This disclosure relates to nitride read only memory (NROM) and other ONO (oxide-nitride-oxide) cells and other microelectronic devices and structures and, more particularly, to modes of operating (particularly erasing and programming) NROM cells.
Demand for non-volatile memory (NVM) devices, including embedded NVM in other microelectronics and TC devices, has grown rapidly in recent years due to the expansion of digital computing and processing beyond desktop computer systems to include a broader array of consumer electronic, communications, automotive and industrial products. These products include mobile phones, still and video digital cameras, personal digital assistants (PDAs), portable computers, portable digital music players, digital video recorders, set-top boxes, communication routers and switches, digital televisions and other electronic systems. Each of these products typically requires one or more non-volatile memory device(s) to store data, such as the product's operating system and may also require data storage capabilities. The flash memory market, which in 2004 was the largest segment of the non-volatile semiconductor memory market, has traditionally been divided into four segments: code flash, data flash, embedded flash and serial flash.
Historically, the most widely-used technology for non-volatile semiconductor memory devices is floating gate technology, which was developed in the late 1960s and has been the prevalent technology for non-volatile semiconductor memory devices since then. A floating gate device is a variation of a standard metal oxide semiconductor (MOS) field effect transistor (FET) in that it has an additional electrically isolated “floating gate,” made of a conductive material. A floating gate device stores information by holding electrical charge within the floating gate. Adding or removing charge from the floating gate changes the threshold voltage (Vt) of the cell thereby defining whether the memory cell is in a programmed or erased state—representing a binary “1” or a binary “0” (memory cell states which may also be referred to herein as logic “1” and logic “0”), respectively or, conversely, binary or logic “0” and binary or logic “1”, respectively (the definition of the erase and program states as binary or logic “1” and binary or logic “0” being somewhat arbitrary, and generally at a designer's/manufacturer's discretion).
NROM technology effectively doubles the storage capacity of each memory cell by enabling the storage of two physically distinct and independent charges, each representing one bit of information, within a single memory cell. This significantly reduces the amount of silicon wafer required for each non-volatile memory device, resulting in a significant cost reduction to semiconductor manufacturers. Further advances in NROM and related ONO technology increase storage capacity to more than two bits (binary digits) per cell by better control and/or characterization of trapped charge.
Non-volatile memory devices based on NROM or other ONO (such as SONOS) technology contain a trapping nitride layer which stores a charge, instead of a floating gate suspended above the cell. The nitride layer is usually surrounded by two insulating silicon dioxide layers (oxide). Where applicable, descriptions involving NROM are intended specifically to include related oxide-nitride technologies, including SONOS (Silicon-Oxide-Nitride-Oxide-Silicon), MNOS (Metal-Nitride-Oxide-Silicon), MONOS (Metal-Oxide-Nitride-Oxide-Silicon) and the like used for NVM devices. Further description of NROM and related technologies may be found at “Non Volatile Memory Technology”, 2005 published by Saifun Semiconductor and materials presented at and through http://siliconnexus.com, “Design Considerations in Scaled SONOS Nonvolatile Memory Devices” found at: http://klabs.org/richcontent/MemoryContent/nvmt_symp/nvmts—2000/presentations/bu_white_sonos_lehigh_univ.pdf, “SONOS Nonvolatile Semiconductor Memories for Space and Military Applications” found at: http://klabs.org/richcontent/MemoryContent/nvmt_symp/nvmts—2000/papers/adams_d.p df, “Philips Research—Technologies—Embedded Nonvolatile Memories” found at: http://research.philips.com/technologies/ics/nvmemories/index.html, and “Semiconductor Memory: Non-Volatile Memory (NVM)” found at: http://ece.nus.edu.sg/stfpage/elezhucx/myweb/NVM.pdf, all of which are incorporated by reference herein in their entirety.
Commonly-owned patents disclose structure and operation of NROM and related ONO memory cells. Some examples may be found in commonly-owned U.S. Pat. Nos. 5,768,192 and 6,011,725, 6,649,972 and 6,552,387.
Commonly-owned patents disclose architectural aspects of an NROM and related ONO array, (some of which have application to other types of NVM array) such as segmentation of the array to handle disruption in its operation, and symmetric architecture and non-symmetric architecture for specific products, as well as the use of NROM and other NVM array(s) related to a virtual ground array. Some examples may be found in commonly-owned U.S. Pat. Nos. 5,963,465, 6,285,574 and 6,633,496.
Commonly-owned patents also disclose additional aspects at the architecture level, including peripheral circuits that may be used to control an NROM array or the like. Some examples may be found in commonly-owned U.S. Pat. Nos. 6,233,180, and 6,448,750.
Commonly-owned patents also disclose several methods of operation of NROM and similar arrays, such as algorithms related to programming, erasing, and/or reading such arrays. Some examples may be found in commonly-owned U.S. Pat. Nos. 6,215,148, 6,292,394 and 6,477,084.
Commonly-owned patents also disclose manufacturing processes, such as the process of forming a thin nitride layer that traps hot electrons as they are injected into the nitride layer. Some examples may be found in commonly-owned U.S. Pat. Nos. 5,966,603, 6,030,871, 6,133,095 and 6,583,007.
Commonly-owned patents also disclose algorithms and methods of operation for each segment or technological application, such as: fast programming methodologies in all flash memory segments, with particular focus on the data flash segment, smart programming algorithms in the code flash and EEPROM segments, and a single device containing a combination of data flash, code flash and/or EEPROM. Some examples may be found in commonly-owned U.S. Pat. Nos. 6,954,393 and 6,967,896.
The Field Effect Transistor
The transistor is a solid state semiconductor device which can be used for amplification, switching, voltage stabilization, signal modulation and many other functions. Generally, a transistor has three terminals, and a voltage applied to a specific one of the terminals controls current flowing between the other two terminals.
The terminals of a field effect transistor (FET) are commonly named source, gate and drain. In the FET a small amount of voltage is applied to the gate in order to control current flowing between the source and drain. In FETs the main current appears in a narrow conducting channel formed near (usually primarily under) the gate. This channel connects electrons from the source terminal to the drain terminal. The channel conductivity can be altered by varying the voltage applied to the gate terminal, enlarging or constricting the channel and thereby controlling the current flowing between the source and the drain.
Generally, when there is no voltage on the gate, there is no electrical conduction (connection) between the source and the drain. As voltage (of the correct polarity) is applied to the gate, there is a “field effect” in the channel between the source and the drain, and current can flow between the source and the drain, and can be controlled by the voltage applied to the gate. In this manner, a small signal (gate voltage) can control a relatively large signal (current flow between the source and the drain).
The Floating Gate Transistor
A floating gate transistor is generally a transistor structure, broadly based on the FET, as described hereinabove. As illustrated in
The floating gate is disposed over tunnel oxide (comparable to the gate oxide of the FET). The floating gate is a conductor, the tunnel oxide is an insulator (dielectric material). Another layer of oxide (interpoly oxide, also a dielectric material) separates the floating gate from the control gate.
Since the floating gate is a conductor, and is surrounded by dielectric material, it can store a charge. Electrons can move around freely within the conductive material of the floating gate (which comports with the basic definition of a “conductor”).
Since the floating gate can store a charge, it can exert a field effect on the channel region between the source and the drain, in a manner similar to how a normal FET works, as described hereinabove. Mechanisms for storing charges on the floating gate structure, as well as removing charges from the floating gate are described hereinbelow.
Generally, if a charge is stored on the floating gate, this represents a binary “1”. If no charge is stored on the floating gate, this represents a binary “0”. (These designations are arbitrary, and can be reversed so that the charged state represents binary “0” and the discharged state represents binary “1”.) That represents the programming “half” of how a floating gate memory cell operates. The other half is how to determine whether there is a charge stored on the floating gate—in other words, to “read” the memory cell. Generally, this is done by applying appropriate voltages to the source, drain and gate terminals, and determining how conductive the channel is. Some modes of operation for a floating gate memory cell are described hereinbelow.
Normally, the floating gate non-volatile memory (NVM) cell has only a single “charge-storing area”—namely, the conductive floating gate (FG) structure, and can therefore only store a single bit of information (binary “1” or binary “0”). More recently, using a technology referred to as “multi-level cell” (MLC), two or more bits can be stored in and read from the floating gate cell. MLC operation of memory cells is discussed in greater detail hereinbelow.
A Two-Bit (Dual Bit) Memory Cell
Another type of memory cell, called a “nitride, read only memory” (NROM) cell, has a charge-storage structure which is different from that of the floating gate memory cell and which permits charges to be stored in two separate charge-storage areas. Generally, the two separate charge storage areas are located within a non-conductive layer disposed between the gate and the underlying substrate, such as a layer of nitride formed in an oxide-nitride-oxide (ONO) stack underneath the gate. The non-conductive layer acts as a charge-trapping medium. Generally, electrical charges will stay where they are put in the charge-trapping medium, rather than being free to move around as in the example of the conductive floating gate of the floating gate memory cell. A first bit of binary information (binary “1” or binary “0”) can be stored in a first portion (such as the left-hand side) of the charge-trapping medium, and a second bit of binary information (binary “1” or binary “0”) can be stored in a second portion (such as the right-hand side) of the charge-trapping medium. An alternative viewpoint is that different charge concentrations can be considered for each bit of storage. Using MLC technology, as discussed in greater detail hereinbelow, at least two bits can be stored in and read from each of the two portions of the charge-trapping medium (for a total of 4 bits), similarly 3 bits or more than 4 bits may be identified.
The ONO structure is a stack (or “sandwich”) of lower oxide 322, a charge-trapping material such as nitride 324, and an upper oxide 326. The ONO structure may have an overall thickness of approximately 10-25 nm, such as 18 nm, as follows:
The NROM memory cell has two spaced apart diffusions 314 and 316 (which can function as source and drain, as discussed hereinbelow), and a channel region 320 defined in the substrate between the two diffusion regions 314 and 316.
The charge-trapping material 324 is non-conductive, and therefore, although electrical charges can be stored in the charge-trapping material, they are not free to move around, they will generally stay where they are stored. Nitride is a suitable charge-trapping material. Charge trapping materials other than nitride may also be suitable for use as the charge-trapping medium. One such material is silicon dioxide with buried polysilicon islands. A layer (324) of silicon dioxide with polysilicon islands would be sandwiched between the two layers of oxide (322) and (326). Alternatively, the charge-trapping layer 324 may be constructed by implanting an impurity, such as arsenic, into a layer of silicon dioxide deposited on top of the bottom oxide 322.
The memory cell 300 is generally capable of storing two bits of data, a right bit in an area of the nitride layer 324 represented by the dashed circle 323 and a left bit in an area of the nitride layer 324 represented by the dashed circle 321. (MLC operation of the NROM, for storing a total of 4 bits of data is discussed hereinbelow.)
Each of the storage areas 321, 323 in the charge-trapping material 324 can exert a field effect on the channel region 320 between the source and the drain, in a manner similar to how a normal FET works, as described hereinabove (
Generally, if a charge is stored in a given storage area of the charge-trapping material, this represents a binary “1”, and if no charge is stored in a given storage area of the charge-trapping material, this represents a binary “0”. (Again, these designations are arbitrary, and can be reversed to that the charged state represents binary “0” and the discharged state represents binary “1”.) That represents the programming “half” of how an NROM memory cell operates. The other half is how to determine whether there is a charge stored in a given storage area of the charge-trapping material—in other words, to “read” the memory cell. Generally, this is done by applying appropriate voltages to the diffusion regions (functioning as source and drain) and gate terminals, and determining how conductive the channel is. Some modes of operation for an NROM memory cell are described hereinbelow.
Generally, one feature of NROM cells is that rather than performing “symmetrical” programming and reading, NROM cells are beneficially programmed and read “asymmetrically”, which means that programming and reading occur in opposite directions. The arrows labeled in
Memory Cell Modes of Operation and Injection Mechanisms
A memory cell's state may be defined and determined by what is called its threshold voltage (Vt) which determines a threshold level for the gate voltage required to establish the “channel” between the source and the drain—in other words, for the memory cell to begin to conduct current. A memory cell's threshold voltage level is directly related to the amount of charge (the number of electrons) stored in the charge storage region (floating gate, or ONO layer) of the cell—generally, more electrons stored means a higher threshold voltage Vt. Typically, for a given structure of a memory cell, the gate voltage that provides 1 pA (picoAmpere) of channel current is termed the threshold voltage (Vt).
The structure and general operation of two types of memory cells—floating gate and NROM—have been described hereinabove, with reference to
The floating gate (FG) memory cell has a conductive layer between the gate and the channel region and, since the floating gate is a conductor, electrical charges stored in the floating gate are free to move around within the floating gate.
The NROM memory cell has a non-conductive layer (such as nitride) which can store charge in distinct areas and, since the non-conductive layer is not a conductor, the charges stored in the non-conductive layer are not free to move around, but rather tend to stay more-or less where they have been stored in a charge-storage region of the non-conductive layer, typically in a first region near one of the two diffusion regions, and in a second region adjacent the other of the two diffusion regions. These two diffusion regions are typically referred to as “left” and “right”, and the corresponding two charge-storage regions in the non-conductive layer are typically similarly referred to as “left” and “right”.
The concept of storing charges in the charge-storage structures (floating gate of a floating gate memory cell, or non-conductive layer of an NROM memory cell) has been discussed. The charges can also be removed from the charge-storage structure. Generally, the process of moving of charges into or out of the charge-storage structure is referred to as “injection”, and there are a number of known injection mechanisms.
In a general sense, “electrons” are (or behave as) negative charges and “holes” are (or behave as) positive charges. As we have heard many times in many contexts, “opposites attract”. For example, the north pole of a magnet attracts the south pole of another magnet, and is repelled by the north pole of another magnet. Generally, the same principle applies with electrical charges. An electron (negative charge) will be attracted by a positive electrical charge (or voltage) and will be repelled by a negative electrical charge (or voltage), and a hole (positive charge) will be attracted by a negative electrical charge (or voltage) and will be repelled by a positive electrical charge (or voltage).
The charge-storage structures of both the floating gate (
The broad purpose of semiconductor memory is to store (“program”) data—many binary “1”s and “0”s—and allow access to (“read”) the stored data. And the broad purpose of a single memory cell is to store individual bits of the data. Single-level (SLC) floating gate memory cells can store one bit of data. Single-level (SLC) NROM memory cells can store two bits of data. Multi-level (MLC) floating gate memory cells can store two bits of data. Multi-level (MLC) NROM memory cells can store four bits of data. MLC operation of memory cells is discussed in greater detail hereinbelow.
Data is stored in and retrieved from memory cells in what is termed “modes of operation”. Generally, there are four modes of operation: “erase”, “program”, “write” and “read”. The first three modes (erase, program, write) relate to storing data. And, for purposes of this discussion, the write mode typically is simply a combination of erase and program. The read mode refers to accessing stored data.
The principle modes of operation discussed in this disclosure are program and erase. Both floating gate and NROM will be discussed.
Generally, to store a charge in the floating gate of a floating gate memory cell, the control gate's voltage may be raised with the source and drain grounded (or with the drain at a raised voltage), so that electrons tunnel through the tunnel oxide from the channel region to the floating gate, by a process known as CHE (channel hot electron) injection. To remove the charge (electrons) from the floating gate, the source's voltage may be raised with the gate grounded (or at a negative potential), and the electrons tunnel from the floating gate back to the substrate, by a process known as F-N (Fowler-Nordheim) tunneling (also abbreviated “FNT”).
Generally, in order implement CHE injection of electrons into the floating gate, the source is grounded, the drain is set to zero or to a positive voltage (which will “attract” electrons from the source, laterally across the channel region), and the gate is also set to a positive voltage (which will “attract” electrons vertically through the tunnel oxide, into the floating gate). As electrons flow through the channel from source to drain, some of the electrons will make their way through the tunnel oxide and become stored on the floating gate. This injection of electrons into the floating gate increases the threshold voltage of the memory cell. The shift (increase) in threshold voltage can be on the order of 3 or more volts. The threshold voltage (Vt) of the memory cell can later be measured, or “read”.
Generally, whereas CHE injection was used (described hereinabove), in programming, to inject electrons into the floating gate, F-N tunneling (FNT) is used, in the erase operation, to remove electrons from the floating gate.
Generally, in order implement F-N tunneling of removing electrons from the floating gate, both the source and the drain are set to a positive voltage (to “attract” electrons through the tunnel oxide from the floating gate into the substrate), and the gate is set to a negative voltage (to “repel” electrons through the tunnel oxide from the floating gate into the substrate). This removal of electrons from the floating gate decreases the “threshold voltage” of the memory cell.
Generally, during programming, the threshold voltages of individual memory cells or (in the case of NROM) two charge-storage regions of a single memory cell) are individually manipulated to represent the data desired to be stored. In contrast thereto, generally, during erase, it is normally acceptable to simply decrease the threshold voltages of a great many memory cells, all at once, such as all of the memory cells in a sector or block of a memory array.
Typically, to inhibit erase of selected memory cells, an “inhibit” signal, such as a positive voltage (which will not “repel” the electrons) may be applied to the gates of the selected memory cells. In a common array architecture, the gates of several memory cells are typically all connected to a common word line (of many such word lines) in the array. Array architecture is discussed in greater detail hereinbelow.
Regarding “reading” the contents of a memory cell, no “injection mechanism” is used. The conventional technique of reading conductive floating gate memory cells is to apply appropriate “read voltages” to the gate and drain and to ground the source. This is similar to the method of programming with the difference being that lower level voltages are applied during reading than during programming.
Since the floating gate is conductive, the trapped charge is distributed evenly throughout the entire floating conductor. In a programmed device, the threshold is therefore high for the entire channel and the process of reading becomes symmetrical. It makes no difference whether voltage is applied to the drain and the source is grounded or vice versa.
The following table presents exemplary conditions for programming, erasing and reading a floating gate memory cell.
Generally, NROM memory cells may be programmed similarly to floating gate memory cells, using a channel hot electron (CHE) injection mechanism. Voltages are applied to the gate and drain creating vertical and lateral electrical fields which accelerate electrons from the source along the length of the channel. As the electrons move along the channel some of them gain sufficient energy to jump over the potential barrier of the bottom silicon dioxide layer 322 (of the ONO layer) and become trapped in the silicon nitride (charge trapping) layer 324 (of the ONO layer).
The NROM cell can store charges in two separate portions 321 and 323 of the charge-trapping layer 324. For purposes of this portion of the discussion, the left region 321 stores a left bit, and the right region 323 stores a right bit. Depending on which bit is desired to be programmed, the left and right diffusion regions 314 and 316 can act as source and drain, or as drain and source. The gate always functions as the gate.
Generally, NROM memory cells may be erased using a technique called hot hole injection (HHI), or tunnel enhanced hot hole (TEHH) injection. For example, to erase an NROM memory cell, the source voltage can be set to a positive voltage such as +5 v, the gate voltage can be set to a negative voltage such as −7 v, and the drain voltage may be set to a positive voltage such as +2 volts (less than the source voltage) or may be left floating or disconnected.
Using HHI, holes (the “counterpart” of electrons) can be selectively inserted into the left portion 321 of the nitride layer 324 and into the right portion 323 of the nitride layer 324, in a controlled manner. Generally, holes which are injected cancel out
“Vs” refers to the left diffusion area, and “Vd” refers to the right diffusion area, for the operations of programming, erasing and reading the right side bit of an NROM memory cell.
The operations of program and erase are typically performed using pulses, each pulse partially moving (nudging) the memory cell towards the desired Vt, followed by verify (a quick read, to see if the desired Vt has been reached), until the desired Vt has been attained. Typically, conditions are established so that only a few (for example, 3-5) pulses are required to program or erase each cell.
Exemplary operating modes for memory cells, using the mechanism of CHE injection for programming a memory cell, and the mechanisms of FNT and HHI for erasing a memory cell have been described, hereinabove. Other and additional mechanisms are known for performing the modes of operation.
Other Erase and Program Operations for NROM
The article “A Single-Sided PHINES SONOS Memory Featuring High-Speed and Low-Power Applications”, IEEE Electron Device Letters, Vol. 27, No. 2, February 2006, incorporated in its entirety by reference herein, discloses erase and program operations for a memory cell having ONO thicknesses of 5 nm (bottom oxide), 7 nm (nitride) and 9 nm (top oxide), and being operated as a one-bit/cell device used in a virtual ground array. As noted in the article, CUE programming has low programming efficiency and causes high power consumption.
First the memory cell is erased to a high Vt level by a negative FN electron tunneling operation wherein, a high negative voltage is applied to the gate of the memory cell in a single terminal (1-terminal) operation (the source and drain voltages are left at 0 volts), and electrons tunnel into the nitride charge storage area. See
The erase conditions set forth in the article are Vs=0 v; Vg=−20 v; Vd=0 v; Vb=0 v. See Table 3, below. An upward Vt shift of approximately 3 volts (from 0 to 3 volts) can be achieved in approximately 1 millisecond (1 ms).
The negative ANT erase operation being a single terminal operation, the entire charge storage area of the memory cell is populated with electrons. This is shown in
Then, for programming the cell, band-to-band hot-holes (HHs) are injected to both the left side and the right side to decrease the cell Vt, and a programming speed as fast as 20 μs can be achieved. See
Reading an NROM memory cell may involve applying voltages to the terminals of the memory cell comparable to those used to read a floating gate memory cell, but reading may be performed in a direction opposite to that of programming. Generally, rather than performing “symmetrical” programming and reading (as is the case with the floating gate memory cell, described hereinabove), the NROM memory cell is usually programmed and read “asymmetrically”, meaning that programming and reading occur in opposite directions. This is illustrated by the arrows in
The following table presents exemplary conditions for programming, erasing and reading an NROM memory cell.
Hot Hole Injection (HHI) is a two-terminal operation, so only one side can be done at a time. In
The program conditions set forth in the article are Vs=0 v; Vg=−10 v; Vd=0 v; Vb=0 v. See Table 3, below. A downward Vt shift of approximately 3 volts (from 0 to −3 volts) can be achieved in approximately 20 microseconds (20 μs).
Since the device channel stays off during both programming and erase operation, the power consumption is very low. The article claims to achieve a high programming throughput of 10 MB/s with low power (program current <10 nA/cell).
However, it should be realized that the memory cell is being used as a one-bit/cell device, rather than as a two-bits/cell device, as in NROM. (The article appears to claim that two-bits/cell can be achieved by MLC operation).
The erase and program operations may typically be performed using a few cycles of pulses followed by verify (read).
