US20220004638A1 - Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory - Google Patents
Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory Download PDFInfo
- Publication number
- US20220004638A1 US20220004638A1 US17/481,322 US202117481322A US2022004638A1 US 20220004638 A1 US20220004638 A1 US 20220004638A1 US 202117481322 A US202117481322 A US 202117481322A US 2022004638 A1 US2022004638 A1 US 2022004638A1
- Authority
- US
- United States
- Prior art keywords
- flash memory
- electronic device
- mass production
- software tool
- authorized
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 21
- 238000012545 processing Methods 0.000 claims description 16
- 238000013475 authorization Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 238000012795 verification Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 210000003813 thumb Anatomy 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
- G06F8/654—Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/0223—User address space allocation, e.g. contiguous or non contiguous base addressing
- G06F12/023—Free address space management
- G06F12/0238—Memory management in non-volatile memory, e.g. resistive RAM or ferroelectric memory
- G06F12/0246—Memory management in non-volatile memory, e.g. resistive RAM or ferroelectric memory in block erasable memory, e.g. flash memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/38—Information transfer, e.g. on bus
- G06F13/382—Information transfer, e.g. on bus using universal interface adapter
- G06F13/385—Information transfer, e.g. on bus using universal interface adapter for adaptation of a particular data processing system to different peripheral devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2213/00—Indexing scheme relating to interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F2213/0042—Universal serial bus [USB]
Definitions
- the invention relates to a flash memory initialization validation scheme, and more particularly to a scheme capable of avoiding other persons applying a flash memory mass production software tool in different operations/devices.
- a flash memory manufacturer can easily get or obtain a mass production software tool provided by a flash memory controller provider.
- the flash memory manufacturer may use the mass production software tool to perform various kinds of flash memory tests but does not use the controller provided by the flash memory controller provider. It is difficult for the controller provider to sell its controller products.
- one of the objectives of the invention is to provide methods for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory, electronic devices, and corresponding computer readable mediums, to solve the above mentioned problems.
- a method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory comprises: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; retrieving build date information from the temporarily decrypted configuration file; comparing time information included within the build date information with specific time information to determine whether the build date information is out of date; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices when the build date information is not out of date; and performing
- a method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory comprises: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
- CPU ID central processing unit identification
- a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash
- an electronic device for activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory is disclosed.
- the memory device is to be coupled to the electronic device via a USB interface, and the electronic device comprises a memory for storing the mass production software tool and a processing unit coupled to the memory.
- the processing unit is arranged for: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
- CPU ID central processing unit identification
- a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices
- an electronic device for activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory is disclosed.
- the memory device is to be coupled to the electronic device via a USB interface.
- the electronic device comprises a memory for storing the mass production software tool and a processing unit coupled to the memory.
- the processing unit is arranged for: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; retrieving build date information from the temporarily decrypted configuration file; comparing time information included within the build date information with specific time information to determine whether the build date information is out of date; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices when the build date information is not out of date; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
- CPU ID central processing unit identification
- a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded
- FIG. 1 is an overview system diagram showing a relation between multiple flash memory initialization devices PC_ 1 ⁇ PC_N of a flash memory manufacturer and a flash memory controller provider which is arranged to provide a mass production software tool MP for the flash memory manufacturer according to an embodiment of the invention.
- FIG. 2 is a diagram of an electronic device for performing a flash memory initialization operation upon a memory device according to an embodiment of the invention.
- FIG. 3 is a diagram of a first part of a flowchart of a method/process executed by the mass production software tool MP to verify whether an electronic device is a valid flash memory initialization device so as to decide whether to initialize a memory device including a flash memory controller and a flash memory according to the embodiment of FIG. 2 .
- FIG. 4 is a diagram of a second part of a flowchart of a method/process executed by the mass production software tool MP to verify whether an electronic device is a valid flash memory initialization device so as to decide whether to initialize a memory device including a flash memory controller and a flash memory according to the embodiment of FIG. 2 .
- FIG. 1 is an overview system diagram showing a relation between multiple flash memory initialization devices PC_ 1 ⁇ PC_N of a flash memory manufacturer 105 and a flash memory controller provider 110 which is arranged to provide a mass production software tool MP for the flash memory manufacturer 105 according to an embodiment of the invention.
- the flash memory initialization devices PC_ 1 ⁇ PC_N such as personal computers are respectively used by the flash memory manufacturer 105 in a factory to initialize memory devices each including a flash memory controller and a flash memory.
- each flash memory initialization device of the flash memory manufacturer 105 needs to get authorization of the mass production software tool MP provided from the flash memory controller provider 110 .
- the flash memory controller provider 110 authorizes N electronic devices of the manufacturer 105 as valid flash memory initialization devices and provides a small application software tool AP for the flash memory manufacturer 105 wherein the small application software tool AP is arranged to collect and generate corresponding unique information of each electronic device which executes such tool AP. Then, the flash memory controller provider 110 is arranged to ask the flash memory manufacturer 105 to return the corresponding unique information of all the authorized/valid electronic devices back to the flash memory controller provider 110 .
- the flash memory controller provider 110 may receive the corresponding unique information INFO_ 1 ⁇ INFO_N of the N electronic devices PC_ 1 ⁇ PC_N, and then is arranged to encrypt or encode the corresponding unique information INFO_ 1 ⁇ INFO_N of the N electronic devices PC_ 1 ⁇ PC_N to generate an encrypted/encoded configuration file which is to be packaged in the mass production software tool MP.
- the flash memory controller provider 110 For each of the corresponding unique information INFO_ 1 ⁇ INFO_N, the flash memory controller provider 110 generates a build date so as to finally generate build date information of corresponding unique information INFO_ 1 ⁇ INFO_N.
- the flash memory controller provider 110 then provides the mass production software tool MP including the encrypted/encoded configuration file for the flash memory manufacturer 105 .
