CN101089830B - Memory device and its operation method - Google Patents
Memory device and its operation method Download PDFInfo
- Publication number
- CN101089830B CN101089830B CN200610083984XA CN200610083984A CN101089830B CN 101089830 B CN101089830 B CN 101089830B CN 200610083984X A CN200610083984X A CN 200610083984XA CN 200610083984 A CN200610083984 A CN 200610083984A CN 101089830 B CN101089830 B CN 101089830B
- Authority
- CN
- China
- Prior art keywords
- visitor
- zone
- command
- access
- memory storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
A method for operating memory device includes utilizing manufacture reserved command specified by standard communication protocol and setting custom-made command parameter to generate a custom-made command package to be in compatible in said standard communication protocol for making memory device execute corresponding custom-made function according to said custom-made command package. Another method for operating memory device is also disclosed.
Description
Technical field
The invention relates to that what relate to is memory storage, what refer to especially to be particularly related to is a kind ofly to use special order package to implement the memory storage of customized function, also discloses a kind of operation method of described memory storage simultaneously.
Background technology
Along with advancing by leaps and bounds of Information technology, people present volatile growth especially for the demand of various information.In recent years, the universalness of numerous small-sized Portable memory storages (Portable Memory Device), for example with flash memory (Flash Memory) serve as main memory media the carry-on dish of USB (USB Flash Disk, be commonly called as silicon disk machine or thumb brother), and comprise small size flash memory (Compact Flash, CF), memory stick (MemoryStick, MS), secure digital (Secure Digital, SD), multimedia card (Multi Media Card, MMC) or the like the various flash memory (Flash Memory Card) of various standard specifications (or communications protocol), use the micro hard disk (Micro Hard Disk) of CF or USB interface, perhaps or even adopt USB or pcmcia interface and be installed on slim 2.5 inch Winchester disk drive (Hard Disk) in the external connection box or the like, people have been satisfied especially for the portable serious hope that hurriedly increases with day of information.
Existing Portable memory storage, its inside include a non-volatile memory array (Non-VolatileMemory Array), a controller (Controller) and a transmission interface (I/O Interface).Described memory array is to be used to store the user to want the data that store, and it must have the characteristic that still can preserve stored data under the situation that does not need extraneous power supply, therefore often be to be used as described memory array with flash memory, certainly, it can also be a hard disk.In controller, then include in order to drive (Drive) and required interlock circuit, interface and the driving mechanism of the described memory array of access (Access).This driving mechanism can be to exist to carry out a series of microcode (Micro-Code) program, maybe can also be that microcontroller/microprocessor (Micro-Controller/Micro-Processor) circuit form with hardware (Hardware) exists to carry out the mode of a succession of firmware (Firmware) program with the control program of hardware (Hardware) (Command Sequencer) circuit form, is present in the controller of this Portable memory storage.Described transmission interface determines then described Portable memory storage is with which kind of communications protocol (Protocol) to combine and communication with external device (or main frame (host)).
Fig. 1 is the area configurations synoptic diagram for the fast-flash memory array 10 of prior art.Comprise as shown in Figure 1: system realm (System Area) 11, user zone 12 and zone (the Secure Area) 13 that maintain secrecy.System realm 11 is generally deposited required firmware of memory card controller (controller) and relevant memory document.User zone 12 is that the user is via the employed zone of external device access/memory card, the memory card size that the size in user zone can be used for the user.The data that the memory card confidentiality agreement is produced is deposited in secret zone 13, and this regional data can only be come access by relative confidentiality agreement, and the user can not directly read this regional data.For example the confidentiality agreement that adopted of SD card is CPRM, and secret zone can only be with after the order of CPRMv and meeting the checking of SD controller internal document, could the access security zone.
Fig. 2 is the synoptic diagram for existing memory card bus protocol.The memory card bus is divided into order CMD bus and data DAT bus two classes.Be to have to comprise on the CMD bus: order package 20 and response package 30.The order package 20 include external device to memory card under order (command).Response package 30 includes the condition responsive that is produced at previous order package.Be to have the Datagram of comprising 40 on the DAT bus.Datagram 40 is to comprise data that external device writes or the data that reads from memory card.
