Soft programming non-volatile memory utilizing individual verification and additional soft programming of subsets of memory cells

ABSTRACT

A set of non-volatile storage elements is divided into subsets for soft programming in order to more fully soft-program slower soft programming elements. The entire set of elements is soft-programmed until verified as soft programmed (or until a first subset of elements is verified as soft programmed while excluding a second subset from verification). After the set is verified as soft programmed, a first subset of elements is inhibited from further soft programming while additional soft programming is carried out on a second subset of elements. The second subset can include slower soft programming elements. The second subset can then undergo soft programming verification while excluding the first subset from verification. Soft programming and verifying for the second subset can continue until it is verified as soft programmed. Different step sizes can be used for increasing the size of the soft programming signal, depending on which subset is being soft programmed and verified.

PRIORITY CLAIM

The present application claims priority from U.S. Provisional Patent Application No. 60/667,043, entitled “NON-VOLATILE MEMORY ERASE OPERATIONS WITH OVER-ERASE PROTECTION,” by Hemink et al., filed Mar. 31, 2005, incorporated by reference herein in its entirety.

CROSS-REFERENCE TO RELATED APPLICATIONS

The following applications are cross-referenced and incorporated by reference herein in their entirety:

U.S. patent application Ser. No. 11/296,055, now U.S. Pat. No. 7,403,424, entitled, “ERASING NON-VOLATILE MEMORY USING INDIVIDUAL VERIFICATION AND ADDITIONAL ERASING OF SUBSETS OF MEMORY CELLS,” by Hemink et al., filed concurrently;

U.S. patent application Ser. No. 11/296,028, now U.S. Pat. No. 7,400,537, entitled, “SYSTEMS FOR ERASING NON-VOLATILE MEMORY USING INDIVIDUAL VERIFICATION AND ADDITIONAL ERASING OF SUBSETS OF MEMORY CELLS,” by Hemink et al., filed concurrently;

U.S. patent application Ser. No. 11/296,071, entitled, “SYSTEMS FOR SOFT PROGRAMMING NON-VOLATILE MEMORY UTILIZING INDIVIDUAL VERIFICATION AND ADDITIONAL SOFT PROGRAMMING OF SUBSETS OF MEMORY CELLS,” by Hemink et al., filed concurrently;

U.S. patent application Ser. No. 11/295,755, entitled, “ERASING NON-VOLATILE MEMORY UTILIZING CHANGING WORD LINE CONDITIONS TO COMPENSATE FOR SLOWER ERASING MEMORY CELLS,” by Masaaki Higashitani, filed concurrently; and

U.S. patent application Ser. No. 11/296,032, entitled, “SYSTEMS FOR ERASING NON-VOLATILE MEMORY UTILIZING CHANGING WORD LINE CONDITIONS TO COMPENSATE FOR SLOWER ERASING MEMORY CELLS,” by Masaaki Higashitani, filed concurrently.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates generally to semiconductor technology for erasing non-volatile memory devices.

2. Description of the Related Art

Semiconductor memory devices have become more popular for use in various electronic devices. For example, non-volatile semiconductor memory is used in cellular telephones, digital cameras, personal digital assistants, mobile computing devices, non-mobile computing devices and other devices. Electrical Erasable Programmable Read Only Memory (EEPROM), including flash EEPROM, and Electronically Programmable Read Only Memory (EPROM) are among the most popular non-volatile semiconductor memories.

One example of a flash memory system uses the NAND structure, which includes arranging multiple transistors in series, sandwiched between two select gates. The transistors in series and the select gates are referred to as a NAND string. FIG. 1 is a top view showing one NAND string. FIG. 2 is an equivalent circuit thereof. The NAND string depicted in FIGS. 1 and 2 includes four transistors 100, 102, 104 and 106 in series and sandwiched between a first select gate 120 and a second select gate 122. Select gate 120 connects the NAND string to bit line 126. Select gate 122 connects the NAND string to source line 128. Select gate 120 is controlled by applying appropriate voltages to control gate 120CG via selection line SGD. Select gate 122 is controlled by applying the appropriate voltages to control gate 122CG via selection line SGS. Each of the transistors 100, 102, 104 and 106 includes a control gate and a floating gate, forming the gate elements of a memory cell. For example, transistor 100 has control gate 100CG and floating gate 100FG. Transistor 102 includes control gate 102CG and a floating gate 102FG. Transistor 104 includes control gate 104CG and floating gate 104FG. Transistor 106 includes a control gate 106CG and a floating gate 106FG. Control gate 100CG is connected to word line WL3, control gate 102CG is connected to word line WL2, control gate 104CG is connected to word line WL1, and control gate 106CG is connected to word line WL0.

Note that although FIGS. 1 and 2 show four memory cells in the NAND string, the use of four transistors is only provided as an example. A NAND string can have less than four memory cells or more than four memory cells. For example, some NAND strings will include eight memory cells, 16 memory cells, 32 memory cells, etc. The discussion herein is not limited to any particular number of memory cells in a NAND string.

A typical architecture for a flash memory system using a NAND structure will include several NAND strings. For example, FIG. 3 shows three NAND strings 202, 204 and 206 of a memory array having many more NAND strings. Each of the NAND strings of FIG. 3 includes two select transistors or gates and four memory cells. For example, NAND string 202 includes select transistors 220 and 230, and memory cells 222, 224, 226 and 228. NAND string 204 includes select transistors 240 and 250, and memory cells 242, 244, 246 and 248. Each string is connected to the source line by one select gate (e.g. select gate 230 and select gate 250). A selection line SGS is used to control the source side select gates. The various NAND strings are connected to respective bit lines by select gates 220, 240, etc., which are controlled by select line SGD. In other embodiments, the select lines do not necessarily need to be in common. Word line WL3 is connected to the control gates for memory cell 222 and memory cell 242. Word line WL2 is connected to the control gates for memory cell 224 and memory cell 244. Word line WL1 is connected to the control gates for memory cell 226 and memory cell 246. Word line WL0 is connected to the control gates for memory cell 228 and memory cell 248. As can be seen, a bit line and respective NAND string comprise a column of the array of memory cells. The word lines (WL3, WL2, WL1 and WL0) comprise the rows of the array. Each word line connects the control gates of each memory cell in the row. For example, word line WL2 is connected to the control gates for memory cells 224, 244 and 252.

Each memory cell can store data (analog or digital). When storing one bit of digital data, the range of possible threshold voltages of the memory cell is divided into two ranges which are assigned logical data “1” and “0.” In one example of a NAND type flash memory, the threshold voltage is negative after the memory cell is erased, and defined as logic “1.” The threshold voltage after a program operation is positive and defined as logic “0.” When the threshold voltage is negative and a read is attempted by applying 0 volts to the control gate, the memory cell will turn on to indicate logic one is being stored. When the threshold voltage is positive and a read operation is attempted by applying 0 volts to the control gate, the memory cell will not turn on, which indicates that logic zero is stored. A memory cell can also store multiple levels of information, for example, multiple bits of digital data. In the case of storing multiple levels of data, the range of possible threshold voltages is divided into the number of levels of data. For example, if four levels of information are stored, there will be four threshold voltage ranges assigned to the data values “11”, “10”, “01”, and “00.” In one example of a NAND type memory, the threshold voltage after an erase operation is negative and defined as “11.” Three different positive threshold voltages are used for the states of “10”, “01”, and “00.”

Relevant examples of NAND type flash memories and their operation are provided in the following U.S. patents/patent applications, all of which are incorporated herein by reference: U.S. Pat. Nos. 5,570,315; 5,774,397, 6,046,935, 6,456,528 and U.S. patent application Ser. No. 09/893,277 (Publication No. US2003/0002348).

When programming a flash memory cell, a program voltage is applied to the control gate (via a selected word line) and the bit line is grounded. Electrons from the p-well are injected into the floating gate. When electrons accumulate in the floating gate, the floating gate becomes negatively charged and the threshold voltage of the cell is raised. The floating gate charge and threshold voltage of the cell can be indicative of a particular state corresponding to stored data.

In order to erase memory cells of a NAND type flash memory, electrons are transferred from the floating gate of each memory cell to the well region and substrate. Typically, one or more high voltage (e.g., ˜16V-20V) erase pulses are applied to the well region to attract electrons away from the floating gate of each memory cell to the well region. The word lines of each memory cell are grounded or supplied with 0V to create a high potential across the tunnel oxide region to attract the electrons. If each memory cell of a NAND string is not erased after application of an erase voltage pulse, the size of the pulse can be increased and reapplied to the NAND string until each memory cell is erased. The amount by which the erase voltage is increased in between pulses is typically referred to as the step size for the erase voltage.

Typical erase operations using prior art techniques can lead to differing erase rates amongst memory cells in a NAND string. Some memory cells may reach a target threshold voltage level for an erased state faster or slower than others. This can lead to over-erasure of faster erasing memory cells because they will continue to be subjected to erase voltages that are applied to sufficiently erase the slower memory cells of the NAND string. Thus, the different erase rates can result in a shorter cycling life of a memory cell or NAND string. Typical erase operations can also lead to disparate threshold voltages among memory cells of a NAND string. That is, one or more memory cells of the NAND string may have a different threshold voltage after application of one or more erase voltage pulses when compared to other memory cells of the string or device. To overcome this effect, a technique generally referred to as soft programming has been used to adjust the threshold voltages of one or more memory cells after erasure. Soft programming includes applying a relatively low program voltage—lower than used for actual programming—to one or more memory cells. Soft programming typically includes applying a program voltage as a series of pulses that are increased by a step size in between each application of the program voltage pulses. Soft programming raises the memory cells' threshold voltages in order to narrow and/or raise the threshold voltage distribution of the population of erased memory cells. Soft programming, however, may increase program and erase times.

In addition, traditional soft programming can suffer from some of the same effects of disparate properties among different memory cells. The same memory cells that may be slow to erase, may also be slow to soft-program. These slower soft programming cells can have lower erased threshold voltages than other cells of the NAND string at the conclusion of soft programming.

SUMMARY OF THE INVENTION

Technology described herein pertains to technology for erasing and/or soft programming non-volatile memory devices in a manner that provides a more consistent erased threshold voltage. In accordance with one embodiment, a system is provided that considers the individual characteristics, erase behavior, and soft programming behavior of one or more memory cells during erase and soft programming operations.

A set of non-volatile storage elements (e.g., a NAND string) can be divided into subsets for erasing in order to avoid over-erasing faster erasing storage elements. The entire set of elements is erased until a first subset of the set of elements is verified as erased. The first subset can include the faster erasing elements. Verifying the first subset includes excluding a second subset from verification. After the first subset is verified as erased, they are inhibited from erasing while the second subset is further erased. The set of elements is verified as erased when the second subset is verified as erased. Verifying that the set of elements is erased can include excluding the first subset from verification or verifying both the first and second subsets together. Different step sizes can be used, depending on which subset is being erased and verified, in order to more efficiently and accurately erase the set of elements.

A set of non-volatile storage elements can be divided into subsets for soft programming in order to more fully soft-program slower soft programming elements. The entire set of elements is soft programmed until verified as soft programmed (or until a first subset of elements is verified as soft programmed while excluding a second subset from verification). After the set is verified as soft programmed, a first subset of elements is inhibited from further soft programming while additional soft programming is carried out on a second subset of elements. The second subset can include slower soft programming elements. The second subset can then undergo soft programming verification while excluding the first subset from verification. Soft programming and verifying for the second subset can continue until it is verified as soft programmed. Different step sizes can be used for increasing the size of the soft programming signal, depending on which subset is being soft programmed and verified. In one embodiment, soft programming according to the techniques described herein is performed subsequent to erasing in accordance with the techniques described herein.

