This U.S. non-provisional application claims priority under 35 USC § 119 to Korean Patent Application No. 10-2023-0042148, filed on Mar. 30, 2023, in the Korean Intellectual Property Office (KIPO), the disclosure of which is incorporated by reference herein in its entirety.
Semiconductor memory devices for storing data may be classified into volatile memory devices and nonvolatile memory devices. Volatile memory devices, such as dynamic random access memory (DRAM) devices, are typically configured to store data by charging or discharging capacitors in memory cells, and lose the stored data when power is off. Nonvolatile memory devices, such as flash memory devices, may maintain stored data even though power is off. Volatile memory devices are widely used as main memories of various apparatuses, while nonvolatile memory devices are widely used for storing program codes and/or data in various electronic devices, such as computers, mobile devices, etc.
Recently, nonvolatile memory devices including three-dimensional structures such as vertical NAND memory devices have been developed to increase the degree of device integration and memory capacity of the nonvolatile memory devices. Along with increases in the integration degree and memory capacity, the unit capacity of the erase operation in the nonvolatile memory device increases. A threshold voltage of erased cells connected to a wordline may increase due to disturbance according to a program operation and a read operation of another wordline belonging to the same memory block. An increase in the threshold voltage of these erased cells degrades the reliability of the nonvolatile memory device.
Various implementations of the present disclosure are directed to nonvolatile memory devices and methods of controlling a nonvolatile memory device that can efficiently enhance reliability of the nonvolatile memory devices.
According to some implementations, a memory block is divided into a plurality of sub blocks including a first sub block and a second sub block that are disposed in a vertical direction where the memory block includes a plurality of cell strings and each cell string includes a plurality of memory cells that are disposed in the vertical direction. A method of controlling a nonvolatile memory device includes a normal erase operation that is performed independently with respect to each of the plurality of sub blocks of the memory block. A disturbance verification read operation with respect to the first sub block is performed to determine whether a threshold voltage of memory cells connected to a wordline in an erased state of the first sub block is increased higher than a reference level by a program operation and a read operation with respect to the second sub block. A post erase operation is selectively performed based on a result of the disturbance verification read operation to decrease the threshold voltage of memory cells in the erased state of the first sub block.
According to some implementations, a nonvolatile memory device includes a memory cell array and a controller. The memory cell array includes a memory block divided into a plurality of sub blocks including a first sub block and a second sub block that are disposed in a vertical direction where the memory block includes a plurality of cell strings and each cell string includes a plurality of memory cells that are disposed in the vertical direction. The control circuit performs a normal erase operation independently with respect to each of the plurality of sub blocks, performs a disturbance verification read operation with respect to the first sub block to determine whether a threshold voltage of memory cells connected to a wordline in an erased state of the first sub block is increased higher than a reference level by a program operation and a read operation with respect to the second sub block, and selectively performs a post erase operation based on a result of the disturbance verification read operation to decrease the threshold voltage of memory cells in the erased state of the first
According to some implementations, a nonvolatile memory device includes a plurality of first bonding metal patterns disposed in a cell region, a plurality of second bonding metal patterns disposed in a peripheral region disposed under the cell region, wherein the peripheral region is vertically coupled to the cell region by the plurality of first bonding metal patterns and the plurality of second bonding metal patterns, a memory cell array and a control circuit. The memory cell array is disposed in the cell region and includes a memory block. The memory block is divided into a plurality of sub blocks including a first sub block and a second sub block that are disposed in a vertical direction where the memory block includes a plurality of cell strings and each cell string includes a plurality of memory cells that are disposed in the vertical direction. The control circuit is disposed in the peripheral region. The control circuit performs a normal erase operation independently with respect to each of the plurality of sub blocks, performs a disturbance verification read operation with respect to the first sub block to determine whether a threshold voltage of memory cells connected to a wordline in an erased state of the first sub block is increased higher than a reference level by a program operation and a read operation with respect to the second sub block, and selectively performs a post erase operation based on a result of the disturbance verification read operation to decrease the threshold voltage of memory cells in the erased state of the first sub block.
The nonvolatile memory devices and the methods of controlling the nonvolatile memory device according to some implementations may reduce unnecessary erasure of memory cells and increase the lifespan of the nonvolatile memory device by grouping the memory block into the sub blocks to manage the erase operation.
The nonvolatile memory devices and the methods of controlling the nonvolatile memory device according to some implementations may secure the reliability of the nonvolatile memory device and enhance the performance of the nonvolatile memory device by reducing the disturbance caused in the victim sub block by the aggressor sub block through the post erase operation.
Example implementations of the present disclosure will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings.
Various example implementations will be described more fully hereinafter with reference to the accompanying drawings, in which some example implementations are shown. In the drawings, like numerals refer to like elements throughout. The repeated descriptions may be omitted.
Referring to
The host device 1100 may be or include a data processing device such as a central processing unit (CPU), a microprocessor, an application processor (AP), or the like. The storage device 1200 may be embedded with the host device 1100 in an electronic device, or the storage device 1200 may be detachable to an electronic device including the host device 1100.
The host device 1100 may transfer a data operation request (which may be referred to herein as a request) REQ and associated logical addresses LADD to the storage controller 100 to communicate data DTA with the storage controller 100. The storage controller 100 may transfer a response RSND with respect to the request REQ to the host device 1100. The request REQ may include a read request, a program request, and/or an erase request, respectively associated with one or more read operations, program operations, and/or erase operations. The program request may be referred to as a write request.
The storage controller 100 may control the nonvolatile memory device 400 based on the request REQ. The storage controller 100 may provide physical addresses ADDR, commands CMD, and control signals CTRL to perform the read operations, the program operations, and/or the erase operations. The program operation may be referred to as a write operation. For example, the storage controller 100 may convert the logical addresses LADD from the host device 1100 to the physical addresses PADD by performing flash translation layer (FTL) operations.
