CN100593213C - Memory device with multiple partitions - Google Patents

Memory device with multiple partitions Download PDF

Info

Publication number
CN100593213C
CN100593213C CN200610086737A CN200610086737A CN100593213C CN 100593213 C CN100593213 C CN 100593213C CN 200610086737 A CN200610086737 A CN 200610086737A CN 200610086737 A CN200610086737 A CN 200610086737A CN 100593213 C CN100593213 C CN 100593213C
Authority
CN
China
Prior art keywords
order
authentication
subregion
command
communications protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200610086737A
Other languages
Chinese (zh)
Other versions
CN101093720A (en
Inventor
陈孟豪
卢俊丞
刘坤旺
林奉锡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Liangfa Science & Technology Co Ltd
Asour Tech Inc
Original Assignee
Liangfa Science & Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Liangfa Science & Technology Co Ltd filed Critical Liangfa Science & Technology Co Ltd
Priority to CN200610086737A priority Critical patent/CN100593213C/en
Publication of CN101093720A publication Critical patent/CN101093720A/en
Application granted granted Critical
Publication of CN100593213C publication Critical patent/CN100593213C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A memory device with multiple sub-region is prepared for forming nonvolatile internal memory by a user region with multiple sub-region as one sub-region being set to be visible sub-region and a systemregion being used to store configuration information of said visible sub-region and being used to record identification information of said visible sub-region and to record support communication protocol, using controller to make access on visible sub-region according to said configuration information and access command compatible in support communication protocol.

