1331288 _ 99年7月30日修正替換頁 九、發明說明: ' 【發明所屬之技術領域】 . 本發明是關於一内容卡,尤其指記憶卡及其安全方法。 【先前技術】 在過去的數十年間,電腦儲存媒體科技快速發展。已 出現一些新應用在電腦儲存裝置,且其中很多包含對儲存 於電腦儲存裝置中資訊安全的需求。 請參考圖1,說明先前技術一項安全快閃記憶裝置。 如圖1所呈現的,安全快閃記憶裝置10使用連接埠14連結到 電腦40。安全快閃記憶裝置10進一步包括快閃記憶體20和 微控制器22,其中快閃記憶體20可以分割和用來儲存資 料。微控制器22包含了可為隨機存取記憶體(RAM)或唯讀 記憶體(ROM)的小型記憶體24。透過接受電腦40的命令和 要求,並控制及調整電腦40對快閃記憶體20的存取,來控 制快閃記憶裝置10。更明確地說,微控制器22解譯由電腦 -40所發出的快閃記憶體存取要求,且控制快閃記憶體20。 . 安全程式28儲存於快閃記憶體20,其中安全程式28 使用少量空間,快閃記憶體20留下的空間做為大容量儲存 區30。安全程式28配合儲存在控制器22的記憶體24之預設 通行碼32,指揮微控制器22允許或防止資料流通在連接到 5 1331288 99年7月30日修正替換頁 連接埠14的快閃記憶20跟電腦40之間。預設通行碼32可被 加密,進一步防止對快閃記憶體20作未經授權的存取動 作。安全程式28也可包含允許預設通行碼32被使用者修改 的碼。此外,安全程式28可控制電腦40的圖形使用者界面 (GUI),以提供使用者友善介面。當使用者想用安全快閃記 憶裝置10時,使用者僅僅把連接埠14插入到電腦40的對應 連結埠即可。在實際的應用上,電腦40藉執行許多程序, 去確保適當連結到安全快閃記憶裝置10 ;然而,技術在相 關領域中已廣為人知。先前技術提供一個安全程式,控制 微控制器如何存取快閃記憶體。當使用者想從安全快閃記 憶裝置10中讀取資料或寫入資料時,使用者只需透過電腦 40要求讀取或寫入存取快閃記憶體20。微控制器22偵測到 要求,且微控制器22指示電腦40去執行安全程式28。安全 程式28接著主動提示使用者輸入通行碼。由使用者輸入的 通行碼,比對儲存於微控制器22的記憶體24中之預設通行 碼32。如果輸入的通行碼符合預設通行碼32,則微控制器 22允許電腦40存取快閃記憶體20。使用者現在可從快閃記 憶體20的大容量儲存區30中,進行讀取或寫入資訊。如果 輸入的通行碼不符合預設通行碼32,則微控制器22阻止電 腦40存取快閃記憶體20。使用者不能存取快閃記憶體20的 大量存取區30。根據先前技術,安全程式28比較輸入的通 行碼和預設通行碼32。微控制器22依照輸入的通行碼,接 6 1331288 99年7月30日修正替換頁 著允許或限制存取快閃記憶體2〇的大容量^ 執行安全程式28或者是進行另一個相似的行動,使用^可 要求對快閃記憶體20的讀取或寫入存取。然而,安全程式 28^法持續過濾電腦4〇的作業系統。在快閃記憶體扣的 大容量儲存區30被存取後’電腦4〇的作業系統可不需透過 進一步限制就作業快閃記憶體2〇。在這種情況下,因為先 前技術的預設通行碼32是允許讓使用者修改,故預設通行 碼32或快閃記憶體2〇的内容可取得或修改。明顯地,記憶 卡的安全系統可根據先前技術被輕易地清除。 因此’實際上,先前技術可能無法提供具有完整安全 的記憶卡。由此’需要提供—張有效安全方法的記憶卡, 以避免個人機密資料外茂的風險。不同於傳統的記憶加密 裝置(例如:⑶⑽等人之美國中請案號謂64,4 Μ的記憶 裝置本發明不允許隨意讀取或寫入作#,和修正先前技 術的缺點並解決上述的問題。 【發明内容】 有繁於習知技藝受限於上述之問題。本發明之目的為 提供一記憶卡,使詩具有安裝作㈣㈣㈣,其中當 記憶卡插人到電腦時,具有解密應料統和作業系統限制 和式的内容保護程式是採用來允許或防止資料在記憶卡和 電腦之間流通4本發明能有效避免未經㈣或無心的資 7 1331288 99年7月30日修正替換頁 料内容存取。 依照本發明之-觀點,記憶卡包含一用以儲存一金 鑰碼和以金鑰碼加密内容的保護記憶區,及一用以攜帶解 密應用程式之⑽㈣料賴純,其巾解密應^程式 用以解密加密内容及用作業系統限制程式讓作業系統預設 功能失效。-旦内容保護程式的解密應用程式和作業系統 限制程式下載到作業系統,在解密助程式從保護記憶區 取知金输碼後,作業系統得以存取加密内容。此外,作業 系統是由作業系統限制程式所控制。 記憶卡最好包括-USB隨身碟、—安全數位記憶 (secureDigital,SD)卡、一多媒體儲存卡 MMC) ’及一快閃隨身碟。 保護記憶區最好進一#包含一用Μ儲存金錄碼的隱 藏區。 無疑地,加密内容按照先進加密標準(AES)、資料加 密標準(DES)、及三重資料加密標準(Triple DES)來加密。 作業系統限制程式最好可讓鍵盤上的「列印螢幕」 鍵失效,或者是讓作業系統的「複製」、「貼上」、「儲存」、 「另存新檔」的應用程式介面(八!>1)失效。 本發明的另一個目標是提供一内容卡及其安全方 法’其中當記憶卡插入到電腦時,#有解密應用程式和作 業系統限制程式的内容保護程式引人記憶卡並執行,允許 8 丄 W1288 99年7月30日修正替換頁 或防止資料在記憶卡和電腦之間流通,且^一_ 内谷和達到^供s己憶卡完整安全的目標,及可以修正先 月1J技術的缺點和解決上述問題。 依照本發明的另一觀點,記憶卡安全方法的步驟包 含.a)將存有金鑰碼所加密内容的記憶卡插入到安裝有 作業系統的電腦;b)驗證該記憶卡的專有認證碼是否屬 實,c)如果認證碼屬實,則從記憶卡下載内容保護程式; d)執行内容保護程式;e)用該金鑰碼將加密内容解密; 〇使作業系統的預設功能失效;及g)卸除内容保護程 式。 内容保護程式最好包括一解密應用程式用以進行步 驟 e)。 v 内各保護程式最好包括一作業系統限制程式用以進 行步驟f)。 記憶卡最好分別包括,一用以儲存金鑰碼之隱藏區 和一用以儲存加密内容之公開區的保護記憶區。 内容最好依照先進加密標準(AES)、資料加密標準 (DES)、和三重内容加密標準(1>屮1卜〇劭)來加密。 記憶卡最好包括一 USB隨身碟、一 SD卡、一 MMC, 及一快閃隨身碟。 無疑地,内容保護程式和金鑰碼可透過以下步驟預 载到記憶卡.al)把記憶卡插入到生產電腦;&2)在生產電 9 1331288 99年7月30日修正替換頁 腦上執行加谘應用程式以產生金鑰碼;a3 - 内容以取得加密内容;a4)把金鑰碼和加密内容儲存到記憶 卡’ a5)把内谷保§蒦程式存擋到記憶卡。 【實施方式】 體現本發明特徵與優點的一些實施例將在後段的說 明中詳細敘述。應理解的是本發明能夠在不同的態樣上具 有各種的變化,其皆不脫離本發明的範圍,且其中的說明 及圖式在本質上當作說明之用,而非用以限制本發明。 請參考圖2,顯示連接到安裝有作業系統的電腦的本 發明的記憶卡的安全架構。如圖二所示,記憶卡丨含有一 記憶模組51和-控制器52,用以在安裝有作業系統的主 機53和記憶卡1之間的通訊。記憶模組51包含一保護記 憶區512和一儲存區515。保護記憶區512進一步分別含 有,用以Μ存加密内容和錢碼的—公開區513和一隱藏 區514。儲存1515存有—内容保護程式(圖片中沒有標 示)’該程式包含-解密應用程式。在記憶卡i連結到主4 53後’控制器52立即向記憶模組51發出一要求,把儲巧 區515 _容㈣程式下載到作#系統,釋放解密應用系 式並在在作業系統上執行。因此,在解密應用程式被下^ 並在作業系統上執行後,作㈣統53能存取記憶模組$ 和輸出加密内容513到例如MS⑽⑶等等的各種閱讀華 外千/ λ州日修j 式’並且從保護記憶區512的隱藏區5i4去取得金錄碼 此外’儲存於記憶卡的一内容保護程式,在作業系統 限制程式下載到作業系統後,可進一步包含一使作業系統 ^又功%失效的作業㈣限制程式。實際上,記憶卡可以 是:腦隨身碟、—SD卡、—mmc,及—快閃隨身碟。 換口之本發明的安全系統可以應用成一 u犯隨身碟、一 卡 MMC及一快閃隨身碟。保護記憶區512可儲 存金输碼於隱藏區514,用以排除金输碼被找出、被侵入 或,破解的機會,亦儲存保護記憶區512的公開區⑴的 加密内合。加密内容可以依照先進加密標準(AM)、資料加 純準⑽s)、三重内容加密標準(Tripie DEs)來加密。另 一方面,、在解密應用程式下载到作業线後,當作業系統 限程式限制作業系統的部份功能時,解密應用程式解密 加在内今,猎此在内容保護程式的保護下讀出加密内容。 作業系統限制程式可讓鍵盤上的「列印螢幕」鍵失效,或 者是讓作業系統的「複製」、「貼上」、「儲存」、「另存新檔」 用程式"面(API)失效。根據本發明,在保護記憶區犯 的公開區513之加密内容’可以經由不同的閱讀程式解 密、輸出、及㈣’例如:MS〇fflee、pDF、HTML^ 之類;然而’想進—步做複製和修改的操作是禁止的。 請參相3,說明本發明記憶卡安全方法的較佳實施 個步驟疋把存有用金錄碼加密内容的記憶卡^插 1331288 99年7月3〇 入到安裝有作業系統的主機電腦53,如同圖 如同圖3的步驟S62,一旦記憶卡!連結到主機電腦53,。 乜啤:)j 如果記憶卡1的專有認證碼屬實,則驗證手續開始確認。 如同圖3的步驟S63,如果認證碼證明屬實且通過驗證 續,則在記憶模組51的儲存區515之内容保護程式,將釋 放到主機電腦53的作業系統;否則,步驟如將進行到圖 3的步驟S64。也就是說,控制器52將不被告知向記憶模 組51的儲存區515發出要求去釋放内容保護程式到作業系 統。然而,驗證碼的認證手續是有選擇性的。目3的步驟 阳在如此的情況下,直接進行到步驟加。所卩,金錄碼 繼續存在保護記憶區512的隱藏區514,且加密 是加密的狀態。如同圖3的步驟S65,當作業系統自動;貞 測到内容保護程式成功地下載和執行後,就會啟動解密應 用,式和作㈣統_程式。接著,啟動的解密應用程式 取得在保護記憶區512的隱藏區514之金输碼,且用金鑰 碼去解密加密内容’如同圖3的步驟_,在圖3的步驟 ⑹讀出解密内容。然而,在步驟S67之後,作業系統限 :程式在圖3的步驟S68使作業系統的預設功能失效,使 得如果合法使用者之外的人進一步要複製或篡改内容,則 因為許多應用程式介面⑽)功能失效,所以解密内容不能 複製或進一步從印表機等等之類輸出。在圖3最後步驟 «内谷保遵程式卸除時,作業系統重新開始它的預設 12 1331288 99年7月30曰修正替換頁 功能’加密内容依然隱密地儲存於保護記-- 同樣地,記憶卡可以是一 USB隨身碟、一 SD卡、 一 MMC、及一快閃隨身碟。此外,作業系統限制程式可讓 鍵盤上的「列印螢幕」鍵失效,或者是讓作業系統的「複 氯」貼上」、「儲存」、「另存新檔」的應用程式介面(API) 失效,如同圖3的步驟S67。加密内容是根據先進加密標 準(AES)、資料加密標準(DES)、和三重内容加密標準 (Triple-DES)來加密。 更具體而言,内容保護程式和金鑰碼可預載到記憶卡 上。請參考圖4。首先,在步驟87卜把記憶卡插入到生產 電腦之後,加也、應用程式在生產電腦自動執行並產生金 输碼,如同步驟S72和S73。金鑰碼的角色是用以對資料 加密和防止對私人内容作未被授權的存取。接著步驟 ^3,内容藉由新產生的金論碍加密,以在步驟S74獲取加 密内容。除此之外,記憶模組的保護記憶區分成數個區, 金錄碼和加密内容分別儲存於隱藏區和公開區,如同步驟 S75和S76。接下來,内容保護程式在步驟奶存檔到記憶 卡的儲存區。整個卸除作業在步驟S71到奶的過程後做 結束。 結論是,本發日歧供—記时及其安全方法,藉由確 保儲存於記憶财暫存資料㈣,⑽密助程式接合内 谷保護程式手段取得的錢碼㈣,及作#系統限制程式 13 1331288 _ 99年7月30日修正替換頁 使作業系統的預設功能之應用程式介面(API)無效,來明顯 增強私人數位内容的整體安全。有別於先前技術允許隨性 的讀取或其他進一步的作業,本發明藉由禁止惡意的複製 和存於記憶卡中私人内容的輸出,消除潛在的安全漏洞, 藉此達到提供全面性安全記憶卡的目標,可以改善先前技 術的缺點及解決上述問題。 縱使本發明已由上述之實施例詳細敘述而可由熟悉 本技藝之人士任施匠思而為諸般修飾,然皆不脫如附申請 專利範圍所欲保護者。 13312881331288 _July 30, revised amendment page IX. Description of the invention: 'Technical field to which the invention pertains. The present invention relates to a content card, and more particularly to a memory card and a security method thereof. [Prior Art] In the past few decades, computer storage media technology has developed rapidly. Some new applications have emerged in computer storage devices, many of which contain the need for information security stored in computer storage devices. Please refer to FIG. 1 to illustrate a prior art secure flash memory device. As shown in FIG. 1, secure flash memory device 10 is coupled to computer 40 using port 14. The secure flash memory device 10 further includes a flash memory 20 and a microcontroller 22, wherein the flash memory 20 can be segmented and used to store data. Microcontroller 22 includes a small memory 24 that can be either random access memory (RAM) or read only memory (ROM). The flash memory device 10 is controlled by accepting commands and requests from the computer 40 and controlling and adjusting the access of the computer 40 to the flash memory 20. More specifically, the microcontroller 22 interprets the flash memory access requirements issued by the computer -40 and controls the flash memory 20. The security program 28 is stored in the flash memory 20, wherein the security program 28 uses a small amount of space, and the space left by the flash memory 20 is used as the large-capacity storage area 30. The security program 28 cooperates with the preset passcode 32 stored in the memory 24 of the controller 22, and directs the microcontroller 22 to allow or prevent the circulation of data during the connection to the 5 1331288, July 30, 1999 correction of the replacement page port 埠 14 flashing Memory 20 is between the computer and the computer 40. The preset passcode 32 can be encrypted to further prevent unauthorized access to the flash memory 20. The security program 28 may also include a code that allows the preset passcode 32 to be modified by the user. In addition, the security program 28 can control the graphical user interface (GUI) of the computer 40 to provide a user friendly interface. When the user wants to use the secure flash memory device 10, the user simply inserts the port 14 into the corresponding port of the computer 40. In practical applications, computer 40 performs a number of procedures to ensure proper attachment to secure flash memory device 10; however, technology is well known in the related art. The prior art provides a security program that controls how the microcontroller accesses the flash memory. When the user wants to read data or write data from the secure flash memory device 10, the user only needs to read or write to access the flash memory 20 through the computer 40. The microcontroller 22 detects the request and the microcontroller 22 instructs the computer 40 to execute the security program 28. The security program 28 then actively prompts the user to enter a passcode. The pass code entered by the user compares the preset pass code 32 stored in the memory 24 of the microcontroller 22. If the entered passcode conforms to the preset passcode 32, the microcontroller 22 allows the computer 40 to access the flash memory 20. The user can now read or write information from the mass storage area 30 of the flash memory 20. If the entered passcode does not conform to the preset passcode 32, the microcontroller 22 prevents the computer 40 from accessing the flash memory 20. The user cannot access the large number of access areas 30 of the flash memory 20. According to the prior art, the security program 28 compares the entered passcode with the preset passcode 32. The microcontroller 22, according to the input passcode, is connected to the 6 1331288 July 30, 99 revision replacement page to allow or restrict access to the flash memory 2 大 large capacity ^ to execute the security program 28 or to perform another similar action The use of ^ can require a read or write access to the flash memory 20. However, the security program continues to filter the computer's operating system. After the large-capacity storage area 30 of the flash memory button is accessed, the operating system of the computer can operate the flash memory 2 without further restrictions. In this case, since the preset pass code 32 of the prior art allows the user to modify, the content of the preset passcode 32 or the flash memory 2 can be obtained or modified. Obviously, the security system of the memory card can be easily removed according to the prior art. Therefore, in fact, the prior art may not be able to provide a memory card with complete security. Therefore, it is necessary to provide a memory card with an effective security method to avoid the risk of personal confidential information. Different from the conventional memory encryption device (for example, (3) (10), et al., in the U.S. Patent Application Serial No. 64, 4 Μ memory device, the present invention does not allow arbitrary reading or writing as #, and corrects the disadvantages of the prior art and solves the above. [Explanation] The prior art is limited by the above problems. The object of the present invention is to provide a memory card, which is installed (4) (4) (4), wherein when the memory card is inserted into the computer, the decryption is required. The system and the content protection program of the operating system are used to allow or prevent the circulation of data between the memory card and the computer. 4 The invention can effectively avoid the replacement of the page without the (4) or unintentional 7 1331288 July 30, 1999. According to the present invention, the memory card includes a protected memory area for storing a key code and encrypting the content with the key code, and a (10) (4) material for carrying the decryption application. The towel decryption program should be used to decrypt the encrypted content and use the operating system limit program to disable the operating system default function. - The content protection program decryption application and operating system restrictions Download to the operating system, after the decryption helper retrieves the encrypted code from the protected memory area, the operating system can access the encrypted content. In addition, the operating system is controlled by the operating system limit program. The memory card preferably includes -USB portable Disc, - Secure Digital (SD) card, a multimedia memory card MMC) 'and a flash drive. The protected memory area preferably contains a hidden area for storing the gold recording code. Undoubtedly, encrypted content is encrypted according to Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Triple Data Encryption Standard (Triple DES). It is best to disable the "Print Screen" button on the keyboard, or to copy the application system's "Copy", "Paste", "Save", "Save New File" application interface (eight! >1) invalid. Another object of the present invention is to provide a content card and a security method thereof. [When a memory card is inserted into a computer, the content protection program having the decryption application and the operating system restriction program introduces the memory card and executes, allowing 8 丄W1288 On July 30, 1999, the replacement page was corrected or the data was prevented from being circulated between the memory card and the computer, and the goal of ^ _ 内谷 and reaching the complete security of the card was corrected, and the shortcomings and solutions of the first month 1J technology could be corrected. The above question. According to another aspect of the present invention, the method of the memory card security method comprises: a) inserting a memory card containing the content encrypted by the key code into a computer on which the operating system is installed; b) verifying the unique authentication code of the memory card Whether it is true, c) if the authentication code is true, download the content protection program from the memory card; d) execute the content protection program; e) decrypt the encrypted content with the key code; disable the default function of the operating system; ) Dismount the content protection program. The content protection program preferably includes a decryption application for performing step e). Preferably, each protection program in v includes an operating system restriction program for performing step f). Preferably, the memory card includes a hidden area for storing the key code and a protected memory area for storing the public area of the encrypted content. The content is preferably encrypted in accordance with Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Triple Content Encryption Standard (1>1). The memory card preferably includes a USB flash drive, an SD card, an MMC, and a flash drive. Undoubtedly, the content protection program and key code can be preloaded to the memory card through the following steps. A) Insert the memory card into the production computer; & 2) On the production page 9 1331288, July 30, 1999 Execute the appending application to generate the key code; a3 - content to obtain the encrypted content; a4) store the key code and the encrypted content to the memory card 'a5) to store the inner file to the memory card. [Embodiment] Some embodiments embodying the features and advantages of the present invention will be described in detail in the following description. It is to be understood that the invention is not limited by the scope of the invention. Referring to Figure 2, the security architecture of the memory card of the present invention connected to a computer on which the operating system is installed is shown. As shown in Fig. 2, the memory card 丨 includes a memory module 51 and a controller 52 for communication between the host computer 53 on which the operating system is installed and the memory card 1. The memory module 51 includes a protected memory area 512 and a storage area 515. The protected memory area 512 further includes a public area 513 and a hidden area 514 for storing encrypted content and money code, respectively. The storage 1515 contains the content protection program (not shown in the picture). The program contains the - decryption application. After the memory card i is connected to the main 4 53 'the controller 52 immediately sends a request to the memory module 51 to download the storage area 515 _ _ (four) program to the system #, release the decryption application system and on the operating system carried out. Therefore, after the decryption application is executed and executed on the operating system, the system can access the memory module $ and output the encrypted content 513 to various readings such as MS (10) (3), etc. And 'from the hidden area 5i4 of the protection memory area 512 to obtain the gold record code. In addition, a content protection program stored in the memory card, after the operating system restriction program is downloaded to the operating system, may further include an operating system % invalid job (4) limit program. In fact, the memory card can be: brain flash drive, - SD card, - mmc, and - flash flash drive. The security system of the present invention can be applied as a USB flash drive, a card MMC and a flash flash drive. The protected memory area 512 can store the gold code in the hidden area 514 to exclude the opportunity for the gold code to be found, invaded or cracked, and also to store the encrypted area of the public area (1) of the protected memory area 512. Encrypted content can be encrypted in accordance with Advanced Encryption Standard (AM), Data Plus (10) s, and Triple Content Encryption (Tripie DEs). On the other hand, after the decryption application is downloaded to the job line, when the operating system limit program restricts some functions of the operating system, the decryption application is decrypted and added, and the encryption is read under the protection of the content protection program. content. The operating system limit program disables the "Print Screen" button on the keyboard, or disables the "Copy", "Paste", "Save", "Save New File" applications of the operating system. . According to the present invention, the encrypted content 'in the public area 513 of the protected memory area can be decrypted, outputted, and (4) via different reading programs, for example: MS〇fflee, pDF, HTML^, etc.; Copying and modifying operations are prohibited. Please refer to step 3 to illustrate the preferred implementation steps of the memory card security method of the present invention. The memory card inserted into the encrypted content of the gold recording code is inserted into the host computer 53 on which the operating system is installed, on July 3, 1999. As the figure is like step S62 of Fig. 3, once the memory card! Link to the host computer 53,.乜 beer :) j If the exclusive authentication code of the memory card 1 is true, the verification procedure begins to be confirmed. As with step S63 of FIG. 3, if the authentication code proves to be true and continues through verification, the content protection program in the storage area 515 of the memory module 51 will be released to the operating system of the host computer 53; otherwise, the steps will proceed to the figure. Step S64 of 3. That is, the controller 52 will not be instructed to issue a request to the storage area 515 of the memory module 51 to release the content protection program to the operating system. However, the verification procedure for the verification code is optional. Step 3 of the head In such a case, proceed directly to the step plus. Therefore, the gold recording code continues to exist in the hidden area 514 of the protected memory area 512, and the encryption is encrypted. As in step S65 of Fig. 3, when the operating system automatically; after detecting that the content protection program is successfully downloaded and executed, the decryption application, the formula and the program are started. Next, the activated decryption application obtains the gold code in the hidden area 514 of the protected memory area 512, and decrypts the encrypted content with the key code. As in the step of Fig. 3, the decrypted content is read in step (6) of Fig. 3. However, after step S67, the operating system is limited: the program invalidates the preset function of the operating system in step S68 of FIG. 3, so that if the person other than the legitimate user further copies or tampers the content, because of many application interfaces (10) The function is invalid, so the decrypted content cannot be copied or further output from a printer or the like. In the final step of Figure 3, when the internal storage system is removed, the operating system restarts its preset 12 1331288, July 30, 1999. Corrected the replacement page function. The encrypted content is still stored in the protection record invisibly--. The memory card can be a USB flash drive, an SD card, an MMC, and a flash drive. In addition, the operating system restriction program can disable the "Print Screen" button on the keyboard, or invalidate the application interface (API) of the "Re-chlorination", "Save", and "Save New" files of the operating system. , as in step S67 of