In one embodiment, a method of erasing non-volatile memory is provided that includes enabling erasing of a set of non-volatile storage elements. A first and second subset of the set of non-volatile storage elements are enabled for erasing. One or more erase voltage pulses are then applied to the set while the first and second subset of non-volatile storage elements are enabled for erasing. The pulses are applied until the first subset is verified as erased. After the first subset is verified as erased, the first subset is inhibited from further erasing while the second subset is again enabled for erasing. One or more additional erase voltage pulses are then applied to the set while the first subset is inhibited and the second subset is enabled. The additional pulses are applied until the second subset is verified as erased.

In one embodiment, a non-volatile memory system is provided that includes a set of non-volatile storage elements and managing circuitry in communication with the set of non-volatile storage elements. The set includes a first subset and a second subset of non-volatile storage elements. The managing circuitry erases the set using a technique that includes applying an erase voltage to the set while each non-volatile storage element in the set is enabled for erase, verifying whether the first subset is erased while excluding the second subset from verification, and repeating the applying and verifying until the first subset is verified as erased. After verifying that the first subset is erased, the managing circuitry inhibits erasing of the first subset and enables erasing of the second subset. The managing circuitry then applies an erase voltage to the set while the second subset is enabled for erase and the first subset is inhibited from erase, and verifies whether the set of non-volatile storage elements is erased by verifying whether the second subset is erased.

In one embodiment, a method of soft programming non-volatile memory is provided that comprises applying one or more soft programming pulses to a set of non-volatile storage elements until the set is verified as soft programmed. After verifying the set as soft programmed, a first subset of the set of non-volatile storage elements is inhibited from soft programming and one or more additional soft programming pulses are applied to a second subset of the set of non-volatile storage elements while inhibiting soft programming of the first subset. In one embodiment, the soft programming is performed subsequent to erasing as described above.

In accordance with another embodiment, a non-volatile memory system is provided that includes a set of non-volatile storage elements and managing circuitry in communication with the set of non-volatile storage elements. The set includes a first subset of non-volatile storage elements and a second subset of non-volatile storage elements. The managing circuitry soft-programs the set of non-volatile storage elements by applying a soft programming voltage to each non-volatile storage element in the set and verifying whether the set is soft programmed. The managing circuitry repeats the applying and verifying until the set of non-volatile storage elements is verified as soft programmed. After verifying that the set is soft programmed, the managing circuitry applies the soft programming voltage to each non-volatile storage element in the first subset of non-volatile storage elements and verifies whether the first subset of non-volatile storage elements is soft programmed while excluding the second subset from verification.

Other features, aspects, and objects of the invention can be obtained from a review of the specification, the figures, and the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a top view of a NAND string.

FIG. 2 is an equivalent circuit diagram of the NAND string depicted in FIG. 1.

FIG. 3 is a circuit diagram depicting three NAND strings.

FIG. 4 is a block diagram of one embodiment of a non-volatile memory system in which the various aspects of the present invention can be implemented.

FIG. 5 illustrates an exemplary organization of a memory array.

FIG. 6 depicts an exemplary program/verify voltage signal that can be applied to a selected word line in accordance with embodiments.

FIG. 7 is an exemplary flowchart for performing a program operation.

FIG. 8 depicts exemplary threshold distributions of a group of memory cells.

FIG. 9 depicts exemplary threshold distributions of a group of memory cells storing two bits of data.

FIG. 10 is a table depicting exemplary bias conditions for performing an erase operation according to prior art techniques.

FIG. 11 is a graph depicting voltages at various portions of a NAND string during an ideal erase operation.

FIG. 12 is a cross sectional view of a NAND string depicting various capacitively coupled voltages within the NAND string.

FIG. 13 is a graph depicting various voltages of the end memory cells of a NAND string during an erase operation.

FIGS. 14A and 14B depict exemplary individual threshold voltage distributions for the end and interior memory cells of a NAND string after completing an erase operation.

FIG. 15 is a flowchart for erasing a set of non-volatile storage elements in accordance with one embodiment.

FIG. 16 is a table depicting bias conditions for erasing and verifying erasure of a set of non-volatile storage elements according to one embodiment.

FIGS. 17A-17C depict the threshold voltage distributions of the end memory cells and interior memory cells of a NAND string at various points during an erase operation according to one embodiment.

FIGS. 18A-18B are graphs depicting erase voltage signals in accordance with one embodiment.

FIG. 19 is a flowchart for performing step 456 of FIG. 15 in accordance with one embodiment.

FIG. 20 depicts exemplary threshold voltage distributions of the end memory cells and interior memory cells of a NAND string after soft programming according to the prior art.

FIG. 21 is a flowchart for soft programming a set of non-volatile storage elements in accordance with one embodiment.

FIG. 22 is a table depicting bias conditions for soft programming and verifying soft programming of a set of non-volatile storage elements according to one embodiment.

FIG. 23 depicts exemplary threshold voltage distributions of the end memory cells and interior memory cells of a NAND string after soft programming according to one embodiment.

DETAILED DESCRIPTION

FIG. 4 is a block diagram of one embodiment of a flash memory system that can be used to implement one or more embodiments of the present disclosure. Other systems and implementations can be used. Memory cell array 302 is controlled by column control circuit 304, row control circuit 306, c-source control circuit 310 and p-well control circuit 308. Column control circuit 304 is connected to the bit lines of memory cell array 302 for reading data stored in the memory cells, for determining a state of the memory cells during a program operation, and for controlling potential levels of the bit lines to promote or inhibit programming and erasing. Row control circuit 306 is connected to the word lines to select one of the word lines, to apply read voltages, to apply program voltages combined with the bit line potential levels controlled by column control circuit 304, and to apply an erase voltage. C-source control circuit 310 controls a common source line (labeled as “C-source” in FIG. 6) connected to the memory cells. P-well control circuit 308 controls the p-well voltage.

The data stored in the memory cells are read out by the column control circuit 304 and are output to external I/O lines via data input/output buffer 312. Program data to be stored in the memory cells are input to the data input/output buffer 312 via the external I/O lines, and transferred to the column control circuit 304. The external I/O lines are connected to controller 318.

Command data for controlling the flash memory device is input to controller 318. The command data informs the flash memory of what operation is requested. The input command is transferred to state machine 316 which is part of control circuitry 315. State machine 316 controls column control circuit 304, row control circuit 306, c-source control 310, p-well control circuit 308 and data input/output buffer 312. State machine 316 can also output status data of the flash memory such as READY/BUSY or PASS/FAIL.

Controller 318 is connected to or connectable with a host system such as a personal computer, a digital camera, or personal digital assistant, etc. It communicates with the host that initiates commands, such as to store or read data to or from the memory array 302, and provides or receives such data. Controller 318 converts such commands into command signals that can be interpreted and executed by command circuits 314 which are part of control circuitry 315. Command circuits 314 are in communication with state machine 316. Controller 318 typically contains buffer memory for the user data being written to or read from the memory array.

One exemplary memory system comprises one integrated circuit that includes controller 318, and one or more integrated circuit chips that each contain a memory array and associated control, input/output and state machine circuits. There is a trend to integrate the memory arrays and controller circuits of a system together on one or more integrated circuit chips. The memory system may be embedded as part of the host system, or may be included in a memory card (or other package) that is removably inserted into the host systems. Such a card may include the entire memory system (e.g. including the controller) or just the memory array(s) with associated peripheral circuits (with the controller or control function being embedded in the host). Thus, the controller can be embedded in the host or included within the removable memory system.

With reference to FIG. 5, an exemplary structure of memory cell array 302 is described. As one example, a NAND flash EEPROM is described that is partitioned into 1,024 blocks. The data stored in each block can be simultaneously erased. In one embodiment, the block is the minimum unit of cells that are simultaneously erased. In each block, in this example, there are 8,512 columns. Each block is typically divided into a number of pages which can be a unit of programming. Other units of data for programming are also possible and contemplated. In one embodiment, individual pages may be divided into segments and the segments may contain the fewest number of cells that are written at one time as a basic programming operation. One or more pages of data are typically stored in one row of memory cells.

In each block of the example in FIG. 5 there are 8,512 columns that are divided into even columns and odd columns. The bit lines are divided into even bit lines (BLe) and odd bit lines (BLo). In an odd/even bit line architecture, memory cells along a common word line and connected to the odd bit lines are programmed at one time, while memory cells along a common word line and connected to even bit lines are programmed at another time. FIG. 5 shows four memory cells connected in series to form a NAND string. Although four cells are shown to be included in each NAND string, more or less than four can be used (e.g., 16, 32, or another number). One terminal of the NAND string is connected to a corresponding bit line via a first select transistor or gate (connected to select gate drain line SGD), and another terminal is connected to c-source via a second select transistor (connected to select gate source line SGS).

In other embodiments, the bit lines are not divided into odd and even bit lines. Such architectures are commonly referred to as all bit line architectures. In an all bit line architecture, all the bit lines of a block are simultaneously selected during read and program operations. Memory cells along a common word line and connected to any bit line are programmed at the same time.

During read and programming operations of one embodiment, 4,256 memory cells are simultaneously selected. The memory cells selected have the same word line (e.g. WL2-i), and the same kind of bit line (e.g. even bit lines). Therefore, 532 bytes of data can be read or programmed simultaneously. These 532 bytes of data that are simultaneously read or programmed form a logical page. Therefore, in this example, one block can store at least eight pages. When each memory cell stores two bits of data (e.g. a multi-level cell), one block stores 16 pages. Other sized blocks and pages can also be used with embodiments. Additionally, architectures other than that of FIGS. 4 and 5 can also be used to implement embodiments.

In the read and verify operations, the select gates of a selected block are raised to one or more select voltages and the unselected word lines (e.g., WL0, WL1 and WL3) of the selected block are raised to a read pass voltage (e.g. 4.5 volts) to make the transistors operate as pass gates. The selected word line of the selected block (e.g., WL2) is connected to a reference voltage, a level of which is specified for each read and verify operation in order to determine whether a threshold voltage of the concerned memory cell is above or below such level. For example, in a read operation of a one bit memory cell, the selected word line WL2 is grounded, so that it is detected whether the threshold voltage is higher than 0V. In a verify operation of a one bit memory cell, the selected word line WL2 is connected to 0.8V, for example, so that as programming progresses it is verified whether or not the threshold voltage has reached 0.8V. The source and p-well are at zero volts during read and verify. The selected bit lines (BLe) are pre-charged to a level of, for example, 0.7V. If the threshold voltage is higher than the read or verify level, the potential level of the concerned bit line (BLe) maintains the high level, because of the associated non-conductive memory cell. On the other hand, if the threshold voltage is lower than the read or verify level, the potential level of the concerned bit line (BLe) decreases to a low level, for example less than 0.5V, because of the conductive memory cell. The state of the memory cell is detected by a sense amplifier that is connected to the bit line and senses the resulting bit line voltage. The difference between whether the memory cell is programmed or erased depends on whether or not net negative charge is stored in the floating gate. For example, if negative charge is stored in the floating gate, the threshold voltage becomes higher and the transistor can be in enhancement mode of operation.

When programming a memory cell in one example, the drain and the p-well receive 0 volts while the control gate receives a series of programming pulses with increasing magnitudes. In one embodiment, the magnitudes of the pulses in the series range from 12 volts to 24 volts. In other embodiments, the range of pulses in the series can be different, for example, having a starting level of higher than 12 volts. During programming of memory cells, verify operations are carried out in the periods between the programming pulses. That is, the programming level of each cell of a group of cells being programmed in parallel is read between each programming pulse to determine whether or not it has reached or exceeded a verify level to which it is being programmed. One means of verifying the programming is to test conduction at a specific compare point. The cells that are verified to be sufficiently programmed are locked out, for example in NAND cells, by raising the bit line voltage from 0 to V_(DD) (e.g., 2.5 volts) for all subsequent programming pulses to terminate the programming process for those cells. In some cases, the number of pulses will be limited (e.g. 20 pulses) and if a given memory cell is not sufficiently programmed by the last pulse, an error is assumed. In some implementations, memory cells are erased (in blocks or other units) prior to programming.