There are, of course, many nuances to each of the operations of memory cells discussed hereinabove. For example, repeated erasing of a memory cell can result in lowering the threshold voltage beyond zero, becoming negative, a condition known as “over-erase”. And, particularly with regard to programming NROM memory cells in an array of many NROM cells, programming one bit of a given cell may disturb the state of a neighboring cell. These issues, as they may become relevant and pertinent, are discussed hereinbelow.
For example, U.S. Patent Publication No. US2005/0078527, incorporated in its entirety by reference herein, discloses a method of over-erase protection in a NROM device by performing a F-N tunneling program to provide additional electrons to the nitride charge-trapping layer (of a NROM device having an ONO layer) to increase the threshold voltage before a CHE program cycle or before a HHI erase cycle. The FNT step may be applied to individual NROM devices, or to a plurality of NROM devices.
Programming is typically performed in increments, with pulses of voltage—after each pulse, a verify operation occurs in which the threshold voltage level of the cell is measured (read). The general idea is to “nudge” the threshold voltage to the desired level, rather than over-shooting (over programming) or under-shooting (under programming) the desired level. With appropriate control mechanisms, only a few pulses (nudges) are required. A similar concept of cycles of pulse followed by verify until a desired Vt has been attained may sometimes be used during the erase operation, to avoid under-erase or over-erase. See, for example, commonly-owned U.S. Pat. Nos. 6,292,394; 6,396,741; 6,490,204; 6,552,387; 6,636,440; and 6,643,181.
Multi-Level Cell (MLC) Operation of Memory Cells
Mention has been made, hereinabove, of single level cell (SLC) and multi-level cell (MLC) operation, and it shall be described only briefly in this disclosure.
Theoretically, in order to determine the programmed state of a memory cell, only one voltage threshold is needed—either the threshold voltage (Vt) of the cell is below the threshold, or over the threshold (Vth). However, this simplistic approach can lead to ambiguities and false readings. This is in part due to the fact that the charges (such as electrons) cannot be stored (in the floating gate, or in the NROM storage region) with absolute precision, and is in part due to the fact that sometimes electrons disappear from the storage region.
Therefore, in practice, to store one bit of data, two voltage levels are needed. If the sensed threshold voltage is below the lower of the two voltage levels, that is classified as a “0”, and if the sensed threshold voltage is above the higher of the two voltage levels, that is classified as a “1”.
Memory cell technology has been developed wherein memory cells can hold two or more bits of data, instead of just one each, in the storage region. The trick is to take advantage of the analog nature of the charge stored in the memory cell and allow it to charge to several different voltage levels. Each voltage range to which the floating gate can charge can then be assigned its own digital code. This is generally referred to as “Multi-Level Cell (MLC)” technology.
Injection Mechanisms, Generally
A number of “injection mechanisms” have been described hereinabove, in the context of modes of operating memory cells, such as CHE, FNT, HHI.
Generally, an injection mechanism includes any mechanism that causes electrons to be inserted into the storage area (floating gate) of a floating gate memory cell, or into the left or right storage area (in the ONO layer) of an NROM memory cell, such as CHE and FNT.
Generally, the more electrons you can insert into the storage area, the higher the threshold voltage of the memory cell will be. For a single level cell (SLC), a threshold voltage Vt above a predefined level Vth may be designated to represent either a logic “1” or a logic “0”, and a threshold voltage Vt below the predefined level Vth may be designated to represent either a logic “0” or a logic “1”.
Generally, an injection mechanism also includes any mechanism that causes electrons to be removed (extracted) from the storage area (floating gate or ONO region) of a memory cell. Generally, the threshold voltage of the memory cell can be lowered by removing previously-inserted electrons from the storage area.
Another way to lower the threshold voltage of the memory cell is to “cancel out” the electrical charge effect of previously-inserted electrons in the storage area, and this may be accomplished by inserting holes into the storage area, such as with HHI. Generally, one hole will “cancel out” one electron.
These injection mechanisms are generally well known. Although the mechanisms may largely be dominated by the various voltages applied to the source (Vs), gate (Vg) and drain (Vd) of the memory cell, as well as to the substrate (Vb), factors such as materials used in various elements of the memory cell, as well as geometry and dimensions of the elements of the memory cell can also significantly affect the injection mechanism.
Memory Array Architecture, Generally
Memory arrays are well known, and comprise a plurality (many, including many millions) of memory cells organized (including physically arranged) in rows (usually represented in drawings as going across the page, horizontally, from left-to-right) and columns (usually represented in drawings as going up and down the page, from top-to-bottom).
As discussed hereinabove, each memory cell comprises a first diffusion (functioning as source or drain), a second diffusion (functioning as drain or source) and a gate, each of which has to receive voltage in order for the cell to be operated, as discussed hereinabove. Generally, the first diffusions (usually designated “source”) of a plurality of memory cells are connected to a first bit line which may be designated “BL(n)”, and second diffusions (usually designated “drain”) of the plurality of memory cells are connected to a second bit line which may be designated “BL(n+1)”. Typically, the gates of a plurality of memory cells are connected to common word lines (WL).
Notice, for example that the gates of the memory cells “e” and “f” (to the right of “e”) are both connected to the same word line WL(n). (The gate of the memory cell “d” to the left of “e” is also connected to the same word line WL(n).) Notice also that the right hand terminal (diffusion) of memory cell “e” is connected to the same bit line BL(n+1) as the left-hand terminal (diffusion) of the neighboring memory cell “f”. In this example, the memory cells “e” and “f” have two of their three terminals connected together.
This means that if you want to perform an operation (such as program, erase or read) on one cell something, there could be an effect on a neighboring cell, since two of the three terminals of adjacent memory cells are connected together (gate connected to gate, and one of left/right diffusions connected to one of right/left diffusions for the neighboring cell.)
Generally, as discussed in greater detail hereinbelow, it may be relevant whether a given operation (such as program, erase or read) is performed as a “1-terminal” operation (such as FNT erase to high Vt, discussed hereinabove), as a “2-terminal” operation (for example, applying a non-zero voltage to the gate and to one of the source or drain diffusions) or as a “3-terminal” operation (for example, applying a non-zero voltage to the gate and to both of the source or drain diffusions).
Generally, when programming or erasing a cell, one or more of the neighboring cells may be affected by the programming/erasing operation, causing thereto a possible change in their threshold voltage. This unwanted change in threshold voltage of unselected cells is known as a “disturb”. A similar effect (disturb) may occurs during a read operation. However, due to the relative weakness of the applied voltage levels, the effect during read is significantly smaller.
The situation of neighboring memory cells sharing the same connection—the gates of neighboring memory cells being connected to the same word line, the source (for example, right hand diffusion) of one cell being connected to the drain (for example left hand diffusion) of the neighboring cell—is even more dramatically evident in what is called “virtual ground architecture” wherein two neighboring cells actually share the same diffusion. In virtual ground array architectures, the drain of one memory cell may actually be the same diffusion which is acting as the source for its neighboring cell. Examples of virtual ground array architecture may be found in U.S. Pat. Nos. 5,650,959; 6,130,452; and 6,175,519, incorporated in their entirety by reference herein.
A memory array may also include isolation zones (not shown). Isolation zones segregate one group of memory cells from a neighboring group of memory cells, for example isolation zones can divide the array into slices of just one column or a plurality of columns. Examples of arrays having isolation zones may be found in commonly-owned U.S. Pat. No. 7,043,672, incorporated in its entirety by reference herein, and in commonly-owned U.S. Pat. No. 6,975,536.
A more complete description of NROM and similar ONO cells and devices, as well as processes for their development may be found at “Non Volatile Memory Technology”, 2005 published by Saifun Semiconductor and materials presented at and through http://siliconnexus.com, both incorporated by reference herein in their entirety.
Glossary
Unless otherwise noted, or as may be evident from the context of their usage, any terms, abbreviations, acronyms or scientific symbols and notations used herein are to be given their ordinary meaning in the technical discipline to which the disclosure most nearly pertains. The following terms, abbreviations and acronyms may be used throughout the descriptions presented herein and should generally be given the following meaning unless contradicted or elaborated upon by other descriptions set forth herein. Some of the terms set forth below may be registered trademarks (®).
In addition to the above, some abbreviations that may be used herein, or in the provisional application from which this non-provisional application claims priority, may include:
It is a general object of the disclosure to provide improved techniques for operating NROM memory cells.
According to an embodiment of the disclosure, a method for operating a plurality of NVM memory cells comprises: performing an erase step using Fowler-Nordheim tunneling (FNT) to establish a high initial threshold voltage (Vt) for the plurality of memory cells; performing a first programming step using hot hole injection (HHI) to reduce the threshold voltage (Vt) of selected ones of the memory cells; and performing a second programming step using channel hot electron (CHE) injection to increase the threshold voltage (Vt) of bits of memory cells that are unnecessarily programmed in the first programming step. The NVM memory cells may be NROM cells. Each memory cell may have two charge-trapping areas; and each charge-trapping area of a memory cell may capable of storing at least one bit. The FNT erase step may be performed using pulses; the HHI programming step may be performed using pulses; and the CHE programming step may be performed with pulses. The plurality of memory cells may comprise a sector; and the sector size may be 128 kilobytes (KB) to 1 megabyte (MB).
According to a feature of the embodiment, in the FNT erase step, only a few cells may be verified; and in the CHE second programming step, the threshold voltage of those cells which were not fully erased in the FNT erase step is increased to the high initial threshold voltage level.
According to an embodiment of the disclosure, a method for programming a plurality of memory cells, each cell having a characteristic program voltage (PV) and a characteristic erase voltage (EV), the method comprising the steps of:
According to an aspect of the disclosure:
According to an aspect of the disclosure, since when erasing the plurality of cells, third selected ones of the cells may not be fully erased; the refresh step (c) may be continued to refresh the selected ones of the cells until the third selected ones of the cells are fully erased.
According to an embodiment of the disclosure, a method of operating a NVM memory cell comprises: using a combination of Fowler-Nordheim tunneling (FNT), hot hole injection (HHI), and channel hot electron (CHE) injection. The memory cell may be an NROM memory cell. The memory cell may have two charge-trapping areas; and each charge-trapping area may be capable of storing at least one bit.
According to an embodiment of the disclosure, a method for operating a plurality of NVM memory cells comprises:
Reference will be made in detail to embodiments of the disclosure, examples of which may be illustrated in the accompanying drawing figures. The figures are intended to be illustrative, not limiting. Although the disclosure is generally described in the context of these embodiments, it should be understood that it is not intended to limit the disclosure to these particular embodiments.
Certain elements in selected ones of the figures may be illustrated not-to-scale, for illustrative clarity. The cross-sectional views, if any, presented herein may be in the form of “slices”, or “near-sighted” cross-sectional views, omitting certain background lines which would otherwise be visible in a true cross-sectional view, for illustrative clarity.
Elements of the figures may (or may not) be numbered as follows. The most significant digits (hundreds) of the reference number correspond to the figure number. For example, elements of
In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the disclosure. However, it will be understood by those skilled in the art that the teachings of the present disclosure may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the teachings of the present disclosure.
As used herein, negative direct current (DC) voltages may be written with a minus sign (−) before a numeral, followed by “v” (for volts), for example −5 v (meaning negative five volts DC), and positive DC voltages may be written either with or without a plus sign (+) preceding the numeral, for example +5 v or 5 v (meaning plus five volts DC).