The storage controller 100 may control the nonvolatile memory device 400 to read data DTA stored in the nonvolatile memory device 400 in response to the read request received from the host device 1100. The storage controller 100 may control the nonvolatile memory device 400 to write or program data DTA in the nonvolatile memory device 400 in response to the write or program request received from the host device 1100. The storage controller 100 may control the nonvolatile memory device 400 to erase data stored in the nonvolatile memory device 400 in response to the erase request received from the host device 1100. The nonvolatile memory device 400 may transfer a response RSND to the storage controller 100 in response to the command CMD.
The nonvolatile memory device 400 may be implemented with nonvolatile memory such as flash memory, MRAM (Magnetic RAM), FeRAM (Ferroelectric RAM), PRAM (Phase change RAM), ReRAM (Resistive RAM), or the like. The nonvolatile memory device 400 may be connected to the storage controller 100 through a plurality of channels. Hereinafter, some example implementations will be described based on NAND flash memory, but implementations are not limited to any particular kind of nonvolatile memory.
Referring to
The nonvolatile memory device 400 may perform a normal erase operation independently with respect to each of the plurality of sub blocks (S200). The independent erase operation by units of sub blocks will be described below with reference to
Under control of the post erase controller, the nonvolatile memory device 300 may perform a disturbance verification read operation with respect to the first sub block to determine whether a threshold voltage of memory cells connected to a wordline in an erased state of the first sub block is increased higher than a reference level by a program operation and a read operation with respect to the second sub block (S300). The first sub block may be referred to as a victim sub block and the second sub block may be referred to as an aggressor sub block. The disturbance verification read operation and the reference level will be described below with reference to
Under control of the post erase controller, the nonvolatile memory device 300 may selectively perform a post erase operation based on a result of the disturbance verification read operation to decrease the threshold voltage of memory cells in the erased state of the first sub block (S400). Example implementations of the selective post erase operation will be described below with reference to
In
Referring to
The threshold voltage of the deeply-disturbed memory cells DDC may be reduced to be lower than the post erase verification voltage VVEP by performing the post erase operation PEO. As a result, as shown in
After that, a data program operation DPO may be performed such that each memory cell corresponds to one state depending on the write data among the first through eighth states S1˜S8. Here, the first state S1 corresponds to an unprogrammed erased state. During the data program operation DPO, the program execution results for the first through eighth states S1˜S8 may be determined by sequentially applying the first through seventh data verification read voltages VVR1˜VVR7 to the selected wordline. Also, during the read operation, each bit of the first through eighth states S1˜S8 may be determined by sequentially applying some of the normal read voltages VR1˜VR7 to the selected wordline.
Referring to
In this case, the first bit LSB may be determined using the first read voltage VR1 and the fifth read voltage VR5, the second bit CSB may be determined using the second read voltage VR2, the fourth read voltage VR4 and the sixth read voltage VR6, and the third bit MSB may be determined using the third read voltage VR3 and the seventh read voltage VR7.
In the deeply-disturbed state, holes are reduced in the charge storage layer of the memory cell in the erased state, and the read margin or the read window RW may be narrowed due to the over-disturbance. As the read window RW becomes narrower, errors in discriminating between the erased first state S1 and the programmed second state S2 increase and performance of the nonvolatile memory device deteriorates.
In a nonvolatile memory device such as a conventional vertical NAND (VNAND) flash memory device, since erasing is possible only by units of memory blocks, disturbance by arbitrary read, program, and erase operations after erasure may be controlled. In the erase method by units of memory blocks, only program disturbance as many as the number of wordlines by the program operation has been allowed after erase operation is performed, and the operations of the nonvolatile memory device may be managed by predicting the allowable disturbance in advance.
However, when the erase operation is permitted by units of sub blocks, disturbances that are difficult to predict are accumulated in the victim sub blocks due to the operation of the aggressor sub blocks while the victim sub blocks are in the erased state. If data is written to the victim sub block without checking any disturbance by the aggressor sub block, the reliability of the nonvolatile memory device may deteriorate.
The nonvolatile memory device and the method of controlling the nonvolatile memory device according to some implementations may reduce unnecessary erasure of memory cells and increase the lifespan of the nonvolatile memory device by grouping the memory block into the sub blocks to manage the erase operation. In addition, the reliability of the nonvolatile memory device may be secured and the performance of the nonvolatile memory device may be enhanced by reducing the disturbance caused in the victim sub block by the aggressor sub block through the post erase operation.
Referring to
The processor 110 may control an operation of the storage controller 100 in response to commands received via the host interface 120 from a host device (e.g., the host device 1100 in
The buffer memory 140 may store instructions and data executed and processed by the processor 110. For example, the buffer memory 140 may be implemented with a volatile memory, such as a DRAM, a SRAM, a cache memory, or the like.
The ECC engine 170 for error correction may perform coded modulation using a Bose-Chaudhuri-Hocquenghem (BCH) code, a low density parity check (LDPC) code, a turbo code, a Reed-Solomon code, a convolution code, a recursive systematic code (RSC), a trellis-coded modulation (TCM), a block coded modulation (BCM), or the like. In some example implementations, the ECC engine 170 may perform ECC encoding and ECC decoding using above-described codes or other error correction codes.
The host interface 120 may provide physical connections between the host device 1100 and the storage device 1200. The host interface 120 may provide an interface that corresponds to a bus format of the host device 1100 for communication between the host device 1100 and the storage device 1200. In some example implementations, the bus format of the host device 1100 may be a small computer system interface (SCSI) or a serial attached SCSI (SAS) interface. In other example implementations, the bus format of the host device may be a USB, a peripheral component interconnect (PCI) express (PCIe), an advanced technology attachment (ATA), a parallel ATA (PATA), a SATA, a nonvolatile memory (NVM) express (NVMe), or other format.