FIG. 6 depicts a program voltage signal in accordance with one embodiment. This signal has a set of pulses with increasing magnitudes. The magnitude of the pulses is increased with each pulse by a predetermined step size. In one embodiment that includes the memory cells storing multiple bits of data, an exemplary step size is 0.2 volts (or 0.4 volts). Between each of the program pulses are the verify pulses. The signal of FIG. 6 assumes a four state memory cell, therefore, it includes three verify pulses. For example, between programming pulses 330 and 332 are three sequential verify pulses. The first verify pulse 334 is depicted at a zero volt verify voltage level. The second verify pulse 336 follows the first verify pulse at the second verify voltage level. The third verify pulse 338 follows the second verify pulse 336 at the third verify voltage level. A multi-state memory cell capable of storing data in eight states may need to perform verify operations at seven compare points. Thus, seven verify pulses are applied in sequence to perform seven verify operations at seven verify levels between two consecutive programming pulses. Based on the seven verify operations, the system can determine the state of the memory cells. One means for reducing the time burden of verifying is to use a more efficient verify process, for example, as disclosed in: U.S. patent application Ser. No. 10/314,055, entitled “Smart Verify for Multi-State Memories,” filed Dec. 5, 2002; U.S. patent application Ser. No. 11/260,658, now U.S. Pat. No. 7,301,817, entitled “Method for Programming of Multi-State Non-Volatile Memory Using Smart Verify, filed Oct. 27, 2005; and U.S. patent application Ser. No. 11/259,799, now U.S. Pat. No. 7,366,022, entitled “Apparatus for Programming of Multi-State Non-Volatile Memory Using Smart Verify,” filed Oct. 27, 2005, all of which are incorporated herein by reference in their entirety.

The read and verify operations described above are performed according to techniques known in the art. Thus, many of the details explained can be varied by one skilled in the art.

FIG. 7 is a flow chart describing one embodiment of a method for programming non-volatile memory. The memory cells to be programmed are erased at step 340. Step 340 can include erasing more memory cells than those to be programmed (e.g., in blocks or other units). At step 342, soft programming is performed to narrow the distribution of erased threshold voltages for the erased memory cells. Some memory cells may be in a deeper erased state than necessary as a result of the erase process. Soft programming can apply small programming pulses to move the threshold voltage of the erased memory cells closer to the erase verify level. At step 350 of FIG. 7, a “data load” command is issued by controller 318 and input to command circuits 314, allowing data to be input to data input/output buffer 312. The input data is recognized as a command and latched by state machine 316 via a command latch signal, not illustrated, input to command circuits 314. At step 352, address data designating the page address is input to row controller or decoder 306 from the controller or host. The input data is recognized as the page address and latched via state machine 316, affected by the address latch signal input to command circuits 314. At step 354, a page of program data for the addressed page is input to data input/output buffer 312 for programming. For example, 532 bytes of data could be input in one embodiment. That data is latched in the appropriate registers for the selected bit lines. In some embodiments, the data is also latched in a second register for the selected bit lines to be used for verify operations. At step 356, a “program” command is issued by the controller and input to data input/output buffer 312. The command is latched by state machine 316 via the command latch signal input to command circuits 314.

Triggered by the “program” command, the data latched in step 354 will be programmed into the selected memory cells controlled by state machine 316 using the stepped pulses of FIG. 6 applied to the appropriate word line. At step 358, Vpgm, the programming pulse voltage level applied to the selected word line, is initialized to the starting pulse (e.g., 12V) and a program counter PC maintained by state machine 316 is initialized at 0. At step 360, the first Vpgm pulse is applied to the selected word line. If logic “0” is stored in a particular data latch indicating that the corresponding memory cell should be programmed, then the corresponding bit line is grounded. On the other hand, if logic “1” is stored in the particular latch indicating that the corresponding memory cell should remain in its current data state, then the corresponding bit line is connected to V_(DD) to inhibit programming.

At step 362, the states of the selected memory cells are verified. If it is detected that the target threshold voltage of a selected cell has reached the appropriate level, then the data stored in the corresponding data latch is changed to a logic “1.” If it is detected that the threshold voltage has not reached the appropriate level, the data stored in the corresponding data latch is not changed. In this manner, a bit line having a logic “1” stored in its corresponding data latch does not need to be programmed. When all of the data latches are storing logic “1,” the state machine knows that all selected cells have been programmed. At step 364, it is checked whether all of the data latches are storing logic “1.” If so, the programming process is complete and successful because all selected memory cells were programmed and verified to their target states. A status of “PASS” is reported at step 366.

If, at step 364, it is determined that not all of the data latches are storing logic “1,” then the programming process continues. At step 368, the program counter PC is checked against a program limit value. One example of a program limit value is 20, however, other values can be used in various implementations. If the program counter PC is not less than 20, then it is determined at step 369 whether the number of bits that have not been successfully programmed is equal to or less than a predetermined number. If the number of unsuccessfully programmed bits is equal to or less than the predetermined number, then the programming process is flagged as passed and a status of pass is reported at step 371. The bits that are not successfully programmed can be corrected using error correction during the read process. If however, the number of unsuccessfully programmed bits is greater than the predetermined number, the program process is flagged as failed and a status of fail is reported at step 370. If the program counter PC is less than 20, then the Vpgm level is increased by the step size and the program counter PC is incremented at step 372. After step 372, the process loops back to step 360 to apply the next Vpgm pulse.

The flowchart of FIG. 7 depicts a single-pass programming method as can be applied for binary storage. In a two-pass programming method as can be applied for multi-level storage, for example, multiple programming or verification steps may be used in a single iteration of the flowchart. Steps 358-372 may be performed for each pass of the programming operation. In a first pass, one or more program pulses may be applied and the results thereof verified to determine if a cell is in the appropriate intermediate state. In a second pass, one or more program pulses may be applied and the results thereof verified to determine if the cell is in the appropriate final state.

At the end of a successful program process, the threshold voltages of the memory cells should be within one or more distributions of threshold voltages for programmed memory cells or within a distribution of threshold voltages for erased memory cells. FIG. 8 illustrates threshold voltage distributions for a memory cell array when each memory cell stores one bit of data. FIG. 8 shows a first distribution 380 of threshold voltages for erased memory cells and a second distribution 382 of threshold voltages for programmed memory cells. In one embodiment, the threshold voltage levels in the first distribution 380 are negative and correspond to logic “1” while the threshold voltage levels in the second distribution 382 are positive and correspond to logic “0.”

FIG. 9 illustrates exemplary threshold voltage distributions for a memory cell array when each memory cell stores two bits of data in four physical states. Distribution 384 represents a distribution of threshold voltages of cells that are in an erased state (storing “11”), having negative threshold voltage levels. Distribution 386 represents a distribution of threshold voltages of cells that are in a first programmed state, storing “10.” Distribution 388 represents a distribution of threshold voltages of cells that are in a second programmed state, storing “00.” Distribution 390 represents a distribution of threshold voltages of cells that are in a third programmed state, storing “01.” Each of the two bits stored in a single memory cell, in this example, is from a different logical page. That is, each bit of the two bits stored in each memory cell carries a different logical page address. The bit displayed in the square corresponds to a lower page. The bit displayed in the circle corresponds to an upper page. In one embodiment, the logical states are assigned to the sequential physical states of memory cells using a gray code sequence so that if the threshold voltage of a floating gate erroneously shifts to its nearest neighboring threshold voltage state range, only one bit will be affected. In order to provide improved reliability, it is preferable for the individual distributions to be tightened (distribution narrowed), because the tighter distribution brings a wider read margin (distance between adjacent state threshold distributions).

Of course, if the memory is operated with more than four physical states then there will be a number of threshold voltage distributions within the defined voltage threshold window of the memory cells that is equal to the number of states. Further, although specific bit patterns have been assigned to each of the distributions or physical states, different bit patterns may be assigned.

Normally, the cells being programmed in parallel are alternate ones along a word line. For example, FIG. 3 illustrates three memory cells 224, 244 and 252 of a much larger number of cells along one word line WL2. One set of alternate cells, including cells 224 and 252, store bits from logical pages 0 and 1 (“even pages”), while another set of alternate cells, including cell 244, store bits from logical pages 2 and 3 (“odd pages”).

Memory cells are erased in one embodiment by raising the p-well to an erase voltage (e.g. 20 volts) and grounding or applying 0 volts to the word lines of a selected block while the source and bit lines are floating. FIG. 10 depicts exemplary bias conditions for performing an erase operation. Due to capacitive coupling, the unselected word lines (e.g., those in unselected, not to-be-erased blocks), bit lines, select lines, and c-source are also raised to a high positive potential (e.g., 20V). A strong electric field is thus applied to the tunnel oxide layers of memory cells of a selected block and the data of the selected memory cells is erased as electrons of the floating gates are emitted to the substrate. Erasing refers to lowering the threshold voltage of a memory cell by transferring electrons out of its floating gate. As sufficient electrons are transferred from the floating gate to the p-well region, the threshold voltage of a selected cell becomes negative. Once the threshold voltage reaches a predetermined sufficiently low value, the memory cell can be regarded as erased and the erase process deemed completed or successful. Thus, erasing a memory cell refers to lowering the threshold voltage of a memory cell and does not imply complete or successful erasing thereof. Erasing can be performed on the entire memory array, one or more blocks of the array, or another unit of cells. The erase voltage signal V_(erase) is typically applied as a series of erase voltage pulses, with an erase verification operation being carried out in between each pulse. If the unit of cells being erased is not verified as erased after application of an erase voltage pulse, another erase voltage pulse can be applied to the p-well region. In some embodiments, the peak value of the erase voltage is increased for each subsequent pulse (e.g., in 1V increments from 16V to 20V).

FIG. 11 is a graph depicting the voltage at various portions of a NAND string during application of a single erase voltage pulse for a typical erase operation (e.g., under the bias condition of FIG. 10). The example of FIG. 11 illustrates an ideal case, ignoring inter-gate capacitive charge coupling as discussed below. Curve 410 depicts the voltage of the p-well region which receives erase voltage signal V_(erase). The erase voltage pulse causes the p-well to ramp up to 20V and then back to 0V. Curves 414 and 412 depict the control gate voltage and floating gate voltage of a memory cell of the string. Before the erase voltage pulse is applied, the floating gate voltage depends on the programmed state of the memory cell and is typically lower than 0V. In FIG. 11, a value of −1V is assumed for the floating gate voltage before the first erase voltage pulse. The control gate voltage 414 remains at 0V throughout the erase operation while the floating gate voltage 412 rises in proportion to the p-well voltage. The floating gate is capacitively coupled across the tunnel dielectric region to the p-well. In many NAND string implementations, the capacitive coupling ratio between the floating gate of a memory cell and the p-well region is about 40-50%. Accordingly, floating gate voltage 412 rises in about a 0.5:1 ratio (when the coupling ratio is 50%) with the p-well voltage to a voltage of about 9V. The resulting erase potential, the potential between the cell's floating gate and the p-well region, is given below the graph of FIG. 11. The erase potential is equal to the difference between the p-well voltage (V_(erase)=20V) and the floating gate voltage (V_(FG)=9V). For the scenario depicted in FIG. 11, the erase potential is equal to about 11V at the beginning of the first erase voltage pulse. Note that the erase potential changes during the actual erase voltage pulse as electrons are transferred from the floating gate to the p-well. As a result, when the p-well returns to 0V after the erase voltage pulse, the floating gate voltage will be different than before the erase voltage pulse was applied. Typically, the floating gate voltage will be positive after the first erase voltage pulse, corresponding to a negative (erased) threshold voltage of the memory cell.

The actual voltage levels within a NAND string will be different than described with respect to the ideal case of FIG. 11. Because of capacitive charge coupling between neighboring floating gates and between select gates and neighboring floating gates, different memory cells of a NAND string may experience different erase potentials under application of the same erase bias conditions.

FIG. 12 provides a cross-sectional view of a NAND string including 8 memory cells. Although embodiments are presented with respect to FIG. 12 and an 8 cell NAND structure, the present invention is not so limited and can be used in accordance with numerous NAND structures including fewer or more than 8 memory cells (e.g., 4, 12, 16, or more). As depicted in FIG. 12, the memory cells of the NAND string are formed in p-well region 540. Each memory cell (502, 504, 506, 508, 510, 512, 514, and 516) includes a stacked gate structure that consists of the control gate (502 c, 504 c, 506 c, 508 c, 510 c, 512 c, 514 c, and 516 c) and a floating gate (502 f, 504 f, 506 f, 510 f, 512 f, 514 f, and 516 f). The floating gates are formed on the surface of the p-well on top of an oxide or other dielectric composite film. The control gate is above the floating gate, with an oxide or other isolating dielectric layer separating the control gate and floating gate. The control gates of the memory cells connect to or form word lines WL0, WL1, WL2, WL3, WL4, WL5, WL6, and WL7. N+ diffused regions 542 are shared between neighboring cells whereby the cells are connected to one another in series to form a NAND string. These N+ diffused regions form the source and drain of each of the cells. N+ diffused region 526 connects to the bit line for the NAND string, while N+ diffused region 528 connects to a common source line for multiple NAND strings. The select gates 520 and 522 are formed of the same structure as the memory cells, however, the gate regions are electrically connected.

Because of capacitive coupling, the floating select gates 522 and 520 are raised to a high positive potential when a high erase voltage is applied to the p-well during erase operations. The erase voltage applied to the p-well, or some portion thereof, couples from the well region to each of the select gates. About 90-100% of the p-well voltage can be expected to couple to each select gate in many NAND structures. Therefore, if an erase voltage pulse of 20V is applied to the p-well, the voltage on each select gate will rise about 18V-20V to a voltage of 18V-20V. In FIG. 12, the coupling from p-well 540 to select gates 522 and 520 is illustrated by arrows 530. Although to a lesser degree, a similar coupling effect is also experienced by each of the memory cells of the string. The coupling between the p-well and the floating gate of a memory cell is typically about 40-50%. Each floating gate is also coupled to its corresponding control gate with a coupling of about 50-60%. To a smaller extent, each floating gate is coupled to neighboring floating gates and control gates. All the different couplings add up to a total of 100%. Assuming a 50% coupling from p-well to floating gate, the floating gate voltage of each memory cell is raised about 10V under application of a 20V erase voltage pulse. This coupling effect is illustrated by arrows 532. The voltage coupled to each memory cell's floating gate effects the V_(erase) potential created across the tunnel oxide layer. For example, an erase potential of about 11V (20V−9V) is created under application of a 20V erase voltage pulse to the p-well for a memory cell having a floating gate voltage of −1V prior to erasing.

Each memory cell of the string will experience some capacitive charge coupling from neighboring memory cells and/or transistors. This coupling can effect the potential of a cell's floating gate and consequently, the erase potential for the cell. The end memory cells (e.g., memory cells 502 and 516 in FIG. 12) of the NAND string—those connected to the first and last word lines (end word lines) of the NAND string and adjacent to the select gates of the NAND string—will experience capacitive charge coupling from the neighboring select gates. In FIG. 12, this capacitive coupling is depicted by arrow 534 from select gate 520 to floating gate 502 f of memory cell 520 and by arrow 538 from select gate 522 to floating gate 516 f of memory cell 516. The voltage coupled to memory cells 502 and 516 will decrease the electric field present across those cells' tunnel dielectric regions (e.g., tunnel oxide) in proportion to the amount of voltage at the respective select gate.

The coupling represented by arrows 538 and 534 occurs in both directions because during an erase operation, the select gates are in a floating state as well. As a result, the floating gate voltage of memory cells 516 and 502 will have some influence on the voltage on the select gates 522 and 520. However, the coupling from floating gate to select gate is much smaller than the coupling from the p-well to the select gates, and thus, the select gate voltage is determined almost completely by the p-well voltage.

In many NAND implementations, capacitive coupling from the select gates to the floating gates of the end memory cells of a NAND string can be expected to be on the order of about 2% to 5%. If an erase voltage of 20 volts is applied to the p-well region, each select gate's voltage will rise about 18V with 90% p-well to select gate coupling. Subsequently due to the 2-5% coupling from select gate to neighboring floating gate, the voltage on the neighboring floating gates (e.g., 516 f and 502 f) will rise about 0.4-1V. The resulting voltage across the tunnel oxide of the end memory cells of the string will be about 0.4 to 1V less than that for the ideal case shown in FIG. 11. Note that the above mentioned capacitive coupling can vary largely depending on the physical dimensions of the memory cells and select gates, the spacing between memory cells and select gates, and the dielectric properties of the materials used in constructing such components as the tunnel dielectric, dielectric between control and floating gates, and dielectric between select gates and memory cells. In some cases, for example, the above mentioned coupling may be larger or smaller than the above mentioned 2-5% range.

In addition to coupling between neighboring floating gates, another factor is coupling between the floating gate and neighboring word lines or control gates. This coupling may also be on the order of 2-5%, but may be smaller or larger depending on the dimensions and shape of the memory cells. In some cases, particularly where the physical distance between the select gates and neighboring memory cells is similar to the distance between two interior memory cells, the coupling from the select gate to the neighboring floating gate will be in a similar range as the coupling from a neighboring control gate (word line) and floating gate. During an erase operation, however, as the select gate is biased differently in comparison with the control gates and floating gates, the floating gate voltage of the end memory cells will be higher than that of the interior memory cells and thus, the erase potential will be lower for the end memory cells as hereinafter described.

FIG. 13 depicts the p-well voltage 420, floating gate voltage 422, and control gate voltage 424 for a typical end memory cell of a NAND string during application of a single erase voltage pulse for an erase operation under the bias conditions of FIG. 10. The p-well voltage 420 rises from 0V to a peak value of 20V and then back to 0V. The control gate voltage 424 remains at 0V since the word lines connected to each memory cell are supplied with 0V. As with all the cells, the floating gates of the end memory cells are capacitively coupled to the p-well region on the order of about 40-50%. As the p-well region voltage increases to 20V, this capacitive coupling causes the floating gate voltage to rise about 10V when 50% coupling is assumed. The end memory cells additionally have a portion of the voltage at the neighboring select gate coupled to them. Thus, the voltage on these floating gates will not only be increased in proportion with the p-well voltage that is capacitively coupled thereto, but will also be increased due to the 2-5% coupling from the select gates. In FIG. 13, it is assumed that the coupling from the select gates adds an additional 1V to the floating gate voltage. Accordingly, the floating gate voltage 422 rises to a maximum value of 10V at the beginning of the erase voltage pulse as opposed to the maximum value of 9V for the ideal case depicted in FIG. 11. The erase potential across the tunnel dielectric region for the end memory cells is given below the graph of FIG. 13. The erase potential at the beginning of the erase voltage pulse is about 10V, or about 1V less than the 11 V erase potential for the ideal case.

The memory cells of a NAND string that are not adjacent to a select gate (i.e., all but the end memory cells of a NAND string) may be referred to herein as interior memory cells of the string. In FIG. 12, the interior memory cells of the NAND string are memory cells 504, 506, 508, 510, 512, and 514. Although the interior memory cells will experience capacitive coupling from neighboring floating gates that will decrease their erase potential (discussed hereinafter), it is of a lesser degree than that of the end memory cells. Thus, the interior memory cells will behave substantially as the ideal case described earlier and have an erase potential of about 11V (assuming that the cells were in a programmed state with a floating gate voltage of about −1V before the erase voltage pulse). Because of the lower potential across the tunnel oxide layers of the end memory cells compared to the interior memory cells, the end memory cells will erase slower and not be as deeply erased (will have fewer electrons transferred from their floating gates) as the interior memory cells after application of one or more erase voltage pulses.

Memory cells of a NAND string are verified as erased when the charge on the floating gate is above a predetermined level (threshold voltage below a predetermined level). Because of the additional coupling to the floating gates of the end memory cells, the overall time for an erase operation is increased in order to sufficiently erase these end memory cells. The interior memory cells may be sufficiently erased after application of a number N erase voltage pulses, while the end memory cells of the NAND string may not be sufficiently erased until application of N+1 or more erase voltage pulses.

FIG. 12 illustrates an additional capacitive coupling effect between the floating gates of individual memory cells of the NAND string by arrows 536. For example, the coupling between neighboring floating gates on WL0 and WL1 may be on the order of 2-5%, but may be smaller or larger depending on the dimension and shape of the memory cells. As a result, a voltage present on the floating gate of memory cell 516 will influence the voltage of the floating gate of memory cell 514 and vice versa. A similar coupling will be present between the floating gates of memory cells 514 and 512, connected to WL2, and so on. This coupling exists in both directions, as indicated by the double head on arrows 536. These coupling effects will be seen among all memory cells of the NAND string at various levels but the impact of the coupling will be less than that on the end memory cells as the bias voltages on the neighboring control gates and floating gates are different from the bias condition on the select gates. During the presence of the erase voltage pulse, the voltage of each floating gate is significantly less than the voltage present at the select gates. Thus, the amount of voltage induced in each floating gate due to coupling between the floating gates of individual memory cells will be less than the voltage that is induced in the floating gates of the end memory cells due to coupling to the adjacent select gates. Nevertheless, each memory cell of the NAND string can be expected to have a slightly differing net charge present at its floating gate and a correspondingly different erase behavior due to such coupling.

FIG. 14A shows the erased (E) and programmed (A,B,C) threshold voltage V_(T) distributions of a four state or four level memory device after data has been written into the memory array. FIG. 14B depicts the same four state memory device after an erase operation has been completed. The threshold voltage distributions for the memory cells of the interior word lines and end word lines are depicted separately. Distribution 430 shows the threshold voltage distribution for the interior word lines, which are erased deeper than the end word lines, depicted by distribution 432. In some NAND memory device implementations, the interior memory cells will be about 0.5-1V deeper erased than the end memory cells because of capacitive charge coupling from the select gates. The memory cells of both the interior and end word lines are in general erased deeper than required. To guarantee that all or most memory cells can be erased with one erase voltage pulse after a number of write/erase cycles, the selected size of the first erase voltage pulse is generally larger than required to erase all the cells of the fresh device (not having undergone many write/erase cycles) in one pulse. Thus, a fresh memory device may have threshold voltage distributions as shown in FIG. 14B after undergoing an erase operation.

When erase verification of a number of memory cells is performed at a NAND string level or higher (e.g., on a block or other unit of strings), disparate erase times or behavior amongst memory cells can lead to over stressing and over erasing certain memory cells. For example, the interior memory cells of a NAND string may be over erased while attempting to sufficiently erase the end memory cells of the string. As previously described, the interior memory cells will erase faster than the end memory cells. If verification is performed at a NAND string level, the NAND string will continue to receive an erase voltage pulse at the p-well until each memory cell of the string is erased. Therefore, even though the interior memory cells may sufficiently erase after a lower number of erase voltage pulses than the end memory cells, the interior memory cells will receive additional erase voltage pulses until each memory cell of the string is verified as erased.