Description

The memory storage of tool multi-division
Technical field
What the present invention relates to is a kind of memory storage, particularly be the memory storage of a kind of tool multi-division (multi-partition).
Background technology
Along with advancing by leaps and bounds of Information technology, people present volatile growth especially to the demand in various information.In recent years, the universalness of numerous small-sized portable memory devices (Portable Memory Device), for example with flash memory (Flash Memory) be main storage medium carry-on dish (the USB FlashDisk of USB (USB (universal serial bus)), be commonly called as silicon disk machine or thumb brother), and comprise small size flash memory (Compact Flash, CF), memory stick (Memory Stick, MS), secure digital (Secure Digital, SD), multimedia card (Multi MediaCard, MMC) or the like the various flash memory cards (Flash Memory Card) of all size label, use the micro hard disk (Micro Hard Disk) of CF or USB interface, perhaps or even adopt USB or pcmcia interface and device slim 2.5 inches Winchester disk drive (Hard Disk) in external connection box or the like, people have been satisfied especially in the portable serious hope that hurriedly increases with day of information.
Existing portable memory device, its inside include a non-volatile storage array (Non-VolatileMemory Array), a controller (Controller) and a transmission interface (I/O Interface).This storage array is to be used in to store the user and want the data that store, and it must have the characteristic that still can preserve stored data under the situation that does not need extraneous power supply, often is to be used as this storage array with flash memory therefore, and certain, it can also be a hard disk.In controller, then include in order to drive (Drive) and required interlock circuit, interface and the driving mechanism of this storage array of access (Access).This driving mechanism can be to exist to carry out a series of microcode (Micro-Code) program or also can be that microcontroller/microprocessor (Micro-Controller/Micro-Processor) circuit form with hardware (Hardware) exists to carry out the mode of a succession of firmware (Firmware) program with the control program of hardware (Hardware) (Command Sequencer) circuit form, is present in the controller of this portable memory device.This transmission interface determines then this portable memory device is with which kind of communications protocol (Protocol) to combine and communication with external device (or main frame (host)).
And in the storage card of all size, the flash memory array that includes is divided into three zones usually, and one is the user zone, is to store user's data.Another is the zone (Secure Area) of maintaining secrecy, and is the zone that stores the specific confidentiality agreement of storage card (as the CPRM agreement of SD card) desired data.One is system realm (System Area) again, is required firmware of store controller and relevant desired data.In these three zones, external device can only be at the read-write of user zone with the general read write command of specification institute standard.In these regional data, the user has complete authority and uses, and the data file that application program is stored can't be guaranteed the not deleted and copy of data if be stored in this zone.Though have protection mechanisms such as CPRM as the SD storage card, can provide application program to deposit private data, when being to use CPRM, content must be encrypted earlier, must decipher during use, in arithmetic capabilities such as portable apparatus suitable burden being arranged.In addition, to also can't directly using at the portable apparatus of not supporting CPRM.
Fig. 1 is the area configurations synoptic diagram for the flash memory array 10 of prior art.Be to have to comprise as shown in Figure 1: system realm 11, user zone 12 and the zone 13 of maintaining secrecy.System realm 11 is generally deposited required firmware of memory card controller (controller) and relevant storage data.User zone 12 be the user via the employed zone of external device accessing memory card, the storage card size that the size in user zone can be used for the user.The data that the storage card confidentiality agreement is produced are deposited in secret zone 13, and these regional data can only be come access by relative confidentiality agreement, and the user can not directly read these regional data.For example the confidentiality agreement that adopted of SD card is CPRM, and secret zone can only be with after the instruction of CPRM and meeting the checking of SD controller internal storage data, could the access security zone.
Fig. 2 is the synoptic diagram for existing memory card bus agreement.Memory card bus is divided into order CMD bus and data DAT bus two classes.Be to have to comprise on the CMD bus: order package 20 and response packet 30.The order package 20 include external device to storage card under order (command).Response package 30 includes the state that is produced at previous order package and responds.Be to have the data packet of comprising 40 on the DAT bus.Data packet 40 is to comprise data that external device writes or the data that read from storage card.
Existing storage card utilization order package 20 is assigned reading or write activity the user zone or the zone of maintaining secrecy.Fig. 3 is the detailed block diagram for the order package 20 of Fig. 2.As shown in Figure 3, order package 20 is to comprise: start bit 21, traffic bit 22, command index 23, command parameter 25, circulation verbose checking (CRC) 27 and stop bit 28.Start bit 21, traffic bit 22 and stop bit 28 use for transmission signals identification.Command index 23 is deposited the various command of external device to storage card, for example reads, writes, instruction such as state is found out.Command parameter 25 is the required parameter of order of fill order index 23.Verbose 27 error coded that prevent that command index 23 and command parameter 25 be provided, the mistake that can detect/produce when correcting data transmission checked circulates.
Fig. 4 A to Fig. 4 C is foundation Fig. 3, shows the synoptic diagram of the package of reading order, write command and other order respectively.For asking simplification, only show the main difference place of various command package among the figure.Fig. 4 A is when sending reading order for external device, the rough schematic view of its order package.Be to comprise shown in Fig. 4 A: command index 23 is for supporting the general reading command of specification institute standard, and command parameter 25 is the address of reading of appointment.For example, in the SD storage card, command index 23 is CMD17 and CMD18.Command parameter 25 is the address of reading of one 32 bit lengths.Is unit in SD storage card v1.01 addressing with byte (Byte), and SD storage card v2.0 addressing is a unit with 512 bytes.
Fig. 4 B is when sending write command for external device, the rough schematic view of its order package.Be to comprise shown in Fig. 4 B: command index 23 generally writes instruction for what support specification institute standard, and command parameter 25 is one to write the address.For example, in the SD storage card, command index 23 is CMD24 and CMD25.Command parameter 25 is the address that writes of one 32 bit lengths.
Fig. 4 C is when sending other order for external device, the rough schematic view of its order package.Other instruction that command index 23 is comprised is to comprise: smear write command, state and find out instruction and manufacturer's reserve statement.Command parameter 25 is to comprise: information bits and filler, form the data field position of a regular length.
And in the storage card of all size, though for archives economy standard to some extent, but not to define the consistent practice at multi-division, though the user can utilize the application software on certain external device to cut out multi-division, but on other different external device, possibly can't these multi-divisions of access, and cause compatibility issue.In addition, some specification has the problem that can't recall compatibility (backward compatible).For example,, only support the external device of previous SD version just can't read to high power capacity (High Capacity) card at SD storage card v2.0, and the restriction and the inconvenience that cause the user to use.
Summary of the invention
Therefore, one of purpose of the present invention provides a kind of memory storage of tool multi-division, the compatibility issue when avoiding the access of different external connection device.
Another object of the present invention provides a kind of memory storage of tool multi-division, to avoid the compatible problem of recalling between the different size version.
In one embodiment of this invention, provide a kind of memory storage of tool multi-division, it comprises the controller that a non-voltile memory and couples mutually.This non-voltile memory comprises: a user zone, comprise a plurality of subregions (partition), and a subregion wherein is set at visible partition; And a system realm, storing the configuration info of this visible partition, this configuration info writes down the identifying information of this visible partition and supports communications protocol.This controller foundation one access command and this configuration info, this visible partition of access, wherein this access command is to be compatible with this support communications protocol.
In another embodiment of the present invention, provide a kind of memory storage of tool multi-division, it supports a standard communications protocol.This memory storage comprises: a non-voltile memory, comprise a user zone, and this user zone comprises an authentication subregion and an authentication subregion; One transmission interface, in order to receiving an authentication information from an external device, this authentication information have one not standard at the authentication format of this standard communications protocol; And a controller, be coupled to this transmission interface and this non-voltile memory, in order to according to this authentication information, whether decision allows this authentication subregion of this external device access.
In an embodiment more of the present invention, provide a kind of memory storage of tool multi-division, it supports a standard communications protocol.This memory storage comprises the controller that a non-voltile memory and couples mutually.This non-voltile memory comprises: a user zone comprises a plurality of subregions; And a system realm, store the positional information of each subregion.This controller is the positional information according to an access command and each subregion, those subregions of access, and wherein this access command is compatible in this standard communications protocol.
The invention provides a kind of memory storage of tool multi-division, is to support a standard communications protocol, and this memory storage comprises:
One non-voltile memory comprises a user zone, and this user zone comprises an authentication subregion and a non-authentication subregion;
One transmission interface, in order to receiving an authentication information from an external device, this authentication information have one not standard at the authentication format of this standard communications protocol; And
One controller is coupled to this transmission interface and this non-voltile memory, in order to according to this authentication information, determines whether to allow this authentication subregion of this external device access;
Wherein, this authentication information be contained in being following both one of them: a manufacturer of this standard communications protocol keeps an order and a write command, wherein this manufacturer to keep order be that this standard communications protocol keeps the order to manufacturer's elasticity utilization; This write command is the general write command of this standard communications protocol institute standard, and specify an address or the non-vanishing address of a lowest order that does not belong to the addressing range of this non-authentication subregion, and this authentication information provides as the data that this general write command will write;
This manufacturer keeps order and comprises command index field and command parameter field, and the value of described command index is selected from the value that this standard communications protocol is allowed, and this manufacturer keeps the order that order provides this authentication information in order to identification; Described command parameter comprises this authentication information.
During enforcement, this authentication information comprises an authentication identification code, and this controller allows this authentication subregion of this external device access.
During enforcement, this standard communications protocol be following one of them: USB (universal serial bus), small size flash memory, memory stick, multimedia card and secure digital.
During enforcement, this authentication subregion comprise following at least one of them: a read-only child partition, the erasable child partition of a single or more than one erasable child partition.
During enforcement, this controller according to this command index field that this manufacturer keeps order, judges that this command parameter field of this manufacturer's reservation order is to include this authentication information after receiving that this manufacturer keeps order.
Below in conjunction with accompanying drawing, be described in more detail with other technical characterictic and advantage the present invention is above-mentioned.
Description of drawings
Fig. 1 is the area configurations synoptic diagram for the flash memory array of prior art;
Fig. 2 is existing memory card bus agreement;
Fig. 3 is the detailed block diagram for the order package of Fig. 2;
Fig. 4 A to Fig. 4 C is foundation Fig. 3, shows the synoptic diagram of the package of reading order, write command and other order respectively;
Fig. 5 is the first embodiment calcspar of the memory storage of tool multi-division of the present invention;
Fig. 6 is the second embodiment calcspar of the memory storage of tool multi-division of the present invention;
Fig. 7 is the 3rd an embodiment calcspar of the memory storage of tool multi-division of the present invention.
Description of reference numerals: the flash memory array of 10-prior art; The 11-system realm; 12-user zone; 13-maintains secrecy regional; 20-orders package; The 21-start bit; The 22-traffic bit; The 23-command index; The 25-command parameter; 27-verbose the checking of circulating; The 28-stop bit; 30-responds package; The 40-data packet; 50,60, the memory storage of 70-tool multi-division; 51,61,71-non-voltile memory; 511,611,711-user zone; 5111,5112,5113,7111, the subregion in 7112-user zone; 512,712-system realm; 52,62,72-transmission interface; 53,63,73-controller; 54,64,74-external device; The non-authentication subregion of 6111-; 6112-authenticates subregion.
Embodiment
<the first embodiment 〉
Fig. 5 is the first embodiment calcspar of the memory storage of tool multi-division of the present invention.As shown in Figure 5, memory storage 50 comprises non-voltile memory 51, transmission interface 52 and controller 53.In one embodiment, memory storage 50 is portable apparatus.
Comprise a user zone 511 in the non-voltile memory 51, to store user's data.User zone 511 is divided into a plurality of subregions (number of partitions is also unrestricted, and Fig. 5 is to be example with three subregions), and wherein, subregion 5111 is to be set at visible partition.Also comprise a system realm 512 in the non-voltile memory 51, its user zone 511 that do not coexist can be in order to store the configuration info of this visible partition, and this configuration info is the identifying information of record visible partition and supports communications protocol.This identifying information is to be which subregion (as described above, being subregion 5111) in order to the present visible partition of identification; This support communications protocol be the existing standard specification of following industry one of them: USB, CF, MS, MMC and SD.In one embodiment, non-voltile memory 51 is flash memory or hard disk.In another embodiment, the configuration info of this visible partition more writes down the version of this support communications protocol.With the SD specification is example, and versions such as v1.01, v1.1 and v2.0 are arranged.
Fig. 5 also shows an external device (or main frame) 54, and it can send compatible access command in this support communications protocol, sends into controller 53 via transmission interface 52, to attempt the access visible partition.This access command is the general read or write command of this support communications protocol institute standard, can carry out one and specify reading or write activity of logical address (logicaladdress).For example, in the SD specification, CMD17, CMD18, CMD24 and CMD25 are the general read write command of its standard.In whole user zone 511, external device 54 sees through this access command only can read and write visible partition, and other non-visible subregion then can't be with this access command read-write.That is, in the multi-division in user zone 511, only can " see " visible partition.
Controller 53 is to be coupled to transmission interface 52 and non-voltile memory 51, and the access command that can be sent according to the identifying information and the external device 54 of visible partition comes the access visible partition.In one embodiment, the addressing range of this access command is corresponding capacity in visible partition.For example, if the capacity of visible partition is the 128M byte, then the assignable ranges of logical addresses of this access command is 0~(128M-1) (suppose each logical address represent the storage space of a byte-sized), that is, the relative position of logical address representative in visible partition of this appointment.In this embodiment, controller 53 can find visible partition (being subregion 5111) according to the identifying information of visible partition, and the logical address that access command is specified, is converted to a physical address (physical address), so that visible partition is read and write.
It should be noted that the general read write command that uses this support communications protocol institute standard, and can't access system zone 512.But, if external device 54 can send through particular design and compatible authentication configuration order (its aspect describes in detail later) in this support communications protocol, the data that then renewable system realm 512 is stored.In one embodiment, controller 53 upgrades the identifying information of visible partition according to the first authentication configuration order that external device 54 is sent, and visible partition is switched to another subregion in user zone 511, for example switches to subregion 5112 from subregion 5111.In another embodiment, controller 53 upgrades the configuration info of visible partition, to adjust the version of this support communications protocol according to the second authentication configuration order that external device 54 is sent.For example, v.1.1 version is adjusted into SD from SD v1.01.
In one embodiment, system realm 512 comprises a plurality of first fields, in order to the capacity of each subregion of storing user zone 511.System realm 512 also comprises a plurality of second fields, in order to write down the support communications protocol of each subregion.Controller 53 upgrades those first fields, to adjust the capacity of arbitrary subregion according to the 3rd authentication configuration order that external device 54 is sent.Those first fields are upgraded in the 4th authentication configuration order that controller 53 is also sent according to external device 54, with the quantity of the multi-division of adjusting user zone 511.For example, the capacity of a certain subregion is made as zero, to remove this subregion; A perhaps newly-increased capacity record is as the capacity of newly-increased subregion.The 5th authentication configuration order that controller 53 is more sent according to external device 54 is upgraded those second fields, to adjust the support communications protocol of arbitrary subregion.
By first embodiment of Fig. 5, can avoid the compatibility issue of aforementioned prior art when different external connection device access multi-division.For at different existing external devices, all can the access visible partition; And at the external device that can send the aforementioned first authentication configuration order, then changeable visible partition, but reach the effect of the multi-division in access user zone 511 in fact.In addition, by first embodiment, also can avoid the problem of recalling compatibility of aforementioned prior art between the different size version.The SD v2.0 high power capacity card that surpasses 2GB with user's field capacity is an example, can be multi-division (can divide or utilize aforesaid the 4th authentication configuration order to repartition in advance) with user's area dividing, each subregion capacity is not quite at 2GB, and the communications protocol of each section post support is adjusted into previous versions (version can preestablish or utilize aforementioned the 5th authentication configuration order adjustment), so, but only support still access visible partition of external device (promptly existing external device) or all subregions (can send the external device of the first authentication configuration order) of previous SD version.
In one embodiment, in aforesaid first to the 5th authentication configuration order, each authentication configuration order can be one of following aspect:
(1) order of authentication configuration is that a manufacturer keeps order (Manufacture Reserved Command).It is that each supports communications protocol to keep the order to manufacturer's elasticity utilization that manufacturer keeps order, and manufacturer can be used to design and meets the order of needs separately.Manufacturer keeps order and includes command index field and command parameter field, and the value of command index is to be selected from the support value that communications protocol allowed, and command parameter then comprises the information that respectively authenticates the system realm that the configuration order will upgrade.For example, the command parameter of the first authentication configuration order comprises appointment and will switch to which subregion.
(2) order of authentication configuration is supported the general write command of communications protocol institute standard for this, and specifies an address that does not belong in the addressing range of this visible partition.For example, if the addressing range of visible partition is 0~(128M-1), then this assigned address can be not little address at 128M.To the information of the system realm 512 that will upgrade in authentication configuration order, then identical with the mode that general write command arrangement will write data, for example, be placed directly in general write command after.
(3) authentication configuration order is general write command of this support communications protocol institute standard, and specifies a lowest order (least significant bit, LSB) non-vanishing address.Support in the communications protocol at some, as SD and MMC, the unit of its data transmission is all greatly a byte, each logical address is then represented the storage space of a byte-sized, therefore, to carrying out in visible partition the general read write command of access, specified address all is can be by 2 numerical value of dividing exactly, so the lowest order of assigned address is zero.In this aspect, then utilize afore-mentioned characteristics, be to use general write command equally, but specify the non-vanishing address of lowest order in addition, want access system zone 512 with representative.And the information of the system realm 512 that the order of authentication configuration will be upgraded, the mode that will write data with general write command arrangement is identical.
In another embodiment, the aforesaid first authentication configuration order can be one of following aspect:
(A) the first authentication configuration order is general reading order of this support communications protocol institute standard, and specifies an address that exceeds the addressing range of this visible partition.For example, if the addressing range of visible partition is 0~(128M-1), then this assigned address can be the address that is not less than 128M.
(B) the first authentication configuration order is supported the general reading order of communications protocol institute standard for this, and specifies the non-vanishing address of a lowest order.Its reason is similar to aforesaid (3).
Under aforementioned (A), (B) two kinds of aspects, controller 53 promptly according to a default transfer sequence, switches to next subregion with visible partition from present subregion after receiving the first authentication configuration order.For example, this default transfer sequence can be made as subregion 5111--subregion 5112--the 3rd subregion 5113--first subregion 5111.
<the second embodiment 〉
Fig. 6 is the second embodiment calcspar of the memory storage of tool multi-division of the present invention.Memory storage 60 is supported a standard communications protocol, and comprises a non-voltile memory 61, a transmission interface 62 and a controller 63, as shown in Figure 6.This standard communications protocol comprise following one of them: USB, CF, MS, MMC and SD.In one embodiment, memory storage 60 is portable apparatus.
Comprise a user zone 611 in the non-voltile memory 61, it comprises an authentication subregion 6112 and a non-authentication subregion 6111.Want access authentication subregion 6112 to need elder generation through an acts of authentication (described below), the non-authentication subregion 6111 of access does not then need.In one embodiment, non-voltile memory 61 is flash memory or hard disk.
Transmission interface 62 is in order to receiving an authentication information from an external device 64, this authentication information have one not standard at the authentication format of this standard communications protocol.Controller 63 is to be coupled in 61 of transmission interface 62 and non-voltile memories, and in order to according to this authentication information, whether decision allows external device 64 accesses authentication subregion 6112.The authentication format of aforementioned this authentication information, it emphasizes that standard is not that expression needs only the energy compatibility in this standard communications protocol in this standard communications protocol, how many figure places this form can for example need by manufacturer from ordering.If this authentication information comprises an authentication identification code, controller 63 allows external device 64 accesses authentication subregion 6112.If this authentication information does not comprise this authentication identification code, controller 63 does not allow external device 64 accesses authentication subregion 6112.Change speech, in user zone 611, therefore the access of authentication subregion 6112 need can provide the function of data protection through authentication.But not 6111 of subregions of authentication can be directly with the general read write command access of this standard communications protocol institute standard.
In one embodiment, authentication subregion 6112 further is subdivided into a read-only child partition, the erasable child partition of a single and more than one erasable child partition (figure does not show), so that different storage aspects to be provided.Itself have repeatedly (as using flash memory) under the situation of erase function at authentication subregion 6112,, concerning at external device 64, still can reach the read-only of equivalence or function that single is erasable by the cooperation of controller 63.With regard to read-only child partition, its include data be memory storage 60 during fabrication, promptly utilize fixture to write, can store the data that need special protection, for example the equipment registration sequence number of memory storage.External device 64 can be deposited the course data that application program is used in the erasable child partition of single, for example use the date first.To in the application program that needs network startup (Activation), can be started the calculating of grace period (Grace Period) reliably by the cooperation of the erasable child partition of single.Can place specific procedural file of application program or data file in the repeatedly erasable child partition, to have the characteristic that is not copied or delete by the user.
In one embodiment, this authentication information is that a manufacturer that includes in that external device 64 is provided keeps order.It is that this standard communications protocol keeps the order to manufacturer's elasticity utilization that this manufacturer keeps order, and it comprises command index field and command parameter field.The value of command index is to be selected from the value that this standard communications protocol is allowed, and this manufacturer keeps the order that order provides authentication information in order to identification; Command parameter then comprises this authentication information, and the required figure place of authentication information then can be by manufacturer from ordering, as long as be no more than the length of command parameter field.Controller 63 promptly according to its command index that includes, judges that its command parameter includes authentication information after receiving that this manufacturer keeps order, then carry out follow-up acts of authentication.In another embodiment, this authentication information is that the general write command via this standard communications protocol institute standard provides, and an address that does not belong in the addressing range of non-authentication subregion 6111 is specified in this general write command.For example, if not the addressing range of authentication subregion 6111 is 0~(128M-1), then this assigned address can be the address that is not less than 128M.This authentication information then provides as the data that this general write command will write, and its form also can be by manufacturer from ordering (authentication authorization and accounting form).In another embodiment, this authentication information is that the general write command via this standard communications protocol institute standard provides, and the non-vanishing address of a lowest order is specified in this general write command.This authentication information then provides as the data that this general write command will write, and its form also can be by manufacturer from ordering.
<the three embodiment 〉
Fig. 7 is the 3rd an embodiment calcspar of the memory storage of tool multi-division of the present invention.Memory storage 70 is supported a standard communications protocol, and comprises a non-voltile memory 71, a transmission interface 72 and a controller 73, as shown in Figure 7.This standard communications protocol comprise following one of them: USB, CF, MS, MMC and SD.In one embodiment, memory storage 70 is portable apparatus.In another embodiment, non-voltile memory 71 is flash memory or hard disk.
Comprise user zone 711 and one system realm 712 in the non-voltile memory 71.User zone 711 comprises a plurality of subregions (number of partitions is also unrestricted, and Fig. 7 is to be example with two subregions 7111,7112), and wherein subregion 7111 is set as default subregion (meaning of default subregion hereinafter describes in detail).712 positional informations that store each subregion of system realm are used each subregion of addressing according to this for controller 73.In one embodiment, the positional information of each subregion comprises the subregion capacity.According to the subregion capacity, carrying out addressing, that is the subregion capacity has the effect (hereinafter can give an example) that shows district location.In another embodiment, except that the subregion capacity, the positional information of each subregion also comprises the subregion start address.
Transmission interface 72 can receive the access command that an external device 74 sends compatible this standard communications protocol, delivers to controller 73.73 positional informations according to this access command and each subregion of controller are come access user zone 711.In the 3rd embodiment, the access command that different external devices 74 is sent has different addressing ranges.With regard to the external device of this standard communications protocol of existing support, the addressing range of the access command that it sends is that limit is at aforesaid default subregion.In other words, in user zone 711, the existing external device of this kind only can " see " default subregion.Yet, with regard to cooperating the designed authentication external device of the 3rd embodiment, it is except supporting this standard communications protocol, also can obtain the positional information of each subregion that system realm 712 deposited, and when producing access command, can be according to these positional information assigned address, with addressing at arbitrary subregion of wanting access.Change speech, this moment, the addressing range of access command promptly comprised all subregions in user zone 711.For example, if the positional information of each subregion comprises the subregion capacity, with Fig. 7 is example, subregion 7111 and 7112 capacity are respectively 128MB, 256MB, and suppose that each logical address represents the storage space of a byte-sized, then authenticate external device and can utilize 0~(128M-1) address to come addressing subregion 7111, utilize the address of 128M~(128M+256M-1) to come addressing subregion 7112.Again for example, if the positional information of each subregion comprises subregion capacity and subregion start address, it still is example with Fig. 7, subregion 7111 and 7112 capacity are respectively 128MB, 256MB, the subregion start address is respectively A1 and A2, then authenticating external device can utilize the address of A1~(A1+128M-1) to come addressing subregion 7111, utilize the address of A2~(A2+256M-1) to come addressing subregion 7112, wherein the setting of subregion start address A1 and A2 need make A1~(A1+128M-1) with A2~(A2+256M-1) two addressing ranges can not overlap.Controller 73 promptly according to the specified logical address of access command and the positional information of each subregion, will specify logical address to be converted to physical address, to carry out the access of subregion 7111 or subregion 7112 after receiving authentication access command that external device sent.
It should be noted that the general read write command that uses this standard communications protocol institute standard, and can't access system zone 712.But, if external device 74 can send through particular design and compatible authentication configuration order (its aspect describes in detail later) in this standard communications protocol, the data that then renewable system realm 712 is stored.In one embodiment, the 6th configuration order that controller 73 is sent according to external device 74, the positional information of regeneration block is with the quantity of the multi-division of adjusting user zone 711.For example, when positional information has the subregion capacity, the capacity of a certain subregion is made as zero, to remove this subregion; A perhaps newly-increased capacity record is as the capacity of newly-increased subregion.In another embodiment, when positional information had the subregion capacity, positional information was upgraded in the 7th configuration order that controller 73 is sent according to external device 74, with the capacity of arbitrary subregion of adjusting user zone 711.In another embodiment, when positional information had the subregion start address, positional information was upgraded in the 8th configuration order that controller 73 is sent according to external device 74, with the start address of arbitrary subregion of adjusting user zone 711.
In one embodiment, in aforesaid the 6th to the 8th authentication configuration order, each authentication configuration order can be one of following aspect:
(1) order of authentication configuration is that a manufacturer keeps order.It is that this standard communications protocol keeps the order to manufacturer's elasticity utilization that manufacturer keeps order, it includes command index field and command parameter field, the value of command index is to be selected from the value that this standard communications protocol is allowed, and command parameter then comprises and respectively authenticates the configuration order to system realm 712 updated information of wanting.For example, the command parameter of the 7th authentication configuration order comprises and specifies which subregion to adjust and adjusted capability value.
(2) order of authentication configuration is the general write command of this standard communications protocol institute standard, and specifies an address that does not belong in the addressing range in user zone 711.For example, if the addressing range in user zone is 0~(512M-1), then this assigned address can be the address that is not less than 512M.To the information of the system realm 712 that will upgrade in authentication configuration order, then identical with the mode that general write command arrangement will write data, for example, be placed directly in general write command after.
(3) order of authentication configuration is the general write command of this standard communications protocol institute standard, and specifies the non-vanishing address of a lowest order (LSB).As described in first embodiment of front, in some standard communications protocol, use general write command, but specify the non-vanishing address of lowest order in addition, can represent and want access system zone 712 but not user zone 711.To the information of the system realm 712 that will upgrade in the order of authentication configuration, then identical with the mode that general write command arrangement will write data.
By the 3rd embodiment of Fig. 7, can avoid the compatibility issue of aforementioned prior art when different external connection device access multi-division.For at different existing external devices, all can access preset subregion; And at aforesaid authentication external device, then can be according to the positional information of each subregion, all subregions in access user zone 711.
The above only is preferred embodiment of the present invention, only is illustrative for the purpose of the present invention, and nonrestrictive.Those skilled in the art is understood, and can carry out many changes to it in the spirit and scope that claim of the present invention limited, revise, even equivalence, but all will fall within the scope of protection of the present invention.

Claims (5)

1. the memory storage of a tool multi-division is to support a standard communications protocol, it is characterized in that this memory storage comprises:
One non-voltile memory comprises a user zone, and this user zone comprises an authentication subregion and a non-authentication subregion;
One transmission interface, in order to receiving an authentication information from an external device, this authentication information have one not standard at the authentication format of this standard communications protocol; And
One controller is coupled to this transmission interface and this non-voltile memory, in order to according to this authentication information, determines whether to allow this authentication subregion of this external device access;
Wherein, this authentication information be contained in being following both one of them: a manufacturer of this standard communications protocol keeps an order and a write command, wherein this manufacturer to keep order be that this standard communications protocol keeps the order to manufacturer's elasticity utilization; This write command is the general write command of this standard communications protocol institute standard, and specify an address or the non-vanishing address of a lowest order that does not belong to the addressing range of this non-authentication subregion, and this authentication information provides as the data that this general write command will write;
This manufacturer keeps order and comprises command index field and command parameter field, and the value of described command index is selected from the value that this standard communications protocol is allowed, and this manufacturer keeps the order that order provides this authentication information in order to identification; Described command parameter comprises this authentication information.
2. memory storage as claimed in claim 1 is characterized in that, this authentication information comprises an authentication identification code, and this controller allows this authentication subregion of this external device access.
3, memory storage as claimed in claim 1 is characterized in that, this standard communications protocol be following one of them: USB (universal serial bus), small size flash memory, memory stick, multimedia card and secure digital.
4, memory storage as claimed in claim 1 is characterized in that, this authentication subregion comprise following at least one of them: a read-only child partition, the erasable child partition of a single or more than one erasable child partition.
5, memory storage as claimed in claim 1, it is characterized in that, this controller according to this command index field that this manufacturer keeps order, judges that this command parameter field of this manufacturer's reservation order is to include this authentication information after receiving that this manufacturer keeps order.
CN200610086737A 2006-06-20 2006-06-20 Memory device with multiple partitions Expired - Fee Related CN100593213C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200610086737A CN100593213C (en) 2006-06-20 2006-06-20 Memory device with multiple partitions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200610086737A CN100593213C (en) 2006-06-20 2006-06-20 Memory device with multiple partitions

Publications (2)

Publication Number Publication Date
CN101093720A CN101093720A (en) 2007-12-26
CN100593213C true CN100593213C (en) 2010-03-03

Family

ID=38991900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200610086737A Expired - Fee Related CN100593213C (en) 2006-06-20 2006-06-20 Memory device with multiple partitions

Country Status (1)

Country Link
CN (1) CN100593213C (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8074023B2 (en) 2008-05-22 2011-12-06 Nuvoton Technology Corporation In-system programming to switch memory access from one area to another in memory cards
TW201202917A (en) * 2010-06-01 2012-01-16 Etron Technology Inc System of realizing RAID-1 on a portable storage medium and method of realizing write data and write/read data of RAID-1 on a portable storage medium
CN102207912B (en) * 2010-07-07 2015-10-07 无锡中科龙泽信息科技有限公司 Flash memory device and the access method thereof of sectoring function is realized in equipment end
CN107741913B (en) * 2013-08-05 2021-09-07 慧荣科技股份有限公司 Method for managing a memory device, memory device and controller
TWI682334B (en) * 2018-02-08 2020-01-11 亞智科技股份有限公司 Process recipe monitoring method and system thereof

Also Published As

Publication number Publication date
CN101093720A (en) 2007-12-26

Similar Documents

Publication Publication Date Title
US9198025B2 (en) High-capacity SIM storage control
JP4807683B2 (en) Data storage
US7177975B2 (en) Card system with erase tagging hierarchy and group based write protection
US7653796B2 (en) Information recording medium and region management method for a plurality of recording regions each managed by independent file system
US7797490B2 (en) Memory card authentication system, memory card host device, memory card, storage area switching method, and storage area switching program
CN101789019B (en) Method for controlling removable disk under Windows
TWI455033B (en) Memory system allowing host to easily transmit and receive data
US7185146B2 (en) Memory card device, and memory card control method for controlling the device
CN100593213C (en) Memory device with multiple partitions
EP2096546A1 (en) Write once recording device
JP2009176306A (en) Semiconductor memory card, and program
TWI453614B (en) Memory system capable adding time information to data obtained via network
US20070033364A1 (en) Information recording medium, information recording medium accessing apparatus and accessing method
US9052836B2 (en) Memory system in which extension function can easily be set
TWI321279B (en) Memory device and associated method
CN101089830B (en) Memory device and its operation method
CN103218319B (en) Data guard method, Memory Controller and memorizer memory devices
US20160048353A1 (en) Memory system and method of controlling memory system
JP2000227956A (en) Portable storage medium and its issuing method
US9235544B2 (en) Portable data carrier having additional functionality
CN102110061B (en) Block managing method, flash controller and flash memory device
US20090113154A1 (en) Non-Volatile Memory Apparatus and Method of Accessing the Same
CN113316761B (en) Self-formatting data storage device
JP5932588B2 (en) IC card, portable electronic device, and IC card processing device
JP2010198112A (en) Removable device built-in equipment, removable device, and method for managing drive identification information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100303

Termination date: 20150620

EXPY Termination of patent right or utility model