WO2015142513A1 - Detection of read disturbances on non-volatile memories through counting of read accesses within divisions of the memory - Google Patents
Detection of read disturbances on non-volatile memories through counting of read accesses within divisions of the memory Download PDFInfo
- Publication number
- WO2015142513A1 WO2015142513A1 PCT/US2015/018527 US2015018527W WO2015142513A1 WO 2015142513 A1 WO2015142513 A1 WO 2015142513A1 US 2015018527 W US2015018527 W US 2015018527W WO 2015142513 A1 WO2015142513 A1 WO 2015142513A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- memory
- data
- read
- word lines
- subdivisions
- Prior art date
Links
- 230000015654 memory Effects 0.000 title claims abstract description 312
- 238000001514 detection method Methods 0.000 title description 5
- 238000000034 method Methods 0.000 claims abstract description 49
- 238000003860 storage Methods 0.000 claims description 29
- 239000000758 substrate Substances 0.000 claims description 20
- 238000003491 array Methods 0.000 claims description 12
- 230000004044 response Effects 0.000 claims description 11
- 238000004891 communication Methods 0.000 claims description 2
- 229910052710 silicon Inorganic materials 0.000 claims description 2
- 239000010703 silicon Substances 0.000 claims description 2
- XUIMIQQOPSSXEZ-UHFFFAOYSA-N Silicon Chemical compound [Si] XUIMIQQOPSSXEZ-UHFFFAOYSA-N 0.000 claims 1
- 230000003247 decreasing effect Effects 0.000 claims 1
- 230000008569 process Effects 0.000 abstract description 5
- 108010001267 Protein Subunits Proteins 0.000 abstract 1
- 239000004065 semiconductor Substances 0.000 description 10
- 230000000694 effects Effects 0.000 description 9
- 230000000670 limiting effect Effects 0.000 description 8
- 238000009826 distribution Methods 0.000 description 6
- 238000007726 management method Methods 0.000 description 6
- 238000013507 mapping Methods 0.000 description 6
- 238000000638 solvent extraction Methods 0.000 description 6
- 230000008878 coupling Effects 0.000 description 5
- 238000010168 coupling process Methods 0.000 description 5
- 238000005859 coupling reaction Methods 0.000 description 5
- 230000005669 field effect Effects 0.000 description 5
- 239000007787 solid Substances 0.000 description 5
- 238000013459 approach Methods 0.000 description 4
- 238000013500 data storage Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000005684 electric field Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000036961 partial effect Effects 0.000 description 3
- 238000012163 sequencing technique Methods 0.000 description 3
- VYPSYNLAJGMNEJ-UHFFFAOYSA-N Silicium dioxide Chemical compound O=[Si]=O VYPSYNLAJGMNEJ-UHFFFAOYSA-N 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 238000011156 evaluation Methods 0.000 description 2
- 239000002784 hot electron Substances 0.000 description 2
- 238000002347 injection Methods 0.000 description 2
- 239000007924 injection Substances 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 238000013138 pruning Methods 0.000 description 2
- 238000004064 recycling Methods 0.000 description 2
- 238000005201 scrubbing Methods 0.000 description 2
- 239000000243 solution Substances 0.000 description 2
- 230000007704 transition Effects 0.000 description 2
- 238000013519 translation Methods 0.000 description 2
- 230000014616 translation Effects 0.000 description 2
- 230000005641 tunneling Effects 0.000 description 2
- 230000005689 Fowler Nordheim tunneling Effects 0.000 description 1
- 230000004931 aggregating effect Effects 0.000 description 1
- 230000000739 chaotic effect Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 239000011370 conductive nanoparticle Substances 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000001351 cycling effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 239000003989 dielectric material Substances 0.000 description 1
- 238000009792 diffusion process Methods 0.000 description 1
- 230000003292 diminished effect Effects 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- PWPJGUXAGUPAHP-UHFFFAOYSA-N lufenuron Chemical compound C1=C(Cl)C(OC(F)(F)C(C(F)(F)F)F)=CC(Cl)=C1NC(=O)NC(=O)C1=C(F)C=CC=C1F PWPJGUXAGUPAHP-UHFFFAOYSA-N 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000012782 phase change material Substances 0.000 description 1
- 230000002028 premature Effects 0.000 description 1
- 239000013643 reference control Substances 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 235000012239 silicon dioxide Nutrition 0.000 description 1
- 239000000377 silicon dioxide Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/50—Marginal testing, e.g. race, voltage or current testing
- G11C29/50004—Marginal testing, e.g. race, voltage or current testing of threshold voltage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1008—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices
- G06F11/1072—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices in multilevel memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/0223—User address space allocation, e.g. contiguous or non contiguous base addressing
- G06F12/023—Free address space management
- G06F12/0238—Memory management in non-volatile memory, e.g. resistive RAM or ferroelectric memory
- G06F12/0246—Memory management in non-volatile memory, e.g. resistive RAM or ferroelectric memory in block erasable memory, e.g. flash memory
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/06—Auxiliary circuits, e.g. for writing into memory
- G11C16/10—Programming or data input circuits
- G11C16/102—External programming circuits, e.g. EPROM programmers; In-circuit programming or reprogramming; EPROM emulators
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/06—Auxiliary circuits, e.g. for writing into memory
- G11C16/34—Determination of programming status, e.g. threshold voltage, overprogramming or underprogramming, retention
- G11C16/3418—Disturbance prevention or evaluation; Refreshing of disturbed memory data
- G11C16/3422—Circuits or methods to evaluate read or write disturbance in nonvolatile memory, without steps to mitigate the problem
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/06—Auxiliary circuits, e.g. for writing into memory
- G11C16/34—Determination of programming status, e.g. threshold voltage, overprogramming or underprogramming, retention
- G11C16/349—Arrangements for evaluating degradation, retention or wearout, e.g. by counting erase cycles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/72—Details relating to flash memory management
- G06F2212/7202—Allocation control and policies
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C11/00—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor
- G11C11/56—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency
- G11C11/5621—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency using charge storage in a floating gate
- G11C11/5642—Sensing or reading circuits; Data output circuits
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/06—Auxiliary circuits, e.g. for writing into memory
- G11C16/32—Timing circuits
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/50—Marginal testing, e.g. race, voltage or current testing
- G11C2029/5004—Voltage
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C2211/00—Indexing scheme relating to digital stores characterized by the use of particular electric or magnetic storage elements; Storage elements therefor
- G11C2211/56—Indexing scheme relating to G11C11/56 and sub-groups for features not covered by these groups
- G11C2211/564—Miscellaneous aspects
- G11C2211/5644—Multilevel memory comprising counting devices
Definitions
- the following relates to the operation of re-programmable non- volatile memory systems such as semiconductor flash memory, and, more specifically, to the determination and management of error on such memories.
- Solid-state memory capable of nonvolatile storage of charge, particularly in the form of EEPROM and flash EEPROM packaged as a small form factor card, has
- RAM random access memory
- flash memory is nonvolatile, and retaining its stored data even after power is turned off.
- ROM read only memory
- flash memory is rewritable similar to a disk storage
- flash memory is increasingly being used in mass storage applications.
- Conventional mass storage based on rotating magnetic medium such as hard drives and floppy disks, is unsuitable for the mobile and handheld environment. This is because disk drives tend to be bulky, are prone to mechanical failure and have high latency and high power requirements. These undesirable 0 attributes make disk-based storage impractical in most mobile and portable applications.
- flash memory whether embedded, a solid state drive (SSD) and in the form of a removable card is ideally suited in the mobile and handheld environment because of its small size, low power consumption, high speed and high reliability features.
- SSD solid state drive
- Flash EEPROM is similar to EEPROM (electrically erasable and programmable read-only memory) in that it is a non-volatile memory that can be erased and have new data written or "programmed" into their memory cells. Both utilize a floating (unconnected) conductive gate, in a field effect transistor structure, positioned over a channel region in a semiconductor substrate, between source and 0 drain regions. A control gate is then provided over the floating gate. The threshold voltage characteristic of the transistor is controlled by the amount of charge that is retained on the floating gate.
- Flash memory such as Flash EEPROM allows entire blocks of memory cells to be erased at the same time.
- the floating gate can hold a range of charges and therefore can be programmed to any threshold voltage level within a threshold voltage window.
- the size of the threshold voltage window is delimited by the minimum and maximum threshold levels of the device, which in turn correspond to the range of the charges that can be programmed onto the floating gate.
- the threshold window generally depends on the memory device's characteristics, operating conditions and history. Each distinct, resolvable threshold voltage level range within the window may, in principle, be used to designate a definite memory state of the cell.
- the transistor serving as a memory cell is typically programmed to a "programmed" state by one of two mechanisms.
- hot electron injection a high voltage applied to the drain accelerates electrons across the substrate channel region.
- control gate pulls the hot electrons through a thin gate dielectric onto the floating gate.
- tunnel injection a high voltage is applied to the control gate relative to the substrate. In this way, electrons are pulled from the substrate to the intervening floating gate.
- the memory device may be erased by a number of mechanisms.
- a memory cell is electrically erasable, by applying a high voltage to the substrate relative to the control gate so as to induce electrons in the floating gate to tunnel through a thin oxide to the substrate channel region (i.e., Fowler-Nordheim tunneling.)
- the EEPROM is erasable byte by byte.
- the memory is electrically erasable either all at once or one or more minimum erasable blocks at a time, where a minimum erasable block may consist of one or more sectors and each sector may store 512 bytes or more of data.
- the memory device typically comprises one or more memory chips that may be mounted on a card or in a solid state drive (SSD).
- Each memory chip comprises an array of memory cells supported by peripheral circuits such as decoders and erase, write and read circuits.
- peripheral circuits such as decoders and erase, write and read circuits.
- the more sophisticated memory devices also come with a controller that performs intelligent and higher level memory operations and interfacing.
- non-volatile solid-state memory devices There are many commercially successful non-volatile solid-state memory devices being used today. These memory devices may be flash EEPROM or may employ other types of nonvolatile memory cells. Examples of flash memory and systems and methods of manufacturing them are given in United States patents nos. 5,070,032, 5,095,344, 5,315,541, 5,343,063, and 5,661,053, 5,313,421 and 6,222,762. In particular, flash memory devices with NAND string structures are described in United States patent nos. 5,570,315, 5,903,495, 6,046,935. Also nonvolatile memory devices are also manufactured from memory cells with a dielectric layer for storing charge. Instead of the conductive floating gate elements described earlier, a dielectric layer is used.
- Such memory devices utilizing dielectric storage element have been described by Eitan et al., "NROM: A Novel Localized Trapping, 2-Bit Nonvolatile Memory Cell,” IEEE Electron Device Letters, vol. 21, no. 11, November 2000, pp. 543-545.
- An ONO dielectric layer extends across the channel between source and drain diffusions. The charge for one data bit is localized in the dielectric layer adjacent to the drain, and the charge for the other data bit is localized in the dielectric layer adjacent to the source.
- United States patents nos. 5,768,192 and 6,011,725 disclose a nonvolatile memory cell having a trapping dielectric sandwiched between two silicon dioxide layers. Multi-state data storage is implemented by separately reading the binary states of the spatially separated charge storage regions within the dielectric.
- erase operation may take as much as an order of magnitude longer than read and program operations. Thus, it is desirable to have the erase block of substantial size. In this way, the erase time is amortized over a large aggregate of memory cells.
- flash memory predicates that data must be written to an erased memory location. If data of a certain logical address from a host is to be updated, one way is rewrite the update data in the same physical memory location. That is, the logical to physical address mapping is unchanged. However, this will mean the entire erase block contain that physical location will have to be first erased and then rewritten with the updated data. This method of update is inefficient, as it requires an entire erase block to be erased and rewritten, especially if the data to be updated only occupies a small portion of the erase block. It will also result in a higher frequency of erase recycling of the memory block, which is undesirable in view of the limited endurance of this type of memory device.
- LBA interface logical blocks of data
- the extent of the address space is typically sufficient to cover the full range of addresses that the system is capable of handling.
- magnetic disk storage drives communicate with computers or other host systems through such a logical address space. This address space has an extent sufficient to address the entire data storage capacity of the disk drive.
- Flash memory systems are most commonly provided in the form of a memory card or flash drive that is removably connected with a variety of hosts such as a personal computer, a camera or the like, but may also be embedded within such host systems or be in the form of a solid state drive.
- the host When writing data to the memory, the host typically assigns unique logical addresses to sectors, clusters or other units of data within a continuous virtual address space of the memory system.
- DOS disk operating system
- the host writes data to, and reads data from, addresses within the logical address space of the memory system.
- a controller within the memory system translates logical addresses received from the host into physical addresses within the memory array, where the data are actually stored, and then keeps track of these address translations.
- the data storage capacity of the memory system is at least as large as the amount of data that is addressable over the entire logical address space defined for the memory system.
- the size of the erase unit has been increased to a block of enough memory cells to store multiple sectors of data. Indeed, many pages of data are stored in one block, and a page may store multiple sectors of data. Further, two or more blocks are often operated together as metablocks, and the pages of such blocks logically linked together as metapages. A page or metapage of data are written and read together, which can include many sectors of data, thus increasing the parallelism of the operation. Along with such large capacity operating units the challenge is to operate them efficiently.
- block refers to either the block unit of erase or a multiple block “metablock,” depending upon whether metablocks are being used in a specific system.
- page herein may refer to a unit of programming within a single block or a "metapage” within a metablock, depending upon the system configuration.
- non-volatile memory devices such as those based on EEPROM or dielectric storage
- the non-volatility is non-perfect and the data value stored in an element can be degraded by leakage over time.
- Operations in one part of the memory circuit can also affect data values in storage elements not being directly acted upon. For example, capacitive coupling between memory cells on adjacent word lines can lead "read disturbs” or “write disturbs” when a neighboring word line is read or written. (Erase disturbs may also occur, depending on the granularity at which cells are erased.) To maintain the integrity of data in such memory systems, the effects of such disturbs need to be considered.
- a method for the operating of a non-volatile memory system having one or more memory circuits and a controller circuit.
- the memory circuits each include one or more arrays of non- volatile memory cells formed along word lines and the controller circuit manages the storage of data on the memory circuit.
- the controller circuit For each of a first plurality of distinct divisions of the one or more memory arrays the controller circuit maintains a count of the number of times word lines of the corresponding division is accessed for a read operation.
- subdividing the corresponding division is subdivide into a second plurality of distinct first subdivisions.
- the controller circuit subsequently maintains a count of the number of times word lines of the subdivision is accessed for read operations.
- FIG. 1 illustrates schematically the main hardware components of a memory system suitable for implementing the present invention.
- FIG. 2 illustrates schematically a non-volatile memory cell.
- FIG. 3 illustrates the relation between the source-drain current I D and the control gate voltage VCG for four different charges Q1-Q4 that the floating gate may be selectively storing at any one time.
- FIG. 4A illustrates schematically a string of memory cells organized into an NAND string.
- FIG. 4B illustrates an example of an NAND array 210 of memory cells, constituted from NAND strings 50 such as that shown in FIG. 4A.
- FIG. 5 illustrates a page of memory cells, organized for example in the NAND configuration, being sensed or programmed in parallel.
- FIG. 6(0) - 6(2) illustrate an example of programming a population of 4-state memory cells.
- FIGs. 7A-7E illustrate the programming and reading of the 4-state memory encoded with a given 2-bit code.
- FIG. 7F illustrates a foggy- fine programming for an 8-state memory encoded with a given 3-bit code.
- FIG. 8 illustrates the memory being managed by a memory manager with is a software component that resides in the controller.
- FIG. 9 illustrates the software modules of the back-end system.
- FIGs. 10A(i) - lOA(iii) illustrate schematically the mapping between a logical group and a metablock.
- FIG. 10B illustrates schematically the mapping between logical groups and metab locks.
- FIG. 11 is a schematic representation of the process for a two level example.
- FIGs. 12 and 13 provide further illustration of a hash tree to track read zones.
- FIG. 1 to FIG. 10B provide example memory systems in which the various aspects of the present invention may be implemented or illustrated.
- FIG. 1 illustrates schematically the main hardware components of a memory system suitable for implementing the present invention.
- the memory system 90 typically operates with a host 80 through a host interface.
- the memory system is typically in the form of a memory card, solid state drive (SSD), or an embedded memory system.
- the memory system 90 includes a memory 200 whose operations are controlled by a controller 100.
- the memory 200 comprises of one or more array of non- volatile memory cells distributed over one or more integrated circuit chip.
- the controller 100 includes an interface 110, a processor 120, an optional coprocessor 121, ROM 122 (read-only-memory), RAM 130 (random access memory) and optionally programmable nonvolatile memory 124.
- the interface 110 has one component interfacing the controller to a host and another component interfacing to the memory 200.
- Firmware stored in nonvolatile ROM 122 and/or the optional nonvolatile memory 124 provides codes for the processor 120 to implement the functions of the controller 100. Error correction codes may be processed by the processor 120 or the optional coprocessor 121.
- the controller 100 is implemented by a state machine (not shown.) In yet another embodiment, the controller 100 is implemented within the host.
- memory devices include volatile memory devices, such as dynamic random access memory (“DRAM”) or static random access memory (“SRAM”) devices, non-volatile memory devices, such as resistive random access memory (“ReRAM”), electrically erasable programmable read only memory (“EEPROM”), flash memory (which can also be considered a subset of EEPROM), ferroelectric random access memory (“FRAM”), and magnetoresistive random access memory (“MRAM”), and other semiconductor elements capable of storing information.
- volatile memory devices such as dynamic random access memory (“DRAM”) or static random access memory (“SRAM”) devices
- non-volatile memory devices such as resistive random access memory (“ReRAM”), electrically erasable programmable read only memory (“EEPROM”), flash memory (which can also be considered a subset of EEPROM), ferroelectric random access memory (“FRAM”), and magnetoresistive random access memory (“MRAM”), and other semiconductor elements capable of storing information.
- ReRAM resistive random access memory
- EEPROM electrically erasable programmable read
- the memory devices can be formed from passive and/or active elements, in any combinations.
- passive semiconductor memory elements include ReRAM device elements, which in some embodiments include a resistivity switching storage element, such as an anti-fuse, phase change material, etc., and optionally a steering element, such as a diode, etc.
- active semiconductor memory elements include EEPROM and flash memory device elements, which in some embodiments include elements containing a charge storage region, such as a floating gate, conductive nanoparticles or a charge storage dielectric material.
- NAND devices contain memory elements ⁇ e.g., devices containing a charge storage region) connected in series.
