TW201243599A - Secure and scalable solid state disk system - Google Patents

Secure and scalable solid state disk system Download PDF

Info

Publication number
TW201243599A
TW201243599A TW101112763A TW101112763A TW201243599A TW 201243599 A TW201243599 A TW 201243599A TW 101112763 A TW101112763 A TW 101112763A TW 101112763 A TW101112763 A TW 101112763A TW 201243599 A TW201243599 A TW 201243599A
Authority
TW
Taiwan
Prior art keywords
virtual storage
processor
instruction
interface
storage
Prior art date
Application number
TW101112763A
Other languages
Chinese (zh)
Other versions
TWI493343B (en
Inventor
Wei Ben Chen
Yungteh Chien
Choon Tak Tang
Original Assignee
Kingston Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/746,582 external-priority patent/US8499168B2/en
Priority claimed from US11/746,556 external-priority patent/US8527781B2/en
Priority claimed from US11/746,576 external-priority patent/US8010768B2/en
Application filed by Kingston Technology Corp filed Critical Kingston Technology Corp
Publication of TW201243599A publication Critical patent/TW201243599A/en
Application granted granted Critical
Publication of TWI493343B publication Critical patent/TWI493343B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0662Virtualisation aspects
    • G06F3/0664Virtualisation aspects at device level, e.g. emulation of a storage device or system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A solid state disk system is disclosed. The system comprises a user token and at least one level secure virtual storage controller, coupled to the host system. The system includes a plurality of virtual storage devices coupled to at least one secure virtual storage controller. A system and method in accordance with the present invention could be utilized in flash based storage, disk storage systems, portable storage devices, corporate storage systems, PCs, servers, wireless storage, and multimedia storage systems.

Description

201243599 . 六、發明說明:' 【發明所屬之技術領域】 本發明係關於一種記憶系統;更詳細地說,本發明係關於一種 安全且可擴充(scalable )之固態磁碟系統。 【先前技術】 快閃式(flash based)之固態磁碟(solid state disk; SSD)已慢 慢地堀起,並自工業、國防以及企業應用端逐漸地被一般使用者 消費端所廣為接受。這股趨勢背後最主要的驅動力即來自於先進 的快閃技術發展以及快閃元件本身的優勢。快閃式之固態磁碟與 習知硬碟機(hard disk drive ; HDD )相較之下,其具有以下之優 點: 1. 功率耗損較低。 2. 重量較輕。 3. 逸散熱量較低。 4. 無噪音。 5. 無機械元件。 然而,在逐漸取代硬碟機的同時,固態磁碟也有一些待解決的 問題,如: 1. 成本較高。 2. 密度較低。 3. 系統效能較差。 此外,一般固態磁碟通常只能管理4階、8階、16階、32階或 更多元件之一快閃記憶體群組,因此在以下方面更具有高難度之 201243599 設計挑戰: 1 ·管理眾多快閃裝置介面之輸出接腳(pin-outs )。 2. 遍及於眾多快閃元件間之均勻抹除(wear-leveling )。 3. 固態磁碟系統之可製作性與可測試性。 4. 支持新快閃技術及可從中獲益之時間差距。 5. 上市時間。 6. 自新快閃技術中所可節省之成本。 習知硬碟機並無内建之安全防護。若一具有一硬碟機之主機系 統被偷走後,則其硬碟機之内容將可輕易地被存取以及盜用。即 使可藉由一軟體將整個磁碟進行加密,習知硬碟機在實際應用上 仍存在著以下問題: 1. 因軟體之加密與解密所造成之系統效能犧牲。 2. 必須另外安裝驅動程式以進行加密動作。 3. 若密碼認證功能僅屬於該硬碟機,則仍具有被攻擊之危險。 倘若固態磁碟由利基型產品(niche product)轉變成較為普遍之 使用者產品而成為主流,則固態磁碟必須針對上述缺點進行改 善,且須另外增加諸如安全性、可擴充性等其它優點。 第1圖係為一習知安全數位(secure digital ; SD )快閃卡之方塊 圖,其包含一實體介面11、一安全數位卡控制器12以及快閃記憶 體13。實體介面11係透過介面匯流排(interface bus) 14連接至 一主機系統。利用一安全數位卡、微型快閃(compact flash ; CF ) 卡以及通用串列匯流排(universal serial bus ; USB )驅動器即可 組成一簡易型式之固態磁碟。201243599. VI. Description of the Invention: 'Technical Field to Which the Invention Alonged>> The present invention relates to a memory system; more particularly, the present invention relates to a secure and scalable solid state disk system. [Prior Art] Flash-based solid state disks (SSDs) have slowly picked up and are widely accepted by general consumer users from industrial, defense, and enterprise applications. . The main driving force behind this trend is the development of advanced flash technology and the advantages of the flash components themselves. Compared with the conventional hard disk drive (HDD), the flash type solid state disk has the following advantages: 1. Low power consumption. 2. Lighter weight. 3. The heat dissipation is low. 4. No noise. 5. No mechanical components. However, while gradually replacing hard drives, solid-state disks also have some problems to be solved, such as: 1. Higher cost. 2. The density is low. 3. System performance is poor. In addition, the general solid state disk usually only manages one of the 4th, 8th, 16th, 32th or more flash memory groups, so the more difficult 201243599 design challenges in the following aspects: 1 · Management The output pins (pin-outs) of many flash device interfaces. 2. Uniform wear-leveling across many flash components. 3. The manufacturability and testability of solid state disk systems. 4. Support the new flash technology and the time gap that can benefit from it. 5. Time to market. 6. The cost savings from the new flash technology. The conventional hard disk drive has no built-in security protection. If a host system with a hard disk drive is stolen, the contents of the hard disk drive can be easily accessed and stolen. Even if the entire disk can be encrypted by a software, the conventional hard disk drive still has the following problems in practical applications: 1. The system performance sacrifice due to encryption and decryption of the software. 2. The driver must be installed separately for encryption. 3. If the password authentication function belongs to the hard drive only, there is still a risk of being attacked. If solid-state disks become mainstream by the conversion of niche products into more common user products, solid-state disks must be improved for these shortcomings, and other advantages such as safety and expandability must be added. 1 is a block diagram of a conventional secure digital (SD) flash card including a physical interface 11, a secure digital card controller 12, and a flash memory 13. The physical interface 11 is connected to a host system via an interface bus 14. A simple solid-state disk can be formed using a secure digital card, a compact flash (CF) card, and a universal serial bus (USB) drive.

4 S 201243599 於一習知儲存系統中,例如美國專利申請案第10/707,871號(其 公開號為20050005044 )、第10/709,718號(其公開號為 20050005063 )、美國公告專利第 6,098,119 號、第 6,883,083 號、 第 6,877,044 號、第 6,421,760 號、第 6,138,176 號、第 6,134,630 號、第6,549,981號以及美國公開專利第20030120865號所揭露之 儲存系統,於系統啟動或運作期間(runtime ),一儲存控制器將自 動安裝及配置磁碟驅動器。前述之儲存控制器可執行基本之儲存 辨識以及彙總功能(aggregation functionality )。習知技術之主要 優點即在於運作期間’能夠偵測磁碟驅動器之插入以及移除。然 而習知技術卻無法在系統啟動期間識別主機系統與儲存系統之間 存在的非同步特性。由於儲存控制器之功能相當於一虛擬控制 器,因此在主機系統啟動期間,儲存控制器需要花費時間辨識、 測試及配置該貫體驅動器。假如沒有使主機系統與儲存系統再次 同步(re-synchronize)之機制存在,則主機系統僅會停止並且沒 有辦法辨識及安裝虛擬邏輯儲存器。據此,習知系統頂多只能當 作次要儲存糸統’而非主要儲存系統。美國公告專利第6 098 119 號的另一個缺點則係系統要求各貫體驅動器於安裝期間需有一戍 多個預先載入(preload)之「參數設定(parameterseuings)」。此 一缺點將對自動安裝造成限制。 大多數之習知系統並未針對儲存器之延伸性(expandabnity )或 可擴充性(scalability)提供解決之方法。儘管美國專利申請案第 10/707,871號(其公開號為20050005044)號以及第1〇/7〇9718號 (其公開號為2GG5G005063 )提出了具有擴充性之儲存虛擬電腦系 5 201243599 統’其係著重於描述耦接至一實體主機(可能為一主機電腦或一 祠服器)之「外接式」儲存虛擬控制器。這些專利並未針對上述 虛擬儲存之啟動問題提出討論。這些專利之虛擬儲存的架構仍僅 能作為次要儲存器之用。 此外’習知系統亦無法解決密碼認證與硬體加密之驅動安全性 的問題。其中硬體加密已然成為筆記型電腦中不可或缺之主要驅 動應用產品。 如第2圖所示,美國專利第7,003,623號係為一種較為簡明之固 態磁碟系統。該固態磁碟系統包含一串列高速硬碟介面(serial advanced technology attachment; SATA)至快閃記憶體控制器 25 以及一組快閃記憶體13。該SATA至快閃記憶體控制器25包含一 SATA主機介面251以及複數個快閃裝置介面252。SATA主機介 面係用以連接(interfacing )主機系統20之SATA主機控制器21, 同時快閃裝置介面252係用以連接快閃記憶體13。 各快閃記憶體13具有約略15至23個訊號接腳以連接至控制器 25。SATA主機介面251則需要4個訊號接腳以連接至該§αΤΑ主 機控制器21 °SATA至快閃記憶體控制器25則需要總數至少為124 的訊號接腳來管控8個快閃記憶體13 ;或總數為244的訊號接腳 來管控16個快閃記憶體13。 同樣如第2圖所示,控制器25必須管控錯誤更正碼(err〇r correction code ; ECC )、均勻抹除、壞區塊重新映射(bad bi〇ck re-mapping)、閒置儲存空間之分配以及眾多内部至快閃記憶體式 固態磁碟之作業紀錄(book keeping tasks)。由此可見,隨著快閃4 S 201243599 in a conventional storage system, for example, U.S. Patent Application Serial No. 10/707,871, the disclosure of which is incorporated herein by reference. A storage system disclosed in No. 6,883,083, No. 6,877,044, No. 6,421,760, No. 6, 138, 176, No. 6, 134, 630, No. 6, 549, 981, and U.S. Patent No. 20030120865, during system startup or operation, The storage controller will automatically install and configure the disk drive. The aforementioned storage controller can perform basic storage identification and aggregation functionality. The main advantage of the prior art is that it can detect the insertion and removal of the disk drive during operation. However, conventional techniques fail to identify the non-synchronous characteristics between the host system and the storage system during system startup. Since the function of the storage controller is equivalent to a virtual controller, it takes time for the storage controller to identify, test, and configure the physical drive during startup of the host system. If there is no mechanism to re-synchronize the host system with the storage system, the host system will only stop and there is no way to identify and install the virtual logical storage. As a result, conventional systems can only be used as a secondary storage system rather than a primary storage system. Another disadvantage of U.S. Patent No. 6,098,119 is that the system requires that each of the via drivers be provided with a plurality of "preloading" "parameters". This shortcoming will limit the automatic installation. Most conventional systems do not provide a solution to the expandabnity or scalability of the storage. U.S. Patent Application Serial No. 10/707,871 (the disclosure of which is incorporated herein by reference in its entirety in its entirety in the entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire entire all all all Emphasis is placed on describing an "external" storage virtual controller coupled to a physical host (possibly a host computer or a server). These patents do not address the issue of the initiation of virtual storage described above. The architecture of these patented virtual storages can still only be used as a secondary storage. In addition, the conventional system cannot solve the problem of driver security for password authentication and hardware encryption. Among them, hardware encryption has become an indispensable main driving application in notebook computers. As shown in Fig. 2, U.S. Patent No. 7,003,623 is a relatively simple solid state disk system. The solid state disk system includes a serial advanced technology attachment (SATA) to flash memory controller 25 and a set of flash memory 13. The SATA to flash memory controller 25 includes a SATA host interface 251 and a plurality of flash device interfaces 252. The SATA host interface is used to interfacing the SATA host controller 21 of the host system 20, and the flash device interface 252 is used to connect the flash memory 13. Each flash memory 13 has approximately 15 to 23 signal pins for connection to the controller 25. SATA host interface 251 requires 4 signal pins to connect to the §αΤΑ host controller 21 ° SATA to flash memory controller 25 requires a total of at least 124 signal pins to control 8 flash memory 13 Or a total of 244 signal pins to control 16 flash memories 13. Also as shown in Fig. 2, the controller 25 must control the error correction code (ERC), uniform erasure, bad block remapping (bad bi〇ck re-mapping), allocation of idle storage space. And a number of internal-to-flash memory solid-state disk-based book keeping tasks. This shows that with the flash

S 201243599 記憶體元件數目之增'加,控制器的複雜度也將隨之上升。如此一 來,不僅將對控制器之成本造成影響,於習知的固態磁碟系統上, 更增加了可製造性與可測試性方面的問題。就本質上而言,習知 技術不具備可擴充之特性,意即相同之控制器將無法被使用於二 種或更多不同種類密度之設計。若同一控制器需使用於二種或更 多不同種類密度之設計,則控制器之接腳數量必須至少能容納124 個接腳,以連接四個快閃記憶體;或244個接腳,以連接八個快 閃記憶體;或甚至484個接腳,以連接十六個快閃記憶體晶片。 因此,習知系統僅能限用於小密度應用之固態磁碟,而不具備完 整的可延伸及可擴充之特性。 據此,一種能解決上述問題之系統以及方法係必須的。而本發 明即可滿足此類需求。 【發明内容】 本發明係揭露一種固態磁碟系統。該系統包含一使用者訊標 (user token )以及一搞接至一主機系統之第一層安全虛擬儲存控 制器。該系統亦包含複數個第二層安全虛擬儲存控制器以及複數 個第三層虛擬儲存裝置。其中,該等第二層安全虛擬儲存控制器 皆具有一與該第一虛擬安全儲存控制器相容之介面,而該等第三 層虛擬儲存裝置係耦接至該等第二層虛擬儲存控制器。 根據本發明之系統與方法可提供下列優點。 1. 該系統與方法係採用一安全虛擬儲存控制器結構。 2. 該系統與方法係採用一種基於該安全虛擬儲存控制器結構的 可擴充之固態磁碟系統。 201243599 3. 該系統與方法係基於現今普遍並盛行之快閃卡/裝置上所建 立之區塊,以採納(tap im0)最新的快閃元件技術之成本、 密度及系統效能。 4. 該系統與方法使用虛擬儲存處理器統合密度及系統效能。 5. 該系統與方法可才見需求使用車交多層之虛擬儲存控制器以擴充 密度及系統效能。 6. 該系統與方法可視需求於該虛擬儲存控制器中使用編碼引 擎,以即時(on-the-fly)處理於上傳串流與下傳串流之間資 料交換的加/解密作業。其中,該資料交換之進行係於主機與 裝置之間。 ^ 7. 該系統與方法使用一 USB訊標來作為固態磁碟之獨立密碼 認證。 8. 該系統與方法係允許該安全且可擴充之固態磁碟 (secure-and-scalable solid state disk ; SNS-SSD )利用使用者 自開機、休眠至一般使用階段之經驗來取代硬碟機。 根據本發明之系統及方法係適用於一快閃式健存器、磁碟儲广 系統、可攜式儲存裝置、企業儲存系統、個人電腦、伺服器、無 線儲存器以及多媒體儲存系統。 … 【實施方式】 本發明係關於一種記憶體系統。更詳細地說,本發明係關於一 種安全且可擴充之固態磁碟系統。以下之敘述係使熟悉此項技術 領域者可以利用本發明,同時提供本發明之應用及所需條件。下 述之實施例僅用以例舉本發明之實施態樣,以及闡釋本發明之技S 201243599 The number of memory components increases, and the complexity of the controller will also increase. In this way, not only will the cost of the controller be affected, but the problem of manufacturability and testability is further increased on the conventional solid-state disk system. In essence, conventional techniques do not have scalable features, meaning that the same controller will not be used in two or more different types of designs. If the same controller is to be used in two or more different types of density designs, the number of pins on the controller must accommodate at least 124 pins to connect four flash memories; or 244 pins to Connect eight flash memories; or even 484 pins to connect up to sixteen flash memory chips. Therefore, conventional systems can only be used for solid-state disks for low-density applications without full extendability and expandability. Accordingly, a system and method that solves the above problems are necessary. The present invention can meet such needs. SUMMARY OF THE INVENTION The present invention discloses a solid state disk system. The system includes a user token and a first layer of secure virtual storage controller that interfaces to a host system. The system also includes a plurality of Layer 2 secure virtual storage controllers and a plurality of Layer 3 virtual storage devices. The second layer of virtual storage controllers are all compatible with the first virtual secure storage controller, and the third layer of virtual storage devices are coupled to the second layer of virtual storage controls. Device. The system and method in accordance with the present invention provide the following advantages. 1. The system and method employ a secure virtual storage controller architecture. 2. The system and method employs an expandable solid state disk system based on the secure virtual storage controller architecture. 201243599 3. The system and method is based on the block built on the popular and popular flash card/devices today to adopt the cost, density and system performance of the latest flash component technology. 4. The system and method use a virtual storage processor to integrate density and system performance. 5. The system and method can be used to expand the density and system performance by using multiple virtual storage controllers. 6. The system and method can optionally use an encoding engine in the virtual storage controller to process the encryption/decryption operations of the data exchange between the upload stream and the downstream stream on-the-fly. The exchange of data is performed between the host and the device. ^ 7. The system and method use a USB beacon as a separate password for solid state disks. 8. The system and method allows the secure-and-scalable solid state disk (SNS-SSD) to replace the hard disk drive with the user's experience of self-booting, hibernation, and general use. The system and method in accordance with the present invention is applicable to a flash memory, a disk storage system, a portable storage device, an enterprise storage system, a personal computer, a server, a wireless storage, and a multimedia storage system. [Embodiment] The present invention relates to a memory system. More particularly, the present invention relates to a secure and scalable solid state disk system. The following description is made to enable those skilled in the art to utilize the present invention while providing the application and conditions of the present invention. The following examples are merely illustrative of the embodiments of the present invention, and the techniques of the present invention are illustrated.

S 201243599 術特徵,並非用κ 乂限制本發明之範疇。任何熟悉此技術者可_易 完成之改變或均耸& ^ 夸性之女排均屬於本發明所主張之範圍。 第3圖係為一主^ 機糸統與一 USB訊標耗接至一 SATA式之安全 可擴充之固態罐碟系統之方塊圖。主機系統30包含-處理器(圖 未繪示)、記恢, k ~ I 圖未續示)、輸入/輸出(input/outputi/j/O)、 '一 USB 介面 f fgj 土 _ 圓未繪示)以及一 SATA主機控制器34。SATA主 機控制器3 4传麵rk 士由一 USB介面連接至一 USB訊標35,並透過一 SATA主機介而q, @ 321與安全且可擴充之固態磁碟系統31共同作業。 ; 系’先3 〇開機之後以及存取安全且可擴充之固態磁碟系統 SB戒標35係作為一獨立媒介(哗⑶丨),用以提供密碼 。a力此該功能可為—屬於該USB訊標35之軟體功能。或較 佳也°亥功%可為USB訊標35中,連結至網路服務之瀏覽器連 、’ °使用劉覽器連結之原因係其較普遍且其僅佔用系統資源之一 小部份即能運作於不同平台裝置。 .安全且可擴充之固態磁碟系統31包含一第一層安全虛擬儲存控 制盗32、一個第二層安全虛擬儲存控制器33以及八個第三層儲存 裝置安全數位卡1〇。S 201243599 is not intended to limit the scope of the invention by κ 。. Anyone who is familiar with the technology can easily complete the change or the sum of the " ^ boastful women's volleyball is within the scope of the present invention. Figure 3 is a block diagram of a SATA-type secure and expandable solid-state tank system that is connected to a USB controller and a USB beacon. The host system 30 includes a processor (not shown), a recovery, k ~ I diagram is not continued, input / output (input / outputi / j / O), 'a USB interface f fgj soil _ circle is not painted And a SATA host controller 34. The SATA host controller 3 4 is connected to a USB beacon 35 by a USB interface, and is operated by a SATA host, q, @321, together with the secure and expandable solid state disk system 31. The system is used to provide a password after the power-on and access to the secure and expandable solid state disk system SB Ring 35 as a separate medium (哗(3)丨). a force this function can be - the software function belonging to the USB signal 35. Or better, it can be a USB symbol 35. The reason for connecting to the web browser of the web service is that it is more common and it only takes up a small part of the system resources. It can operate on different platform devices. The secure and expandable solid state disk system 31 includes a first layer of secure virtual storage controller 32, a second layer of secure virtual storage controller 33, and eight third layer storage device security digital cards.

该第一層虛擬儲存控制器32包含一 SATA主機介面321、一編 碼引擎323以及並聯之複數個SATA裝置介面322。於本實施例 中,主機端之儲存介面可為一串列ATA或SATA ^該儲存主機介 面可為任一種型式之輸入輸出介面,例如SATA、串列式小型電腦 糸-、-先"面(serial attached small computer system interface ; SAS )、 南速週邊控制益介面(peripheral controller interface ; PCI 201243599 express )、平行南速硬碟介面(parallel advanced technology attachment ; PATA )、USB、藍芽、超寬頻(Ultra-wideband ; UWB ) 或無線介面。虛擬儲存控制器32將於第4圖所繪示之安全虛擬儲 存控制器40中做更詳細地說明。 第二層虛擬儲存控制器33包含一 SATA主機介面331、一編碼 引擎333以及並聯之複數個安全數位裝置介面332。虛擬儲存控制 器33並不直接耦接至快閃記憶體,而是耦接至第三層儲存裝置, 即一安全數位(secure digital ; SD)卡10。只要接腳數、成本、 系統效能合理,SD卡1 〇可以任何一種快閃式卡或驅動器取代, 例如:微型快閃卡(compact flash card ; CF card )、多媒體卡 (multimedia compact card ; MMC card)、USB 驅動器或記憶棒 (memory stick)。於本實施例中,各安全數位卡1〇具有六個信號 接腳。四個數位安全元件即需要總數24個信號接腳,其中各該安 全數位卡具有兩個快閃記憶體元件,而非習知技術中’八個快閃 。己隐體元件所需之總數為120個信號接腳。因此,本發明可自控 制器晶片之結構上減少一大筆花費,且具備較佳之可製造性及可 測試性。 即使第一層安全虛擬儲存控制器32及第二層安全虛擬儲存控制 器33可迠具有不同型式之裝置介面,兩者之結構實質上係為相同 的。只要儲存裝置介面322與儲存主機介面331相容,第一層安 全虛擬儲存控制器32即可串接(cascaded)同時擴充更多的第二 層安全虛擬儲存控制器33。據此,藉由此—擴充動作,系統之密 度及效能將以指數增加。在最簡易之安全且可擴充之固態磁碟系 201243599 統的結構中,主機系統30係直接與第二層虛擬儲存控制器33其 中之一耦接。此種最小之安全且可擴充之固態磁碟系統僅包含第 二層儲存控制器33與第三層儲存裝置10之兩層結構。 第一層之編碼引擎323與第二層之編碼引擎333皆可視需求獨 立地被致能(enable)、失能(disable)與配置(configured)。一 般情況而言,僅需上層之編碼引擎,其它下層之編碼引擎都將被 失能。編碼引擎將於第13圖中做更詳細地說明。 於主機儲存介面上,可利用一 SATA主機介面331與第一層虛 擬儲存控制器32耦接。在本實施例中,儲存介面可為一串列ΑΤΑ 或SATA。虛擬儲存控制器33將於第4圖所繪示之安全虛擬儲存 控制器40中做更詳細地說明。 如第4圖所示,安全虛擬儲存控制器40包含一儲存主機介面 41、一中斷處理器42、一主機指令及資料處理器43、一中央處理 單元(central processing unit ; CPU ) 44、一程式記憶體 45、一隨 機存取記憶體(random access memory ; RAM)及緩衝器46、一 資料寫入處理器401、一資料讀取處理器402、一通行 (pass-through )指令處理器403、一狀態與屬性擷取處理器404、 一區域指令處理器405、一編碼引擎406、一虛擬儲存處理器407 以及複數個儲存裝置介面408。 只要儲存介面相容,本發明之虛擬儲存控制器可被串接並擴 充。倘若需要增加密度,則可藉由增加第二層虛擬儲存控制器以 達到擴充密度之目標。據此,可進一步增加更多的第三層儲存裝 置以擴充密度。與習知技術相比較,本發明之安全且可擴充之固 201243599 態磁碟系統可提供指數級之儲存密度擴充 相較於習知技術之固態磁碟系統,本發明之安全且可擴充之固 態磁碟系統藉由標準之㈣卡(如安全數位卡⑻作為快閃記憶 體基礎區塊(building block),將可帶來許多好處. h快閃記憶體之平均抹除被指定完成於局部之安全數位卡 H)。整體之快閃元件並不需要大幅度之平均抹除。 2. 可製造性财贼性係料全㈣W㈣置層進行。裝 置層與固態磁碟系統層相較,更易於管理。 3.由於料與發频錄針⑺狀鮮安全 數位控心12’因此支持並取得新快閃技術之優勢即無任何 時間延遲。 4· 市時間更短。只要安全數位卡1()在成本、密度和系統效能 許可之下’ 4安全且可擴充之固態磁碟系統31即可開始販 售。 由於女王數位卡1〇之基礎區塊結構,將可自新快閃技術中省 下許多成本。 =於虛擬儲存處理器32、33,系統效能得以改善。虛擬儲存 〇〇 33可&供虛擬儲存密度集合(aggregati〇n )以及 斤需之系統效能集合。平行運料,理論上之线效能將相 同於女全數位卡之數量與各安全數位卡實質上系統效能之兩 者乘積。 7·女全性係由硬體之編碼引擎323或333提供。密碼認證功能 貝J獨立地屬於一 USB訊標35中。因此,該安全且可擴充之The first layer virtual storage controller 32 includes a SATA host interface 321, an encoding engine 323, and a plurality of SATA device interfaces 322 connected in parallel. In this embodiment, the storage interface of the host side may be a serial ATA or SATA. The storage host interface may be any type of input/output interface, such as SATA, tandem small computer 、-, - first " (serial attached small computer system interface; SAS), peripheral controller control interface (PCI 201243599 express), parallel advanced technology attachment (PATA), USB, Bluetooth, ultra-wideband ( Ultra-wideband; UWB) or wireless interface. The virtual storage controller 32 will be described in more detail in the secure virtual storage controller 40 illustrated in FIG. The second layer virtual storage controller 33 includes a SATA host interface 331, an encoding engine 333, and a plurality of secure digital device interfaces 332 in parallel. The virtual storage controller 33 is not directly coupled to the flash memory, but is coupled to the third layer storage device, that is, a secure digital (SD) card 10. As long as the number of pins, cost, and system performance are reasonable, the SD card 1 can be replaced by any flash card or drive, such as: compact flash card (CF card), multimedia card (multimedia compact card; MMC card) ), USB drive or memory stick. In this embodiment, each of the secure digital cards 1 has six signal pins. A four digit security element requires a total of 24 signal pins, each of which has two flash memory elements instead of the 'eight flashes in the prior art. The total number of hidden components required is 120 signal pins. Therefore, the present invention can reduce the cost of the self-controller wafer by a large amount of cost, and has better manufacturability and testability. Even though the first layer of secure virtual storage controller 32 and the second layer of secure virtual storage controller 33 can have different types of device interfaces, the structure of the two is substantially the same. As long as the storage device interface 322 is compatible with the storage host interface 331, the first layer of secure virtual storage controller 32 can be cascaded while expanding more of the second layer of secure virtual storage controller 33. Accordingly, by this expansion, the density and performance of the system will increase exponentially. In the structure of the simplest secure and expandable solid state disk system 201243599, the host system 30 is directly coupled to one of the second layer virtual storage controllers 33. This minimally safe and expandable solid state disk system includes only a two-layer structure of the second layer storage controller 33 and the third layer storage device 10. Both the first layer of the encoding engine 323 and the second layer of the encoding engine 333 are independently enabled, disabled, and configured. In general, only the upper coding engine is needed, and the other lower coding engines will be disabled. The coding engine will be explained in more detail in Figure 13. On the host storage interface, a SATA host interface 331 can be coupled to the first layer virtual storage controller 32. In this embodiment, the storage interface can be a serial port or SATA. The virtual storage controller 33 will be described in more detail in the secure virtual storage controller 40 illustrated in FIG. As shown in FIG. 4, the secure virtual storage controller 40 includes a storage host interface 41, an interrupt processor 42, a host command and data processor 43, a central processing unit (CPU) 44, and a program. The memory 45, a random access memory (RAM) and buffer 46, a data writing processor 401, a data reading processor 402, a pass-through instruction processor 403, A state and attribute retrieval processor 404, a region instruction processor 405, an encoding engine 406, a virtual storage processor 407, and a plurality of storage device interfaces 408. The virtual storage controller of the present invention can be cascaded and expanded as long as the storage interface is compatible. If you need to increase the density, you can achieve the goal of expanding density by adding a second layer of virtual storage controller. Accordingly, more third layer storage devices can be further added to expand the density. Compared with the prior art, the safe and expandable solid 201243599 state disk system of the present invention can provide exponential storage density expansion. Compared with the solid state disk system of the prior art, the safe and expandable solid state of the present invention. The disk system can bring many benefits by using a standard (four) card (such as a secure digital card (8) as a flash memory base block. The average erase of the h flash memory is specified to be done locally. Secure digital card H). The overall flash component does not require a large average erase. 2. The manufacturable property thief-like material is all (four) W (four) layered. The device layer is easier to manage than the solid state disk system layer. 3. Because of the material and the frequency of the needle (7), the number of fresh and safe digital control 12' supports and gains the advantage of the new flash technology without any time delay. 4· The city time is shorter. As long as the Secure Digital Card 1() is licensed under Cost, Density, and System Performance, the 4 Secure and Scalable Solid State Drive System 31 will begin shipping. Thanks to the basic block structure of the Queen Digital Card, many of the costs can be saved from the new flash technology. On the virtual storage processors 32, 33, system performance is improved. Virtual Storage 〇〇 33 can be used for a collection of virtual storage densities (aggregati〇n) and system performance. Parallel transport, in theory, the line efficiency will be the same as the number of female all-digit cards and the actual system performance of each secure digital card. 7. Female fullness is provided by the hardware coding engine 323 or 333. Password authentication function Bay J belongs to a USB beacon 35 independently. Therefore, it is safe and scalable

12 S 201243599 固態磁碟系統具備較佳之系統效能以及安全性。 儲存主機介面41係用以與上傳串流主機系統30或另一上層之 安全虛擬儲存控制器耦接。儲存裝置介面408係用以與下傳串流 儲存裝置10或另一下層之安全虛擬儲存控制器耦接。 第5圖係為根據本發明另一實施例之方塊圖,其係為一具有 PATA介面之安全且可擴充之固態磁碟系統39。主機系統50包含 一處理器(圖未繪示)、記憶體(圖未繪示)、輸入輸出(圖未繪 示)、一 USB介面(圖未繪示)以及一 PATA主機控制器54。PATA 主機控制器54透過一 USB介面與一 USB訊標35連接,並透過一 PATA主機介面381與具有一 PATA介面之安全且可擴充之固態磁 碟系統共同作業。 該具有PATA介面之安全且可擴充之固態磁碟系統39包含一第 一層安全虛擬儲存控制器38、一第二層安全虛擬儲存控制器32、 二個第三層安全虛擬儲存控制器33以及八個第四層儲存裝置安全 數位卡10。如上所述,本發明之結構在密度和系統效能上同樣是 可被擴充且串接的。 如第4圖所示,程式記憶體45可儲存防火牆以及虛擬儲存控制 器資訊,隨機存取記憶體及緩衝器46則可儲存資料封包用以快取 (caching)操作。 資料寫入處理器401係透過編碼引擎耦接至虛擬儲存處理器 407,編碼引擎係用以即時進行硬體加密作業。資料可自緩衝器中 被轉換、加密並傳送至虛擬儲存處理器407。 資料讀取處理器402係透過編碼引擎耦接至虛擬儲存處理器 13 201243599 407,編碼引擎係用以即時進行硬體解密作業。資料可自虛擬儲存 處理器407被轉換、加密並傳送至緩衝器。 通行指令處理器403用以處理未要求任何區域處理之指令。通 行指令係未經加密或翻譯即直接被傳送至下傳串流。 狀態與屬性擷取處理器404回報特定狀態及/或屬性至上傳串流 主機系統,或較上層之虛擬儲存控制器。若該狀態或屬性耗費區 域控制器太多時間回報,狀態與屬性擷取處理器404將對該請求 上傳串流之主機系統或較上層之虛擬儲存控制器顯示一忙碌狀 態。當該特定狀態或屬性收集完成時,中斷處理器42以及電腦例 行程序70將開始作業。中斷處理器42產生一軟體重置47至中央 處理單元44,用以使該安全虛擬儲存控制器40進行暖開機。據 此,中斷處理器42即中斷該系統之上傳串流,並再次詢問虛擬儲 存控制器40以回報正確之狀態或屬性。於主機與裝置以不同速度 運作時,此一機制將令其同步,且於同步之要求提出後,該裝置 需要耗費較多時間進行安排。 藉由程式記憶體45中預先規劃之一特定ID (identity),各安全 虛擬儲存控制器40將可被辨識。第6圖係為初始化安全虛擬儲存 控制器之流程圖。於開機後,安全虛擬儲存控制器40第一次被初 始化60,於步驟61中,即判斷虛擬儲存控制器是否已就緒。若是, 則於步驟62中,主機指令處理器被啟動。否則,於步驟63中, 控制器將發送一辨識指令至下傳串流之儲存裝置目錄。一旦下傳 串流之儲存裝置10被辨識後,該等實體儲存裝置10於步驟64中 將被測試。接著,經由步驟65,編碼引擎被初始化。虛擬儲存控12 S 201243599 Solid state disk system with better system performance and security. The storage host interface 41 is coupled to the upload streaming host system 30 or another upper layer secure virtual storage controller. The storage device interface 408 is coupled to the downstream streaming storage device 10 or another lower level secure virtual storage controller. Figure 5 is a block diagram of a secure and scalable solid state disk system 39 having a PATA interface in accordance with another embodiment of the present invention. The host system 50 includes a processor (not shown), a memory (not shown), an input and output (not shown), a USB interface (not shown), and a PATA host controller 54. The PATA host controller 54 is coupled to a USB beacon 35 via a USB interface and operates through a PATA host interface 381 with a secure and scalable solid state disk system having a PATA interface. The secure and expandable solid state disk system 39 having a PATA interface includes a first layer secure virtual storage controller 38, a second layer secure virtual storage controller 32, and two third layer secure virtual storage controllers 33. Eight fourth layer storage devices secure the digital card 10. As noted above, the structure of the present invention can also be expanded and cascaded in terms of density and system performance. As shown in Fig. 4, the program memory 45 can store firewall and virtual storage controller information, and the random access memory and buffer 46 can store data packets for caching operations. The data writing processor 401 is coupled to the virtual storage processor 407 via an encoding engine for performing an instant hardware encryption operation. The data can be converted, encrypted and transferred from the buffer to the virtual storage processor 407. The data reading processor 402 is coupled to the virtual storage processor 13 201243599 407 through an encoding engine, and the encoding engine is used for real-time hardware decryption operations. The data can be converted, encrypted and transferred from the virtual storage processor 407 to the buffer. The pass instruction processor 403 is used to process instructions that do not require any area processing. The pass-through command is transmitted directly to the downstream stream without being encrypted or translated. The status and attribute capture processor 404 reports a particular status and/or attribute to the upload stream host system, or a higher level virtual storage controller. If the status or attribute consumes too much time for the regional controller to report, the status and attribute retrieval processor 404 will display a busy status for the host system or the upper level virtual storage controller that uploaded the request. When the particular state or attribute collection is complete, the interrupt handler 42 and computer routine 70 will begin the job. The interrupt processor 42 generates a software reset 47 to the central processing unit 44 for warming up the secure virtual storage controller 40. Accordingly, the interrupt handler 42 interrupts the upload stream of the system and again queries the virtual memory controller 40 to report the correct status or attributes. This mechanism will synchronize the host and device at different speeds, and the device will take more time to schedule after the synchronization request is made. Each secure virtual storage controller 40 will be identifiable by pre-planning one of the specific identities in the program memory 45. Figure 6 is a flow chart for initializing a secure virtual storage controller. After booting up, the secure virtual storage controller 40 is initialized 60 for the first time. In step 61, it is determined whether the virtual storage controller is ready. If so, then in step 62, the host instruction processor is started. Otherwise, in step 63, the controller will send an identification command to the storage device directory of the downstream stream. Once the downstream streamed storage device 10 is identified, the physical storage devices 10 will be tested in step 64. Next, via step 65, the encoding engine is initialized. Virtual storage control

S 14 201243599 • 制器於步驟66中被設定'為就緒。隨後執行步驟67,中斷處理器被 啟動。 第7圖係為中斷處理器執行之流程圖。首先,經由步驟71判斷 虛擬儲存控制器之下傳串流是否有一中斷要求。若是,經由步驟 74同意該中斷要求之服務。否則,於步驟72中,產生一中斷至上 傳串流主機,或一較上層之虛擬儲存控制器,以再次配置安全虛 擬控制器40。步驟73實質上產生一軟體重置47至區域中央處理 單元44,使該安全虛擬儲存控制器40進行暖開機。於主機與裝置 以不同速度運作時,此一機制將令其同步,其中,該裝置於開機 初始化後需要耗費較多時間進行安排。 以上敘述即為初始化安全虛擬儲存控制器40之過程。 第8圖為該主機指令處理器執行之流程圖。該主機指令與資料 處理器43列隊(queue up)並緩衝儲存主機介面41與編碼引擎 406之間的指令與資料封包。經由步驟80,將擷取出來之指令佇 列移交至主機指令處理器之例行程序以便於處理。於步驟83中, 若該擷取出來之指令佇列被判斷為一資料寫入指令,一資料寫入 指令處理器401即被喚醒。於步驟84中,若該擷取出來之指令佇 列被判斷為一資料讀取指令,一資料讀取指令處理器402即被喚 醒。於步驟82中,若該擷取出來之指令佇列被判斷為一通行指令, 一通行指令處理器403即被喚醒。於步驟85中,若該擷取出來之 指令佇列被判斷為一狀態/屬性擷取指令,一狀態/屬性擷取處理器 404即被喚醒。否則,一區域指令處理器405將被喚醒。 區域指令處理器405處理編碼引擎406、虛擬儲存處理器407 15 201243599 以及區域虛擬儲存控制器40之區域函數。如第9圖所示,區域指 令集90包含: A. 使用者提供指令91 i. 密碼功能指令94 1. 設定密碼941 2. 更改密碼942 3. 密碼認證943 4. 設定密碼提示944 5. 取得密碼提示945 6. 取得一嘗試(attempt)次數946 7. 初始化及分割要求947 a. 設定加密金鑰9471 b. 取得新加密金鑰9472 ϋ. 儲存分割指令95 7. 取得虛擬儲存屬性951 8. 初始化分割大小952 9. 格式化953 B. 區域狀態擷取92 C. 廠商提供指令93 i. 虛擬儲存處理器組態96 10. 取得虛擬儲存控制器識別(identity ; ID) 961 11. 設定虛擬儲存模式(集束磁碟、獨立磁碟冗餘 陣列或它者)962S 14 201243599 • The controller is set to 'Ready' in step 66. Then step 67 is executed and the interrupt handler is started. Figure 7 is a flow chart for interrupt processor execution. First, it is determined via step 71 whether there is an interrupt request for the stream under the virtual storage controller. If so, the service requested for the interruption is agreed via step 74. Otherwise, in step 72, an interrupt is generated to the upstream streaming host, or a higher level virtual storage controller to configure the secure virtual controller 40 again. Step 73 essentially generates a software reset 47 to the regional central processing unit 44 for warm booting of the secure virtual storage controller 40. This mechanism will synchronize the host and device when operating at different speeds, where the device takes more time to schedule after power-on initialization. The above description is the process of initializing the secure virtual storage controller 40. Figure 8 is a flow chart of the execution of the host instruction processor. The host command queues with the data processor 43 and buffers the instructions and data packets between the storage host interface 41 and the encoding engine 406. Via step 80, the retrieved array of instructions is handed over to the routine of the host instruction processor for processing. In step 83, if the fetched instruction queue is judged to be a data write command, a data write command processor 401 is woken up. In step 84, if the fetched instruction queue is judged to be a data read command, a data read command processor 402 is woken up. In step 82, if the fetched instruction queue is determined to be a pass instruction, a pass instruction processor 403 is woken up. In step 85, if the fetched instruction queue is determined to be a state/attribute fetch instruction, a state/attribute fetch processor 404 is woken up. Otherwise, an area command processor 405 will be woken up. The region instruction processor 405 processes the region functions of the encoding engine 406, the virtual storage processor 407 15 201243599, and the regional virtual storage controller 40. As shown in Figure 9, the regional command set 90 contains: A. User-supplied instructions 91 i. Password function command 94 1. Set password 941 2. Change password 942 3. Password authentication 943 4. Set password prompt 944 5. Get Password prompt 945 6. Get the number of attempts (946) 7. Initialization and splitting requirements 947 a. Set the encryption key 9471 b. Obtain the new encryption key 9472 储存. Store the split instruction 95 7. Obtain the virtual storage attribute 951 8. Initialize split size 952 9. Format 953 B. Area status capture 92 C. Vendor-supplied instructions 93 i. Virtual storage processor configuration 96 10. Get virtual storage controller identification (identity; ID) 961 11. Set virtual storage Mode (Bundle Disk, Redundant Array of Independent Disks or Other) 962

S 16 201243599 Η· 編碼引擎組態97 12. 設定編碼模式971 13. 致能編碼引擎972 14. 取得加密金输973 11'1·密碼屬性組態98 14. 設定主密碼981 15. 設定嘗試次數之最大值982 16. 設定管理模式旗標(flag) 983 17. 設定預設密碼984 iv· 測試模式指令99 使用者提供指令91係被專業領域應用程式使用之,其包含USB Λ標35内之密碼認證功能。使用者提供指令91包含密碼功能指 令94以及儲存分割指令95。廠商係使用廠商提供指令93配置固 •%磁碟系統。廠商提供指令93包含虛擬儲存處理器組態96、編碼 引擎級態指令97、密碼屬性組態98以及測試模式指令99。區域 狀態擷取指令92係用以回傳虛擬儲存控制器之相應狀態。 取得虛擬儲存控制器ID指令961係用以回傳儲存於程式記憶體 45之特定ID。設定虛擬儲存模式指令962可視系統效能之需求或 功率消耗,設定集束磁碟(just a bunch of disks ; JBOD)、獨立磁 碟冗餘陣歹ij (redundant arrays of independent disks ; RAID)或它 者之操作模式。設定編碼模式指令971係用以設定編碼引擎之加 密模式。致能編碼引擎指令972係用以致能編碼引擎。設定管理 模式旗標983用以於使用中(inthe field)允許或禁止提供固態磁 201243599 碟系統。若該旗標被設定為非管理模式,則必須利用USB訊標以 再次提供並初始化該固態磁碟系統。若該旗標被設定為管理模 式,則使用者必須連回至管理伺服器,以再次提供及初始化固態 磁碟系統。該旗標僅能由廠商設定。測試模式指令99可由製造商 保留(reserved )以測試固態磁碟系統。 於就緒使用之前,固態磁碟系統於製作過程間必須先通過廠商 準備。如第3圖所示,該準備係藉由將安全且可擴充之固態磁碟 系統31經一適當的SATA主機控制器34或一 USB訊標35連結至 一主機系統30而達成。第10圖係為配置該廠商準備之流程圖。 首先於步驟101,等待安全虛擬儲存控制器就緒。當控制器就緒之 後,廠商預設設定值於步驟102中被載入。於步驟103中,該虛 擬儲存處理器開始被配置。之後,於步驟104中,該編碼引擎開 始被配置。而於步驟105中,則視需求致能編碼引擎。 第11圖係為配置虛擬儲存處理器之流程圖。如第11圖所示, 於步驟111中,虛擬儲存模式被設定,即利用該等區域指令其中 之一設定虛擬儲存模式962。虛擬儲存操作模式可被設定為 JBOD、RAID或它者。因此,根據實體儲存裝置目錄64 (請參閱 第6圖),一虛擬儲存集合於步驟112便已完成。建立一虛擬儲存 識別目錄。於步驟113中,一虛擬儲存裝置目錄被建立。經由步 驟114,利用虛擬儲存處理器407 (請參閱第4圖)建立一實體至 邏輯位址轉換目錄。隨後,於步驟115中,該虛擬儲存準備被設 定為就緒狀態。 第12圖為配置編碼引擎之流程圖。於步驟121中,經由該等區S 16 201243599 Η· Encoding Engine Configuration 97 12. Setting the Encoding Mode 971 13. Enabling the Encoding Engine 972 14. Obtaining the Encrypted Gold Input 973 11'1·Password Attribute Configuration 98 14. Setting the Master Password 981 15. Setting the Number of Attempts The maximum value of 982 16. Setting the management mode flag (flag) 983 17. Setting the default password 984 iv·Test mode command 99 The user-provided command 91 is used by the professional domain application, which includes the USB target 35. Password authentication function. The user-provided command 91 includes a password function command 94 and a store split command 95. The manufacturer uses the manufacturer's instructions 93 to configure the solid-% disk system. Vendor-provided instructions 93 include a virtual storage processor configuration 96, an encoding engine level instruction 97, a password attribute configuration 98, and a test mode instruction 99. The area status capture command 92 is used to return the corresponding state of the virtual storage controller. The virtual storage controller ID command 961 is used to return the specific ID stored in the program memory 45. Set virtual storage mode command 962 visual system performance requirements or power consumption, set a bunch of disks (JBOD), independent arrays of independent disks (RAID) or other Operating mode. The set encoding mode command 971 is used to set the encryption mode of the encoding engine. The enable encoding engine command 972 is used to enable the encoding engine. The Set Management Mode Flag 983 is used to enable or disable the provision of the Solid State 201243599 dish system in the field. If the flag is set to unmanaged mode, the USB beacon must be utilized to provide and initialize the solid state disk system again. If the flag is set to management mode, the user must connect back to the management server to provide and initialize the solid state disk system again. This flag can only be set by the manufacturer. The test mode command 99 can be reserved by the manufacturer to test the solid state disk system. Before being ready for use, the solid state disk system must be prepared by the manufacturer before the production process. As shown in FIG. 3, the preparation is accomplished by attaching a secure and expandable solid state disk system 31 to a host system 30 via a suitable SATA host controller 34 or a USB beacon 35. Figure 10 is a flow chart for configuring the manufacturer. First in step 101, wait for the secure virtual storage controller to be ready. When the controller is ready, the factory preset settings are loaded in step 102. In step 103, the virtual storage processor begins to be configured. Thereafter, in step 104, the encoding engine begins to be configured. In step 105, the encoding engine is enabled as needed. Figure 11 is a flow chart for configuring a virtual storage processor. As shown in Fig. 11, in step 111, the virtual storage mode is set, i.e., the virtual storage mode 962 is set using one of the regional commands. The virtual storage operating mode can be set to JBOD, RAID or others. Thus, based on the physical storage device directory 64 (see Figure 6), a virtual storage set is completed in step 112. Create a virtual storage to identify the directory. In step 113, a virtual storage device directory is created. Via step 114, an entity to logical address translation directory is created using virtual storage processor 407 (see Figure 4). Then, in step 115, the virtual storage preparation is set to the ready state. Figure 12 is a flow chart of configuring the encoding engine. In step 121, via the zones

18 S 201243599 • 域指令其中之一配置編碼'引擎,並發送一編碼模式設定指令971。 接著,於步驟122中,發送一嘗試設定次數最大值之指令982。於 步驟1220中,發送一取得加密金鑰指令973。因此,於編碼引擎 406中,將利用一亂數產生器RNG 134產生一亂數金鑰(圖未繪 示)。該亂數金鑰於步驟1220中被加密並回傳以取得加密金鑰指 令973。若於步驟1221中要求一主密碼,則於步驟1222中初始化 一取得主密碼指令程序並發送一設定主密碼指令981。於步驟123 中,判斷旗標是否為管理模式。若是,則於步驟124中,視需求 將該加密金鑰儲存於管理伺服器。若否,則經由步驟125,將該加 密金鑰儲存於USB訊標35。於步驟126中,經由密碼設定指令 981發送主密碼至編碼引擎。接著,加密後之主密碼將被儲存於固 態磁碟系統中(圖未繪示)。於步驟1260中,經由指令984設定 一預設密碼。接著,加密後之預設密碼將被儲存於固態磁碟系統 中(圖未繪示)。而編碼引擎可被失能或致能。若編碼引擎被致能, 編碼引擎於步驟127中,可視需求被設定為執行一特定加密模式。 隨後,編碼引擎準備旗標記於步驟128中被設為就緒。 第13圖係為編碼引擎之方塊圖。編碼引擎406包含一亂數產生 器RNG 134、一雜湊函數HASH 131、一第一通用加密引擎ENG2 132、一第二資料加密引擎ENG3 133、一儲存上傳串流介面135 以及一儲存下傳串流介面136。編碼引擎之詳細實施方式請參閱美 國專利申請案第11/643,101號。 主機系統30將取決於插入之USB訊標35進行密碼認證。請參 閱第14A圖,於步驟140中,主機系統30經由冷開機之後。於步 19 201243599 驟141中,USB訊標35同樣冷開機。並經由步驟142啟動USB 訊標操作。 請參閱第14B圖,於步驟143中,主機系統30關機之後。於步 驟144中,固態磁碟系統同樣關機。而由於電力中斷,於步驟145 中,固態磁碟系統中之加密金鑰將遺失。於步驟146中,只要加 密金鑰尚未透過載入USB訊標35之密碼認證功能回復,則該固 態磁碟系統將會維持加密。 請參閱第14D圖,於步驟1403中,主機系統30休眠之後。於 步驟1404中,固態磁碟系統同樣休眠。而由於電力中斷,於步驟 1405中,固態磁碟系統之加密金鑰將遺失。於步驟1406中,只要 加密金鑰尚未經由載入USB訊標35之密碼認證功能回復,則該 固態磁碟系統將會維持加密狀態。 請參閱第14C圖,於步驟1400中’當主機系統30自休眠中被 喚醒之後。於步驟1401中,USB訊標35同樣冷開機,即如同第 14A圖所繪示。最後,於步驟1402中,啟動USB訊標操作。 第15圖為USB訊標開機之流程圖。如第15圖所示,於步驟151 中,一旦USB訊標網路伺服器開機。於步驟152中,該USB訊標 等待儲存器與編碼引擎準備為就緒狀態。接著於步驟153中,啟 動密碼認證功能。該密碼認證功能之詳細實施步驟請參閱美國專 利申請案第11/643,101號。 於步驟154中,若經由使用者指令947產生初始與分割要求則 編碼引擎將自亂數產生器134取得一新亂數金鑰(圖未繪示)。而 後,於步驟1541中,該旗標將被判斷是否為管理模式。若否,則18 S 201243599 • One of the domain instructions configures the encoding 'engine and sends an encoding mode setting command 971. Next, in step 122, an instruction 982 to attempt to set the maximum number of times is sent. In step 1220, a get encryption key command 973 is sent. Therefore, in the encoding engine 406, a random number generator RNG 134 will be utilized to generate a random number key (not shown). The hash key is encrypted and returned in step 1220 to obtain the encryption key command 973. If a master password is required in step 1221, a master password command procedure is initiated and a master password command 981 is sent in step 1222. In step 123, it is determined whether the flag is in the management mode. If so, in step 124, the encryption key is stored in the management server as needed. If not, the encrypted key is stored in the USB beacon 35 via step 125. In step 126, the master password is sent to the encoding engine via the password setting command 981. Then, the encrypted master password will be stored in the solid disk system (not shown). In step 1260, a predetermined password is set via command 984. Then, the encrypted default password will be stored in the solid state disk system (not shown). The encoding engine can be disabled or enabled. If the encoding engine is enabled, the encoding engine is set to perform a particular encryption mode in step 127. Subsequently, the encoding engine ready flag flag is set to ready in step 128. Figure 13 is a block diagram of the encoding engine. The encoding engine 406 includes a random number generator RNG 134, a hash function HASH 131, a first universal encryption engine ENG2 132, a second data encryption engine ENG3 133, a storage upload stream interface 135, and a storage downstream stream. Interface 136. For a detailed implementation of the coding engine, please refer to U.S. Patent Application Serial No. 11/643,101. The host system 30 will perform password authentication depending on the inserted USB beacon 35. Referring to Figure 14A, in step 140, host system 30 is after a cold boot. In step 19 201243599, in step 141, the USB beacon 35 is also cold-booted. And the USB beacon operation is started via step 142. Referring to FIG. 14B, in step 143, after the host system 30 is powered off. In step 144, the solid state disk system is also turned off. And due to power interruption, in step 145, the encryption key in the solid state disk system will be lost. In step 146, the solid state disk system will remain encrypted as long as the encryption key has not been replied by the password authentication function of the USB symbol 35. Referring to FIG. 14D, in step 1403, after host system 30 is dormant. In step 1404, the solid state disk system also sleeps. And due to power interruption, in step 1405, the encryption key of the solid state disk system will be lost. In step 1406, the solid state disk system will remain encrypted as long as the encryption key has not been replied via the password authentication function loaded into the USB beacon 35. Referring to Figure 14C, in step 1400 ' after host system 30 is woken up from sleep. In step 1401, the USB beacon 35 is also cold-booted, as shown in Figure 14A. Finally, in step 1402, the USB beacon operation is initiated. Figure 15 is a flow chart of USB signal activation. As shown in Figure 15, in step 151, once the USB beacon network server is powered on. In step 152, the USB beacon waits for the storage and encoding engine to be ready. Next, in step 153, the password authentication function is activated. For detailed implementation steps of the password authentication function, please refer to U.S. Patent Application Serial No. 11/643,101. In step 154, if the initial and split requests are generated via the user command 947, the encoding engine will obtain a new random number key (not shown) from the random number generator 134. Then, in step 1541, the flag will be judged whether it is the management mode. If not, then

S 20 201243599 於步驟1543中,自USB訊標35擷取加密金鑰。否則,即於步驟 1542中,自管理伺服器擷取加密金输。隨後,於步驟1544中,該 加密金鑰經由設定加密金鑰指令9471被發送至編碼引擎。編碼引 擎解密並擷取該金鑰(圖未繪示)。編碼引擎(圖未繪示)擷取並 解密該加密之主密碼。隨後,自亂數產生器RNG 134 (圖未繪示) 產生一新亂數金鑰。該主密碼可藉由編碼引擎(圖未繪示)使用 該新金鑰加密。於步驟1545中,該功能將經由初始化一取得新加 密金鑰指令9472。於步驟1546、1547中,可視需求將新加密金鑰 儲存於管理伺服器或USB訊標35中。於步驟1548中,使用者要 求並配置新使用者密碼。主密碼與使用者密碼皆藉由雜湊函數13 i 重新產生並健存於固態磁碟系統(圖未繪示)。並於步驟丨549中, 組態該固態磁碟系統分割。 倘若該要求並非初始化及分割,則於步驟155中,將判斷是否 產生一密碼認證請求。若是,則於步驟155〇中,啟動密碼認證。 若否,將於步驟156中,判斷是否有產生一更改密碼請求。若是, 則於步驟157中,啟動密碼更改功能。否則將經由步驟154,回到 步驟155中’繼續判斷是否有新的密碼功能請求。 第16圖係為密碼認證之流程圖。首先,於步驟161中,判斷該 密碼是否已被認證。若是,則於步驟164中絲並載人該編碼引 擎金錄至編碼引擎中,同時開啟存取。隨後,於㈣165中,钟 載(dismount) USB訊標。㈣166巾,該固態磁碟系统被安裝。 於步驟丨67,控制權轉移至該固態㈣系統。若密碼未被認證,於 步驟i 62中’判斷是否超出-嘗試錢最大值(_imum麵⑹〇f 21 201243599 attempts ; MNOA )。若結果為肯定,則於步驟163中,啟動一反 擊測量(counter measure )以抵抗惡意攻擊。否則,於步驟168中, 增加該嘗試次數(number of attempts ; NOA)之計數。最後於步 驟169中結束並返回第15圖繪示之密碼迴圈之步驟丨54。 儘管根據本發明之安全且可擴充之固態磁碟系統可操作於安全 數位卡、多媒體卡、微型快閃卡、USB裝置、記憶棒、高速卡、 邏輯區塊定址-反及(logical block addressing-NAND ; LBA-NAND)、開放式反及快閃記憶體介面(〇pen nand以化 interface; ONFI)、内嵌式多媒體卡(embed muhimedia card;eMMC) 與内嵌式安全數位卡(embed security digital card ; eSD)之任一 介面。所屬領域之技術者可輕易地將該磁碟系統置換成任一種類 似的記憶體裝置,同時並不違反本發明之精神及保護範疇。 上述之實施例僅用來例舉本發明之實施態樣,以及闡釋本發明 之技術特徵’並非用來限制本發明之保護料。任何熟悉此技術 者可輕易完成之改變或均等性之安排均屬於本發明所主張之範 圍,本發明之權利保護範圍應以申請專利範圍為準。 【圖式簡單說明】 第1圖係為習知技術之—安全數位卡之方塊圖; 第2圖係為習知技術之一主機系統與一習知固態磁碟系統之 接不意圖; m @係為m统與一 USB訊標叙接至一基於三層 SATA式安全且可擴充之固態磁碟統之方塊圖; 曰。 第4圖係為安全虛擬儲存控制器之方塊圖;S 20 201243599 In step 1543, the encryption key is retrieved from the USB beacon 35. Otherwise, in step 1542, the self-management server retrieves the encrypted gold input. Then, in step 1544, the encryption key is sent to the encoding engine via the set encryption key command 9471. The code engine decrypts and retrieves the key (not shown). The encoding engine (not shown) retrieves and decrypts the encrypted master password. Subsequently, a random number key is generated from the random number generator RNG 134 (not shown). The master password can be encrypted using the new key by an encoding engine (not shown). In step 1545, the function will acquire a new encryption key command 9472 via initialization one. In steps 1546 and 1547, the new encryption key is stored in the management server or USB beacon 35 as needed. In step 1548, the user requests and configures a new user password. Both the master password and the user password are regenerated by the hash function 13 i and stored in the solid state disk system (not shown). And in step 549, the solid state disk system segmentation is configured. If the request is not initialization and splitting, then in step 155, a determination is made as to whether a password authentication request is generated. If yes, in step 155, the password authentication is initiated. If not, in step 156, a determination is made as to whether a change password request has been generated. If so, in step 157, the password change function is activated. Otherwise, via step 154, return to step 155 to continue to determine if there is a new cryptographic function request. Figure 16 is a flow chart for password authentication. First, in step 161, it is determined whether the password has been authenticated. If so, in step 164, the coded engine is loaded into the encoding engine and the access is turned on. Subsequently, in (4) 165, the clock is dismounted. (d) 166 towel, the solid state disk system is installed. At step 丨67, control transfers to the solid state (four) system. If the password is not authenticated, it is judged in step i62 whether it is exceeded - the maximum value of the attempt (_imum face (6) 〇 f 21 201243599 attempts; MNOA). If the result is affirmative, then in step 163, a counter measure is initiated to resist the malicious attack. Otherwise, in step 168, the count of number of attempts (NOA) is incremented. Finally, in step 169, the process returns to step 154 of the password loop shown in FIG. Although the secure and expandable solid state disk system according to the present invention can operate on secure digital cards, multimedia cards, micro flash cards, USB devices, memory sticks, high speed cards, logical block addressing- NAND; LBA-NAND), open anti-flash memory interface (〇p nand to interface; ONFI), embedded multimedia card (embed muhimedia card; eMMC) and embedded security digital card (embed security digital Card ; eSD) any interface. One skilled in the art can readily replace the disk system with any type of memory device without departing from the spirit and scope of the invention. The above-described embodiments are merely illustrative of the embodiments of the present invention, and the technical features of the present invention are not intended to limit the protective materials of the present invention. Any changes or equivalents that can be easily made by those skilled in the art are within the scope of the invention. The scope of the invention should be determined by the scope of the claims. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram of a secure digital card of the prior art; FIG. 2 is a schematic diagram of a conventional host system and a conventional solid state disk system; m @ It is a block diagram of a three-layer SATA-based secure and expandable solid-state disk system; Figure 4 is a block diagram of a secure virtual storage controller;

22 S 201243599 第5圖係為一主機系統輿一 USB訊標耦接至一基於四層結構之 PATA式安全且可擴充之固態磁碟系統之方塊圖; 第6圖係為初始化該安全虛擬儲存控制器之流程圖; 第7圖係為中斷處理器執行之流程圖; 第8圖係為主機命令處理器執行之流程圖; 第9圖係為安全虛擬儲存控制器之區域命令處理器,其内部之 區域命令表; 第10圖係為執行廠商準備之流程圖; 第11圖係為配置該虛擬儲存處理器之流程圖; 第12圖係為配置編碼引擎之流程圖; 第13圖係為該編碼引擎之方塊圖; 第14A-14D圖分別為該主機系統之冷開機、關機、休眠以及由 休眠被喚醒之流程圖; 第15圖係為USB訊標開機之流程圖;以及 第16圖係為密碼認證之流程圖。 【主要元件符號說明】 10 : 安全數位卡 11 : 實體介面 12 : 安全數位卡控制器 13 : 快閃記憶體 14 : 介面匯流排22 S 201243599 Figure 5 is a block diagram of a host system with a USB beacon coupled to a four-layer PATA-based secure and expandable solid-state disk system; Figure 6 is an initialization of the secure virtual storage Figure 7 is a flow chart of the execution of the interrupt processor; Figure 8 is a flow chart executed by the host command processor; Figure 9 is a regional command processor of the secure virtual storage controller, Internal regional command table; Figure 10 is a flow chart for the execution of the manufacturer; Figure 11 is a flow chart for configuring the virtual storage processor; Figure 12 is a flow chart for configuring the coding engine; The block diagram of the encoding engine; the 14A-14D diagrams are respectively a cold boot, shutdown, hibernation, and wake-up of the host system; Figure 15 is a flowchart of the USB beacon booting; and Figure 16 It is a flow chart for password authentication. [Main component symbol description] 10 : Secure digital card 11 : Physical interface 12 : Secure digital card controller 13 : Flash memory 14 : Interface bus

131 :雜湊函數HASH 132 :第一通用加密引擎ENG2 23 201243599 133 :第二資料加密引擎ENG3131 : hash function HASH 132 : first universal encryption engine ENG2 23 201243599 133 : second data encryption engine ENG3

134 :亂數產生器RNG 135 :儲存上傳串流介面 136 :儲存下傳串流介面 20 :主機系統 21 : SATA主機控制器 22 :快閃式固態磁碟系統 25 : SATA至快閃記憶體控制器 251 : SATA主機介面 252 :快閃裝置介面 30 :主機系統 31 :安全且可擴充之固態磁碟系統 32:第一層安全虛擬儲存控制器 33 :第二層安全虛擬儲存控制器 34 : SATA主機控制器 35 : USB訊標 38 :第一層安全虛擬儲存控制器 39:安全且可擴充之固態磁碟系統 321 : SATA主機介面 322 : SATA裝置介面 323 :編碼引擎 331 : SATA主機介面 332 :安全數位介面134: Random Number Generator RNG 135: Store Upload Streaming Interface 136: Store Downstream Streaming Interface 20: Host System 21: SATA Host Controller 22: Flash Solid State Disk System 25: SATA to Flash Memory Control 251: SATA Host Interface 252: Flash Device Interface 30: Host System 31: Secure and Scalable Solid State Disk System 32: First Layer Secure Virtual Storage Controller 33: Layer 2 Secure Virtual Storage Controller 34: SATA Host Controller 35: USB Signal 38: First Layer Secure Virtual Storage Controller 39: Secure and Scalable Solid State Disk System 321 : SATA Host Interface 322: SATA Device Interface 323: Encoding Engine 331: SATA Host Interface 332: Secure digital interface

24 S 201243599 333 :編碼引擎 381 : PATA主機介面 382 : SATA裝置介面 383 :編碼引擎 40 :安全虛擬儲存控制器 41 :儲存主機介面 42 :中斷處理器 43 :主機指令/資料處理器 44 :中央處理單元 45 :程式記憶體 46 :隨機存取記憶體/緩衝器 47 :重置 401 :資料寫入處理器 402 :資料讀取處理器 403 :通行指令處理器 404 :狀態與屬性擷取處理器 405 :區域指令處理器 406 :編碼引擎 407 :虛擬儲存處理器 408 :儲存裝置介面 50 :主機系統 54 : PATA主機控制器 90 :區域指令集 25 201243599 91 :使用者提供指令 92 :區域狀態擷取 93 :廠商提供指令 94 :密碼功能指令 95 :儲存分割指令 96 :虛擬儲存處理器組態 97 :編碼引擎組態 98 :密碼屬性組態 99 :測試模式指令 941 :設定密碼 942 :更改密碼 943 :密碼認證 944 :設定密碼提示 945 :取得密碼提示 946 :取得一嘗試次數 947 :初始化及分割要求 9471 :設定加密金鑰 9472 :取得新加密金鑰 951 :取得虛擬儲存屬性 952 :初始化分割大小 953 :格式化 961 :取得虛擬儲存控制器識別 962 :設定虛擬儲存模式24 S 201243599 333 : Coding Engine 381 : PATA Host Interface 382 : SATA Device Interface 383 : Encoding Engine 40 : Secure Virtual Storage Controller 41 : Storage Host Interface 42 : Interrupt Processor 43 : Host Command / Data Processor 44 : Central Processing Unit 45: Program Memory 46: Random Access Memory/Buffer 47: Reset 401: Data Write Processor 402: Data Read Processor 403: Access Instruction Processor 404: Status and Attribute Capture Processor 405 : area command processor 406: encoding engine 407: virtual storage processor 408: storage device interface 50: host system 54: PATA host controller 90: regional instruction set 25 201243599 91: user provides instruction 92: area status capture 93 : Vendor provides instruction 94: Password function instruction 95: Storage split instruction 96: Virtual storage processor configuration 97: Encoding engine configuration 98: Password attribute configuration 99: Test mode command 941: Set password 942: Change password 943: Password Authentication 944: Set password prompt 945: Get password prompt 946: Get a number of attempts 947: Initialization and split request 9471: Set encryption key 9472: Get Encryption key 951: obtaining the virtual storage attributes 952: 953 initializes the segment sizes: 961 Format: Get the controller identifies the virtual storage 962: the virtual storage setting mode

26 S 201243599 9 71 .設定編碼模式 972 :致能編碼引擎 973 :取得加密金鑰 981 :設定主密碼 982 :設定嘗試次數之最大值 983 :設定管理模式旗標 984 :設定預設密碼 2726 S 201243599 9 71 .Setting the encoding mode 972 : Enabling the encoding engine 973 : Obtaining the encryption key 981 : Setting the master password 982 : Setting the maximum number of attempts 983 : Setting the management mode flag 984 : Setting the default password 27

Claims (1)

201243599 七、申請專利範圍: 1. 一種固態磁碟系統(solid state disk system ),包含: 一使用者訊標(user token); 至少一安全虛擬儲存控制器,係耦接至一主機系統;以 及 複數個虛擬儲存裝置,係耦接至該至少一安全虛擬儲存 控制器。 2. 如請求項1所述之系統,其中該至少一虛擬儲存控制器包含: 一第一層安全儲存控制器;以及 複數個第二層虛擬儲存控制器,具有一介面,該等第二 層虛擬儲存控制器相容於該第一層虛擬儲存控制器。 3. 如請求項2所述之系統,其中該等第二層安全虛擬儲存控制 器之數量可藉由該介面增加至該等第一層安全虛擬儲存控制 器。 4. 如請求項2所述之系統,其中該第一層安全虛擬儲存控制器 係利用一第一編碼引擎以提供安全性。 5. 如請求項4所述之系統,其中各該第二層安全虛擬儲存控制 器係利用一第二編碼引擎以提供安全性。 6. 如請求項1所述之系統,其中該至少一虛擬儲存控制器包含 一編碼引擎以提供安全性。 7. 如請求項5所述之系統,其中該使用者訊標作為一提供該主 機系統密碼認證之媒介。 8. 如請求項5所述之系統,其中該第一編碼引擎以及各該第二 編碼引擎可分別被致能(enabled)、失能(disabled)與配置 28 S 201243599 (configured ) ° 9. 如請求項2所述之系統,其中該第一層安全虛擬儲存控制器 包含: 一儲存主機介面; 一中斷處理器,係耦接至該儲存主機介面; 一主機指令與資料處理器; 一中央處理單元; 一軟體重置器,係耦接至該中央處理單元; 一程式記憶體; 一控制器標識符碼; 一隨機存取記憶體(random access memory ; RAM)及一 緩衝器; 一資料寫入處理器; 一資料讀取處理器: 一通行(pass-through)指令處理器; 一狀態與屬性擷取處理器; 一區域指令處理器; 一編碼引擎; 一虛擬儲存處理器;以及 複數個儲存裝置介面。 10. 如請求項2所述之系統,其中各該第二層安全虛擬儲存控制 器包含: 一儲存主機介面; 29 201243599 —中斷處理器,係耦接至該儲存主機介面; —主機指令與資料處理器; 一中央處理單元; —軟體重置器,係耦接至該中央處理單元; —程式記憶體; —控制器標識符碼; 一隨機存取記憶體及一緩衝器; —資料寫入處理器; —資料讀取處理器: —通行指令處理器; 一狀態與屬性擷取處理器; 一區域指令處理器; —編碼引擎; —虛擬儲存處理器;以及 複數個儲存裝置介面。 11. 如請求項9所述之系統,其中該儲存主機介面包含一串列高 速硬碟(serial advanced technology attachment ; SATA)介 面’且各該儲存裝置介面包含一串列高速硬碟介面。 12. 如明求項9所述之系統’其中該儲存主機介面包含一平行高 速更碟(parallel advanced technology attachment ; PATA)介 面’且各該儲存裝置介面包含一串列高速硬碟介面。 如睛求項10所述之系統,其中該儲存主機介面包含一串列高 迷硬碟介面,且各該儲存裝置介面包含一安全數位(secudty 13, 201243599 digital ; SD)介面。 14. 如請求項13所述之系統,其中該安全數位介面包含一儲存裝 置(storage device ; SD)卡、多媒體卡(multimedia card ; MMC )、一微型快閃卡(compact flash card ; CF card )、通用 串列匯流排(universal serial bus ; USB )裝置、記憶棒(memory stick; MS )、高速卡(express card )、邏輯區塊定址-反及(logical block addressing-NAND ; LBA-NAND )、開放式反及快閃記憶 體介面(open NAND flash interface ; ΟΝΠ )、内嵌式多媒體 卡(embed multimedia card; eMMC)與内欲式安全數位卡 (embed security digital card ; eSD)之任一介面。 15. 如請求項1所述之系統’其中藉由增加額外之安全虛擬儲存 控制器’俾加強儲存能力及效能。 16. 如請求項9所述之系統,其中當該主機與裝置以不同速度運 作時,S亥中斷處理器以及該軟體重置器可形成一機制,俾使 該主機與裝置同步。 17. 如吻求項1〇所述之系统,其中當該主機與裝置以不同速度運 作時,δ玄中斷處理器以及該軟體重置器可形成一機制,俾使 該主機與骏置同步。 18. -種固態磁碟系統,包含: 一使用者訊標; 一第一層安全虛擬儲存控制器,係耦接至一主機系統; 複數個第二層虛擬儲存控制器,具有一界面,該等第二 層虛擬儲存控制器相容於該第-層虛擬儲存控制器;以及 31 201243599 19. 20. 21. 22. 23. 24. 複數個第二層虛擬儲存裝置之下層,係耦接至該等第二 層虛擬儲存控制器之上層。 如請求項18所述之系統,其中該等第二層安全虛擬儲存控制 器之數量可藉由該介面增加至該第一層安全虛擬儲存控制 器。 如請求項18所述之系統,其中該第一層安全虛擬儲存控制器 係利用一第一編碼引擎提供安全性予該第一層安全虛擬儲存 控制器。 如請求項20所述之系統,其中各該第二層安全虛擬儲存控制 器係利用一第二編碼引擎分別提供安全性予各該第二層安全 虛擬儲存控制器。 如請求項21所述之系統,其中一訊標係用以作為提供該主機 系統一密碼認證之媒介。 如請求項21所述之系統,其中該第一編碼引擎以及各該第二 編碼引擎可分別被致能、失能與配置。 如請求項18所述之系統,其中該第一層安全虛擬儲存控制器 包含: 一儲存主機介面; 一中斷處理器,係耦接至該儲存主機介面; 一主機指令與資料處理器; 一中央處理單元; 一軟體重置器,係耦接至該中央處理單元; 一程式記憶體; S 32 201243599 一控制器標識符碼; 一隨機存取記憶體及一緩衝器; 一資料寫入處理器; 一資料讀取處理器: 一通行指令處理器; 一狀態與屬性擷取處理器; 一區域指令處理器; 一編碼引擎; 一虛擬儲存處理器;以及 複數個儲存裝置介面。 25.如請求項18所述之系統,其中各該第二層安全虛擬儲存控制 器包含: 一儲存主機介面; 一中斷處理器,係麵接至該儲存主機介面; 一主機指令與資料處理器; 一中央處理單元; 一軟體重置器,係耦接至該中央處理單元; 一程式記憶體; 一控制器標識符碼; 一隨機存取記憶體及一緩衝器; 一資料寫入處理器; 一資料讀取處理器: 一通行指令處理器; 201243599 —狀態與屬性擷取處理器; —區域指令處理器; —編碼引擎; 虛擬儲存處理器;以及 複數個儲存裝置介面。 26. 27. 28. 29. 30. 31. 32. 如請求項2 4所述之系統,其中該儲存主機介面包含列高 速硬碟介面’且各該儲存裝置介面包含__列高速硬碟介^ 如請求項24所述之系統,其中該儲存主機介面包含—平行高 速更碟介面’且各該儲存裝置介面包含—串列高速硬碟介面。 如請求項25所述之系統,其t該儲存主機介面包含—申列高 速硬碟介面,且各該儲存裝置介面包含_安全數位介面。门 如請求項28所述之系統’其中該安全數位介面包含—储存裝 置卡夕媒體卡、微型快閃卡、通用串列匯流排裝置、記憶 棒、高速卡、邏輯區塊定址_反及、開放式财仙快閃記憶體 介面、内嵌式多媒體卡與内嵌式安全數位卡之任一介面。〜 如請求項18所述之线,其帽由增加額外之安全虛擬儲存 控制器’俾加強儲存能力及效能。 如請求項24所述之线’ Μ當社機與裝置料同速度運 作時,該中斷處理器以及該軟體重置器可形成一機制,俾使 該主機與裝置同步。 如"月求項25所述之系統,其t當該主機與裝置以不同速度運 作時,該中斷處理器以及該軟體重置器可形成一機制,俾使 該主機與裝置同步。 34 S 201243599 - 33. —種用於一固態磁碟系統之區域指令處理器,包含: 一處理器;以及 一區域指令目錄,係於該處理器中執行,該指令目錄包 含使用者提供指令、一區域狀態擷取指令以及廠商提供指令。 34. 如請求項33所述之區域指令處理器,其中該使用者提供指令 係被專業領域應用程式中之功能使用之,該使用者提供指令 包含密碼功能指令與儲存分割指令,其中該廠商提供指令係 用於廠商配置該固態磁碟系統,該廠商提供指令包含一虛擬 儲存處理器指令、編,引擎組態指令、密碼屬性組態指令以 及一測試模式指令。 35. 如請求項34所述之區域指令處理器,其中該等廠商提供指令 包含虛擬儲存處理器組態指令、編碼引擎組態指令、密碼屬 性組態指令以及一測試模式指令。 36. 如請求項35所述之區域指令處理器,其中該等虛擬儲存處理 器組態指令包含虛擬儲存屬性擷取指令與虛擬儲存命令模式 設定指令。 37. 如請求項35所述之區域指令處理器,其中該等編碼引擎組態 指令包含一編碼模式設定指令、一編碼引擎致能指令以及一 解碼金鑰擷取指令。 38. 如請求項33所述之區域指令處理器,其中該等使用者提供指 令包含密碼功能指令與儲存分割指令。 39. 如請求項38所述之區域指令處理器,其中該等密碼功能指令 ' 包含一密碼設定指令、一密碼更改指令、一密碼認證指令、 35 201243599 一密碼目錄設定指令、一嘗試(attempts)擷取次數指令以及 初始化一分割請求指令。 40. 如請求項39所述之區域指令處理器,其中該初始化一分割請 求指令包含一解碼金鑰設定指令以及一新解碼金鑰擷取指 〇 41. 如請求項38所述之區域指令處理器,其中該儲存分割指令包 含一虛擬儲存屬性擷取指令、初始化分割大小指令以及一格 式化指令。 42. —種固態磁碟系統之廠商提供之方法,包含下列步驟: 於該固態磁碟系統之一安全虛擬儲存控制器中,載入廠 商預設設定; 配置該安全虛擬儲存控制器; 配置該固態磁碟系統之一編碼引擎;以及 致能該編碼引擎,以使用該固態磁碟系統。 43. —種用於配置一固態磁碟系統之一虛擬儲存處理器之方法, 包含下列步驟: 將該虛擬儲存處理器設定為虛擬儲存模式; 根據一實體儲存裝置目錄聚集該虛擬儲存; 建立一虛擬儲存裝置目錄; 根據該裝置目錄,藉由該虛擬儲存處理器建立一實體至 邏輯位址表;以及 將該虛擬儲存處理器之一狀態設定為就緒(ready )。 44. 一種用於配置一固態磁碟系統之一編碼引擎之方法,包含下 S 36 201243599 列步驟: 發送一編碼模式設定指令; 發送一嘗試設定次數之一最大值指令; 發送一解碼金鑰擷取指令以及提供一亂數金鑰; 當要求一主密碼時,則發送一主密碼擷取指令; 當要求一主密碼時,則發送一主密碼設定指令; 儲存該解碼金鑰;以及 將一編碼引擎供應旗標(provision flag )設定為就緒。 45. 如請求項44所述之方法,其中當該固態磁碟系統被設定為一 管理模式時,該解碼金鑰係儲存於一管理伺服器中,其中當 該固態磁碟系統未被設定為一管理模式時,該解碼金鑰係儲 存於一通用串列匯流排裝置訊標中。 46. 如請求項45所述之方法,其中該編碼引擎可被失能。 47. —種電腦可讀取紀錄媒體,該電腦可讀取紀錄媒體包含程式 指令用以配置一虛擬儲存處理器,該程式指令包含: 將該虛擬儲存處理器設定為虛擬儲存模式; 根據一實體儲存裝置目錄聚集該虛擬儲存; 建立一虛擬儲存裝置目錄; 根據該裝置目錄,藉由該虛擬儲存處理器建立一實體至 邏輯位址表;以及 將該虛擬儲存處理器之一狀態設定為就緒。 48. —種電腦可讀取紀錄媒體,該電腦可讀取紀錄媒體包含程式 指令用以配置一固態磁碟系統之一編碼引擎,該程式指令包 37 201243599 含: 發送一編碼模式設定指令; 發送一嘗試設定次數之一最大值指令; 發送一解碼金鑰擷取指令以及提供一亂數金鑰; 當要求一主密碼時,則發送一主密碼擷取指令; 當要求一主密碼時,則發送一主密碼設定指令; 儲存該解碼金嫱;以及 將一編碼引擎供應旗標設定為就緒。 49. 50. 如請求項48所述包含程式指令之電腦可讀取紀錄媒體,其中 當該固態磁碟系統被設定為一管理模式時,該解碼金鑰係儲 存於一管理伺服器中,其中當該固態磁碟系統未被設定為一 管理模式時,該解碼金鑰係儲存於一通用串列匯流排裝置訊 標中。 如請求項49所述包含程式指令之電腦可讀取紀錄媒體,其中 該編碼引擎可被失能。 33 S201243599 VII. Patent application scope: 1. A solid state disk system, comprising: a user token; at least one secure virtual storage controller coupled to a host system; A plurality of virtual storage devices are coupled to the at least one secure virtual storage controller. 2. The system of claim 1, wherein the at least one virtual storage controller comprises: a first layer secure storage controller; and a plurality of second layer virtual storage controllers having an interface, the second layer The virtual storage controller is compatible with the first layer virtual storage controller. 3. The system of claim 2, wherein the number of the second layer of secure virtual storage controllers is increased by the interface to the first layer of secure virtual storage controllers. 4. The system of claim 2, wherein the first layer of secure virtual storage controller utilizes a first encoding engine to provide security. 5. The system of claim 4, wherein each of the second layer of secure virtual storage controllers utilizes a second encoding engine to provide security. 6. The system of claim 1 wherein the at least one virtual storage controller comprises an encoding engine to provide security. 7. The system of claim 5, wherein the user beacon is a medium that provides password authentication for the host system. 8. The system of claim 5, wherein the first encoding engine and each of the second encoding engines are respectively enabled, disabled, and configured. 28 S 201243599 (configured) ° 9. The system of claim 2, wherein the first layer of secure virtual storage controller comprises: a storage host interface; an interrupt processor coupled to the storage host interface; a host command and data processor; and a central processing a software resetter coupled to the central processing unit; a program memory; a controller identifier code; a random access memory (RAM) and a buffer; Into the processor; a data reading processor: a pass-through instruction processor; a state and attribute retrieval processor; an area instruction processor; an encoding engine; a virtual storage processor; and a plurality of Storage device interface. 10. The system of claim 2, wherein each of the second layer of secure virtual storage controllers comprises: a storage host interface; 29 201243599 - an interrupt processor coupled to the storage host interface; - host instructions and data a central processing unit; a software resetter coupled to the central processing unit; a program memory; a controller identifier code; a random access memory and a buffer; a processor; a data read processor: a pass instruction processor; a state and attribute capture processor; a region instruction processor; an encoding engine; a virtual storage processor; and a plurality of storage device interfaces. 11. The system of claim 9, wherein the storage host interface comprises a serial advanced technology attachment (SATA) interface and each of the storage device interfaces comprises a serial high speed hard disk interface. 12. The system of claim 9, wherein the storage host interface comprises a parallel advanced technology attachment (PATA) interface and each of the storage device interfaces comprises a tandem high speed hard disk interface. The system of claim 10, wherein the storage host interface comprises a series of hard disk interfaces, and each of the storage device interfaces comprises a secure digit (secudty 13, 201243599 digital; SD) interface. 14. The system of claim 13, wherein the secure digital interface comprises a storage device (SD) card, a multimedia card (MMC), a compact flash card (CF card); , universal serial bus (USB) device, memory stick (MS), high speed card (express card), logical block addressing-NAND (LBA-NAND), Open interface with open NAND flash interface (ΟΝΠ), embedded multimedia card (eMMC) and embed security digital card (eSD). 15. The system of claim 1 wherein the storage capacity and performance are enhanced by adding an additional secure virtual storage controller. 16. The system of claim 9, wherein the S-Hui interrupt processor and the software resetter form a mechanism to synchronize the host with the device when the host and the device operate at different speeds. 17. The system of claim 1, wherein the δ 玄 interrupt handler and the software resetter form a mechanism to synchronize the host with the master when the host and the device operate at different speeds. 18. A solid state disk system comprising: a user signal; a first layer of secure virtual storage controller coupled to a host system; a plurality of second layer virtual storage controllers having an interface The second layer of virtual storage controller is compatible with the first layer virtual storage controller; and 31 201243599 19. 20. 21. 22. 23. 24. A plurality of layers of the second layer of virtual storage devices are coupled to The second layer of virtual storage controllers above. The system of claim 18, wherein the number of the second layer of secure virtual storage controllers is increased by the interface to the first layer of secure virtual storage controller. The system of claim 18, wherein the first layer of secure virtual storage controller provides security to the first layer of secure virtual storage controllers using a first encoding engine. The system of claim 20, wherein each of the second layer of secure virtual storage controllers provides security to each of the second layer of secure virtual storage controllers using a second encoding engine. A system as claimed in claim 21, wherein a beacon is used as a medium for providing a password authentication for the host system. The system of claim 21, wherein the first encoding engine and each of the second encoding engines are separately enabled, disabled, and configured. The system of claim 18, wherein the first layer of secure virtual storage controller comprises: a storage host interface; an interrupt processor coupled to the storage host interface; a host command and data processor; a software resetter coupled to the central processing unit; a program memory; S 32 201243599 a controller identifier code; a random access memory and a buffer; a data write processor A data read processor: a pass instruction processor; a state and attribute capture processor; a region instruction processor; an encoding engine; a virtual storage processor; and a plurality of storage device interfaces. 25. The system of claim 18, wherein each of the second layer of secure virtual storage controllers comprises: a storage host interface; an interrupt handler coupled to the storage host interface; a host command and data processor a central processing unit; a software resetter coupled to the central processing unit; a program memory; a controller identifier code; a random access memory and a buffer; a data write processor A data read processor: a pass instruction processor; 201243599 - state and attribute capture processor; - area instruction processor; - coding engine; virtual storage processor; and a plurality of storage device interfaces. 26. 27. 28. 29. 30. 31. 32. The system of claim 2, wherein the storage host interface comprises a column of high-speed hard disk interface ′ and each of the storage device interfaces comprises a __column high-speed hard disk interface The system of claim 24, wherein the storage host interface includes a parallel high speed DVD interface and each of the storage device interfaces includes a serial high speed hard disk interface. The system of claim 25, wherein the storage host interface comprises a high-speed hard disk interface, and each of the storage device interfaces includes a security digital interface. The system of claim 28, wherein the secure digital interface includes a storage device card media card, a micro flash card, a universal serial bus device, a memory stick, a high speed card, a logical block address, and a Any interface between the open fiscal flash memory interface, the embedded multimedia card and the embedded secure digital card. ~ As described in claim 18, the cap is enhanced by additional security virtual storage controllers to enhance storage capacity and performance. The interrupt handler and the software resetter may form a mechanism to synchronize the host with the device as the line's device of claim 24 operates at the same speed as the device. The system of claim 25, wherein when the host and the device operate at different speeds, the interrupt handler and the software resetter can form a mechanism to synchronize the host with the device. 34 S 201243599 - 33. A regional instruction processor for a solid state disk system, comprising: a processor; and a region instruction directory, executed in the processor, the instruction directory containing instructions provided by a user, An area status capture instruction and a vendor-supplied instruction. 34. The regional instruction processor of claim 33, wherein the user-provided instruction is used by a function in a professional domain application, the user-provided instruction comprising a cryptographic function instruction and a storage split instruction, wherein the vendor provides The instructions are for the vendor to configure the solid state disk system, and the manufacturer provides instructions including a virtual storage processor instruction, programming, engine configuration instructions, password attribute configuration instructions, and a test mode instruction. 35. The regional instruction processor of claim 34, wherein the instructions provided by the vendor comprise a virtual storage processor configuration instruction, an encoding engine configuration instruction, a password attribute configuration instruction, and a test mode instruction. 36. The regional instruction processor of claim 35, wherein the virtual storage processor configuration instructions comprise a virtual storage attribute retrieval instruction and a virtual storage command mode setting instruction. 37. The regional instruction processor of claim 35, wherein the encoding engine configuration instructions include an encoding mode setting instruction, an encoding engine enable instruction, and a decode key capture instruction. 38. The regional instruction processor of claim 33, wherein the user-provided instructions include a cryptographic function instruction and a store segmentation instruction. 39. The area command processor of claim 38, wherein the password function instructions 'contain a password setting instruction, a password change instruction, a password authentication instruction, 35 201243599 a password directory setting instruction, an attempt (attempts) The number of times of instruction and the initialization of a split request instruction. 40. The regional instruction processor of claim 39, wherein the initialization split request instruction includes a decode key set instruction and a new decode key capture pointer 41. The region instruction processing as described in claim 38 The storage partitioning instruction includes a virtual storage attribute retrieval instruction, an initialization split size instruction, and a formatting instruction. 42. A method provided by a manufacturer of a solid state disk system, comprising the steps of: loading a manufacturer preset setting in a secure virtual storage controller of the solid state disk system; configuring the secure virtual storage controller; configuring the An encoding engine of one of the solid state disk systems; and enabling the encoding engine to use the solid state disk system. 43. A method for configuring a virtual storage processor of a solid state disk system, comprising the steps of: setting the virtual storage processor to a virtual storage mode; aggregating the virtual storage according to a physical storage device directory; establishing a a virtual storage device directory; according to the device directory, an entity to a logical address table is established by the virtual storage processor; and a state of one of the virtual storage processors is set to ready. 44. A method for configuring an encoding engine of a solid state disk system, comprising the steps of: S36 201243599: transmitting an encoding mode setting command; transmitting an attempt to set a maximum number of instructions; transmitting a decoding key 撷Obtaining a command and providing a random number key; when a master password is requested, sending a master password capture command; when a master password is requested, sending a master password setting command; storing the decode key; and The encoding engine provision flag is set to ready. The method of claim 44, wherein when the solid state disk system is set to a management mode, the decoding key is stored in a management server, wherein the solid state disk system is not set to In a management mode, the decoding key is stored in a universal serial bus device beacon. The method of claim 45, wherein the encoding engine is disabled. 47. A computer readable recording medium, the computer readable recording medium comprising program instructions for configuring a virtual storage processor, the program instructions comprising: setting the virtual storage processor to a virtual storage mode; The storage device directory aggregates the virtual storage; establishing a virtual storage device directory; establishing, by the virtual storage processor, an entity to a logical address table according to the device directory; and setting a state of one of the virtual storage processors to be ready. 48. A computer readable recording medium, the computer readable recording medium comprising program instructions for configuring an encoding engine of a solid state disk system, the program instruction package 37 201243599 includes: transmitting an encoding mode setting instruction; One attempt to set a maximum number of instructions; send a decode key capture command and provide a random number key; when a master password is requested, a master password capture command is sent; when a master password is required, Sending a master password setting command; storing the decoding key; and setting an encoding engine supply flag to be ready. 49. The computer-readable recording medium containing the program instructions as claimed in claim 48, wherein the decoding key is stored in a management server when the solid state disk system is set to a management mode, wherein When the solid state disk system is not set to a management mode, the decoding key is stored in a universal serial bus device beacon. A computer readable recording medium containing program instructions as described in claim 49, wherein the encoding engine can be disabled. 33 S
TW101112763A 2007-05-09 2008-05-02 Secure and scalable solid state disk system TWI493343B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/746,582 US8499168B2 (en) 2007-05-09 2007-05-09 Secure and scalable solid state disk system
US11/746,556 US8527781B2 (en) 2007-05-09 2007-05-09 Secure and scalable solid state disk system
US11/746,576 US8010768B2 (en) 2007-05-09 2007-05-09 Secure and scalable solid state disk system

Publications (2)

Publication Number Publication Date
TW201243599A true TW201243599A (en) 2012-11-01
TWI493343B TWI493343B (en) 2015-07-21

Family

ID=40002569

Family Applications (2)

Application Number Title Priority Date Filing Date
TW97116226A TWI373713B (en) 2007-05-09 2008-05-02 Secure and scalable solid state disk system
TW101112763A TWI493343B (en) 2007-05-09 2008-05-02 Secure and scalable solid state disk system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
TW97116226A TWI373713B (en) 2007-05-09 2008-05-02 Secure and scalable solid state disk system

Country Status (3)

Country Link
CN (4) CN103235922B (en)
TW (2) TWI373713B (en)
WO (1) WO2008140868A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8607070B2 (en) 2006-12-20 2013-12-10 Kingston Technology Corporation Secure storage system and method of use
US8499168B2 (en) 2007-05-09 2013-07-30 Kingston Technology Corporation Secure and scalable solid state disk system
US8010768B2 (en) 2007-05-09 2011-08-30 Kingston Technology Corporation Secure and scalable solid state disk system
US8595397B2 (en) 2009-06-09 2013-11-26 Netapp, Inc Storage array assist architecture
TWI494766B (en) * 2009-07-07 2015-08-01 Apacer Technology Inc Storage assembly for enhancing operation speed and the peocedure thereof
CN106650511A (en) * 2016-02-01 2017-05-10 天固科技(杭州)有限公司 Scheme for improving encryption performance of encryption system
CN105892955B (en) * 2016-04-29 2019-10-18 华为技术有限公司 A kind of method and apparatus managing storage system
TWI661307B (en) * 2017-12-06 2019-06-01 慧榮科技股份有限公司 Data storage device, host system connected with data storage device, and method for writing data storage device
TWI792073B (en) 2017-12-28 2023-02-11 慧榮科技股份有限公司 Flash memory controller, sd card device, method used in flash memory controller, and host for accessing sd card device
TWI751753B (en) * 2020-10-22 2022-01-01 十銓科技股份有限公司 Digital label conversion interface method

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6148387A (en) * 1997-10-09 2000-11-14 Phoenix Technologies, Ltd. System and method for securely utilizing basic input and output system (BIOS) services
JP2001051858A (en) * 1999-06-18 2001-02-23 Fiinikkusu Technologies Ltd System and method for safely using basic input/output system(bios) service
US7299316B2 (en) * 2004-02-26 2007-11-20 Super Talent Electronics, Inc. Memory flash card reader employing an indexing scheme
EP1130516A1 (en) * 2000-03-01 2001-09-05 Hewlett-Packard Company, A Delaware Corporation Address mapping in solid state storage device
US6907479B2 (en) * 2001-07-18 2005-06-14 Integrated Device Technology, Inc. Integrated circuit FIFO memory devices that are divisible into independent FIFO queues, and systems and methods for controlling same
US7664903B2 (en) * 2002-02-25 2010-02-16 Solid Access Technologies LLC Control unit with PCI and SCSI buses and computing system with electronic semiconductor disk
US7284126B2 (en) * 2002-11-12 2007-10-16 Agilent Technologies, Inc. Device authentication using pre-configured security keys
JP2004201038A (en) * 2002-12-18 2004-07-15 Internatl Business Mach Corp <Ibm> Data storage device, information processing apparatus mounted therewith, and data processing method and program thereof
US20050195975A1 (en) * 2003-01-21 2005-09-08 Kevin Kawakita Digital media distribution cryptography using media ticket smart cards
US7762470B2 (en) * 2003-11-17 2010-07-27 Dpd Patent Trust Ltd. RFID token with multiple interface controller
CN1735006B (en) * 2004-08-03 2012-05-02 伊诺瓦科技股份有限公司 Real-time data encryption/decryption system and method for IDE/ATA data transmission
US20060053282A1 (en) * 2004-09-03 2006-03-09 Mccown Steven H Canister-based storage system security

Also Published As

Publication number Publication date
CN103226679A (en) 2013-07-31
CN103226679B (en) 2016-06-08
TWI373713B (en) 2012-10-01
CN103226678A (en) 2013-07-31
CN103226678B (en) 2016-12-28
WO2008140868A1 (en) 2008-11-20
CN101681253A (en) 2010-03-24
TWI493343B (en) 2015-07-21
CN101681253B (en) 2013-10-16
CN103235922A (en) 2013-08-07
CN103235922B (en) 2017-08-25
TW200903260A (en) 2009-01-16

Similar Documents

Publication Publication Date Title
TWI493343B (en) Secure and scalable solid state disk system
US8010768B2 (en) Secure and scalable solid state disk system
US8499168B2 (en) Secure and scalable solid state disk system
US10089134B2 (en) Controlling access to namespaces of a storage device
US9037778B2 (en) Method and apparatus to interface semiconductor storage device and host to provide performance throttling of semiconductor storage device
TWI390520B (en) Adaptive storage system including hard disk drive with flash interface
US8862807B2 (en) Semiconductor storage device and method of throttling performance of the same
TWI426444B (en) Adaptive storage system including hard disk drive with flash interface
US20150019801A1 (en) Semiconductor storage device and method of throttling performance of the same
US20130151761A1 (en) Data storage device storing partitioned file between different storage mediums and data management method
TW201243605A (en) Selective enablement of operating modes or features via host transfer rate detection
US9990136B2 (en) Methods and devices for booting a network attached storage with two logical units
TW201506619A (en) System and method for high performance and low cost flash translation layer
US9164703B2 (en) Solid state drive interface controller and method selectively activating and deactivating interfaces and allocating storage capacity to the interfaces
TW201508463A (en) Device power control
KR20150074550A (en) Data storage device and data processing system including the same
WO2012119375A1 (en) Method and device for processing raid configuration information, and raid controller
TWI498738B (en) File protecting method and system, and memory controller and memory storage apparatus thereof
US20150234595A1 (en) Storage device
US8527781B2 (en) Secure and scalable solid state disk system
Huffman et al. The nonvolatile memory transformation of client storage
US20130173855A1 (en) Method of operating storage device including volatile memory and nonvolatile memory
JP2011022752A (en) Storage controller and control method
CN201348879Y (en) USB bus-powered mobile hard disk
TWI410802B (en) Storage system for enhancing operation speed and the peocedure thereof