Introduction
This disclosure is generally related to the operation of an NROM memory cell, including programming, erasing and reading, although the scope of the disclosure is not limited in this respect. Certain other aspects of the memory cell, such as it's structure and fabrication, array architecture and circuits for operating memory cells may also be discussed briefly and generally to put things in context.
Generally, as discussed hereinabove, an NROM cell is an n-channel MOSFET device where the gate dielectric can be thought of as being “replaced” with a trapping material (such as nitride) sandwiched between two silicon dioxide layers (see ONO,
The erase and program operations may typically be performed using a few cycles of pulses followed by verify (read).
Negative (NEG) erase and positive (POS) erase operations both involve a hot hole injection (HHI) mechanism, but they are performed differently than one another. Generally, NEG erase is faster, but requires special transistors. Generally, POS erase can be performed with better circuits, but is slower.
New NROM Modes of Operation
A problem being addressed by this disclosure is achieving programming at a rate of 20 MB/second in 2-bit (SLC) operation, and corresponding 10 MB/second in 4-bit (MLC) operation, although the scope of the disclosure is not limited in this respect.
The disclosure that follows is presented in two distinct, but related parts:
Generally, the injection mechanisms of Fowler-Nordheim tunneling (ENT), Hot Hole Injection (HHI) and Channel Hot Electron (CHE) injection, which have been described hereinabove, are used to modify (program and erase) the threshold voltage (Vt) of storage areas of memory cells. As will become evident, it is important to note that using these injection mechanisms, and with the memory cells arranged in an array (including virtual ground array architecture), it is important to note that:
In some cases, the substrate terminal is considered as an obvious ground and is not counted as a separate terminal, in which case:
It is important to note, for example, that an operation performed on a given memory cell (such as the cell “d” in
Part 1. FN Erase to High Vt & HHI+CHE Programming
This technique may be referred to herein simply as “FNT & HHI+CHE”. Generally, the technique disclosed herein reduces the erase time, and doubles the programming time, which can result in a net savings of time, although the scope of the disclosure is not limited in this respect.
As a general proposition, the operation of writing requires an erase step (setting the cell(s) to a predetermined state), followed by a programming step (writing data into the cell(s)).
For purposes of this disclosure, the term “write” is equivalent to its grammatical variant “writing”, the term “erase” is equivalent to its grammatical variant “erasing”, the term “program” is equivalent to its grammatical variant “programming”, and the term “read” is equivalent to its grammatical variant “reading”.
Generally, the write speed equals the erase speed plus the program speed. Therefore, if it were to be assumed (for illustrative purposes) that the erase speed and the program speed were equal, then by bringing the erase speed to zero, one could automatically double the write speed. Therefore, generally, an overall goal in this method of operation involving FNT & HHI+CHE is generally to reduce the erase speed, thereby achieving a reduction in write speed.
Generally, this FNT & HHI+CHE mode of operation involves three operations (steps), performed in the following sequence:
Generally, each of the injection mechanisms used herein (FNT, HHI, CHE) are well known, and they may be performed in a conventional manner using a number (typically, only a few) of pulses followed by verify to ensure that a desired Vt is achieved.
The horizontal axis in the diagrams represents threshold voltage (Vt), left is low, right is high. In the diagrams, three levels of threshold voltage (Vt) are illustrated:
The abbreviation ERS stands for “erase”. The abbreviation PGM stands for “program”.
Typically, the difference (delta Vt) between EV and PV may be 1.5 volts (EV=PV+1.5), and RD may equal PV plus 0.5 volts (RD=PV+0.5), or EV minus 1.0 volts (RD=EV−1.0), although the scope of the disclosure is not limited in this respect.
FNT—Erase
First, an erase step is performed using FNT to establish a high initial Vt, such as 4-5 volts, by applying the following exemplary voltages to the memory cell (and substrate):
These conditions are sufficient to cause the desired F-N tunneling to simultaneously (in one step) erase both left and right storage areas in the NROM memory cell, although the scope of the disclosure is not limited in this respect.
Regarding the gate voltage (Vg), as set forth above, in the FNT erase step the gate voltage (Vg) is set high, such as 10-14 volts, such as for 1 millisecond (1 msec). It would generally be desirable to operate under all circumstances with less than 10 v, but to do that would require thinning down the ONO so much that other operations would be difficult to handle. Often, certain tradeoffs need to be made to achieve sometimes competing objectives. In this example, using a thicker ONO, to make 1 msec feasible, more than 10 volts is needed.
The FNT erase step is performed on a plurality of memory cells, such as an entire block, and may be implemented using pulses of 250 μsec each, followed by verify. (A 1 msec erase time would be achieved with four pulses.) Only a few bits need to be verified, because any bit that does not reach the correct level in this FNT erase step can later be corrected (in the CHE refresh step), as described in greater detail hereinbelow.
The FNT to high Vt operation is a single-terminal operation, involving applying a high voltage to the, many WLs in parallel and each WL has a plurality of memory cells. As an example 128 Kbit to 1 Mbit of cells can be erased in the same erase pulse. Since, in a typical array architecture, the gates of several memory cells are connected to the same word line (WL), this means that you can only insert the same information into all bits that are being subjected to this mechanism (which is why it is an erase mechanism, not a program operation), which is all of the memory cells on the word lines being subjected to FNT gate voltages (Vg).
Generally speaking, inserting electrons into the charge-storage area of a memory cell increases threshold voltage (Vt) of the memory cell, and removing electrons from (or inserting holes into) the charge-storage area of the memory cell decreases the characteristic threshold voltage (Vt) of the memory cell. Generally, for purposes of this disclosure, the state of high threshold voltage is defined as binary “1”, and the state of low threshold voltage is defined as binary “0”, although the scope of the disclosure is not limited in this respect. In other publications and references, low Vt is defined as a logic “1”, and high Vt is defined as logic “0” —the opposite of how they are defined here, but these definitions are arbitrary, and the scope of the disclosure is not limited in this respect.
Since this is a 1-terminal operation (high voltage applied to the word line/gates of the memory cells), this step should be very homogeneous, and all of the cells being erased are readily brought to a high Vt erase (ERS) state, from whatever state they may previously have been in. Only a small amount of pulses (for example, fewer than 5 pulses) need be applied to bring nearly (almost) all of the cells to the desired high Vt erase state. Those cells which are not fully erased in this step will be corrected in the subsequent CHE Refresh step, described hereinbelow (and illustrated in
A verify operation can be performed on a very small population, since all that is needed is a flag to show that a sector is erased. Even if part of the bits are not fully erased to the high Vt level, they can be recovered as part of the CHE programming step. A great time savings can thus be realized. A typical erase sector size is 128 kilobytes (KB) to 1 megabyte (MB), although the scope of the disclosure is not limited in this respect.
For purposes of this description, a “page” may comprise one word line such as 512 bytes (4096 memory cells), and a “sector” may comprise many pages), although the scope of the disclosure is not limited in this respect.
For purposes of this description, the erase (ERS) state is high Vt, and is deemed to be logic “1”), although the scope of the disclosure is not limited in this respect.
HHI—First Programming Step
Next, a first programming step is performed using BBHHI (band-to-band hot hole injection) page data insertion. (BBHHI is simply a different nomenclature for HHI. For purposes of this discussion, the first programming step is hot hole injection.)
This HHI first programming step may be implemented using the following exemplary voltages.
Note that the source (or left terminal for programming the right bit) voltage Vs is “shunt” or “floating”. This is typical for a HHI operation. The initial level for the source voltage (Vs) may be close to 0 v. As the operation advances, Vs may be increased until an equilibrium reached, typically at a few volts. When the source voltage (Vs) is increasing (from 0 to a few volt), a disturb (in a neighboring cell on the same BL, different WL where inhibit voltage of ˜+2-3V is applied ) may be induced. In order to avoid this, a shunt resistor may be used to force the source voltage (Vs) to be brought to a predetermined state, very fast and avoid the disturb. The bits on the same WL may also suffer from disturb, but this happens only for the short time of the HHI operation on that specific WL. In the case of the neighbor cells with the inhibit WL voltage, their disturb can happen over many write cycles, since any erase sector has typically 16-64 WLs and 8-16 erase sectors typically share the same BL. As an example, for a physical sector with 8 erase sectors the neighbor inhibit may happen 7*10K cycles or 70K times.
These conditions are sufficient to cause the desired programming of a selected storage area in the NROM memory cell, and may be repeated (with source and drain reversed) to program the other storage area in the NROM memory cell, although the scope of the disclosure is not limited in this respect.
Using PHI, hot holes are injected into the desired storage area, which lowers Vt (program to logic “0”). However, since this is a 2-terminal operation, there may be an undesired effect on a neighboring memory cell, as discussed in greater detail hereinbelow.
Because the HHI programming is not perfect (the states of neighboring cells may be affected), it can be through of as a “partial programming”, or as a first of two (or more) programming steps, as described hereinbelow.
These programming voltages for HHI are applied as pulses, typically of 10 microseconds (10 μsec to 50 μsec) each, and a few pulses (comprising cycles of program then verify) may be required to obtain the desired decrease in Vt. Each pulse is followed by a verify (read) to determine whether the desired reduction in Vt has been achieved. Generally, no more than 5 pulses will be required. It is important to understand that only half of the BLs can be programmed simultaneously in the same page. No two neighboring BLs (such as BL(n) & BL(n+1)) can have the BL voltage in the same time. This is typically not a problem, because a typical page may have 1-16K BLs associated with it, and the data insertion is in smaller groups like 128 to 512 bit's in the same time. This provides a distance of more than 2 BLs away from each other during a HHI BL pulse.
Since this is a 2-terminal operation (gate plus drain), the programming of a bit of one cell can affect (alter, change, modify) the state of a bit in a neighboring cell.
Referring back to
Whereas the term “disturb” may include slight changes in Vt, what we are talking about here is clearly and suddenly changing the state of (programming) a bit that is not desired to be changed. This is simply an inherent result of the 2-terminal operation in conjunction with the array architecture. Thus, using HHI by itself would not be suitable for programming, which is why there is a further step of CHE refresh, described hereinbelow.
For example (Case #1), to start with (after FNT erase, before HHI program), all bits are erased. For example (referring to
If both of these bits are supposed to remain binary “1”, there is no need for programming either one of them.
If, on the other hand, it is desired to program the right bit of cell “d” to binary “0”, and leave the left bit of cell “e” at binary “1”, this cannot be done with the 2-terminal HHI program step. By programming one of the bits to binary “0”, the other one of the bits sharing the same bit line (BL(n)) will be programmed to “0”, and will need to be “refreshed” to binary “1”, as described hereinbelow.
This effect of one bit on another, sharing the same bit line can be called a “disturb”. In the traditional sense, “disturb” is when the Vt of a cell (or a bit of a cell) is affected, however slightly, as a result of an operation being performed on another neighboring or nearby cell (or another bit of the same cell). Sometimes, disturbs can be small, and may not have an effect until many operating cycles. What is happening here, although it may be referred to as “disturb” is more of an undesired (unnecessary) programming of a bit than a disturb, and may be conceptualized as a large disturb. One operating cycle and “the damage is done”, and needs to be corrected (desired logic state of the disturbed bit refreshed), as described hereinbelow.
CHE—Second Programming Step
Next, a second programming step (which may also referred to as “refresh” or “recovery”) is performed using CHE to recover (refresh) data of low Vt bits (disturbed/unavoidably programmed in the previous step) that need to be high Vt.
This CHE second programming step may be implemented using the following exemplary voltages.
In this step, the source is grounded, rather than shunted, because it is needed as a source of electrons for CHE, although the scope of the disclosure is not limited in this respect.
These conditions are sufficient to cause channel hot electrons (CHE) to be injected into the storage area, which increases the Vt of the storage area (for example, of the storage area 323 over the right diffusion acting as drain, see
These CHE recovery operation voltages are applied as pulses, typically of 150 nanoseconds (150 ns) each, and a few pulses (comprising cycles of program then verify) may be required to obtain the desired increase in Vt. Generally, no more than 5 pulses will be required. It can be observed that this second (CHE) programming step proceeds much faster, such as approximately 50-100 faster than the previous first (HHI) programming step. (150 nanoseconds is one tenth of 1.5 microseconds, and one-hundredth of 15 microseconds.)
Pulses, followed by verify are used to bring bits which were unavoidably programmed in the previous HHI step back to their desired (pre-programmed) high Vt state (binary “1”). A bit which was unnecessarily programmed (to binary “0”), needs to be erased (back to binary “1”). This is called “refresh”.
Using the previous example (cells “d” and “e”,
Recall, from above, that in the ENT erase operation, only a few bits were verified. Then the process was stopped. It is possible (expected, statistically likely) that some of the bits did not quite make it to Vt>EV. This would generally not be acceptable, without the following.
This illustrates a major advantage of the method disclosed herein. Since it is only necessary to verify a few bits in the FNT erase step, a lot of time can be saved. Bits which were not fully erased in the FNT erase step can easily be corrected (to binary “1”) in the CHE Refresh step. For example, a typical number of erased bits that needs CHE due to HHI are <25% and never exceeds 50%. The number of erased bits that needs refresh due to their Vt<PV is less than 1%.
Exemplary conditions for the FNT, HHI and CHE operations (steps) described hereinabove, in the FNT & HHI+CHE NROM mode of operation disclosed herein are:
The erase and program operations may typically be performed using a few cycles of pulses followed by verify (read).
Advantages of the FNT & HHI+CHE mode of operation disclosed herein may include,
Because FNT to high Vt is chosen as the erase mechanism, over-erase is generally not a problem, and because FNT is a 1-terminal operation on the WL (gate), there is generally no concern of BL to BL leakage due to the erase operation.
Generally, PAE or PBE can be avoided because the first step (erase) is to a high Vt, rather than to a low Vt. By avoiding performing PAE or PBE to ensure reliability, a significant time savings can be realized, although the scope of the disclosure is not limited in this respect. (In a sense, the CHE step substitutes for, or eliminates the need for, PAE.)
Better scaling is generally in contrast to a typical CHE program mode of operation because this FNT & HHI+CHE mode of operation does not use CHE injection in the first two steps, thereby statistically significantly reducing the need for CHE, which is a very high power operation. Thus, for a given power limitation (budget), more cells can be programmed than otherwise, if one were to rely solely on CHE for programming.
Better scaling is also a result primarily of performing erase to a high Vt, rather than to a low Vt, although the scope of the disclosure is not limited in this respect.
Disadvantages of the FNT & HHI+CUE mode of operation disclosed herein may include, it generally requires having very thin ONO (such as 1 nm per volt), and is subject to programming disturb problems (FNT generally requires thin lower oxide to function successfully—approximately 1 volt per nanometer (nm)), although the scope of the disclosure is not limited in this respect.
Regarding the dependency on thin ONO, typical ONO dimensions thicknesses are:
For performing the FNT & HHI+CHE mode of operation disclosed herein, the ONO layer may have the following thicknesses:
Part 2. Page Write HIII+CHE Programming, No Erase
This technique (NROM mode of operation) may be referred to herein simply as “HHI+CHE, No Erase”, and shares many components with the above-described “FNT & HHI+CHE” mode of operation, the teachings of which are expressly incorporated in their entirety by reference herein.
The horizontal axis in the diagrams represents threshold voltage (Vt), left is low, right is high. In the diagrams, three levels of threshold voltage (Vt) are illustrated:
The abbreviation ERS stands for “erase”. The abbreviation PGM stands for “program”.
Typically, the difference (delta Vt) between EV and PV may be 1.5 volts (EV=PV+1.5), and RD may equal PV plus 0.5 volts (RD=PV+0.5), or EV minus 1.0 volts (RD=EV−1.0), although the scope of the disclosure is not limited in this respect.
Generally, in contrast with the above-described FNT & HHI+CHE mode of operation this HHI+CHE Programming, No Erase mode of operation further reduces the erase time, to zero, although the scope of the disclosure is not limited in this respect.
Generally, in a manner similar to the above-described FNT & HHI+CHE mode of operation this HHI+CHE, No Erase mode of operation essentially doubles the programming time, which can result in a net savings of time, although the scope of the disclosure is not limited in this respect.
In contrast with the above-described FNT & HHI+CHE mode of operation, in this HHI+CHE, No Erase mode of operation, the erase step using FN electron tunneling to establish a high initial Vt is omitted. Therefore, in essence, the erase time is zero.
In this HHI+CHE, No Erase mode of operation, data alteration (programming) is accomplished using HHI/CHE (1st programming—CHE).
PAE is essentially part of CHE programming, and PBE is not required.
Exemplary conditions for the HHI+CHE, No Erase NROM mode of operation are:
The erase and program operations may typically be performed using a few cycles of pulses followed by verify (read).
Advantages of the mode of operation disclosed in this section may include,
To start with, before performing the HHI+CHE, No Erase mode of operation, some bits will be in an erase (ERS) state (binary “1”, Vt>EV), and other bits will be in the program (PGM) state (binary “0”, Vt<PV).
Generally, the goal is to take some (selected ones) of the bits from the erase (ERS) state (binary “1”) to the program (P GM) state (binary “0”), and leave other bits in the erase (ERS) state binary “1”). This is “programming”.
In a first step, HHI is used to take the necessary bits from the erase (ERS) state (binary “1”) to the program (PGM) state (binary “0”).
In this first program step (HHI), all bits that are being programmed must be verified. (Similar situation with
In
Before performing this step, some bits will be in the PGM state (low Vt, logic “0”), and other bits will be in the ERS state (high Vt, logic “1”). Before writing (programming) a bit, it is first read to determine whether it is in the desired logic state, or not.
As described hereinabove with regard to the FNT & HHI+CHE mode of operation, programming one bit (to binary “0”) can have an undesired, unnecessary effect of programming an other bit sharing the same bit line (to binary “0”), and the correct state of the other bit will need to be refreshed (restored).
For example, if is desired to bring the right bit of the left cell (“d”) to 0, the left bit of the right cell (“e”) will also be brought to logic “0”.
Therefore, as shown in
Exemplary voltages for performing the HHI erase step are:
Reasons why the HHI voltages in the programming step of this HHI+CHE, No Erase mode of operation may be different than the HHI voltages in the programming step of the previously described FNT & HHI+CHE mode of operation due to the smallest number of bits that needs the HHI. This permits a typically faster erase time in this case, hence, the voltages may be slightly different.
Exemplary voltages for performing the CHE refresh step in the second programming step:
For performing the HHI+CHE, No Erase mode of operation disclosed herein, the ONO layer may have the following thicknesses (in this case the ONO may be the same as the typical ONO of a standard NROM product):
An advantage of this mode of operation is that the logic can deal with a page at a time since there is no big block erase operation. This simplifies the logic and may result in a smaller die.
While a number of exemplary aspects and embodiments have been discussed above, those of skill in the art will recognize certain modifications, permutations, additions and sub-combinations thereof. It is therefore intended that the following appended claims and claims hereafter introduced be interpreted to include all such modifications, permutations, additions and sub-combinations.
This is a non-provisional filing of U.S. Provisional Application No. 60/774,609, filed 21 Feb. 2006 by Boaz Eitan, incorporated in its entirety by reference herein. Cross-reference is made to commonly-owned, copending U.S. patent application Ser. No. 11/462,011, by Boaz Eitan, entitled “NROM Mode of Operation (HHI+CHE program)”, filed on even date herewith.
Number | Name | Date | Kind |
---|---|---|---|
3881180 | Gosney, Jr. | Apr 1975 | A |
3895360 | Cricchi et al. | Jul 1975 | A |
3952325 | Beale et al. | Apr 1976 | A |
4016588 | Ohya et al. | Apr 1977 | A |
4017888 | Christie et al. | Apr 1977 | A |
4145703 | Blanchard et al. | Mar 1979 | A |
4151021 | McElroy | Apr 1979 | A |
4173766 | Hayes | Nov 1979 | A |
4173791 | Bell | Nov 1979 | A |
4247861 | Hsu et al. | Jan 1981 | A |
4257832 | Schwabe et al. | Mar 1981 | A |
4281397 | Neal et al. | Jul 1981 | A |
4306353 | Jacobs et al. | Dec 1981 | A |
4342102 | Puar | Jul 1982 | A |
4342149 | Jacobs et al. | Aug 1982 | A |
4360900 | Bate | Nov 1982 | A |
4373248 | McElroy | Feb 1983 | A |
4380057 | Kotecha et al. | Apr 1983 | A |
6297143 | Collins | May 1983 | B1 |
4388705 | Sheppard | Jun 1983 | A |
4389705 | Sheppard | Jun 1983 | A |
4404747 | Collins | Sep 1983 | A |
4435786 | Tickle | Mar 1984 | A |
4448400 | Harari | May 1984 | A |
4471373 | Shimizu et al. | Sep 1984 | A |
4494016 | Ransom et al. | Jan 1985 | A |
4507673 | Aoyama | Mar 1985 | A |
4521796 | Rajkanan et al. | Jun 1985 | A |
4527257 | Cricchi | Jul 1985 | A |
4586163 | Koike | Apr 1986 | A |
4613956 | Paterson et al. | Sep 1986 | A |
4630085 | Koyama | Dec 1986 | A |
4663645 | Komori et al. | May 1987 | A |
4665426 | Allen et al. | May 1987 | A |
4667217 | Janning | May 1987 | A |
4672409 | Takei et al. | Jun 1987 | A |
4725984 | Ip et al. | Feb 1988 | A |
4733105 | Shin et al. | Mar 1988 | A |
4742491 | Liang et al. | May 1988 | A |
4758869 | Eitan et al. | Jul 1988 | A |
4760555 | Gelsomini et al. | Jul 1988 | A |
4761764 | Watanabe | Aug 1988 | A |
4769340 | Chang et al. | Sep 1988 | A |
4780424 | Holler et al. | Oct 1988 | A |
4839705 | Tigelaar et al. | Jun 1989 | A |
4847808 | Kobatake | Jul 1989 | A |
4857770 | Partovi et al. | Aug 1989 | A |
4870470 | Bass, Jr. et al. | Sep 1989 | A |
4888735 | Lee et al. | Dec 1989 | A |
4916671 | Ichiguchi | Apr 1990 | A |
4941028 | Chen et al. | Jul 1990 | A |
4961010 | Davis | Oct 1990 | A |
4992391 | Wang | Feb 1991 | A |
5021999 | Kohda et al. | Jun 1991 | A |
5027321 | Park | Jun 1991 | A |
5029063 | Lingstaedt et al. | Jul 1991 | A |
5042009 | Kazerounian et al. | Aug 1991 | A |
5075245 | Woo et al. | Dec 1991 | A |
5081371 | Wong | Jan 1992 | A |
5086325 | Schumann et al. | Feb 1992 | A |
5094968 | Schumann et al. | Mar 1992 | A |
5104819 | Freiberger et al. | Apr 1992 | A |
5117389 | Yiu | May 1992 | A |
5120672 | Mitchell et al. | Jun 1992 | A |
5142495 | Canepa | Aug 1992 | A |
5142496 | Van Buskirk | Aug 1992 | A |
5159570 | Mitchell et al. | Oct 1992 | A |
5168334 | Mitchell et al. | Dec 1992 | A |
5172338 | Mehrotra et al. | Dec 1992 | A |
5175120 | Lee | Dec 1992 | A |
5204835 | Eitan | Apr 1993 | A |
5214303 | Aoki | May 1993 | A |
5237213 | Tanoi | Aug 1993 | A |
5241497 | Komarek | Aug 1993 | A |
5260593 | Lee | Nov 1993 | A |
5268861 | Hotta | Dec 1993 | A |
5276646 | Kim et al. | Jan 1994 | A |
5280420 | Rapp | Jan 1994 | A |
5289412 | Frary et al. | Feb 1994 | A |
5293563 | Ohta | Mar 1994 | A |
5295092 | Hotta et al. | Mar 1994 | A |
5295108 | Higa | Mar 1994 | A |
5305262 | Yoneda | Apr 1994 | A |
5311049 | Tsuruta | May 1994 | A |
5315541 | Harari et al. | May 1994 | A |
5324675 | Hayabuchi | Jun 1994 | A |
5334555 | Sugiyama et al. | Aug 1994 | A |
5335198 | Van Buskirk et al. | Aug 1994 | A |
5338954 | Shimoji | Aug 1994 | A |
5345425 | Shikatani | Sep 1994 | A |
5349221 | Shimoji | Sep 1994 | A |
5350710 | Hong et al. | Sep 1994 | A |
5352620 | Komori et al. | Oct 1994 | A |
5357134 | Shimoji | Oct 1994 | A |
5359554 | Odake et al. | Oct 1994 | A |
5361343 | Kosonocky et al. | Nov 1994 | A |
5366915 | Kodama | Nov 1994 | A |
5375094 | Naruke | Dec 1994 | A |
5381374 | Shiraishi et al. | Jan 1995 | A |
5393701 | Ko et al. | Feb 1995 | A |
5394355 | Uramoto et al. | Feb 1995 | A |
5399891 | Yiu et al. | Mar 1995 | A |
5400286 | Chu et al. | Mar 1995 | A |
5402374 | Tsuruta et al. | Mar 1995 | A |
5412601 | Sawada et al. | May 1995 | A |
5414693 | Ma et al. | May 1995 | A |
5418176 | Yang et al. | May 1995 | A |
5418743 | Tomioka et al. | May 1995 | A |
5422844 | Wolstenholme et al. | Jun 1995 | A |
5424567 | Chen | Jun 1995 | A |
5424978 | Wada et al. | Jun 1995 | A |
5426605 | Van Berkel et al. | Jun 1995 | A |
5434825 | Harari et al. | Jul 1995 | A |
5436478 | Bergemont et al. | Jul 1995 | A |
5436481 | Egawa et al. | Jul 1995 | A |
5440505 | Fazio et al. | Aug 1995 | A |
5450341 | Sawada et al. | Sep 1995 | A |
5450354 | Sawada et al. | Sep 1995 | A |
5455793 | Amin et al. | Oct 1995 | A |
5467308 | Chang et al. | Nov 1995 | A |
5477499 | Van Buskirk et al. | Dec 1995 | A |
5495440 | Asakura | Feb 1996 | A |
5496753 | Sakurai et al. | Mar 1996 | A |
5508968 | Collins et al. | Apr 1996 | A |
5518942 | Shrivastava | May 1996 | A |
5521870 | Ishikawa | May 1996 | A |
5523251 | Hong | Jun 1996 | A |
5523972 | Rashid et al. | Jun 1996 | A |
5530803 | Chang et al. | Jun 1996 | A |
5534804 | Woo | Jul 1996 | A |
5537358 | Fong | Jul 1996 | A |
5544116 | Chao et al. | Aug 1996 | A |
5553018 | Wang et al. | Sep 1996 | A |
5553030 | Tedrow et al. | Sep 1996 | A |
5557221 | Taguchi et al. | Sep 1996 | A |
5557570 | Iwahashi | Sep 1996 | A |
5559687 | Nicollini et al. | Sep 1996 | A |
5563823 | Yiu et al. | Oct 1996 | A |
5566125 | Fazio et al. | Oct 1996 | A |
5568085 | Eitan et al. | Oct 1996 | A |
5579199 | Kawamura et al. | Nov 1996 | A |
5581252 | Thomas | Dec 1996 | A |
5583808 | Brahmbhatt | Dec 1996 | A |
5590068 | Bergemont | Dec 1996 | A |
5590074 | Akaogi et al. | Dec 1996 | A |
5592417 | Mirabel | Jan 1997 | A |
5596527 | Tomioka et al. | Jan 1997 | A |
5599727 | Hakozaki et al. | Feb 1997 | A |
5600586 | Lee et al. | Feb 1997 | A |
5604804 | Micali | Feb 1997 | A |
5606523 | Mirabel | Feb 1997 | A |
5608679 | Mi et al. | Mar 1997 | A |
5612642 | McClinyock | Mar 1997 | A |
5617357 | Haddad et al. | Apr 1997 | A |
5623438 | Guritz et al. | Apr 1997 | A |
5627790 | Golla et al. | May 1997 | A |
5633603 | Lee | May 1997 | A |
5636288 | Bonneville et al. | Jun 1997 | A |
5644531 | Kuo et al. | Jul 1997 | A |
5654568 | Nakao | Aug 1997 | A |
5656513 | Wang et al. | Aug 1997 | A |
5657332 | Auclair et al. | Aug 1997 | A |
5661060 | Gill et al. | Aug 1997 | A |
5663907 | Frayer et al. | Sep 1997 | A |
5666365 | Kostreski | Sep 1997 | A |
5672959 | Der | Sep 1997 | A |
5675280 | Nomura | Oct 1997 | A |
5677867 | Hazani | Oct 1997 | A |
5677869 | Fazio et al. | Oct 1997 | A |
5683925 | Irani et al. | Nov 1997 | A |
5689459 | Chang et al. | Nov 1997 | A |
5694356 | Wong et al. | Dec 1997 | A |
5696929 | Hasbun et al. | Dec 1997 | A |
5708608 | Park et al. | Jan 1998 | A |
5712814 | Fratin et al. | Jan 1998 | A |
5712815 | Bill et al. | Jan 1998 | A |
5715193 | Norman | Feb 1998 | A |
5717581 | Canclini | Feb 1998 | A |
5717632 | Richart et al. | Feb 1998 | A |
5717635 | Akatsu | Feb 1998 | A |
5721781 | Deo et al. | Feb 1998 | A |
5726946 | Yamagata et al. | Mar 1998 | A |
5748534 | Dunlap et al. | May 1998 | A |
5751037 | Aozasa et al. | May 1998 | A |
5751637 | Chen et al. | May 1998 | A |
5754475 | Bill et al. | May 1998 | A |
5760445 | Diaz | Jun 1998 | A |
5760634 | Fu | Jun 1998 | A |
5768192 | Eitan | Jun 1998 | A |
5771197 | Kim | Jun 1998 | A |
5774395 | Richart et al. | Jun 1998 | A |
5788193 | Lee et al. | Jun 1998 | A |
5777919 | Chi-Yung et al. | Jul 1998 | A |
5781476 | Seki et al. | Jul 1998 | A |
5781478 | Takeuchi et al. | Jul 1998 | A |
5783934 | Tran | Jul 1998 | A |
5784314 | Sali et al. | Jul 1998 | A |
5787036 | Okazawa | Jul 1998 | A |
5793079 | Georgescu et al. | Aug 1998 | A |
5801076 | Ghneim et al. | Sep 1998 | A |
5805500 | Campardo et al. | Sep 1998 | A |
5808506 | Tran | Sep 1998 | A |
5812449 | Song | Sep 1998 | A |
5812456 | Hull et al. | Sep 1998 | A |
5812457 | Arase | Sep 1998 | A |
5815435 | Van Tran | Sep 1998 | A |
5822256 | Bauer et al. | Oct 1998 | A |
5825683 | Chang et al. | Oct 1998 | A |
5825686 | Schmitt-Landsiedel et al. | Oct 1998 | A |
5828601 | Hollmer et al. | Oct 1998 | A |
5834851 | Ikeda et al. | Nov 1998 | A |
5835935 | Estakhri et al. | Nov 1998 | A |
5836772 | Chang et al. | Nov 1998 | A |
5841700 | Chang | Nov 1998 | A |
5847441 | Cutter et al. | Dec 1998 | A |
5861771 | Matsuda et al. | Jan 1999 | A |
5862078 | Eitan | Jan 1999 | A |
5864164 | Wen | Jan 1999 | A |
5867429 | Chen et al. | Feb 1999 | A |
5870334 | Hemink et al. | Feb 1999 | A |
5870335 | Khan et al. | Feb 1999 | A |
5872848 | Romney et al. | Feb 1999 | A |
5875128 | Ishizuka et al. | Feb 1999 | A |
5877537 | Aoki | Feb 1999 | A |
RE36179 | Shimoda | Mar 1999 | E |
5880620 | Gitlin et al. | Mar 1999 | A |
5888927 | Takeuchi | Mar 1999 | A |
5892710 | Fazio et al. | Apr 1999 | A |
5903031 | Yamada et al. | May 1999 | A |
5910924 | Tanaka et al. | Jun 1999 | A |
5912844 | Chen et al. | Jun 1999 | A |
5920503 | Lee et al. | Jul 1999 | A |
5920507 | Takeuchi et al. | Jul 1999 | A |
5926409 | Engh et al. | Jul 1999 | A |
5930195 | Komatsu et al. | Jul 1999 | A |
5933366 | Yoshikawa | Aug 1999 | A |
5933367 | Matsuo et al. | Aug 1999 | A |
5936888 | Sugawara | Aug 1999 | A |
5940332 | Artieri | Aug 1999 | A |
5946258 | Evertt et al. | Aug 1999 | A |
5946558 | Hsu | Aug 1999 | A |
5949714 | Hemink et al. | Sep 1999 | A |
5949728 | Liu et al. | Sep 1999 | A |
5959311 | Shih et al. | Sep 1999 | A |
5963412 | En | Oct 1999 | A |
5963465 | Eitan | Oct 1999 | A |
5966603 | Eitan | Oct 1999 | A |
5969989 | Iwahashi | Oct 1999 | A |
5969993 | Takeshima | Oct 1999 | A |
5973373 | Krautschneider et al. | Oct 1999 | A |
5982666 | Campardo | Nov 1999 | A |
5986940 | Atsumi et al. | Nov 1999 | A |
5990526 | Bez et al. | Nov 1999 | A |
5991202 | Derhacobian et al. | Nov 1999 | A |
5999444 | Fujiwara et al. | Dec 1999 | A |
5999494 | Holzrichter | Dec 1999 | A |
6000006 | Bruce et al. | Dec 1999 | A |
6005423 | Schultz | Dec 1999 | A |
6011725 | Eitan | Jan 2000 | A |
6018186 | Hsu | Jan 2000 | A |
6020241 | You et al. | Feb 2000 | A |
6028324 | Su et al. | Feb 2000 | A |
6030871 | Eitan | Feb 2000 | A |
6034403 | Wu | Mar 2000 | A |
6034896 | Ranaweera et al. | Mar 2000 | A |
6037627 | Kitamura et al. | Mar 2000 | A |
6040610 | Noguchi et al. | Mar 2000 | A |
6044019 | Cernea et al. | Mar 2000 | A |
6044022 | Nachumovsky | Mar 2000 | A |
6063666 | Chang et al. | May 2000 | A |
6064226 | Earl | May 2000 | A |
6064251 | Park | May 2000 | A |
6064591 | Takeuchi et al. | May 2000 | A |
6074916 | Cappelletti | Jun 2000 | A |
6075402 | Ghilardelli | Jun 2000 | A |
6075724 | Li et al. | Jun 2000 | A |
6078518 | Chevallier | Jun 2000 | A |
6081456 | Dadashev | Jun 2000 | A |
6084794 | Lu et al. | Jul 2000 | A |
6091640 | Kawahara et al. | Jul 2000 | A |
6094095 | Murray et al. | Jul 2000 | A |
6097639 | Choi et al. | Aug 2000 | A |
6107862 | Mukainakano et al. | Aug 2000 | A |
6108240 | Lavi et al. | Aug 2000 | A |
6108241 | Chevallier | Aug 2000 | A |
6117714 | Beatty | Sep 2000 | A |
6118207 | Ormerod et al. | Sep 2000 | A |
6118692 | Banks | Sep 2000 | A |
6122198 | Haddad et al. | Sep 2000 | A |
6128226 | Eitan et al. | Oct 2000 | A |
6128227 | Kim | Oct 2000 | A |
6130572 | Ghilardelli et al. | Oct 2000 | A |
6130574 | Bloch et al. | Oct 2000 | A |
6133095 | Eitan et al. | Oct 2000 | A |
6134156 | Eitan | Oct 2000 | A |
6137718 | Reisinger | Oct 2000 | A |
6147904 | Liron | Nov 2000 | A |
6147906 | Bill et al. | Nov 2000 | A |
6150800 | Kinoshita et al. | Nov 2000 | A |
6154081 | Pakkala et al. | Nov 2000 | A |
6156149 | Cheung et al. | Dec 2000 | A |
6157242 | Fukui | Dec 2000 | A |
6157570 | Nachumovsky | Dec 2000 | A |
6163048 | Hirose et al. | Dec 2000 | A |
6163484 | Uekubo | Dec 2000 | A |
6169691 | Pasotti et al. | Jan 2001 | B1 |
6175523 | Yang et al. | Jan 2001 | B1 |
6181597 | Nachumovsky | Jan 2001 | B1 |
6181605 | Hollmer et al. | Jan 2001 | B1 |
6185143 | Perner et al. | Feb 2001 | B1 |
6188211 | Rincon-Mora et al. | Feb 2001 | B1 |
6190966 | Ngo et al. | Feb 2001 | B1 |
6192445 | Rezvani | Feb 2001 | B1 |
6195196 | Kimura et al. | Feb 2001 | B1 |
6297096 | Boaz | Feb 2001 | B1 |
6198342 | Kawai | Mar 2001 | B1 |
6201282 | Eitan | Mar 2001 | B1 |
6201737 | Hollmer et al. | Mar 2001 | B1 |
6205055 | Parker | Mar 2001 | B1 |
6205056 | Pan et al. | Mar 2001 | B1 |
6205059 | Gutala et al. | Mar 2001 | B1 |
6208200 | Arakawa | Mar 2001 | B1 |
6208557 | Bergemont et al. | Mar 2001 | B1 |
6214666 | Mehta | Apr 2001 | B1 |
6215148 | Eitan | Apr 2001 | B1 |
6215697 | Lu et al. | Apr 2001 | B1 |
6215702 | Derhacobian et al. | Apr 2001 | B1 |
6218695 | Nachumovsky | Apr 2001 | B1 |
6219277 | Devin et al. | Apr 2001 | B1 |
6219290 | Chang et al. | Apr 2001 | B1 |
6222762 | Guterman et al. | Apr 2001 | B1 |
6222768 | Hollmer et al. | Apr 2001 | B1 |
6570211 | Guterman et al. | Apr 2001 | B1 |
6233180 | Eitan et al. | May 2001 | B1 |
6240032 | Fukumoto | May 2001 | B1 |
6240040 | Akaogi et al. | May 2001 | B1 |
6246555 | Tham | Jun 2001 | B1 |
6252442 | Malherbe | Jun 2001 | B1 |
6252799 | Liu et al. | Jun 2001 | B1 |
6256231 | Lavi et al. | Jul 2001 | B1 |
6261904 | Pham et al. | Jul 2001 | B1 |
6265268 | Halliyal et al. | Jul 2001 | B1 |
6266281 | Derhacobian et al. | Jul 2001 | B1 |
6272047 | Mihnea et al. | Aug 2001 | B1 |
6275414 | Randolph et al. | Aug 2001 | B1 |
6281545 | Liang et al. | Aug 2001 | B1 |
6282133 | Nakagawa et al. | Aug 2001 | B1 |
6282145 | Tran et al. | Aug 2001 | B1 |
6285246 | Basu | Sep 2001 | B1 |
6285574 | Eitan | Sep 2001 | B1 |
6285589 | Kajitani | Sep 2001 | B1 |
6285614 | Mulatti et al. | Sep 2001 | B1 |
6292394 | Cohen et al. | Sep 2001 | B1 |
6297974 | Ganesan et al. | Oct 2001 | B1 |
6304485 | Harari et al. | Oct 2001 | B1 |
6307784 | Hamilton et al. | Oct 2001 | B1 |
6307807 | Sakui et al. | Oct 2001 | B1 |
6308485 | Harari et al. | Oct 2001 | B1 |
6320786 | Chang et al. | Nov 2001 | B1 |
6324094 | Chevallier | Nov 2001 | B1 |
6326265 | Liu et al. | Dec 2001 | B1 |
6330192 | Ohba et al. | Dec 2001 | B1 |
6331950 | Kuo et al. | Dec 2001 | B1 |
6335874 | Eitan | Jan 2002 | B1 |
6335990 | Chen et al. | Jan 2002 | B1 |
6337502 | Eitan et al. | Jan 2002 | B1 |
6339556 | Watanabe | Jan 2002 | B1 |
6343033 | Parker | Jan 2002 | B1 |
6344959 | Milazzo | Feb 2002 | B1 |
6346442 | Aloni et al. | Feb 2002 | B1 |
6348381 | Jong | Feb 2002 | B1 |
6348711 | Eitan | Feb 2002 | B1 |
6351415 | Kushnarenko | Feb 2002 | B1 |
6353356 | Liu | Mar 2002 | B1 |
6353554 | Banks | Mar 2002 | B1 |
6353555 | Jeong | Mar 2002 | B1 |
6356062 | Elmhurst et al. | Mar 2002 | B1 |
6356469 | Roohparvar et al. | Mar 2002 | B1 |
6359501 | Lin et al. | Mar 2002 | B2 |
6374337 | Estakhri | Apr 2002 | B1 |
6385086 | Mihara et al. | May 2002 | B1 |
6396741 | Bloom et al. | May 2002 | B1 |
6400209 | Matsuyama et al. | Jun 2002 | B1 |
6400607 | Pasotti et al. | Jun 2002 | B1 |
6407537 | Antheunis | Jun 2002 | B2 |
6410388 | Kluth et al. | Jun 2002 | B1 |
6417081 | Thurgate | Jul 2002 | B1 |
6418506 | Pashley et al. | Jul 2002 | B1 |
6426898 | Mihnea et al. | Jul 2002 | B1 |
6429063 | Eitan | Aug 2002 | B1 |
6433624 | Grossnikle et al. | Aug 2002 | B1 |
6436766 | Rangarajan et al. | Aug 2002 | B1 |
6436768 | Yang et al. | Aug 2002 | B1 |
6438031 | Fastow | Aug 2002 | B1 |
6438035 | Yamamoto et al. | Aug 2002 | B2 |
6440797 | Wu et al. | Aug 2002 | B1 |
6442074 | Hamilton et al. | Aug 2002 | B1 |
6445030 | Wu et al. | Sep 2002 | B1 |
6449188 | Fastow | Sep 2002 | B1 |
6449190 | Bill | Sep 2002 | B1 |
6452438 | Li | Sep 2002 | B1 |
6455896 | Chou et al. | Sep 2002 | B1 |
6456528 | Chen | Sep 2002 | B1 |
6456533 | Hamilton et al. | Sep 2002 | B1 |
6458656 | Park et al. | Oct 2002 | B1 |
6458677 | Hopper et al. | Oct 2002 | B1 |
6469929 | Kushnarenko et al. | Oct 2002 | B1 |
6469935 | Hayashi | Oct 2002 | B2 |
6472706 | Widdershoven et al. | Oct 2002 | B2 |
6477085 | Kuo | Nov 2002 | B1 |
6490204 | Bloom et al. | Dec 2002 | B2 |
6496414 | Kasa et al. | Dec 2002 | B2 |
6504756 | Gonzalez et al. | Jan 2003 | B2 |
6510082 | Le et al. | Jan 2003 | B1 |
6512701 | Hamilton et al. | Jan 2003 | B1 |
6519180 | Tran et al. | Feb 2003 | B2 |
6519182 | Derhacobian et al. | Feb 2003 | B1 |
6522585 | Pasternak | Feb 2003 | B2 |
6525969 | Kurihara et al. | Feb 2003 | B1 |
6528390 | Komori et al. | Mar 2003 | B2 |
6529412 | Chen et al. | Mar 2003 | B1 |
6532173 | Lioka et al. | Mar 2003 | B2 |
6535020 | Yin | Mar 2003 | B1 |
6535434 | Maayan et al. | Mar 2003 | B2 |
6537881 | Rangarjan et al. | Mar 2003 | B1 |
6538270 | Randolph et al. | Mar 2003 | B1 |
6541816 | Ramsbey et al. | Apr 2003 | B2 |
6552387 | Eitan | Apr 2003 | B1 |
6555436 | Ramsbey et al. | Apr 2003 | B2 |
6559500 | Torii | May 2003 | B2 |
6562683 | Wang et al. | May 2003 | B1 |
6566194 | Ramsbey et al. | May 2003 | B1 |
6566699 | Eitan | May 2003 | B2 |
6567303 | Hamilton et al. | May 2003 | B1 |
6567312 | Torii et al. | May 2003 | B1 |
6574139 | Kurihara | Jun 2003 | B2 |
6577514 | Shor et al. | Jun 2003 | B2 |
6577532 | Chevallier | Jun 2003 | B1 |
6577547 | Ukon | Jun 2003 | B2 |
6583005 | Hashimoto et al. | Jun 2003 | B2 |
6583479 | Fastow et al. | Jun 2003 | B1 |
6584017 | Maayan et al. | Jun 2003 | B2 |
6590811 | Hamilton et al. | Jul 2003 | B1 |
6593606 | Randolph et al. | Jul 2003 | B1 |
6608526 | Sauer | Aug 2003 | B1 |
6608905 | Muza et al. | Aug 2003 | B1 |
6594181 | Yamada | Sep 2003 | B1 |
6614052 | Zhang | Sep 2003 | B1 |
6614295 | Tsuchi | Sep 2003 | B2 |
6614686 | Kawamura | Sep 2003 | B1 |
6614692 | Maayan et al. | Sep 2003 | B2 |
6617179 | Kim | Sep 2003 | B1 |
6617215 | Halliyal et al. | Sep 2003 | B1 |
6618290 | Wang et al. | Sep 2003 | B1 |
6624672 | Confaloneri et al. | Sep 2003 | B2 |
6627555 | Eitan et al. | Sep 2003 | B2 |
6630384 | Sun et al. | Oct 2003 | B1 |
6633496 | Maayan et al. | Oct 2003 | B2 |
6633499 | Eitan et al. | Oct 2003 | B1 |
6633956 | Mitani | Oct 2003 | B1 |
6636440 | Maayan et al. | Oct 2003 | B2 |
6639271 | Zheng et al. | Oct 2003 | B1 |
6639837 | Takano et al. | Oct 2003 | B2 |
6639844 | Liu et al. | Oct 2003 | B1 |
6639849 | Takahashi et al. | Oct 2003 | B2 |
6642148 | Ghandehari et al. | Nov 2003 | B1 |
6642573 | Halliyal et al. | Nov 2003 | B1 |
6642586 | Takahashi | Nov 2003 | B2 |
6643170 | Huang et al. | Nov 2003 | B2 |
6643177 | Le et al. | Nov 2003 | B1 |
6643178 | Kurihara | Nov 2003 | B2 |
6643181 | Sofer et al. | Nov 2003 | B2 |
6645801 | Ramsbey et al. | Nov 2003 | B1 |
6649972 | Eitan | Nov 2003 | B2 |
6650568 | Iijima | Nov 2003 | B2 |
6653190 | Yang et al. | Nov 2003 | B1 |
6653191 | Yang et al. | Nov 2003 | B1 |
6654296 | Jang et al. | Nov 2003 | B2 |
6664588 | Eitan | Dec 2003 | B2 |
6665769 | Cohen et al. | Dec 2003 | B2 |
6670241 | Kamal et al. | Dec 2003 | B1 |
6670669 | Kawamura | Dec 2003 | B1 |
6674138 | Halliyal et al. | Jan 2004 | B1 |
6677805 | Shor et al. | Jan 2004 | B2 |
6680509 | Wu et al. | Jan 2004 | B1 |
6686242 | Willer et al. | Feb 2004 | B2 |
6690602 | Le et al. | Feb 2004 | B1 |
6693483 | Deml et al. | Feb 2004 | B2 |
6700818 | Shappir et al. | Mar 2004 | B2 |
6717207 | Kato | Apr 2004 | B2 |
6723518 | Papsidero et al. | Apr 2004 | B2 |
6731542 | Le et al. | May 2004 | B1 |
6738289 | Gongwer et al. | May 2004 | B2 |
6744692 | Shiota et al. | Jun 2004 | B2 |
6765259 | Kim | Jul 2004 | B2 |
6768165 | Eitan | Jul 2004 | B1 |
6781876 | Forbes et al. | Aug 2004 | B2 |
6788579 | Gregori et al. | Sep 2004 | B2 |
6791396 | Shor et al. | Sep 2004 | B2 |
6794249 | Palm et al. | Sep 2004 | B2 |
6794280 | Chang | Sep 2004 | B2 |
6818956 | Kuo et al. | Nov 2004 | B2 |
6829172 | Bloom et al. | Dec 2004 | B2 |
6831872 | Matsuoka | Dec 2004 | B2 |
6836431 | Chang | Dec 2004 | B2 |
6859028 | Toner | Feb 2005 | B2 |
6870772 | Nitta et al. | Mar 2005 | B1 |
6871258 | Micheloni et al. | Mar 2005 | B2 |
6885585 | Maayan et al. | Apr 2005 | B2 |
6885590 | Zheng et al. | Apr 2005 | B1 |
6906357 | Vashchenko et al. | Jun 2005 | B1 |
6912160 | Yamada | Jun 2005 | B2 |
6917544 | Maayan et al. | Jul 2005 | B2 |
6928001 | Avni et al. | Aug 2005 | B2 |
6937523 | Eshel | Aug 2005 | B2 |
6967872 | Quader et al. | Nov 2005 | B2 |
6996692 | Kuono | Feb 2006 | B2 |
7002850 | Lin et al. | Feb 2006 | B2 |
7079420 | Shappir et al. | Jul 2006 | B2 |
7266014 | Wu et al. | Sep 2007 | B2 |
20010006477 | Banks | Jul 2001 | A1 |
20020004878 | Norman | Jan 2002 | A1 |
20020004921 | Muranaka et al. | Jan 2002 | A1 |
20020057599 | Miyawaki et al. | May 2002 | A1 |
20020064911 | Eitan | May 2002 | A1 |
20020132436 | Eliyahu et al. | Sep 2002 | A1 |
20020140109 | Keshavarzi et al. | Oct 2002 | A1 |
20020145465 | Shor et al. | Oct 2002 | A1 |
20020191465 | Maayan et al. | Dec 2002 | A1 |
20020199065 | Subramoney et al. | Dec 2002 | A1 |
20030001213 | Lai | Jan 2003 | A1 |
20030021149 | So et al. | Jan 2003 | A1 |
20030021155 | Yachareni et al. | Jan 2003 | A1 |
20030072192 | Bloom et al. | Apr 2003 | A1 |
20030076710 | Sofer et al. | Apr 2003 | A1 |
20030095439 | San et al. | May 2003 | A1 |
20030117841 | Yamashita | Jun 2003 | A1 |
20030131186 | Buhr | Jul 2003 | A1 |
20030134476 | Roizin et al. | Jul 2003 | A1 |
20030142544 | Maayan et al. | Jul 2003 | A1 |
20030145176 | Dvir et al. | Jul 2003 | A1 |
20030145188 | Cohen et al. | Jul 2003 | A1 |
20030155659 | Verma et al. | Aug 2003 | A1 |
20030190786 | Ramsbey et al. | Oct 2003 | A1 |
20030197221 | Shinozaki et al. | Oct 2003 | A1 |
20030202411 | Yamada | Oct 2003 | A1 |
20030206435 | Takahashi | Nov 2003 | A1 |
20030208663 | Van Buskirk et al. | Nov 2003 | A1 |
20030209767 | Takahashi et al. | Nov 2003 | A1 |
20030214844 | Iijima | Nov 2003 | A1 |
20030218207 | Hashimoto et al. | Nov 2003 | A1 |
20030218913 | Le et al. | Nov 2003 | A1 |
20030222303 | Fukuda et al. | Dec 2003 | A1 |
20030227796 | Miki et al. | Dec 2003 | A1 |
20040007730 | Chou et al. | Jan 2004 | A1 |
20040012993 | Kurihara | Jan 2004 | A1 |
20040013000 | Torii | Jan 2004 | A1 |
20040014290 | Yang et al. | Jan 2004 | A1 |
20040021172 | Zheng et al. | Feb 2004 | A1 |
20040027858 | Takahashi et al. | Feb 2004 | A1 |
20040014280 | Willer et al. | May 2004 | A1 |
20040151034 | Shor et al. | Aug 2004 | A1 |
20040153621 | Polansky et al. | Aug 2004 | A1 |
20040156238 | Yeh et al. | Aug 2004 | A1 |
20040157393 | Hwang | Aug 2004 | A1 |
20040222437 | Avni et al. | Nov 2004 | A1 |
20050078527 | Liu et al. | Apr 2005 | A1 |
20050117395 | Maayan et al. | Jun 2005 | A1 |
20050140405 | Do et al. | Jun 2005 | A1 |
20050117601 | Anderson et al. | Sep 2005 | A1 |
20050232024 | Atir et al. | Oct 2005 | A1 |
20060084219 | Lusky et al. | Apr 2006 | A1 |
20060126382 | Maayan et al. | Jun 2006 | A1 |
20060126983 | Shappir et al. | Jun 2006 | A1 |
20060256606 | Park | Nov 2006 | A1 |
20070081393 | Lue et al. | Apr 2007 | A1 |
20070120171 | He et al. | May 2007 | A1 |
Number | Date | Country |
---|---|---|
0 656 628 | Jun 1995 | EP |
0751560 | Jun 1995 | EP |
0693781 | Jan 1996 | EP |
0 822 557 | Feb 1998 | EP |
0 843 398 | May 1998 | EP |
0580467 | Sep 1998 | EP |
0461764 | Jul 2000 | EP |
1 071 096 | Jan 2001 | EP |
1073120 | Jan 2001 | EP |
1 091 418 | Apr 2001 | EP |
1126468 | Aug 2001 | EP |
0740307 | Dec 2001 | EP |
1164597 | Dec 2001 | EP |
1 207 552 | May 2002 | EP |
1 223 586 | Jul 2002 | EP |
1 365 452 | Nov 2003 | EP |
001217744 | Mar 2004 | EP |
1297899 | Nov 1972 | GB |
2157489 | Mar 1985 | GB |
54-053929 | Apr 1979 | JP |
60-200566 | Oct 1985 | JP |
60201594 | Oct 1985 | JP |
63-249375 | Oct 1988 | JP |
3-285358 | Dec 1991 | JP |
04-226071 | Aug 1992 | JP |
04-291962 | Oct 1992 | JP |
05021758 | Jan 1993 | JP |
05-326893 | Dec 1993 | JP |
06151833 | May 1994 | JP |
06-232416 | Aug 1994 | JP |
07193151 | Jul 1995 | JP |
08-106791 | Apr 1996 | JP |
08-297988 | Nov 1996 | JP |
09-017981 | Jan 1997 | JP |
09162314 | Jun 1997 | JP |
10-106276 | Apr 1998 | JP |
10 334676 | Dec 1998 | JP |
11-162182 | Jun 1999 | JP |
11-354758 | Dec 1999 | JP |
2001-085646 | Mar 2001 | JP |
2001-118392 | Apr 2001 | JP |
2001-156189 | Jun 2001 | JP |
2002-216488 | Aug 2002 | JP |
3358663 | Oct 2002 | JP |
WO 8100790 | Mar 1981 | WO |
WO 9615553 | May 1996 | WO |
WO 9625741 | Aug 1996 | WO |
WO 9803977 | Jan 1998 | WO |
WO 9931670 | Jun 1999 | WO |
WO 9957728 | Nov 1999 | WO |
WO 0046808 | Aug 2000 | WO |
WO 0165566 | Sep 2001 | WO |
WO 0165567 | Sep 2001 | WO |
WO 0184552 | Nov 2001 | WO |
WO 0243073 | May 2002 | WO |
WO 03032393 | Apr 2003 | WO |
WO 03036651 | May 2003 | WO |
WO 03054964 | Jul 2003 | WO |
WO 03063167 | Jul 2003 | WO |
WO 03063168 | Jul 2003 | WO |
WO 03079370 | Sep 2003 | WO |
WO 03079446 | Sep 2003 | WO |
WO 03083916 | Oct 2003 | WO |
WO 03088258 | Oct 2003 | WO |
WO 03088259 | Oct 2003 | WO |
WO 03088260 | Oct 2003 | WO |
WO 03088261 | Oct 2003 | WO |
WO 03088353 | Oct 2003 | WO |
WO 03100790 | Dec 2003 | WO |
Number | Date | Country | |
---|---|---|---|
20070195607 A1 | Aug 2007 | US |
Number | Date | Country | |
---|---|---|---|
60774609 | Feb 2006 | US |