TW201025005A - Recognizing method of memory storage device - Google Patents

Recognizing method of memory storage device Download PDF

Info

Publication number
TW201025005A
TW201025005A TW97151562A TW97151562A TW201025005A TW 201025005 A TW201025005 A TW 201025005A TW 97151562 A TW97151562 A TW 97151562A TW 97151562 A TW97151562 A TW 97151562A TW 201025005 A TW201025005 A TW 201025005A
Authority
TW
Taiwan
Prior art keywords
block
memory
identification
storage device
rti
Prior art date
Application number
TW97151562A
Other languages
Chinese (zh)
Other versions
TWI385522B (en
Inventor
zhi-wen Zheng
Original Assignee
Ddtic Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ddtic Corp Ltd filed Critical Ddtic Corp Ltd
Priority to TW97151562A priority Critical patent/TWI385522B/en
Publication of TW201025005A publication Critical patent/TW201025005A/en
Application granted granted Critical
Publication of TWI385522B publication Critical patent/TWI385522B/en

Links

Abstract

A recognizing method of a memory storage device which has a memory unit is provided. The memory unit consists of a plurality of continuous physical blocks. The recognizing method includes the following steps: first, reserving one of the physical blocks, and marking it as a particular physical block; next, writing a control command into the particular physical block; finally, executing a respond process to display or change the status of the memory unit according to the control command.

Description

201025005 六、發明說明: 【發明所屬之技術領域】 種記憶體儲存裝 本發明係關於一種辨識方法, 置之辨識方法。 g 【先前技術】 為了提高播案的可攜性,遂漸 置,如記憶卡、USB隨身碟,以方展出T攜式儲存裝 請參考第一圖,該圖係為習知之記時隨地儲存資料。 系統架構示意圖。如第一圖所示,二之具體實施例之 單元11以及一記憶單元13。 °己隐卡1中具有一控制201025005 VI. Description of the invention: [Technical field to which the invention pertains] Memory storage device The present invention relates to an identification method and an identification method. g [Prior Art] In order to improve the portability of the broadcast, 遂 遂 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , 记忆 , Store data. Schematic diagram of system architecture. As shown in the first figure, a unit 11 of a specific embodiment and a memory unit 13 are shown. ° has a control in the hidden card 1

Memory)具有高儲存密度、低耗電記效 =iFlash 與合理價袼成本等伽,而麵目的存取效率 控制單元11係耦接於記憶單元13田之主流。 未示)下達之指令來將資料存取於記憶^元;^機端(圖中 3記憶體有許多種類’且其價格亦有 父憶體包括採用多級單元型記憶體 u 1 eve -ceu,MLC )製成之高密度記憶體(扭迚 denSltymemory)或單級單元型記憶體(singie_ievei c吼 SLC)’製成之低密度記憶體…㈣咖办麵丽乂)。相較 於低密度記㈣,高密度記賴單位面積的資料儲存容量 可成倍數增加,因而具有大幅提高儲存容量與降低成本的 優勢,然其讀寫資料、執行燒錄與抹除(Erase)動作所需 的時間卻較長,·此外,多級單元製程技術也致使高密度記 憶體所能承受的抹寫次數氓rase cyde)較少,如此便連帶影 響了採用高密度記憶體的儲存裝置的資料存取速度與使用 201025005 壽命。為了避免不肖業者將品質差或價格低的記憶體替換 成原廠s己憶卡1中的記憶單元13,並大量製造、兜售仿冒 品來破壞原廠記憶卡1之市場競爭性,業者紛紛提出許多 防偽之機制。 士目f市面上常見的防偽方式大多係於原廠記憶卡1中 的》己隐單元I3内儲存含有產品序號的辨識資料,經由特殊 軟體來查驗此辨識資料是否合法。然而,有心人士仍很容 易破解軟體的運作演算法來得到合法之辨識資料。或是, 癱 參 料儲存於記憶單元13中特定之位址,並設計硬體 :該特位址讀取辨識資料來辨別記憶單元13的真 一。人士僅需一樣在仿冒品的該特定之位址寫人;I;目 同的辨識資料,仍然能大量複製盜用。寫相 己隐卡1除了用以錯存資料,確保眘料的—入扣^ 2未來的發展重點。目2 APS、CSS、RPC、Γ>ρα/γ… π門令你”隻筏術如 僅接受讀取和寫入資料的動;,若要隐卡1 例如查詢序號、資料防齡Μ二用其他特殊功能, 合的軟體或驅動程式,以提供:對應端:裝適 由於每台主機所使用之軟硬體、連接介。然而, 在主機上安裝軟體和驅動 白有出入,因此 進而無法達到跨平台4=1在相容性的問題, =人員皆須事先安裝用以辨=卡1 體’將拉長測試時間並增加測試程序之不便性式或應用軟 【發明内容】 4 201025005 之辨本=之目的係在於提供一種記憶體儲存裝置 識方法’其利用存取一存放辨識資料的位址來對 裝置進行控制,以改善習知技術之問題。 本發明係揭示-種記憶體儲存袭置之辨識方法, Φ ❹ 置具有—記憶單元,其由連續之複數個實體區 塊,成。所述之辨識方法的步驟如下··首先,保留其 ^貫體區塊’並將其標記為—特殊功能實體區塊;再來, 寫^-控制指令至特殊功能實魏塊;最後,進行一回鹿 益其ί據該控制指令來顯示或改變該記憶單元之狀態: 藉由前述技術转,本發明係將辨識資料事先儲存在-,直接存取該特定位址來對儲存裝置進行 、免絲鶴程叙情盯,制辨識= 之真偽的目的,以及提供—健安全的資料保護機制。 、以上之概述與接下來的詳細說明及附圖,皆是* 步說明本發明為達成預定目的所採取之方式、;段2 力!=明的其他目的及優點,將在後續的“ 【實施方式】 存提出之記龍儲存裝置之辨識方法,係於儲 r藉由控制器直接對該特定位址下達讀取!;=二 來獲仔辨識麟或控_存裝置的使用狀態,以= ==_裝置執行— 201025005 -檔要技術特徵在於在記憶體儲存裝置中產生 二H而’熟悉該項技藝者得知,除了以下所提2 = 牛廉吞己憶體儲存裝置中當然包括其他的必要元件, 不應以本實施例揭露者為限。 ’ « 體儲ft請參㈣二圖,該_為本發明所揭示之記憶 :子《置之-具體實施例之系統架構示意圖。二5 二:二Γ體儲存裝置21 (以下簡稱儲存裝置)係3 2、中,id2中’配合執行寫人與讀取資料。數位系統 逵齡i 1係可插接於域23,接受域23所下 °具體來說’主機23係為一計算機系統,其 =;仃裝置(Mobile Device)、個人電腦(pc)、筆記型電腦 伟_Tablet Pc)、伺服器或個人數位助理器 署1 而儲存裝置21則為計算機系統之一周邊裝 置、可為記憶卡、隨身碟、娜3或固態硬碟。 儲存裝置21包括有一控制單元叫以及一記憶單 =3。控制早211係輕接於主機23與記憶單元213^間, ::收主機23所下達之一控制指令,所述之控制指令可 抬-寫入指令或-讀取指令,寫入指令是將對應一邏輯區 Γ立=「身Γ入記憶單元213中,而讀取指令則是將對 ^邏輯區塊位址的資料從記憶單元213中讀取出來。記 憶早7G213為-快閃記憶體⑺贿乂),其由單級 =記憶體(SLC)、相變化記憶體(pCM)、自由鐵電式隨機存 /己億體(FeRAM)、磁性隨機存取記憶體轉辦 早元記憶體(MLC)之群組組合之一構成。 、 6 201025005 接著,請參考第三圖,該圖係為本發明所揭示之圮憮 單元之-具體實施例之示意圖。其中相關之系統請: 併參考第二圖。如第三圖所示,記憶單元213定義 數個實體區塊PBA。、PBAl、PBA2.·. ..· ’當中包括了無 記錄資料之至少-損壞區塊(圖中以χ來表示之)二 ΪΓ2Γ3裝置21、在出廠時’控制單元211會掃插整個記憶 记錄並收集所有的損壞區塊之位址, =索引^4,如第四圖所示,損壞之實體區塊: 會依序記錄於壞塊索引表4中。 ==表4:内容來將可用之該實體區塊= 複數,輯_A。、二塊表續 二及邏輯區塊之對應關係。資料可依序存: 邏輯=:之:=:單元211將資物存取於 索引表’故業者能事先储存壞塊 裝置21中H 5於母一個新出廠之記憶體儲存 Τ从對其進行辨識。 於本發明之一具體實施例中,使用者备+從》 21插接於主機23時,控制單:母:將儲存裝置 中實體區塊以及、Μ : 會檢項“己憶單元213 相同,若相 4區塊的對應關係是否與邏輯區塊表5 否則便禁Γ ::可進一步使用儲存裝置21來存取資料; 、 切對儲存裝置21的存取動作。 步辨SC:係能判斷!存裝置21之真偽,為了更進- 料,其包括有^二^己f^l213中特別健存一辨識資 己隐體衣造廠商貧訊及其製造日期、實體區 7 201025005 塊大小之資訊、可用之該實體區塊大小 大小之資訊、該壞塊㈣表4或參數壞區塊 -。舉例來說,辨識資料的態樣:、〇組:合之 示製造日期,通表示實大表=商名稱,〇_表 區塊大小,{5,1G,15,表示可用之實體 _ J衣不知壞區塊之旁引佶,也 不把憶單元213之使用狀態之參數資料。’、 將二 =閱圖,本發明特別保留其-之實體區塊, =存位址。功能趣塊係為主二:::裝資: :其溝中通之特中殊 =其_之咖^ t實體區塊PBAi以及錯存辨識資料的 ===存裝置21出廠時預設之實體區塊,亦 J係根據壞塊索引表4之内容而決定的。 抑I具體實施例中,以設計特殊功能實體區塊PBAi為預 二之實體區塊,且鎖定由第—之損壞區塊之下—個實體區 ^存實#㈣者欲辨 ] 時,從主機23端下達一控制指令,主機23 =於預設之邏輯區塊LBA^入該控制指令。控制單元扣 23傳來的控術旨令後,依據賴區塊表5得知 LBAi所制之特殊功能實體 了 1進仃寫入動作,於是便對該控制指令進行解碼, 以提供特殊功能。 假設該控術旨令係欲詢問_=#料,難制單元2ιι 曰從特殊功此實體區塊pBAi中查出辨識資料的儲存位 址,進而從實體區塊PBAj中讀出辨識資料,使用者便能從 201025005 =口之=:識物置211若繼"係 實體區二不的雜邏輯區塊·μ對應的 能實體區塊戦之前有其 得辨钟咨财从处+, 仅匕%广因此無法正確獲 件辨識貝㈣儲存位址;即使主機 Φ m =:=τ特殊:,體區丄::進而查 辨識資料所在之實體區會ί更進-步確認 塊,若是,則證明了辨識資 變記憶單元容可允許被修改來改 可對==指令除了可查詢辨識資訊之功能外,亦 控制指令二鎖=;==: =序二: ===到辨識資料“進行= 成,,以荦=:的繼 複製、寫人隐車凡213内儲存之檔案進行刪除、 欲將開放;己^ 示之動作;同樣地,若控制指令係 、口己憶早疋213 +的所有檔案’則控制單元如 識ΐ=:ΓΙ;:㈣後’會進行解鎖程序’即修改辨 〇〇 _ /數資枓,例如將”010”改成”101”,以開放對 …早7〇 213内儲存之樓案進行刪除、複製、寫入 或顯不之動作。如此一來,每當使用者對記憶單元213中 的槽案進行處理時’控制單元211會根據參數資料的設定 來決定是否輯_進扮目關之處理。 於本發明之一具體實施例中,獲得辨識資料的方法除 201025005 :上述提出將特殊功能實體區塊ΡΒΑ!設定為預設之實體 ,塊,且鎖定由第一之損壞區塊之下一個實體區塊(即實體 區塊PBAj)來儲存辨識資料’亦可使用其他設計來達成。 例如’將特殊功能實體區塊PBAi言曼定為第-之損壞區塊之 下一,^體區塊;或將特殊功能實體區塊PBAi設定為複數 個壞區塊之*引值加總之值的實體區塊’意即若前三 ㈣壞區塊係為ΡΒΑι、PBa2、PBa6,則指定實體區塊 為特殊功能實體區塊1^ ;或設定辨識資料 士子;複數個之損壞區塊之索引值加總之值的實 财’凡是根據壞塊索引表之内容而決定辨識資料所 徵,故限皆屬本發_之技術特 相關之系統架構請同時參閱第二〜五圖 二/、中 所述之辨識方法為以下步驟: U所示’ 鲁 首先,將記憶體儲存裝置21插接於 ^;控制單元211隨即對記憶單元213進行 :::隐單TL213中可用之實體區塊與邏 :二檢 (步驟^著便判斷檢測出了對應關传=_係 s卿若否,則表示記憶單 =二的二容, !!對Τ存裝置的控制行為(步驟S607);若是文禁止-早兀213係為原廠製造。 疋則表不記憶 再來,使用者可於主 _9),意即寫入控制指令於^ 令(步驟 八1肀,控制單元 201025005 211接收到主機23傳來之控制指令後,會經由邏輯 5來轉換邏輯區塊LBAi所對應之實體區壤位址,以判、 否欲將控制指令寫至特殊功能實體區塊PBAi(步ς S611);若否,則表示該控制指令僅係執行一般讀寫動 控制單元211便根據控制指令將資料存取於邏輯區塊心 所對應之實體區齡址(步驟S613);若係將㈣指 1 特殊功能實體區塊PBAi,職示欲執行讀寫動作以^ 殊功能,控制單元211隨即對控制指令進行解碼(步驟 S6I5)’以依據控制指令來進行相對應之_回應程序, 執行顯示或改變記憶單元213之使用狀態之處理。 η控制指令經解碼後,控制單元211便判斷該控制指人 =符合欲查詢儲存裝置21的辨識資料之指令格式(步ς S617),若是,賴特殊魏實體區塊pBAi中查 =儲存位址(步驟S619),進峨辨識資料之儲存位二 j出辨識資料(步驟S621);主機23端接收到辨識 資料:查域存裝置21的產品 ㈣二的:清為否’則控制單元211會再判斷該 曰令疋否付合欲改變記憶單元213的使用狀態之指令 相步^ S625),右否’則執行其他制、於該控制指令之 ,關之處理(步驟S627),或可能該控制指令並不符 =211所定義之指令格式,便不予以理會該控制指令 :::S625之判斷為是,則進行如步驟㈣〜期 :=辨:資料(步驟⑽),並依據控制 中的缝資料,以改變記憶單元213的使用狀態= 31),於疋使用者可任意改變記憶單元2】3令的槽案 11 201025005 之使===:寫、防讀等資_功能。 參數資料的設定來:二!6'3:,控制單元211係依據 的記憶單元未被鎖住213的使用權限’若此時 在步驟s⑽之後卡制資料讀寫程序。而 的儲存位址之前-=====識資料 «Memory) has a high storage density, low power consumption efficiency = iFlash and a reasonable price, and the cost of the control unit 11 is coupled to the mainstream of the memory unit 13 field. Instructions not shown) to access the data to the memory ^ yuan; ^ machine end (there are many types of memory in the figure 3) and its price also has a parent memory including the use of multi-level unit memory u 1 eve -ceu , MLC) Low-density memory made of high-density memory (twisted denSltymemory) or single-stage haplotype memory (singie_ievei c吼SLC)... (4) Coffee-making noodle). Compared with the low-density record (4), the high-density data storage capacity per unit area can be multiplied, thus having the advantages of greatly increasing the storage capacity and reducing the cost, while reading and writing data, performing burning and erasing (Erase) The time required for the action is long, and in addition, the multi-level cell process technology also causes the high-density memory to withstand fewer scrabble cyde), thus affecting the storage device using high-density memory. The data access speed is used with the 201025005 lifetime. In order to prevent unscrupulous people from replacing the memory of poor quality or low price with the memory unit 13 in the original factory memory card, and mass-manufacturing and selling counterfeit goods to destroy the market competitiveness of the original memory card 1, the operators have proposed Many anti-counterfeiting mechanisms. Most of the common anti-counterfeiting methods on the market are stored in the original memory card 1 of the original memory card 1 to store the identification data containing the product serial number, and the special software is used to check whether the identification data is legal. However, people who are interested in it are still easy to crack the software's operational algorithms to get legal identification data. Alternatively, the 参 material is stored in a specific address in the memory unit 13, and the hardware is designed: the special address reads the identification data to identify the true state of the memory unit 13. The person only needs to write the same person at the specific address of the counterfeit goods; I; the same identification data can still be copied and copied in large quantities. Write the phase of the hidden card 1 in addition to the use of misplaced information, to ensure that the deliberate - into the buckle ^ 2 future development priorities. Item 2 APS, CSS, RPC, Γ>ρα/γ... π门令你”筏筏 Only accept reading and writing data; if you want to hide the card 1 For example, query serial number, data age prevention Μ Other special features, software or driver to provide: Corresponding end: fits the software and hardware used by each host, and the connection media. However, the software installed on the host and the driver are different, so it cannot be reached. Cross-platform 4 = 1 in the compatibility issue, = personnel must be installed in advance to identify = card 1 body 'will lengthen the test time and increase the test procedure of the inconvenience or application soft [invention] 4 201025005 The purpose of the present invention is to provide a memory storage device identification method that uses an address to store an identification data to control the device to improve the problems of the prior art. The present invention discloses a memory storage attack. The identification method, Φ 具有 has a memory unit, which is composed of a plurality of consecutive physical blocks. The steps of the identification method are as follows: First, the ^ block is retained and marked as - special function Block; again, write the ^-control command to the special function real block; finally, perform a return to the Luyiqi according to the control command to display or change the state of the memory unit: By the aforementioned technique, the present invention is The identification data is stored in advance in -, and the specific address is directly accessed to carry out the storage device, the freedom of the wire, the purpose of the identification = authenticity, and the provision of a safe and secure data protection mechanism. The overview and the following detailed description and the accompanying drawings are all steps to illustrate the manner in which the present invention is to achieve the intended purpose, and the other objects and advantages of the paragraph 2 force! = will be saved in the subsequent "embodiment" The identification method of the memory storage device proposed is that the storage device directly reads the specific address by the controller!; = 2 to obtain the usage status of the forest or the control device, ===_ Device Execution - 201025005 - The technical feature of the file is to generate two H in the memory storage device. 