Existing memory card utilization order package 20 is assigned reading or write activity the user zone or the zone of maintaining secrecy.Fig. 3 is the detailed block diagram for the order package 20 of Fig. 2.As shown in Figure 3, order package 20 is to comprise: start bit 21, traffic bit 22, command index 23, command parameter 25, circulation verbose checking (CRC) 27 and stop bit 28.Start bit 21, traffic bit 22 and stop bit 28 use for transmission signal identification.Command index 23 is deposited the various command of external device to memory card, for example reads, writes, order such as state is found out.Command parameter 25 is the required parameter of order of fill order index 23.Verbose 27 error coded that prevent that command index 23 and command parameter 25 be provided, the mistake that can detect/produce when correcting data transmission checked circulates.
Fig. 4 A to 4C is foundation Fig. 3, shows the synoptic diagram of the package of reading order, write command and other order respectively.For asking simplification, only show the main difference place of various command package among the figure.Fig. 4 A is when sending reading order for external device, the rough schematic view of its order package.Be to comprise shown in Fig. 4 A: command index 23 is for supporting the general reading order of specification institute standard, and command parameter 25 is the address of reading of appointment.For example, in the SD memory card, command index 23 is CMD17 and CMD18.Command parameter 25 is the address of reading of one 32 bit lengths.Is unit in SD memory card v1.01 addressing with byte (Byte), and SD memory card v2.0 addressing is a unit with 512 bytes.
Fig. 4 B is when sending write command for external device, the rough schematic view of its order package.Be to comprise shown in Fig. 4 B: command index 23 is for supporting the general write command of specification institute standard, and command parameter 25 is one to write the address.For example, in the SD memory card, command index 23 is CMD24 and CMD25.Command parameter 25 is the address that writes of one 32 bit lengths.
Fig. 4 C is when sending other order for external device, the rough schematic view of its order package.Other order that command index 23 is comprised is to comprise: smear that write order, state are found out order and manufacturer keeps order.Command parameter 25 is to comprise: information bits and filler, form the data field position of a regular length.
Please consult Fig. 1 again.In three zones in the drawings, external device can only be at 12 read-writes of user zone with the general read/write order (shown in Fig. 4 A/ Fig. 4 B) of specification institute standard.Data in the user zone, the user has complete authority and uses, and the data file that application program is stored can't be guaranteed the not deleted and copy of data if be stored in this zone, therefore is difficult to provide data protection function.On the other hand, for the zone 13 of maintaining secrecy, though have protection mechanisms such as CPRM as the SD memory card; can provide application program to deposit confidential data, but when being to use CPRM, content must be encrypted earlier; must decipher during use, suitable burden be arranged for arithmetic capabilities such as portable apparatus.In addition, also can't directly use for the portable apparatus of not supporting CPRM.
In addition, because the user is diversified day by day to the requirement of memory storage, manufacturer must provide various customized functions at the client under the situation that is compatible with standard specification (or standard communications protocol).
Summary of the invention
A purpose of the present invention is to provide a kind of memory storage and How It Works thereof, and it can use special order package, to implement the customized function of memory storage.
Another object of the present invention is to provide a kind of memory storage and How It Works thereof, so that a kind of customized function of data protection to be provided.Described memory storage has objective system zone, and with the data that storage needs protection, described How It Works then uses aforesaid special command package, makes external device reach the purpose of data protection through the described visitor's system of authentication ability access zone.
In one embodiment of this invention, disclose a kind of memory storage, it is to support a communications protocol.Described memory storage comprises: a non-voltile memory; One transmission interface, objective a system that is compatible with described communications protocol in order to reception ordered package, and described visitor's system is ordered package, and it comprises, and manufacturer reservation is ordered and visitor's system command parameter, and it is that standard is in described communications protocol that the reservation of described manufacturer is ordered; And a controller, be coupled to described transmission interface and described non-voltile memory, in order to carry out the pairing customized function of described visitor's system command parameter.
In another embodiment of the present invention, a kind of memory storage is disclosed, it is to support a communications protocol.Described memory storage comprises: a non-voltile memory comprises a user zone; One transmission interface, be compatible with the general access command package of described communications protocol in order to reception, wherein said general access command package comprises the general access command of described communications protocol institute standard, the corresponding access address of described general access command, described access address is an illegal address and does not belong to an one of addressing range in described user zone; And a controller, be coupled to described transmission interface and described non-voltile memory, in order to carry out the customized function of a correspondence according to described general access command package.