- a NAND memory array may be configured so that the array is composed of multiple strings of memory in which each string is composed of multiple memory elements sharing a single bit line and accessed as a group.
- memory elements may be configured so that each element is individually accessible, e.g., a NOR memory array.
- NOR memory array One of skill in the art will recognize that the NAND and NOR memory configurations are exemplary, and memory elements may be otherwise configured.
- the semiconductor memory elements of a single device may be distributed in two or three dimensions, such as a two dimensional array structure or a three dimensional array structure.
- the semiconductor memory elements are arranged in a single plane or single memory device level.
- memory elements are located in a plane ⁇ e.g., in an x- z direction plane) which extends substantially parallel to a major surface of a substrate that supports the memory elements.
- the substrate may be a wafer over which the layers of the memory elements are deposited and/or in which memory elements are formed or it may be a carrier substrate which is attached to the memory elements after they are formed.
- the substrate may include a semiconductor such as silicon.
- the memory elements may be arranged in the single memory device level in an ordered array, such as in a plurality of rows and/or columns. However, the memory elements may be arranged in non-regular or non-orthogonal configurations as understood by one of skill in the art.
- the memory elements may each have two or more electrodes or contact lines, such as bit lines and word lines.
- a three dimensional memory array is organized so that memory elements occupy multiple planes or multiple device levels, forming a structure in three dimensions (i.e., in the x, y and z directions, where the y direction is substantially perpendicular and the x and z directions are substantially parallel to the major surface of the substrate).
- each plane in a three dimensional memory array structure may be physically located in two dimensions (one memory level) with multiple two dimensional memory levels to form a three dimensional memory array structure.
- a three dimensional memory array may be physically structured as multiple vertical columns (e.g., columns extending substantially perpendicular to the major surface of the substrate in the y direction) having multiple elements in each column and therefore having elements spanning several vertically stacked memory planes.
- the columns may be arranged in a two dimensional configuration, e.g., in an x-z plane, thereby resulting in a three dimensional arrangement of memory elements.
- One of skill in the art will understand that other configurations of memory elements in three dimensions will also constitute a three dimensional memory array.
- the memory elements may be connected together to form a NAND string within a single horizontal (e.g., x-z) plane.
- the memory elements may be connected together to extend through multiple horizontal planes.
- Other three dimensional configurations can be envisioned wherein some NAND strings contain memory elements in a single memory level while other strings contain memory elements which extend through multiple memory levels.
- Three dimensional memory arrays may also be designed in a NOR configuration and in a ReRAM configuration.
- a monolithic three dimensional memory array is one in which multiple memory levels are formed above and/or within a single substrate, such as a semiconductor wafer.
- the layers of each level of the array are formed on the layers of each underlying level of the array.
- layers of adjacent levels of a monolithic three dimensional memory array may be shared or have intervening layers between memory levels.
- two dimensional arrays may be formed separately and then packaged together to form a non-monolithic memory device.
- non- monolithic stacked memories have been constructed by forming memory levels on separate substrates and adhering the memory levels atop each other.
- the substrates may be thinned or removed from the memory levels before bonding, but as the memory levels are initially formed over separate substrates, such memories are not monolithic three dimensional memory arrays. Further, multiple two dimensional memory arrays or three dimensional memory arrays (monolithic or non-monolithic) may be formed separately and then packaged together to form a stacked-chip memory device.
- Associated circuitry is typically required for proper operation of the memory elements and for proper communication with the memory elements.
- This associated circuitry may be on the same substrate as the memory array and/or on a separate substrate.
- the memory devices may have driver circuitry and control circuitry used in the programming and reading of the memory elements.
- FIG. 2 illustrates schematically a non-volatile memory cell.
- the memory cell 10 can be implemented by a field-effect transistor having a charge storage unit 20, such as a floating gate or a dielectric layer.
- the memory cell 10 also includes a source 14, a drain 16, and a control gate 30.
- Typical non- volatile memory cells include EEPROM and flash EEPROM. Examples of EEPROM cells and methods of manufacturing them are given in United States patent no. 5,595,924. Examples of flash EEPROM cells, their uses in memory systems and methods of manufacturing them are given in United States patents nos. 5,070,032, 5,095,344, 5,315,541 , 5,343,063, 5,661 ,053, 5,313,421 and 6,222,762. In particular, examples of memory devices with NAND cell structures are described in United States patent nos. 5,570,315, 5,903,495, 6,046,935.
- the memory state of a cell is usually read by sensing the conduction current across the source and drain electrodes of the cell when a reference voltage is applied to the control gate.
- a corresponding conduction current with respect to a fixed reference control gate voltage may be detected.
- the range of charge programmable onto the floating gate defines a corresponding threshold voltage window or a corresponding conduction current window.
- the threshold voltage for a given memory state under test is set at the control gate and detect if the conduction current is lower or higher than a threshold current.
- the detection of the conduction current relative to a threshold current is accomplished by examining the rate the conduction current is discharging through the capacitance of the bit line.
- FIG. 3 illustrates the relation between the source-drain current I D and the control gate voltage VCG for four different charges Q 1 -Q4 that the floating gate may be selectively storing at any one time.
- the four solid I D versus VCG curves represent four possible charge levels that can be programmed on a floating gate of a memory cell, respectively corresponding to four possible memory states.
- the threshold voltage window of a population of cells may range from 0.5V to 3.5V. Seven possible memory states “0", “1 “, “2", “3”, “4", "5", "6", respectively representing one erased and six programmed states may be demarcated by partitioning the threshold window into five regions in interval of 0.5V each.
- Q4 is in a memory state "5".
- a memory device may have memory cells having a threshold window that ranges from -1.5V to 5V. This provides a maximum width of 6.5V. If the memory cell is to store 16 states, each state may occupy from 200mV to 300mV in the threshold window. This will require higher precision in programming and reading operations in order to be able to achieve the required resolution.
- FIG. 4A illustrates schematically a string of memory cells organized into an NAND string.
- a pair of select transistors SI, S2 controls the memory transistors chain's connection to the external via the NAND string's source terminal 54 and drain terminal 56 respectively.
- the source select transistor SI when the source select transistor SI is turned on, the source terminal is coupled to a source line (see FIG. 4B).
- the drain select transistor S2 is turned on, the drain terminal of the NAND string is coupled to a bit line of the memory array.
- Each memory transistor 10 in the chain acts as a memory cell. It has a charge storage element 20 to store a given amount of charge so as to represent an intended memory state.
- a control gate 30 of each memory transistor allows control over read and write operations. As will be seen in FIG. 4B, the control gates 30 of corresponding memory transistors of a row of NAND string are all connected to the same word line. Similarly, a control gate 32 of each of the select transistors SI, S2 provides control access to the NAND string via its source terminal 54 and drain terminal 56 respectively. Likewise, the control gates 32 of corresponding select transistors of a row of NAND string are all connected to the same select line.
- FIG. 4B illustrates an example of an NAND array 210 of memory cells, constituted from NAND strings 50 such as that shown in FIG. 4 A.
- a bit line such as bit line 36 is coupled to the drain terminal 56 of each NAND string.
- a source line such as source line 34 is couple to the source terminals 54 of each NAND string.
- the control gates along a row of memory cells in a bank of NAND strings are connected to a word line such as word line 42.
- the control gates along a row of select transistors in a bank of NAND strings are connected to a select line such as select line 44.
- An entire row of memory cells in a bank of NAND strings can be addressed by appropriate voltages on the word lines and select lines of the bank of NAND strings.
- the remaining memory transistors in the string are turned on hard via their associated word lines so that the current flowing through the string is essentially dependent upon the level of charge stored in the cell being read.
- FIG. 5 illustrates a page of memory cells, organized for example in the NAND configuration, being sensed or programmed in parallel.
- FIG. 5 essentially shows a bank of NAND strings 50 in the memory array 210 of FIG. 4B, where the detail of each NAND string is shown explicitly as in FIG. 4A.
- a "page" such as the page 60, is a group of memory cells enabled to be sensed or programmed in parallel. This is accomplished by a corresponding page of sense amplifiers 212.
- the sensed results are latches in a corresponding set of latches 214.
- Each sense amplifier can be coupled to a NAND string via a bit line.
- the page is enabled by the control gates of the cells of the page connected in common to a word line 42 and each cell accessible by a sense amplifier accessible via a bit line 36.
- a sensing voltage or a programming voltage is respectively applied to the common word line WL3 together with appropriate voltages on the bit lines.
- flash memory One important difference between flash memory and of type of memory is that a cell must be programmed from the erased state. That is the floating gate must first be emptied of charge. Programming then adds a desired amount of charge back to the floating gate. It does not support removing a portion of the charge from the floating to go from a more programmed state to a lesser one. This means that update data cannot overwrite existing one and must be written to a previous unwritten location.
- the array of memory cells is divided into a large number of blocks of memory cells.
- the block is the unit of erase. That is, each block contains the minimum number of memory cells that are erased together. While aggregating a large number of cells in a block to be erased in parallel will improve erase performance, a large size block also entails dealing with a larger number of update and obsolete data. Just before the block is erased, a garbage collection is required to salvage the non- obsolete data in the block.
- Each block is typically divided into a number of pages.
- a page is a unit of programming or reading.
- the individual pages may be divided into segments and the segments may contain the fewest number of cells that are written at one time as a basic programming operation.
- One or more pages of data are typically stored in one row of memory cells.
- a page can store one or more sectors.
- a sector includes user data and overhead data.
- Multiple blocks and pages distributed across multiple arrays can also be operated together as metab locks and metapages. If they are distributed over multiple chips, they can be operated together as megablocks and megapage. Examples of Multi-level Cell (“MLC”) Memory Partitioning [0061] A nonvolatile memory in which the memory cells each stores multiple bits of data has already been described in connection with FIG. 3.
- a particular example is a memory formed from an array of field-effect transistors, each having a charge storage layer between its channel region and its control gate.
- the charge storage layer or unit can store a range of charges, giving rise to a range of threshold voltages for each field-effect transistor.
- the range of possible threshold voltages spans a threshold window.
- each resolvable zone is used to represent a different memory states for a memory cell.
- the multiple memory states can be coded by one or more binary bits. For example, a memory cell partitioned into four zones can support four states which can be coded as 2-bit data. Similarly, a memory cell partitioned into eight zones can support eight memory states which can be coded as 3- bit data, etc.
- FIG. 6(0) - 6(2) illustrate an example of programming a population of 4-state memory cells.
- FIG. 6(0) illustrates the population of memory cells programmable into four distinct distributions of threshold voltages respectively representing memory states "0", “1", “2” and "3".
- FIG. 6(1) illustrates the initial distribution of "erased” threshold voltages for an erased memory.
- FIG. 6(2) illustrates an example of the memory after many of the memory cells have been programmed. Essentially, a cell initially has an "erased” threshold voltage and programming will move it to a higher value into one of the three zones demarcated by verify levels vVi, vV 2 and vV 3 .
- each memory cell can be programmed to one of the three programmed state "1", "2" and "3" or remain un-programmed in the "erased” state.
- the initial distribution of the "erased” state as shown in FIG. 6(1) will become narrower and the erased state is represented by the "0" state.
- a 2-bit code having a lower bit and an upper bit can be used to represent each of the four memory states.
- the "0", “1", “2” and “3” states are respectively represented by “11", “01”, “00” and ⁇ 0".
- the 2-bit data may be read from the memory by sensing in "full-sequence” mode where the two bits are sensed together by sensing relative to the read demarcation threshold values rVi, rV 2 and rV 3 in three sub-passes respectively.
- FIGs. 7A-7E illustrate the programming and reading of the 4-state memory encoded with a given 2-bit code.
- FIG. 7 A illustrates threshold voltage distributions of the 4-state memory array when each memory cell stores two bits of data using the 2-bit code.
- Such a 2-bit code has been disclosed in US Patent Application No. 10/830,824 filed April 24, 2004 by Li et al, entitled “NON-VOLATILE MEMORY AND CONTROL WITH IMPROVED PARTIAL PAGE PROGRAM CAPABILITY".
- FIG. 7B illustrates the lower page programming (lower bit) in a 2-pass programming scheme using the 2-bit code.
- the fault-tolerant LM New code essentially avoids any upper page programming to transit through any intermediate states.
- FIG. 7C illustrates the upper page programming (upper bit) in the 2-pass programming scheme using the 2-bit code.
- the logical state (1, 1) transits to (0, 1) as represented by programming the "unprogrammed” memory state "0" to "1".
- the logical state (0, 0) is obtained by programming from the "intermediate” state to "3".
- the upper page is to remain at "1"
- the lower page has been programmed to "0”
- it will require a transition from the "intermediate” state to (1, 0) as represented by programming the "intermediate” state to "2".
- FIG. 7D illustrates the read operation that is required to discern the lower bit of the 4-state memory encoded with the 2-bit code.
- a readB operation is first performed to determine if the LM flag can be read. If so, the upper page has been programmed and the readB operation will yield the lower page data correctly. On the other hand, if the upper page has not yet been programmed, the lower page data will be read by a readA operation.
- FIG. 7E illustrates the read operation that is required to discern the upper bit of the 4-state memory encoded with the 2-bit code.
- the upper page read will require a 3-pass read of readA, readB and readC, respectively relative to the demarcation threshold voltages DA, D B and Dc.
- FIG. 7F Another variation on multi-state programming employs a foggy-fine algorithm, as is illustrated in FIG. 7F for a 3-bit memory example. As shown there, this another multi-phase programming operation. A first programming operation is performed as shown in the top line, followed the foggy programming stage. The foggy phase is a full 3 -bit programming operation from the first phase using all eight of the final states. At the end of the foggy, though, the data in these states is not yet fully resolved into well-defined distributions for each of the 8 states (hence, the "foggy" name) and is not readily extractable.
- FIG. 6 and FIG. 7 illustrate examples of a 2-bit (also referred to as "D2") memory.
- D2 2-bit
- a D2 memory has its threshold range or window partitioned into 4 regions, designating 4 states.
- each cell stores 3 bits (low, middle and upper bits) and there are 8 regions.
- D4 there are 4 bits and 16 regions, etc.
- the memory's finite threshold window is partitioned into more regions, the resolution and for programming and reading will necessarily become finer. Two issues arise as the memory cell is configured to store more bits.
- flash memory has an endurance problem as it ages with use.
- charges is shuttled in and out of the floating gate 20 (see FIG. 2) by tunneling across a dielectric. Each time some charges may become trapped in the dielectric and will modify the threshold of the cell. In fact over use, the threshold window will progressively narrow.
- MLC memory generally is designed with tradeoffs between capacity, performance and reliability.
- the multi-pass, bit-by-bit programming and reading technique described in connection with FIG. 7 provides a smooth transition between MLC and binary partitioning.
- the memory is programmed with only the lower bit, it is effectively a binary partitioned memory.
- this approach does not fully optimize the range of the threshold window as in the case of a single-level cell (“SLC") memory, it has the advantage of using the same demarcation or sensing level as in the operations of the lower bit of the MLC memory.
- SLC single-level cell
- the charge programmed into the charge storage element of one memory cell produces an electric field that perturbs the electric field of a neighboring memory cell. This will affect the characteristics of the neighboring memory cell which essentially is a field-effect transistor with a charge storage element. In particular, when sensed the memory cell will appear to have a higher threshold level (or more programmed) than when it is less perturbed.
- the Bit-by-Bit MLC Programming technique described in connection with FIG. 7 above is designed to minimize program disturb from cells along the same word line.
- the thresholds of the cells are moved at most half way up the threshold window. The effect of the first pass is overtaken by the final pass.
- the thresholds are only moved a quarter of the way. In other words, for D2, the charge difference among neighboring cells is limited to a quarter of its maximum. For D3, with three passes, the final pass will limit the charge difference to one-eighth of its maximum.
- bit-by-bit multi-pass programming technique will be compromised by partial-page programming.
- a page is a group of memory cells, typically along a row or word line, that is programmed together as a unit. It is possible to program non overlapping portions of a page individually over multiple programming passes. However, owning to not all the cells of the page are programmed in a final pass together, it could create large difference in charges programmed among the cells after the page is done. Thus partial-page programming would result in more program disturb and would require a larger margin for sensing accuracy.
- the memory is configured as binary memory
- the margin of operation is wider than that of MLC.
- the binary memory is configured to support partial-page programming in which non-overlapping portions of a page may be programmed individually in one of the multiple programming passes on the page.
- the programming and reading performance can be improved by operating with a page of large size.
- the page size is much larger than the host's unit of write (typically a 512-byte sector)
- its usage will be inefficient. Operating with finer granularity than a page allows more efficient usage of such a page.
- FIG. 8 illustrates the memory being managed by a memory manager with is a software component that resides in the controller.
- the memory 200 is organized into blocks, each block of cells being a minimum unit of erase.
- the memory system may operate with even large units of erase formed by an aggregate of blocks into "metablocks" and also "megablocks".
- the description will refer to a unit of erase as a metablock although it will be understood that some systems operate with even larger unit of erase such as a "megablock” formed by an aggregate of metablocks.
- the host 80 accesses the memory 200 when running an application under a file system or operating system.
- the host system addresses data in units of logical sectors where, for example, each sector may contain 512 bytes of data. Also, it is usual for the host to read or write to the memory system in unit of logical clusters, each consisting of one or more logical sectors. In some host systems, an optional host-side memory manager may exist to perform lower level memory management at the host. In most cases during read or write operations, the host 80 essentially issues a command to the memory system 90 to read or write a segment containing a string of logical sectors of data with contiguous addresses.
- a memory-side memory manager 300 is implemented in the controller 100 of the memory system 90 to manage the storage and retrieval of the data of host logical sectors among metab locks of the flash memory 200.
- the memory manager comprises a front-end system 310 and a back-end system 320.
- the front-end system 310 includes a host interface 312.
- the back-end system 320 includes a number of software modules for managing erase, read and write operations of the metablocks.
- the memory manager also maintains system control data and directory data associated with its operations among the flash memory 200 and the controller RAM 130.
- FIG. 9 illustrates the software modules of the back-end system.
- the Back- End System mainly comprises two functional modules: a Media Management Layer 330 and a Dataflow and Sequencing Layer 340.
- the media management layer 330 is responsible for the organization of logical data storage within a flash memory meta-block structure. More details will be provided later in the section on "Media management Layer”.
- the dataflow and sequencing layer 340 is responsible for the sequencing and transfer of sectors of data between a front-end system and a flash memory.