'Familiar with the art knows that, except for the following 2 = the other necessary components are included in the cattle storage device. , should not be Of the embodiments disclose limited. ‘ « 体 ft 请 ( 四 四 四 四 四 四 四 四 四 四 四 四 四 四 四 四 四 四 四 四 四 四 四 四 四 四 四 记忆 记忆 记忆 记忆2 5 2: The corpus callosum storage device 21 (hereinafter referred to as the storage device) is 3, and the id2 is used to perform the writing and reading of the data. The digital system age 1 is pluggable in the domain 23, and is accepted by the domain 23. Specifically, the host 23 is a computer system, which is = mobile device, personal computer (pc), notebook type The computer _Tablet Pc), the server or the personal digital assistant device 1 and the storage device 21 is a peripheral device of the computer system, which can be a memory card, a flash drive, a na 3 or a solid state hard disk. The storage device 21 includes a control unit and a memory list = 3. The control early 211 is lightly connected between the host 23 and the memory unit 213, and the receiving host 23 issues a control command, and the control command can be a write-write command or a read command, and the write command is Corresponding to a logical area stands up = "the body is inserted into the memory unit 213, and the read command reads the data of the logical block address from the memory unit 213. The memory is 7G213 early - the flash memory (7) Bribes, which are transferred from single-level = memory (SLC), phase change memory (pCM), free ferroelectric random memory / FeRAM, magnetic random access memory to early memory (MLC) is composed of one of the group combinations. 6, 201025005 Next, please refer to the third figure, which is a schematic diagram of a specific embodiment of the present invention. The related system please: Second figure. As shown in the third figure, the memory unit 213 defines a plurality of physical blocks PBA., PBAl, PBA2.·..·· 'includes at least the unrecorded data-damaged block (in the figure To indicate that the device 2, 21 at the factory, the control unit 211 will sweep the entire memory record and receive The address of all damaged blocks, = index ^4, as shown in the fourth figure, the damaged physical block: will be recorded in the bad block index table 4 in sequence. == Table 4: Content will be available The physical block = complex number, _A., the second table continues and the corresponding relationship of logical blocks. The data can be stored in order: Logic =:::: Unit 211 will access the index to the index table. It is possible to store the H 5 in the bad block device 21 in advance and identify it from a new memory. In one embodiment of the present invention, when the user is plugged into the host 23, Control list: mother: will store the physical block in the device and, Μ: check item "remembered unit 213 is the same, if the corresponding relationship of the phase 4 block is related to the logical block table 5, otherwise it can be used :: can be further used The storage device 21 accesses the data; and the access operation to the storage device 21. Step by step SC: The system can judge! The authenticity of the storage device 21, in order to further improve the material, it includes the ^2^^f213, the special health, the identification of the self-concealed clothing manufacturer and its manufacturing date, the physical area 7 201025005 block size Information, available information about the size of the physical block, the bad block (4) Table 4 or the parameter bad block -. For example, the identification of the data: 〇 group: the combination of the date of manufacture, the representation of the real table = quotient name, 〇 _ table block size, {5, 1G, 15, indicating the available entity _ J clothing I don't know the side of the bad block, nor the parameter data of the state of use of the unit 213. ', will be two = read the picture, the invention specifically retains its physical block, = storage address. Functional fun block is the main 2::: Capital: : The groove in the pass is special in the special = its coffee _ ^ ^ physical block PBAi and the wrong identification data === save device 21 preset at the factory The physical block is also determined by the content of the bad block index table 4. In a specific embodiment, when the special functional entity block PBAi is designed as the physical block of the pre-two, and the lock is determined by the first---------------------------- The host 23 sends a control command, and the host 23 = enters the control command in the preset logical block LBA. After the control unit deducts the control command from the button 23, according to the table 5 of the block block, the special function entity of the LBAi is read into the input operation, and the control command is decoded to provide a special function. Suppose that the control order is to ask _=# material, the difficult unit 2 ιι 曰 to find the storage address of the identification data from the special function pBAi, and then read the identification data from the physical block PBAj, use Can be from 201025005 = mouth = = 识 物 211 if the following "quote the physical area of the second noisy logic block · μ corresponding to the physical block 戦 before it has its discerning time from the +, only 匕% wide can not correctly identify the shell (4) storage address; even if the host Φ m =:=τ special:, the body area 丄:: and then check the physical area where the identification data is located, then step further to confirm the block, and if so, then It is proved that the identification of the variable memory unit can be modified to be modified. In addition to the function of querying the identification information, the instruction can also control the instruction two locks =; ==: = sequence 2: === to the identification data = Cheng,, with the copy of 荦 =:, the file stored in the hidden car 213 is deleted, wants to be open; the action of the display; the same, if the control command system, the mouth has recalled 213 + All files of the 'control unit such as identification =: ΓΙ;: (four) after 'will unlock the program' that is modified _ / number of assets, for example, change "010" to "101", to delete, copy, write or display the items stored in the morning 7 213. So, whenever used When processing the slot in the memory unit 213, the control unit 211 determines whether or not to perform the process according to the setting of the parameter data. In one embodiment of the present invention, the method for obtaining the identification data is 201025005: The above proposes to set the special function entity block ΡΒΑ! as a preset entity, block, and lock the physical data block (ie, the physical block PBAj) under the first damaged block to store the identification data. Use other design to achieve. For example, 'put the special function physical block PBAi as the first - the damaged block, the ^ body block; or set the special function physical block PBAi as a plurality of bad blocks * The physical block of the value of the total value of the quoted value means that if the first three (four) bad block system is ΡΒΑι, PBa2, PBa6, then the specified physical block is a special functional entity block 1^; or the identification data is set; The index value of the damaged block In summary, the value of the real money 'everything is determined according to the content of the bad block index table, so the limit is the technical structure of the hair _ technical system, please refer to the second to fifth figure II / The identification method is as follows: U indicates that the memory storage device 21 is first plugged into the ^; the control unit 211 then performs the memory unit 213::: the physical block and logic available in the hidden single TL213: second check (Step ^ judged to detect the corresponding pass = _ system s Qing if no, it means memory single = two two capacity, !! control behavior of the cache device (step S607); if the text is prohibited - early 兀The 213 series is manufactured by the original manufacturer.疋 表 表 表 表 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , 5 to convert the physical location address corresponding to the logical block LBAi, to determine whether to write the control instruction to the special function entity block PBAi (step S611); if not, it means that the control instruction is only performed The read/write motion control unit 211 accesses the data to the physical area age corresponding to the logical block heart according to the control command (step S613); if the system refers to (4) refers to the 1 special function physical block PBAi, the job is to perform reading and writing. After the action is performed, the control unit 211 then decodes the control command (step S6I5)' to perform a corresponding_response process according to the control command, and performs a process of displaying or changing the use state of the memory unit 213. After decoding, the control unit 211 determines that the control refers to the instruction format of the identification data of the storage device 21 (step S617), and if so, searches for the storage address in the special entity block pBAi (step S619). In The storage location of the identification data is out of the identification data (step S621); the host 23 receives the identification data: the product (4) of the domain storage device 21 is checked: if it is cleared, then the control unit 211 will judge the command again. Whether or not the instruction to change the use state of the memory unit 213 is performed step S^625), if the right is not 'the other system is executed, the control command is closed, the process is closed (step S627), or the control command may not match =211 The defined instruction format will not pay attention to the control instruction::: S625 is judged as yes, then proceed as step (4) ~ period: = identification: data (step (10)), and according to the seam data in the control, to change the memory The use status of the unit 213 = 31), the user can arbitrarily change the memory unit 2] 3 order slot 11 201025005 enable ===: write, anti-read and other functions. The setting of the parameter data is: 2! 6'3:, the memory unit according to the control unit 211 is not locked with the use permission of 213'. If the data reading and writing program is locked after step s(10). And before the storage address -===== know the information «

。塊=是,ί允許顯示辨識資料或修改參數資料之實體 置之^以上貫例詳述’當可知悉本發明之記憶體儲存供 .猎由檔案讀寫的方式來傳遞指令與資料,毋須搭配特殊 的讀取襄置,即可在任何作業系統以及沒有安裝驅動程 式的情況下,進行對儲存裝置硬體的控制,如此提供跨 平台的優勢,並且不受限於系統使用權限。 2.由於每他鮮元·有之娜之實舰塊的位置和 數量皆不相同’故利用損壞區塊的分布情形來表示每一 儲存裝置的唯一識別碼,如此可防止有心人士將仿冒品 取代原廠之記憶單元。 3.依據每個記憶單元的損壞區塊之分布情形來決定 辨識ί料的儲存位址,如此在修改和查詢辨識資料 曰守,恥先驗證該辨識資料之位址是否與損壞區塊之 分布情形相符,如此提供一個更安全的資料保護機 制〇 . 4.最後,在使用上’使用者可設定在儲存裝置插入任一 12 201025005 主機後’必須輸入密碼才能讀取資料,狀後對記憶單 亦需輸入相對應之指令,如此輕易達到防軟/ 更體複製、防非法讀寫等功能。 及圖上^述’僅為本發_具體實施例之詳細說明 以下‘之申梦專:制本發明,本發明之所有範圍應 go ^ I範圍為準,任何熟悉該項技蓺者在太私 案所=專:r及之變化或修飾皆可涵 ί在以下本 鴦 % 【圖式簡單說明】 系統習知之記憶_存裝置之-具體實施例之 實施揭示之晴物置之-具體 之示=圈係為本發明所揭示之記憶單元之-具體實施例 例之3圏圖係為本發明所揭示之壞塊索引表之1體實施 例之料本發明所揭示之邏輯崎表之—且料 不思圖,以及 具體實施 之 f:,係為本發明所揭示記憶體儲存裝 /、體貫施例之步驟流程圖。 x之辨識方法 【主要元件符號說明】 習知 1 . §己憶卡 13 201025005 11 :控制單元 13 :記憶單元 本發明 2 :數位系統 21 :記憶體儲存裝置 211 :控制單元 213:記憶單元 Φ 23 :主機 PBA〇、PBA!、PBA2、PBAw、PBAj、PBAq :實體區 塊 PBAi :特殊功能實體區塊 4 :壞塊索引表 5 :邏輯區塊表 LBA〇、LBA!、LBA2、LBAi :邏輯區塊 w S601〜S631 :各個步驟流程 14. Block = Yes, ί allows the entity to display the identification data or modify the parameter data. The above details are detailed. 'When you can know that the memory storage of the present invention is used to transfer instructions and data by means of file reading and writing, it is not necessary to match The special reading device allows hardware control of the storage device in any operating system and without the driver installed, thus providing cross-platform advantages and is not limited to system usage rights. 2. Since the position and number of the real ships of each of his fresh elements are different, the unique identification code of each storage device is indicated by the distribution of damaged blocks, thus preventing the intentional person from using counterfeit goods. Replace the original memory unit. 3. According to the distribution of the damaged blocks of each memory unit, determine the storage address of the identification material, so as to modify and query the identification data, shamefully verify whether the address of the identification data is distributed with the damaged block. The situation is consistent, thus providing a more secure data protection mechanism. 4. Finally, in use, the user can set the storage device to insert any 12 201025005 host. 'You must enter the password to read the data, and then read the data. It is also necessary to input the corresponding instructions, so that it is easy to achieve functions such as anti-soft/more copy and anti-illegal reading and writing. And the above description is only for the present invention. The detailed description of the specific embodiments is as follows: The invention is based on the scope of the invention, and any scope of the invention is subject to the scope of the application. Private case=Special: r and change or modification can be expressed in the following 鸯% [Simplified description of the system] The memory of the system is known as the storage device - the implementation of the specific embodiment reveals the clear object - specific indication = The present invention is a memory unit disclosed in the present invention. The third embodiment of the present invention is a logical embodiment of the bad block index table disclosed in the present invention. It is a flowchart of the steps of the memory storage device and the physical embodiment disclosed in the present invention. Identification method of x [Description of main component symbols] Conventional 1. § Recall card 13 201025005 11 : Control unit 13: Memory unit 2: Digital system 21: Memory storage device 211: Control unit 213: Memory unit Φ 23 : Host PBA〇, PBA!, PBA2, PBAw, PBAj, PBAq: Physical Block PBAi: Special Function Entity Block 4: Bad Block Index Table 5: Logical Block Table LBA〇, LBA!, LBA2, LBAi: Logical Area Block w S601~S631: each step flow 14

Claims (1)

201025005 七 傷 2 4 、申請專利範圍: 一種記憶體儲存裝置之 有一記憶單元,該呓情™識方法,該記憶體儲存裝置具 成,該辨識方法包括;^由連續之複數個實體區塊組 保留其-之4=步驟: 區塊; °°並將其標記為一特殊功能實體 =:控:指令至該特殊功能實體區塊 ;以及 憶單其根據該控制指令來顯示或改變該記 範圍第1項所述之辨識方法,其中該記憶單 特22::辨識資料’該辨識資料之位㈣記錄於該 将殊功能實體區塊中。 如申請專利範圍第2項所述 料包括_㈣、辨識方法’其中該辨識資 如φ ^ 訊及其製造曰期。 回應程序之步驟之前更包括下中於進❿亥 _該控制指令進行解碼。 如申睛專利範圍第4項所述之辨嗜 甘士# 序包括下列步驟·· 辨識方法,其中該回應程 進行一辨識程序,其包括以下步驟: 功能實體區塊中查”辨識資料之位址; =辨識資料之位址中讀出該辨熾資料;以及 如?内容來辨識讀記憶體儲存裝置。 料中更包括-參數資料,其表示g = 識資 用狀態,該回練序中更包置之使 15 6 201025005 進行一鎖檔程序,其依據該控制指令來修 =’ ^禁止對航憶單元_存之職進行刪ς、複 ι、寫入、讀取或顯示之動作;以及 進,一解鎖程序,其依據該控制指令來修改該參數資 ^以開放對該記憶單元内儲存之檔案進行刪除、複 製、寫入、讀取或顯示之動作。 7、 請專利範圍第6_述之辨識方法,立中該等實體 =中具有至少一損壞區塊,於保留其一:該實體區塊 之步驟之前,更包括以下步驟: ^收集該損壞區塊之位址’以產生-壞塊索引表; ::用之該實體區塊轉換成一邏輯區塊表;以及 1 =塊索引表以及該邏輯區塊表_記__ 8、 圍第7項所述之辨識方法,係適用於透過 機該記憶_存裝置,其中於寫人該控制指 驟至该特殊功能實體區塊之步顿之前,更包括以下步 將该記憶體儲存裝置插接於該主機上; 輯存褒置中可用之該實體區塊及其與邏 輯&amp;塊之對應關係是否與該邏 9、 根據上述比對來判斷該記憶單元之^表相同及 如申請專利範圍第8項所述之大1。 料更包括有該實_塊大小之^方法,其中該辨識資 大小之資訊、該損壞區塊大小々塊 群組組合之一。 貝成或该壞塊索引表之 10、 如中請專利範圍第 辨識方法,其中該特殊功 16 201025005 能實體區塊或該辨識資料之位 之内容而決定的。 1糸根據該壞塊索引表 11 如申請專利範圍第10項所述之 能實體區塊料第—之該損壞區t法,其中該特殊功 塊。 鬼之下一個該實體區 12、如 申請專利範®第1Q項所述之 能實體區塊係為複數個之該損壞^法’其中該特殊功 值的該實體區塊。 °°塊之索引值加總之 13、 如申請專利範圍第1〇項所 料係儲存於第一之該損璃 識方法’其中該辨識資 14、 如申請專利範圍第1〇項所述^ 一個該實體區塊中。 料係儲存於複數個之該損壞區法’其中該辨識資 該實體區塊中。 鬼之索引值加總之值的 15'^請專利範圍第丨項所述 ❹ 元係為-快閃記憶體,由單1方法,其中該記憶單 化記憶體(PCM)、自由二„〇、相變 (FeRAM) ^ ^ Λ隨機存取記憶體 憶_收财級單元記 之辨識方法,其中該_ π、如申身碟或固態受碟。 如甲„月專利範圍第8項所述之 為行動裝置咖e Device)、個人= (Desktop)、平板電腦⑽etpQ 2C)、筆記型電腦 (PDA)之其一。 态或個人數位助理器 18、-種記億體儲存裝置之辨識方 有一記憶單元,·- a &amp;忒记億體儲存裝置具 .亥讀早凡由連續之複數個實體區塊組 17 201025005 成,該等實體區塊中具有至少一 包括下列步驟: 知裱區塊,該辨識方法 記錄並收集該損壞區塊之位址’ 將可用之該實體區塊轉換成—邏輯區=壞塊索引表; 比對該記憶體儲存裳置中可用之上’ 體區塊之對應關係是否與該邏輯區以及該實 根據上述比對來判斷該記憶單元之^、目5 ’以及 19、如中請專利範㈣18項所述之' : -主機來檢驗該記憶體儲存裝置f ’糸、用於透過 塊表之步驟之前,更包括以下步t中於崎該邏輯區 將該記憶體儲存裝置插接於該主機上。 2〇、18項所述之辨識方法,係適用於透過 塊表憶體儲存裝置’其中於轉換該邏輯區 塊表之步驟之後,更包括以下步驟. 敗 儲==索引表以及該 m範圍第18項所述之辨識方法,其中該記憶單 化=7=記憶體’由單級單元記憶擊c)、相變 (FeRA二μ%、自由鐵電式隨機存取記憶體 憶體二群 =:成~)或多級單元記 22'llttTMn 子裝置為§己憶卡、隨身碟或固態硬碟。 ^ /申明專利範圍第20項所述之辨識方法,其中該主機係 ^丁動裝置(Mobile Device)、個人電腦(PC)、筆記型電腦 es top)、平板電腦(TaWetpc)、伺服器或個人數位助理器 18 201025005 (PDA)之其一。201025005 Seven injuries 2 4, the scope of patent application: A memory storage device has a memory unit, the 呓 TM TM recognition method, the memory storage device is formed, the identification method includes: ^ by a plurality of consecutive physical block groups Retain it - 4 = step: block; ° ° and mark it as a special function entity =: control: instruction to the special function entity block; and recall that it displays or changes the range according to the control instruction The identification method according to item 1, wherein the memory unit 22:: identification data 'the identification data bit (4) is recorded in the special functional entity block. For example, the material mentioned in item 2 of the patent application scope includes _(4), identification method', and the identification resource is φ^ and its manufacturing period. Before the step of responding to the program, it includes the following in the middle of the process. _ This control instruction is decoded. For example, the method according to the fourth aspect of the patent application scope includes the following steps: the identification method, wherein the response process performs an identification process, which includes the following steps: "Checking the position of the identification data in the functional entity block" Address; = read the identification data in the address of the identification data; and, if the content is used to identify the read memory storage device, the material further includes - parameter data, which indicates g = status of the capital, the training sequence In addition, the device 15 6 201025005 performs a lock program, which is based on the control command to repair = ' ^ prohibits the action of deleting, copying, writing, reading or displaying the memory of the air memory unit; And an unlocking program, which is modified according to the control instruction to open, delete, copy, write, read or display the file stored in the memory unit. 7. Please patent scope 6 _ </ RTI> </ RTI> </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> </ RTI> </ RTI> </ RTI> - Block index table; :: the physical block is converted into a logical block table; and 1 = block index table and the logical block table _ _ _ 8, the identification method described in item 7, applies to Passing through the memory storage device, wherein before the writing of the control finger to the step of the special function physical block, the method further comprises the step of inserting the memory storage device on the host; Whether the physical block and its correspondence with the logical &amp; block are available, and the logical unit is judged to be the same according to the above comparison and is as large as described in item 8 of the patent application scope. Further, the method includes the method of the real_block size, wherein the information of the size of the identification, the size of the damaged block, and one of the group combinations of the blocks. 10 or the bad block index table. The identification method, wherein the special work 16 201025005 can be determined by the physical block or the content of the identification data. 1 According to the bad block index table 11 as described in claim 10, the physical entity block material - the damage zone t method, The special function block. One of the physical areas under the ghost 12, as described in the Patent Application No. 1Q, the physical block is a plurality of the damage method, wherein the physical block of the special work value The index value of the block is added to the total value of the index of the block, as described in item 1 of the patent application, which is stored in the first method of the damage method. In one of the physical blocks, the material is stored in a plurality of the damaged area method, wherein the identification is in the physical block. The value of the ghost index is added to the total value of 15'^ The system is a flash memory, which is a single 1 method in which the memory singular memory (PCM), the free singularity, the phase change (FeRAM) ^ ^ Λ the random access memory memory Identification method, wherein the _π, such as a Shenpan or a solid state is subjected to a disc. Such as the one described in item 8 of the monthly patent range, the mobile device (Device), the personal = (Desktop), the tablet (10) etpQ 2C), the notebook computer (PDA), the state or personal digital assistant 18, - The identification side of the type of storage device has a memory unit, - a &amp; 忒 亿 亿 体 储存 储存 . . 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 亥 2010 2010 2010 2010 Having at least one includes the following steps: a knowledge block, the identification method records and collects the address of the damaged block, and converts the available physical block into a logical area=bad block index table; Whether the corresponding relationship between the upper body block and the logical area and the actual comparison according to the above is used to determine the memory unit, the object 5' and 19, as described in the patent application (4) 18 items. : - The host checks the memory storage device f '糸, before the step of transmitting the block table, and further includes inserting the memory storage device into the host in the logical area of the following step t. The identification method described in 18 items, The method is further adapted to: after the step of converting the logical block table, the following step is further included: the failure table == index table and the identification method described in item 18 of the m range, wherein the memory Singularity = 7 = memory 'single memory from single-level cell c), phase change (FeRA two μ%, free ferroelectric random access memory memory group two groups =: into ~) or multi-level cell record 22' The llttTMn sub-device is a § recall card, a flash drive or a solid-state hard disk. ^ / The identification method described in claim 20 of the patent scope, wherein the host system is a mobile device, a personal computer (PC), a note One of the computers es top), tablet (TaWetpc), server or personal digital assistant 18 201025005 (PDA).
TW97151562A 2008-12-31 2008-12-31 Recognizing method of memory storage device TWI385522B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97151562A TWI385522B (en) 2008-12-31 2008-12-31 Recognizing method of memory storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97151562A TWI385522B (en) 2008-12-31 2008-12-31 Recognizing method of memory storage device

Publications (2)

Publication Number Publication Date
TW201025005A true TW201025005A (en) 2010-07-01
TWI385522B TWI385522B (en) 2013-02-11

Family

ID=44852402

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97151562A TWI385522B (en) 2008-12-31 2008-12-31 Recognizing method of memory storage device

Country Status (1)

Country Link
TW (1) TWI385522B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942504A (en) * 2013-01-17 2014-07-23 银灿科技股份有限公司 Portable storage device and data safety control method thereof
TWI497297B (en) * 2013-01-15 2015-08-21 Innostor Technology Corp Portable storage device and its data security control method
TWI566103B (en) * 2015-11-16 2017-01-11 宇瞻科技股份有限公司 Pcie bridge transformation device and method thereof
TWI579689B (en) * 2015-09-25 2017-04-21 瑞昱半導體股份有限公司 Data backup system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3979195B2 (en) * 2002-06-25 2007-09-19 ソニー株式会社 Information storage device, memory access control method, and computer program
JP4679512B2 (en) * 2004-04-23 2011-04-27 パナソニック株式会社 INFORMATION RECORDING MEDIUM, ACCESS DEVICE, AND INFORMATION RECORDING MEDIUM PROCESSING METHOD
TW200805083A (en) * 2006-07-12 2008-01-16 Inventec Corp Method of reading OpROM image from storage device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI497297B (en) * 2013-01-15 2015-08-21 Innostor Technology Corp Portable storage device and its data security control method
CN103942504A (en) * 2013-01-17 2014-07-23 银灿科技股份有限公司 Portable storage device and data safety control method thereof
CN103942504B (en) * 2013-01-17 2018-04-06 银灿科技股份有限公司 Portable memory device and its data security control method
TWI579689B (en) * 2015-09-25 2017-04-21 瑞昱半導體股份有限公司 Data backup system
US10216451B2 (en) 2015-09-25 2019-02-26 Realtek Semiconductor Corporation Data backup system and method thereof where target data is arranged in source storage according to deflect block table of target storage
US10838651B2 (en) 2015-09-25 2020-11-17 Raymx Microelectronics Corp. Data backup system and method thereof wherein target data (in source storage) is arranged according to defect table of target storage
TWI566103B (en) * 2015-11-16 2017-01-11 宇瞻科技股份有限公司 Pcie bridge transformation device and method thereof

Also Published As

Publication number Publication date
TWI385522B (en) 2013-02-11

Similar Documents

Publication Publication Date Title
TW487859B (en) Writeable medium access control using a medium writeable area
TW504648B (en) A universal magnetic stripe card
US20070028121A1 (en) Method of protecting confidential data using non-sequential hidden memory blocks for mass storage devices
TW200917256A (en) Using various flash memory cells to build USB data flash cards with multiple partitions and autorun function
TW200925863A (en) Hardware anti-piracy via nonvolatile memory devices
JP2010533910A (en) Digital information memory card encryption structure and method
TW201025005A (en) Recognizing method of memory storage device
TW201003393A (en) Data accessing method, and storage system and controller using the same
US20100115201A1 (en) Authenticable usb storage device and method thereof
TWI324349B (en) Secure protable storage device and control method for the same
KR20090072717A (en) New data storage usb disc, computer interface usb device and method by flash memory&#39;s bad patten
TW201109925A (en) Method and system for data protection, storage device, and storage device controller
JP2006343887A (en) Storage medium, server device, and information security system
WO2010151722A1 (en) Accessing a serial number of a removable non-volatile memory device
US8296275B2 (en) Data processing method, data processing system, and storage device controller
TWI276971B (en) Trusted input for mobile platform transactions
US8732179B2 (en) Method for providing a suggested read list of digital data to a host device
TW201218015A (en) Off-line authentication device, off-line authentication method, digital content use device, digital content use method, computer readable storage medium and computer program product thereof
US20120233427A1 (en) Data Storage Device and Data Management Method Thereof
TW200935221A (en) System for securing an access to flash memory device and method for the same
TWM365496U (en) Memory storage apparatus with identification function
CN102375958B (en) The method of restricting accessing of files
JP2013137717A (en) Nonvolatile storage device, access control program and storage control method
CN101770431A (en) Storage device capable of certifying and data protection method
TWI300928B (en)

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees