M365496 五、新型說明: 【新型所屬之技術領域】 本創作係關於一種記憶體儲存 識功能之記憶體儲存裝置。 -直’尤指一種具辨 【先前技術】 為了提高财料触,逐漸 置,如記憶卡、USB隨身碟,以太庙出了柘式儲存裝 請參考第-圖,該圖係為習知之記憶=時隨地儲存資料。 系統架構示意圖。如第-圖所示,;c實施例之 單元η以及一記憶單元13。由tH1/具有一控制 Memory)具有高儲存密度、低耗特性有m ;制單元垂11,於記憶單元13,用以接收主機端(:中 未不)下達之扣π來將資料存取於記憶單元13中。 快閃記憶體有許多_,且其價格亦有大幅度 異。常見之快閃記憶體包括採用多級單元M365496 V. New Description: [New Technology Field] This creation is about a memory storage device for memory storage. - Straight 'especially a kind of discerning [previous technology] In order to improve the material touch, gradually set, such as memory card, USB flash drive, Ethereum out of the 储存 storage, please refer to the figure - the figure is the memory of the familiar = Store data when and where you need it. Schematic diagram of system architecture. As shown in the first figure, the cell η of the embodiment c and a memory cell 13 are shown. The data has a high storage density and a low-loss characteristic by tH1/having a memory; the cell is 11; and the memory unit 13 is used to receive the button π issued by the host terminal (: not in the middle) to access the data. In the memory unit 13. Flash memory has a lot of _, and its price is also very different. Common flash memory includes multi-level cells
Wen,MLC)製成之高密度記憶體(= density memory)或單級單元型記憶體(singIe_】eve]_ceii SLC),製成之低密度記憶體(LQwdensityme贿y)。相較 於低密度記憶體’高密度記憶體單位面積的資料儲存容^ 可成倍數增加,因而具有大幅提高儲存容量與降低成本的 優勢、然其讀寫㈣、執行燒錄與抹除(Erase)動作所需 的時間卻較長;此外,多級單元製程技術也致使高密度= 憶體所能承受的抹寫次數(Erase cycle)較少,如此便連帶影 3 M365496 響了採用高密度記憶體的壯 壽命。為了避免不肖業者的資料存取速度與使用 成原廠記憶卡1中的奸Γ貝差或價格低的記憶體替換 品來破壞原廠記憶卡量製造、兜售仿冒 防偽之機制。 豕观t性,業者紛紛提出許多 的記憶單元13内=^方口2多係於原廠記憶卡1中 軟社杳欠有產°0序唬的辨識資料,經由特殊 =軟有心人士仍很容 將辨識資料儲存於記憶單元之辨識貧料三或是, 到該特定之隸讀_ 1 ^^之健’並设計硬體 偽,但有心人士單f ?真 同的辨識資料,仍然能大量複製盜用 寫入相 性㈣完全保密 APS,r〇c ppn 引獨所&供的貧料内容保護技術如 、、人士心 腹、CP腹及軟體加料料都遭到有 ,^繼$細_卜麵記憶卡1 例作’若要使用其他特殊功能, 體力能’則必須於主機端安裝適 或軸程式,以提供相對應之特殊功能。缺而, 在主機上安裝軟體和驅_式時,便存在相此 進而無法達到跨平台之訴求。且,若每次欲辨==, 時,測試人員皆須事先安裝用以辨識之 ^思卡 體,將拉長測試時間並增加測試程序之不便=式或應用軟 M365496 f新型内容】 因此,本創作之目的係在於提供―種圮 其利用存取一存放辨識資料二來以 裝置進仃控制,以改善習知技術之問題。 者存 本__示-種具賴魏之㈣贿存 =於由-主機來辨識該記憶體儲存 一r單元以及-控制單元。記憶 =複數個貝體區塊組成,其—之實體區塊:己 能f區塊;控制單元係轉接於主機心 早兀之間,用以接收主機傳來之一控制指令·苴1 元判斷控制指令所欲存取之位置係為特殊功能實:區】 、會依據控制指令來顯示或改變記憶單元之狀態。* 位址藉技術讀,本創作係將辨識f料事先儲存在特定 1直接存取該狀偏存f 、 :二在 功效二有關 非用來對本創圖示僅提供參考與說明用,並 【實施方式】 前,儲二:置,係於儲存裝置出廠 事先錯存於㈣體之特定位址,藉由控制 M365496 器直接對該特定位址下 :或控制錯存裝置的使用狀態免二,得辨識資 =對物置執行特殊之額外功能,進==: -棺ΐ創在於在記憶體错存裝置中產生 -狀態===== 件’記憶體儲存裝置中當;:::他構 不應以本實施例揭露者為限。 因此 首先’請參閱第二圖,兮圖伤氣士么,〜 體儲存η夕-目μ - 謂為本創作所揭示之記憶 〃體貫施例之系統架構示意圖。如第-圖 存裝置21(以下簡稱儲存裝置)= 、Η系、,先2中’配合執行寫入與讀取資料。數 2中’儲存裝置21係可插接於主機23 ’接受主機23所^ Ϊ 二:f說,主機23係為-計算機系統,其 H ㈣、個人電腦(PC)、筆記型電腦 (Deskt〇P)、平板電腦(T_ PQ、伺服器或個人數位助理写 (PDA)之其—;_针置21縣計算機緒之一周邊襄 置,其可為記憶卡、隨身碟、MP3或固態硬碟。 儲存褒置21包括有一控制單元211以及一記憶單元 213。控制單元211係轉接於主機23與記憶單元213之間, 用以接收主機23所下達之一控制指令,所述之控制指令可 為-寫入指令或-讀取指令,寫入指令是將對應一邏輯區 塊位址的資料寫入記憶單元213中,而讀取指令則是將對 M365496 應:邏輯區塊位址的資料從記憶單元2i3中讀取出來。記 憶單兀213為一快閃記憶體(FlashMemory) ’其由單級單 元記憶體(SLC)、相變化記憶體(pCM)、自由鐵電式隨機存 ,兄憶體(FeRAM)、磁性隨機存取記憶體(敵綱或多級 單元纪憶體(MLC)之群組组合之一構成。 者,明二第二圖,該圖係為本創作所揭示之記憶 併:::具,貫施例,示意圖。其中相關之系統架構請-Wen, MLC) made of high-density memory (= density memory) or single-stage haplotype memory (singIe_] eve]_ceii SLC), made of low-density memory (LQwdensityme bribe y). Compared with the low-density memory, the data storage capacity per unit area of the high-density memory can be multiplied, thus having the advantages of greatly increasing the storage capacity and reducing the cost, while reading and writing (4), performing burning and erasing (Erase) The time required for the action is longer; in addition, the multi-level cell process technology also causes the high density = the number of erase cycles that the memory can withstand, so that the 3 M365496 sounds high-density memory. The strong life of the body. In order to avoid the data access speed of unscrupulous people and the use of memory replacements in the original memory card 1 or low-priced memory replacement products to destroy the original memory card manufacturing, selling counterfeit anti-counterfeiting mechanism.豕 t t t, the industry has proposed many memory units 13 = ^ square mouth 2 more than the original memory card 1 soft society 杳 有 ° ° ° 唬 唬 唬 唬 唬 , , , , 经由 经由 经由 经由 经由 经由 经由 经由 经由 经由 经由The identification data stored in the memory unit is identified as poor material 3 or, to the specific reading _ 1 ^ ^ 'jian' and designed hard pseudo-, but the heart of the person single f? true identification data can still A large number of copying and piracy writes (4) completely confidential APS, r〇c ppn 引独所& supply of poor content protection technology such as, people confidant, CP belly and soft material are encountered, ^ 继 $细_卜For example, if you want to use other special functions, you can install the appropriate or axis program on the host side to provide the corresponding special functions. In short, when installing software and drive on the host, there is a tendency to cross the platform. Moreover, if you want to identify == every time, the tester must install the card body for identification, which will lengthen the test time and increase the inconvenience of the test program = or apply the soft M365496 f new content. The purpose of this creation is to provide a means to improve the prior art by using access to store the identification data 2 to control the device. The __ shows - the species has Lai Weizhi (four) bribes = the host to identify the memory storage an r unit and - control unit. Memory = a plurality of shell blocks, the physical block: the block can be f; the control unit is transferred between the host and the heart, and is used to receive one of the control commands from the host. It is judged that the position to be accessed by the control command is a special function: zone], and the state of the memory cell is displayed or changed according to the control command. * The address is borrowed from the technical reading. The author will identify the f material in advance and store it in the specific 1 direct access to the partial storage f, and the second in the efficacy 2. The non-use is only used to provide reference and explanation for the creation of the icon, and [ Embodiments: Before, the second storage: the storage device is stored in the special address of the (four) body beforehand, and the M365496 device is directly controlled to the specific address: or the use state of the control device is removed. ID==Execute special extra function for the object, enter==: -Innovation is generated in the memory error device-state===== piece 'memory storage device when;::: other structure It should not be limited to those disclosed in this embodiment. So first, please refer to the second picture, 兮 伤 伤 , , 〜 〜 〜 〜 〜 〜 〜 〜 体 体 体 体 体 体 体 体 体 体 - - - - - - - - - - 为本 为本 为本 为本 为本 为本For example, the first storage device 21 (hereinafter referred to as the storage device) = , the Η system, and the first 2 ’ cooperate to perform writing and reading of data. In the number 2, the 'storage device 21 can be plugged into the host computer 23' to accept the host computer 23 Ϊ 2: f said that the host computer 23 is a computer system, its H (four), personal computer (PC), notebook computer (Deskt〇 P), tablet (T_PQ, server or personal digital assistant (PDA)); _ pin placed in one of the 21 county computer peripherals, which can be memory card, flash drive, MP3 or solid state drive The storage unit 21 includes a control unit 211 and a memory unit 213. The control unit 211 is coupled between the host 23 and the memory unit 213 for receiving a control command issued by the host 23, wherein the control command is For a write command or a read command, the write command writes the data corresponding to a logical block address to the memory unit 213, and the read command is the data for the M365496: logical block address. It is read from the memory unit 2i3. The memory unit 213 is a flash memory (Flash Memory) 'which is composed of single-level cell memory (SLC), phase change memory (pCM), free ferroelectric random memory, brother Remembrance (FeRAM), magnetic random access memory (enemy or multi-level cell memory) One of the group combinations of the body (MLC). The second picture of the second part of the Ming Dynasty is the memory revealed by the creation and is:::, the embodiment, the schematic diagram. The relevant system architecture -
二^三圖所示’記憶單元213定義連續複 數個貫體區塊ΡΒΑ()、ΡΒΑι、PBA2.…, 記錄資料之至少-損瓌I •田中L括了無法 情體儲料μ Λ x來表示之)。每一記 Γ時’控制單元211會掃描整個記憶 二Γ 四圖所示,損壞之實體區塊ρβα〆 曰依序δ己錄於壞塊索引表4中。控 根據壞塊索引表4之内容來將可用 邏輯區塊表5,如第五圖所示轉換成: 複數個邏輯區塊LBA。、LBAi、LBA2 * :疋義連二 用之實體區塊以及邏輯區塊之對應關係:·資 於該等邏輯區塊,並藉由控制單元2 义 邏輯區塊所制L塊中。由於每铜 裝置21中,以對其進行辨識。 °己丨思體儲存 於本創作之一具體實施例中,使 主機23時’控制單元211會檢 7 M365496 中實體區塊以及邏輯區塊的對應關係是否與邏輯區塊表j 相同,若相同,即可進一步使用儲存裝置21來存取資料; 否則便禁止一切對儲存裝置21的存取動作。The memory unit 213 defines a plurality of consecutive blocks ΡΒΑ(), ΡΒΑι, PBA2...., at least the data is recorded as a loss 瓌I. • Tanaka L includes a linguistic storage material μ Λ x Express it). Each time the control unit 211 scans the entire memory. As shown in the fourth figure, the damaged physical block ρβα〆 is sequentially recorded in the bad block index table 4. Control The available logical block table 5, as shown in the fifth figure, is converted into: a plurality of logical blocks LBA according to the contents of the bad block index table 4. , LBAi, LBA2 * : Correspondence between the physical block and the logical block used by 疋义连二: · Included in the logical block, and in the L block made by the control unit 2 logical block. Since it is identified in each copper device 21, it is identified.丨 丨 丨 储存 储存 储存 储存 储存 储存 储存 储存 储存 储存 储存 储存 储存 储存 储存 储存 储存 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机 主机The storage device 21 can be further used to access the data; otherwise, all access operations to the storage device 21 are prohibited.
以上方式僅係能判斷儲存裝置21之真偽,為了更進一 、步辨識其詳細資訊,記憶單元213中特別儲存—辨識資 料,其包括有記憶體製造廠商資訊及其製造日期、實體區 塊大小之㈣、可狀該實體區塊大小之資訊、損壞區塊 大小之資訊、該壞塊索引表4或參數資料之群組組合之 。舉例來說,辨識資料的態樣可為”ABC,〇8丨〇25, 5〇〇, _, {一5’ 10, 15, ··.},101” ’其中ABC表示廢商名稱,表 :製造日期,500表示實體區塊大小,4〇〇表示可用之實體 區塊大小’ {5, 1G,15, ···}表示損壞區塊之索引值,ι〇ι表 示記憶單元213之使用狀態之參數資料。 請再參閱第三圖,本創作特別保留其一之實體區塊, 將其標記為—特殊魏實體輯概^以記錄辨識資 的儲存位址。特殊魏實體區塊係為主機23端與儲: 21直接溝通之中介腳色,其中儲存之内容係不^ 改變。其中,特殊功能實體區塊PBAi以及儲存辨識= 貫體區塊W係於儲存裝置21出廠時預設之實體區塊,亦 可係根據壞塊索引表4之内容而決定的。 -具體貫施财,叹計特殊功能實魏塊 設之實體區塊’且敎由第—之損壞區塊之下—個每3 塊(即實體區塊PBAj)來儲存辨識資料為 二二 識儲存裝置跨從主機23端下達一控制用= 便於預設之賴區_〜寫入該控制指令。控制單元21; 8 M365496 接收從主機2 3傳來的控制指令後 該控制指令係欲_輯 塊表5付知 區塊Al所對應之特殊功能實體 以提供特輯,於是㈣_翻令進行解碼, 假設該控制指令係欲詢問則 會從特殊功能實體區塊ΡΒΑ.巾控制早凡211 址,進而;^1 —出辨識資料的儲存位 辨識資料之㈣識資料,使用者便能從 為仿冒品,== 置二 實體區塊舞_定是特殊魏實^區塊1^所對應的 能實體區塊PBAi之前有其他扩、^OBAi(因為特殊功 得辨識資,侧鱗位址;即、^^小因此無法正確獲 ㈣ ==::==Γ,進而查 辨:資料所在之實體區绳 記憶單元213的第-個損揀區祕2個貫體£塊疋否是 料的可靠性,且此時的辨識;料::’則證明了辨識資 變記憶單元213之使d狀能。’ ' 4可允4被修改來改 可對==: = r—能外,亦 ,令係欲將鎖住記憶單= 序則= 早几211藉由上述步驟找到 :二則控制 序,即修改辨識資料中的泉數次祖彳θ仃鎖檔程 成,贈’,以禁止對記料例如將”改 複製、寫人、讀取或顯示案進行刪除、 動作,同樣地,若控制指令係 M365496 欲將開放記情I;Λ, 、、 早70 213中的所有檔案,則控制單元211藉 由ΐ述步驟,到辨識資料後,會進行解鎖程序,即修改辨 貝!!'中的翏數*料,例如將,,議,,改成”1Q1,,,以開放對 :己隐單元213内儲存之槽案進行冊4除、複製、寫入、讀取 5 ’員:之,作。如此一來,每當使用者對記憶單元213中 進仃處理時,控制單元211會根據參數資料的設定 來決:是否能對檔案進行相關之處理。 ·? 作之—具體實施例巾,獲得觸資料的方法除 區塊,'且力能實體區塊PBAi設定為預設之實體 ",' 弟一之損壞區塊之下一個實體區塊(即實體 2,=^識㈣,亦可制其他設計來達成。 下一個實體區塊PBA々定為第—之損壞區塊之 個損壞區塊係為1 值加=值1實體區塊,意即若前三 心(1+2+6)為特殊功能實P^=A6 則指定實體區塊 :存Si 1 ^損壞區塊之索引值二=3:: 儲存之:址%容而決定辨識資;: 徵’故不應以本創作^者^限皆屬本創作料之技術特 最後’為了更了解本創作 ::為本創作所揭示記憶體館;裝 體貫施例之步驟流程圖。其 辨識方去之一具 第二〜五圖。如第六圖所示,所述之辨請同時參閱 識方法為以下步驟: 10 M365496 ====^213進行掃描,以檢 =:)=嶋測出了對應關係是否與=' 贪則表不记憶早兀213係為仿冒的,故秽 切對儲存裝置的控制行為(步驟s術);若是,則表; 單兀213係為原廠製造。 /、。己隐 再來,使用者可於主機23端輸人—控制指 S_)’意即寫入控制指令於邏輯區塊⑶〜中;杵制ς ^接收到主機23傳來之控制指令後,會經由邏^塊表 來轉換邏輯區塊LBAi所對應之實體區塊位址 ^ 否欲將控制指令寫至特殊功能實體_ PBA =In the above manner, only the authenticity of the storage device 21 can be determined. In order to further identify the detailed information, the memory unit 213 stores the identification data, which includes the memory manufacturer information and its manufacturing date and physical block size. (4), the information of the size of the physical block, the information of the size of the damaged block, the combination of the bad block index table 4 or the parameter data. For example, the identification of the data can be "ABC, 〇8丨〇25, 5〇〇, _, {1 5' 10, 15, ··.}, 101" 'where ABC indicates the name of the waste business, the table : manufacturing date, 500 indicates the physical block size, 4 〇〇 indicates that the available physical block size ' {5, 1G, 15, ... ·}} indicates the index value of the damaged block, and ι〇ι indicates the use of the memory unit 213 Parameter data of the status. Please refer to the third figure. This creation specifically retains one of its physical blocks and marks it as “Special Wei Entity” to record the storage address of the identification. The special Wei entity block is the intermediary role of the host 23 end and storage: 21 direct communication, in which the stored content is not changed. The special function physical block PBAi and the storage identification = the physical block W are determined by the physical block preset when the storage device 21 is shipped from the factory, and may also be determined according to the content of the bad block index table 4. - Specific implementation of the financial, sighing the physical block of the special function real Wei block 'and under the damage block of the first - every 3 blocks (ie the physical block PBAj) to store the identification data for the second and second knowledge The storage device is provided with a control command from the host 23 end to facilitate the preset zone _~ to write the control command. The control unit 21; 8 M365496 receives the control command transmitted from the host 2 3, and the control command is to use the special function entity corresponding to the block A1 to provide a special feature, so (4) _ flip to decode, assume The control command is to be inquired from the special function entity block to control the early 211 address, and then; ^1 - the identification data of the identification data of the identification data (4) knowledge, the user can be from counterfeit goods, == Set two physical block dance _ is the special Wei Shi ^ block 1 ^ corresponding to the physical block PBAi before there are other expansion, ^ OBAi (because of special merits identification, side scale address; ie, ^ ^Small, therefore, can't get (4) ==::==Γ correctly, and then find out: the first piece of the blockage area of the physical area rope memory unit 213 where the data is located is the reliability of the material. And the identification at this time; material:: 'It is proved that the identification of the variable memory unit 213 can make the d-shaped energy. ' 4 can allow 4 to be modified to change the right ==: = r - can be outside, also, the system Want to lock the memory list = order = early 211 by the above steps to find: two control order, that is, modify the identification data Several times, the ancestor 彳 仃 locks the course, and gives a 'to prohibit the recording, for example, to copy, write, read or display the case to delete, action, similarly, if the control command is M365496 wants to open the record I, Λ, ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, Change, discuss, change to "1Q1,,, open to: the hidden case stored in the hidden unit 213 for the book 4 to divide, copy, write, read 5 'members:, so that, Whenever the user processes the memory unit 213, the control unit 211 determines whether the file can be processed according to the setting of the parameter data. In addition to the block, 'and the power entity block PBAi is set as the default entity", 'a physical block under the damaged block (ie, entity 2, =^ (four), can also make other designs The next physical block PBA is determined to be the damaged block of the first damaged block. 1 value plus = value 1 physical block, meaning that if the first three hearts (1+2+6) are special functions, P^=A6, then specify the physical block: save Si 1 ^ the index value of the damaged block 2 = 3 :: Storage: The address is % and the decision is made to identify the capital;: The levy 'should not be based on the creation of the product ^ is limited to the technical end of the creative material's in order to better understand the creation:: the memory revealed by the creation The flow chart of the steps of the embodiment of the body; the identification side has one of the second to fifth figures. As shown in the sixth figure, the identification method is as follows: 10 M365496 === =^213 scan, to check =:) = 嶋 对应 对应 对应 对应 对应 对应 对应 对应 对应 对应 对应 兀 兀 兀 兀 兀 213 213 213 213 213 213 213 213 213 213 213 213 213 213 213 213 213 213 213 213 213 213 213 213 213 213 213 213 If it is, then the table; the single 213 series is manufactured by the original manufacturer. /,. Once again, the user can enter the host 23 - control means S_) 'meaning that the control command is written in the logical block (3) ~; after receiving the control command from the host 23, Convert the physical block address corresponding to the logical block LBAi via the logical block table ^ Do you want to write the control instruction to the special function entity _ PBA =
Luu便根據控制指令將資料存取於邏 鬼位址(步驟S613);若係將控制指令寫入 1 塊_PBA1,則表示欲執行讀寫動作以外之特 犯’抆制早兀21〗隨即對控制指令進行解碼(步驟 15),以依據控制指令來進行相對應之一回應程序,進而 執仃顯示或改變記憶單元213之使用狀g之處理。 β控制指令經解碼後,控制單元21U更判斷該控制指令 疋『符合欲查詢儲存裝置21的觸㈣之指令格式(步驟 、,6口)’若是,則從特殊功能實體區塊PBAi中查出辨識資 料之儲存位址(步驟S619),進而從辨識f料之儲存位址中 讀出辨識資料(步驟S621);主機23端接收到辨識資料後, 11 M365496 便顯示辨識資料之内容(步驟S623),於是 資料中查出儲存裝置21的產口都卞另1 攸辛識 J座。口型唬及其使用狀態等 若步驟S6H的判斷為否,則控制單元2 斷 控制指令是否符合欲改變記憶單元213的使用 格式(步驟S625);若否,則執行其他對應於該控制指^ 相關之處理(步驟S627),或可能該控制指令 單元211所定義之指令格式,便不予以理會該控 若步驟S625之判斷為是,則進行如步驟s6i9〜啦乂牛 驟來查出辨識資料(步驟S629),並 : 識資料中的參數資料,以改變記憶單元213的使用 驟S6川,於是制者可任意改變記憶單元2i3中的;案 值传一扶的疋,在步驟S613中,批法,丨错-μ . 參數資料的設定來決定記愫單亓二凡1係依據 的記憶單元未被鎖住,使用的使:權限,若此時 在步驟S619之後,控制單元211亦可進一步檢 ^存之前一個實體區塊是否係為第-個損壞^體 是,才允許顯示辨識資料或修改參數資Γ 纪情例詳述,#可知悉本創作之具辨識功能之 ^=^^==粒嫩_以辨識或 置的辨識資料或對其進‘改,==特^位址來查詢儲存裝 本創作提㈣咖[可姉=^其卿機制。藉由 寫的方式來傳遞指令與資料,毋須搭配特殊 Π貝置,即可在任何作業系統以及沒有安裝驅動程 12 M365496 式的情況下’進行對儲存裝置硬體的控制,如此提供跨 平台的優勢,並且不受限於系統使用權限。 2.由=母個記憶單元所具有之猶之賴區塊的位置和 數量皆不相同’故利用損壞區塊的分布情形來表示每一 儲存I置的唯-識別碼,如此可防止有心人士將仿冒品 取代原廠之記憶單元。 3.Luu accesses the data to the logical ghost address according to the control command (step S613); if the control command is written to one block _PBA1, it means that the special offense other than the read/write action is required to be executed. The control command is decoded (step 15) to perform a corresponding response procedure according to the control command, thereby performing the process of displaying or changing the usage g of the memory unit 213. After the β control command is decoded, the control unit 21U further determines that the control command 疋 "conforms to the command format of the touch (4) of the storage device 21 (step, 6 ports)". If yes, it is detected from the special function entity block PBAi. Identifying the storage address of the data (step S619), and further reading the identification data from the storage address of the identification material (step S621); after receiving the identification data by the host 23, 11 M365496 displays the content of the identification data (step S623) ), then the data in the storage device 21 is found to be the other one. If the judgment of the step S6H is NO, the control unit 2 interrupts whether the control command conforms to the use format of the memory unit 213 to be changed (step S625); if not, executes other corresponding control fingers. The related processing (step S627), or the instruction format defined by the control instruction unit 211, ignores the control. If the determination in step S625 is YES, then the identification data is detected as in step s6i9~ (Step S629), and: identifying the parameter data in the data to change the usage of the memory unit 213, so that the maker can arbitrarily change the memory unit 2i3; the case value is transmitted, in step S613, the batch Method, error-μ. The setting of the parameter data determines that the memory unit according to the recording unit is not locked, and the used: permission, if at this time after step S619, the control unit 211 can further check If the previous physical block is stored as the first damage, it is allowed to display the identification data or modify the parameters. The details of the case can be known as the identification function of the creation ^=^^== Tender _ to identify or Or its identification data into the 'change, == ^ Laid address to store query creation apparatus of the present coffee extract (iv) [which may be ^ = percent Qing mechanism. By means of writing and transferring instructions and data, it is possible to control the hardware of the storage device in any operating system and without the driver 12 M365496 without special port configuration, thus providing cross-platform Advantages, and are not limited to system usage rights. 2. The location and number of the blocks that are owned by the parent memory unit are different. Therefore, the distribution of the damaged blocks is used to represent the unique identifier of each storage I. This prevents the interested person. Replace counterfeit goods with the original memory unit. 3.
依據每個記憶單亓& j口墙广、 辨蜱資料塊之分布情形來決定 士 5日处、止、:子立址,如此在修改和查詢辨識資料 !!布料之純衫觸壞區塊之 二。^目付’如此提供—個更安全的資料保護機 兮· 取便 主Μ 。 奴在齡裝置插入任— 主機後,料輸人麵才能讀取資料,而 /C的控制亦需輸入相對廣 更tZL、早 硬體複製、防綱寫此㈣達到防軟/According to the distribution of each memory unit amp & j mouth wall and identification data block to determine the 5th, stop, and sub-location, so modify and query the identification information!! Block two. ^目付' So provide a safer data protection machine 兮· 便便 The main Μ. After the slave device is plugged in - the host, the input is expected to read the data, and the control of /C needs to be input relatively wide. tZL, early hardware copy, anti-class write this (four) to achieve anti-soft /
惟,以上所述,僅為本創 告 與圖式,並非用以限制本創作例之詳細說明 述之申請專利範圍為準,任何孰之f有範圍應以下 領域内,可輕易思及之變化二二=技勢者在本創作之 界定之專利範圍。 知—皆可涵蓋在以下本案所 【圖式簡單說明】 /第圖係為習知之記憶體丫諸 糸統架構示意圖; 泉罝之—具體實施例之 第二圖係為本新型所揭示 以思體储存裝置之一具體 13 M365496 實施例之系統架構示意圖; 第三圖係為本新型所揭示之記憶單元之一具體實施例 之不意圖, 第四圖係為本新型所揭示之壞塊索引表之一具體實施 例之示意圖; 第五圖係為本新型所揭示之邏輯區塊表之一具體實施 例之示意圖;以及 第六圖係為本新型所揭示記憶體儲存裝置之辨識方法 之一具體實施例之步驟流程圖。 【主要元件符號說明】 習知 I :記憶卡 II :控制單元 13 :記憶單元 本新型 2:數位系統 21 :記憶體儲存裝置 211 :控制單元 213 :記憶單元 23 :主機 PBA〇、PBA!、ΡΒΑ2、ΡΒΑΗ、ΡΒΑ」、PBAq :實體區 塊 14 M365496 PBA1 :特殊功能實體區塊 4 :壞塊索引表 5 :邏輯區塊表 LBA〇、LBA!、LBA2、LBA,:邏輯區塊 S601〜S631 :各個步驟流程However, the above is only for the purpose of creating the invention and the drawings, and is not intended to limit the scope of the patent application described in the detailed description of this example. Any scope of the application should be within the following areas, which can be easily changed. 22: The range of patents defined by the skilled person in this creation. Knowing - can be covered in the following case [simplified description of the schema] / the diagram is a schematic diagram of the memory structure of the well-known; the second diagram of the specific embodiment is the thought of the new One of the body storage devices is a schematic diagram of the system architecture of the embodiment of the M365496 embodiment; the third figure is not intended to be a specific embodiment of the memory unit disclosed in the present invention, and the fourth figure is the bad block index table disclosed in the present invention. A schematic diagram of a specific embodiment of the logic block table disclosed in the present invention; and a sixth diagram is a specific method for identifying the memory storage device disclosed in the present invention. Flow chart of the steps of the embodiment. [Description of main component symbols] Conventional I: Memory Card II: Control Unit 13: Memory Unit The present invention 2: Digital System 21: Memory Storage Device 211: Control Unit 213: Memory Unit 23: Host PBA〇, PBA!, ΡΒΑ2 , ΡΒΑΗ, ΡΒΑ", PBAq: physical block 14 M365496 PBA1: special function entity block 4: bad block index table 5: logical block table LBA 〇, LBA!, LBA2, LBA,: logical block S601 ~ S631: Step process
1515