A greater stress is placed on the interior memory cells than is necessary because of over erasure. Over erasing the interior memory cells because of the slower erase times of the end memory cells can decrease the life span of the interior memory cells and an overall non-volatile memory system. As understood in the art, application of a large potential across the tunnel oxide layer of a transistor stresses the oxide material. Application of a high enough potential across the tunnel oxide layer or application of a lower potential a number of times can eventually lead to a breakdown of the oxide layer.

Disparate erase behavior between memory cells can also lead to increased erase operation times because of additional operations that may be performed to change the threshold voltage of a memory cell after being erased. When flash memory cells are erased, the goal is that all erased cells have a negative threshold voltage within a predefined range of negative threshold voltages. As illustrated, however, the erase process may result in some cells having negative threshold voltages below the predefined range. Memory cells having a threshold voltage that is too low may not subsequently program properly or may cause other cells to not program properly (e.g., by increasing the probability that program disturb occurs). Thus, over-erased devices will often undergo what is called soft programming. Memory cells with threshold voltages of significantly lower values within the predefined range will receive a small amount of programming so that the threshold voltage is raised to be within the predefined range. The soft program process requires an additional operation to be performed and decreases memory performance due to increased erase times as soft programming is usually considered part of the erase operation.

In accordance with one embodiment, the word lines of a set of memory cells being erased are divided into subsets which are independently verified such that additional erase pulses can be provided to select word lines having slower erasing memory cells. In this manner, faster erasing word lines are not over-erased and the memory cells of all the word lines in the set will have the same (or substantially the same) threshold voltage distributions after an erase operation.

FIG. 15 is a flow chart depicting a method for erasing a set of memory cells in accordance with one embodiment. It will be appreciated by those of ordinary skill in the art that multiple NAND strings can be operated upon in parallel such as to erase a block of memory cells according to the method of FIG. 15. Additionally, other units of cells can also be operated upon in accordance with the described embodiments. In one embodiment, erasing according to the flowchart of FIG. 15 can be performed for erase step 340 of FIG. 7. In one embodiment, erasing according to FIG. 15 is performed after controller 318 receives a request from the host to erase or program a set of memory cells.

The bit, source, source select gate, and drain select gate lines for the NAND string are floated at step 440. At step 442, zero volts (or ground) is applied to each word line of the NAND string. Steps 440 and 442 enable erasing of the entire set of memory cells, which can include the NAND string or multiple NAND strings in parallel. At step 444, the erase voltage pulse V_(erase) is applied to the p-well region of the NAND string or strings. At step 446, the memory cells connected to the interior word lines are verified for an erased state. The memory cells connected to the end word lines are excluded from verification so that only the interior memory cells are verified. The end word lines can be excluded from verification by applying a voltage to them that is sufficient to turn on a memory cell, whether or not it is erased. This voltage can be larger than the erase verify voltage E_(verify) applied to the interior word lines. Numerous voltage levels can be used at step 446. For example, a voltage large enough to turn on a memory cell programmed to the highest state could be used, although a voltage only slightly larger than the erase verify voltage will be sufficient in most embodiments. The important factor is that the memory cells connected to the end word lines be conductive while verifying the interior word lines.

At step 448, it is determined whether each NAND string was successfully verified at step 446 as having its interior memory cells erased. In one embodiment, step 448 and the interior memory cell erase are deemed successful only if every NAND string is successfully verified as having its interior memory cells erased. In another embodiment, step 448 and the interior memory cell erase are deemed successful if only a predetermined number of NAND strings are successfully verified as having their interior memory cells erased. By determining that the interior memory cell erase is successful based on a predetermined number of NAND strings rather than every NAND string, the verification process can stop before the maximum erase loop number is reached (step 450), This can avoid over-erasing NAND strings due to one or a small number of difficult to erase or defective NAND strings.

If all or the predetermined number of NAND strings are not successfully verified at step 448, the method branches to step 450 where a verify counter VC is checked against an erase limit value. The verify counter is used to limit the number of iterations of the erase cycle. One example of an erase limit is 8, however, other values can be used. If the verify counter is less than the erase limit value, then VC is incremented by 1 and the value of the erase voltage pulse V_(erase) is stepped up by a first step size or increment value ΔV_(ERA1). In one embodiment, ΔV_(ERA1) is about 0.5V to 1V.

The first erase voltage pulse applied at step 444 is chosen in one embodiment to have an amplitude such that, both before and after write erase cycling, the cells connected to the interior word lines are just erased, without being over-erased, after application of the first pulse. In this manner, the interior memory cells can be erased in one pulse such that for the majority of the time, the interior word lines will be verified after just one iteration of steps 440 through 446. Accordingly, ΔV_(ERA1) can be a relatively small value in order to just erase the interior memory cells in those instances where a further iteration is needed (e.g., after many write erase cycles). More details regarding the various step sizes that can be used in accordance with embodiments will be discussed with FIGS. 18A and 18B.

If the verify counter is not less than 8, then the method proceeds to step 452 where the number of non-verified NAND strings is compared with a pre-determined number. If the number that is non-verified is less than or equal to the pre-determined number, then the method proceeds to step 458. If the number of non-verified strings is not less than the pre-determined number, then a status of fail is reported for the operation at step 454. Step 452 is optional. For example, in embodiments where step 448 is deemed successful based on less than all of the NAND strings, step 448 may be omitted.

After the yes branches of steps 448 or 452, the memory cells of the interior word lines have been verified as erased. Additionally, all of the memory cells connected to all the word lines of the set being erased have had their floating gate charges increased (charge increased as electrons removed) as a result of steps 440 through 446. However, the end memory cells have not yet been verified as in an erased state. As previously described, these end memory cells erase slower than the interior memory cells. Thus, having confirmed that the faster memory cells are now erased, attention can be directed to the end memory cells to provide additional erasing therefore. In this manner, the interior and end memory cells of a set of memory cells will be erased to about the same level after completion of the erase operation.

At step 458, the verify counter VC is reset to zero. Additionally, the erase voltage Vase is stepped up by a second increment size of ΔV_(ERA2). ΔV_(ERA2) can be larger than ΔV_(ERA1). In one embodiment, ΔV_(ERA2) can be about 1V to 2V. ΔV_(ERA2) is preferably chosen such that after application of a single erase voltage pulse at the increased level, the end memory cells will be erased both before and after write/erase cycling. At step 460, the bit, source, source select gate, and drain select gate lines are again floated. At step 462, the interior word lines are inhibited from further erasing and the end word lines are enabled for further erasing. The interior memory cells can be inhibited from erasing during subsequent erase voltage pulses by floating the interior word lines. The end memory cells can be enabled for erasing by applying 0V to the end word lines. After setting up this condition, the first erase voltage pulse at the increased level is applied to the set of memory cells. At step 466, the end word lines are verified for an erased state while excluding the interior word lines from verification. Again, as in step 446, this can be accomplished by applying the erase verify voltage to the end word lines, while applying a voltage sufficient to turn on the memory cells of the interior word lines, regardless of their state, to the interior word lines. This voltage applied to the interior word lines will be larger than the erase verify voltage applied to the end word lines. It should be noted, however, that in some embodiments the entire NAND string can be verified at step 466 for an erased state. The interior memory cells have already been verified as erased and thus, they should be conductive under application of the erase verify voltage. Therefore, each memory cell of the string can be verified at step 466 in this alternative embodiment. However, it may be preferred to apply a larger voltage to the interior memory cells in order that verification can just be performed on the end word lines which have not yet been verified.

At step 468, it is determined whether each NAND string was successfully verified as having its end memory cells erased. Like step 448, a successful determination at step 468 can be made when all or only a predetermined number of NAND strings are successfully verified. If all or a predetermined number of NAND strings are successfully verified, a status of pass is reported at step 470. If all or the predetermined number are not successfully verified, the verify counter is checked against the erase limit value at step 472. If the verify counter is less than the limit, the method proceeds to step 474, where the verify counter is incremented by one and the erase voltage V_(erase) is stepped up by a third increment step size of ΔV_(ERA3).

In one embodiment, ΔV_(ERA3) is the same value as ΔV_(ERA1). In other embodiments, ΔV_(ERA3) is larger than ΔV_(ERA1) since the end memory cells are slower to erase and may benefit from a larger increment value to speed up their erase. The result of step 458 and 474 is that the erase voltage pulse is increased by a large amount after verifying the interior word lines for a first application of the erase voltage to the end memory cells. It is then increased by a smaller amount thereafter at step 474 if multiple iterations are required in order to fully erase the end memory cells. Again, more details and alternatives for the increment values will be discussed hereinafter. If the verify counter is not less than 8, then the number of non-verified NAND strings is compared with a predetermined number at step 476. Like step 452, step 476 is optional. If the number of non-verified strings is less than the predetermined number, then a status of pass is reported at step 470. If however, the number of non-verified NAND strings is greater than the predetermined number, then a status of fail is reported at step 454.

FIG. 16 is a table showing the bias conditions for the various sub operations performed as part of the erase operation of FIG. 15. Column 480 sets forth the bias conditions for erasing the memory cells of all the word lines of the set of word lines being erased. Column 480 corresponds to steps 440 through 444 of FIG. 15. In these steps all the memory cells of each word line have the charge at their floating gate increased by transferring electrons therefrom. The bit and source lines are floating as well as the source and drain select gate lines. Each word line is supplied with 0V in order to enable erasing thereof. The p-well receives the erase voltage and electrons are transferred from the floating gates of each memory cell of the set by virtue of the potential created by applying 0V to the word lines and V_(erase) to the p-well.

Column 482 sets forth the bias conditions for verifying just the interior word lines for an erased state. Column 482 corresponds to step 446 of FIG. 15. The bit line is floating while the source line is at V_(DD). The drain select gate and source select gate lines are supplied with a positive voltage V_(SG) sufficient to turn on both select gates. V_(SG) is typically larger than V_(DD). For example, V_(SG) can be about 4-4.5V in one embodiment. The interior word lines are provided with the erase verify voltage (e.g., 0V) for the operation. Word line WL₀ and word line WL_(n) are provided with a voltage V_(use1). V_(use1) can be a range of voltages as previously described, but is typically chosen so as to ensure conduction of the memory cells connected at word lines WL₀ and WL_(n). For example, V_(use1) could be a larger voltage than any of the potential voltages of a programmed memory cell. However, it is sufficient in most instances to use a value only slightly larger than the erase verify voltage since even the end memory cells are erased to some extent after application of the first erase voltage pulse. By using V_(use1) as the voltage applied to word line WL₀ and word line WL_(n), the end memory cells are excluded from the interior word line verification operation at step 446. To verify whether the interior memory cells are erased, the bias conditions of column 482 are applied to a NAND string and the bit line voltage is sensed. If the interior memory cells are erased sufficiently deep, they will be in the on state and provide a conduction path from the source line to the bit line. A current will be induced through the NAND string and the bit line voltage will increase. After a predetermined amount of time the bit line voltage is sensed or checked by a sense amplifier. If the bit line voltage has reached a predetermined level, the interior memory cells are verified as erased. If the interior memory cells are not erased sufficiently deep, they will not be in the on state and therefore, will not conduct any current or will conduct too little current. As a result, the bit line voltage will not increase up to the predetermined level. When the bit line voltage is sensed after the predetermined amount of time, it will not have reached the predetermined level and the interior memory cells will not be verified as erased.

Column 484 sets forth the bias conditions for erasing only the memory cells connected to the end word lines of the set being erased. Column 484 corresponds to steps 460 through 464 of FIG. 15. As with erasing all the word lines, the bit line, source line, source select gate line, and drain select gate line are all floating. Additionally, the p-well will be supplied with the erase voltage V_(erase). To inhibit further erasing of the memory cells of the interior word lines (which have already been verified as erased), the interior word lines are floated while the end word lines are provided with 0V. In this manner, the interior word lines will couple to the p-well and create no erase potential across the tunnel dielectric region of the memory cells connected thereto. However, by supplying 0V to the end word lines, those memory cells will be enabled for erasing. Thus, just the memory cells of the end word lines are erased when the erase voltage pulse is applied to the p-well.

Column 486 sets forth the bias conditions for verifying the erased state of just the end word lines. Column 486 corresponds to step 466 of FIG. 15. As with the interior word line verification operation of column 482, the bit line is floating while the source line is at V_(DD). The p-well is grounded and the drain select gate and source select gate are turned on by voltage V_(SG). In order to verify the end word lines while excluding the interior word lines from verification, the erase verify voltage E_(verify) (e.g., 0V) is applied to word lines WL₀ and WL_(n) while V_(use1) is provided to the interior word lines. V_(use1) will ensure conduction of the memory cells of the interior word lines such that the erased state of just the end word lines can be tested. If the end memory cells are sufficiently erased, they will turn on under application of the E_(verify) voltage. The bit line voltage will increase up to or beyond a predetermined level which indicates the end memory cells are erased. If the end memory cells are not sufficiently erased, they will remain off or at least not sufficiently turned on under application of the E_(verify) voltage. The bit line voltage will not increase up to the predetermined level which indicates that the end memory cells are not yet erased. As previously discussed, the entire NAND string can be optionally verified since the interior memory cells have previously been verified at step 446. Thus, the erase verify voltage could be applied to the interior word lines for the end word line verification since they should conduct under the erase verify voltage. However, it may be beneficial to supply V_(use1) to ensure conduction in order to only test for an erased state of the end memory cells.

FIG. 17A through 17C depict the improved erase threshold voltage distributions of a set of memory cells erased according to embodiments. FIG. 17A shows the erased and programmed threshold voltage distributions for a four level NAND memory device after data has been written into the memory array. FIG. 17B shows the erased threshold voltage distributions for the memory cells of the device after completion of application of a single erase voltage pulse. For example, FIG. 17B can correspond to the time at which step 444 of FIG. 15 has been completed according to the bias conditions of FIG. 16, column 480. Typically, and as shown in FIG. 17B, after application of the first erase voltage pulse only the memory cells of the interior word lines (shown in distribution 430) will be sufficiently erased. The memory cells of the end word lines (shown in distribution 432) have had negative charge removed from their floating gates, but not enough such that they are in the actual erased state. This is due to the disparate erase behavior of the differing word lines because of coupling between the select gates and the floating gates of the end word lines. FIG. 17C shows the erased threshold distributions for the subsets of memory cells after additional erase pulses have been applied only to the end word lines of the set being erased. For example, FIG. 17C can correspond to the time after completion of step 464 in FIG. 15. This could be after one additional erase pulse has been applied to the end word lines, or after multiple erase pulses have been applied through multiple iterations of steps 460-474. As a result of using the method depicted in FIGS. 15 and 16, the interior word lines and the end word lines have the memory cells connected thereto erased to a similar threshold voltage. Thus, over-erasure of the interior middle word lines due to the slower erasing end word lines has been prevented. By dividing up the verification of the different subsets of memory cells, the disparate erase behavior has been compensated for such that all the memory cells end up in about the same threshold voltage distribution.

Division of word lines within a NAND string can be made in different ways in other embodiments. For example, the two most end word lines of a NAND string (e.g., WL0, WL1, WL_(n-1), and WL_(n)) can be grouped together as the end word lines and the remaining word lines (WL2-WL_(n-2)) grouped together as the interior word lines. In such an embodiment, step 446 of FIG. 15 will include verifying word lines WL2-WL_(n-2) and steps 462 and 466 will be performed to further erase and verify word lines WL0, WL1, WL_(n-1), and WL_(n). In yet another embodiment, six or more word lines could be grouped together as the end word lines. Other groupings can also be implemented.

FIGS. 18A and 18B depict erase voltage signals that can be used in accordance with various embodiments. FIG. 18A shows a first erase voltage pulse, pulse₁, having a magnitude of V_(erase1). The first pulse can be the first pulse applied to the set of memory cells being erased at step 444 of FIG. 15. This pulse is used to erase all memory cells of the set. In some embodiments, the first value of the erase pulse can be about 15V to 20V. In one embodiment, it is preferred that the magnitude of the first erase pulse be chosen in such a way that both before and after write/erase cycling, the cells on the interior word lines will be just erased (and without being over-erased) after application of the single erase voltage pulse. However, after write/erase cycling, or due to the disparate parameters of individually constructed memory devices, all interior memory cells may not be erased after the first pulse. In other embodiments, the first erase voltage pulse may be chosen such that only before write/erase cycling or only during a limited number of write/erase cycles, the interior memory cells will be erased after application of the first pulse. After extended write/erase cycling, more pulses may be needed. This technique can reduce the over erase at the beginning of write/erase cycling at the expense of more erase voltage pulses after extended write/erase cycling.

As shown in FIG. 18A, a second pulse, pulse₂, is applied before the interior word lines are successfully verified as erased. The erase voltage signal is increased by a step size of ΔV_(ERA1) from pulse₁ to pulse₂. The increase by ΔV_(ERA1) corresponds to step 456 of FIG. 15. ΔV_(ERA1) can be about 0.5V to 1V in one embodiment. After application of the second erase voltage pulse all of the interior word lines are successfully verified. This can correspond to step 448 of FIG. 15. After all the interior word lines are verified, erasing only continues for the end memory cells. These memory cells erase slower, thus the erase voltage signal is increased by a second larger increment step size of ΔV_(ERA2) for application of the third erase voltage pulse, pulse₃. This can correspond to step 458 of FIG. 15. It is preferred in one embodiment that ΔV_(ERA2) be chosen such that after application of the first erase voltage pulse (e.g., pulse₃) to just the end memory cells, all of the end memory cells will be erased, both before and after write erase cycling. In one embodiment, ΔV_(ERA2) is about 2 volts. Application of pulse₃ corresponds to step 464 of FIG. 15. The pulses are increased by a third step size ΔV_(ERA3) thereafter. This corresponds to step 474 of FIG. 15. ΔV_(ERA3) can be equal to ΔV_(ERA1) in one embodiment, or can be larger or smaller in other embodiments.

FIG. 18B depicts an alternate embodiment of the erase voltage signal that can be used when performing the method of FIG. 15. In this embodiment, the first erase voltage pulse is chosen to be larger than the second pulse. The first erase voltage pulse, pulse₁, is chosen to induce a large voltage shift (for example, about 6V). This erase voltage pulse is still ideally chosen such that the interior memory cells will be erased after application of the single pulse, both before and after a certain number of write/erase cycles. However, it recognizes that it may take more than one pulse to erase all the interior memory cells in some instances. In other embodiments, the first erase voltage pulse may be chosen such that only before write/erase cycling or only during a limited number of write/erase cycles, the interior memory cells will be erased after application of the first erase voltage pulse. After extended write/erase cycling, more pulses may be needed. In the embodiment of FIG. 18B, a second and third pulse are both needed before all the interior memory cells are verified as erased. A second erase voltage pulse, pulse₂, is smaller by a step size of ΔV_(ERA4) than pulse₁. The decrementation of the erase voltage signal also corresponds to step 456 of FIG. 15. However, rather than incrementing the erase voltage pulse, it is decreased in size by ΔV_(ERA4). This ensures that the interior memory cells are not over-erased after application of the second erase voltage pulse. The second pulse is made smaller to induce a smaller shift in the threshold voltage of the memory cells. If a third erase voltage pulse is needed, such as shown by pulse₃, it can then be increased by a step size of ΔV_(ERA1) to ensure that electrons continue to be transferred from the floating gates of those memory cells.

After application of the third erase voltage pulse, the interior memory cells are verified as erased. The remainder of FIG. 18B is the same as in FIG. 18A. The first erase voltage pulse, pulse₄, that is applied to just the end memory cells, is increased from the previous erase voltage pulse size by a magnitude of ΔV_(ERA2). This corresponds to step 458 of FIG. 15. In the embodiment of FIG. 18B, an additional erase voltage pulse is needed to erase the end memory cells. Thus the fifth erase voltage pulse, pulse₅, is increased by a value of ΔV_(ERA3) over the fourth erase voltage pulse value. In one embodiment, after applying the first erase voltage pulse, pulse₁, the second erase voltage pulse, pulse₂, can be the same size of pulse₁ rather than decreasing in size. In such an embodiment, any erase voltage pulses thereafter needed to erase the interior memory cells will be increased by a value of ΔV_(ERA1) as shown.

FIG. 19 is a flow chart depicting a method in accordance with one embodiment for performing step 456 of FIG. 15. In FIG. 19, step 456 is performed as shown by the erase voltage pulse of FIG. 18B. In step 450 of FIG. 15, a determination is first made at step 490 whether the verify counter VC is equal to zero, indicating that only one erase voltage pulse has been applied to the set of memory cells thus far. If the verify counter is equal to zero, indicating that this is the first change to the size of the erase voltage pulse, then the method proceeds to step 492, where the erase voltage pulse size is stepped down by the value ΔV_(ERA4). This will result in a pulse like pulse₂ being applied during the next iteration. If, however, the verify counter is not equal to zero, indicating that this is the second or more change to the erase voltage signal, then the method proceeds to step 494 where the erase voltage signal is stepped up by ΔV_(ERA1), resulting in a pulse like pulse₃ of FIG. 18B. From steps 492 and 494, the method again proceeds to step 440 of FIG. 15.

Capacitive coupling can also lead to disparate behavior amongst memory cells of a NAND string during so-called soft programming operations. A soft programming operation is typically carried out by applying soft programming pulses to all the word lines of a selected block at the same time. Soft programming is performed after erasing a set of memory cells. The soft programming is performed to narrow the width of the erased threshold distribution for the set of memory cells and also to normalize the erased threshold distribution of the individual memory cells within the set. Soft programming pulses are lower in amplitude than regular programming pulses (e.g., as shown in FIG. 6) to avoid that the cells reach a programmed state. What is desired as a result of the soft programming is that the cells have a narrower erase threshold voltage distribution. Consequently, the threshold voltages are not intended to be shifted into a programmed state range.

After application of each soft programming pulse, a verify operation similar to a typical erase verify operation as shown in FIG. 10 is carried out. During the verification for a soft programming operation, conduction through a NAND string is tested with each of the memory cells receiving the erase verify voltage at its gate. Once a certain number of NAND strings in the selected block have reached a non-conducting state during the erase verify operation (indicating that at least one cell of the string has reached the erase verify level), soft programming ends. The result of soft programming is that the distribution of the erased memory cells in the string shifts up closer to the erase verify level. Using soft programming, the erase threshold voltage distribution can be shifted up to a level close to the erase verify level, even if the memory cells were originally over-erased.

Because of capacitive coupling from the select gates to the memory cells of the end word lines of a NAND string, the soft programming behavior of the memory cells of the string are different. Capacitive coupling between the select gates and the end memory cells slows down these cells during the soft programming operation. Thus, it can be expected that the memory cells of the end word lines will be in a deeper erased state than those of the interior word lines after soft programming.

FIG. 20 shows the erased threshold voltage distribution for the memory cells of a NAND string after undergoing soft programming. Distribution 430 depicts the erased threshold distribution of the interior word line memory cells after undergoing soft programming. Soft programming has shifted this erased threshold voltage distribution closer to the erase verify level. Since the verification for soft programming verifies a group of cells as successfully soft programmed when a predetermined number of NAND strings are non-conductive under application of the erase verify voltage, a certain number of cells will have their threshold voltage shifted beyond the erase verify level. The actual number having a threshold voltage higher than the erase verify level will depend upon the actual verification scheme employed. For example, if the scheme verified soft programming as complete when a single string becomes non-conductive, only one cell in the group may be higher than the verify level. In other schemes, thousands of cells within the group may have their threshold voltage shifted just beyond the erase verify level. Distribution 432 depicts the threshold voltages of the end memory cells. Because of the slower soft programming time for the end memory cells, their threshold voltages have not been shifted as close to the erase verify level.

In accordance with one embodiment, the word lines of a set of memory cells are again divided into subsets such that soft programming can be carried out in a way adapted to the needs of the individual subsets of word lines. The method is similar to the erase verification method depicted in FIG. 15. All of the word lines of the set that are being soft programmed undergo some initial soft programming. After verifying that the set of memory cells or a subset thereof has been successfully soft programmed, additional soft programming can be performed for just the end word lines in order to move them out of their deeper erased state and closer to the erased verify level.

FIG. 21 depicts a method for soft programming in one embodiment. For example, the method of FIG. 21 could be used to soft-program a plurality of NAND strings of a block of memory cells. In one embodiment, soft programming according to FIG. 21 can be performed for soft programming step 342 of FIG. 7. At step 602, the soft programming voltage signal V_(SPGM) is set to its initial value and the soft programming counter SPC is set to zero. The source, bit, and source select gate lines are grounded at step 604. Additionally, V_(SG) is applied to the drain select gate line. The drain select gate line voltage may be lowered to about 2.5V just before applying the soft programming pulse to allow boosting for soft programming inhibition (step 617) if needed. In other instances it is not. Soft programming inhibition can still occur to a certain extent by the channel which will be biased to V_(DD) (step 617). At step 606, the first soft programming pulse is applied to all the word lines of the set being soft programmed. At step 608, the memory cells of all the word lines are verified for an erased state using the erase verify voltage level. In one embodiment, step 608 can include verifying only the memory cells of the interior word lines while ensuring conduction of the end memory cells. However, the memory cells of the end word lines will conduct in most instances anyway under application of the erase verify voltage as they are slower to soft-program than the memory cells of the interior word lines.

At step 610, the number of non-conducting NAND strings in the block being soft programmed is compared to a predetermined number. If the number of non-conducting strings is not greater than the predetermined number, then the soft programming counter SPC is compared against a predetermined limit value (for example 20) at step 612. If the soft programming counter is not less than 20, then a status of fail is reported at step 614 for the soft programming operation. If the soft programming counter is less than 20, the method proceeds to step 616, where the soft programming counter SPC is incremented by 1 and the soft programming voltage signal is stepped up by a predetermined value. At step 617, the NAND strings that were non-conductive (successfully soft programmed) during the verification at step 608 are inhibited from further soft programming. Soft programming in a particular NAND string can be inhibited by applying a higher voltage such as V_(DD) to the corresponding bit line. By raising the bit line voltage, the channel area of the inhibited NAND string will be boosted to a high voltage during the next soft programming cycle. The voltage difference between the floating gates of the memory cells and channel area of the inhibited NAND string will be too low to cause further soft programming of the cells. The method then proceeds to step 604 to apply an additional soft programming pulse to the set of memory cells.

If the number of non-conducting strings is greater than the predetermined number, indicating that the memory cells have successfully undergone soft programming, the soft programming counter SPC is reset at step 618. In one embodiment, step 618 can further include increasing the soft programming voltage signal. In one embodiment, the increase at step 618 can be the same as in step 616 or another value. In one embodiment for example, the soft programming voltage signal is incremented by a step size of ΔV_(spgm1) at step 616. At step 618, it can be incremented by a step size of ΔV_(spgm2), which could be larger than ΔV_(spgm1). A soft programming voltage signal similar to the erase voltage signal of FIG. 18A can be used in one embodiment.

At step 620, the source, bit, and source select gate lines are grounded and V_(SG) is applied to the drain side select gate line. At step 622, soft programming of the interior word lines is inhibited. Soft programming of the interior word lines can be inhibited by applying a small positive voltage on the order of about 0V to 3V to the interior word lines. In one embodiment, the voltage applied to the interior word lines is larger and on the order of about 5V to 10V. For example, the voltage can be a pass voltage (V_(pass)) as typically applied to boost the voltage of a string's channel region to inhibit programming or soft programming. For NAND strings that are to be inhibited from further soft programming (already verified as soft programmed) in further iterations of steps 618-634, the higher voltage will be sufficient to ensure that the channel area of the inhibited NAND strings is sufficiently boosted to avoid further soft programming. At step 624, the soft programming pulse is applied to just the end word lines of the set being erased in order to further soft program the end memory cells. At step 626, the end memory cell word lines are verified for an erased state, while ensuring that the interior word lines are conductive regardless of their state (excluding the interior word lines from verification). The erase verify voltage level can be applied to the end word lines while a voltage of V_(use1) (sufficient to ensure conduction of the interior word lines) is applied to the interior word lines. In this manner, verification is only performed for the end word lines, while excluding the interior word lines from verification.

At step 628, the number of non-conducting strings determined in step 626 is compared against a predetermined number. If the number of non-conducting strings is greater than the predetermined number, indicating that the cells of the end word lines have now shifted up close to the erase verify level, the method proceeds to step 630, where a status of pass is reported. If the number of non-conducting strings is not greater than the predetermined number, then the soft programming counter is compared against a predetermined limit value. If the soft programming counter is greater than the predetermined limit value, a status of fail is reported at step 614 for the operation. If, however, the soft programming counter is less than the predetermined limit value, the soft programming counter is incremented by 1 and the soft programming voltage signal is stepped up at step 634. At step 635, the NAND strings that were non-conductive (successfully soft programmed) during the verification at step 626 are inhibited from further soft programming. The method then proceeds to step 620 for further soft programming of the end memory cells.

In one embodiment, step 634 increments the soft programming voltage signal by the same size as step 616, while in other embodiments, other values are used. For example, if a soft programming voltage signal similar to the erase voltage signal of FIG. 18B is used, step 634 can include increasing by a size ΔV_(spgm3) (similar to ΔV_(ERA3)), step 618 can include increasing by a size ΔV_(spgm2) (similar to ΔV _(ERA2)), and step 616 can include increasing by a size ΔV_(spgm1) (similar to ΔV_(ERA1)). In such an embodiment, step 616 could further include decreasing by a size ΔV_(spgm4) (similar to ΔV_(ERA4)) during a first iteration and the increasing by a size ΔV_(spgm1) for subsequent iterations.

Division of word lines within a NAND string for soft programming can be made in different way in different embodiments. For example, the two most end word lines of a NAND string (e.g., WL0, WL1, WL_(n-1), and WL_(n)) can be grouped together as the end word lines and the remaining word lines (WL2-WL_(n-2)) grouped together as the interior word lines. In such an embodiment, step 622 of FIG. 21 will include inhibiting word lines WL2-WLn-2 and steps 624 and 626 will be performed to further soft program and verify word lines WL0, WL1, WL_(n-1), and WL_(n). In yet another embodiment, six or more word lines could be grouped together as the end word lines. Other groupings can also be implemented.

FIG. 22 sets forth the bias conditions for the various operations of the flow chart depicted in FIG. 21. Column 640 sets forth the bias conditions of the soft programming operation for all the memory cells of the set being erased. Column 640 corresponds to steps 604 through 606 of FIG. 21. The bit line, source line, and p-well are at 0V for soft programming. V_(DD) is shown in parenthesis for the bit line voltage to indicate that V_(DD) is applied to those NAND strings that are to be inhibited from soft programming. The source side select gate line is at 0V, while the drain side select gate line is at V_(SG). The soft programming pulse V_(spgm) is applied to each of the word lines of the set in order to raise the threshold voltage of each memory cell connected thereto.

Column 642 sets forth the bias conditions for verifying soft programming of all the memory cells of the set. Column 642 corresponds to step 608 of FIG. 21. These bias conditions are the same as those for verifying erasure of all memory cells in a set of memory cells. The bit line is floating and the p-well is at 0V, while V_(DD) is provided to the source line. Both select gates are turned on by V_(SG). The erase verify voltage is applied to each word line to determine whether the string is non-conductive and thus has at least one memory cell that has reached the erase verify level.

Column 644 sets forth the bias conditions for soft programming just the end word lines. Column 644 corresponds to steps 620 through 624 of FIG. 21. The drain side select gate is turned on by supplying V_(SG) to the drain side select gate line and the source side select gate is turned off by supplying 0V to the source side select gate line. The interior word lines are provided a low positive voltage of V_(use1) (e.g, 0V to 5V). By supplying a small positive voltage to the interior word lines, the memory cells connected thereto can be inhibited from further programming under application of the soft programming pulses. The end word lines receive the soft programming pulse V_(SPGM) in order to undergo further soft programming. When a NAND string that has been verified as soft programmed is to be inhibited from further soft programming, the value of V_(use1) applied to the interior word lines can be a relatively high voltage (e.g., V_(pass)=5V-10V) rather than a small positive voltage. Because V_(DD) is also applied to an inhibited string's bit line, the relatively high voltage will cause the channel area of the inhibited NAND string to be boosted to a high voltage during the next soft programming cycle. This keeps the voltage difference between the floating gates of the memory cells and the channel area of the inhibited NAND string sufficiently low so that further soft programming of the cells does not occur.

Column 646 sets forth the soft programming verify bias conditions for just the end word lines. Column 646 can correspond to step 626 of FIG. 21. The bit line is floating, while the source line is at V_(DD). The p-well is at zero volts. Both of the select gates are turned on by supplying V_(SG) to the drain select gate line and the source select gate line. V_(use1) is applied to the interior word lines. As discussed above, the value of V_(use1) used during soft programming (column 644) may be larger than 0V to 3V in some instances. The value of V_(use1) for verification is on the order of 0V to 3V. It need only be higher than the erase verify voltage to be sure the cells of the interior word lines for which soft programming is already completed are in a conducting state. In this manner, the state of the memory cells on the end word lines can be determined independently and verified. Thus, the value of Vuse1 used during soft programming (e.g., 5V to 10V) may be different than the value used during soft programming verification (e.g., 0V to 3V). The erase verify voltage or 0V is applied to the end word lines. In this manner, the interior word lines are excluded from soft programming verification, while the end word lines undergo verification.

FIG. 23 depicts the threshold voltage distributions for a set of memory cells after undergoing soft programming according to the embodiment of FIGS. 21 and 22. As shown in FIG. 23, both the erase threshold distributions for the interior and end word lines have been moved up close to the erase verify level. The interior word line threshold voltage distribution 430 is shifted up close to the erase verify level as would occur normally. The end word line distribution 432 has also been moved up close to the erase verify level as a result of the additional soft programming (steps 618-635).

The above examples are provided with respect to NAND type flash memory. However, the principles of the present invention have application to other types of non-volatile memories which utilize a serial structure, including those currently existing and those contemplated to use new technology being developed.

The foregoing detailed description of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. The described embodiments were chosen in order to best explain the principles of the invention and its practical application to thereby enable others skilled in the art to best utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims appended hereto. 

1. A method of soft programming non-volatile memory, comprising: applying one or more soft programming pulses to a set of non-volatile storage elements until said set is verified as soft programmed; inhibiting soft programming of a first subset of said set of non-volatile storage elements after said set is verified as soft programmed; and applying one or more additional soft programming pulses to a second subset of said set of non-volatile storage elements while inhibiting soft programming of said first subset.
 2. The method of claim 1, further comprising: verifying whether said set of non-volatile storage elements is soft programmed in between applying each of said one or more soft programming pulses.
 3. The method of claim 2, wherein: verifying whether said set of non-volatile storage elements is soft programmed includes verifying whether said first subset of non-volatile storage elements is soft programmed while excluding said second subset of non-volatile storage elements from verification.
 4. The method of claim 3, wherein: verifying whether said first subset is soft programmed includes applying an erase verify voltage to each non-volatile storage element in said first subset; and excluding said second subset from verification includes applying a voltage larger than said erase verify voltage to each non-volatile storage element in said second subset.
 5. The method of claim 1, further comprising: verifying whether said second subset of non-volatile storage elements is soft programmed in between applying each of said one or more additional soft programming pulses; and wherein said applying one or more additional soft programming pulses includes applying said one or more additional soft programming pulses until said second subset is verified as soft programmed.
 6. The method of claim 5, wherein: verifying whether said second subset is soft programmed includes verifying that said second subset is soft programmed when at least one non-volatile storage element of said second subset reaches a verify level.
 7. The method of claim 5, wherein: verifying whether said second subset is soft programmed includes excluding said first subset of non-volatile storage elements from verification.
 8. The method of claim 7, wherein: verifying whether said second subset is soft programmed includes applying an erase verify voltage to each non-volatile storage of said second subset; and excluding said first subset from verification includes applying a voltage larger than said erase verify voltage to each non-volatile storage element in said first subset.
 9. The method of claim 1, wherein: applying said one or more soft programming pulses includes increasing a size of said one or more soft programming pulses by a first step size in between applying each of said one or more soft programming pulses.
 10. The method of claim 9, wherein: applying said one or more additional soft programming pulses includes increasing a size of said one or more additional soft programming pulses by a second step size in between applying each of said one or more additional soft programming pulses.
 11. The method of claim 10, wherein: said one or more soft programming pulses includes a last soft programming pulse applied to said set before said set is verified as successfully soft programmed; and said applying said one or more additional soft programming pulses includes, before applying a first of said one or more additional soft programming pulses, increasing a size of said last soft programming pulse by a third step size for said first of said one or more additional soft programming pulses.
 12. The method of claim 11, wherein: said first step size and said second step size are a same step size.
 13. The method of claim 1, wherein said applying said one or more soft programming pulses includes: decreasing a size of said one or more soft programming pulses by a first step size after applying a first soft programming pulse if said set is not verified as soft programmed after application of said first soft programming pulse; and increasing said size of said one or more soft programming pulses by a second step size after applying a second soft programming pulse if said set is not verified as soft programmed after application of said second soft programming pulse.
 14. The method of claim 13, wherein said applying said one or more additional soft programming pulses includes: in between applying each of said one or more additional soft programming pulses, increasing a size of said one or more additional soft programming pulses by a third step size.
 15. The method of claim 14, wherein: said one or more soft programming pulses includes a last soft programming pulse applied to said set before said set is verified as successfully soft programmed; and said applying said one or more additional soft programming pulses includes, before applying a first of said one or more additional soft programming pulses, increasing a size of said last soft programming pulse by a fourth step size for said first of said one or more additional soft programming pulses.
 16. The method of claim 15, wherein: said second step size and said third step size are a same size.
 17. The method of claim 1, wherein: said first subset of non-volatile storage elements are interior non-volatile storage elements of said set; and said second subset of non-volatile storage elements are end non-volatile storage elements of said set.
 18. The method of claim 17, wherein: said second subset includes a first non-volatile storage element adjacent to a first select gate for said set and a second non-volatile storage element adjacent to a second select gate for said set.
 19. The method of claim 18, wherein: said second subset further includes a third non-volatile storage element adjacent to said first non-volatile storage element and a fourth non-volatile storage element adjacent to said second non-volatile storage element.
 20. The method of claim 1, wherein: said set of non-volatile storage elements is a NAND string.
 21. The method of claim 1, wherein: said set of non-volatile storage elements is a set of multi-state flash memory devices.
 22. A method of soft programming non-volatile memory, comprising: applying a soft programming voltage to each non-volatile storage element in a set of non-volatile storage elements; verifying whether said set of non-volatile storage elements is soft programmed; repeating said applying and verifying until said set of non-volatile storage elements is verified as soft programmed; applying said soft programming voltage to each non-volatile storage element in a subset of said set of non-volatile storage elements after verifying that said set of non-volatile storage elements is soft programmed; and verifying whether said subset of non-volatile storage elements is soft programmed.
 23. The method of claim 22, wherein: said subset is a second subset of said set of non-volatile storage elements; said set includes a first subset of non-volatile storage elements; and said verifying whether said second subset is soft programmed includes excluding said first subset of non-volatile storage elements from verification.
 24. The method of claim 23, wherein: verifying whether said set of non-volatile storage elements is soft programmed includes verifying whether said first subset of non-volatile storage elements is soft programmed while excluding said second subset of non-volatile storage elements from verification.
 25. The method of claim 22, wherein: repeating said applying and verifying includes increasing a size of said soft programming voltage by a first step size prior to reapplying to said set; and applying said soft programming voltage to each non-volatile storage element in said subset includes increasing said size of said soft programming voltage by a second step size prior to first applying said soft programming voltage to said subset after said set has been verified as soft programmed.
 26. The method of claim 22, wherein said repeating includes: after a first application of said soft programming voltage to said set, decreasing a size of said soft programming voltage by a first step size; and after a second application of said soft programming voltage to said set and thereafter, increasing a size of said soft programming voltage by a second step size.
 27. The method of claim 22, wherein: said set of non-volatile storage elements is a NAND string of multi-state flash memory devices.
 28. A method of soft programming non-volatile memory, comprising: applying one or more soft programming pulses to a plurality of sets of non-volatile storage elements, said one or more soft programming pulses are applied until said plurality of sets of non-volatile storage elements is verified as soft programmed; inhibiting soft programming of a first subset of non-volatile storage elements in each set of non-volatile storage elements after said plurality of sets is verified as soft programmed; and applying one or more additional soft programming pulses to a second subset of non-volatile storage elements in each set of non-volatile storage elements while inhibiting soft programming of said first subset in each set.
 29. The method of 28, further comprising: verifying whether said plurality of sets of non-volatile storage elements is soft programmed in between applying each of said one or more soft programming pulses.
 30. The method of claim 29, wherein: said plurality of sets of non-volatile storage elements is verified as soft programmed when a pre-determined number of said plurality of sets are verified as soft programmed.
 31. The method of claim 29, wherein: verifying whether said plurality of sets of non-volatile storage elements is soft programmed includes verifying whether said first subsets of non-volatile storage elements in each set are soft programmed while excluding said second subsets of non-volatile storage elements in each set from verification.
 32. The method of claim 28, further comprising: verifying whether said second subsets of non-volatile storage elements in each set are soft programmed in between applying each of said one or more additional soft programming pulses, said second subsets are verified as soft programmed when a pre-determined number of said second subsets are verified as soft programmed; and wherein said applying one or more additional soft programming pulses includes applying said one or more additional soft programming pulses until said predetermined number of said second subsets are verified as soft programmed.
 33. The method of claim 32, wherein: verifying whether said second subsets of each set are soft programmed includes excluding said first subsets of each set from verification.
 34. The method of claim 28, wherein: applying said one or more soft programming pulses includes increasing a size of said one or more soft programming pulses by a first step size in between applying each of said one or more soft programming pulses; and applying said one or more additional soft programming pulses includes increasing a size of said one or more additional soft programming pulses by a second step size in between applying each of said one or more additional soft programming pulses.
 35. The method of claim 28, wherein: said set of non-volatile storage elements is a NAND string of multi-state flash memory devices.
 36. A method of soft programming non-volatile memory, comprising: applying one or more soft programming pulses to each non-volatile storage element in a plurality of NAND strings; verifying soft programming of said plurality of NAND strings; repeating said applying and verifying until a predetermined number of said plurality of NAND strings are verified as soft programmed; inhibiting soft programming of a first subset of non-volatile storage elements in each NAND string; and applying one or more additional soft programming pulses to a second subset of non-volatile storage elements in each NAND string after said predetermined number of NAND strings are verified as soft programmed.
 37. The method of claim 36, further comprising: verifying whether said second subsets of non-volatile storage elements in each NAND string are soft programmed in between applying each of said one or more additional soft programming pulses; and wherein said applying one or more additional soft programming pulses includes applying said one or more additional soft programming pulses until said second subsets of non-volatile storage elements in each set are verified as soft programmed.
 38. The method of claim 37, wherein: verifying whether said second subsets of each set are soft programmed includes excluding said first subsets of each set from verification.
 39. The method of claim 36, wherein: applying one or more soft programming pulses includes increasing a size of said one or more soft programming pulses by a first step size in between applying each of said one or more soft programming pulses; and applying said one or more additional soft programming pulses includes increasing a size of said one or more additional soft programming pulses by a second step size in between applying each of said one or more additional soft programming pulses.
 40. The method of claim 36, wherein said applying said one or more soft programming pulses includes: decreasing a size of said one or more soft programming pulses by a first step size after applying a first soft programming pulse if said predetermined number of said plurality of NAND strings are not verified as soft programmed after application of said first soft programming pulse; and increasing said size of said one or more soft programming pulses by a second step size after applying a second soft programming pulse if said predetermined number of said plurality of NAND strings are not verified as soft programmed after application of said second soft programming pulse.
 41. A method of soft programming non-volatile memory, comprising: programming each non-volatile storage element in a set of non-volatile storage elements until said set is verified as having reached a target level; stopping programming of each non-volatile storage element in a first subset of said set of non-volatile storage elements after said set is verified as having reached said target level; and continuing to program each non-volatile storage element in a second subset of said set of non-volatile storage elements after stopping programming of each non-volatile storage element in said first subset.
 42. The method of claim 41, further comprising: verifying whether said second subset of non-volatile storage elements has reached said target level, said verifying includes excluding said first subset of non-volatile storage elements from verification; and wherein said continuing to program each non-volatile storage element in said second subset continues until said second subset is verified as having reached said target level.
 43. The method of claim 41, wherein: said programming includes applying one or more soft programming pulses; and said target level is a soft programming target level.
 44. The method of claim 41, wherein: said set of non-volatile storage elements includes a plurality of NAND strings; and said set is verified as having reached said target level when a predetermined number of said plurality of NAND strings are determined to include at least one non-volatile storage element that has reached said target level.
 45. The method of claim 1, wherein: said set of non-volatile storage elements is in communication with a plurality of word lines, said plurality including a first subset of word lines in communication with said first subset of non-volatile storage elements and a second subset of word lines in communication with said second subset of non-volatile storage elements; and wherein inhibiting soft programming of said first subset after said set is verified as soft programmed includes applying a positive voltage to said first subset of word lines.
 46. The method of claim 31, wherein: said plurality of sets of non-volatile storage elements is in communication with a plurality of word lines, said plurality of word lines including a first subset of word lines in communication with said first subsets of non-volatile storage elements and a second subset of word lines in communication with said second subsets of non-volatile storage elements; said plurality of sets of non-volatile storage elements is in communication with a plurality of bit lines, each bit line associated with one set of non-volatile storage elements; said method further comprises inhibiting further soft programming during said one or more soft programming pulses for each set of said plurality that verifies as being soft programmed by applying an inhibit voltage to a bit line associated with said each set that verifies as being soft programmed; and said inhibiting soft programming of said first subset of non-volatile storage elements in each set after said plurality of sets is verified as soft programmed includes applying an inhibit voltage to each word line in said first subset of word lines. 