In another embodiment of the present invention, a kind of How It Works of memory storage is disclosed, it is at above-mentioned disclosed memory storage, the How It Works of proposition, described memory storage are to support a communications protocol, and comprise a user zone.Described How It Works comprises: receive general access command package, described general access command package is the general access command that comprises described communications protocol institute standard; And if an access address of described general access command package correspondence be an illegal address with an addressing range that does not belong to described user zone one of, then carry out a customized function of described memory storage.
In another embodiment of the present invention, a kind of How It Works of memory storage is disclosed, described memory storage is to support a communications protocol.Described How It Works comprises: receive the visitor's system order package that is compatible with described communications protocol, described visitor's system order package comprises a manufacturer and keeps order and visitor's system command parameter, described manufacturer keep order be standard in described communications protocol, described visitor's system command parameter is a corresponding customized function; And whether comprise a specific custom IC according to described visitor system command parameter, whether decision carries out described customized function.
Description of drawings
Fig. 1 is the fast-flash memory array area configuration schematic diagram of prior art;
Fig. 2 is existing memory card bus protocol synoptic diagram;
Fig. 3 is the detailed block diagram of the order package of Fig. 2;
Fig. 4 A to 4C is according to Fig. 3, shows the synoptic diagram of the package of reading order, write command and other order respectively;
Fig. 5 is the calcspar of a preferred embodiment of memory storage of the present invention;
Fig. 5 A makes the synoptic diagram of a configuration embodiment in zone for the visitor of Fig. 5 of the present invention;
Fig. 6 is according to the first embodiment of the present invention, illustrates the authentication command package calcspar of the memory storage that is applicable to Fig. 5;
Fig. 7 is according to the first embodiment of the present invention, illustrates the process flow diagram of How It Works of the memory storage of Fig. 5;
Fig. 8 is according to the second embodiment of the present invention, illustrates the authentication command package calcspar of the memory storage that is applicable to Fig. 5;
Fig. 9 is according to the second embodiment of the present invention, illustrates the process flow diagram of How It Works of the memory storage of Fig. 5;
Figure 10 A is according to the third embodiment of the present invention, illustrates the calcspar of the authentication command package of the memory storage that is applicable to Fig. 5;
In Figure 10 B third embodiment of the present invention, be used to inquire about the general reading order package of visitor's system zone state and the calcspar of the Datagram that is responded;
Figure 11 is according to the third embodiment of the present invention, illustrates the process flow diagram of How It Works of the memory storage of Fig. 5.
Graphic figure number explanation: the fast-flash memory array of 10-prior art; The 11-system realm; 12-user zone; 13-maintains secrecy regional; 20-orders package; 201,202,208-authentication command package; The general write command package of 203-; The general reading order package of 204-; The 21-start bit; The 22-traffic bit; The 23-command index; The 25-command parameter; 251,401-custom IC; 252-activation/end flag; 253-visitor system command index; The 254-address; 27-verbose the checking of circulating; The 28-stop bit; 30-responds package; The 40-Datagram; 402-visitor system zone is set; The 403-filler; The regional start address of 404-visitor system; 405-visitor system field capacity; The 50-memory storage; The 51-controller; The 52-transmission interface; The 53-non-voltile memory; 531-user zone; 532-visitor system zone; The read-only subregion of 5321-; 5322-overrides subregion many times; The 5323-single overrides subregion; The 54-external device; The flow process of first embodiment of 71~75-How It Works; The flow process of second embodiment of 91~95-How It Works; The flow process of the 3rd embodiment of 111~116-How It Works.
Embodiment
In one embodiment, memory storage of the present invention and How It Works thereof are to utilize the manufacturer of standard communications protocol institute standard to keep order (Manufacture-Reserved Command, be that communications protocol keeps the order to manufacturer's elasticity utilization), and set its command parameter (this moment be called visitor system command parameter), the visitor who is compatible with described standard communications protocol makes the order package, makes memory storage can carry out the pairing customized function of described visitor's system command parameter according to this.In addition, described memory storage also can make whether comprise a specific custom IC in the command parameter according to the visitor, and whether decision carries out described customized function.