The memory interface 150 may exchange data with a nonvolatile memory device (e.g., the nonvolatile memory device 400 in
The AES engine 180 may perform at least one of an encryption operation and a decryption operation on data input to the storage controller 100 using a symmetric-key algorithm. The AES engine 180 may include an encryption module and a decryption module. For example, the encryption module and the decryption module may be implemented as separate modules. In another example, one module capable of performing both encryption and decryption operations may be implemented in the AES engine 180.
The post erase controller 130 may control the nonvolatile memory device to perform the disturbance verification read operation and the post erase operation as described above.
Referring to
The memory cell array 900 may be coupled to the address decoder 830 through string selection lines SSL, wordlines WL, and ground selection lines GSL. The memory cell array 900 may be coupled to the page buffer circuit 810 through bitlines BL. The memory cell array 900 may include memory cells coupled to the wordlines WL and the bitlines BL. In some example implementations, the memory cell array 900 may be a three-dimensional memory cell array, which may be formed on a substrate in a three-dimensional structure (or a vertical structure). In this case, the memory cell array 900 may include cell strings (e.g., NAND strings) that are vertically oriented such that at least one memory cell is located over another memory cell.
The control circuit 850 may receive a command signal CMD and an address signal PADD from a memory controller, and may control erase, program, and read operations of the nonvolatile memory device 800 in response to (or based on) at least one of the command signal CMD and the address signal PADD. The erase operation may include performing a sequence of erase loops, and the program operation may include performing a sequence of program loops. Each program loop may include a program operation and a program verification operation. Each erase loop may include an erase operation and an erase verification operation. The read operation may include a normal read operation and data recover read operation.
In some example implementations, the control circuit 850 generates a control signals CTL used to control the operation of the voltage generator 860, and may generate a page buffer control signal PBC for controlling the page buffer circuit 810, based on the command signal CMD, and may generate a row address R_ADDR and a column address C_ADDR based on the address signal PADD. The control circuit 850 may provide the row address R_ADDR to the address decoder 530, and may provide the column address C_ADDR to the data I/O circuit 520.
The address decoder 830 may be coupled to the memory cell array 900 through the string selection lines SSL, the wordlines WL, and the ground selection lines GSL.
Hereinafter, an erase operation may be understood to include both of the normal erase operation NEO and the post erase operation PEO as described above.
During the program operation or the read operation, the address decoder 530 may determine (or select) one of the wordlines WL as a selected wordline, and may determine or designate the remaining wordlines WL other than the selected wordline as unselected wordlines based on the row address R_ADDR.
In addition, during the program operation or the read operation, the address decoder 830 may determine one of the string selection lines SSL as a selected string selection line and determine or designate the remaining the string selection lines SSL other than the selected string selection line as unselected string selection lines based on the row address R_ADDR. The aforementioned selected memory cells correspond to the memory cells connected to the selected wordline and the selected string selection line.
The voltage generator 860 may generate wordline voltages VWL, which are used for the operation of the memory cell array 900 of the nonvolatile memory device 800, based on the control signals CTL. The voltage generator 860 may receive the power PWR from the memory controller. The wordline voltages VWL may be applied to the wordlines WL through the address decoder 830.
In some example implementations, during the erase operation, the voltage generator 860 applies an erase voltage to a well and/or a common source line of a memory block, and may apply an erase permission voltage (e.g., a ground voltage) to all of the wordlines of the memory block or a portion of the wordlines based on an erase address. During the erase verification operation, the voltage generator 860 may apply an erase verification voltage simultaneously to all of the wordlines of the memory block or sequentially (e.g., one by one) to the wordlines.
In some example implementations, during the program operation, the voltage generator 860 applies a program voltage to the selected wordline, and may apply a program pass voltage to the unselected wordlines. During the program verification operation, the voltage generator 860 may apply a program verification voltage to the first wordline, and may apply a verification pass voltage to the unselected wordlines.
During the normal read operation, the voltage generator 860 may apply a read voltage to the selected wordline, and may apply a read pass voltage to the unselected wordlines. During the data recover read operation, the voltage generator 860 may apply the read voltage to a wordline adjacent to the selected wordline, and may apply a recover read voltage to the selected wordline.
The page buffer circuit 810 may be coupled to the memory cell array 900 through the bitlines BL. The page buffer circuit 810 may include multiple buffers. In some example implementations, each buffer is connected to only a single bitline. In some example implementations, each buffer is connected to two or more bitlines. The page buffer circuit 810 may temporarily store data to be programmed in a selected page or data read out from the selected page of the memory cell array 900.
The data I/O circuit 820 may be coupled to the page buffer circuit 810 through data lines DL. During the program operation, the data I/O circuit 820 may receive program data DATA received from the memory controller and provide the program data DATA to the page buffer circuit 810 based on the column address C_ADDR received from the control circuit 850. During the read operation, the data I/O circuit 820 may provide read data DATA, read from the memory cell array 900 and stored in the page buffer circuit 810, to the memory controller based on the column address C_ADDR received from the control circuit 850.
The page buffer circuit 810 and the data I/O circuit 820 may read data from a first area of the memory cell array 900, and may write this read data to a second area of the memory cell array 900 (e.g., without transmitting the data to a source external to the nonvolatile memory device 800, such as to the memory controller). Thus, the page buffer circuit 810 and the data I/O circuit 820 may perform a copy-back operation.
Referring to
A memory block BLKi (i being an integer from 1 to z) of
Referring to
Each string selection transistor SST may be connected to a corresponding string selection line (one of SSL1 to SSL3). The memory cells MC1 to MC8 may be connected to corresponding gate lines GTL1 to GTL8, respectively. The gate lines GTL1 to GTL8 may be wordlines, and some of the gate lines GTL1 to GTL8 may be dummy wordlines. Each ground selection transistor GST may be connected to a corresponding ground selection line (one of GSL1 to GSL3). Each string selection transistor SST may be connected to a corresponding bitline (e.g., one of BL1, BL2, and BL3), and each ground selection transistor GST may be connected to the common source line CSL.
