CN102110061B - Block managing method, flash controller and flash memory device - Google Patents

Block managing method, flash controller and flash memory device Download PDF

Info

Publication number
CN102110061B
CN102110061B CN2009102623773A CN200910262377A CN102110061B CN 102110061 B CN102110061 B CN 102110061B CN 2009102623773 A CN2009102623773 A CN 2009102623773A CN 200910262377 A CN200910262377 A CN 200910262377A CN 102110061 B CN102110061 B CN 102110061B
Authority
CN
China
Prior art keywords
host computer
computer system
cut section
authentication code
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2009102623773A
Other languages
Chinese (zh)
Other versions
CN102110061A (en
Inventor
游祥雄
黄意翔
吴宗霖
沈育仲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Phison Electronics Corp
Original Assignee
Phison Electronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Phison Electronics Corp filed Critical Phison Electronics Corp
Priority to CN2009102623773A priority Critical patent/CN102110061B/en
Publication of CN102110061A publication Critical patent/CN102110061A/en
Application granted granted Critical
Publication of CN102110061B publication Critical patent/CN102110061B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a block managing method, a flash controller and a flash memory device. The block managing method comprises steps as follows: firstly, grouping blocks of the flash memory device into a first partition area and a second partition area; then judging whether an authentication code exists; providing the blocks belonging to the first partition area to a host computer system for accessing when the authentication code is judged to exist, and enabling the host computer system to display the first partition area and hide the second partition area; later receiving the authentication information from the host computer system to authenticate whether the authentication information is identical with the authentication code; and providing the blocks belonging to the second partition area to the host computer system for accessing when the authentication information is authenticated to be identical with the authentication code, and enabling the host computer to display the second partition area and hide the first partition area. The block managing method, the flash controller and the flash memory device provided by the embodiment can provide different blocks to the host computer system for accessing, and further enable the host computer system to automatically switch the displayed slot thereof.