In another embodiment, memory storage of the present invention and How It Works thereof are the general access commands that utilizes standard communications protocol institute standard, and in command parameter (be an address field this moment, to store specified access address) in specify an illegal address (illegal address) or the address in the addressing range in user zone not, to produce general access command package, make memory storage can carry out corresponding customized function according to this.Wherein, the address in the addressing range in user zone not can be a value greater than the addressing range in user zone.For example, an address in the addressing range in user zone is placed address field, and (most significant bit MSB) is made as 1 with the most significant digit of address field.In addition, when described general access command was general write command, described memory storage also can write Datagram according to the correspondence of described general access command package and whether comprise a specific custom IC, and whether decision carries out described customized function.
In another embodiment; aforesaid customized function is to keep a zone (i.e. visitor's system zone) in memory storage in advance; and for this zone; external device can't use general read-write motion (access command as communications protocol institute standard) direct access; and must (it comprises a verification process by specific mode; in hereinafter describing in detail), therefore, this visitor's system zone can provide the function of data protection.For example, the related data that authenticated data or other of application program or software can be needed protection is stored in this visitor's system zone.Thus, many relevant application of can deriving, the application program of for example pre-recording data, the service recorder of depositing individual or device, the data that prevents are by unauthorized object tools or destruction etc.For another example, be different from the existing practice, it is that the authenticated data of application program is deposited in the storage area of user zone or external device end, and the present invention can be stored in authenticated data in the visitor system zone, with the pirate that prevents the program that cracks or alter.And, in response to the authentication result with program is that the visitor who deposits in memory storage makes in the zone, the user can carry this memory storage and use this application program to any cross-platform compatible external device after authentication once or authorize formality, has the advantage that needn't repeat to authenticate.
Fig. 5 is the calcspar for a preferred embodiment of memory storage of the present invention.In this preferred embodiment, memory storage 50 is supported a communications protocol, and comprises a controller 51, a transmission interface 52 and a non-voltile memory 53.Non-voltile memory 53 comprises user zone 531 and visitor's system zone 532.Transmission interface 52 can receive an authentication command package that is compatible with described communications protocol from an external device 54.Controller 51 is to be coupled to transmission interface 52 and non-voltile memory 53, but whether the access visitor makes zone 532 according to described authentication command package decision external device 54.In addition, transmission interface 52 also receives general access command package (include general reading order or general write command, its form is shown in Fig. 4 A or Fig. 4 B) from external device 54, and it specifies an access address in user zone 531.The described general access command package of 51 foundations of controller is with direct access user zone 531.In one embodiment, memory storage 50 is portable apparatus.In another embodiment, described communications protocol be the existing standard specification of following industry wherein one: USB, CF, MS, MMC and SD.In another embodiment, non-voltile memory 53 is flash memory or hard disk.
Fig. 5 A is a synoptic diagram of making a configuration embodiment in zone 532 for the visitor of Fig. 5 of the present invention.Shown in Fig. 5 A, be to comprise: read-only subregion 5321, repeatedly override subregion 5322 and single and override subregion 5323.Though non-voltile memory 53 has the characteristic that can repeat to write after erase (Erase), can override function with the read-only or single that reaches equivalence by the cooperation of controller 51.Data in the read-only subregion 5321 be memory storage 50 when making, utilize fixture to write, it can prevent that data from being destroyed because of rogue program writes.In addition, application program can be deposited the course data that described program is used in single overrides subregion 5323, for example use the date first.For the application program that needs network activation (Activation), can override the cooperation of subregion 5323 by single, reliably the computing activation grace period (Grace Period).Repeatedly override and then can place specific procedural file of application program or information paper in the subregion 5322, have the characteristic that is not copied or delete by the user.
In one first embodiment, the How It Works of memory storage 50 is to keep order according to the manufacturer in the described communications protocol, and subsidiary specific authentication data produces the purpose of switching in the zone (switching to access visitor system zone 532 from access user zone 531).And but follow-up general access command directly address is made zone 532 in the visitor.
Fig. 6 is the foundation first embodiment of the present invention, illustrates authentication command package 201 calcspars that are applicable to memory storage 50.As shown in Figure 6, authentication command package 201 included command indexs 23 keep order for manufacturer, and command parameter 25 is to include custom IC 251 and activation/end flag 252.Custom IC 251 can be used for verifying whether process authenticates external device 54 performed application-specific, activates/stop the access that flag 252 is used for activating/stopping visitor's system zone 532.