- the encrypted/encoded configuration file cannot be easily cracked by the flash memory manufacturer 105 or other persons, and is used to verify whether an electronic device is used as a valid flash memory initialization device for initializing a memory device including a flash memory controller and a flash memory.
- the flash memory manufacturer 105 After receiving the mass production software tool MP from the flash memory controller provider 110 , the flash memory manufacturer 105 is arranged to active and execute the mass production software tool MP on its initialization devices to initialize memory devices.
- FIG. 2 is a diagram of an electronic device 205 for performing a flash memory initialization operation upon a memory device 210 according to an embodiment of the invention.
- the electronic device 205 for example is one of the flash memory initialization devices PC_ 1 ⁇ PC_N of flash memory manufacturer 105 , and it comprises a CPU 2051 , a memory 2052 , and an interface circuit 2053 wherein the bus is connected between the CPU 2051 , memory 2052 , and interface circuit 2053 to transfer data/signals/commands.
- the memory 2052 for example is a random access memory to store the mass production software tool MP.
- the memory device 210 for example is a thumb drive, a pen drive, a memory card such as SD card, a stick, a disk, an SSD (solid state drive) which can electrically connect to the electronic device 205 via the USB interface; however, this is not intended to be a limitation.
- the memory device 210 for example is a USB flash device (UFD) and comprises the flash memory controller 2101 and the flash memory 2102 .
- FIG. 3 and FIG. 4 show a flowchart of a method/process executed by the mass production software tool MP to verify whether an electronic device is a valid flash memory initialization device so as to decide whether to initialize a memory device including a flash memory controller and a flash memory according to the embodiment of FIG. 2 .
- the detailed description of steps is described in the following
- Step 305 Start;
- Step 310 A user such as an operator of the manufacturer manually activates or starts the mass production software tool MP to run the mass production software tool MP on the CPU 2051 of electronic device 205 ;
- Step 315 the mass production software tool MP retrieves or loads its encrypted configuration file
- Step 320 the mass production software tool MP decrypts the encrypted configuration file to generate a temporarily decrypted configuration file
- Step 325 the mass production software tool MP retrieves and loads build date information from the temporarily decrypted configuration file
- Step 330 the mass production software tool MP retrieves or obtains a network clock time from the Internet and a system clock time of the electronic device 205 ;
- Step 335 the mass production software tool MP determines whether the electronic device 205 is connected to the Internet; if the electronic device 205 is connected to the Internet, the flow proceeds to Step 340 A, otherwise, the flow proceeds to Step 340 B;
- Step 340 A the mass production software tool MP compares the build date information with the network clock time to decide whether the build date information is out of date; if the build date information is out of date, the flow proceeds to Step 345 , otherwise, the flow proceeds to Step 350 ;
- Step 340 B the mass production software tool MP compares the build date information with the system clock time to decide whether the build date information is out of date; if the build date information is out of date, the flow proceeds to Step 345 , otherwise, the flow proceeds to Step 350 ;
- Step 345 Close the mass production software tool MP, i.e. not executing the mass production software tool MP;
- Step 350 the mass production software tool MP retrieves registry time information recorded in the electronic device 205 ; the registry time information for example is stored in the memory 2052 ;
- Step 355 the mass production software tool MP compares the build date information with the registry time information to decide whether the build date information is out of date; if the build date information is out of date, the flow proceeds to Step 345 , otherwise, the flow proceeds to Step 360 ;
- Step 360 the mass production software tool MP obtains corresponding unique information of such electronic device 205 ;
- Step 365 the mass production software tool MP compares the corresponding unique information of electronic device 205 with information of the decrypted/decoded configuration file to decide whether the corresponding unique information of electronic device 205 exists in the decrypted/decoded configuration file; if yes, the flow proceeds to Step 370 , otherwise, the flow proceeds to Step 345 ;
- Step 370 clear system blocks of the flash memory 2102 ;
- Step 375 perform pretest upon all blocks of the flash memory 2102 ;
- Step 380 establish information tables
- Step 385 download ISP firmware from the electronic device 205 to the flash memory 2102 via the USB interface;
- Step 390 perform format operation upon data blocks of the flash memory 2102 ;
- Step 392 Complete the execution of the mass production software tool MP and save/record a total usage time at the registry time information
- Step 394 End.
- the encrypted configuration file of the mass production software tool MP is implemented by using the INI file format which is an informal standard for configuration files for some computing platforms or software programs.
- the encrypted configuration file is not easily cracked by other persons or by a flash memory manufacturer.
- the build date information and information of the encrypted/encoded configuration file is not easily modified.
- the mass production software tool MP is arranged to load its encrypted configuration file (Step 315 ) and then decrypts such file to generate the temporarily decrypted configuration file (Step 320 ).
- the mass production software tool MP can obtain corresponding unique information of one or more valid/authorized electronic devices PC_ 1 ⁇ PC_N of the manufacturer 105 and corresponding build date information associated with the unique information.
- Corresponding unique information of each valid/authorized electronic device for example comprises at least one of central processing unit identification (CPU ID), MAC address, and a hard disk serial number (but not limited).
- the mass production software tool MP in Step 325 loads the build date information of all valid/authorized electronic devices and in Step 330 tries to obtain a network clock time from the Internet and a system clock time of the electronic device 205 . Then in Step 335 the mass production software tool MP determines whether the electronic device 205 can be connected to the Internet.
- the mass production software tool MP in Step 340 A determines whether the authorization for the manufacturer 105 is out of date or not by comparing the build date information with the network clock time from the internet to decide whether the build date information is out of date. If the build date information is out of date, the mass production software tool MP decides that the authorization for the electronic device 205 is out of date. In practice, for example, the mass production software tool MP decides whether the electronic device 205 is connected to the Internet, and then compares the build date information with a date of the network clock time to decide whether an interval between the build date information and the network clock time is longer than an authorized time interval such as three months if the electronic device is currently connected to Internet.