- This layer includes a command sequencer 342, a low-level sequencer 344 and a flash Control layer 346. More details will be provided later in the section on "Low Level System Spec".
- the memory manager 300 is preferably implemented in the controller 100. It translates logical addresses received from the host into physical addresses within the memory array, where the data are actually stored, and then keeps track of these address translations.
- FIGs. 10A(i) - lOA(iii) illustrate schematically the mapping between a logical group and a metablock.
- the metablock of the physical memory has N physical sectors for storing N logical sectors of data of a logical group.
- FIG. 10A(i) shows the data from a logical group LG Z , where the logical sectors are in contiguous logical order 0, 1, N-l .
- FIG. 10A(ii) shows the same data being stored in the metablock in the same logical order.
- the metablock when stored in this manner is said to be "sequential.”
- the metablock may have data stored in a different order, in which case the metablock is said to be "non-sequential" or "chaotic.”
- logical sector address wraps round as a loop from bottom back to top of the logical group within the metablock.
- the metablock stores in its first location beginning with the data of logical sector k.
- the last logical sector N-l wraps around to sector 0 and finally storing data associated with logical sector k-1 in its last physical sector.
- a page tag is used to identify any offset, such as identifying the starting logical sector address of the data stored in the first physical sector of the metablock. Two blocks will be considered to have their logical sectors stored in similar order when they only differ by a page tag.
- FIG. 10B illustrates schematically the mapping between logical groups and metablocks.
- Each logical group 380 is mapped to a unique metablock 370, except for a small number of logical groups in which data is currently being updated. After a logical group has been updated, it may be mapped to a different metablock.
- the mapping information is maintained in a set of logical to physical directories, which will be described in more detail later.
- a number of approaches can be used to address this problem.
- One is to use block read counters in RAM on the controller, which can give a fair approximation when a block may become disturbed by reads..
- This solution consumes a pretty fair amount of memory space (at least 4 bytes per block times the number of blocks in the system). In an SSD with 256K blocks, this can equate to about a 1MB of space to track simple read counters, which is a significant amount of relatively expensive controller RAM.
- Even when using this amount of RAM a major problem with block counters is that they do not provide the granularity to know which word lines caused the problem and that the threshold is set extremely low. When the threshold for the block trips, the whole block is scrubbed (i.e. copied), which leads to premature cycling. With the scheme presented here, the system can detect specifically which word line was read, moves that data and neighbor data, but can leave the rest of the block intact.
- Another approach is a read patrol (see US patents and patent publication numbers 7,012,835; 7,477,547; 7,616,484; and 2009/0172258), either randomly or serially sampling written blocks with valid data to look for read disturbs.
- This method uses extra background power and may not find hot zones in time (as this is dependent upon the amount of background time) or at all.
- the read patrol takes a significant amount of time to get coverage of the full device. Also, the read patrol itself contributes to the read disturb, the problem it is trying to solve. Reading neighboring word lines periodically for host reads can help to detect potential read disturbs, but adds additional power and latency to host operations. Additionally, reading neighbor word lines is subject to noise error and becomes cumber in trying to detect and identify hot read data addresses.
- the exemplary embodiments presented here use a hash tree to track read zones and find hot read areas of the flash.
- the hash tree uses a small footprint of memory area and can provide more accuracy than a simple block counter, depending on the tree's design level.
- the hash tree can help isolate regions of the flash that the host is reading.
- the tree can be designed to be tall or short, with more branches or more singular, the tree can be symmetric or asymmetrical.
- Level 0 can be a single set of N 4-byte counters. As a zone is hit by reads, the read counter is incremented. When the zone reaches a certain threshold, the zone is elevated to level 1.
- zone When the zone is elevated to level 1 , its space is broken into further zones in level 1. This provides more accuracy for detecting the hot space of a zone.
- a pointer can be used to indicate which zones have been elevated. After a zone is elevated, its root can still increment to help keep track of its read count.
- the threshold to elevate can be modified as the tree fills up.
- the elevation of the zones can continue up the tree, where each level hash can have one or more children nodes. Because space is limited in an embedded device, when a different zone in a lower node becomes hotter, an eviction should take place at some point so that the tree cannot grow without bounds. When an eviction happens, the zone is collapsed down and a new zone is elevated in the tree for more analysis. During an eviction the zone read count is still preserved, but the tree information is lost. [0099] The number of levels will depend on the implementation. As zones reach the tree tips, and reaches the highest threshold, the zone can placed on a read patrol list for further evaluation for read scrub.
- the tree can be pruned back by some amount periodically.
- the pruning will occur with block erases, hot read data migration, and, alternatively, when certain hot count (number of erases) milestones are reached.
- This process can be referred to as a "tree leveling", where when the program/erase counter reaches a certain level, the whole tree can be pared back. If the device is evenly wear leveled, then all the blocks in the system shall vary in hot count by no more than percentage variation. (More detail on where leveling is given in US patents and patent publication numbers 7,353,325; 7,441,067; 7,120,729; and 2010-0174845.) Using this knowledge, certain hot count checkpoints can be established to prune down the tree.
- the pruning of the tree can be a global reset, or pairing the counters by a percentage, or pairing the tree by a fixed amount.
- the tree can be pruned whenever the stem threshold is crossed (causing a block, word line, logical group, or other structure corresponding to that level's zone to reach the scrub list).
- the hot area When an area is detected hot, the hot area (and its neighboring word lines) can either be refreshed to a new block (leaving the rest of the block intact), or the whole block can be scrubbed.
- the hot data can either be refreshed to a separate zone, so as to not trip the tree up as the reads continue, or it can just migrate naturally. If migrating naturally then nothing special needs to be done in the event that a hot read zone becomes cold.
- the separate zone for hot data can be managed in various ways to reduce the resultant amount read disturbs.
- the data can be stored in binary format, use different margins, be stored with one or more unused word lines between the word lines storing data, and so on.
- the detection of potential read disturbs can lead to the eviction of a partial block of data, including the immediate neighbor word lines, or recycling of the entire block with possible special handling of the hot read data. If the hot read data cools later, it can rejoin the regular pool.
- the hot data can be tracked logically using a separate table. Tracking this data separately can provide the advantage of detecting when the data becomes cold, and can help from having the same data trigger branching in the tree after scrubbing. The hot data would still need to be tracked for future read disturbs.
- the read counters can be rolled back by a defined algorithm amount to account for the fact that a portion of that zone has been refreshed.
- a branch of the tree can represent a logical group (4KB, for example), a die's WL, a series of WLs, or a series of blocks. As erases occur on units of blocks, the branch that represents that block would need to collapse down to the block level if necessary. At the time of collapse, a new branch can be elevated or the elevation can occur on the next read to that set.
- the exemplary embodiments are based on tracking physical addresses of the zones at each level.
- An alternative embodiment is to have the tree track the addresses logically instead of physically, with any writes to a zone/branch should have a decrementing effect on the counters.
- FIG. 11 is a schematic representation of the process for a two level example.
- level 0 zones can be die, portion of a die, number of blocks, and so on down to a group of word lines.
- the zones at the highest level can be as small as individual word lines.
- zone is not meant, or at least not necessarily meant, to correspond to the sort of zone structure described in US patent number 6,901,498, for example, but is being used more generally for physical memory regions such as die, block, word line and soon.
- the level 0 zone is taken as some number of blocks and the level 1 zone is taken as some fraction of the blocks of the level 0 zone.
- each of the read counters corresponding to one or zones 0 to N are the level 0 counters 501, each of the read counters corresponding to one or zones 0 to N.
- counter 503 tracks the number of times the blocks 505 of zone 0 are accessed for a read.
- Zone 0's blocks are split into level 1 zones for further analysis, there can be several level 1 counters. As shown to the left, when a counter reaches a threshold for the level the corresponding zone's block are moved up a level for further evaluation. When a zone moves up in levels, the count can either be evenly distributed to its subparts, reset to 0, or a separate master zone counter maintained.
- the elevated level 0 zone is sub-divided into a set of level 1 zones with corresponding counters 511 : for example, Zone A of blocks 515 is monitored using counter 513.
- the counters of level 1 are checked against the level's threshold and moved up as needed to the level or on a list for read scan, where, depending on the implementation, the system can repeat the narrowing process to get down to a group of blocks, a group of WLs, or even to the smallest read/write granularity as based on the system's ECC unit (referred to variously as a flash management unit, FMU, a codeword, or ECC page).
- FMU flash management unit
- codeword or ECC page
- the zone can be shifted down a level.
- the collapsing of elements can be based on the comparison of other counters, block erasures, or as part of a tree levelling procedure.
- a collapsing of one branch can cause division in another branch.
- the root nodes can be evaluated on a tree collapse, or if no free zone counters are available, then the whole tree could be re-evaluated on any collapse, where priority can be given to the zone with the highest counter or the most recent counter.
- a zone Zone X with counter 521 is moved to the candidate list for read scan to check for rad disturb effects. If this zone is narrowed down to a word line or series of word lines, these can be placed on a "burning zone" list for frequently accessed zones.
- FIG. 12 looks the situation in more detail.
- the set of zone counters for Level 0 where Zones 0-N can represent the entire plane, die, chip, or device capacity. Based on the count values, as these reach the corresponding thresholds the counters of the set can be partitioned into equal sized zones for level 1.
- FIG. 12 shows the case when Q zones (two of which are shown) from level 0 have been elevated to level 1 , each subdivided into X zones with a corresponding counter. For example, Zone 0 from level 0 is here broken into multiple smaller zones Zone A to Zone A+X at level 1. The counters for the zones of level 1 are similarly used to determine when to move a zone of level 1 to level.
- Zone A+l is here broken into multiple (X again in this example) smaller zones in level 2. If, say, Zone ⁇ + then has a high count value, it can then be sent to the read scan to check for read disturb effects.
- FIG. 13 is similar to FIG. 12, but for a slightly different scenario.
- FIG. 13 shows two of the level 0 zones (zones 0 and N) each subdivided into a set of level 1 zones, each of which then has two zones (zones A+l and A+X, zones B and B+l) further split into sets of level 2 zones.
- a symmetrical hash tree may be easier for firmware/hardware to maintain, although asymmetrical trees can be used as well.
- the techniques of this section can help to determine locations of possible read disturbs with fewer reads to the device and less use of power. Hot read zones can be found accurately with a smaller memory footprint than in other counter solutions. This can help to avoid un-necessary scrubbing of data and blind background patrolling.
Abstract
In non-volatile memory devices, the accessing of data on word line can degrade the data quality on a neighboring word line, in what is called a read disturb. Techniques are presented for determining word lines likely to suffer read disturbs by use of a hash tree for tracking the number of reads. Read counters are maintained for memory units at a relatively coarse granularity, such as a die or block. When the counter for one of these units reaches a certain level, it is subdivided into sub-units, each with their own read counter, in a process that be repeated to determine frequently read word lines with a fine level of granularity while only using a relatively modest amount of RAM on the controller to store the counters.
Description
DETECTION OF READ DISTURBANCES ON NON-VOLATILE MEMORIES THROUGH COUNTING OF READ ACCESSES WITHIN DIVISIONS OF THE MEMORY
BACKGROUND
5 [0001] The following relates to the operation of re-programmable non- volatile memory systems such as semiconductor flash memory, and, more specifically, to the determination and management of error on such memories.
[0002] Solid-state memory capable of nonvolatile storage of charge, particularly in the form of EEPROM and flash EEPROM packaged as a small form factor card, has
10 recently become the storage of choice in a variety of mobile and handheld devices, notably information appliances and consumer electronics products. Unlike RAM (random access memory) that is also solid-state memory, flash memory is nonvolatile, and retaining its stored data even after power is turned off. Also, unlike ROM (read only memory), flash memory is rewritable similar to a disk storage
15 device. In spite of the higher cost, flash memory is increasingly being used in mass storage applications. Conventional mass storage, based on rotating magnetic medium such as hard drives and floppy disks, is unsuitable for the mobile and handheld environment. This is because disk drives tend to be bulky, are prone to mechanical failure and have high latency and high power requirements. These undesirable 0 attributes make disk-based storage impractical in most mobile and portable applications. On the other hand, flash memory, whether embedded, a solid state drive (SSD) and in the form of a removable card is ideally suited in the mobile and handheld environment because of its small size, low power consumption, high speed and high reliability features. 5 [0003] Flash EEPROM is similar to EEPROM (electrically erasable and programmable read-only memory) in that it is a non-volatile memory that can be erased and have new data written or "programmed" into their memory cells. Both utilize a floating (unconnected) conductive gate, in a field effect transistor structure, positioned over a channel region in a semiconductor substrate, between source and 0 drain regions. A control gate is then provided over the floating gate. The threshold voltage characteristic of the transistor is controlled by the amount of charge that is
retained on the floating gate. That is, for a given level of charge on the floating gate, there is a corresponding voltage (threshold) that must be applied to the control gate before the transistor is turned "on" to permit conduction between its source and drain regions. In particular, flash memory such as Flash EEPROM allows entire blocks of memory cells to be erased at the same time.
[0004] The floating gate can hold a range of charges and therefore can be programmed to any threshold voltage level within a threshold voltage window. The size of the threshold voltage window is delimited by the minimum and maximum threshold levels of the device, which in turn correspond to the range of the charges that can be programmed onto the floating gate. The threshold window generally depends on the memory device's characteristics, operating conditions and history. Each distinct, resolvable threshold voltage level range within the window may, in principle, be used to designate a definite memory state of the cell.
[0005] The transistor serving as a memory cell is typically programmed to a "programmed" state by one of two mechanisms. In "hot electron injection," a high voltage applied to the drain accelerates electrons across the substrate channel region. At the same time a high voltage applied to the control gate pulls the hot electrons through a thin gate dielectric onto the floating gate. In "tunneling injection," a high voltage is applied to the control gate relative to the substrate. In this way, electrons are pulled from the substrate to the intervening floating gate. While the term "program" has been used historically to describe writing to a memory by injecting electrons to an initially erased charge storage unit of the memory cell so as to alter the memory state, it has now been used interchangeable with more common terms such as "write" or "record." [0006] The memory device may be erased by a number of mechanisms. For EEPROM, a memory cell is electrically erasable, by applying a high voltage to the substrate relative to the control gate so as to induce electrons in the floating gate to tunnel through a thin oxide to the substrate channel region (i.e., Fowler-Nordheim tunneling.) Typically, the EEPROM is erasable byte by byte. For flash EEPROM, the memory is electrically erasable either all at once or one or more minimum erasable blocks at a time, where a minimum erasable block may consist of one or
more sectors and each sector may store 512 bytes or more of data.
[0007] The memory device typically comprises one or more memory chips that may be mounted on a card or in a solid state drive (SSD). Each memory chip comprises an array of memory cells supported by peripheral circuits such as decoders and erase, write and read circuits. The more sophisticated memory devices also come with a controller that performs intelligent and higher level memory operations and interfacing.
[0008] There are many commercially successful non-volatile solid-state memory devices being used today. These memory devices may be flash EEPROM or may employ other types of nonvolatile memory cells. Examples of flash memory and systems and methods of manufacturing them are given in United States patents nos. 5,070,032, 5,095,344, 5,315,541, 5,343,063, and 5,661,053, 5,313,421 and 6,222,762. In particular, flash memory devices with NAND string structures are described in United States patent nos. 5,570,315, 5,903,495, 6,046,935. Also nonvolatile memory devices are also manufactured from memory cells with a dielectric layer for storing charge. Instead of the conductive floating gate elements described earlier, a dielectric layer is used. Such memory devices utilizing dielectric storage element have been described by Eitan et al., "NROM: A Novel Localized Trapping, 2-Bit Nonvolatile Memory Cell," IEEE Electron Device Letters, vol. 21, no. 11, November 2000, pp. 543-545. An ONO dielectric layer extends across the channel between source and drain diffusions. The charge for one data bit is localized in the dielectric layer adjacent to the drain, and the charge for the other data bit is localized in the dielectric layer adjacent to the source. For example, United States patents nos. 5,768,192 and 6,011,725 disclose a nonvolatile memory cell having a trapping dielectric sandwiched between two silicon dioxide layers. Multi-state data storage is implemented by separately reading the binary states of the spatially separated charge storage regions within the dielectric.
[0009] In order to improve read and program performance, multiple charge storage elements or memory transistors in an array are read or programmed in parallel. Thus, a "page" of memory elements are read or programmed together. In existing memory architectures, a row typically contains several interleaved pages or it may constitute
one page. All memory elements of a page will be read or programmed together.
[0010] In flash memory systems, erase operation may take as much as an order of magnitude longer than read and program operations. Thus, it is desirable to have the erase block of substantial size. In this way, the erase time is amortized over a large aggregate of memory cells.
[0011] The nature of flash memory predicates that data must be written to an erased memory location. If data of a certain logical address from a host is to be updated, one way is rewrite the update data in the same physical memory location. That is, the logical to physical address mapping is unchanged. However, this will mean the entire erase block contain that physical location will have to be first erased and then rewritten with the updated data. This method of update is inefficient, as it requires an entire erase block to be erased and rewritten, especially if the data to be updated only occupies a small portion of the erase block. It will also result in a higher frequency of erase recycling of the memory block, which is undesirable in view of the limited endurance of this type of memory device.
[0012] Data communicated through external interfaces of host systems, memory systems and other electronic systems are addressed and mapped into the physical locations of a flash memory system. Typically, addresses of data files generated or received by the system are mapped into distinct ranges of a continuous logical address space established for the system in terms of logical blocks of data (hereinafter the "LBA interface"). The extent of the address space is typically sufficient to cover the full range of addresses that the system is capable of handling. In one example, magnetic disk storage drives communicate with computers or other host systems through such a logical address space. This address space has an extent sufficient to address the entire data storage capacity of the disk drive.
[0013] Flash memory systems are most commonly provided in the form of a memory card or flash drive that is removably connected with a variety of hosts such as a personal computer, a camera or the like, but may also be embedded within such host systems or be in the form of a solid state drive. When writing data to the memory, the host typically assigns unique logical addresses to sectors, clusters or other units of data within a continuous virtual address space of the memory system. Like a disk
operating system (DOS), the host writes data to, and reads data from, addresses within the logical address space of the memory system. A controller within the memory system translates logical addresses received from the host into physical addresses within the memory array, where the data are actually stored, and then keeps track of these address translations. The data storage capacity of the memory system is at least as large as the amount of data that is addressable over the entire logical address space defined for the memory system.
[0014] In current commercial flash memory systems, the size of the erase unit has been increased to a block of enough memory cells to store multiple sectors of data. Indeed, many pages of data are stored in one block, and a page may store multiple sectors of data. Further, two or more blocks are often operated together as metablocks, and the pages of such blocks logically linked together as metapages. A page or metapage of data are written and read together, which can include many sectors of data, thus increasing the parallelism of the operation. Along with such large capacity operating units the challenge is to operate them efficiently.
[0015] For ease of explanation, unless otherwise specified, it is intended that the term "block" as used herein refer to either the block unit of erase or a multiple block "metablock," depending upon whether metablocks are being used in a specific system. Similarly, reference to a "page" herein may refer to a unit of programming within a single block or a "metapage" within a metablock, depending upon the system configuration.
[0016] In charge storing non-volatile memory devices, such as those based on EEPROM or dielectric storage, the non-volatility is non-perfect and the data value stored in an element can be degraded by leakage over time. Operations in one part of the memory circuit can also affect data values in storage elements not being directly acted upon. For example, capacitive coupling between memory cells on adjacent word lines can lead "read disturbs" or "write disturbs" when a neighboring word line is read or written. (Erase disturbs may also occur, depending on the granularity at which cells are erased.) To maintain the integrity of data in such memory systems, the effects of such disturbs need to be considered.
SUMMARY OF THE INVENTION
[0017] According to a general aspect of the invention, a method is presented for the operating of a non-volatile memory system having one or more memory circuits and a controller circuit. The memory circuits each include one or more arrays of non- volatile memory cells formed along word lines and the controller circuit manages the storage of data on the memory circuit. For each of a first plurality of distinct divisions of the one or more memory arrays the controller circuit maintains a count of the number of times word lines of the corresponding division is accessed for a read operation. In response to one of the counts for a corresponding division reaching a first threshold value, subdividing the corresponding division is subdivide into a second plurality of distinct first subdivisions. For each of the first subdivisions the controller circuit subsequently maintains a count of the number of times word lines of the subdivision is accessed for read operations.
[0018] Various aspects, advantages, features and embodiments of the present invention are included in the following description of exemplary examples thereof, which description should be taken in conjunction with the accompanying drawings. All patents, patent applications, articles, other publications, documents and things referenced herein are hereby incorporated herein by this reference in their entirety for all purposes. To the extent of any inconsistency or conflict in the definition or use of terms between any of the incorporated publications, documents or things and the present application, those of the present application shall prevail.
BRIEF DESCRIPTION OF THE DRAWINGS
[0019] FIG. 1 illustrates schematically the main hardware components of a memory system suitable for implementing the present invention. [0020] FIG. 2 illustrates schematically a non-volatile memory cell.
[0021] FIG. 3 illustrates the relation between the source-drain current ID and the control gate voltage VCG for four different charges Q1-Q4 that the floating gate may be selectively storing at any one time.
[0022] FIG. 4A illustrates schematically a string of memory cells organized into an
NAND string.
[0023] FIG. 4B illustrates an example of an NAND array 210 of memory cells, constituted from NAND strings 50 such as that shown in FIG. 4A.
[0024] FIG. 5 illustrates a page of memory cells, organized for example in the NAND configuration, being sensed or programmed in parallel.
[0025] FIG. 6(0) - 6(2) illustrate an example of programming a population of 4-state memory cells.
[0026] FIGs. 7A-7E illustrate the programming and reading of the 4-state memory encoded with a given 2-bit code. [0027] FIG. 7F illustrates a foggy- fine programming for an 8-state memory encoded with a given 3-bit code.
[0028] FIG. 8 illustrates the memory being managed by a memory manager with is a software component that resides in the controller.
[0029] FIG. 9 illustrates the software modules of the back-end system. [0030] FIGs. 10A(i) - lOA(iii) illustrate schematically the mapping between a logical group and a metablock. FIG. 10B illustrates schematically the mapping between logical groups and metab locks.
[0031] FIG. 11 is a schematic representation of the process for a two level example. [0032] FIGs. 12 and 13 provide further illustration of a hash tree to track read zones.
DETAILED DESCRIPTION
MEMORY SYSTEM
[0033] FIG. 1 to FIG. 10B provide example memory systems in which the various aspects of the present invention may be implemented or illustrated.
[0034] FIG. 1 illustrates schematically the main hardware components of a memory system suitable for implementing the present invention. The memory system 90 typically operates with a host 80 through a host interface. The memory system is typically in the form of a memory card, solid state drive (SSD), or an embedded memory system. The memory system 90 includes a memory 200 whose operations are controlled by a controller 100. The memory 200 comprises of one or more array of non- volatile memory cells distributed over one or more integrated circuit chip. The controller 100 includes an interface 110, a processor 120, an optional coprocessor 121, ROM 122 (read-only-memory), RAM 130 (random access memory) and optionally programmable nonvolatile memory 124. The interface 110 has one component interfacing the controller to a host and another component interfacing to the memory 200. Firmware stored in nonvolatile ROM 122 and/or the optional nonvolatile memory 124 provides codes for the processor 120 to implement the functions of the controller 100. Error correction codes may be processed by the processor 120 or the optional coprocessor 121. In an alternative embodiment, the controller 100 is implemented by a state machine (not shown.) In yet another embodiment, the controller 100 is implemented within the host.
Physical Memory Structure
[0035] With respect to the memory section 200, memory devices include volatile memory devices, such as dynamic random access memory ("DRAM") or static random access memory ("SRAM") devices, non-volatile memory devices, such as resistive random access memory ("ReRAM"), electrically erasable programmable read only memory ("EEPROM"), flash memory (which can also be considered a subset of EEPROM), ferroelectric random access memory ("FRAM"), and magnetoresistive random access memory ("MRAM"), and other semiconductor elements capable of storing information. Furthermore, each type of memory device may have different configurations. For example, flash memory devices may be configured in a NAND or a NOR configuration.
[0036] The memory devices can be formed from passive and/or active elements, in any combinations. By way of non-limiting example, passive semiconductor memory elements include ReRAM device elements, which in some embodiments include a
resistivity switching storage element, such as an anti-fuse, phase change material, etc., and optionally a steering element, such as a diode, etc. Further by way of non- limiting example, active semiconductor memory elements include EEPROM and flash memory device elements, which in some embodiments include elements containing a charge storage region, such as a floating gate, conductive nanoparticles or a charge storage dielectric material.
[0037] Multiple memory elements may be configured so that they are connected in series or such that each element is individually accessible. By way of non-limiting example, NAND devices contain memory elements {e.g., devices containing a charge storage region) connected in series. For example, a NAND memory array may be configured so that the array is composed of multiple strings of memory in which each string is composed of multiple memory elements sharing a single bit line and accessed as a group. In contrast, memory elements may be configured so that each element is individually accessible, e.g., a NOR memory array. One of skill in the art will recognize that the NAND and NOR memory configurations are exemplary, and memory elements may be otherwise configured.
[0038] The semiconductor memory elements of a single device, such as elements located within and/or over the same substrate or in a single die, may be distributed in two or three dimensions, such as a two dimensional array structure or a three dimensional array structure.
[0039] In a two dimensional memory structure, the semiconductor memory elements are arranged in a single plane or single memory device level. Typically, in a two dimensional memory structure, memory elements are located in a plane {e.g., in an x- z direction plane) which extends substantially parallel to a major surface of a substrate that supports the memory elements. The substrate may be a wafer over which the layers of the memory elements are deposited and/or in which memory elements are formed or it may be a carrier substrate which is attached to the memory elements after they are formed. As a non-limiting example, the substrate may include a semiconductor such as silicon.
[0040] The memory elements may be arranged in the single memory device level in an ordered array, such as in a plurality of rows and/or columns. However, the
memory elements may be arranged in non-regular or non-orthogonal configurations as understood by one of skill in the art. The memory elements may each have two or more electrodes or contact lines, such as bit lines and word lines.
[0041] A three dimensional memory array is organized so that memory elements occupy multiple planes or multiple device levels, forming a structure in three dimensions (i.e., in the x, y and z directions, where the y direction is substantially perpendicular and the x and z directions are substantially parallel to the major surface of the substrate).
[0042] As a non-limiting example, each plane in a three dimensional memory array structure may be physically located in two dimensions (one memory level) with multiple two dimensional memory levels to form a three dimensional memory array structure. As another non-limiting example, a three dimensional memory array may be physically structured as multiple vertical columns (e.g., columns extending substantially perpendicular to the major surface of the substrate in the y direction) having multiple elements in each column and therefore having elements spanning several vertically stacked memory planes. The columns may be arranged in a two dimensional configuration, e.g., in an x-z plane, thereby resulting in a three dimensional arrangement of memory elements. One of skill in the art will understand that other configurations of memory elements in three dimensions will also constitute a three dimensional memory array.
[0043] By way of non-limiting example, in a three dimensional NAND memory array, the memory elements may be connected together to form a NAND string within a single horizontal (e.g., x-z) plane. Alternatively, the memory elements may be connected together to extend through multiple horizontal planes. Other three dimensional configurations can be envisioned wherein some NAND strings contain memory elements in a single memory level while other strings contain memory elements which extend through multiple memory levels. Three dimensional memory arrays may also be designed in a NOR configuration and in a ReRAM configuration.
[0044] A monolithic three dimensional memory array is one in which multiple memory levels are formed above and/or within a single substrate, such as a semiconductor wafer. In a monolithic three dimensional array the layers of each
level of the array are formed on the layers of each underlying level of the array. One of skill in the art will understand that layers of adjacent levels of a monolithic three dimensional memory array may be shared or have intervening layers between memory levels. In contrast, two dimensional arrays may be formed separately and then packaged together to form a non-monolithic memory device. For example, non- monolithic stacked memories have been constructed by forming memory levels on separate substrates and adhering the memory levels atop each other. The substrates may be thinned or removed from the memory levels before bonding, but as the memory levels are initially formed over separate substrates, such memories are not monolithic three dimensional memory arrays. Further, multiple two dimensional memory arrays or three dimensional memory arrays (monolithic or non-monolithic) may be formed separately and then packaged together to form a stacked-chip memory device.
[0045] Associated circuitry is typically required for proper operation of the memory elements and for proper communication with the memory elements. This associated circuitry may be on the same substrate as the memory array and/or on a separate substrate. As non-limiting examples, the memory devices may have driver circuitry and control circuitry used in the programming and reading of the memory elements.
[0046] One of skill in the art will recognize that this invention is not limited to the two dimensional and three dimensional exemplary structures described but cover all relevant memory structures within the spirit and scope of the invention as described herein and as understood by one of skill in the art.
[0047] FIG. 2 illustrates schematically a non-volatile memory cell. The memory cell 10 can be implemented by a field-effect transistor having a charge storage unit 20, such as a floating gate or a dielectric layer. The memory cell 10 also includes a source 14, a drain 16, and a control gate 30.
[0048] There are many commercially successful non-volatile solid-state memory devices being used today. These memory devices may employ different types of memory cells, each type having one or more charge storage element.
[0049] Typical non- volatile memory cells include EEPROM and flash EEPROM.
Examples of EEPROM cells and methods of manufacturing them are given in United States patent no. 5,595,924. Examples of flash EEPROM cells, their uses in memory systems and methods of manufacturing them are given in United States patents nos. 5,070,032, 5,095,344, 5,315,541 , 5,343,063, 5,661 ,053, 5,313,421 and 6,222,762. In particular, examples of memory devices with NAND cell structures are described in United States patent nos. 5,570,315, 5,903,495, 6,046,935. Also, examples of memory devices utilizing dielectric storage element have been described by Eitan et al, "NROM: A Novel Localized Trapping, 2-Bit Nonvolatile Memory Cell," IEEE Electron Device Letters, vol. 21 , no. 1 1 , November 2000, pp. 543-545, and in United States patents nos. 5,768, 192 and 6,01 1 ,725.
[0050] In practice, the memory state of a cell is usually read by sensing the conduction current across the source and drain electrodes of the cell when a reference voltage is applied to the control gate. Thus, for each given charge on the floating gate of a cell, a corresponding conduction current with respect to a fixed reference control gate voltage may be detected. Similarly, the range of charge programmable onto the floating gate defines a corresponding threshold voltage window or a corresponding conduction current window.
[0051] Alternatively, instead of detecting the conduction current among a partitioned current window, it is possible to set the threshold voltage for a given memory state under test at the control gate and detect if the conduction current is lower or higher than a threshold current. In one implementation the detection of the conduction current relative to a threshold current is accomplished by examining the rate the conduction current is discharging through the capacitance of the bit line.
[0052] FIG. 3 illustrates the relation between the source-drain current ID and the control gate voltage VCG for four different charges Q 1 -Q4 that the floating gate may be selectively storing at any one time. The four solid ID versus VCG curves represent four possible charge levels that can be programmed on a floating gate of a memory cell, respectively corresponding to four possible memory states. As an example, the threshold voltage window of a population of cells may range from 0.5V to 3.5V. Seven possible memory states "0", "1 ", "2", "3", "4", "5", "6", respectively representing one erased and six programmed states may be demarcated by partitioning
the threshold window into five regions in interval of 0.5V each. For example, if a reference current, IREF of 2 μΑ is used as shown, then the cell programmed with Ql may be considered to be in a memory state "1" since its curve intersects with IREF in the region of the threshold window demarcated by VCG = 0.5V and 1.0V. Similarly, Q4 is in a memory state "5".
[0053] As can be seen from the description above, the more states a memory cell is made to store, the more finely divided is its threshold window. For example, a memory device may have memory cells having a threshold window that ranges from -1.5V to 5V. This provides a maximum width of 6.5V. If the memory cell is to store 16 states, each state may occupy from 200mV to 300mV in the threshold window. This will require higher precision in programming and reading operations in order to be able to achieve the required resolution.
[0054] FIG. 4A illustrates schematically a string of memory cells organized into an NAND string. An NAND string 50 comprises of a series of memory transistors Ml, M2, ... Mn (e.g., n= 4, 8, 16 or higher) daisy-chained by their sources and drains. A pair of select transistors SI, S2 controls the memory transistors chain's connection to the external via the NAND string's source terminal 54 and drain terminal 56 respectively. In a memory array, when the source select transistor SI is turned on, the source terminal is coupled to a source line (see FIG. 4B). Similarly, when the drain select transistor S2 is turned on, the drain terminal of the NAND string is coupled to a bit line of the memory array. Each memory transistor 10 in the chain acts as a memory cell. It has a charge storage element 20 to store a given amount of charge so as to represent an intended memory state. A control gate 30 of each memory transistor allows control over read and write operations. As will be seen in FIG. 4B, the control gates 30 of corresponding memory transistors of a row of NAND string are all connected to the same word line. Similarly, a control gate 32 of each of the select transistors SI, S2 provides control access to the NAND string via its source terminal 54 and drain terminal 56 respectively. Likewise, the control gates 32 of corresponding select transistors of a row of NAND string are all connected to the same select line.
[0055] When an addressed memory transistor 10 within an NAND string is read or is
verified during programming, its control gate 30 is supplied with an appropriate voltage. At the same time, the rest of the non-addressed memory transistors in the NAND string 50 are fully turned on by application of sufficient voltage on their control gates. In this way, a conductive path is effective created from the source of the individual memory transistor to the source terminal 54 of the NAND string and likewise for the drain of the individual memory transistor to the drain terminal 56 of the cell. Memory devices with such NAND string structures are described in United States patent nos. 5,570,315, 5,903,495, 6,046,935.
[0056] FIG. 4B illustrates an example of an NAND array 210 of memory cells, constituted from NAND strings 50 such as that shown in FIG. 4 A. Along each column of NAND strings, a bit line such as bit line 36 is coupled to the drain terminal 56 of each NAND string. Along each bank of NAND strings, a source line such as source line 34 is couple to the source terminals 54 of each NAND string. Also the control gates along a row of memory cells in a bank of NAND strings are connected to a word line such as word line 42. The control gates along a row of select transistors in a bank of NAND strings are connected to a select line such as select line 44. An entire row of memory cells in a bank of NAND strings can be addressed by appropriate voltages on the word lines and select lines of the bank of NAND strings. When a memory transistor within a NAND string is being read, the remaining memory transistors in the string are turned on hard via their associated word lines so that the current flowing through the string is essentially dependent upon the level of charge stored in the cell being read.
[0057] FIG. 5 illustrates a page of memory cells, organized for example in the NAND configuration, being sensed or programmed in parallel. FIG. 5 essentially shows a bank of NAND strings 50 in the memory array 210 of FIG. 4B, where the detail of each NAND string is shown explicitly as in FIG. 4A. A "page" such as the page 60, is a group of memory cells enabled to be sensed or programmed in parallel. This is accomplished by a corresponding page of sense amplifiers 212. The sensed results are latches in a corresponding set of latches 214. Each sense amplifier can be coupled to a NAND string via a bit line. The page is enabled by the control gates of the cells of the page connected in common to a word line 42 and each cell accessible by a sense amplifier accessible via a bit line 36. As an example, when respectively
sensing or programming the page of cells 60, a sensing voltage or a programming voltage is respectively applied to the common word line WL3 together with appropriate voltages on the bit lines.
Physical Organization of the Memory [0058] One important difference between flash memory and of type of memory is that a cell must be programmed from the erased state. That is the floating gate must first be emptied of charge. Programming then adds a desired amount of charge back to the floating gate. It does not support removing a portion of the charge from the floating to go from a more programmed state to a lesser one. This means that update data cannot overwrite existing one and must be written to a previous unwritten location.
[0059] Furthermore erasing is to empty all the charges from the floating gate and generally takes appreciably time. For that reason, it will be cumbersome and very slow to erase cell by cell or even page by page. In practice, the array of memory cells is divided into a large number of blocks of memory cells. As is common for flash EEPROM systems, the block is the unit of erase. That is, each block contains the minimum number of memory cells that are erased together. While aggregating a large number of cells in a block to be erased in parallel will improve erase performance, a large size block also entails dealing with a larger number of update and obsolete data. Just before the block is erased, a garbage collection is required to salvage the non- obsolete data in the block.
[0060] Each block is typically divided into a number of pages. A page is a unit of programming or reading. In one embodiment, the individual pages may be divided into segments and the segments may contain the fewest number of cells that are written at one time as a basic programming operation. One or more pages of data are typically stored in one row of memory cells. A page can store one or more sectors. A sector includes user data and overhead data. Multiple blocks and pages distributed across multiple arrays can also be operated together as metab locks and metapages. If they are distributed over multiple chips, they can be operated together as megablocks and megapage. Examples of Multi-level Cell ("MLC") Memory Partitioning
[0061] A nonvolatile memory in which the memory cells each stores multiple bits of data has already been described in connection with FIG. 3. A particular example is a memory formed from an array of field-effect transistors, each having a charge storage layer between its channel region and its control gate. The charge storage layer or unit can store a range of charges, giving rise to a range of threshold voltages for each field-effect transistor. The range of possible threshold voltages spans a threshold window. When the threshold window is partitioned into multiple sub-ranges or zones of threshold voltages, each resolvable zone is used to represent a different memory states for a memory cell. The multiple memory states can be coded by one or more binary bits. For example, a memory cell partitioned into four zones can support four states which can be coded as 2-bit data. Similarly, a memory cell partitioned into eight zones can support eight memory states which can be coded as 3- bit data, etc.
All-bit, Full-Sequence MLC Programming [0062] FIG. 6(0) - 6(2) illustrate an example of programming a population of 4-state memory cells. FIG. 6(0) illustrates the population of memory cells programmable into four distinct distributions of threshold voltages respectively representing memory states "0", "1", "2" and "3". FIG. 6(1) illustrates the initial distribution of "erased" threshold voltages for an erased memory. FIG. 6(2) illustrates an example of the memory after many of the memory cells have been programmed. Essentially, a cell initially has an "erased" threshold voltage and programming will move it to a higher value into one of the three zones demarcated by verify levels vVi, vV2 and vV3. In this way, each memory cell can be programmed to one of the three programmed state "1", "2" and "3" or remain un-programmed in the "erased" state. As the memory gets more programming, the initial distribution of the "erased" state as shown in FIG. 6(1) will become narrower and the erased state is represented by the "0" state.
[0063] A 2-bit code having a lower bit and an upper bit can be used to represent each of the four memory states. For example, the "0", "1", "2" and "3" states are respectively represented by "11", "01", "00" and Ί0". The 2-bit data may be read from the memory by sensing in "full-sequence" mode where the two bits are sensed together by sensing relative to the read demarcation threshold values rVi, rV2 and rV3
in three sub-passes respectively.
Bit-by-Bit MLC Programming and Reading
[0064] FIGs. 7A-7E illustrate the programming and reading of the 4-state memory encoded with a given 2-bit code. FIG. 7 A illustrates threshold voltage distributions of the 4-state memory array when each memory cell stores two bits of data using the 2-bit code. Such a 2-bit code has been disclosed in US Patent Application No. 10/830,824 filed April 24, 2004 by Li et al, entitled "NON-VOLATILE MEMORY AND CONTROL WITH IMPROVED PARTIAL PAGE PROGRAM CAPABILITY". [0065] FIG. 7B illustrates the lower page programming (lower bit) in a 2-pass programming scheme using the 2-bit code. The fault-tolerant LM New code essentially avoids any upper page programming to transit through any intermediate states. Thus, the first pass lower page programming has the logical state (upper bit, lower bit) = (1, 1) transits to some intermediate state (x, 0) as represented by programming the "unprogrammed" memory state "0" to the "intermediate" state designated by (x, 0) with a programmed threshold voltage greater than DA but less than Dc.
[0066] FIG. 7C illustrates the upper page programming (upper bit) in the 2-pass programming scheme using the 2-bit code. In the second pass of programming the upper page bit to "0", if the lower page bit is at "1", the logical state (1, 1) transits to (0, 1) as represented by programming the "unprogrammed" memory state "0" to "1". If the lower page bit is at "0", the logical state (0, 0) is obtained by programming from the "intermediate" state to "3". Similarly, if the upper page is to remain at "1", while the lower page has been programmed to "0", it will require a transition from the "intermediate" state to (1, 0) as represented by programming the "intermediate" state to "2".
[0067] FIG. 7D illustrates the read operation that is required to discern the lower bit of the 4-state memory encoded with the 2-bit code. A readB operation is first performed to determine if the LM flag can be read. If so, the upper page has been programmed and the readB operation will yield the lower page data correctly. On the
other hand, if the upper page has not yet been programmed, the lower page data will be read by a readA operation.
[0068] FIG. 7E illustrates the read operation that is required to discern the upper bit of the 4-state memory encoded with the 2-bit code. As is clear from the figure, the upper page read will require a 3-pass read of readA, readB and readC, respectively relative to the demarcation threshold voltages DA, DB and Dc.
[0069] In the bit-by-bit scheme for a 2-bit memory, a physical page of memory cells will store two logical data pages, a lower data page corresponding to the lower bit and an upper data page corresponding to the upper bit. Foggy-Fine Programming
[0070] Another variation on multi-state programming employs a foggy-fine algorithm, as is illustrated in FIG. 7F for a 3-bit memory example. As shown there, this another multi-phase programming operation. A first programming operation is performed as shown in the top line, followed the foggy programming stage. The foggy phase is a full 3 -bit programming operation from the first phase using all eight of the final states. At the end of the foggy, though, the data in these states is not yet fully resolved into well-defined distributions for each of the 8 states (hence, the "foggy" name) and is not readily extractable.
[0071] As each cell is, however, programmed to near its eventual target state, the sort of neighboring cell to cell couplings, or "Yupin" effect, described in US patent number 6,870,768 are presenting most of their effect. Because of this, when the fine program phase (shown on the bottom line) is executed, these couplings have largely been factored in to this final phase so the cell distributions are more accurately resolved to their target ranges. More detail on these subjects is given in US patents numbers 6,870,768 and 6,657,891 and in the US patent application entitled "Atomic Program Sequence and Write Abort Detection" by Gorobets et al. having attorney application number 12/642,740, which was filed December 18, 2009, and which presents a "diagonal" first-foggy-fine method.
Binary and MLC Memory Partitioning
[0072] FIG. 6 and FIG. 7 illustrate examples of a 2-bit (also referred to as "D2") memory. As can be seen, a D2 memory has its threshold range or window partitioned into 4 regions, designating 4 states. Similarly, in D3, each cell stores 3 bits (low, middle and upper bits) and there are 8 regions. In D4, there are 4 bits and 16 regions, etc. As the memory's finite threshold window is partitioned into more regions, the resolution and for programming and reading will necessarily become finer. Two issues arise as the memory cell is configured to store more bits.
[0073] First, programming or reading will be slower when the threshold of a cell must be more accurately programmed or read. In fact in practice the sensing time (needed in programming and reading) tends to increase as the square of the number of partitioning levels.
[0074] Secondly, flash memory has an endurance problem as it ages with use. When a cell is repeatedly programmed and erased, charges is shuttled in and out of the floating gate 20 (see FIG. 2) by tunneling across a dielectric. Each time some charges may become trapped in the dielectric and will modify the threshold of the cell. In fact over use, the threshold window will progressively narrow. Thus, MLC memory generally is designed with tradeoffs between capacity, performance and reliability.
[0075] Conversely, it will be seen for a binary memory, the memory's threshold window is only partitioned into two regions. This will allow a maximum margin of errors. Thus, binary partitioning while diminished in storage capacity will provide maximum performance and reliability.
[0076] The multi-pass, bit-by-bit programming and reading technique described in connection with FIG. 7 provides a smooth transition between MLC and binary partitioning. In this case, if the memory is programmed with only the lower bit, it is effectively a binary partitioned memory. While this approach does not fully optimize the range of the threshold window as in the case of a single-level cell ("SLC") memory, it has the advantage of using the same demarcation or sensing level as in the operations of the lower bit of the MLC memory. As will be described later, this approach allows a MLC memory to be "expropriated" for use as a binary memory, or vice versa. How it should be understood that MLC memory tends to have more
stringent specification for usage.
Binary Memory and Partial Page Programming
[0077] The charge programmed into the charge storage element of one memory cell produces an electric field that perturbs the electric field of a neighboring memory cell. This will affect the characteristics of the neighboring memory cell which essentially is a field-effect transistor with a charge storage element. In particular, when sensed the memory cell will appear to have a higher threshold level (or more programmed) than when it is less perturbed.
[0078] In general, if a memory cell is program-verified under a first field environment and later is read again under a different field environment due to neighboring cells subsequently being programmed with different charges, the read accuracy may be affected due to coupling between neighboring floating gates in what is referred to as the "Yupin Effect". With ever higher integration in semiconductor memories, the perturbation of the electric field due to the stored charges between memory cells (Yupin effect) becomes increasing appreciable as the inter-cellular spacing shrinks.
[0079] The Bit-by-Bit MLC Programming technique described in connection with FIG. 7 above is designed to minimize program disturb from cells along the same word line. As can be seen from FIG. 7B, in a first of the two programming passes, the thresholds of the cells are moved at most half way up the threshold window. The effect of the first pass is overtaken by the final pass. In the final pass, the thresholds are only moved a quarter of the way. In other words, for D2, the charge difference among neighboring cells is limited to a quarter of its maximum. For D3, with three passes, the final pass will limit the charge difference to one-eighth of its maximum.
[0080] However, the bit-by-bit multi-pass programming technique will be compromised by partial-page programming. A page is a group of memory cells, typically along a row or word line, that is programmed together as a unit. It is possible to program non overlapping portions of a page individually over multiple programming passes. However, owning to not all the cells of the page are programmed in a final pass together, it could create large difference in charges programmed among the cells after the page is done. Thus partial-page programming
would result in more program disturb and would require a larger margin for sensing accuracy.
[0081] In the case the memory is configured as binary memory, the margin of operation is wider than that of MLC. In the preferred embodiment, the binary memory is configured to support partial-page programming in which non-overlapping portions of a page may be programmed individually in one of the multiple programming passes on the page. The programming and reading performance can be improved by operating with a page of large size. However, when the page size is much larger than the host's unit of write (typically a 512-byte sector), its usage will be inefficient. Operating with finer granularity than a page allows more efficient usage of such a page.
[0082] The example given has been between binary versus MLC. It should be understood that in general the same principles apply between a first memory with a first number of levels and a second memory with a second number of levels more than the first memory.
LOGICAL AND PHYSICAL BLOCK STRUCTURES
[0083] FIG. 8 illustrates the memory being managed by a memory manager with is a software component that resides in the controller. The memory 200 is organized into blocks, each block of cells being a minimum unit of erase. Depending on implementation, the memory system may operate with even large units of erase formed by an aggregate of blocks into "metablocks" and also "megablocks". For convenience the description will refer to a unit of erase as a metablock although it will be understood that some systems operate with even larger unit of erase such as a "megablock" formed by an aggregate of metablocks. [0084] The host 80 accesses the memory 200 when running an application under a file system or operating system. Typically, the host system addresses data in units of logical sectors where, for example, each sector may contain 512 bytes of data. Also, it is usual for the host to read or write to the memory system in unit of logical clusters, each consisting of one or more logical sectors. In some host systems, an optional host-side memory manager may exist to perform lower level memory management at
the host. In most cases during read or write operations, the host 80 essentially issues a command to the memory system 90 to read or write a segment containing a string of logical sectors of data with contiguous addresses.
[0085] A memory-side memory manager 300 is implemented in the controller 100 of the memory system 90 to manage the storage and retrieval of the data of host logical sectors among metab locks of the flash memory 200. The memory manager comprises a front-end system 310 and a back-end system 320. The front-end system 310 includes a host interface 312. The back-end system 320 includes a number of software modules for managing erase, read and write operations of the metablocks. The memory manager also maintains system control data and directory data associated with its operations among the flash memory 200 and the controller RAM 130.
[0086] FIG. 9 illustrates the software modules of the back-end system. The Back- End System mainly comprises two functional modules: a Media Management Layer 330 and a Dataflow and Sequencing Layer 340.
[0087] The media management layer 330 is responsible for the organization of logical data storage within a flash memory meta-block structure. More details will be provided later in the section on "Media management Layer".
[0088] The dataflow and sequencing layer 340 is responsible for the sequencing and transfer of sectors of data between a front-end system and a flash memory. This layer includes a command sequencer 342, a low-level sequencer 344 and a flash Control layer 346. More details will be provided later in the section on "Low Level System Spec".
[0089] The memory manager 300 is preferably implemented in the controller 100. It translates logical addresses received from the host into physical addresses within the memory array, where the data are actually stored, and then keeps track of these address translations.
[0090] FIGs. 10A(i) - lOA(iii) illustrate schematically the mapping between a logical group and a metablock. The metablock of the physical memory has N physical
sectors for storing N logical sectors of data of a logical group. FIG. 10A(i) shows the data from a logical group LGZ, where the logical sectors are in contiguous logical order 0, 1, N-l . FIG. 10A(ii) shows the same data being stored in the metablock in the same logical order. The metablock when stored in this manner is said to be "sequential." In general, the metablock may have data stored in a different order, in which case the metablock is said to be "non-sequential" or "chaotic."
[0091] There may be an offset between the lowest address of a logical group and the lowest address of the metablock to which it is mapped. In this case, logical sector address wraps round as a loop from bottom back to top of the logical group within the metablock. For example, in FIG. lOA(iii), the metablock stores in its first location beginning with the data of logical sector k. When the last logical sector N-l is reached, it wraps around to sector 0 and finally storing data associated with logical sector k-1 in its last physical sector. In the preferred embodiment, a page tag is used to identify any offset, such as identifying the starting logical sector address of the data stored in the first physical sector of the metablock. Two blocks will be considered to have their logical sectors stored in similar order when they only differ by a page tag.
[0092] FIG. 10B illustrates schematically the mapping between logical groups and metablocks. Each logical group 380 is mapped to a unique metablock 370, except for a small number of logical groups in which data is currently being updated. After a logical group has been updated, it may be mapped to a different metablock. The mapping information is maintained in a set of logical to physical directories, which will be described in more detail later.
FINDING READ DISTURBS
[0093] Due to capacitive coupling between memory cells on adjacent word lines, voltage levels used while accessing data on one word line can affect data quality on the neighboring word line, non-accessed word. This can occur in both write operations, leading to "write disturbs", and in read operation, leading to "read disturbs". There are a number of techniques are known for dealing with program disturbs, including altering voltage ramp rates (see, for example, US patent number 6,717,851), altering the order in which word lines are written (see, for example, US patent number 7,986,554), using foggy-fine algorithms (discussed above), or various
post-write read verifications (see, for example, US patents and patent publication numbers 8,634,240 and 2013-0028021). This section considers techniques for determining word lines more likely to be suffering from a read disturbs, where reads to a localized zone of the memory can cause undetected disturbances in neighboring word lines within a block.
[0094] A number of approaches can be used to address this problem. One is to use block read counters in RAM on the controller, which can give a fair approximation when a block may become disturbed by reads.. This solution consumes a pretty fair amount of memory space (at least 4 bytes per block times the number of blocks in the system). In an SSD with 256K blocks, this can equate to about a 1MB of space to track simple read counters, which is a significant amount of relatively expensive controller RAM. Even when using this amount of RAM, a major problem with block counters is that they do not provide the granularity to know which word lines caused the problem and that the threshold is set extremely low. When the threshold for the block trips, the whole block is scrubbed (i.e. copied), which leads to premature cycling. With the scheme presented here, the system can detect specifically which word line was read, moves that data and neighbor data, but can leave the rest of the block intact.
[0095] Another approach is a read patrol (see US patents and patent publication numbers 7,012,835; 7,477,547; 7,616,484; and 2009/0172258), either randomly or serially sampling written blocks with valid data to look for read disturbs. This method uses extra background power and may not find hot zones in time (as this is dependent upon the amount of background time) or at all. The read patrol takes a significant amount of time to get coverage of the full device. Also, the read patrol itself contributes to the read disturb, the problem it is trying to solve. Reading neighboring word lines periodically for host reads can help to detect potential read disturbs, but adds additional power and latency to host operations. Additionally, reading neighbor word lines is subject to noise error and becomes cumber in trying to detect and identify hot read data addresses. [0096] The exemplary embodiments presented here use a hash tree to track read zones and find hot read areas of the flash. The hash tree uses a small footprint of memory
area and can provide more accuracy than a simple block counter, depending on the tree's design level. The hash tree can help isolate regions of the flash that the host is reading. Depending on the embodiment, the tree can be designed to be tall or short, with more branches or more singular, the tree can be symmetric or asymmetrical. [0097] Initially, when the tree starts, only one level is used, level 0. Level 0 can be a single set of N 4-byte counters. As a zone is hit by reads, the read counter is incremented. When the zone reaches a certain threshold, the zone is elevated to level 1. When the zone is elevated to level 1 , its space is broken into further zones in level 1. This provides more accuracy for detecting the hot space of a zone. A pointer can be used to indicate which zones have been elevated. After a zone is elevated, its root can still increment to help keep track of its read count. The threshold to elevate can be modified as the tree fills up.
[0098] The elevation of the zones can continue up the tree, where each level hash can have one or more children nodes. Because space is limited in an embedded device, when a different zone in a lower node becomes hotter, an eviction should take place at some point so that the tree cannot grow without bounds. When an eviction happens, the zone is collapsed down and a new zone is elevated in the tree for more analysis. During an eviction the zone read count is still preserved, but the tree information is lost. [0099] The number of levels will depend on the implementation. As zones reach the tree tips, and reaches the highest threshold, the zone can placed on a read patrol list for further evaluation for read scrub. More detail on scrub, refresh, and patrol operations can be found in US patents and patent publication numbers 7,012,835; 7,477,547; 7,616,484; and 2009/0172258. [0100] To maintain the tree structure and level counts, periodically the tree and its parameters can be saved to the non-volatile memory on the memory section. Then on power up the table can be loaded from the non-volatile memory back to controller RAM.
[0101] To avoid counter saturation, the tree can be pruned back by some amount periodically. The pruning will occur with block erases, hot read data migration, and,
alternatively, when certain hot count (number of erases) milestones are reached. This process can be referred to as a "tree leveling", where when the program/erase counter reaches a certain level, the whole tree can be pared back. If the device is evenly wear leveled, then all the blocks in the system shall vary in hot count by no more than percentage variation. (More detail on where leveling is given in US patents and patent publication numbers 7,353,325; 7,441,067; 7,120,729; and 2010-0174845.) Using this knowledge, certain hot count checkpoints can be established to prune down the tree. The pruning of the tree can be a global reset, or pairing the counters by a percentage, or pairing the tree by a fixed amount. The tree can be pruned whenever the stem threshold is crossed (causing a block, word line, logical group, or other structure corresponding to that level's zone to reach the scrub list).
[0102] When an area is detected hot, the hot area (and its neighboring word lines) can either be refreshed to a new block (leaving the rest of the block intact), or the whole block can be scrubbed. The hot data can either be refreshed to a separate zone, so as to not trip the tree up as the reads continue, or it can just migrate naturally. If migrating naturally then nothing special needs to be done in the event that a hot read zone becomes cold. The separate zone for hot data can be managed in various ways to reduce the resultant amount read disturbs. For example, the data can be stored in binary format, use different margins, be stored with one or more unused word lines between the word lines storing data, and so on. For any of these arrangements, the detection of potential read disturbs can lead to the eviction of a partial block of data, including the immediate neighbor word lines, or recycling of the entire block with possible special handling of the hot read data. If the hot read data cools later, it can rejoin the regular pool. [0103] In one set of embodiments, after a zone is detected hot, and the neighbors are checked and scrubbed, the hot data can be tracked logically using a separate table. Tracking this data separately can provide the advantage of detecting when the data becomes cold, and can help from having the same data trigger branching in the tree after scrubbing. The hot data would still need to be tracked for future read disturbs. [0104] If the tree is used to track the device physically and an erase occurs within a zone, the read counters can be rolled back by a defined algorithm amount to account
for the fact that a portion of that zone has been refreshed. Depending on the embodiment and the level, a branch of the tree can represent a logical group (4KB, for example), a die's WL, a series of WLs, or a series of blocks. As erases occur on units of blocks, the branch that represents that block would need to collapse down to the block level if necessary. At the time of collapse, a new branch can be elevated or the elevation can occur on the next read to that set.
[0105] As read disturbs are the result of operations on physically adjacent word lines, the exemplary embodiments are based on tracking physical addresses of the zones at each level. An alternative embodiment is to have the tree track the addresses logically instead of physically, with any writes to a zone/branch should have a decrementing effect on the counters.
[0106] Some of these concepts are illustrated with respect FIGs. 11-13. FIG. 11 is a schematic representation of the process for a two level example. Generally, level 0 zones can be die, portion of a die, number of blocks, and so on down to a group of word lines. The zones at the highest level (level 1 in this example) can be as small as individual word lines. (In this discussion, "zone" is not meant, or at least not necessarily meant, to correspond to the sort of zone structure described in US patent number 6,901,498, for example, but is being used more generally for physical memory regions such as die, block, word line and soon.) In the example of FIG. 11 the level 0 zone is taken as some number of blocks and the level 1 zone is taken as some fraction of the blocks of the level 0 zone.
[0107] At lower part of FIG. 11 are the level 0 counters 501, each of the read counters corresponding to one or zones 0 to N. For example, counter 503 tracks the number of times the blocks 505 of zone 0 are accessed for a read. In this example, Zone 0's blocks are split into level 1 zones for further analysis, there can be several level 1 counters. As shown to the left, when a counter reaches a threshold for the level the corresponding zone's block are moved up a level for further evaluation. When a zone moves up in levels, the count can either be evenly distributed to its subparts, reset to 0, or a separate master zone counter maintained. [0108] At level 1, the elevated level 0 zone is sub-divided into a set of level 1 zones with corresponding counters 511 : for example, Zone A of blocks 515 is monitored
using counter 513. The counters of level 1 are checked against the level's threshold and moved up as needed to the level or on a list for read scan, where, depending on the implementation, the system can repeat the narrowing process to get down to a group of blocks, a group of WLs, or even to the smallest read/write granularity as based on the system's ECC unit (referred to variously as a flash management unit, FMU, a codeword, or ECC page). When a block is erased, and the block is at a higher level (such as level 1 in FIG. 11), the zone can be shifted down a level. The collapsing of elements can be based on the comparison of other counters, block erasures, or as part of a tree levelling procedure. A collapsing of one branch can cause division in another branch. The root nodes can be evaluated on a tree collapse, or if no free zone counters are available, then the whole tree could be re-evaluated on any collapse, where priority can be given to the zone with the highest counter or the most recent counter.
[0109] From level 1, a zone Zone X with counter 521 is moved to the candidate list for read scan to check for rad disturb effects. If this zone is narrowed down to a word line or series of word lines, these can be placed on a "burning zone" list for frequently accessed zones.
[0110] FIG. 12 looks the situation in more detail. At bottom is the set of zone counters for Level 0, where Zones 0-N can represent the entire plane, die, chip, or device capacity. Based on the count values, as these reach the corresponding thresholds the counters of the set can be partitioned into equal sized zones for level 1. FIG. 12 shows the case when Q zones (two of which are shown) from level 0 have been elevated to level 1 , each subdivided into X zones with a corresponding counter. For example, Zone 0 from level 0 is here broken into multiple smaller zones Zone A to Zone A+X at level 1. The counters for the zones of level 1 are similarly used to determine when to move a zone of level 1 to level. For example, Zone A+l is here broken into multiple (X again in this example) smaller zones in level 2. If, say, Zone Έ+ then has a high count value, it can then be sent to the read scan to check for read disturb effects. [0111] FIG. 13 is similar to FIG. 12, but for a slightly different scenario. FIG. 13 shows two of the level 0 zones (zones 0 and N) each subdivided into a set of level 1
zones, each of which then has two zones (zones A+l and A+X, zones B and B+l) further split into sets of level 2 zones. A symmetrical hash tree may be easier for firmware/hardware to maintain, although asymmetrical trees can be used as well.
[0112] For any of the embodiments, the techniques of this section can help to determine locations of possible read disturbs with fewer reads to the device and less use of power. Hot read zones can be found accurately with a smaller memory footprint than in other counter solutions. This can help to avoid un-necessary scrubbing of data and blind background patrolling.
Conclusion [0113] The foregoing detailed description of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. The described embodiments were chosen in order to best explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims appended hereto.
Claims
1. A method of operating a non-volatile memory system having one or more memory circuits and a controller circuit, the memory circuits each including one or more arrays of non-volatile memory cells formed along word lines and the controller circuit managing the storage of data on the memory circuit, the method comprising: for each of a first plurality of distinct divisions of the one or more memory arrays maintaining by the controller circuit a count of the number of times word lines of the corresponding division is accessed for a read operation;
in response to one of the counts for a corresponding division reaching a first threshold value, subdividing the corresponding division into a second plurality of distinct first subdivisions; and
subsequently maintaining by the controller circuit for each of the first subdivisions a count of the number of times word lines of the subdivision is accessed for read operations.
2. The method of claim 1, further comprising:
in response to one of the counts for a corresponding subdivision reaching a second threshold value, further subdividing the corresponding subdivision into a third plurality of distinct first sub-subdivisions; and
subsequently maintaining by the controller circuit for each of the first sub- subdivisions a count of the number of times word lines of the sub subdivision is accessed for read operations.
3. The method of claim 1, wherein the first plurality of distinct divisions were previously formed by subdividing one of a plurality of structures formed of such divisions in response to a number of accesses for read operations.
4. The method of claim 1, further comprising:
in response to one of the counts for a corresponding subdivision reaching a second threshold value, placing the corresponding one of the subdivisions a list of subdivisions on which to perform a data scrub operation.
5. The method of claim 1, further comprising:
in response to one of the counts for a corresponding subdivision reaching a second threshold value, performing a scrub operation on the corresponding one of the subdivisions.
6. The method of claim 1, further comprising:
in response to one of the counts for a corresponding subdivision reaching a second threshold value, relocating the data from the corresponding one of the subdivisions to a different location on the memory circuits.
7. The method of claim 6, wherein the different location on the memory circuits is reserved by the controller circuit for frequently accessed data.
8. The method of claim 7, wherein the location reserved by the controller circuit for frequently accessed data is managed differently by the controller circuit than other portions of the memory circuits.
9. The method of claim 8, wherein data is stored in a binary format in the location reserved for frequently accessed data.
10. The method of claim 8, wherein data is stored on non-adjacent word lines in the location reserved for frequently accessed data.
11. The method of claim 7, wherein the relocated data is subsequently evicted from the location reserved for frequently accessed data in response to determining that the frequency of being accessed for the relocated data is decreased.
12. The method of claim 6, wherein the data relocated includes one or more frequently accessed word lines and one or more word lines adjacent the frequently accessed word lines.
13. The method of claim 6, wherein the relocating the data from the corresponding one of the subdivisions includes the relocation of an entire erase block.
14. The method of claim 1, wherein the controller circuit includes a volatile memory in which are maintained the values of the counts.
15. The method of claim 14, wherein the controller circuit periodically the count values to non- volatile memory on the memory circuits.
16. The method of claim 15, wherein on power up, the controller circuit loads the count values saved in non-volatile memory into the volatile memory on the controller circuit.
17. The method of claim 1, wherein the memory circuits are flash memory circuit and the divisions correspond to a plurality of erase blocks.
18. The method of claim 1, wherein the memory circuits are flash memory circuit and the subdivisions correspond to a plurality of erase blocks.
19. The method of claim 1, wherein the memory circuits are flash memory circuit and the divisions correspond to an erase blocks.
20. The method of claim 1, further comprising:
subsequently discontinuing of the maintaining by the controller circuit for one or more of the first subdivisions the count of the number of times word lines of the subdivision is accessed for read operations.
21. The method of claim 20, wherein the discontinuing is in response to the value of the counts being discontinued relative to others of the counts of the first subdivision.
22. The method of claim 20, wherein the discontinuing is in response to the corresponding division being erased.
23. The method of claim 20, wherein the discontinuing is in response to the number of counts being maintained.
24. The method of claim 1, wherein the memory circuits are flash memory circuit and the subdivisions correspond to an erase blocks.
25. The method of claim 1, wherein the divisions correspond to a set of word lines.
26. The method of claim 1, wherein the subdivisions correspond to a set of word lines.
27. The method of claim 1, wherein the memory circuits include a plurality of dies and the divisions correspond to a die.
28. The method of claim 1, wherein the arrays are of a NAND-type of architecture.
29. The memory of claim 1, wherein the arrays are of an architecture having a three dimensional memory array that is monolithically formed as a plurality of physical levels of memory cells, a physical level having an active layer disposed above a silicon substrate, the memory cells in communication with operating circuitry.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020167017243A KR102042889B1 (en) | 2014-03-17 | 2015-03-03 | Detection of read disturbances on non-volatile memories through counting of read accesses within divisions of the memory |
CN201580003538.0A CN105874541B (en) | 2014-03-17 | 2015-03-03 | Detecting read disturb on a non-volatile memory by counting read accesses within a partition of the memory |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/215,924 US9230689B2 (en) | 2014-03-17 | 2014-03-17 | Finding read disturbs on non-volatile memories |
US14/215,924 | 2014-03-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015142513A1 true WO2015142513A1 (en) | 2015-09-24 |
Family
ID=52633736
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2015/018527 WO2015142513A1 (en) | 2014-03-17 | 2015-03-03 | Detection of read disturbances on non-volatile memories through counting of read accesses within divisions of the memory |
Country Status (4)
Country | Link |
---|---|
US (1) | US9230689B2 (en) |
KR (1) | KR102042889B1 (en) |
CN (1) | CN105874541B (en) |
WO (1) | WO2015142513A1 (en) |
Families Citing this family (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9171620B2 (en) * | 2012-11-29 | 2015-10-27 | Sandisk Technologies Inc. | Weighted read scrub for nonvolatile memory |
US9230689B2 (en) * | 2014-03-17 | 2016-01-05 | Sandisk Technologies Inc. | Finding read disturbs on non-volatile memories |
US9239757B2 (en) * | 2014-05-30 | 2016-01-19 | Sandisk Technologies Inc. | Method and apparatus for relocating data in non-volatile memory |
US9633742B2 (en) | 2014-07-10 | 2017-04-25 | Sandisk Technologies Llc | Segmentation of blocks for faster bit line settling/recovery in non-volatile memory devices |
US9418750B2 (en) | 2014-09-15 | 2016-08-16 | Sandisk Technologies Llc | Single ended word line and bit line time constant measurement |
US9423971B2 (en) * | 2014-10-03 | 2016-08-23 | Sandisk Technologies Llc | Method and system for adaptively assigning logical block address read counters using a tree structure |
KR20160042224A (en) * | 2014-10-07 | 2016-04-19 | 에스케이하이닉스 주식회사 | Data storage device and operating method thereof |
US9678827B2 (en) * | 2014-10-07 | 2017-06-13 | SK Hynix Inc. | Access counts for performing data inspection operations in data storage device |
US9412451B2 (en) | 2014-10-08 | 2016-08-09 | Micron Technology, Inc. | Apparatuses and methods using dummy cells programmed to different states |
US10141049B2 (en) * | 2014-12-19 | 2018-11-27 | Sandisk Technologies Llc | Nonvolatile memory system storing system data in marginal word lines |
KR102271462B1 (en) | 2015-01-13 | 2021-07-05 | 삼성전자주식회사 | Nonvolatile memory device, operating method of the same, and programming method of the same |
US9318210B1 (en) * | 2015-02-02 | 2016-04-19 | Sandisk Technologies Inc. | Word line kick during sensing: trimming and adjacent word lines |
US9336892B1 (en) * | 2015-06-02 | 2016-05-10 | Sandisk Technologies Inc. | Reducing hot electron injection type of read disturb in 3D non-volatile memory |
US9412463B1 (en) | 2015-06-02 | 2016-08-09 | Sandisk Technologies Llc | Reducing hot electron injection type of read disturb in 3D non-volatile memory for edge word lines |
US10665305B2 (en) * | 2015-09-09 | 2020-05-26 | Toshiba Memory Corporation | Host device connectable to memory device performing patrol read and memory device performing patrol read |
US10452596B2 (en) * | 2015-10-29 | 2019-10-22 | Micron Technology, Inc. | Memory cells configured in multiple configuration modes |
CN106982452B (en) * | 2016-01-19 | 2020-09-04 | 中国移动通信集团安徽有限公司 | Method and device for determining call quality |
KR102585221B1 (en) | 2016-04-21 | 2023-10-05 | 삼성전자주식회사 | Memory Device, Memory System and Method of Operating Memory Device |
KR20180059208A (en) | 2016-11-25 | 2018-06-04 | 삼성전자주식회사 | Memory controller with reclaim controller |
US10268387B2 (en) * | 2017-01-04 | 2019-04-23 | Sandisk Technologies Llc | Meta-groups in non-volatile storage based on performance times |
US10049047B1 (en) | 2017-03-10 | 2018-08-14 | Toshiba Memory Corporation | Multibit NAND media using pseudo-SLC caching technique |
US10095626B2 (en) | 2017-03-10 | 2018-10-09 | Toshiba Memory Corporation | Multibit NAND media using pseudo-SLC caching technique |
US10236069B2 (en) * | 2017-06-20 | 2019-03-19 | Intel Corporation | Word line read disturb error reduction through fine grained access counter mechanism |
US10140042B1 (en) | 2017-09-13 | 2018-11-27 | Toshiba Memory Corporation | Deterministic read disturb counter-based data checking for NAND flash |
EP3688599A4 (en) | 2017-09-30 | 2021-07-28 | Micron Technology, INC. | Preemptive idle time read scans |
US10810060B2 (en) | 2017-10-26 | 2020-10-20 | SK Hynix Inc. | Event management for embedded systems |
US10755793B2 (en) * | 2017-10-31 | 2020-08-25 | Micron Technology, Inc. | SLC page read |
CN107832016A (en) * | 2017-11-13 | 2018-03-23 | 郑州云海信息技术有限公司 | One kind reads interference optimization method and device |
KR102504368B1 (en) * | 2017-12-22 | 2023-02-24 | 에스케이하이닉스 주식회사 | Semiconductor device for managing wear levelling operation of nonvolatile memory device |
KR20190083862A (en) * | 2018-01-05 | 2019-07-15 | 에스케이하이닉스 주식회사 | Memory system and operation method thereof |
CN108305663B (en) * | 2018-02-02 | 2021-04-06 | 上海华虹宏力半导体制造有限公司 | Method for testing interference of SONOS flash memory |
KR20200017220A (en) * | 2018-08-08 | 2020-02-18 | 에스케이하이닉스 주식회사 | Memory system and operating method thereof |
KR102499061B1 (en) | 2018-08-22 | 2023-02-13 | 삼성전자주식회사 | Semiconductor memory device including phase change memory device and method of accessing phase change memory device |
KR20200043814A (en) * | 2018-10-18 | 2020-04-28 | 에스케이하이닉스 주식회사 | Memory system and operating method thereof |
US10553290B1 (en) * | 2018-10-30 | 2020-02-04 | Micron Technology, Inc. | Read disturb scan consolidation |
US11762575B2 (en) * | 2019-07-31 | 2023-09-19 | Hewlett-Packard Development Company, L.P. | Updates to flash memory based on determinations of bits to erase |
US11287998B2 (en) * | 2019-08-02 | 2022-03-29 | Micron Technology, Inc. | Read count scaling factor for data integrity scan |
JP2021071776A (en) | 2019-10-29 | 2021-05-06 | キオクシア株式会社 | Memory system |
KR20210051644A (en) * | 2019-10-31 | 2021-05-10 | 에스케이하이닉스 주식회사 | Memory system, memory controller, and operating method |
US20210149800A1 (en) * | 2019-11-20 | 2021-05-20 | Western Digital Technologies, Inc. | Ssd system using power-cycle based read scrub |
EP4070200A4 (en) * | 2019-12-03 | 2023-09-06 | Micron Technology, Inc. | Cache architecture for a storage device |
WO2021212399A1 (en) * | 2020-04-23 | 2021-10-28 | Yangtze Memory Technologies Co., Ltd. | Memory device and programming method thereof |
TWI727842B (en) | 2020-02-20 | 2021-05-11 | 大陸商長江存儲科技有限責任公司 | Memory device and programming method thereof |
US11366602B2 (en) | 2020-06-23 | 2022-06-21 | Western Digital Technologies, Inc. | Data storage device with burn-after-read mode |
US11282564B1 (en) | 2020-11-11 | 2022-03-22 | Micron Technology, Inc. | Selective wordline scans based on a data state metric |
US11868223B2 (en) | 2022-01-19 | 2024-01-09 | Dell Products L.P. | Read-disturb-based read temperature information utilization system |
US11914494B2 (en) * | 2022-01-20 | 2024-02-27 | Dell Products L.P. | Storage device read-disturb-based read temperature map utilization system |
US11694722B1 (en) | 2022-02-15 | 2023-07-04 | Western Digital Technologies, Inc. | Data timestamp and read counter for magnetic recording devices |
Citations (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5070032A (en) | 1989-03-15 | 1991-12-03 | Sundisk Corporation | Method of making dense flash eeprom semiconductor memory structures |
US5095344A (en) | 1988-06-08 | 1992-03-10 | Eliyahou Harari | Highly compact eprom and flash eeprom devices |
US5313421A (en) | 1992-01-14 | 1994-05-17 | Sundisk Corporation | EEPROM with split gate source side injection |
US5315541A (en) | 1992-07-24 | 1994-05-24 | Sundisk Corporation | Segmented column memory array |
US5343063A (en) | 1990-12-18 | 1994-08-30 | Sundisk Corporation | Dense vertical programmable read only memory cell structure and processes for making them |
US5570315A (en) | 1993-09-21 | 1996-10-29 | Kabushiki Kaisha Toshiba | Multi-state EEPROM having write-verify control circuit |
US5595924A (en) | 1994-05-25 | 1997-01-21 | Sandisk Corporation | Technique of forming over an irregular surface a polysilicon layer with a smooth surface |
US5768192A (en) | 1996-07-23 | 1998-06-16 | Saifun Semiconductors, Ltd. | Non-volatile semiconductor memory cell utilizing asymmetrical charge trapping |
US5903495A (en) | 1996-03-18 | 1999-05-11 | Kabushiki Kaisha Toshiba | Semiconductor device and memory system |
US6011725A (en) | 1997-08-01 | 2000-01-04 | Saifun Semiconductors, Ltd. | Two bit non-volatile electrically erasable and programmable semiconductor memory cell utilizing asymmetrical charge trapping |
US6222762B1 (en) | 1992-01-14 | 2001-04-24 | Sandisk Corporation | Multi-state memory |
US6657891B1 (en) | 2002-11-29 | 2003-12-02 | Kabushiki Kaisha Toshiba | Semiconductor memory device for storing multivalued data |
US6717851B2 (en) | 2000-10-31 | 2004-04-06 | Sandisk Corporation | Method of reducing disturbs in non-volatile memory |
US6870768B2 (en) | 2002-09-06 | 2005-03-22 | Sandisk Corporation | Techniques for reducing effects of coupling between storage elements of adjacent rows of memory cells |
US6901498B2 (en) | 2002-12-09 | 2005-05-31 | Sandisk Corporation | Zone boundary adjustment for defects in non-volatile memories |
US7012835B2 (en) | 2003-10-03 | 2006-03-14 | Sandisk Corporation | Flash memory data correction and scrub techniques |
US7120729B2 (en) | 2002-10-28 | 2006-10-10 | Sandisk Corporation | Automated wear leveling in non-volatile storage systems |
US7353325B2 (en) | 1991-09-13 | 2008-04-01 | Sandisk Corporation | Wear leveling techniques for flash EEPROM systems |
US7441067B2 (en) | 2004-11-15 | 2008-10-21 | Sandisk Corporation | Cyclic flash memory wear leveling |
US7477547B2 (en) | 2007-03-28 | 2009-01-13 | Sandisk Corporation | Flash memory refresh techniques triggered by controlled scrub data reads |
US20090034328A1 (en) * | 2007-08-03 | 2009-02-05 | Bong-Gwan Seol | Memory system protected from errors due to read disturbance and reading method thereof |
US20090172258A1 (en) | 2007-12-27 | 2009-07-02 | Pliant Technology, Inc | Flash memory controller garbage collection operations performed independently in multiple flash memory groups |
US7616484B2 (en) | 1992-05-20 | 2009-11-10 | Sandisk Corporation | Soft errors handling in EEPROM devices |
US20100174845A1 (en) | 2009-01-05 | 2010-07-08 | Sergey Anatolievich Gorobets | Wear Leveling for Non-Volatile Memories: Maintenance of Experience Count and Passive Techniques |
US20100217919A1 (en) * | 2009-02-24 | 2010-08-26 | Kabushiki Kaisha Toshiba | Memory controller, semiconductor memory device and control method thereof |
US20100229055A1 (en) * | 2009-03-05 | 2010-09-09 | Nilanjan Mukherjee | Fault Diagnosis For Non-Volatile Memories |
US7818525B1 (en) * | 2009-08-12 | 2010-10-19 | Texas Memory Systems, Inc. | Efficient reduction of read disturb errors in NAND FLASH memory |
US7986554B2 (en) | 2008-03-19 | 2011-07-26 | Sandisk Technologies Inc. | Different combinations of wordline order and look-ahead read to improve non-volatile memory performance |
US20130028021A1 (en) | 2011-07-28 | 2013-01-31 | Eran Sharon | Simultaneous Sensing of Multiple Wordlines and Detection of NAND Failures |
US20130128666A1 (en) * | 2011-11-21 | 2013-05-23 | Chris Avila | Scrub Techniques for Use with Dynamic Read |
US8634240B2 (en) | 2009-10-28 | 2014-01-21 | SanDisk Technologies, Inc. | Non-volatile memory and method with accelerated post-write read to manage errors |
Family Cites Families (157)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4139911A (en) | 1978-03-13 | 1979-02-13 | Westinghouse Electric Corp. | High speed sense circuit for semiconductor memories |
US4218764A (en) | 1978-10-03 | 1980-08-19 | Matsushita Electric Industrial Co., Ltd. | Non-volatile memory refresh control circuit |
US4253059A (en) | 1979-05-14 | 1981-02-24 | Fairchild Camera & Instrument Corp. | EPROM Reliability test circuit |
JPS58139399A (en) | 1982-02-15 | 1983-08-18 | Hitachi Ltd | Semiconductor storage device |
US4460982A (en) | 1982-05-20 | 1984-07-17 | Intel Corporation | Intelligent electrically programmable and electrically erasable ROM |
JPS6134793A (en) | 1984-07-27 | 1986-02-19 | Hitachi Ltd | Diagnosing and error correcting device in dynamic memory device |
US4612630A (en) | 1984-07-27 | 1986-09-16 | Harris Corporation | EEPROM margin testing design |
JPS6148197A (en) | 1984-08-13 | 1986-03-08 | Fujitsu Ltd | Charge-up circuit |
JPS61172300A (en) | 1985-01-26 | 1986-08-02 | Toshiba Corp | Semiconductor memory device |
EP0198935A1 (en) | 1985-04-23 | 1986-10-29 | Deutsche ITT Industries GmbH | Electrically erasable programmable redundant semiconductor memory |
US4962322A (en) | 1988-12-05 | 1990-10-09 | Texas Instruments Incorporated | Nonvolatible capacitor random access memory |
JPS62114200A (en) | 1985-11-13 | 1987-05-25 | Mitsubishi Electric Corp | Semiconductor memory device |
US5157629A (en) | 1985-11-22 | 1992-10-20 | Hitachi, Ltd. | Selective application of voltages for testing storage cells in semiconductor memory arrangements |
US4763305A (en) | 1985-11-27 | 1988-08-09 | Motorola, Inc. | Intelligent write in an EEPROM with data and erase check |
JPH0715799B2 (en) | 1987-06-30 | 1995-02-22 | 日本電気株式会社 | Semiconductor memory device |
FR2618579B1 (en) | 1987-07-21 | 1989-11-10 | Thomson Semiconducteurs | INTEGRATED MEMORY CIRCUIT COMPRISING AN ANTI-FRAUD DEVICE |
JPS6476596A (en) | 1987-09-18 | 1989-03-22 | Oki Electric Ind Co Ltd | Error of eeprom detecting device |
US4809231A (en) | 1987-11-12 | 1989-02-28 | Motorola, Inc. | Method and apparatus for post-packaging testing of one-time programmable memories |
FR2630573B1 (en) | 1988-04-26 | 1990-07-13 | Sgs Thomson Microelectronics | ELECTRICALLY PROGRAMMABLE MEMORY WITH MULTIPLE INFORMATION BITS PER CELL |
US5043940A (en) | 1988-06-08 | 1991-08-27 | Eliyahou Harari | Flash EEPROM memory systems having multistate storage cells |
US5268870A (en) | 1988-06-08 | 1993-12-07 | Eliyahou Harari | Flash EEPROM system and intelligent programming and erasing methods therefor |
JPH07105146B2 (en) | 1988-07-29 | 1995-11-13 | 三菱電機株式会社 | Non-volatile storage device |
JPH02260298A (en) | 1989-03-31 | 1990-10-23 | Oki Electric Ind Co Ltd | Non-volatile multilevel memory device |
US4980859A (en) | 1989-04-07 | 1990-12-25 | Xicor, Inc. | NOVRAM cell using two differential decouplable nonvolatile memory elements |
US5172338B1 (en) | 1989-04-13 | 1997-07-08 | Sandisk Corp | Multi-state eeprom read and write circuits and techniques |
JPH0664918B2 (en) | 1989-05-25 | 1994-08-22 | ローム株式会社 | Semiconductor memory device having self-correction function |
JPH07114077B2 (en) | 1989-06-01 | 1995-12-06 | 三菱電機株式会社 | Nonvolatile semiconductor memory device |
WO1990016069A1 (en) | 1989-06-12 | 1990-12-27 | Kabushiki Kaisha Toshiba | Semiconductor memory device |
FR2650109B1 (en) | 1989-07-20 | 1993-04-02 | Gemplus Card Int | INTEGRATED MOS CIRCUIT WITH ADJUSTABLE THRESHOLD VOLTAGE |
JPH03162800A (en) | 1989-08-29 | 1991-07-12 | Mitsubishi Electric Corp | Semiconductor memory device |
US5065364A (en) | 1989-09-15 | 1991-11-12 | Intel Corporation | Apparatus for providing block erasing in a flash EPROM |
US5200959A (en) | 1989-10-17 | 1993-04-06 | Sundisk Corporation | Device and method for defect handling in semi-conductor memory |
US5270551A (en) | 1990-02-14 | 1993-12-14 | Hitachi, Ltd. | Method of and apparatus for protecting electronic circuit against radiation |
US4975883A (en) | 1990-03-29 | 1990-12-04 | Intel Corporation | Method and apparatus for preventing the erasure and programming of a nonvolatile memory |
US5132935A (en) | 1990-04-16 | 1992-07-21 | Ashmore Jr Benjamin H | Erasure of eeprom memory arrays to prevent over-erased cells |
US5122985A (en) | 1990-04-16 | 1992-06-16 | Giovani Santin | Circuit and method for erasing eeprom memory arrays to prevent over-erased cells |
US5200922A (en) | 1990-10-24 | 1993-04-06 | Rao Kameswara K | Redundancy circuit for high speed EPROM and flash memory devices |
US5239505A (en) | 1990-12-28 | 1993-08-24 | Intel Corporation | Floating gate non-volatile memory with blocks and memory refresh |
US5504760A (en) | 1991-03-15 | 1996-04-02 | Sandisk Corporation | Mixed data encoding EEPROM system |
US5270979A (en) | 1991-03-15 | 1993-12-14 | Sundisk Corporation | Method for optimum erasing of EEPROM |
US5263032A (en) | 1991-06-27 | 1993-11-16 | Digital Equipment Corporation | Computer system operation with corrected read data function |
US5313427A (en) | 1991-09-20 | 1994-05-17 | Texas Instruments Incorporated | EEPROM array with narrow margin of voltage thresholds after erase |
JPH05109292A (en) | 1991-10-14 | 1993-04-30 | Toshiba Corp | Nonvolatile semiconductor memory |
US5347489A (en) | 1992-04-21 | 1994-09-13 | Intel Corporation | Method and circuitry for preconditioning shorted rows in a nonvolatile semiconductor memory incorporating row redundancy |
US5327383A (en) | 1992-04-21 | 1994-07-05 | Intel Corporation | Method and circuitry for erasing a nonvolatile semiconductor memory incorporating row redundancy |
US5532962A (en) | 1992-05-20 | 1996-07-02 | Sandisk Corporation | Soft errors handling in EEPROM devices |
JPH065823A (en) | 1992-06-19 | 1994-01-14 | Toshiba Corp | Nonvolatile semiconductor memory device and its application method |
US5550394A (en) | 1993-06-18 | 1996-08-27 | Texas Instruments Incorporated | Semiconductor memory device and defective memory cell correction circuit |
JP2708333B2 (en) | 1992-09-02 | 1998-02-04 | 株式会社東芝 | Level shifter circuit |
US5365486A (en) | 1992-12-16 | 1994-11-15 | Texas Instruments Incorporated | Method and circuitry for refreshing a flash electrically erasable, programmable read only memory |
US5404485A (en) | 1993-03-08 | 1995-04-04 | M-Systems Flash Disk Pioneers Ltd. | Flash file system |
US5335198A (en) | 1993-05-06 | 1994-08-02 | Advanced Micro Devices, Inc. | Flash EEPROM array with high endurance |
US5555204A (en) | 1993-06-29 | 1996-09-10 | Kabushiki Kaisha Toshiba | Non-volatile semiconductor memory device |
JP3999822B2 (en) | 1993-12-28 | 2007-10-31 | 株式会社東芝 | Storage system |
GB2289779B (en) | 1994-05-24 | 1999-04-28 | Intel Corp | Method and apparatus for automatically scrubbing ECC errors in memory via hardware |
US5523972A (en) | 1994-06-02 | 1996-06-04 | Intel Corporation | Method and apparatus for verifying the programming of multi-level flash EEPROM memory |
US5450363A (en) | 1994-06-02 | 1995-09-12 | Intel Corporation | Gray coding for a multilevel cell memory system |
JP3563452B2 (en) | 1994-08-10 | 2004-09-08 | 株式会社東芝 | Cell threshold distribution detecting circuit and cell threshold distribution detecting method |
JP3450456B2 (en) | 1994-08-31 | 2003-09-22 | 株式会社東芝 | Semiconductor storage device |
JPH08147988A (en) | 1994-11-17 | 1996-06-07 | Sony Corp | Semiconductor nonvolatile storage |
FR2728380A1 (en) | 1994-12-20 | 1996-06-21 | Sgs Thomson Microelectronics | METHOD FOR WRITING DATA IN A CORRESPONDING ELECTRICALLY PROGRAMMABLE MEMORY AND MEMORY |
US5475693A (en) | 1994-12-27 | 1995-12-12 | Intel Corporation | Error management processes for flash EEPROM memory arrays |
JP3274306B2 (en) | 1995-01-20 | 2002-04-15 | 株式会社東芝 | Semiconductor integrated circuit device |
KR100566466B1 (en) | 1995-01-31 | 2006-03-31 | 가부시끼가이샤 히다치 세이사꾸쇼 | Semiconductor memory device |
US5530705A (en) | 1995-02-08 | 1996-06-25 | International Business Machines Corporation | Soft error recovery system and method |
US5513144A (en) | 1995-02-13 | 1996-04-30 | Micron Technology, Inc. | On-chip memory redundancy circuitry for programmable non-volatile memories, and methods for programming same |
JP3176019B2 (en) | 1995-04-05 | 2001-06-11 | 株式会社東芝 | Storage system including nonvolatile semiconductor storage unit |
JPH08297987A (en) | 1995-04-26 | 1996-11-12 | Toshiba Corp | Nonvolatile semiconductor memory |
US5699297A (en) | 1995-05-30 | 1997-12-16 | Kabushiki Kaisha Toshiba | Method of rewriting data in a microprocessor additionally provided with a flash memory |
US5907856A (en) | 1995-07-31 | 1999-05-25 | Lexar Media, Inc. | Moving sectors within a block of information in a flash memory mass storage architecture |
US5687114A (en) | 1995-10-06 | 1997-11-11 | Agate Semiconductor, Inc. | Integrated circuit for storage and retrieval of multiple digital bits per nonvolatile memory cell |
JPH09128165A (en) | 1995-10-27 | 1997-05-16 | Toshiba Corp | Solid state recording and reproducing device |
US5703506A (en) | 1995-12-26 | 1997-12-30 | Motorola | Signal processing method |
FR2745114B1 (en) | 1996-02-20 | 1998-04-17 | Sgs Thomson Microelectronics | NON-VOLATILE ELECTRICALLY MODIFIABLE MEMORY WITH SELF-CONTAINED COOLING |
US5712815A (en) | 1996-04-22 | 1998-01-27 | Advanced Micro Devices, Inc. | Multiple bits per-cell flash EEPROM capable of concurrently programming and verifying memory cells and reference cells |
JP3584607B2 (en) | 1996-05-10 | 2004-11-04 | ソニー株式会社 | Non-volatile storage device |
US5715193A (en) | 1996-05-23 | 1998-02-03 | Micron Quantum Devices, Inc. | Flash memory system and method for monitoring the disturb effect on memory cell blocks due to high voltage conditions of other memory cell blocks |
US5675537A (en) | 1996-08-22 | 1997-10-07 | Advanced Micro Devices, Inc. | Erase method for page mode multiple bits-per-cell flash EEPROM |
US5798968A (en) | 1996-09-24 | 1998-08-25 | Sandisk Corporation | Plane decode/virtual sector architecture |
US5890192A (en) | 1996-11-05 | 1999-03-30 | Sandisk Corporation | Concurrent write of multiple chunks of data into multiple subarrays of flash EEPROM |
US5717632A (en) | 1996-11-27 | 1998-02-10 | Advanced Micro Devices, Inc. | Apparatus and method for multiple-level storage in non-volatile memories |
US5835413A (en) | 1996-12-20 | 1998-11-10 | Intel Corporation | Method for improved data retention in a nonvolatile writeable memory by sensing and reprogramming cell voltage levels |
US5930167A (en) | 1997-07-30 | 1999-07-27 | Sandisk Corporation | Multi-state non-volatile flash memory capable of being its own two state write cache |
US5909449A (en) | 1997-09-08 | 1999-06-01 | Invox Technology | Multibit-per-cell non-volatile memory with error detection and correction |
US5937425A (en) | 1997-10-16 | 1999-08-10 | M-Systems Flash Disk Pioneers Ltd. | Flash file system optimized for page-mode flash technologies |
JP3177207B2 (en) | 1998-01-27 | 2001-06-18 | インターナショナル・ビジネス・マシーンズ・コーポレ−ション | Refresh interval control apparatus and method, and computer |
JP2000187992A (en) | 1998-12-17 | 2000-07-04 | Mitsubishi Electric Corp | Refresh control circuit for electrically rewritable non- volatile memory |
US6215697B1 (en) | 1999-01-14 | 2001-04-10 | Macronix International Co., Ltd. | Multi-level memory cell device and method for self-converged programming |
JP2000251483A (en) | 1999-02-24 | 2000-09-14 | Sanyo Electric Co Ltd | One chip microcomputer and data refreshing method |
CN100347684C (en) | 1999-07-28 | 2007-11-07 | 索尼公司 | Recording system, data recording device, memory device, and data recording method |
US6222768B1 (en) | 2000-01-28 | 2001-04-24 | Advanced Micro Devices, Inc. | Auto adjusting window placement scheme for an NROM virtual ground array |
US6426893B1 (en) | 2000-02-17 | 2002-07-30 | Sandisk Corporation | Flash eeprom system with simultaneous multiple data sector programming and storage of physical block characteristics in other designated blocks |
US6567307B1 (en) | 2000-07-21 | 2003-05-20 | Lexar Media, Inc. | Block management for mass storage |
US6772274B1 (en) | 2000-09-13 | 2004-08-03 | Lexar Media, Inc. | Flash memory system and method implementing LBA to PBA correlation within flash memory array |
US6345001B1 (en) | 2000-09-14 | 2002-02-05 | Sandisk Corporation | Compressed event counting technique and application to a flash memory system |
JP4323707B2 (en) | 2000-10-25 | 2009-09-02 | 富士通マイクロエレクトロニクス株式会社 | Flash memory defect management method |
US6763424B2 (en) | 2001-01-19 | 2004-07-13 | Sandisk Corporation | Partial block data programming and reading operations in a non-volatile memory |
JP3812933B2 (en) | 2001-04-19 | 2006-08-23 | シャープ株式会社 | File system and control method thereof |
US6522580B2 (en) | 2001-06-27 | 2003-02-18 | Sandisk Corporation | Operating techniques for reducing effects of coupling between storage elements of a non-volatile memory operated in multiple data states |
JP4059472B2 (en) | 2001-08-09 | 2008-03-12 | 株式会社ルネサステクノロジ | Memory card and memory controller |
US6456528B1 (en) | 2001-09-17 | 2002-09-24 | Sandisk Corporation | Selective operation of a multi-state non-volatile memory system in a binary mode |
US6678785B2 (en) | 2001-09-28 | 2004-01-13 | M-Systems Flash Disk Pioneers Ltd. | Flash management system using only sequential write |
US6925007B2 (en) | 2001-10-31 | 2005-08-02 | Sandisk Corporation | Multi-state non-volatile integrated circuit memory systems that employ dielectric storage elements |
US6678192B2 (en) | 2001-11-02 | 2004-01-13 | Sandisk Corporation | Error management for writable tracking storage units |
JP2003242789A (en) | 2002-02-14 | 2003-08-29 | Mitsubishi Electric Corp | Nonvolatile semiconductor memory device |
US6771536B2 (en) * | 2002-02-27 | 2004-08-03 | Sandisk Corporation | Operating techniques for reducing program and read disturbs of a non-volatile memory |
JP2003257192A (en) | 2002-03-06 | 2003-09-12 | Mitsubishi Electric Corp | Semiconductor memory device and nonvolatile semiconductor memory device |
US7324393B2 (en) * | 2002-09-24 | 2008-01-29 | Sandisk Corporation | Method for compensated sensing in non-volatile memory |
US6963505B2 (en) | 2002-10-29 | 2005-11-08 | Aifun Semiconductors Ltd. | Method circuit and system for determining a reference voltage |
US6944063B2 (en) * | 2003-01-28 | 2005-09-13 | Sandisk Corporation | Non-volatile semiconductor memory with large erase blocks storing cycle counts |
US6912160B2 (en) | 2003-03-11 | 2005-06-28 | Fujitsu Limited | Nonvolatile semiconductor memory device |
US6839281B2 (en) | 2003-04-14 | 2005-01-04 | Jian Chen | Read and erase verify methods and circuits suitable for low voltage non-volatile memories |
US7076598B2 (en) | 2003-09-09 | 2006-07-11 | Solid State System Co., Ltd. | Pipeline accessing method to a large block memory |
US7173852B2 (en) | 2003-10-03 | 2007-02-06 | Sandisk Corporation | Corrected data storage and handling methods |
US7221588B2 (en) | 2003-12-05 | 2007-05-22 | Sandisk 3D Llc | Memory array incorporating memory cells arranged in NAND strings |
JP4063239B2 (en) | 2004-04-16 | 2008-03-19 | ソニー株式会社 | Data reading circuit and semiconductor device having this circuit |
JP4083147B2 (en) | 2004-07-02 | 2008-04-30 | シャープ株式会社 | Semiconductor memory device |
US7242618B2 (en) | 2004-12-09 | 2007-07-10 | Saifun Semiconductors Ltd. | Method for reading non-volatile memory cells |
US7257025B2 (en) | 2004-12-09 | 2007-08-14 | Saifun Semiconductors Ltd | Method for reading non-volatile memory cells |
US7206230B2 (en) | 2005-04-01 | 2007-04-17 | Sandisk Corporation | Use of data latches in cache operations of non-volatile memories |
US7339834B2 (en) | 2005-06-03 | 2008-03-04 | Sandisk Corporation | Starting program voltage shift with cycling of non-volatile memory |
US7631245B2 (en) | 2005-09-26 | 2009-12-08 | Sandisk Il Ltd. | NAND flash memory controller exporting a NAND interface |
JP4660353B2 (en) | 2005-11-01 | 2011-03-30 | 株式会社東芝 | Storage medium playback device |
US7254071B2 (en) | 2006-01-12 | 2007-08-07 | Sandisk Corporation | Flash memory devices with trimmed analog voltages |
US7286412B1 (en) | 2006-05-09 | 2007-10-23 | Macronix International Co., Ltd. | Method and apparatus to improve nonvolatile memory data retention |
US7639531B2 (en) | 2006-05-15 | 2009-12-29 | Apple Inc. | Dynamic cell bit resolution |
US7613043B2 (en) | 2006-05-15 | 2009-11-03 | Apple Inc. | Shifting reference values to account for voltage sag |
US7952922B2 (en) | 2006-06-06 | 2011-05-31 | Micron Technology, Inc. | Method for programming a non-volatile memory device to reduce floating-gate-to-floating-gate coupling effect |
US7489549B2 (en) | 2006-06-22 | 2009-02-10 | Sandisk Corporation | System for non-real time reprogramming of non-volatile memory to achieve tighter distribution of threshold voltages |
US7330376B1 (en) | 2006-07-27 | 2008-02-12 | Macronix International Co., Ltd. | Method for memory data storage by partition into narrower threshold voltage distribution regions |
US7450425B2 (en) | 2006-08-30 | 2008-11-11 | Micron Technology, Inc. | Non-volatile memory cell read failure reduction |
US8050901B2 (en) | 2006-09-14 | 2011-11-01 | Taiwan Semiconductor Manufacturing Company, Ltd. | Prediction and control of NBTI of integrated circuits |
US7716538B2 (en) | 2006-09-27 | 2010-05-11 | Sandisk Corporation | Memory with cell population distribution assisted read margining |
US7558109B2 (en) | 2006-11-03 | 2009-07-07 | Sandisk Corporation | Nonvolatile memory with variable read threshold |
US7489547B2 (en) | 2006-12-29 | 2009-02-10 | Sandisk Corporation | Method of NAND flash memory cell array with adaptive memory state partitioning |
US7489548B2 (en) | 2006-12-29 | 2009-02-10 | Sandisk Corporation | NAND flash memory cell array with adaptive memory state partitioning |
JP2008287404A (en) * | 2007-05-16 | 2008-11-27 | Hitachi Ltd | Apparatus for detecting and recovering data corruption in reading in non-access memory cell, and method thereof |
KR100838292B1 (en) | 2007-06-20 | 2008-06-17 | 삼성전자주식회사 | Apparatus for controlling read level of memory cell and method using the same |
KR100891005B1 (en) | 2007-06-28 | 2009-03-31 | 삼성전자주식회사 | Flash memory device compensating it's read voltage margin and method for adjusting read voltage thereof |
US8189381B1 (en) * | 2007-08-28 | 2012-05-29 | Marvell International Ltd. | System and method for reading flash memory cells |
KR101422702B1 (en) | 2007-12-28 | 2014-07-25 | 삼성전자주식회사 | Tree dementional memory device and programming method thereof |
US8301912B2 (en) | 2007-12-31 | 2012-10-30 | Sandisk Technologies Inc. | System, method and memory device providing data scrambling compatible with on-chip copy operation |
CN102157202B (en) * | 2008-01-22 | 2015-06-17 | 群联电子股份有限公司 | Method and controller for preventing nonvolatile memory from occurring read interference |
US7937521B2 (en) * | 2008-01-29 | 2011-05-03 | Cadence Design Systems, Inc. | Read disturbance management in a non-volatile memory system |
JP5259242B2 (en) | 2008-04-23 | 2013-08-07 | 株式会社東芝 | Three-dimensional stacked nonvolatile semiconductor memory |
US7808831B2 (en) * | 2008-06-30 | 2010-10-05 | Sandisk Corporation | Read disturb mitigation in non-volatile memory |
KR101635504B1 (en) | 2009-06-19 | 2016-07-04 | 삼성전자주식회사 | Program method of non-volatile memory device with three-dimentional vertical channel structure |
US20110041005A1 (en) | 2009-08-11 | 2011-02-17 | Selinger Robert D | Controller and Method for Providing Read Status and Spare Block Management Information in a Flash Memory System |
KR20120059506A (en) | 2009-08-25 | 2012-06-08 | 샌디스크 아이엘 엘티디 | Restoring data into a flash storage device |
US8248850B2 (en) * | 2010-01-28 | 2012-08-21 | Sandisk Technologies Inc. | Data recovery for non-volatile memory based on count of data state-specific fails |
US8452937B2 (en) * | 2010-05-14 | 2013-05-28 | Sandisk Il Ltd. | Moving executable code from a first region of a non-volatile memory to a second region of the non-volatile memory to reduce read disturb |
US8659944B2 (en) | 2010-09-01 | 2014-02-25 | Macronix International Co., Ltd. | Memory architecture of 3D array with diode in memory string |
KR20130065271A (en) * | 2011-12-09 | 2013-06-19 | 에스케이하이닉스 주식회사 | Nonvolatile memory device |
KR102089532B1 (en) * | 2013-02-06 | 2020-03-16 | 삼성전자주식회사 | Memory controller, memory system and operating method of memory controller |
KR102050896B1 (en) * | 2013-02-19 | 2019-12-02 | 삼성전자주식회사 | Memory controller and operating method of the same |
KR102105894B1 (en) * | 2013-05-30 | 2020-05-06 | 삼성전자주식회사 | Volatile memory device and sense amplifief control method thereof |
US9230689B2 (en) * | 2014-03-17 | 2016-01-05 | Sandisk Technologies Inc. | Finding read disturbs on non-volatile memories |
-
2014
- 2014-03-17 US US14/215,924 patent/US9230689B2/en active Active
-
2015
- 2015-03-03 WO PCT/US2015/018527 patent/WO2015142513A1/en active Application Filing
- 2015-03-03 KR KR1020167017243A patent/KR102042889B1/en active IP Right Grant
- 2015-03-03 CN CN201580003538.0A patent/CN105874541B/en active Active
Patent Citations (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5095344A (en) | 1988-06-08 | 1992-03-10 | Eliyahou Harari | Highly compact eprom and flash eeprom devices |
US5070032A (en) | 1989-03-15 | 1991-12-03 | Sundisk Corporation | Method of making dense flash eeprom semiconductor memory structures |
US5343063A (en) | 1990-12-18 | 1994-08-30 | Sundisk Corporation | Dense vertical programmable read only memory cell structure and processes for making them |
US7353325B2 (en) | 1991-09-13 | 2008-04-01 | Sandisk Corporation | Wear leveling techniques for flash EEPROM systems |
US5313421A (en) | 1992-01-14 | 1994-05-17 | Sundisk Corporation | EEPROM with split gate source side injection |
US6222762B1 (en) | 1992-01-14 | 2001-04-24 | Sandisk Corporation | Multi-state memory |
US7616484B2 (en) | 1992-05-20 | 2009-11-10 | Sandisk Corporation | Soft errors handling in EEPROM devices |
US5315541A (en) | 1992-07-24 | 1994-05-24 | Sundisk Corporation | Segmented column memory array |
US5570315A (en) | 1993-09-21 | 1996-10-29 | Kabushiki Kaisha Toshiba | Multi-state EEPROM having write-verify control circuit |
US5595924A (en) | 1994-05-25 | 1997-01-21 | Sandisk Corporation | Technique of forming over an irregular surface a polysilicon layer with a smooth surface |
US5661053A (en) | 1994-05-25 | 1997-08-26 | Sandisk Corporation | Method of making dense flash EEPROM cell array and peripheral supporting circuits formed in deposited field oxide with the use of spacers |
US5903495A (en) | 1996-03-18 | 1999-05-11 | Kabushiki Kaisha Toshiba | Semiconductor device and memory system |
US6046935A (en) | 1996-03-18 | 2000-04-04 | Kabushiki Kaisha Toshiba | Semiconductor device and memory system |
US5768192A (en) | 1996-07-23 | 1998-06-16 | Saifun Semiconductors, Ltd. | Non-volatile semiconductor memory cell utilizing asymmetrical charge trapping |
US6011725A (en) | 1997-08-01 | 2000-01-04 | Saifun Semiconductors, Ltd. | Two bit non-volatile electrically erasable and programmable semiconductor memory cell utilizing asymmetrical charge trapping |
US6717851B2 (en) | 2000-10-31 | 2004-04-06 | Sandisk Corporation | Method of reducing disturbs in non-volatile memory |
US6870768B2 (en) | 2002-09-06 | 2005-03-22 | Sandisk Corporation | Techniques for reducing effects of coupling between storage elements of adjacent rows of memory cells |
US7120729B2 (en) | 2002-10-28 | 2006-10-10 | Sandisk Corporation | Automated wear leveling in non-volatile storage systems |
US6657891B1 (en) | 2002-11-29 | 2003-12-02 | Kabushiki Kaisha Toshiba | Semiconductor memory device for storing multivalued data |
US6901498B2 (en) | 2002-12-09 | 2005-05-31 | Sandisk Corporation | Zone boundary adjustment for defects in non-volatile memories |
US7012835B2 (en) | 2003-10-03 | 2006-03-14 | Sandisk Corporation | Flash memory data correction and scrub techniques |
US7441067B2 (en) | 2004-11-15 | 2008-10-21 | Sandisk Corporation | Cyclic flash memory wear leveling |
US7477547B2 (en) | 2007-03-28 | 2009-01-13 | Sandisk Corporation | Flash memory refresh techniques triggered by controlled scrub data reads |
US20090034328A1 (en) * | 2007-08-03 | 2009-02-05 | Bong-Gwan Seol | Memory system protected from errors due to read disturbance and reading method thereof |
US20090172258A1 (en) | 2007-12-27 | 2009-07-02 | Pliant Technology, Inc | Flash memory controller garbage collection operations performed independently in multiple flash memory groups |
US7986554B2 (en) | 2008-03-19 | 2011-07-26 | Sandisk Technologies Inc. | Different combinations of wordline order and look-ahead read to improve non-volatile memory performance |
US20100174845A1 (en) | 2009-01-05 | 2010-07-08 | Sergey Anatolievich Gorobets | Wear Leveling for Non-Volatile Memories: Maintenance of Experience Count and Passive Techniques |
US20100217919A1 (en) * | 2009-02-24 | 2010-08-26 | Kabushiki Kaisha Toshiba | Memory controller, semiconductor memory device and control method thereof |
US20100229055A1 (en) * | 2009-03-05 | 2010-09-09 | Nilanjan Mukherjee | Fault Diagnosis For Non-Volatile Memories |
US7818525B1 (en) * | 2009-08-12 | 2010-10-19 | Texas Memory Systems, Inc. | Efficient reduction of read disturb errors in NAND FLASH memory |
US8634240B2 (en) | 2009-10-28 | 2014-01-21 | SanDisk Technologies, Inc. | Non-volatile memory and method with accelerated post-write read to manage errors |
US20130028021A1 (en) | 2011-07-28 | 2013-01-31 | Eran Sharon | Simultaneous Sensing of Multiple Wordlines and Detection of NAND Failures |
US20130128666A1 (en) * | 2011-11-21 | 2013-05-23 | Chris Avila | Scrub Techniques for Use with Dynamic Read |
Non-Patent Citations (1)
Title |
---|
EITAN ET AL.: "NROM: A Novel Localized Trapping, 2-Bit Nonvolatile Memory Cell", IEEE ELECTRON DEVICE LETTERS, vol. 21, no. 11, November 2000 (2000-11-01), pages 543 - 545 |
Also Published As
Publication number | Publication date |
---|---|
US20150262714A1 (en) | 2015-09-17 |
CN105874541B (en) | 2020-02-07 |
KR20160132814A (en) | 2016-11-21 |
KR102042889B1 (en) | 2019-11-08 |
CN105874541A (en) | 2016-08-17 |
US9230689B2 (en) | 2016-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9230689B2 (en) | Finding read disturbs on non-volatile memories | |
US9361991B1 (en) | Efficient scanning of nonvolatile memory blocks | |
US8472280B2 (en) | Alternate page by page programming scheme | |
US8886877B1 (en) | In-situ block folding for nonvolatile memory | |
EP2374134B1 (en) | Spare block management in non-volatile memories | |
US8593866B2 (en) | Systems and methods for operating multi-bank nonvolatile memory | |
US9483339B2 (en) | Systems and methods for fast bit error rate estimation | |
US8543757B2 (en) | Techniques of maintaining logical to physical mapping information in non-volatile memory systems | |
US9633738B1 (en) | Accelerated physical secure erase | |
US9411669B2 (en) | Selective sampling of data stored in nonvolatile memory | |
US9804785B2 (en) | Nonvolatile memory adaptive to host boot up routine | |
US10055267B2 (en) | Block management scheme to handle cluster failures in non-volatile memory | |
US9817593B1 (en) | Block management in non-volatile memory system with non-blocking control sync system | |
US8918577B1 (en) | Three dimensional nonvolatile memory with variable block capacity | |
US9384845B2 (en) | Partial erase of nonvolatile memory blocks | |
EP2443543B1 (en) | Multi-bank non-volatile memory system with satellite file system | |
US8995183B2 (en) | Data retention in nonvolatile memory with multiple data storage formats | |
US8732391B2 (en) | Obsolete block management for data retention in nonvolatile memory | |
US9141291B2 (en) | Adaptive context disbursement for improved performance in non-volatile memory systems | |
WO2016057158A1 (en) | Nonvolatile memory and method with state encoding and page-by-page programming yielding invariant read points |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15709080 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20167017243 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15709080 Country of ref document: EP Kind code of ref document: A1 |