Fig. 7 is the foundation first embodiment of the present invention, illustrates the process flow diagram of the How It Works of memory storage 50, and it includes the following step:
Step 71: general transmission state.Memory storage 50 is connected (or insertion) external device 54, and receive order package from external device 54.
Step 72: check the order package received whether meet Fig. 6 authentication command package 201 form and have the activation flag, if " being (Y) " execution in step 73 then, as " not (N) " execution in step 75 then.
Step 73: according to the general access command package of follow-up reception, access visitor system zone 532.Described general access command is an access address of specifying visitor's system zone 532.
Step 74: check the order package received whether meet Fig. 6 authentication command package 201 form and have the end flag, if " being (Y) " execution in step 71 then, as " not (N) " execution in step 73 then.
Step 75: according to the general access command package of follow-up reception, access user zone 531.
In one second embodiment, the How It Works of memory storage 50 is to keep order according to the manufacturer in the described communications protocol, subsidiary special parameter, be identified as the orders such as reading and writing in visitor's system zone 532 according to this, because the read-write in visitor's system zone 532 is all finished in the single order, continuous user zone 531 does not interact with the read-write motion of visitor's system regional 532, can supply the advantage of external device 54 accesses so have visitor's system zone 532 simultaneously with user zone 531.
Fig. 8 is the foundation second embodiment of the present invention, illustrates authentication command package 202 calcspars that are applicable to memory storage 50.As shown in Figure 8, authentication command package 202 included command indexs 23 keep order for manufacturer, and command parameter 25 is to include custom IC 251, visitor's system command index 253 and address 254.When command index 23 kept order for manufacturer, expression was to make zone 532 orders of doing at the visitor.Visitor's system command index 253 is for making the zone 532 order kinds of doing (as read or write) at the visitor, visitor's system command index can be identical with existing command index content.The access address of matching for visitor's system command index 253 in address 254.
Fig. 9 is according to the second embodiment of the present invention, illustrates the process flow diagram of the How It Works of memory storage 50, and it includes the following step:
Step 91: general transmission state.Memory storage 50 is connected (or insertion) external device 54, and receive order package from external device 54.
Step 92: check whether the order package received meets the form of the authentication command package 202 of Fig. 8, if " being (Y) " execution in step 93 then, as " not (N) " execution in step 95 then.
Step 93:,, judge the actual order that will carry out according to visitor's system command index 253 at command parameter 25 decodings.
Step 94:, then carry out described visitor's system access command with access visitor system zone 532, and the access address is address 254 if visitor's system command index 253 is visitor's system access commands.
Step 95: according to the general access command package of follow-up reception, access user zone 531.
Figure 10 A is for according to one the 3rd embodiment of the present invention, illustrates the calcspar of the authentication command package 208 that is applicable to memory storage 50.Shown in Figure 10 A, authentication command package 208 is to comprise a general write command package 203 and a Datagram 43.In general write command package 203, command index 23 be general write command, and command parameter 25 is one to write address A, and it is the particular address of the addressing range that do not belong to user zone 531 and visitor's system regional 532.Datagram 43 is to comprise: custom IC 401, the zone setting 402 of visitor's system and filler 403.Custom IC 401 is to be used for verifying whether process authenticates external device 54 performed application-specific.It is the related setting parameter in visitor's system zone 532 that visitor's system zone sets 402.403 of fillers are used for making Datagram 43 identical with the Datagram size of general access command.External device 54 can provide authenticated data to controller 51 by authentication command package 208, by to judge that it makes zone 532 access right to the visitor.
In the 3rd embodiment, external device 54 is after sending authentication command package 208, can send a general reading order package 204 (form is shown in Figure 10 B) again, its command index 23 is general reading order, command parameter 25 is to read address B, its with write the address category-A seemingly, also be the particular address of the addressing range that do not belong to user zone 531 and visitor's system zone 532.Controller 51 can respond a Datagram 44 after receiving general reading order package 204, it comprises: the regional start address 404 of visitor's system, visitor's system field capacity 405 and filler 403.The regional start address 404 of visitor's system provides external device 54 in regional 532 o'clock required displacements (offset) of addressing visitor system, cooperate visitor's system field capacity 405 again, can define the addressable scope in the system zone 532 of going to a party, follow-up external device 54 can utilize general access command to come access visitor system zone 532.In brief, general reading order package 204 can make controller 51 response visitor system zone states give external device 54.Because this 3rd embodiment is a general access command (being general write command package 203 and general reading order package 204) of reusing original communications protocol, have the advantage of external device end driver compatibility, and can be widely used in the access method of the reserve area in the general storage device.
Figure 11 is according to the third embodiment of the present invention, illustrates the process flow diagram of the How It Works of memory storage 50, and it includes the following step:
Step 111: general transmission state.Memory storage 50 is connected (or insertion) external device 54, and receive order package from external device 54.
Step 112: check that the order package that is received is to write the general write command of particular address A and the form that Datagram meets Figure 10 A? " if being (Y) " execution in step 113 then, as " not (N) " execution in step 116 then.
Existing memory storage can be expressed as bad command with response package 30, but memory storage of the present invention 50 then can respond the expression regular event when the general write command accepted shown in Figure 10 A.Therefore, external device 54 can judge whether its memory storage that connects is the memory storage of the visitor's of support system zone authentication of the present invention by this mode.
Step 113: external device 54 sends the general reading order for particular address B, controller 51 response Datagrams 44.
Step 114: obtain visitor's regional start address 404 of system and visitor's system field capacity 405 by Datagram 44.
Step 115: the regional access authentication of visitor's system is finished.Visitor system zone 532 and user zone 531 be by general access command access, and be to decide accessing zone by the specified address of described general access command.
Step 116: authentication is not finished in the regional access of visitor's system, can only be with general access command access user zone 531.
In aforementioned the 3rd embodiment, write address A and read address B and can also be the illegal address of broad sense.For example, all divide exactly in 512 bytes the address of SD specification, can be for not dividing exactly in the address of 512 bytes and can falling within the addressing range in user zone 531 so write address A and read address B.For example, write address A and read in the addressing range that address B can be user zone 531, (least significant bit LSB) is not an address of 0 to lowest order.
Because the general access command that the 3rd embodiment is to use communications protocol originally to have, reach the function of visitor's regional access authentication of system and access, so can use existing driver to implement, and has the advantage of recalling compatibility (backwardcompatible), and, can be widely used in the external device of various operating systems, reach the effect in the cross-platform visitor's of use system zone.In addition, this embodiment also applicable to the storage device of tool read-write interface, is not limited to flash memory, and reaching can be for the function of application-specific authentication and data protection thereof.
In one embodiment, visitor among aforementioned first to the 3rd embodiment makes the access address in zone 532 (or user zones 531), is to produce with an area code in visitor system zone 532 (or user zones 531) according to the relative address in 532 (or user zones 531), visitor's system zone.For example, if the capacity in visitor system zone 532 is the 128M byte, then the scope of its relative address is 0~(128M-1) (suppose each relative address represent the memory space of a byte-sized).Area code is in order to distinguish user zone 531 and visitor's system zone 532.For example, the code name in user zone 531 can be made as 0 (scale-of-two), the code name in visitor's system zone 532 is made as 1 (scale-of-two).In a preferred embodiment, no matter the person of being to use zone 531 or visitor's system zone 532, its access address is to produce by direct combination zone code name and relative address.For example, area code is placed the high bit (or than low level) of the address field of general access command (or visitor system access command), relative address then places than low level (or high bit).
In another embodiment, the visitor among aforementioned first to the 3rd embodiment makes 532 access address, zone, is to produce according to the relative address in visitor's system zone 532 and a displacement.The size of described displacement is to make the visitor make the addressing range in zone 532 and the addressing range non-overlapping in user zone 531.For example, if user zone 531 is respectively 128MB, 256MB with the capacity in visitor's system zone 532, and suppose that each address represents the memory space of a byte-sized, then can utilize 0~(128M-1) address to come addressing user zone 531, and addressing visitor system zone 532 is come in the address that utilizes 128M~(128M+256M-1), wherein, 128M is a displacement, can make the addressing range in two zones not overlapping.
Because the access mode in visitor's system zone 532 is defined by controller 51, do not change because of the application-specific on user's setting or the external device 54.Therefore, the present invention can provide more reliable data protection function.
The above is to utilize preferred embodiment to describe the present invention in detail, but not limits the scope of the invention.Generally know this type of skill personage and all can understand, suitably do slightly change and adjustment, will not lose main idea of the present invention place, also do not break away from the spirit and scope of the present invention.
Claims (13)
1. a memory storage is to support a communications protocol, it is characterized in that described memory storage comprises:
One non-voltile memory;
One transmission interface is compatible with a visitor system order package of described communications protocol in order to reception, and described visitor's system order package comprises a manufacturer and keeps order and visitor's system command parameter, and it is that standard is in described communications protocol that described manufacturer keeps order; And
One controller is coupled to described transmission interface and described non-voltile memory, in order to carry out the pairing customized function of described visitor's system command parameter.
2. memory storage as claimed in claim 1 is characterized in that, described controller is whether to comprise a specific custom IC according to described visitor's system command parameter, and whether decision carries out described customized function.
3. memory storage as claimed in claim 2, it is characterized in that, described visitor's system order package is from an external device, described non-voltile memory comprises visitor's system zone, described controller is whether to comprise described specific custom IC according to described visitor's system command parameter, but determines whether the described visitor of access makes the zone to described external device.
4. memory storage as claimed in claim 3, it is characterized in that, if described visitor's system command parameter comprises a described specific custom IC and an activation/end flag, then described controller is according to described activation/end flag, and decision activates or finishes described external device to described objective access of making the zone.
5. memory storage as claimed in claim 3, it is characterized in that, if described visitor's system command parameter comprises the access address that described specific custom IC, a visitor makes command index and described visitor's system zone, then described controller is according to described visitor's system command index and described access address, execution is to the access in described visitor's system zone, and wherein said access address is to produce according to an area code in the relative address in described visitor's system zone and described visitor's system zone.
6. a memory storage is to support a communications protocol, it is characterized in that described memory storage comprises:
One non-voltile memory comprises a user zone;
One transmission interface, in order to receive one first general access command package of described communications protocol institute standard, the wherein said first general access command package comprises the general access command of described communications protocol institute standard, corresponding one first access address of described general access command, described first access address is an illegal address and does not belong to one of one first addressing range in described user zone; And
One controller is coupled to described transmission interface and described non-voltile memory, in order to carry out the customized function of a correspondence according to the described first general access command package.
7. memory storage as claimed in claim 6, it is characterized in that, described general access command is general write command, and described controller is that the correspondence according to described general write command writes Datagram and whether comprises a specific custom IC, and whether decision carries out described customized function.
8. memory storage as claimed in claim 7, it is characterized in that, described general access command package is from an external device with the described corresponding Datagram that writes, described non-voltile memory more comprises visitor's system zone, described controller is to write Datagram according to described correspondence whether to comprise described specific custom IC, determines whether described external device allows the described visitor's system of access zone.
9. memory storage as claimed in claim 8, it is characterized in that, when the described visitor's system of described external device access zone, described external device sends one second general access command package of described communications protocol institute standard, with the described visitor's system of access zone, the wherein said second general access command package is specified one second access address in described visitor's system zone, and described second access address is to produce according to an area code in the relative address in described visitor's system zone and described visitor's system zone.
10. memory storage as claimed in claim 8, it is characterized in that, when the described visitor's system of described external device access zone, described external device sends one second general access command package of described communications protocol institute standard, with the described visitor's system of access zone, the wherein said second general access command package is specified one second access address in described visitor's system zone, described second access address is to produce with a displacement according to the relative address in the described visitor system zone, and the size of described displacement is to make one second addressing range that described visitor's system is regional and the described first addressing range non-overlapping in described user zone.
11. the How It Works of a memory storage is applied to described memory storage, described memory storage is to support a communications protocol, it is characterized in that also comprise a user zone, described How It Works comprises:
Receive general access command package, described general access command package is, comprises the general access command of described communications protocol institute standard; And
If an access address of described general access command package correspondence is an illegal address and does not belong to an one of addressing range in described user zone, then carries out a customized function of described memory storage.
12. How It Works as claimed in claim 11 is characterized in that, described general access command is general write command, and described How It Works more comprises:
A correspondence that receives described general write command writes Datagram;
Wherein, in carrying out the step of described customized function, described customized function is to write in described correspondence just to carry out when Datagram comprises a specific custom IC.
13. How It Works as claimed in claim 12, it is characterized in that, described general access command package is from an external device, described memory storage comprises visitor's system zone, wherein when described correspondence writes Datagram and comprises described specific custom IC, just carry out of the access of described external device to described visitor's system zone.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200610083984XA CN101089830B (en) | 2006-06-16 | 2006-06-16 | Memory device and its operation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200610083984XA CN101089830B (en) | 2006-06-16 | 2006-06-16 | Memory device and its operation method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101089830A CN101089830A (en) | 2007-12-19 |
CN101089830B true CN101089830B (en) | 2010-06-09 |
Family
ID=38943194
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200610083984XA Expired - Fee Related CN101089830B (en) | 2006-06-16 | 2006-06-16 | Memory device and its operation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101089830B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105657508B (en) * | 2016-01-20 | 2018-08-07 | 上海战诚电子科技股份有限公司 | Television board flash memory data processing method |
US10866746B2 (en) * | 2017-12-28 | 2020-12-15 | Silicon Motion Inc. | Memory addressing methods and associated controller, memory device and host |
KR20200088564A (en) * | 2019-01-15 | 2020-07-23 | 에스케이하이닉스 주식회사 | Controller, operation method of controller, and memory system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6181981B1 (en) * | 1996-05-15 | 2001-01-30 | Marconi Communications Limited | Apparatus and method for improved vending machine inventory maintenance |
CN1404292A (en) * | 2001-09-05 | 2003-03-19 | 英业达集团(上海)电子技术有限公司 | Mutual data transmission method between digital camera and portable electronic communication equipment |
CN1720496A (en) * | 2002-10-30 | 2006-01-11 | 爱特梅尔股份有限公司 | Method for identification of SPI compatible serial memory devices |
-
2006
- 2006-06-16 CN CN200610083984XA patent/CN101089830B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6181981B1 (en) * | 1996-05-15 | 2001-01-30 | Marconi Communications Limited | Apparatus and method for improved vending machine inventory maintenance |
CN1404292A (en) * | 2001-09-05 | 2003-03-19 | 英业达集团(上海)电子技术有限公司 | Mutual data transmission method between digital camera and portable electronic communication equipment |
CN1720496A (en) * | 2002-10-30 | 2006-01-11 | 爱特梅尔股份有限公司 | Method for identification of SPI compatible serial memory devices |
Also Published As
Publication number | Publication date |
---|---|
CN101089830A (en) | 2007-12-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9514063B2 (en) | Secure compact flash | |
US7765373B1 (en) | System for controlling use of a solid-state storage subsystem | |
CN1140880C (en) | Secure memory having anti-wire tapping | |
US7469837B2 (en) | Storage device | |
US9251381B1 (en) | Solid-state storage subsystem security solution | |
US20030167395A1 (en) | Implementation of storing secret information in data storage reader products | |
US20100058073A1 (en) | Storage system, controller, and data protection method thereof | |
US20090070599A1 (en) | Memory card, application program holding method, and holding program | |
CN102576334A (en) | Authentication and protection of write-once read-many (WORM) memory devices | |
EP2849111B1 (en) | OTP generation on portable medium | |
CN101320355B (en) | Memory device, storing card access apparatus and its read-write method | |
CN101089830B (en) | Memory device and its operation method | |
CN100593213C (en) | Memory device with multiple partitions | |
KR20080044502A (en) | Memory card system and method transmitting password thereof | |
US20070022222A1 (en) | Memory device and associated method | |
CN102110061B (en) | Block managing method, flash controller and flash memory device | |
US20090187898A1 (en) | Method for securely updating an autorun program and portable electronic entity executing it | |
US20120198155A1 (en) | Portable data carrier having additional functionality | |
CN105868643A (en) | Data protection method, memory control circuit unit, and memory storage device | |
CN2512045Y (en) | IC distinguishable memory device with extending interface | |
JP5932588B2 (en) | IC card, portable electronic device, and IC card processing device | |
JP2008059380A (en) | Storage medium | |
US11886734B2 (en) | Secure memory card and control method thereof | |
CN2512046Y (en) | Integrated IC distinguishable device with universal standard computer interface | |
CN103778073A (en) | Data protection method, mobile communication device and storage storing device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100609 Termination date: 20150616 |
|
EXPY | Termination of patent right or utility model |