FIG. Encrypted content is encrypted according to Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Triple Content Encryption Standard (Triple-DES). More specifically, the content protection program and key code can be preloaded on the memory card. Please refer to Figure 4. First, after the memory card is inserted into the production computer in step 87, the application is automatically executed by the production computer and generates a gold code, as in steps S72 and S73. The role of the key code is to encrypt the data and prevent unauthorized access to private content. Next, in step ^3, the content is encrypted by the newly generated gold, to obtain the encrypted content in step S74. In addition, the memory of the memory module is divided into several areas, and the gold recording code and the encrypted content are stored in the hidden area and the public area, respectively, as in steps S75 and S76. Next, the content protection program archives the milk to the storage area of the memory card. The entire unloading operation ends after the process from step S71 to the milk. The conclusion is that this day's confession-time and its security method, by ensuring storage in the memory temporary data (4), (10) the helper program to join the valley protection program to obtain the money code (4), and # system limit program 13 1331288 _ July 30, 1999 Correction of replacement pages invalidates the application interface (API) of the operating system's default functions to significantly enhance the overall security of private digital content. Different from the prior art allowing casual reading or other further work, the present invention provides a comprehensive security memory by prohibiting malicious copying and output of private content stored in the memory card, thereby eliminating potential security breaches. The goal of the card can improve the shortcomings of the prior art and solve the above problems. The present invention has been described in detail by the above-described embodiments, and may be modified by those skilled in the art without departing from the scope of the appended claims. 1331288
【圖式簡單說明】 在上稍提到本發明的目標和優點,細顧接下來詳 附帶圖片後,將變得比在相關領域中的常見技 圖1說明先刚技術的一安全快閃記憶裝置; 圖2說明本發明記憶卡的較佳實施例,用在具有安裝 作業系統的電腦; 圖3說明本發明記憶卡的安全方法的較佳實施例步 驟;及 圖4說明本發明預載内容保護程式和金鑰碼到記憶 卡的步驟。 主要元件符號說明】 1 記憶卡 51 記憶模組 10 安全快閃記憶裝置 52 控制器 14 連接埠 53 主機 20 快閃記憶體 512 保護記憶區 22 微控制器 513 公開區 24 記憶體 514 隱藏區 28 安全程式 515 儲存區 30 40 大容量儲存區 電腦 15[Simple Description of the Drawings] The objectives and advantages of the present invention are mentioned a little above, and after careful consideration of the accompanying pictures, it will become a safe flash memory of the prior art than the common technique 1 in the related art. Figure 2 illustrates a preferred embodiment of the memory card of the present invention for use with a computer having an operating system; Figure 3 illustrates a preferred embodiment of the security method of the memory card of the present invention; and Figure 4 illustrates the preloaded content of the present invention. The steps to protect the program and key code to the memory card. Main component symbol description] 1 Memory card 51 Memory module 10 Secure flash memory device 52 Controller 14 Connection 埠 53 Host 20 Flash memory 512 Protect memory area 22 Microcontroller 513 Public area 24 Memory 514 Hidden area 28 Security Program 515 storage area 30 40 large capacity storage area computer 15