- the mass production software tool MP will finish and will not execute the initialization of the flash memory device 210 . Instead, if the time interval is shorter than the authorized time interval, the mass production software tool MP is arranged to execute other verification steps.
- the mass production software tool MP in Step 340 B determines whether the authorization for the manufacturer 105 is out of date or not by comparing the build date information with the system clock time of electronic device 205 itself to decide whether the build date information is out of date. If the build date information is out of date, the mass production software tool MP decides that the authorization for the electronic device 205 is out of date. In practice, for example, the mass production software tool MP decides whether the electronic device 205 is connected to the Internet, and then compares the build date information with a date of the system clock time to decide whether an interval between the build date information and the system clock time is longer than an authorized time interval such as three months if the electronic device 205 cannot be connected to Internet.
- the mass production software tool MP will finish and will not execute the initialization of the flash memory device 210 . Instead, if the time interval is shorter than the authorized time interval, the mass production software tool MP is arranged to execute other verification steps.
- the mass production software tool MP in Step 350 is arranged to retrieve the registry information from the electronic device 205 so as to obtain registry date information which is arranged to record or mark the total usage time of the mass production software tool MP executed by of such electronic device 205 if the electronic device 205 has been authorized.
- the registry date information may record the total hours or total minutes which have been consumed by the execution of the mass production software tool MP on the electronic device 205 if the electronic device 205 has been authorized.
- content of the registry date information is empty.
- the mass production software tool MP After being activated may record a first time and record a second time when being closed/deactivated (or the execution of tool MP is completed), and the tool MP calculates how many hours/minutes consumed by the tool MP for the first time execution on the electronic device based on the first time and second time to derive and obtain a first value in hours. Then the tool MP updates the registry date information as the calculated first value.
- the mass production software tool MP after being activated also records a first time and records a second time when being closed/deactivated (or the execution of tool MP is completed), and the tool MP calculates how many hours/minutes consumed by the tool MP for the second time execution on the electronic device 205 based on the first time and second time to derive and obtain a second value in hours. Then the tool MP updates the registry date information as the calculated second value plus the first value. The registry date information is accumulated.
- the mass production software tool MP in Step 355 is arranged to determine whether the value currently recorded at the registry date information is greater than a total authorization usage time value (in hours/minutes) corresponding to the build date information so as to further determine whether the build date information is out of date or not. If the value currently recorded at the registry date information is greater than the total authorization usage time value such as a value of 150 (i.e. 150 hours, but not limited), the mass production software tool MP is arranged to close or deactivate itself execution. If the value currently recorded at the registry date information is smaller than the total authorization usage time value, the mass production software tool MP then is arranged to execute other verification steps.
- a total authorization usage time value in hours/minutes
- the mass production software tool MP in Step 360 is arranged to obtain at least one of CPU ID, MAC address, hard disk serial number, and so on of the electronic device 205 to calculate or derive corresponding unique information of electronic device 205 .
- Step 365 the mass production software tool MP determines whether any unique information recorded in the decrypted configuration file matches to the corresponding unique information of such electronic device 205 .
- unique information recorded in the encrypted configuration file generated by the flash memory controller provider is a sequence of encoded/encrypted data having 16 Bytes (but not limited), and the corresponding unique information in the decrypted configuration file may comprise information of at least one of central processing unit identification (CPU ID), MAC address, a hard disk serial number, and so on for one valid/authorized device.
- CPU ID central processing unit identification
- MAC address MAC address
- a hard disk serial number a hard disk serial number
- the mass production software tool MP is arranged to retrieve the same type information of the electronic device 205 . For example, the mass production software tool MP retrieves the CPU ID, MAC address, and a hard disk serial number of the electronic device 205 . Then the mass production software tool MP compares the two sets of information to determine if the two sets of information are identical so as to decide whether the electronic device
- the mass production software tool MP is arranged to start to execute the flash memory initialization, otherwise, the mass production software tool MP is arranged to decide that the flash memory initialization fails and close or deactivate its execution.
- the mass production software tool MP in Step 370 is arranged to send a command from the CPU 2051 to the flash memory controller 2101 via the bus, interface circuit 2053 , and USB interface to control the flash memory controller 2101 to clear all system blocks of the flash memory 2102 .
- the controller 2101 clears the mapping of logical block addressing (LBA).
- the mass production software tool MP in Step 375 controls the controller 2101 to perform a pretest operation to scan all blocks in the flash memory 2102 .
- the controller 2101 is arranged to scan the each block by writing data into the each block, then reading data from the each block, and then comparing the read data and written data so as to determine if the each block can be correctly accessed so as to decide whether the each block is a good block or a bad block.
- the controller 2101 during the pretest operation is arranged to record a good/bad block result of the each block in the flash memory 2102 .
- the mass production software tool MP in Step 380 controls the controller 2101 to establish corresponding table(s) comprising a good/bad block table, a page size table, a block number table, and/or other tables (but not limited).
- the controller 2101 is arranged to collect all the good/bad block results recorded in the flash memory 2102 to generate and establish the good/bad block table that is then stored in the flash memory 2102 .
- the mass production software tool MP in Step 385 transmits data of an ISP (In-System Programming) firmware via the USB interface to the controller 2101 which is arranged to transfer the ISP firmware into the flash memory 2102 .
- the ISP firmware is used by the controller 2101 to access and manage the flash memory 2102 .
- the controller 2101 is restarted to identify, read, and use the ISP firmware stored or recorded in the flash memory 2102 .
- the mass production software tool MP in Step 390 controls the controller 2101 to perform a format operation up on data blocks of the flash memory 2102 by sending a format command to the controller 2101 wherein the format command for example is a format command in Windows.
- the flash memory initialization is successfully completed (Step 392 ), and the flow of flash memory initialization is ended.
- the method/process of the invention can verify whether an electronic device is a valid/authorized device by merely comparing the device unique information without comparing build date information with specific time information.
- the modification also falls within the scope of the invention.
- the order of the step of comparing the device's unique information can be exchanged with that of the step of comparing the build date information with the specific time information.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Techniques For Improving Reliability Of Storages (AREA)
- Stored Programmes (AREA)
Abstract
A method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory includes: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file; comparing unique information of the electronic device with unique information recorded in the temporarily decrypted configuration file to determine whether the electronic device is valid/authorized; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
Description
- This application is a continuation application of U.S. application Ser. No. 16/541,117, filed on 2019 Aug. 14, the contents of which are incorporated herein by reference.
- 1. Field of the Invention
- The invention relates to a flash memory initialization validation scheme, and more particularly to a scheme capable of avoiding other persons applying a flash memory mass production software tool in different operations/devices.
- Generally speaking, a flash memory manufacturer can easily get or obtain a mass production software tool provided by a flash memory controller provider. The flash memory manufacturer may use the mass production software tool to perform various kinds of flash memory tests but does not use the controller provided by the flash memory controller provider. It is difficult for the controller provider to sell its controller products. Thus, it is important to provide a novel protection solution to bind the mass production software tool with authorized/valid devices of the manufacturer and a validation process to check whether an electronic device (e.g. a computer) is authorized.
- Therefore one of the objectives of the invention is to provide methods for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory, electronic devices, and corresponding computer readable mediums, to solve the above mentioned problems.
- According to embodiments of the invention, a method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory is disclosed. The memory device is to be coupled to the electronic device via a USB interface, and the method comprises: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; retrieving build date information from the temporarily decrypted configuration file; comparing time information included within the build date information with specific time information to determine whether the build date information is out of date; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices when the build date information is not out of date; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
- According to the embodiments, a method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory is disclosed. The memory device is to be coupled to the electronic device via a USB interface, and the method comprises: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
- According to the embodiments, an electronic device for activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory is disclosed. The memory device is to be coupled to the electronic device via a USB interface, and the electronic device comprises a memory for storing the mass production software tool and a processing unit coupled to the memory. The processing unit is arranged for: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
- According to the embodiments, an electronic device for activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory is disclosed. The memory device is to be coupled to the electronic device via a USB interface. The electronic device comprises a memory for storing the mass production software tool and a processing unit coupled to the memory. The processing unit is arranged for: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; retrieving build date information from the temporarily decrypted configuration file; comparing time information included within the build date information with specific time information to determine whether the build date information is out of date; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices when the build date information is not out of date; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
- These and other objectives of the present invention will no doubt become obvious to those of ordinary skill in the art after reading the following detailed description of the preferred embodiment that is illustrated in the various figures and drawings.
-
FIG. 1 is an overview system diagram showing a relation between multiple flash memory initialization devices PC_1˜PC_N of a flash memory manufacturer and a flash memory controller provider which is arranged to provide a mass production software tool MP for the flash memory manufacturer according to an embodiment of the invention. -
FIG. 2 is a diagram of an electronic device for performing a flash memory initialization operation upon a memory device according to an embodiment of the invention. -
FIG. 3 is a diagram of a first part of a flowchart of a method/process executed by the mass production software tool MP to verify whether an electronic device is a valid flash memory initialization device so as to decide whether to initialize a memory device including a flash memory controller and a flash memory according to the embodiment ofFIG. 2 . -
FIG. 4 is a diagram of a second part of a flowchart of a method/process executed by the mass production software tool MP to verify whether an electronic device is a valid flash memory initialization device so as to decide whether to initialize a memory device including a flash memory controller and a flash memory according to the embodiment ofFIG. 2 . -
FIG. 1 is an overview system diagram showing a relation between multiple flash memory initialization devices PC_1˜PC_N of aflash memory manufacturer 105 and a flashmemory controller provider 110 which is arranged to provide a mass production software tool MP for theflash memory manufacturer 105 according to an embodiment of the invention. - As shown in
FIG. 1 , the flash memory initialization devices PC_1˜PC_N such as personal computers are respectively used by theflash memory manufacturer 105 in a factory to initialize memory devices each including a flash memory controller and a flash memory. To successfully initialize memory devices, each flash memory initialization device of theflash memory manufacturer 105 needs to get authorization of the mass production software tool MP provided from the flashmemory controller provider 110. - For example, the flash
memory controller provider 110 authorizes N electronic devices of themanufacturer 105 as valid flash memory initialization devices and provides a small application software tool AP for theflash memory manufacturer 105 wherein the small application software tool AP is arranged to collect and generate corresponding unique information of each electronic device which executes such tool AP. Then, the flashmemory controller provider 110 is arranged to ask theflash memory manufacturer 105 to return the corresponding unique information of all the authorized/valid electronic devices back to the flashmemory controller provider 110. In this example, the flashmemory controller provider 110 may receive the corresponding unique information INFO_1˜INFO_N of the N electronic devices PC_1˜PC_N, and then is arranged to encrypt or encode the corresponding unique information INFO_1˜INFO_N of the N electronic devices PC_1˜PC_N to generate an encrypted/encoded configuration file which is to be packaged in the mass production software tool MP. In addition, for each of the corresponding unique information INFO_1˜INFO_N, the flashmemory controller provider 110 generates a build date so as to finally generate build date information of corresponding unique information INFO_1˜INFO_N. The smallest record unit of one build date may be hours (but not limited), and different electronic devices PC_1˜PC_N may record partially identical/different date information. The flashmemory controller provider 110 then provides the mass production software tool MP including the encrypted/encoded configuration file for theflash memory manufacturer 105. The encrypted/encoded configuration file cannot be easily cracked by theflash memory manufacturer 105 or other persons, and is used to verify whether an electronic device is used as a valid flash memory initialization device for initializing a memory device including a flash memory controller and a flash memory. After receiving the mass production software tool MP from the flashmemory controller provider 110, theflash memory manufacturer 105 is arranged to active and execute the mass production software tool MP on its initialization devices to initialize memory devices. -