Wordlines (e.g., WL1) having the same or similar height may be commonly connected, and the ground selection lines GSL1 to GSL3 and the string selection lines SSL1 to SSL3 may be separated. In
For convenience of description, NAND strings NS11 and NS21 connected to a first bitline BL1 and NAND strings NS12 and NS22 connected to a second bitline BL2 are illustrated in
During an erase operation, an erase voltage VERS may be applied to the first bitline BL1 and the second bitline BL2. In this case, the power supply voltage Vcc, for example, is applied to the first string selection line SSL1 and the second string selection line SSL2. Also, during the erase operation, the erase voltage VERS may be applied to the common source line CSL. In this case, the power supply voltage Vcc may be applied to the first ground selection line GSL1 and the second ground selection line GSL2. The erase enable voltage VERSWL may be applied to the wordlines WL4, WL5 and WL6.
Under this erase bias condition, voltages of the drain and source of the memory cells of the memory block may be, for example, 20V, and a voltage of, for example, 0V may be applied to the gate. The voltage generator 860 of
For convenience of description, NAND strings NS11 and NS21 connected to a first bitline BL1 and NAND strings NS12 and NS22 connected to a second bitline BL2 are illustrated in
The first bitline BL1 and the second bitline BL2 may be precharged with a precharge voltage (e.g., 0.5 V). During a read operation, if NAND strings NS21 and NS22 are selected, a voltage of 0 V may be applied to the first string selection line SSL1 and a power supply voltage Vcc may be applied to the second string selection line SSL2. Furthermore, the voltage of 0 V may be applied to a first ground selection line GSL1 and the power supply voltage Vcc may be applied to a second ground selection line GSL2. A read voltage VR may be applied to a selected wordline (e.g., WL5) and a read pass voltage VPS may be applied to unselected wordlines (e.g., WL4 and WL6).
In this exemplary read bias condition, the drain voltage of selected memory cells A and B may be, for example, 0.5 V and the source voltage of selected memory cells A and B may be, for example, 0 V. In addition, the read voltage VR is applied to gates of the selected memory cells A and B. Furthermore, a read operation for verifying data stored at a memory cell may be performed while changing a voltage level of the read voltage VR. Channels of unselected NAND strings NS11 and NS12 including memory cells C and D are floated. The voltage generator 860 of
For convenience of description, NAND strings NS11 and NS21 connected to a first bitline BL1 and NAND strings NS12 and NS22 connected to a second bitline BL2 are illustrated in
The first bitline BL1 may be a program bitline to which a program permission voltage (e.g., 0 V) is applied, and the second bitline BL2 may be a program inhibition bitline to which a program inhibition voltage such as a power supply voltage Vcc is applied. If the NAND string NS21 among the NAND strings NS11 and NS21 is selected, during a program operation, a voltage of 0 V may be applied to a first string selection line SSL1, and the power supply voltage Vcc may be applied to a second string selection line SSL2.
The voltage of 0 V may be applied to ground selection lines GSL1 and GSL2. Furthermore, a voltage (e.g., Vcc) higher than 0 V may be applied to a common source line CSL. A program voltage Vpgm (e.g., 18 V) may be applied to a selected wordline (e.g., WL5) and a pass voltage Vpass (e.g., 8 V) may be applied to unselected wordlines (e.g., WL4 and WL6).
Under the program bias condition, the program voltage Vpgm of 18V may be applied to a gate of a memory cell A having a channel voltage of 0 V. Since a strong electric field is formed between the gate and a channel of the memory cell A, the memory cell A may be programmed. However, since respective channels of memory cells C and D are in a floating state, channel voltages thereof may be boosted up to, for example, about 8 V, and thus, the memory cells C and D may not be programmed. The memory cell B may not be programmed because a weak electric field is formed between the gate of the memory cell B and the channel. The voltage generator 860 of
A threshold voltage distribution to be formed by the post erase operation PEO may be set slightly higher than a threshold voltage distribution to be formed by the normal erase operation NEO. In other words, as shown in
To prevent over-erasing by the post erase operation PEO, as shown in
In this way, operating conditions such as the erase voltage and the erase verification read voltage may be set differently for the post erase operation PEO and the normal erase operation NEO. In addition to the voltage, a voltage application time, an allowable number of error bits for an erase pass condition, and the number of erase loops may be set differently for the erase operation PEO and the normal erase operation NEO.
Referring to
Each erase loop LOOP (i) (i is a natural number) may include an erase period ERASE and an erase verification period VERIFY. In order to erase the memory cells during the erase period ERASE, the erase voltages VERS1, VERS2, VERS3, . . . may be applied to channels and an erase permission voltage may be applied to wordlines. Thereafter, the erase verification voltage VVE may be applied to the wordline during the erase verify period VERIFY in order to verify whether the erase is successful.
The erase operation and the erase verification operation may be repeatedly performed while increasing the erase voltages VERS1, VERS2, VERS3, . . . until a pass condition is satisfied. Here, the pass condition represents the maximum allowable number of memory cells whose threshold voltage is higher than the erase verification voltage VVE among the selected memory cells to be erased. The erase loop may be repeated until the number of unerased memory cells becomes smaller than the maximum allowable number. The maximum allowable number may be determined according to the ECC level of the nonvolatile memory device.
Referring to
As shown in
Referring to
A bad sub block BSB may indicate a sub block that is unusable due to a defect. The free sub block FSB may indicate a sub block on which a program operation has not yet been performed after a normal erase operation NEO has been performed. The deeply-disturbed sub block DSB corresponds to the free sub block FSB that is determined by the above-described disturbance verification read operation DVRO that the threshold voltage of the memory cells connected to the wordline in the erased state is increased higher than the reference level. The closed sub block CSB may indicate a sub block from which further program operations are inhibited. The open sub block OSB may indicate a sub block capable of program operation.