Description

Block management method and flash controller and flash memory device
Technical field
The present invention relates to a kind of block management method for flash memory, relate in particular to a kind of block management method and flash controller and flash memory device.
Background technology
Along with universal serial bus (Universal Series Bus, referred to as: the USB) rise of the development of specification and flash memory, the USB flash disk of being convenient to carry have just like become one of indispensable digital product of modern.The appearance of USB flash disk also makes the mediums such as 3.5 cun floppy disks (floppy disk) and CD respectively and disappears because of the shortcoming such as the too small and Data Update of capacity is inconvenient thereupon.
As long as host computer system possesses the transmission interface compatible with the USB flash disk product, though be so data to be write USB flash disk or the data that read in USB flash disk all very convenient, the portability of data also thereby significantly promotes.Just because of this, the user more and more is accustomed to utilizing the USB flash disk store various kinds of data, and then can process data on private or public host computer system.
But what be not difficult to infer is, just because of the volume of USB flash disk is comparatively light and handy, the user tends to not know losing USB flash disk unintentionally., when USB flash disk is picked up while obtaining by other people, also, because USB flash disk inside does not have any user's identity identification information, virtually increased the degree of difficulty of giving back.Moreover the day by day universal of USB flash disk also easily causes majority to have the situation of identical style USB flash disk, and then is difficult to pick out rapidly the real owner of USB flash disk.Under these circumstances, the significant data that is stored in USB flash disk is also easily got and is leaked by other people mistake because of USB flash disk.
Therefore, for fear of the significant data that is stored in USB flash disk, leak, generally all can obtain by the authentication information that input is for example password the access rights of USB flash disk.When USB flash disk was connected to host computer system, in order input authentication information to obtain access rights to host computer system, host computer system all needed to have the formula of input authentication information usually.
, so this formula must be pre-stored in USB flash disk, can't obtain the access rights of USB flash disk to avoid host computer system not have this formula.Yet the fixing groove position (slot) that shows this formula of storage of USB flash disk, can not allow the user feel inconvenience if the user does not plan to set default authentication code, and the burden that seems.
Summary of the invention
The purpose of this invention is to provide a kind of block management method, according to flash memory device, set having or not of authentication code, can provide different block for the host computer system access, and then make can the automatically switch groove position of its demonstration of host computer system.
The purpose of this invention is to provide a kind of flash controller.Set having or not of authentication code according to flash memory device, flash controller can provide different block for the host computer system access, and then makes can the automatically switch groove position of its demonstration of host computer system.
The purpose of this invention is to provide a kind of flash memory device.Set having or not of authentication code according to flash memory device, flash memory device can provide different block for the host computer system access, and then makes can the automatically switch groove position of its demonstration of host computer system.
Embodiments of the invention provide a kind of block management method, are used for a plurality of blocks of management one flash memory device.At this, flash memory device comprises a flash controller.Above-mentioned block management method comprises the steps.At first, at least part of block is grouped into one first cut section and one second cut section.Then, judge whether an authentication code exists.When authentication code exists, provide the block that belongs to the first cut section to a host computer system access, so that host computer system shows the first cut section and concealment (hide) second cut section.Afterwards, receive the authentication information from host computer system, whether identical with authentication code with the authentication authentication information.When authentication information is identical with authentication code, provide the block that belongs to the second cut section to the host computer system access, so that host computer system shows the second cut section, and hide the first cut section.
In one embodiment of this invention, above-mentioned block management method also comprises when authentication code does not exist, and provides the block that belongs to the second cut section to the host computer system access, so that host computer system shows the second cut section and hides the first cut section.
In one embodiment of this invention, above-mentioned block management method also comprise when authentication information and authentication code not simultaneously, do not provide the block that belongs to the second cut section to the host computer system access, so that host computer system continues to show the first cut section and hides the second cut section until the authentication information that receives is identical with authentication code.
In one embodiment of this invention, before the step of block to the host computer system access that belongs to the first cut section was provided, above-mentioned block management method also comprised the steps.At first, judge whether to receive from one of host computer system and confirm instruction., if receive the confirmation instruction from host computer system, do not provide the block of the first cut section and the second cut section to the host computer system access, so that host computer system concealment the first cut section and the second cut section., if do not receive the confirmation instruction from host computer system, provide the block that belongs to the first cut section to the host computer system access, so that host computer system shows the first cut section and hides the second cut section.
In one embodiment of this invention, after the step of block to the host computer system access of the first cut section and the second cut section was not provided, above-mentioned block management method also comprised the steps.At first, receive the authentication information from host computer system, and whether the authentication authentication information is identical with authentication code.When authentication information is identical with authentication code, provide the block that belongs to the second cut section to the host computer system access, so that host computer system shows the second cut section.
In one embodiment of this invention, above-mentioned block management method also comprise when authentication information and authentication code not simultaneously, do not provide the block of the first cut section and the second cut section to the host computer system access, so that host computer system lasting concealment the first cut section and the second cut section are until the authentication information that receives is identical with authentication code.
In one embodiment of this invention, if wherein in the step that receives from the confirmation instruction of host computer system, the operating system of host computer system is one first operating system.At this, the first operating system has one first formula, and host computer system transmits authentication information to flash controller by the first formula.
In one embodiment of this invention, wherein flash controller comprises one second formula, and at authentication authentication information and authentication code, whether in identical step, by the second formula, authenticates authentication information.
In one embodiment of this invention, if wherein in the step that does not receive from the confirmation instruction of host computer system, the operating system of host computer system is one second operating system, and wherein the second operating system is different from the first operating system.
In one embodiment of this invention, wherein belong to block stores 1 the 3rd formula of the first cut section, at authentication authentication information and authentication code, whether in identical step, by the 3rd formula, authenticate authentication information.
In one embodiment of this invention, above-mentioned management method also comprises the block of another part is grouped into one the 3rd cut section and authentication storage code in the 3rd cut section, and hides the 3rd cut section.
Another embodiment of the present invention provides a kind of flash controller, and it is used for a plurality of blocks of management one flash memory device.Flash controller comprises a microprocessor unit, a medium interface unit, a host interface unit and a medium management unit.The medium interface unit is connected to microprocessor unit, in order to connect a medium.Host interface unit is connected to microprocessor unit, in order to connect a host computer system.The medium management unit is connected to microprocessor unit, in order to the block with at least part of, is grouped into one first cut section and one second cut section.Whether medium management unit judges one authentication code exists.When authentication code existed, the medium management unit provided the block that belongs to the first cut section to the host computer system access, so that host computer system shows the first cut section and hides the second cut section.Whether afterwards, the medium management unit receives the authentication information from host computer system, identical with authentication code with the authentication authentication information.Therefore, when authentication information was identical with authentication code, the medium management unit provided the block that belongs to the second cut section to the host computer system access, so that host computer system shows the second cut section and hides the first cut section.
In one embodiment of this invention, wherein before host computer system showed the first cut section and hides the second cut section, the medium management unit also judges whether to receive from one of host computer system confirmed instruction.If receive the confirmation instruction from host computer system, the medium management unit the first cut section and the second cut section are not provided block to the host computer system access, so that host computer system concealment the first cut section and the second cut section.If do not receive the confirmation instruction from host computer system, the medium management unit provides the block that belongs to the first cut section to the host computer system access, so that host computer system shows the first cut section and hides the second cut section.In addition, while receiving the confirmation instruction from host computer system in the medium management unit, the operating system of host computer system is one first operating system.At this, the first operating system has one first formula, and host computer system transmits authentication information to flash controller by the first formula.In addition, while not receiving the confirmation instruction from host computer system in the medium management unit, the operating system of host computer system is one second operating system, and wherein the second operating system is different from the first operating system.At this, belong to block stores 1 the 3rd formula of the first cut section, the medium management unit is by the 3rd formula authentication authentication information.
Another embodiment of the present invention provides a kind of flash memory device, is used for a host computer system.Flash memory device comprises a connector, a medium and a flash controller.Connector is in order to connect host computer system.Flash controller connects connector and medium, in order to the block with at least part of, is grouped into one first cut section and one second cut section.Flash controller judges whether an authentication code exists.When authentication code existed, flash controller provided the block that belongs to the first cut section to the host computer system access, so that host computer system shows the first cut section and hides the second cut section.Whether afterwards, flash controller receives the authentication information from host computer system, identical with authentication code with the authentication authentication information.Therefore, when authentication information was identical with authentication code, flash controller provided the block that belongs to the second cut section to the host computer system access, so that host computer system shows the second cut section and hides the first cut section.
In one embodiment of this invention, wherein before host computer system showed the first cut section and hides the second cut section, flash controller also judges whether to receive from one of host computer system confirmed instruction.If receive the confirmation instruction from host computer system, flash controller the first cut section and the second cut section are not provided block to the host computer system access, so that host computer system concealment the first cut section and the second cut section.If do not receive the confirmation instruction from host computer system, flash controller provides the block that belongs to the first cut section to the host computer system access, so that host computer system shows the first cut section and hides the second cut section.In addition, after host computer system concealment the first cut section and the second cut section, flash controller also receives the authentication information from host computer system, and whether the authentication authentication information is identical with authentication code.When authentication information was identical with authentication code, flash controller provided the block that belongs to the second cut section to the host computer system access, so that host computer system shows the second cut section.In addition, when authentication information and authentication code not simultaneously, flash controller does not provide the block of the first cut section and the second cut section to the host computer system access, so that host computer system lasting concealment the first cut section and the second cut section are until the authentication information that receives is identical with authentication code.
Another embodiment of the present invention provides a kind of block management method, and it is used for a plurality of blocks of management one flash memory device, and wherein flash memory device comprises a flash controller.Above-mentioned block management method comprises the steps.At first, judge whether to receive from one of a host computer system and confirm instruction.If while receiving the confirmation instruction, carry out one first authentication procedure, whether identical with authentication code to authenticate an authentication information, wherein host computer system is used one first operating system.If while not receiving the confirmation instruction, carry out one second authentication procedure, whether identical with authentication code with the authentication authentication information, wherein host computer system is used one second operating system.
In one embodiment of this invention, above-mentioned block management method also comprises the steps.At first, at least part of block is grouped into one first cut section and one second cut section.Then, judge whether an authentication code exists.If authentication code exists, and while receiving the confirmation instruction, carry out the first authentication procedure.When carrying out the first authentication procedure,, if authentication information is identical with authentication code, provide the block that belongs to the second cut section to the host computer system access, so that host computer system shows the second cut section.If authentication code exists, and while not receiving the confirmation instruction, carry out the second authentication procedure.When carrying out the second authentication procedure,, if authentication information is identical with authentication code, provide the block that belongs to the second cut section to the host computer system access, so that host computer system shows the second cut section and hides the first cut section.
In one embodiment of this invention, above-mentioned block management method also comprises the steps.When authentication code does not exist, provide the block that belongs to the second cut section to the host computer system access, so that host computer system shows the second cut section and hides the first cut section.
In one embodiment of this invention, above-mentioned block management method also comprises the steps.Before carrying out the first authentication procedure, do not provide the block of the first cut section and the second cut section to the host computer system access, so that host computer system concealment the first cut section and the second cut section.
In one embodiment of this invention, above-mentioned block management method also comprises the steps.When carrying out the first authentication procedure, if authentication information and authentication code not simultaneously, do not provide the block of the first cut section and the second cut section to the host computer system access, so that host computer system continues concealment the first cut section and the second cut section.
In one embodiment of this invention, above-mentioned block management method also comprises the steps.When carrying out the first authentication procedure,, if authentication information and authentication code are not simultaneously, repeatedly carry out the first authentication procedure until authentication information is identical with authentication code.
In one embodiment of this invention, wherein in the step of carrying out the first authentication procedure, by one first formula and one second formula, carry out the first authentication procedure.At this, the first operating system comprises the first formula, and flash controller comprises the second formula.
In one embodiment of this invention, above-mentioned block management method also comprises the steps.When carrying out the second authentication procedure, if authentication information and authentication code not simultaneously, do not provide the block that belongs to the second cut section to the host computer system access, so that host computer system continues show the first cut section and hide the second cut section.
In one embodiment of this invention, above-mentioned block management method also comprises the steps.When carrying out the second authentication procedure,, if authentication information and authentication code are not simultaneously, repeatedly carry out the second authentication procedure until authentication information is identical with authentication code.
Based on above-mentioned, the block management method that the embodiment of the present invention provides, it is suitable for protecting with input authentication information the flash memory device of storage data.If the user does not set authentication code at flash memory device, flash memory device can provide suitable block for the host computer system access, and then make can the automatically switch groove position of its demonstration of host computer system, so that unnecessary groove position and the application of host computer system concealment.
For above-mentioned feature and advantage of the present invention can be become apparent, embodiment cited below particularly, and be described in detail below by reference to the accompanying drawings.
Description of drawings
Figure 1A is the host computer system of the use flash memory device of the embodiment of the present invention.
Figure 1B is the schematic diagram of computer, input/output device and the flash memory device of the embodiment of the present invention.
Fig. 1 C be the embodiment of the present invention digital camera (video camera) and the schematic diagram of used flash memory device.
Fig. 2 is the summary calcspar of the flash-memory storage system of the embodiment of the present invention.
Fig. 3 is the schematic diagram of the medium of the embodiment of the present invention.
Fig. 4 is the process flow diagram of block management method of the flash memory of the embodiment of the present invention.
Fig. 5 is the process flow diagram of block management method of the flash memory of another embodiment of the present invention.
The main element symbol description:
1000: host computer system; 1100: computer;
1102: microprocessor; 1104: random access memory;
1108: system bus; 1110: data transmission interface;
1106: input/output device; 100: flash memory device;
1202: mouse; 1204: keyboard;
1206: display; 1208: printer;
The 1212:U dish; 1214: storage card;
1216: solid state hard disc; 1310: digital camera (video camera);
The 1312:SD card; The 1314:MMC card;
The 1318:CF card; 1316: memory stick;
1320: embedded memory storage; 110: flash controller;
110a: microprocessor unit; 110b: medium management unit;
110c: medium interface unit; 110d: host interface unit;
120: connector; 130: medium;
310-0~310-N: block; 320: the first cut sections;
330: the second cut sections; 300: bus-bar;
S401、S403、S405、S407、S408、S409、S411、S412、S413、S415、
S417, S418, S419, S501, S503, S505, S507: step.
Embodiment
Figure 1A is the host computer system of the use flash memory device of the embodiment of the present invention.Figure 1B is the schematic diagram of computer, input/output device and the flash memory device of the embodiment of the present invention.Fig. 1 C be the embodiment of the present invention digital camera (video camera) and the schematic diagram of used flash memory device.
Please refer to Figure 1A, host computer system 1000 generally comprises computer 1100 and I/O, and (input/output, referred to as I/O) device 1106.Computer 1100 comprise microprocessor 1102, random access memory (randomaccess memory, referred to as: RAM) 1104, system bus 1108 and data transmission interface 1110.Input/output device 1106 comprises mouse 1202, keyboard 1204, the display 1206 and printer 1208 as Figure 1B.It must be appreciated, the unrestricted input/output device 1106 of the device shown in Figure 1B, input/output device 1106 can also comprise other devices.
Flash memory device 100 is to be connected with other elements of host computer system 1000 by data transmission interface 1110 in embodiments of the present invention.Data can be write to flash memory device 100 or reading out data from flash memory device 100 by microprocessor 1102, random access memory 1104 with the processing of input/output device 1106.For example, flash memory device 100 can be as shown in Figure 1B USB flash disk 1212, storage card 1214 or solid state hard disc (Solid State Drive, referred to as: SSD) 1216.
Generally speaking, host computer system 1000 can be any system that can store data substantially.Although in the present embodiment, host computer system 1000 is to explain with computer system, yet host computer system 1000 can be the systems such as digital camera, video camera, communicator, reproducing apparatus for phonotape or video signal player in another embodiment of the present invention.For example, be digital camera (video camera) 1310 o'clock in host computer system, flash memory device is its SD card 1312 that uses, mmc card 1314, CF card 1318, memory stick (memorystick) 1316 or embedded memory storage 1320 (as shown in Figure 1 C).Embedded memory storage 1320 comprise embedded multi-media card (Embedded MMC, referred to as: eMMC).It is worth mentioning that, embedded multi-media card is to be directly connected on the substrate of host computer system.
Fig. 2 is the summary calcspar of the flash-memory storage system of the embodiment of the present invention.Please refer to Fig. 2, flash memory device 100 can use together with host computer system 1000 usually, so that host computer system 1000 can be stored to data flash memory device 100 or reading out data from flash memory device 100.In the present embodiment, flash memory device 100 is USB flash disk.But it must be appreciated, in another embodiment of the present invention flash memory device 100 can be also solid state hard disc (Solid State Drive, referred to as: SSD) or storage card.
Flash memory device 100 comprises flash controller 110, connector 120 and medium 130.
Flash controller 110 can be carried out a plurality of logic locks or the steering order with hardware pattern or firmware pattern implementation, and according to the instruction of host computer system 1000, carries out writing, read and erase etc. of data in medium 130.Flash controller 110 comprises microprocessor unit 110a, medium management unit 110b, medium interface unit 110c and host interface unit 110d.
Microprocessor unit 110a in order to cooperative cooperatings such as medium management unit 110b, medium interface unit 110c and host interface unit 110d to carry out the various runnings of flash memory device 100.
Medium management unit 110b is connected to microprocessor unit 110a, in order to carry out according to the block management mechanism of the present embodiment and the authentication of input message.
Specifically, for fear of the significant data that is stored in flash memory device, leak, it is for example the authentication code of password that the user can set flash memory device usually.Afterwards, when flash memory device is connected to host computer system, by the user, input correct authentication information, host computer system can obtain the right of access flash memory device.Wherein, what deserves to be explained is that authentication code also can refer to the data of password after processing again (as encryption) that flash memory device is set the user, authentication information also can refer to the password data through again process (as encryption) after of host computer system to user's input.
Therefore, in the present embodiment, when flash memory device 100 is connected to host computer system 1000, the difference of the operating system of using according to host computer system 1000, host computer system 1000 determines whether to transmit one is confirmed that instruction is to medium management unit 110b, to carry out the authentication of input message with it.Simultaneously, whether medium management unit 110b can be set authentication code according to flash memory device 100, to determine the accessible memory block of host computer system 1000.
That is to say, whether medium management unit 110b can exist according to authentication code, provides suitable block for the host computer system access, and then makes the groove position of changeable its demonstration of host computer system.The block management mechanism of the present embodiment and the authentication of input message will be described in detail below.
In the present embodiment, medium management unit 110b is embodied in flash controller 110 with a firmware pattern.For example, the medium management unit 110b that will comprise a plurality of programmings (for example is burned onto a formula storer, ROM (read-only memory) (Read Only Memory, referred to as: ROM)) in and this formula storer is embedded in flash controller 110, when flash memory device 100 running, a plurality of machine instructions of medium management unit 110b can have been carried out by microprocessor unit 110a machine-processed according to the block management of the embodiment of the present invention.
In another embodiment of the present invention, the steering order of medium management unit 110b also can the source code pattern be stored in the specific region (for example, being exclusively used in the system region of storage system data in flash memory) of medium 130.Same, when flash memory device 100 running, a plurality of steering orders of medium management unit 110b can be carried out by microprocessor unit 110a.In addition, in another embodiment of the present invention, medium management unit 110b also can a hardware pattern be embodied in flash controller 110.
Medium interface unit 110c is connected to microprocessor unit 110a and in order to access medium 130.That is to say, the data of wanting to write to medium 130 can be converted to 130 receptible forms of medium via medium interface unit 110c.
Host interface unit 110d is the instruction that is connected to microprocessor unit 110a and in order to reception and identification host computer system 1000, transmits.That is to say, the instruction that host computer system 1000 transmits and data can be sent to microprocessor unit 110a by host interface unit 110d.it must be appreciated, host interface unit 110d of the present invention can be advanced annex (the Serial Advanced TechnologyAttachment of sequence, referred to as: SATA) interface, universal serial bus (Universal Serial Bus, referred to as: USB) interface, Institute of Electrical and Electric Engineers (Institute of Electrical and ElectronicEngineers, referred to as: IEEE) 1394 interfaces, high-speed peripheral component connecting interface (PeripheralComponent Interconnect Express, referred to as: PCI Express), memory stick (Memory Sick, referred to as: MS) interface, multimedia storage card (Multi Media Card, referred to as: MMC) interface, compact flash (Compact Flash, referred to as: CF) interface, integrated driving electrical interface (IntegratedDevice Electronics, referred to as: IDE) or other data transmission interfaces that are fit to.
In addition, though in the present embodiment not shown, flash controller 110 also comprises that error correction unit and Power Management Unit etc. are used for controlling the general utility functions module of flash memory.
Connector 120 is to be connected to flash controller 110 and in order to pass through bus-bar 300, to connect host computer systems 1000.It must be appreciated, the connector 120 of the embodiment of the present invention can be SATA connector, USB connector, IEEE 1394 connectors, PCI Express connector, MS connector, MMC connector, CF connector, IDE connector or other connectors that is fit to.
Medium 130 be connected to flash controller 110 and in order to the storage to the application of user's authentication information and data that the user stores.
Fig. 3 is the schematic diagram of the medium of the embodiment of the present invention.Please refer to Fig. 3, medium 130 comprises block 310-0~310-N.In the present embodiment, medium management unit 110b can be divided into block 310-0~310-N the first cut section 320 and the second cut section 330, wherein the first cut section 320 comprises block 310-0~310-P, and the second cut section 330 comprises block 310-(P+1)~310-N.Above-mentioned P and N are positive integer, the number of blocks of each district's configuration of its representative.
In the present embodiment, belong to the block 310-0~310-P of the first cut section 320 in order to the application of storage to user's input authentication information.When this application is performed, user's input authentication information can be provided, but so that user's data that host computer system 1000 access the second cut sections 330 are stored.Belong to the block 310-(P+1) of the second cut section 330~310-N and be the memory capacity for the user, its number of blocks can be than the first cut section more than 320.
In the present embodiment, when flash memory device 100 was connected to host computer system 1000, whether medium management unit 110b can exist authentication code according to flash memory device 100, to determine the accessible memory block of host computer system 1000.
At this, authentication code can be flash memory device 100 when using for the first time, set by the user, leak with the significant data in the block 310-(P+1) that avoids being stored in the second cut section 330~310-N.In the present embodiment, it is while using for the first time that the setting of authentication code is not limited to, when when also can be other, flash memory device 100 is used.
Specifically, the operating system of being used with host computer system 1000 is as WINDOWS 7 as example, and when flash memory device 100 was connected to host computer system 1000, host computer system 1000 can activation flash memory devices 100.At this moment, medium management unit 110b can judge first whether authentication code is present in flash memory device 100.
Therefore, if when authentication code exists, operating system WINDOWS 7 can send one and confirm instruction, to confirm flash memory device 100, whether supports a standard agreement (standard protocol).
If flash memory device 100 is supported this standard agreement, host computer system 1000 can be carried out the authentication of input message with medium management unit 110b.At this, above-mentioned standard agreement is for example IEEE (Institute ofElectrical and Electronic Engineers, referred to as: IEEE) ordered standard agreement IEEE 1667, or other comprise the agreement of a main frame active certification mechanism, but the present invention is not limited to this.
When flash memory device 100 was connected to host computer system 1000, operating system WINDOWS 7 can send the confirmation instruction, required flash controller 110 to reply it and whether supported standard agreement IEEE 1667.If flash controller 110 is replied it and supported standard agreement IEEE 1667, host computer system 1000 can be carried out the authentication of input message with flash memory device 100.
That is to say, host computer system 1000 is carried out a computing by one first formula in operating system WINDOWS 7 to the authentication information that the user inputs.Then, host computer system 1000 is sent to the result after its computing medium management unit 110b again, to authenticate.Afterwards, flash memory device 100 also can carry out a computing to the authentication code of storing by one second formula in medium management unit 110b.Similarly, medium management unit 110b also is sent to host computer system 1000 with the result after its computing, to carry out interactive authentication.Therefore, in the present embodiment, the operation of above-mentioned interactive authentication may be defined as one first authentication procedure.Wherein, at another embodiment, the second formula also can be stored in medium 130.
That is to say, in the present embodiment, when flash memory device 100 was connected to the host computer system 1000 of using operating system WINDOWS 7, medium management unit 110b can carry out the first authentication procedure with host computer system 1000.
Therefore, when the result of above-mentioned interactive authentication while being correct, represent that namely the authentication information that the user inputs is identical with authentication code.At this moment, medium management unit 110b can provide the second cut section 330 block 310-(P+1)~310-N is for host computer system 1000 accesses, and then host computer system 1000 (not shown) on its screen only shows the second corresponding groove of cut section 330 position.
it should be noted that, in the present embodiment, when flash memory device 100 is connected to host computer system 1000, because operating system WINDOWS 7 must confirm first whether flash memory device 100 supports standard agreement IEEE 1667, and before the first authentication procedure is not completed, flash memory device 100 can not provide a system information of the first cut section 320 and the second cut section 330, wherein, this system information can comprise the capacity data of cut section or archives allocation table (File Allocation Table) etc., therefore this moment, host computer system 1000 can't show the first cut section and the corresponding groove of the second cut section position.
In addition, in the present embodiment, medium management unit 110b carries out interactive authentication with the second formula and host computer system 1000.In another embodiment, the second formula can be also to be stored in the particular block of medium 130, and for medium management unit 110b, to carry out interactive authentication.
Therefore, when the operation system is WINDOWS 7, if authentication code exists, the user can be by the first formula input authentication information identical with authentication code, so that host computer system 1000 obtains the authority of the block 310-(P+1) of access the second cut section 330~310-N.Simultaneously, before user's input authentication information, host computer system 1000 can't show the first cut section and the corresponding groove of the second cut section position on its screen.Afterwards, in user's input authentication information, and when the first authentication procedure, host computer system 1000 only can show the second corresponding groove of cut section 330 position on its screen.
On the contrary, if when authentication code does not exist, host computer system 1000 can directly show the second corresponding groove of cut section 330 position on its screen, and hides the first corresponding groove of cut section 320 position.Therefore, the user does not need input authentication information, and host computer system 1000 can obtain the authority of access block 310-(P+1)~310-N.That is to say, when authentication code does not exist, no matter whether support standard agreement IEEE1667, host computer system 1000 need be through authentication, the authority of the block 310-(P+1) of access the second cut section 330~310-N can be obtained, and then the second cut section 330 can be directly shown.
In another embodiment of the present invention, if the operating system that host computer system 1000 is used is during as WINDOWS XP, when flash memory device 100 was connected to host computer system 1000, operating system WINDOWS XP can't send the confirmation instruction and confirm whether flash controller 110 supports standard agreement IEEE 1667.
Specifically, when flash memory device 100 was connected to host computer system 1000, host computer system 1000 can activation flash memory device 100.At this moment, medium management unit 110b can judge whether an authentication code exists in flash memory device 100.When if medium management unit 110b judgement authentication code exists and does not receive from the confirmation instruction of host computer system 1000, medium management unit 110b can provide the block 310-0~310-P of the first cut section 320, to allow host computer system 1000 accesses to be stored in data in block 310-0~310-P, so the user can carry out the 3rd formula and carries out the authentication of input message.
In other words, in the present embodiment, because can't sending, operating system WINDOWS XP confirms that instruction comes the medium management unit 110b of requirement flash controller 110 to reply it and whether supports standard agreement IEEE 1667, when therefore if authentication code exists, when not receiving the confirmation instruction, medium management unit 110b just can provide the block 310-0~310-P of the first cut section 320 to host computer system 1000 accesses, and then makes host computer system 1000 show the first cut section 320 and hide the second cut section 330.Wherein, medium management unit 110b can be to provide a system information of host computer system 1,000 first cut sections 320, makes by this host computer system 1000 can show that the first cut section 320 is for the user.At this, the 3rd above-mentioned formula can be to be stored in the block that belongs to the first cut section.Therefore, the user can carry out the authentication of input message by carry out the 3rd formula in host computer system.In the present embodiment, the operation of above-mentioned authentification of message may be defined as one second authentication procedure.
Then, medium management unit 110b can carry out the second authentication procedure by the 3rd formula and the host computer system 1000 that are stored in the first cut section.That is, this moment, medium management unit 110b received the authentication information from host computer system 1000, and whether the authentication authentication information is identical with authentication code.When if authentication information is identical with authentication code, medium management unit 110b can respond host computer system 1,000 one media handover informations (media change message), so that its shown cut sections of host computer system 1000 switching, and then provide the block 310-(P+1) of the second cut section 330~310-N for host computer system 1000 accesses.
For example, the system information of supposing the first cut section 320 is stored in block 310-0, and the system information of the second cut section 330 is stored in block 310-(P+1), if be correct after the authentication information that the user inputs is authenticated, medium management unit 110b can receive the next demand (request) from host computer system 1000, and medium management unit 110b can respond the media handover information to host computer system 1000 afterwards.Then, host computer system 1000 can require medium management unit 110b to return its system information again, and host computer system 1000 can be again by block 310-0 reading out data.Then, medium management unit 110b can be back to host computer system 1000 with the system information that is stored in the second cut section 330 of block 310-(P+1).Accordingly, host computer system 1000 can obtain the system information of the second cut section 330, to switch its shown groove position.
Therefore, after the cut section that switching shows, host computer system shows the second cut section 330 and hides the first cut section 320 1000 this moments, and then shows the second corresponding groove of cut section 330 position on its screen, and hides the first corresponding groove of cut section 320 position.
On the contrary, if authentication information and authentication code are not simultaneously, medium management unit 110b only provides the block 310-0~310-P of the first cut section 320 to host computer system 1000 accesses, until the authentication information of user input is when identical with predefined authentication code, but the data that block 310-(P+1)~310-N stores of host computer system 1000 ability access the second cut sections 330.That is to say, if authentication information and authentication code are not simultaneously, host computer system 1000 only can show the first cut section 320 and hide the second cut section 330.
In addition, if when authentication code does not exist, medium management unit 110b can provide the block 310-(P+1) of the second cut section 330~310-N for host computer system 1000 accesses.Therefore, host computer system 1000 can be hidden the first cut section 320 on its screen, and only shows the second corresponding groove of cut section 330 position.That is to say,, if when flash memory device 100 is not set authentication code, need not pass through the second authentication procedure, host computer system 1000 gets final product user's data that block 310-(P+1)~310-N stores of direct access the second cut section 330.
As previously mentioned, if the user does not set authentication code when flash memory device 100, medium management unit 110b can provide the block 310-(P+1) of the second cut section 330~310-N for host computer system 1000 accesses, rather than the block 310-0~310-P of the first cut section 320 is provided.That is, medium management unit 110b can make host computer system 1000 its shown groove position of can automatically switching, and can not show unnecessary groove position and the 3rd formula.
By above-described embodiment as can be known, medium management unit 110b can, according to the difference of operating system, judge whether it receives one and confirm instruction, and determine to carry out the first authentication procedure or the second authentication procedure.
Fig. 5 is the process flow diagram of block management method of the flash memory of another embodiment of the present invention.Please refer to Fig. 5, for example, as step 501-503, when flash memory device 100 is connected to host computer system 1000 and during activation, medium management unit 110b can judge whether it receives one and confirm instruction, if when flash memory device 100 was connected to the host computer system 1000 of using the first operating system (as WINDOWS 7), medium management unit 110b can receive the confirmation instruction from host computer system 1000.Therefore, flash memory device 100 carries out the first authentication procedure with host computer system 1000 by first and second formula, as described in step 505.
On the contrary, when flash memory device 100 was connected to the host computer system 1000 of using the second operating system (as WINDOWS XP), medium management unit 110b can not receive the confirmation instruction from host computer system 1000.Therefore, flash memory device 100 carries out the second authentication procedure by the 3rd formula, as described in step 507.
In the present embodiment, authentication code can be that (Electrically Erasable Programmable Read-Only Memory, referred to as EEPROM) (not shown) for the programmable ROM (read-only memory) of can electricity erasing that is stored in flash memory device 100.Except in the present embodiment, medium management unit 110b is divided into block 310-0~310-N outside the first cut section 320 and the second cut section 330, in other embodiments, medium management unit 110b also can be divided into block 310-0~310-N the first cut section 320, the second cut section 330 and the 3rd cut section (not shown), wherein the 3rd cut section comprises a plurality of blocks, the authentication code that sets to store the user.At this, when flash memory device 100 was connected to host computer system 1000, host computer system 1000 did not show the 3rd cut section.
In other embodiments, flash memory device 100 also can comprise the Another Application formula, to allow the user can select whether will make flash memory device 100 to support standard agreement IEEE 1667, when successful to avoid authenticating, the awkward situation that the public domain of flash memory device 100 also can't be used.
Fig. 4 is the process flow diagram of block management method of the flash memory of the embodiment of the present invention.Please refer to Fig. 2~Fig. 4, in step S401, activation flash memory device 100, for example be connected to host computer system 1000 with flash memory device 100.
Then, in step S403, medium management unit 110b can judge whether authentication code exists.
If not, medium management unit 110b provides the block 310-(P+1) that belongs to the second cut section~310-N to host computer system 1000 accesses in step S405, so that host computer system 1000 shows the second cut sections 330 and hides the first cut section 320.Therefore, need not pass through first and second authentication procedure, host computer system 1000 gets final product the data that block 310-(P+1)~310-N stores of direct access the second cut section 330.
On the contrary, if when medium management unit 110b judgement authentication code exists, carry out step S407.
In step S407, if the operating system that host computer system 1000 is used is during as WINDOWS 7, medium management unit 110b can receive the confirmation instruction from host computer system 1000, this moment, medium management unit 110b can't show the first cut section and the corresponding groove of the second cut section position, as shown in step S408.
Whether then, in step S409, medium management unit 110b receives the authentication information from host computer system 1000, with authentication authentication information and authentication code identical (i.e. the first authentication procedure), as shown in step S411.
When if authentication information is identical with authentication code, in step S412, medium management unit 110b can provide the block 310-(P+1) that belongs to the second cut section 330~310-N to host computer system 1000 accesses, so that host computer system 1000 shows the second cut sections 330.Therefore, but host computer system 1000 data that access block 310-(P+1)~310-N stores.
If when authentication information is not identical with authentication code, get back to step S409, medium management unit 110b can require host computer system 1000 again to transmit authentication information, to carry out the first authentication procedure.That is to say, if authentication information and authentication code are not simultaneously, medium management unit 110b can not provide the first cut section and the second cut section to the host computer system access, until the authentication information of user input is when identical with predefined authentication code, but the host computer system 1000 ability data that access block 310-(P+1)~310-N stores.
In step S407, if the operating system that host computer system 1000 is used during as WINDOWS XP, medium management unit 110b can not receive the confirmation instruction from host computer system 1000.
Therefore, in step S413, medium management unit 110b provides the block 310-0~310-P that belongs to the first cut section 320 to host computer system 1000 accesses, so that host computer system 1000 shows the first cut section 320 and hides the second cut section 330.Therefore, the user can carry out the second authentication procedure by carry out the 3rd formula in host computer system 1000.At this, the 3rd above-mentioned formula is for example to be stored in the block that belongs to the first cut section.
Afterwards, in step S415, the user carries out the second authentication procedure by the 3rd formula.Therefore, after receiving authentication information, whether medium management unit 110b authentication authorization and accounting authentication information is identical with authentication code, as shown in step S417.
If when authentication information is not identical with authentication code, get back to step S415, medium management unit 110b requires host computer system 1000 to transmit authentication information again, to carry out the second authentication procedure.That is to say, if authentication information and authentication code are not simultaneously, medium management unit 110b does not provide the block 310-(P+1) that belongs to the second cut section 330~310-N to host computer system 1000 accesses, so that host computer system continues to show the block 310-0~310-P of the first cut section 320, until the authentication information of user input is when identical with predefined authentication code, but the data that block 310-(P+1)~310-N stores of host computer system 1000 ability access the second cut sections 330.
In step S417,, if when authentication information is identical with authentication code, carry out step S418.In step S418, medium management unit 110b can respond the media handover information to host computer system 1000, to switch its shown cut section.
After switching is completed, medium management unit 110b can provide the block 310-(P+1) that belongs to the second cut section 330~310-N to host computer system 1000 accesses, so that host computer system 1000 shows the second cut section 330, and hide the first cut section 320, and then host computer system 1000 shows the second corresponding groove of cut section 330 position on its screen, as shown in step S419.
In sum, the block management method that embodiments of the invention provide, it is suitable for protecting with authentication information the flash memory device of storage data.If the user does not set authentication code in flash memory device, flash memory device can provide suitable block for the host computer system access, and then makes can the automatically switch groove position of its demonstration of host computer system.Perhaps, the block management method that embodiments of the invention provide, its flash memory device are suitable for the difference of the operating system of using according to host computer system, and different authentication procedures is provided.
It should be noted that finally: above embodiment is only in order to technical scheme of the present invention to be described but not be limited, although with reference to preferred embodiment, the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be modified or be equal to replacement technical scheme of the present invention, and these modifications or be equal to replacement and also can not make amended technical scheme break away from the spirit and scope of technical solution of the present invention.

Claims (20)

1. a block management method, is characterized in that, is used for a plurality of blocks of management one flash memory device, and wherein said flash memory device comprises a flash controller, and described block management method comprises:
At least part of described a plurality of blocks are grouped into one first cut section and one second cut section;
Judge whether an authentication code exists;
When described authentication code exists, judge whether to receive from one of a host computer system and confirm instruction, if receive the described confirmation instruction from described host computer system, do not provide described a plurality of blocks of described the first cut section and described the second cut section to described host computer system access, so that described host computer system described the first cut section of concealment and described the second cut section;
When described authentication code does not exist, provide the described a plurality of blocks that belong to described the second cut section to described host computer system access, so that described host computer system shows described the second cut section and hides described the first cut section;
Reception is from an authentication information of described host computer system;
Authenticate described authentication information whether identical with described authentication code; And
When described authentication information is identical with described authentication code, provide the described a plurality of blocks that belong to described the second cut section to described host computer system access, so that described host computer system shows described the second cut section.
2. block management method according to claim 1, is characterized in that, also comprises:
, if do not receive the described confirmation instruction from described host computer system, provide the described a plurality of blocks that belong to described the first cut section to described host computer system access, so that described host computer system shows described the first cut section and hides described the second cut section.
3. block management method according to claim 1, is characterized in that, also comprises:
When described authentication information and described authentication code not simultaneously, do not provide described a plurality of blocks of described the first cut section and described the second cut section to described host computer system access, so that described host computer system described the first cut section of lasting concealment and described the second cut section are until the described authentication information that receives is identical with described authentication code.
4. block management method according to claim 1, it is characterized in that, wherein in the step of reception from the described confirmation instruction of described host computer system, the operating system of described host computer system is one first operating system, wherein said the first operating system has one first formula, and described host computer system transmits described authentication information to described flash controller by described the first formula.
5. block management method according to claim 4, it is characterized in that, wherein said flash controller comprises one second formula, and at authentication described authentication information and described authentication code, whether in identical step, by described the second formula, authenticates described authentication information.
6. block management method according to claim 2, it is characterized in that, wherein in the step that does not receive from the described confirmation instruction of described host computer system, the operating system of described host computer system is one second operating system, and wherein said the second operating system is different from the first operating system.
7. block management method according to claim 6, it is characterized in that, described a plurality of block stores 1 the 3rd formulas that wherein belong to described the first cut section, whether in identical step, authenticate described authentication information by described the 3rd formula at authentication described authentication information and described authentication code.
8. block management method according to claim 7, is characterized in that, also comprises:
When described authentication information and described authentication code not simultaneously, do not provide the described a plurality of blocks that belong to described the second cut section to described host computer system access, so that described host computer system continues to show described the first cut section and hides described the second cut section until the described authentication information that receives is identical with described authentication code.
9. block management method according to claim 1, is characterized in that, also comprises:
Described a plurality of blocks of another part are grouped into one the 3rd cut section;
Store described authentication code in described the 3rd cut section; And
Hide described the 3rd cut section.
10. a flash controller, is characterized in that, is used for a plurality of blocks of management one flash memory device, and described flash controller comprises:
One microprocessor unit;
One medium interface unit, be connected to described microprocessor unit, in order to connect a medium;
One host interface unit, be connected to described microprocessor unit, in order to connect a host computer system; And
one medium management unit, be connected to described microprocessor unit, be grouped into one first cut section and one second cut section in order to the described a plurality of blocks with at least part of, whether described medium management unit judges one authentication code exists, when described authentication code exists, whether described medium management unit judges receives from one of described host computer system is confirmed instruction, if receive the described confirmation instruction from described host computer system, described medium management unit does not provide described a plurality of blocks of described the first cut section and described the second cut section to described host computer system access, so that described host computer system described the first cut section of concealment and described the second cut section,
When described authentication code did not exist, described medium management unit provided the described a plurality of blocks that belong to described the second cut section to described host computer system access, so that described host computer system shows described the second cut section and hides described the first cut section,
Described medium management unit receives the authentication information from described host computer system, whether and it is identical with described authentication code to authenticate described authentication information, and when described authentication information is identical with described authentication code, described medium management unit provides the described a plurality of blocks that belong to described the second cut section to described host computer system access, so that described host computer system shows described the second cut section.
11. flash controller according to claim 10, it is characterized in that, if wherein do not receive the described confirmation instruction from described host computer system, described medium management unit provides the described a plurality of blocks that belong to described the first cut section to described host computer system access, so that described host computer system shows described the first cut section and hides described the second cut section, while receiving the described confirmation instruction from described host computer system in described medium management unit, the operating system of described host computer system is one first operating system, wherein said the first operating system has one first formula, and described host computer system transmits described authentication information to described flash controller by described the first formula, while not receiving the described confirmation instruction from described host computer system in described medium management unit, the operating system of described host computer system is one second operating system, wherein said the second operating system is different from described the first operating system, and described a plurality of block stores 1 the 3rd formulas that belong to described the first cut section, described medium management unit is by described the 3rd described authentication information of formula authentication.
12. a flash memory device, is characterized in that, is used for a host computer system, described flash memory device comprises:
A connector, in order to connect described host computer system;
One medium; And
one flash controller, connect described connector and described medium, in order to manage a plurality of blocks of described flash memory device, described flash controller is grouped into one first cut section and one second cut section with at least part of described a plurality of blocks, described flash controller judges whether an authentication code exists, when described authentication code exists, described flash controller judges whether to receive from one of described host computer system confirms instruction, if receive the described confirmation instruction from described host computer system, described flash controller does not provide described a plurality of blocks of described the first cut section and described the second cut section to described host computer system access, so that described host computer system described the first cut section of concealment and described the second cut section,
When described authentication code did not exist, described flash controller provided the described a plurality of blocks that belong to described the second cut section to described host computer system access, so that described host computer system shows described the second cut section and hides described the first cut section,
Described flash controller receives the authentication information from described host computer system, whether and it is identical with described authentication code to authenticate described authentication information, and when described authentication information is identical with described authentication code, described flash controller provides the described a plurality of blocks that belong to described the second cut section to described host computer system access, so that described host computer system shows described the second cut section.
13. flash memory device according to claim 12, it is characterized in that, if wherein do not receive the described confirmation instruction from described host computer system, described flash controller provides the described a plurality of blocks that belong to described the first cut section to described host computer system access, so that described host computer system shows described the first cut section and hides described the second cut section, after described host computer system described the first cut section of concealment and described the second cut section, when described authentication information and described authentication code not simultaneously, described flash controller does not provide described a plurality of blocks of described the first cut section and described the second cut section to described host computer system access, so that described host computer system described the first cut section of lasting concealment and described the second cut section are until the described authentication information that receives is identical with described authentication code.
14. a block management method, is characterized in that, is used for a plurality of blocks of management one flash memory device, wherein said flash memory device comprises a flash controller, and described block management method comprises:
At least part of described a plurality of blocks are grouped into one first cut section and one second cut section;
Judging whether an authentication code exists and judge whether to receive from one of a host computer system confirms instruction; If described authentication code exists, and while receiving described confirmation instruction, carry out one first authentication procedure, whether identical with an authentication code to authenticate an authentication information, wherein said host computer system use one first operating system;
When carrying out described the first authentication procedure,, if described authentication information is identical with described authentication code, provide the described a plurality of blocks that belong to described the second cut section to described host computer system access, so that described host computer system shows described the second cut section;
, when if described authentication code does not exist, provide the described a plurality of blocks that belong to described the second cut section to described host computer system access, so that described host computer system shows described the second cut section and hides described the first cut section;
If described authentication code exists, and while not receiving described confirmation instruction, carry out one second authentication procedure, whether identical with described authentication code to authenticate described authentication information, wherein said host computer system use one is different from the second operating system of described the first operating system; And
When carrying out described the second authentication procedure, if described authentication information is identical with described authentication code, provide the described a plurality of blocks that belong to described the second cut section to described host computer system access, so that described host computer system shows described the second cut section and hides described the first cut section.
15. block management method according to claim 14, is characterized in that, also comprises:
Before carrying out described the first authentication procedure, do not provide described a plurality of blocks of described the first cut section and described the second cut section to described host computer system access, so that described host computer system described the first cut section of concealment and described the second cut section.
16. block management method according to claim 14, is characterized in that, also comprises:
When carrying out described the first authentication procedure, if described authentication information and described authentication code are not simultaneously, do not provide described a plurality of blocks of described the first cut section and described the second cut section to described host computer system access, so that described host computer system continues described the first cut section of concealment and described the second cut section.
17. block management method according to claim 16, is characterized in that, also comprises:
When carrying out described the first authentication procedure,, if described authentication information and described authentication code are not simultaneously, repeatedly carry out described the first authentication procedure until described authentication information is identical with described authentication code.
18. block management method according to claim 16, it is characterized in that, wherein in the step of carrying out described the first authentication procedure, carry out described the first authentication procedure by one first formula and one second formula, wherein said the first operating system comprises described the first formula, and described flash controller comprises described the second formula.
19. block management method according to claim 14, is characterized in that, also comprises:
When carrying out described the second authentication procedure, if described authentication information and described authentication code are not simultaneously, do not provide the described a plurality of blocks that belong to described the second cut section to described host computer system access, so that described host computer system continues show described the first cut section and hide described the second cut section.
20. block management method according to claim 19, is characterized in that, also comprises:
When carrying out described the second authentication procedure,, if described authentication information and described authentication code are not simultaneously, repeatedly carry out described the second authentication procedure until described authentication information is identical with described authentication code.
CN2009102623773A 2009-12-24 2009-12-24 Block managing method, flash controller and flash memory device Active CN102110061B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009102623773A CN102110061B (en) 2009-12-24 2009-12-24 Block managing method, flash controller and flash memory device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009102623773A CN102110061B (en) 2009-12-24 2009-12-24 Block managing method, flash controller and flash memory device

Publications (2)

Publication Number Publication Date
CN102110061A CN102110061A (en) 2011-06-29
CN102110061B true CN102110061B (en) 2013-11-13

Family

ID=44174227

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009102623773A Active CN102110061B (en) 2009-12-24 2009-12-24 Block managing method, flash controller and flash memory device

Country Status (1)

Country Link
CN (1) CN102110061B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617127B (en) * 2013-12-04 2017-04-05 杭州华澜微电子股份有限公司 The method of the storage device with subregion and memory partition
CN110908588B (en) * 2018-09-14 2023-04-28 合肥沛睿微电子股份有限公司 Memory control device, control method and generation method of safety characteristics thereof

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1949194A (en) * 2005-10-10 2007-04-18 群联电子股份有限公司 Portable access device with secret function and access method thereof
CN101276310A (en) * 2007-03-30 2008-10-01 中华电信股份有限公司 Portable data access device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1949194A (en) * 2005-10-10 2007-04-18 群联电子股份有限公司 Portable access device with secret function and access method thereof
CN101276310A (en) * 2007-03-30 2008-10-01 中华电信股份有限公司 Portable data access device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JP特开2005-322200A 2005.11.17

Also Published As

Publication number Publication date
CN102110061A (en) 2011-06-29

Similar Documents

Publication Publication Date Title
EP3306515B1 (en) Secure storage devices, with physical input device, for secure configuration in a configuration-ready mode
US8230162B2 (en) Block management method for flash memory, and flash memory controller and flash memory storage device using the same
US8996851B2 (en) Host device and method for securely booting the host device with operating system code loaded from a storage device
EP2396728B1 (en) System and method of host request mapping
CN104541280A (en) Alternative boot path support for utilizing non-volatile memory devices
CN101403997A (en) Usb data flash memory cards with multiple partitions and autorun function
TWI451248B (en) Data protecting method, memory controller and memory storage apparatus
US20160234185A1 (en) Storage device, information processing system, authentication method, and non-transitory computer readable medium
JP2003030613A (en) Storage device and data processor provided with the storage device
CN102110061B (en) Block managing method, flash controller and flash memory device
CN106060050B (en) Auth method and terminal device
CN102301369B (en) Data storage device access method and device
TW201735581A (en) Network communication apparatus and electronic apparatus
KR20200128334A (en) Intelligent wallet apparatus and method for operating the same
CN103218319A (en) Data protection method, memory controller and memory storage device
CN101089830B (en) Memory device and its operation method
US11645000B2 (en) Storage device including memory controller, and non-volatile memory system including the same and operating method thereof
JP2010237768A (en) Auxiliary storage device
CN104317233A (en) Programmable display
US20090187898A1 (en) Method for securely updating an autorun program and portable electronic entity executing it
CN112905495A (en) Storage device, operation method thereof and non-volatile memory system
CN103365807A (en) Bus system of embedded password protection device and implementing method for bus system
KR101686631B1 (en) Apparatus for Smart Secure Storage
CN106033321B (en) Respond read method and data transmission system
CN109063518B (en) Data access method and system and memory storage device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant