude increased by 0.3v incomparison to the previous pulse. In step 306, the device is operatedfor M cycles (M can be the same or different than N), where themagnitude of the number M is determined in advance or on the fly. Instep 308, after operating for N+M cycles, the initial programmingvoltage is decreased to a new value. In one example depicted in FIG.11C, the magnitude of the first pulse of the program voltage Vpgmapplied to the controls gates is decreased to 16.3v. Each successivepulse has a magnitude increased by 0.3v in comparison to the previouspulse. In step 310, the device is operated for an additional P cycles,where the magnitude of P is known in advance or determined on the fly.In step 312, the magnitude of the initial pulse for the program voltageVpgm is decreased. In one example depicted in FIG. 11D, the magnitude ofthe first pulse of the program voltage Vpgm applied to the controlsgates is decreased to 16.0v. Each successive pulse has a magnitudeincreased by 0.3v in comparison to the previous pulse. In step 314, thedevice is operated with the new initial pulse. The process of decreasingthe magnitude of the initial programming pulse can continue for as manysteps as desired.

FIG. 12 provides a table with example performance metrics correspondingto the process of FIG. 11. In one embodiment, the initial programmingpulse will have a magnitude set at 16.9 volts in step 300. After 1Kprogramming cycles (step 302), the magnitude of the initial pulse willbe decreased to 16.6 volts (step 304). After operating for approximately3,000 cycles the magnitude of the initial pulse will be lowered to 16.3volts and the programming voltage will then increase at 0.3 volts perpulse. After operating for 10,000 cycles, the initial program pulse willhave its magnitude set to 16.0 volts. With this scheme, the number ofpulses for programming the lower page will be 10; for programming theupper page will be 15; and for programming full sequence will be 19. Theperformance during the programming process is constant throughout thelife of the device. The programming performance of a fresh part hasincreased without an increase in over-programming.

FIG. 13-20 provide additional details of various embodiments forimplementing the concepts associated with FIG. 11. In addition tocounting the programming cycles, as explained above with respect to FIG.12, other embodiments include counting the number of soft program pulsesneeded to perform soft programming. When the number of soft programmingpulses reaches a threshold, the magnitude of the initial programmingpulse will be changed. In another embodiment, the system will count thenumber of programming iterations (or pulses) during a programmingparticular cycle. When the number of iterations (or pulses) exceeds thethreshold, then the magnitude of the initial programming pulse willchange. In yet another embodiment, the system may decide to change theinitial magnitude based on the amount of error correction used during aread process. Any of these schemes for adjusting the programmingcharacteristics can be applied on the entire device as a whole (e.g.,the entire memory array), on a block by block basis, or on anothersubset of the memory. The process can be performed by the controller,the state machine, a combination of both, or another structure.

FIG. 13 is a flow chart describing more details of programming memorycells, where the system counts the number of program cycles and adjuststhe magnitude of the initial programming pulse accordingly. The processof FIG. 13 can be performed in response to receiving a request toprogram data. In step 402, the system will select the appropriateportions of memory to program. This may include selecting a block and/orpage and/or sector to write to. At step 404, the cycle count isincremented. The cycle count is a count of the number of programmingcycles. The cycle count can be stored in the flash memory array, thestate machine, the controller, or another location. In one embodiment,the cycle count is stored in a register associated with the statemachine. At step 406, the selected portion of memory is pre-programmed,which provides for even wearing of the flash memory. All memory cells inthe chosen sector or page are programmed to the same threshold voltagerange. Step 406 is an optional step. At step 408, all the memory cellsto be programmed are then erased. For example, step 408 can includemoving old memory cells to state E (see FIGS. 7-9). At step 410, thesystem performs a soft programming process. During the erase process, itis possible that some of the memory cells have their threshold voltageslowered to a value that is below the distribution E (see FIGS. 7-9). Thesoft programming process will apply program voltage pulses similar toFIG. 1 to memory cells so that their threshold voltages will increase tobe within threshold voltage distribution E. In step 412, the system willaccess a flag that indicates the magnitude of the initial program pulse.For example, using the table of FIG. 12, if the part had performed 1,000cycles, the magnitude of the program pulse for the initial pulse will be16.6 volts. That initial value is set at step 412 by properlyprogramming the charge pump. At step 414, the program count PC will beset to initially be zero. In step 416, a program pulse is applied to theappropriate word line(s). In step 418, the memory cells on that wordline(s) are verified to see if they have reached the target thresholdvoltage level. If all the memory cells have reached the target thresholdvoltage level (step 420), then the programming process has completedsuccessfully (status=pass) in step 422. If not all the memory cells havebeen verified, then it is determined in step 424 whether the programcount PC is less than 20. If the program count is not less than 20, thenthe programming process has failed (step 426). If the program count isless than 20, than in step 428, the magnitude of program voltage signalVpgm is incremented by the step size (e.g. 0.3v) for the next pulse andthe program count PC is incremented. Note that those memory cells thathave reached their target threshold voltage are locked out ofprogramming for the remainder of the current programming cycle. Afterstep 428, the process of FIG. 13 continues at step 416 and the nextprogram pulse is applied.

FIG. 14 is a flowchart describing the process of incrementing the cyclecount and adjusting the flag, which is performed as part of step 404 ofFIG. 13. In step 460, the cycle count (labeled CO) is incremented. Thecycle count represents the number of program cycles that have beenperformed on this particular device, block, etc. In step 462, it isdetermined whether the cycle count is less than a first threshold. Oneexample of a first threshold is 1,000. If the cycle count is less thanthe first threshold, then there's no change to the flag in step 464. Theflag can be a set of one or more bits that store an indication of whichmagnitude to use for the initial program pulse. In one embodiment, theflag can be stored in the flash memory array. In another embodiment, theflag can be stored in a register associated with the state machine orwith the controller. In an embodiment that includes four potentialmagnitudes for the starting pulse, the flag would need to be able tostore four values; therefore, the flag would need to be 2 bits. For easeof design, it may be desirable to have the flag include one byte. If itis determined at step 462 that the cycle count is not less than thefirst threshold, then it is determined in step 466 where the cycle countis less than a second threshold. An example of the second threshold is3,000 cycles. If the cycle count is less than the second threshold, thenthe flag is overwritten with an indication that identifies the magnitudeof the initial program pulse to be the magnitude associated with a freshdevice shift by a small amount. For example, when the device passes thefirst threshold, the initial Vpgm (e.g. 16.9 volts) is decreased by thesmall shift (0.3 volts) to 16.6 volts at step 468. If in step 466 it isdetermined that the cycle count CO is not less than the secondthreshold, then at step 470 it is determined whether the cycle count isless than the third threshold. If the cycle count is less than the thirdthreshold, then the cycle count is between the second and thirdthreshold and the system will overwrite the flag with an indication thatidentifies a medium shift from the initial program pulse magnitudeassociated with a fresh device. For example, the initial program voltagewill be downshifted by two steps (e.g., 0.6 volts). If the cycle countis not less than the third threshold, then the initial program voltageof a fresh device will be shifted down by the large shift, which caninclude three steps (e.g., 0.9 volts). Thus, in step 474, the flagindicates that the magnitude for the initial program pulse should be16.0 volts in the example of FIG. 12. In some embodiments, the flag neednot be overwritten if its value does not change. The flag written inFIG. 14 is the flag that is checked in step 412 of FIG. 13.

FIG. 15 is a flow chart describing the process for setting the magnitudeof the initial pulse for the programming signal Vpgm, which is performedas part of step 412 of FIG. 13. In step 500, the flag written to by theprocess of FIG. 14 is read. If the flag indicates a large shift (step502) then the magnitude of the initial pulse for the programming signalVpgm is set to the initial magnitude less a large shift. Using theexample of FIG. 12, the initial programming voltage Vpgm0 associatedwith a fresh device is 16.9 volts and the large shift is 0.9 volts;therefore, step 504 shifts the magnitude of the initial pulse to 16.0volts. If the flag does not indicate a large shift (step 502), then thesystem determines whether the flag indicates a medium shift (step 506).If so, then the magnitude of the first pulse is set to Vpgm0 (e.g.,16.9v) less a medium shift (e.g., 0.6v). In the example of FIG. 12, step508 would set the magnitude of the initial pulse to 16.3 volts. If theflag does not indicate a medium shift, then it is determined whether theflag indicates a small shift (step 510). If the flag indicates a smallshift, then the magnitude of the first pulse is set to Vpgm0 less asmall shift (e.g., 0.3v) in step 512. If the flag does not indicate asmall shift, then the magnitude of the first pulse remains at Vpgm0(e.g., 16.9v).

FIG. 16 is a flow chart describing a programming process for anembodiment which determines the magnitude for the initial programmingpulse based on performance during the soft programming process. Steps532, 534 and 536 of FIG. 16 are similar to steps 402, 406 and 408,respectively of FIG. 13. Step 540 of FIG. 16 is similar to step 412 ofFIG. 13. Steps 542, 544, 546, 548, 550, 552, 554, and 556 of FIG. 16 aresimilar to steps 414, 416, 418, 420, 422, 424, 426, and 428 of FIG. 13.

FIG. 17 is a flow chart describing the process of soft programming andappropriately adjusting the flag, as performed in step 538 of FIG. 16.The process of FIG. 17 uses a set of pulses with increasing magnitudesimilar to the signal of FIG. 1. Because this is used during a softprogramming process, the signal is referred to as Vspgm and the pulsesare referred to as soft programming pulses. In step 560 of FIG. 17, theinitial pulse has its magnitude set. In one embodiment, the magnitude ofthe initial pulse during soft programming is approximately 14 volts.Other values can also be used. Additionally, the loop count LC is set atzero. In step 562, a soft program pulse is applied to the word line(s)of the selected memory cells. In step 564, a verification process isperformed to see whether the memory cells have their threshold voltagewithin distribution E (see FIG. 7-9). If not all the memory cellsverified having their threshold voltage in distribution E, then the softprogram voltage signal Vspgm is incremented to the next pulse and theloop count LC is increased by 1. After step 568, the process loops backto 562. The loop of steps 562, 564, 566, and 568 will continue until allthe memory cells have verified or the process stops because the systemconcluded that an error has occurred. For example, the system may limitthe number of iterations to no more than 20. After 20, iterations thesystem will conclude that the memory cells whose threshold voltage arestill below threshold distribution E are damaged and will remove thosefrom normal operational use.

Once all the memory cells verify (step 566), the process will continueat step 570 and the system will determine whether the loop count LC isless than 15. If not, then the flag will be written with an indicationthat no shifts should be done from Vpgm0. This corresponds to a freshdevice. If the loop count is less than 15, then at step 574 it isdetermined whether the loop count is less than 13. If the loop count isnot less than 13 (e.g., LC=13 or 14) then the flag will be written toindicate a small shift from Vpgm0. If the loop count LC is less then 13,then it is tested whether the loop count is less than 11 at step 578. Ifthe loop count is not less than 11, then the system will write to theflag to indicate that a medium shift from Vpgm0 should be used at step580. If the loop count is less than 11, an indication is stored in theflag to indicate a larger shift from Vpgm0 should be used for themagnitude of the initial programming pulse.

FIG. 18 is a flow chart describing one embodiment of a process forwriting to the flag bits. This embodiment prevents the flag fromincreasing the magnitude of the initial programming pulse. That is oncea medium shift is used, the flag will not allow a small shift to beused. This way the initial magnitude of the program signal will stay thesame or decrease but never increase. In other embodiments, otherbehaviors can be used. At step 600 of FIG. 18, it is determined that theflag needs to be written to indicate a particular shift from Vpgm0. Inone embodiment, step 600 includes performing the processes of FIG. 14 orFIG. 17. In step 602, it is determined whether the flag alreadyindicates a shift by that amount or greater. If so, the flag is notwritten to at step 604. If not, the flag is written to indicate the newshift from the Vpgm0.

FIG. 19 is a flow chart describing one embodiment of a process forprogramming non-volatile memory that counts a number of iterations in aprogramming cycle in order to determine how to set the magnitude of theinitial programming pulse in a future programming cycle. Steps 650, 652,654, 656, 658, 660, 662, 664, 666, 668, 670, and 672 of FIG. 19 are thesame as steps 402, 406, 408, 410, 412, 414, 416, 418, 420, 424, 426, and428 of FIG. 13, respectively. One difference is that after verificationat step 664, if all the memory cells verify (step 666) then in step 680,it is determined whether the program count PC is less than 9. Step 662,664, 666, 668, and 672 form a loop which is continually iterated untilall the memory cells program or the program count reaches 20 (or adifferent number in other embodiments). If a number of iterations ofthat loop is less than 9, then a flag is incremented in step 684. If thenumber of iterations is not less than 9, then the process of programmingcompletes without changing the flag. Each time the flag is incrementedat step 684, the system will change (e.g. lower) the magnitude of theinitial pulse of the programming signal. The flag is checked in step658, the next time the process of FIG. 19 is performed. Thus, forexample, if the magnitude of the initial programming voltage pulse is16.9 volts, then the system will continue to use a program voltagesignal where the initial pulse has a magnitude of 16.9 volts until thenumber of iterations needed to program the memory is less than 9. Oncethe number of iterations less than 9, then the flag will increment. Thenext time a programming process is performed, at step 658 the systemwill see that the flag has been incremented and will change the value ofthe magnitude of the initial program pulse from 16.9 down to 16.6. Thiswill cause the number of iterations to rise up again. Eventually thenumber of iterations of the process of FIG. 19 will be less than 9 inwhich case the flag will be incremented and the initial pulse will haveits magnitude lowered to 16.3, and so on. Note that in FIG. 19 the valueof 9 in step 680 can be changed to other values.

FIG. 20 is a flow chart describing one embodiment of such a process thatdetermines whether to lower the magnitude of the initial programmingpulse based on the amount of errors detected during a previous readoperation. The process of FIG. 20 is performed in response to a requestto read data. In step 700, a normal read operation is performed for apage of data. This operation will be performed by various techniquesknown in the art. In step 702, error correction codes stored with theread data are checked to see whether there are any errors. If there areno errors, the data is reported in step 704. If there are errors, thenin step 706 it is determined whether the errors are correctable. If theerror is not correctable, then at step 708, an error is reported. If theerror is correctable, then the error is corrected at step 710 and thedata is reported at step 712. At step 714, the system determines whetherthe amount of error correction exceeded a threshold. One example of athreshold is whether more than 2 bits per sector had an error. Otherthresholds can also be used. If the error exceeded that threshold, thenthe flag is incremented in step 718. If the error does not exceed thethreshold, the flag will not be incremented. When the device is fresh,the flag is at zero. After the flag is incremented, the next time theprogramming process is performed the system will change the magnitude ofthe initial programming pulse. For example, the process of FIG. 13 canbe used (without step 404) for programming. When performing step 412 theflag will be accessed and if it had been incremented since the last timeit was accessed, the magnitude of the first program pulse will be onestep below the previously used magnitude.

Although many of the examples for changing the programming parameterspertain to lowering the magnitude of the initial programming pulse,other parameters can also be changed. Additionally, other tasks can alsobe used to determine when to lower the magnitude of the initial pulse orotherwise change the programming parameters.

In an alternative embodiment, the program signal applied to the controlgates/word lines can be of a waveform different than a set of pulseswith increasing magnitudes.

The foregoing detailed description of the invention has been presentedfor purposes of illustration and description. It is not intended to beexhaustive or to limit the invention to the precise form disclosed. Manymodifications and variations are possible in light of the aboveteaching. The described embodiments were chosen in order to best explainthe principles of the invention and its practical application, tothereby enable others skilled in the art to best utilize the inventionin various embodiments and with various modifications as are suited tothe particular use contemplated. It is intended that the scope of theinvention be defined by the claims appended hereto.

1. A method for operating non-volatile storage, comprising: programmingnon-volatile storage elements for multiple programming cycles using setsof programming pulses with a first initial magnitude; reading data fromnon-volatile storage elements; determining existence of one or moreerrors in the data from the reading of the data; determining whether theone or more errors satisfy a threshold level; continuing to programnon-volatile storage elements using programming pulses with the firstinitial magnitude in response to determining that the one or more errorsdo not satisfy the threshold level; and programming non-volatile storageelements for multiple programming cycles using programming pulses with asecond initial magnitude in response to determining that the one or moreerrors satisfy the threshold level, the second initial magnitude isdifferent than the first initial magnitude.
 2. The method of claim 1,wherein: the reading data is performed in response to a read request;and the determining existence of one or more errors in the data isperformed in response to the reading of data.
 3. The method of claim 1,wherein: the programming the set of non-volatile storage elements formultiple programming cycles programs one page of data during each cycle;and the reading data includes reading one page of data.
 4. The method ofclaim 1, wherein: the determining existence of one or more errors in thedata is based on error correction codes.
 5. The method of claim 1,further comprising: correcting the one or more errors in the data. 6.The method of claim 5, wherein: the determining whether the one or moreerrors satisfy the threshold level is based on the correcting of the oneor more errors.
 7. The method of claim 1, wherein: the determiningwhether the error satisfies the threshold level includes determiningwhether more than a predetermined number of bits of the data are inerror.
 8. The method of claim 1, wherein: the programming non-volatilestorage elements for multiple programming cycles using programmingpulses with the second initial magnitude is performed after theprogramming non-volatile storage elements for multiple programmingcycles using sets of programming pulses with the first initialmagnitude.
 9. The method of claim 1, wherein: the programming the set ofnon-volatile storage elements for multiple programming cycles using setsof programming pulses with the first initial magnitude and thecontinuing to program the non-volatile storage elements usingprogramming pulses with the first initial magnitude are only performedprior to the programming of the set of non-volatile storage elements formultiple programming cycles using programming pulses with the secondinitial magnitude.
 10. The method of claim 1, wherein: the secondinitial magnitude is lower than the first initial magnitude.
 11. Anon-volatile storage system, comprising: non-volatile storage elements;and one or more managing circuits in communication with the non-volatilestorage elements, the one or more managing circuits program thenon-volatile storage elements for multiple programming cycles using setsof programming pulses with a first initial magnitude, the one or moremanaging circuits read data from the non-volatile storage elements anddetermine existence of one or more errors in the data in response to thereading, the one or more managing circuits determine whether the one ormore errors satisfy a threshold level, the one or more managing circuitscontinue to program the non-volatile storage elements using programmingpulses with the first initial magnitude in response to determining thatthe one or more errors do not satisfy the threshold level, the one ormore managing circuits program the non-volatile storage elements formultiple programming cycles using programming pulses with a secondinitial magnitude in response to determining that the one or more errorssatisfy the threshold level and after programming using programmingpulses with the first initial, the second initial magnitude is differentthan the first initial magnitude.
 12. The non-volatile storage system ofclaim 11, wherein: the reading data is performed in response to a readrequest; the determining existence of one or more errors in the data isperformed in response to the reading of data; the second initialmagnitude is lower than the first initial magnitude; and thenon-volatile storage elements are NAND flash memory devices.
 13. Thenon-volatile storage system of claim 11, wherein: the one or moremanaging circuits correct the one or more errors in the data; the one ormore managing circuits determine existence of one or more errors in thedata based on error correction codes; and the one or more managingcircuits determine whether the one or more errors satisfy the thresholdlevel based on the correcting the one or more errors.
 14. Thenon-volatile storage system of claim 11, wherein: the one or moremanaging circuits determine whether the one or more errors satisfy thethreshold level by determining whether more than a predetermined numberof bits are in error.