In
In some implementations, the deeply-disturbed sub block DSB is converted into the free sub block FSB by performing the post erase operation PEO with respect to the deeply-disturbed sub block DSB. According to some implementations, the post erase operation PEO is performed as a background operation or may be performed as a foreground operation. The background operation represents an operation performed in an idle state of the nonvolatile memory device, and the foreground operation represents an operation performed in an active mode of the nonvolatile memory device. The background operation may be suspended or delayed by a request for another operation from the host, and the foreground operation may be performed prior to a request for another operation from the host.
In some implementations, the open sub block OSB is converted into a closed sub block DSB by performing a block close BCL with respect to the open sub block OSB. The block close BCL indicates prohibiting further programming for the corresponding sub block.
Referring to
The write data WDT is transmitted from the host device 1100 to the storage device 1200 (S12), and the storage controller 100 may control the nonvolatile memory device 400 to perform a data program operation DPO (S30) of writing the write data WDT into the selected memory cells corresponding to the physical address PADD.
Meanwhile, when the first sub block SB1 corresponding to the physical address PADD is determined, the post erase controller 130 performs the disturbance verification read operation DVRO with respect to the first sub block SB1 (S13) to determine whether the threshold voltage of the memory cells connected to the wordline in the erased state of the first sub block SB1 is increased higher than the reference level, that is, whether the first sub block SB1 is deeply disturbed. The disturbance verification read operation DVRO may be performed before performing the data program operation DPO with respect to the first sub block SB1.
When the first sub block SB1 is not deeply-disturbed (S14: NO), the storage controller 100 transmits the physical address PADD corresponding to the first sub block SB1 to the nonvolatile memory device 400 and then the nonvolatile memory device 400 may perform the data program operation DPO to store the write data WDT in the physical address PADD of the first sub block SB1. In other words, when the result of the disturbance verification read operation DVRO indicates that the threshold voltage of the memory cells connected to the wordline in the erased state of the first sub block SB1 is not increased higher than the reference level, the post erase operation PEO with respect to the first sub block SB1 may be omitted and the program operation with respect to the first sub block SB1 may be performed.
When the first sub block SB1 is deeply-disturbed (S14: YES), that is, when the result of the disturbance verification read operation DVRO indicates that the threshold voltage of the memory cells connected to the wordline in the erased state of the first sub block SB1 is increased higher than the reference level, the post erase controller 130 may determine whether there exists an available (or usable) free sub block FSB in the erased state by referring to the block information IBK of
When there exists an available free sub block FSB (S15: YES), the storage controller 100 performs an FTL operation to convert the logical address LADD to the physical address PADD corresponding to the available free sub block FSB (S19). The storage controller 100 transmits the physical address PADD corresponding to the free sub block FSB to the nonvolatile memory device 400, and the nonvolatile memory device 400 may perform the data program operation DPO (S30) to store the write data WDT in the memory cells corresponding to the physical address PADD of the free sub block FSB. In other words, when there exists an available free sub block FSB (S15: YES), the program operation with respect to the first sub block SB1 may be replaced with the program operation with respect to the available free sub block FSB. Meanwhile, the post erase controller 130 may set the first sub block SB1 as the deeply-disturbed sub block DSB or the closed sub block CSB S20 to inhibit programming of the first sub block SB1. When the first sub block SB1 corresponds to the deeply-disturbed sub block DSB in which all wordlines are in the erased state, the storage controller 100 may perform the post erase operation PEO with respect to the first sub block SB1 as the background operation. After the post erase operation PEO with respect to the first sub block SB1 is completed, the first sub block SB1 may be set as a free sub block FSB. When there is no available free sub block (S15: NO), the post erase controller 130 determines whether all wordlines of the first sub block SB1 are in the erased state, that is, whether there is no wordline PWL corresponding to the program state (S16).
When all wordlines of the first sub-block SB1 are in the erased state (S16: YES), the storage controller 400 may control the nonvolatile memory device 400 to perform the post erase operation PEO with respect to the first sub block SB1. Then, the storage controller 100 transfers the physical address PADD corresponding to the first sub block SB1 to the nonvolatile memory device 400, and the nonvolatile memory device 400 may perform the data program operation DPO (S30) to store the write data WDT in the physical address PADD corresponding to the first sub block SB1. In other words, when there is no available free sub block FSB (S15: NO) and all wordlines of the first sub block SB1 are in the erased state (S16: YES), the nonvolatile memory device 400 may perform the program operation with respect to the first sub block SB1 after performing the post erase operation PEO with respect to the first sub block SB1.
Meanwhile, when at least one wordline of the first sub block SB1 is in a programmed state (S16: NO), the storage controller 100 may control the nonvolatile memory device 400 to perform a garbage collection operation GCO (S21) and secure (or generate) usable free sub blocks FSB. Then, the storage controller 100 transfers the physical address PADD corresponding to the free sub block FSB to the nonvolatile memory device 400, and the nonvolatile memory device 400 may perform the data program operation DPO (S30) to store the write data WDT in the physical address PADD corresponding to the free sub block FSB. In other words, when there is no available free sub block FSB (S15: NO) and at least one wordline of the first sub block SB1 is in the programmed state (S16: NO), the nonvolatile memory device 400 may secure the available free sub block FSB by performing the garbage collection operation GCO, and the program operation with respect to the first sub block SB1 may be replaced with the program operation with respect to the available free sub block FSB.
Referring to
As shown in
The transmission of the write data WDT takes a relatively long time, and by appropriately setting the maximum number(s) of the erase loops PLOOP (1) to PLOOP(s) of the post erase operation PEO, the post erase operation PEO may be performed while receiving the WDT. Accordingly, the start point Tp of the data program operation DPO may be determined regardless of whether the post erase operation PEO is performed or omitted.
As a result, the reliability of the nonvolatile memory device may be efficiently improved without degrading the performance of the nonvolatile memory device by performing the disturbance verification read operation DVRO and the post erase operation PEO during the transmission of write data and the status-bit mapping.
Referring to
When the first sub block SB1 does not include the wordline EWL corresponding to the erased state (S51: NO), the nonvolatile memory device 400 may inhibit the post erase operation PEO with respect to the first sub block SB1 and perform the normal erase operation NEO with respect to the second sub block SB2 (S52).
When the first sub block SB1 includes the wordline EWL corresponding to the erased state (S51: YES), the post erase controller 130 may perform the disturbance verification read operation DVRO with respect to the first sub block SB1 (S53) to determine whether the threshold voltage of the memory cells connected to the wordline in the erased state of the first sub block SB1 is increased higher than the reference level, that is, whether the first sub block SB1 is deeply disturbed. The disturbance verification read operation DVRO may be performed before performing the normal erase operation (NEO) with respect to the second sub block SB2.
When the first sub block SB1 is not deeply disturbed (S54: NO), that is, when the result of the disturbance verify read operation DVRO indicates that the threshold voltage of the memory cells connected to the wordline in the erased state of the first sub block SB1 is not increased higher than the reference level, the nonvolatile memory device 400 may inhibit the post erase operation PEO with respect to the first sub block SB1 and perform the normal erase operation NEO with respect to the second sub block SB2 (S52).
When the first sub block SB1 is deeply disturbed (S54: YES), the post erase controller 130 may determine whether all wordlines of the first sub block SB1 are in the erased state, that is, whether the first sub block SB1 includes no wordline PWL corresponding to the program state (S55).
When all wordlines of the first sub block SB1 are in the erased state (S55: YES), the nonvolatile memory device 400 may perform the normal erase operation NEO with respect to the second sub block SB2 and simultaneously perform the post erase operation PEC with respect to the first sub block SB1 (S57).
Meanwhile, when at least one wordline of the first sub block SB1 is in the programmed state (S55: NO), the nonvolatile memory device 400 may inhibit the post erase operation PEO with respect to the first sub block SB1 and perform the normal erase operation NEO with respect to the second sub block SB2 (S52). In this case, the post erase controller 130 may set the first sub block SB1 as the closed sub block CSB (S56) and inhibit programming of the first sub block SB1.
As described with reference to
A very large number of page buffers proportional to the number of bitlines BL may be formed in the peripheral region PREG.
The page buffer PBc includes a latch circuit LAT, transistors T1 and T2 controlling an electrical connection between the bitline BL and the latch circuit LAT in response to control signals BLSLT and BLSHF, and an erase transistor ETR for controlling the application of the erase voltage Vers to the bitline BL in response to a control signal CON during the erase operation.
On the other hand, the page buffer PBc does not include the erase transistor ETR, and the erase transistor ETR is formed in the cell region CREG. As will be described below, the erase transistor ETR may be implemented using an erase channel structure ECH formed in the cell region CREG.
As a result, the page buffer PBp has a smaller size than the page buffer PBc by removing the erase transistor ETR. In general, since a nonvolatile memory device includes a very large number of page buffers, the size of the nonvolatile memory device may be remarkably reduced by reducing the size of the page buffer.
As such, in the nonvolatile memory device according to some implementations, the erase transistor ETR for controlling the erase voltage Vers applied to the bitline BL may be removed from the page buffer circuit and implement the erase transistor ETR using the erase channel structure ECH, thereby reducing the size of the page buffer circuit and the nonvolatile memory device.
Referring to
The gate electrode structure SSL, WL and GSL may include a buffer oxide layer 210, and gate electrodes 220 and insulating patterns 230, which are alternately and repeatedly stacked on the buffer oxide layer 210. The buffer oxide layer 210 may cover a top surface of the substrate SUB. The buffer oxide layer 210 may include, for example, a thermally-grown oxide layer or a silicon oxide layer. The gate electrodes 220 may include at least one ground selection gate electrode GSL, cell gate electrodes WL, and at least one string selection gate electrode SSL. The ground selection gate electrode GSL may be the lowermost electrode of the gate electrodes 220, and the string selection gate electrode SSL may be the uppermost electrode of the gate electrodes 220. The cell gate electrodes WL may be disposed between the ground selection gate electrode GSL and the string selection gate electrode SSL. The gate electrodes 220 may be formed of or may include at least one of, for example, doped silicon, metals (e.g., tungsten), metal nitrides, metal silicides, or any combination thereof.
The insulating patterns 230 may be disposed between the gate electrodes 220, which are placed adjacent to each other in the vertical direction D3 perpendicular to the top surface of the substrate SUB. The majority of the insulating patterns 230 may have the same thickness, and at least one of the insulating patterns 230 may be thicker than other insulating patterns. For example, an uppermost insulating pattern (hereinafter, a first insulating pattern) on the string selection gate electrode SSL may be thicker than underlying insulating patterns. The first insulating pattern may be thicker by at least two times than the underlying insulating patterns. The insulating patterns 230 may be formed of or may include, for example, silicon oxide.
The nonvolatile memory device 1001 may be divided in the vertical direction D3 into the cell region CREG and the peripheral region PREG and may be divided in the second horizontal direction D2 into the cell string area CLAR and the contact area CTAR.
The cell channel structures CH may penetrate the gate electrode structure SSL, WL and GSL. Each cell channel structure CH may include a vertical channel portion 315 and a charge storing structure 310 surrounding the vertical channel portion 315. In addition, each cell channel structure CH may include an internal space, which is formed in the vertical channel portion 315, and a gap-fill layer 320, which is surrounded by the internal space. Each cell channel structure CH may include a pad 330 provided in an upper portion thereof. The cell channel structures CH may be arranged in a zigzag shape or in a line shape, when viewed top down. The vertical channel portions 315 may be electrically connected to the substrate SUB. The vertical channel portions 315 may include a single layer or multiple layers. The vertical channel portions 315 may include at least one of, for example, a single crystalline silicon layer, an organic semiconductor layer, or carbon nanostructures.
The charge storing structures 310 may extend along outer sidewalls of the vertical channel portions 315 and in the vertical direction D3. For example, the charge storing structures 310 may have a shape surrounding the outer sidewalls of the vertical channel portions 315. The charge storing structures 310 may include at least one of, for example, a silicon oxide layer, a silicon nitride layer, a silicon oxynitride layer, and high-k dielectric layers and may have a single- or multi-layered structure.
As shown in
The pad 330 may be disposed in the upper portion of each cell channel structure CH and each erase channel structure ECH. The pad 330 may extend laterally to cover the top surface of the vertical channel portion 315 and a top surface of the charge storing structure 310. The pad 330 may cover at least one of a top surface of the tunnel insulating layer TL, a top surface of the charge storing layer CTL, and a top surface of the blocking insulating layer BLL. For example, as shown in
The vertical channel portion 315 and the pad 330 may be formed of a semiconductor material (e.g., silicon). As an example, the vertical channel portion 315 and the pad 330 may include poly silicon. The vertical channel portion 315 and the pad 330 may have different crystallographic structures from each other.
As described above, during the erase operation, the erase voltage Vers may be applied to the bitlines BL, and, through the GIDL phenomenon, electron-hole pairs may be produced in the vertical channel portion 315. The electrons may be moved toward the pads 330 and the holes may be supplied to the vertical channel portions 315. Thus, it may be possible to effectively provide the holes into the charge storing layers CTL from the vertical channel portions 315, during the erase operation, and consequently to improve an erase operation property of the three-dimensional nonvolatile memory device.
Referring to
A second interlayered insulating layer 480 may be disposed on the first interlayered insulating layer 460. The second interlayered insulating layer 480 may cover a top surface of the first interlayered insulating layer 460. The second interlayered insulating layer 480 may include, for example, a silicon oxide layer. The channel contact plugs HCP may be disposed on each cell channel structure CH and each erase channel structure ECH. The channel contact plugs HCP may penetrate the second and first interlayered insulating layers 460 and 480 and may be in direct contact with the pads 330. The channel contact plugs HCP may include at least one of, for example, metal materials (e.g., copper or tungsten) and metal nitrides (e.g., TiN, TaN, or WIN).
The bitlines BL may be disposed on the second interlayered insulating layer 480. The bitlines BL may extend in second horizontal direction D2 in the cell string area CLAR and the contact area CTAR. The bitlines BL may be arranged to be spaced apart from each other in the first horizontal direction D1. Each bitline BL may be electrically connected to the cell channel structures CH and the erase channel structure ECH arranged along the second horizontal direction D2. The bitlines BL may include, for example, a metal material.
The charge storing structure 310 may be provided to enclose the side surface of the vertical channel portion 315 and may be interposed between the bottom surface of the vertical channel portion 315 and the substrate SUB. In other words, the vertical channel portion 315 may be separated from the substrate SUB.
A source conductive pattern SCP may be disposed between the substrate SUB and the buffer oxide layer 210. The source conductive pattern SCP may include a first source conductive pattern SCP1 and a second source conductive pattern SCP2. The second source conductive pattern SCP2 may be disposed on a top surface of the first source conductive pattern SCP1. The first source conductive pattern SCP1 may be extended from a region between the substrate SUB and the second source conductive pattern SCP2 to other regions between the second source conductive pattern SCP2 and the vertical channel portion 315 and between the substrate SUB and the vertical channel portion 315. As illustrated in
In some example implementations, the first source conductive pattern SCP1 includes a horizontal portion PP and a vertical portion VP. The horizontal portion PP of the first source conductive pattern SCP1 may be disposed between the substrate SUB and the second source conductive pattern SCP2. The vertical portion VP may be extended from a region between the vertical channel portion 315 and the horizontal portion PP to other regions between the second source conductive pattern SCP2 and the vertical channel portion 315 and between the substrate SUB and the vertical channel portion 315. The vertical portion VP may be in contact with the charge storing structure 310. A top surface of the vertical portion VP may be located at a vertical level between a top surface of the horizontal portion PP and a top surface of the second source conductive pattern SCP2. A bottom surface of the vertical portion VP may be located at a lower vertical level than the top surface of the substrate SUB. The first and second source conductive patterns SCP1 and SCP2 may be formed of a polysilicon layer, which is doped with impurities of the first conductivity type, and a concentration of impurities doped into the second source conductive pattern SCP2 may be higher than that in the first source conductive pattern SCP1. Such source conductive pattern SCP may be used as the source line CSL.
According to some implementations, the erase channel structures ECH are formed in the contact area CTAR that is adjacent to the cell string area CLAR in the second horizontal direction D2. The erase channel structures ECH are connected between the bitlines BL and the source line CSL. The erase channel structures ECH include the erase transistors ETR, respectively. The erase selection line EGSL is formed in the contact area CTAR to form the gate electrodes of the erase transistors ETR in the erase channel structures ECH.
In some example implementations, as illustrated in
In some example implementations, as illustrated in
Referring to
For example, in the manufacturing process of the cell string CS, the width of the pillar PL or the cross-sectional area parallel to the upper surface of the substrate SUB may be formed smaller as the distance to the substrate SUB decreases. Therefore, when the same voltage is applied to the bodies of the ground selectin transistor GST, the memory cells MCs, and the string selection transistors SSTs, the electric field formed in the memory cell adjacent to the substrate SUB or the ground selection transistor GST may be greater than the electric field formed in the memory cell or string selection transistor SST far from the substrate SUB. These characteristics affect program disturbances that occur while the program operations are being performed. However, the width of the pillar PL or the cross-sectional area parallel to the upper surface of the substrate SUB is not limited thereto. The width of the pillar PL or the cross-sectional area parallel to the upper surface of the substrate SUB may be formed differently according to the distance from the substrate SUB depending on the etching process.
As such, characteristics of memory cells may be different according to positions of wordlines. Considering these characteristics, at least one wordline to be subjected to the above-described disturbance verification read operation DVRO may be set.
In
Referring to
Referring to
The boundary layer BND between the sub blocks SB1 and SB2 in
Hereinafter, example implementations of selectively switching a plurality of intermediate switching transistors by units of string groups based on an erase address and a direction in which an erase voltage is applied are described with reference to
Referring to
As illustrated in
The erase permission voltage VERSWL may be applied to wordlines of sub blocks to be erased, and the erase inhibition voltage VINHWL may be applied to the wordlines of sub blocks not to be erased.
As illustrated in
The erase permission voltage VERSWL may be applied to wordlines of sub blocks to be erased, and the erase inhibition voltage VINHWL may be applied to wordlines of sub blocks not to be erased. The turn-off voltage VGOFF may be applied to the ground selection line GSL, and the ground voltage GND may be applied to the common source line CSL.
The first sub block SB1 and the second sub block SB2 may be simultaneously erased by applying the erase voltage VERS to the common source line CSL and the bitlines BL. In this case, for example, by applying the normal erase voltage VERSN to the bitlines BL and applying the post erase voltage VERSP to the common source line CSL, the normal erase operation NEO may be performed with respect to the sub block SB2 and simultaneously the post erase operation PEO may be performed with respect to the first sub block SB as described with reference to
Referring to
The first boundary layer BND1 may include a plurality of intermediate switching lines MSL11˜MSL14 respectively controlling the electrical connection of the plurality of cell strings STR1˜STR4, and the second boundary layer BND2 may include a plurality of intermediate switching lines MSL21˜MSL24 respectively controlling the electrical connection of the cell strings STR1˜STR4. The same driving voltage may be commonly applied to the two intermediate switching lines MSL1i and MSL2i (i=1, 2, 3, 4) belonging to the same cell string STRi.
Referring to
The above-described intermediate switching transistors may include a plurality of lower switching transistors disposed on the lower boundary layer BNDL and connected to the lower switching lines LSL1˜LSL4, and a plurality of upper switching transistors disposed on the upper boundary layer BNDU and connected to the upper switching lines ULS1˜USL4.
Hereinafter, a manufacturing process of a nonvolatile memory device according to some implementations of the present invention will be briefly described.
Each integrated circuit may be formed on a first wafer WF1 and a second wafer WF2. The above-described memory cell array may be formed on the first wafer WF1, and peripheral circuits may be formed on the second wafer WF2. In other words, the first wafer WF1 may correspond to the aforementioned cell region CREG, and the second wafer WF2 may correspond to the aforementioned peripheral region PREG. A plurality of first bonding metal patterns may be formed on a bottom surface of the first wafer WF1, and a plurality of second bonding metal patterns may be formed on an upper surface of the second wafer WF2.
In a state in which the integrated circuits of the first wafer WF1 and the second wafer WF2 are formed, the first wafer WF1 and the second wafer WF2 may be bonded by a bonding method. In this case, the plurality of first bonding metal patterns and the plurality of second bonding metal patterns may be connected to each other such that the cell region CREG and the peripheral region PREG may be connected in the vertical direction.
The bonded wafers WF1 and WF2 are cut into a plurality of chips, and each chip corresponds to a semiconductor device including stacked semiconductor dies. The cut portion of the first wafer WF1 corresponds to the first semiconductor die and the cut portion of the second waiter WF2 corresponds to the second semiconductor die.
As described above, the nonvolatile memory device and the method of controlling the nonvolatile memory device according to some implementations may reduce unnecessary erasure of memory cells and increase the lifespan of the nonvolatile memory device by grouping the memory block into the sub blocks to manage the erase operation. In addition, the nonvolatile memory device and the method of controlling the nonvolatile memory device according to some implementations may secure the reliability of the nonvolatile memory device and enhance the performance of the nonvolatile memory device by reducing the disturbance caused in the victim sub block by the aggressor sub block through the post erase operation.
The inventive concept may be applied to any electronic devices and systems. For example, the inventive concept may be applied to systems such as a memory card, a solid state drive (SSD), an embedded multimedia card (eMMC), a universal flash storage (UFS), a mobile phone, a smart phone, a personal digital assistant (PDA), a portable multimedia player (PMP), a digital camera, a camcorder, a personal computer (PC), a server computer, a workstation, a laptop computer, a digital TV, a set-top box, a portable game console, a navigation system, a wearable device, an internet of things (IoT) device, an internet of everything (IoE) device, an e-book, a virtual reality (VR) device, an augmented reality (AR) device, a server system, an automotive driving system, etc.
While this disclosure contains many specific implementation details, these should not be construed as limitations on the scope of what may be claimed. Certain features that are described in this disclosure in the context of separate implementations can also be implemented in combination in a single implementation. Conversely, various features that are described in the context of a single implementation can also be implemented in multiple implementations separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially be claimed as such, one or more features from a combination can in some cases be excised from the combination, and the combination may be directed to a subcombination or variation of a subcombination.
The foregoing is illustrative of example implementations and is not to be construed as limiting thereof. Although a few example implementations have been described, those skilled in the art will readily appreciate that many modifications are possible in the example implementations without materially departing from the present inventive concept.
Number | Date | Country | Kind |
---|---|---|---|
10-2023-0042148 | Mar 2023 | KR | national |