FIG. 2 is a diagram of anelectronic device 205 for performing a flash memory initialization operation upon amemory device 210 according to an embodiment of the invention. Theelectronic device 205 for example is one of the flash memory initialization devices PC_1˜PC_N offlash memory manufacturer 105, and it comprises aCPU 2051, amemory 2052, and aninterface circuit 2053 wherein the bus is connected between theCPU 2051,memory 2052, andinterface circuit 2053 to transfer data/signals/commands. Thememory 2052 for example is a random access memory to store the mass production software tool MP. Thememory device 210 for example is a thumb drive, a pen drive, a memory card such as SD card, a stick, a disk, an SSD (solid state drive) which can electrically connect to theelectronic device 205 via the USB interface; however, this is not intended to be a limitation. Thememory device 210 for example is a USB flash device (UFD) and comprises theflash memory controller 2101 and theflash memory 2102. -
FIG. 3 andFIG. 4 show a flowchart of a method/process executed by the mass production software tool MP to verify whether an electronic device is a valid flash memory initialization device so as to decide whether to initialize a memory device including a flash memory controller and a flash memory according to the embodiment ofFIG. 2 . The detailed description of steps is described in the following - Step 305: Start;
- Step 310: A user such as an operator of the manufacturer manually activates or starts the mass production software tool MP to run the mass production software tool MP on the
CPU 2051 ofelectronic device 205; - Step 315: the mass production software tool MP retrieves or loads its encrypted configuration file;
- Step 320: the mass production software tool MP decrypts the encrypted configuration file to generate a temporarily decrypted configuration file;
- Step 325: the mass production software tool MP retrieves and loads build date information from the temporarily decrypted configuration file;
- Step 330: the mass production software tool MP retrieves or obtains a network clock time from the Internet and a system clock time of the
electronic device 205; - Step 335: the mass production software tool MP determines whether the
electronic device 205 is connected to the Internet; if theelectronic device 205 is connected to the Internet, the flow proceeds toStep 340A, otherwise, the flow proceeds toStep 340B; -
Step 340A: the mass production software tool MP compares the build date information with the network clock time to decide whether the build date information is out of date; if the build date information is out of date, the flow proceeds toStep 345, otherwise, the flow proceeds toStep 350; -
Step 340B: the mass production software tool MP compares the build date information with the system clock time to decide whether the build date information is out of date; if the build date information is out of date, the flow proceeds toStep 345, otherwise, the flow proceeds toStep 350; - Step 345: Close the mass production software tool MP, i.e. not executing the mass production software tool MP;
- Step 350: the mass production software tool MP retrieves registry time information recorded in the
electronic device 205; the registry time information for example is stored in thememory 2052; - Step 355: the mass production software tool MP compares the build date information with the registry time information to decide whether the build date information is out of date; if the build date information is out of date, the flow proceeds to
Step 345, otherwise, the flow proceeds toStep 360; - Step 360: the mass production software tool MP obtains corresponding unique information of such
electronic device 205; - Step 365: the mass production software tool MP compares the corresponding unique information of
electronic device 205 with information of the decrypted/decoded configuration file to decide whether the corresponding unique information ofelectronic device 205 exists in the decrypted/decoded configuration file; if yes, the flow proceeds toStep 370, otherwise, the flow proceeds toStep 345; - Step 370: clear system blocks of the
flash memory 2102; - Step 375: perform pretest upon all blocks of the
flash memory 2102; - Step 380: establish information tables;
- Step 385: download ISP firmware from the
electronic device 205 to theflash memory 2102 via the USB interface; - Step 390: perform format operation upon data blocks of the
flash memory 2102; - Step 392: Complete the execution of the mass production software tool MP and save/record a total usage time at the registry time information; and
- Step 394: End.
- For example, the encrypted configuration file of the mass production software tool MP is implemented by using the INI file format which is an informal standard for configuration files for some computing platforms or software programs. The encrypted configuration file is not easily cracked by other persons or by a flash memory manufacturer. Thus, the build date information and information of the encrypted/encoded configuration file is not easily modified.
- After the mass production software tool MP is manually activated by the user (Step 310) to run the mass production software tool MP on the
CPU 2051, the mass production software tool MP is arranged to load its encrypted configuration file (Step 315) and then decrypts such file to generate the temporarily decrypted configuration file (Step 320). Form the temporarily decrypted configuration file, the mass production software tool MP can obtain corresponding unique information of one or more valid/authorized electronic devices PC_1˜PC_N of themanufacturer 105 and corresponding build date information associated with the unique information. Corresponding unique information of each valid/authorized electronic device for example comprises at least one of central processing unit identification (CPU ID), MAC address, and a hard disk serial number (but not limited). - The mass production software tool MP in
Step 325 loads the build date information of all valid/authorized electronic devices and inStep 330 tries to obtain a network clock time from the Internet and a system clock time of theelectronic device 205. Then inStep 335 the mass production software tool MP determines whether theelectronic device 205 can be connected to the Internet. - The mass production software tool MP in
Step 340A determines whether the authorization for themanufacturer 105 is out of date or not by comparing the build date information with the network clock time from the internet to decide whether the build date information is out of date. If the build date information is out of date, the mass production software tool MP decides that the authorization for theelectronic device 205 is out of date. In practice, for example, the mass production software tool MP decides whether theelectronic device 205 is connected to the Internet, and then compares the build date information with a date of the network clock time to decide whether an interval between the build date information and the network clock time is longer than an authorized time interval such as three months if the electronic device is currently connected to Internet. If such time interval is longer than the authorized time interval, the mass production software tool MP will finish and will not execute the initialization of theflash memory device 210. Instead, if the time interval is shorter than the authorized time interval, the mass production software tool MP is arranged to execute other verification steps. - Similarly, the mass production software tool MP in
Step 340B determines whether the authorization for themanufacturer 105 is out of date or not by comparing the build date information with the system clock time ofelectronic device 205 itself to decide whether the build date information is out of date. If the build date information is out of date, the mass production software tool MP decides that the authorization for theelectronic device 205 is out of date. In practice, for example, the mass production software tool MP decides whether theelectronic device 205 is connected to the Internet, and then compares the build date information with a date of the system clock time to decide whether an interval between the build date information and the system clock time is longer than an authorized time interval such as three months if theelectronic device 205 cannot be connected to Internet. If such time interval is longer than the authorized time interval, the mass production software tool MP will finish and will not execute the initialization of theflash memory device 210. Instead, if the time interval is shorter than the authorized time interval, the mass production software tool MP is arranged to execute other verification steps. - The mass production software tool MP in
Step 350 is arranged to retrieve the registry information from theelectronic device 205 so as to obtain registry date information which is arranged to record or mark the total usage time of the mass production software tool MP executed by of suchelectronic device 205 if theelectronic device 205 has been authorized. For example, the registry date information may record the total hours or total minutes which have been consumed by the execution of the mass production software tool MP on theelectronic device 205 if theelectronic device 205 has been authorized. In practice, before the mass production software tool MP is executed on theelectronic device 205 for the first time, content of the registry date information is empty. For the first time execution of the tool MP, the mass production software tool MP after being activated may record a first time and record a second time when being closed/deactivated (or the execution of tool MP is completed), and the tool MP calculates how many hours/minutes consumed by the tool MP for the first time execution on the electronic device based on the first time and second time to derive and obtain a first value in hours. Then the tool MP updates the registry date information as the calculated first value. - For the second time execution, the mass production software tool MP after being activated also records a first time and records a second time when being closed/deactivated (or the execution of tool MP is completed), and the tool MP calculates how many hours/minutes consumed by the tool MP for the second time execution on the
electronic device 205 based on the first time and second time to derive and obtain a second value in hours. Then the tool MP updates the registry date information as the calculated second value plus the first value. The registry date information is accumulated. - The mass production software tool MP in
Step 355 is arranged to determine whether the value currently recorded at the registry date information is greater than a total authorization usage time value (in hours/minutes) corresponding to the build date information so as to further determine whether the build date information is out of date or not. If the value currently recorded at the registry date information is greater than the total authorization usage time value such as a value of 150 (i.e. 150 hours, but not limited), the mass production software tool MP is arranged to close or deactivate itself execution. If the value currently recorded at the registry date information is smaller than the total authorization usage time value, the mass production software tool MP then is arranged to execute other verification steps. - The mass production software tool MP in
Step 360 is arranged to obtain at least one of CPU ID, MAC address, hard disk serial number, and so on of theelectronic device 205 to calculate or derive corresponding unique information ofelectronic device 205. - Then in
Step 365 the mass production software tool MP determines whether any unique information recorded in the decrypted configuration file matches to the corresponding unique information of suchelectronic device 205. In practice, unique information recorded in the encrypted configuration file generated by the flash memory controller provider is a sequence of encoded/encrypted data having 16 Bytes (but not limited), and the corresponding unique information in the decrypted configuration file may comprise information of at least one of central processing unit identification (CPU ID), MAC address, a hard disk serial number, and so on for one valid/authorized device. The mass production software tool MP is arranged to retrieve the same type information of theelectronic device 205. For example, the mass production software tool MP retrieves the CPU ID, MAC address, and a hard disk serial number of theelectronic device 205. Then the mass production software tool MP compares the two sets of information to determine if the two sets of information are identical so as to decide whether theelectronic device 205 is such valid/authorized device. - If matched, the mass production software tool MP is arranged to start to execute the flash memory initialization, otherwise, the mass production software tool MP is arranged to decide that the flash memory initialization fails and close or deactivate its execution.
- For the flash memory execution, the mass production software tool MP in
Step 370 is arranged to send a command from theCPU 2051 to theflash memory controller 2101 via the bus,interface circuit 2053, and USB interface to control theflash memory controller 2101 to clear all system blocks of theflash memory 2102. For example, thecontroller 2101 clears the mapping of logical block addressing (LBA). - Then, the mass production software tool MP in
Step 375 controls thecontroller 2101 to perform a pretest operation to scan all blocks in theflash memory 2102. For example, for each block, thecontroller 2101 is arranged to scan the each block by writing data into the each block, then reading data from the each block, and then comparing the read data and written data so as to determine if the each block can be correctly accessed so as to decide whether the each block is a good block or a bad block. Thecontroller 2101 during the pretest operation is arranged to record a good/bad block result of the each block in theflash memory 2102. - The mass production software tool MP in
Step 380 controls thecontroller 2101 to establish corresponding table(s) comprising a good/bad block table, a page size table, a block number table, and/or other tables (but not limited). For example, thecontroller 2101 is arranged to collect all the good/bad block results recorded in theflash memory 2102 to generate and establish the good/bad block table that is then stored in theflash memory 2102. - Then, after the corresponding tables have been established and recorded in the
flash memory 2102, the mass production software tool MP inStep 385 transmits data of an ISP (In-System Programming) firmware via the USB interface to thecontroller 2101 which is arranged to transfer the ISP firmware into theflash memory 2102. The ISP firmware is used by thecontroller 2101 to access and manage theflash memory 2102. Then, thecontroller 2101 is restarted to identify, read, and use the ISP firmware stored or recorded in theflash memory 2102. - The mass production software tool MP in
Step 390 controls thecontroller 2101 to perform a format operation up on data blocks of theflash memory 2102 by sending a format command to thecontroller 2101 wherein the format command for example is a format command in Windows. After the format operation is completed, the flash memory initialization is successfully completed (Step 392), and the flow of flash memory initialization is ended. - In other embodiments, the method/process of the invention can verify whether an electronic device is a valid/authorized device by merely comparing the device unique information without comparing build date information with specific time information. The modification also falls within the scope of the invention. Additionally, in other embodiments, the order of the step of comparing the device's unique information can be exchanged with that of the step of comparing the build date information with the specific time information.
- In addition, based on the above description, it should be appreciated that various embodiments of the invention include a method, electronic device/apparatus, and computer-readable medium for formula-based document retention. The above specification, examples and data provide a complete description of the manufacture and use of the composition of the invention. Many embodiments of the invention can be made without departing from the spirit and scope of the invention.
- Those skilled in the art will readily observe that numerous modifications and alterations of the device and method may be made while retaining the teachings of the invention. Accordingly, the above disclosure should be construed as limited only by the metes and bounds of the appended claims.
Claims (6)
1. A method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory, the memory device is to be coupled to the electronic device via a USB interface, and the method comprises:
using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool;
decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices;
retrieving build date information from the temporarily decrypted configuration file;
comparing time information included within the build date information with specific time information to determine whether the build date information is out of date;
comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices when the build date information is not out of date; and
performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
2. The method of claim 1 , wherein the specific time information comprises at least one of a network clock time from Internet, a system clock time of the electronic device, and registry time information recorded in the electronic device.
3. A method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory, the memory device is to be coupled to the electronic device via a USB interface, and the method comprises:
using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool;
decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices;
comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices; and
performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
4. An electronic device for activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory, the memory device is to be coupled to the electronic device via a USB interface, and the electronic device comprises:
a memory, for storing the mass production software tool; and
a processing unit, coupled to the memory, for:
using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool;
decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices;
comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices; and
performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
5. An electronic device for activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory, the memory device is to be coupled to the electronic device via a USB interface, and the electronic device comprises:
a memory, for storing the mass production software tool; and
a processing unit, coupled to the memory, for:
using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool;
decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices;
retrieving build date information from the temporarily decrypted configuration file;
comparing time information included within the build date information with specific time information to determine whether the build date information is out of date;
comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices when the build date information is not out of date; and
performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
6. The electronic device of claim 5 , wherein the specific time information comprises at least one of a network clock time from Internet, a system clock time of the electronic device, and registry time information recorded in the electronic device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/481,322 US20220004638A1 (en) | 2019-08-14 | 2021-09-22 | Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/541,117 US11157624B2 (en) | 2019-08-14 | 2019-08-14 | Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory |
US17/481,322 US20220004638A1 (en) | 2019-08-14 | 2021-09-22 | Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/541,117 Continuation US11157624B2 (en) | 2019-08-14 | 2019-08-14 | Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory |
Publications (1)
Publication Number | Publication Date |
---|---|
US20220004638A1 true US20220004638A1 (en) | 2022-01-06 |
Family
ID=74567332
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/541,117 Active 2039-12-18 US11157624B2 (en) | 2019-08-14 | 2019-08-14 | Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory |
US17/481,322 Abandoned US20220004638A1 (en) | 2019-08-14 | 2021-09-22 | Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/541,117 Active 2039-12-18 US11157624B2 (en) | 2019-08-14 | 2019-08-14 | Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory |
Country Status (3)
Country | Link |
---|---|
US (2) | US11157624B2 (en) |
CN (1) | CN112394967B (en) |
TW (1) | TWI749523B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11157624B2 (en) * | 2019-08-14 | 2021-10-26 | Silicon Motion, Inc. | Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101068441A (en) * | 2007-06-25 | 2007-11-07 | 华为技术有限公司 | Permission identifying method, identification center and certification system |
US20150134534A1 (en) * | 2013-11-14 | 2015-05-14 | Clarence Edwin Lai | Software Protection Method for Preventing Unauthorized Usage |
US20150294093A1 (en) * | 2014-04-11 | 2015-10-15 | Canon Kabushiki Kaisha | Management system, information processing device, management server, control method therefor, and program |
US20180276067A1 (en) * | 2017-03-24 | 2018-09-27 | Phison Electronics Corp. | Data protecting method and memory storage device |
US20190097810A1 (en) * | 2017-09-28 | 2019-03-28 | Intel Corporation | System and method for reconfiguring and deploying soft stock-keeping units |
US20190317673A1 (en) * | 2018-04-11 | 2019-10-17 | Phison Electronics Corp. | Wear leveling method, memory control circuit unit and memory storage apparatus |
US20200272708A1 (en) * | 2019-02-22 | 2020-08-27 | Yokogawa Electric Corporation | Computer system, computer apparatus, and license management method |
US11157624B2 (en) * | 2019-08-14 | 2021-10-26 | Silicon Motion, Inc. | Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004030518A (en) | 2002-06-28 | 2004-01-29 | Murata Mach Ltd | Program data update method and data readout method of electronic device |
TW200536333A (en) * | 2004-02-09 | 2005-11-01 | Matsushita Electric Ind Co Ltd | License information management apparatus and license information management method |
US20080147964A1 (en) * | 2004-02-26 | 2008-06-19 | Chow David Q | Using various flash memory cells to build usb data flash cards with multiple partitions and autorun function |
US7272500B1 (en) * | 2004-03-25 | 2007-09-18 | Avaya Technology Corp. | Global positioning system hardware key for software licenses |
US7640424B2 (en) * | 2005-10-13 | 2009-12-29 | Sandisk Corporation | Initialization of flash storage via an embedded controller |
CN100487678C (en) * | 2006-08-23 | 2009-05-13 | 晶天电子(深圳)有限公司 | Electronic data flash memory card with flash memory controller |
US8452967B2 (en) * | 2007-08-31 | 2013-05-28 | Microsoft Corporation | Using flash storage device to prevent unauthorized use of software |
US8112682B2 (en) * | 2009-04-23 | 2012-02-07 | Sandisk Il Ltd | Method and device for bad-block testing |
CN102033820A (en) * | 2009-09-29 | 2011-04-27 | 北京爱国者存储科技有限责任公司 | Flash memory device and network authentication method thereof |
TWI448967B (en) | 2011-07-11 | 2014-08-11 | Wistron Neweb Corp | Updating method of software and computer readable medium |
US9767298B2 (en) * | 2012-01-12 | 2017-09-19 | Sony Corporation | Information storage device, information processing system, information processing method, and program |
US9128822B2 (en) * | 2012-06-22 | 2015-09-08 | Winbond Electronics Corporation | On-chip bad block management for NAND flash memory |
KR102188062B1 (en) * | 2014-02-28 | 2020-12-07 | 삼성전자 주식회사 | Method for operating data storage device and method for operating system having the device |
JP6314859B2 (en) | 2015-01-28 | 2018-04-25 | 株式会社デンソー | Electronic control device and software rewriting system |
US10372104B2 (en) * | 2015-02-27 | 2019-08-06 | Rockwell Automation Technologies, Inc. | Industrial automation control system content protection |
TWI550616B (en) * | 2015-07-03 | 2016-09-21 | 力晶科技股份有限公司 | Flash memory apparatus and initialization method for programming operation thereof |
US11216571B2 (en) * | 2017-02-13 | 2022-01-04 | Hewlett-Packard Development Company, L.P. | Credentialed encryption |
CN108877858B (en) * | 2017-05-10 | 2021-02-19 | 慧荣科技股份有限公司 | Storage device and refreshing method |
CN107169344B (en) | 2017-05-10 | 2020-04-21 | 威盛电子股份有限公司 | Method for blocking unauthorized application and apparatus using the same |
CN108304698B (en) * | 2018-01-25 | 2021-04-06 | 深圳市广和通无线股份有限公司 | Product authorized use method and device, computer equipment and storage medium |
US20190347383A1 (en) * | 2018-05-12 | 2019-11-14 | Ching-Ming Lai | Software Protection Method Based on A License File |
-
2019
- 2019-08-14 US US16/541,117 patent/US11157624B2/en active Active
-
2020
- 2020-04-15 TW TW109112599A patent/TWI749523B/en active
- 2020-06-08 CN CN202010513700.6A patent/CN112394967B/en active Active
-
2021
- 2021-09-22 US US17/481,322 patent/US20220004638A1/en not_active Abandoned
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101068441A (en) * | 2007-06-25 | 2007-11-07 | 华为技术有限公司 | Permission identifying method, identification center and certification system |
US20150134534A1 (en) * | 2013-11-14 | 2015-05-14 | Clarence Edwin Lai | Software Protection Method for Preventing Unauthorized Usage |
US20150294093A1 (en) * | 2014-04-11 | 2015-10-15 | Canon Kabushiki Kaisha | Management system, information processing device, management server, control method therefor, and program |
US20180276067A1 (en) * | 2017-03-24 | 2018-09-27 | Phison Electronics Corp. | Data protecting method and memory storage device |
US20190097810A1 (en) * | 2017-09-28 | 2019-03-28 | Intel Corporation | System and method for reconfiguring and deploying soft stock-keeping units |
US20190317673A1 (en) * | 2018-04-11 | 2019-10-17 | Phison Electronics Corp. | Wear leveling method, memory control circuit unit and memory storage apparatus |
US20200272708A1 (en) * | 2019-02-22 | 2020-08-27 | Yokogawa Electric Corporation | Computer system, computer apparatus, and license management method |
US11157624B2 (en) * | 2019-08-14 | 2021-10-26 | Silicon Motion, Inc. | Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory |
Also Published As
Publication number | Publication date |
---|---|
TWI749523B (en) | 2021-12-11 |
US11157624B2 (en) | 2021-10-26 |
US20210049278A1 (en) | 2021-02-18 |
TW202107322A (en) | 2021-02-16 |
CN112394967B (en) | 2023-08-08 |
CN112394967A (en) | 2021-02-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI667590B (en) | Data storage devices and methods for encrypting and updating firmware thereof | |
TW480443B (en) | Virus resistant and hardware independent method of flashing system BIOS | |
US9946661B2 (en) | Command executing method, memory controller and memory storage apparatus | |
US9678760B2 (en) | Memory card and storage system having authentication program and method for operating thereof | |
US8954705B2 (en) | Memory space management method and memory controller and memory storage device and memory storage using the same | |
TWI451248B (en) | Data protecting method, memory controller and memory storage apparatus | |
US8996933B2 (en) | Memory management method, controller, and storage system | |
US20130212368A1 (en) | Data protecting method, memory controller and memory storage device | |
JP7096829B2 (en) | How and system to verify data deletion process | |
US20110066818A1 (en) | Storage device, memory controller, and data protection method | |
US20220004638A1 (en) | Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory | |
US9575885B2 (en) | Data storage apparatus for scrambled data and management method thereof | |
US20130262748A1 (en) | Data protecting method, memory controller and memory storage device using the same | |
TWI493341B (en) | Memory storage device and repairing method thereof | |
TWI710906B (en) | Method and apparatus for performing access control between host device and memory device | |
TWI396090B (en) | Flash memory apparatus, data storage system, and method for sending special instructions to a flash memory apparatus | |
KR20210060867A (en) | Data storage device and operating method thereof | |
CN107168650B (en) | Method and device for processing data in memory of BIOS | |
TWI614684B (en) | Field firmware upgrading method and computer-readable medium | |
TWI841473B (en) | Method for performing configuration management of memory device in predetermined communications architecture with aid of electronic fuse data preparation, memory controller of memory device, memory device, electronic device, host device, and computer-readable medium | |
JP6999679B2 (en) | Data erasure method and equipment | |
KR20160017583A (en) | Memory card and storage system having authentication program and method for operating thereof | |
US9880831B2 (en) | Field firmware upgrading method and computer-readable medium | |
TWI817645B (en) | Method for performing communications specification version control of memory device in predetermined communications architecture with aid of compatibility management, memory device, electronic device, memory controller of memory device, and associated computer-readable medium | |
US20170185537A1 (en) | Data storage device and control method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |