US20220004638A1 - Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory - Google Patents

Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory Download PDF

Info

Publication number
US20220004638A1
US20220004638A1 US17/481,322 US202117481322A US2022004638A1 US 20220004638 A1 US20220004638 A1 US 20220004638A1 US 202117481322 A US202117481322 A US 202117481322A US 2022004638 A1 US2022004638 A1 US 2022004638A1
Authority
US
United States
Prior art keywords
flash memory
electronic device
mass production
software tool
authorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/481,322
Inventor
Shang-Ta Yang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Silicon Motion Inc
Original Assignee
Silicon Motion Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Silicon Motion Inc filed Critical Silicon Motion Inc
Priority to US17/481,322 priority Critical patent/US20220004638A1/en
Publication of US20220004638A1 publication Critical patent/US20220004638A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • G06F8/654Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/0223User address space allocation, e.g. contiguous or non contiguous base addressing
    • G06F12/023Free address space management
    • G06F12/0238Memory management in non-volatile memory, e.g. resistive RAM or ferroelectric memory
    • G06F12/0246Memory management in non-volatile memory, e.g. resistive RAM or ferroelectric memory in block erasable memory, e.g. flash memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/382Information transfer, e.g. on bus using universal interface adapter
    • G06F13/385Information transfer, e.g. on bus using universal interface adapter for adaptation of a particular data processing system to different peripheral devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2213/00Indexing scheme relating to interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F2213/0042Universal serial bus [USB]

Definitions

  • the invention relates to a flash memory initialization validation scheme, and more particularly to a scheme capable of avoiding other persons applying a flash memory mass production software tool in different operations/devices.
  • a flash memory manufacturer can easily get or obtain a mass production software tool provided by a flash memory controller provider.
  • the flash memory manufacturer may use the mass production software tool to perform various kinds of flash memory tests but does not use the controller provided by the flash memory controller provider. It is difficult for the controller provider to sell its controller products.
  • one of the objectives of the invention is to provide methods for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory, electronic devices, and corresponding computer readable mediums, to solve the above mentioned problems.
  • a method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory comprises: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; retrieving build date information from the temporarily decrypted configuration file; comparing time information included within the build date information with specific time information to determine whether the build date information is out of date; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices when the build date information is not out of date; and performing
  • a method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory comprises: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
  • CPU ID central processing unit identification
  • a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash
  • an electronic device for activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory is disclosed.
  • the memory device is to be coupled to the electronic device via a USB interface, and the electronic device comprises a memory for storing the mass production software tool and a processing unit coupled to the memory.
  • the processing unit is arranged for: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
  • CPU ID central processing unit identification
  • a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices
  • an electronic device for activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory is disclosed.
  • the memory device is to be coupled to the electronic device via a USB interface.
  • the electronic device comprises a memory for storing the mass production software tool and a processing unit coupled to the memory.
  • the processing unit is arranged for: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; retrieving build date information from the temporarily decrypted configuration file; comparing time information included within the build date information with specific time information to determine whether the build date information is out of date; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices when the build date information is not out of date; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
  • CPU ID central processing unit identification
  • a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded
  • FIG. 1 is an overview system diagram showing a relation between multiple flash memory initialization devices PC_ 1 ⁇ PC_N of a flash memory manufacturer and a flash memory controller provider which is arranged to provide a mass production software tool MP for the flash memory manufacturer according to an embodiment of the invention.
  • FIG. 2 is a diagram of an electronic device for performing a flash memory initialization operation upon a memory device according to an embodiment of the invention.
  • FIG. 3 is a diagram of a first part of a flowchart of a method/process executed by the mass production software tool MP to verify whether an electronic device is a valid flash memory initialization device so as to decide whether to initialize a memory device including a flash memory controller and a flash memory according to the embodiment of FIG. 2 .
  • FIG. 4 is a diagram of a second part of a flowchart of a method/process executed by the mass production software tool MP to verify whether an electronic device is a valid flash memory initialization device so as to decide whether to initialize a memory device including a flash memory controller and a flash memory according to the embodiment of FIG. 2 .
  • FIG. 1 is an overview system diagram showing a relation between multiple flash memory initialization devices PC_ 1 ⁇ PC_N of a flash memory manufacturer 105 and a flash memory controller provider 110 which is arranged to provide a mass production software tool MP for the flash memory manufacturer 105 according to an embodiment of the invention.
  • the flash memory initialization devices PC_ 1 ⁇ PC_N such as personal computers are respectively used by the flash memory manufacturer 105 in a factory to initialize memory devices each including a flash memory controller and a flash memory.
  • each flash memory initialization device of the flash memory manufacturer 105 needs to get authorization of the mass production software tool MP provided from the flash memory controller provider 110 .
  • the flash memory controller provider 110 authorizes N electronic devices of the manufacturer 105 as valid flash memory initialization devices and provides a small application software tool AP for the flash memory manufacturer 105 wherein the small application software tool AP is arranged to collect and generate corresponding unique information of each electronic device which executes such tool AP. Then, the flash memory controller provider 110 is arranged to ask the flash memory manufacturer 105 to return the corresponding unique information of all the authorized/valid electronic devices back to the flash memory controller provider 110 .
  • the flash memory controller provider 110 may receive the corresponding unique information INFO_ 1 ⁇ INFO_N of the N electronic devices PC_ 1 ⁇ PC_N, and then is arranged to encrypt or encode the corresponding unique information INFO_ 1 ⁇ INFO_N of the N electronic devices PC_ 1 ⁇ PC_N to generate an encrypted/encoded configuration file which is to be packaged in the mass production software tool MP.
  • the flash memory controller provider 110 For each of the corresponding unique information INFO_ 1 ⁇ INFO_N, the flash memory controller provider 110 generates a build date so as to finally generate build date information of corresponding unique information INFO_ 1 ⁇ INFO_N.
  • the flash memory controller provider 110 then provides the mass production software tool MP including the encrypted/encoded configuration file for the flash memory manufacturer 105 .
  • the encrypted/encoded configuration file cannot be easily cracked by the flash memory manufacturer 105 or other persons, and is used to verify whether an electronic device is used as a valid flash memory initialization device for initializing a memory device including a flash memory controller and a flash memory.
  • the flash memory manufacturer 105 After receiving the mass production software tool MP from the flash memory controller provider 110 , the flash memory manufacturer 105 is arranged to active and execute the mass production software tool MP on its initialization devices to initialize memory devices.
  • FIG. 2 is a diagram of an electronic device 205 for performing a flash memory initialization operation upon a memory device 210 according to an embodiment of the invention.
  • the electronic device 205 for example is one of the flash memory initialization devices PC_ 1 ⁇ PC_N of flash memory manufacturer 105 , and it comprises a CPU 2051 , a memory 2052 , and an interface circuit 2053 wherein the bus is connected between the CPU 2051 , memory 2052 , and interface circuit 2053 to transfer data/signals/commands.
  • the memory 2052 for example is a random access memory to store the mass production software tool MP.
  • the memory device 210 for example is a thumb drive, a pen drive, a memory card such as SD card, a stick, a disk, an SSD (solid state drive) which can electrically connect to the electronic device 205 via the USB interface; however, this is not intended to be a limitation.
  • the memory device 210 for example is a USB flash device (UFD) and comprises the flash memory controller 2101 and the flash memory 2102 .
  • FIG. 3 and FIG. 4 show a flowchart of a method/process executed by the mass production software tool MP to verify whether an electronic device is a valid flash memory initialization device so as to decide whether to initialize a memory device including a flash memory controller and a flash memory according to the embodiment of FIG. 2 .
  • the detailed description of steps is described in the following
  • Step 305 Start;
  • Step 310 A user such as an operator of the manufacturer manually activates or starts the mass production software tool MP to run the mass production software tool MP on the CPU 2051 of electronic device 205 ;
  • Step 315 the mass production software tool MP retrieves or loads its encrypted configuration file
  • Step 320 the mass production software tool MP decrypts the encrypted configuration file to generate a temporarily decrypted configuration file
  • Step 325 the mass production software tool MP retrieves and loads build date information from the temporarily decrypted configuration file
  • Step 330 the mass production software tool MP retrieves or obtains a network clock time from the Internet and a system clock time of the electronic device 205 ;
  • Step 335 the mass production software tool MP determines whether the electronic device 205 is connected to the Internet; if the electronic device 205 is connected to the Internet, the flow proceeds to Step 340 A, otherwise, the flow proceeds to Step 340 B;
  • Step 340 A the mass production software tool MP compares the build date information with the network clock time to decide whether the build date information is out of date; if the build date information is out of date, the flow proceeds to Step 345 , otherwise, the flow proceeds to Step 350 ;
  • Step 340 B the mass production software tool MP compares the build date information with the system clock time to decide whether the build date information is out of date; if the build date information is out of date, the flow proceeds to Step 345 , otherwise, the flow proceeds to Step 350 ;
  • Step 345 Close the mass production software tool MP, i.e. not executing the mass production software tool MP;
  • Step 350 the mass production software tool MP retrieves registry time information recorded in the electronic device 205 ; the registry time information for example is stored in the memory 2052 ;
  • Step 355 the mass production software tool MP compares the build date information with the registry time information to decide whether the build date information is out of date; if the build date information is out of date, the flow proceeds to Step 345 , otherwise, the flow proceeds to Step 360 ;
  • Step 360 the mass production software tool MP obtains corresponding unique information of such electronic device 205 ;
  • Step 365 the mass production software tool MP compares the corresponding unique information of electronic device 205 with information of the decrypted/decoded configuration file to decide whether the corresponding unique information of electronic device 205 exists in the decrypted/decoded configuration file; if yes, the flow proceeds to Step 370 , otherwise, the flow proceeds to Step 345 ;
  • Step 370 clear system blocks of the flash memory 2102 ;
  • Step 375 perform pretest upon all blocks of the flash memory 2102 ;
  • Step 380 establish information tables
  • Step 385 download ISP firmware from the electronic device 205 to the flash memory 2102 via the USB interface;
  • Step 390 perform format operation upon data blocks of the flash memory 2102 ;
  • Step 392 Complete the execution of the mass production software tool MP and save/record a total usage time at the registry time information
  • Step 394 End.
  • the encrypted configuration file of the mass production software tool MP is implemented by using the INI file format which is an informal standard for configuration files for some computing platforms or software programs.
  • the encrypted configuration file is not easily cracked by other persons or by a flash memory manufacturer.
  • the build date information and information of the encrypted/encoded configuration file is not easily modified.
  • the mass production software tool MP is arranged to load its encrypted configuration file (Step 315 ) and then decrypts such file to generate the temporarily decrypted configuration file (Step 320 ).
  • the mass production software tool MP can obtain corresponding unique information of one or more valid/authorized electronic devices PC_ 1 ⁇ PC_N of the manufacturer 105 and corresponding build date information associated with the unique information.
  • Corresponding unique information of each valid/authorized electronic device for example comprises at least one of central processing unit identification (CPU ID), MAC address, and a hard disk serial number (but not limited).
  • the mass production software tool MP in Step 325 loads the build date information of all valid/authorized electronic devices and in Step 330 tries to obtain a network clock time from the Internet and a system clock time of the electronic device 205 . Then in Step 335 the mass production software tool MP determines whether the electronic device 205 can be connected to the Internet.
  • the mass production software tool MP in Step 340 A determines whether the authorization for the manufacturer 105 is out of date or not by comparing the build date information with the network clock time from the internet to decide whether the build date information is out of date. If the build date information is out of date, the mass production software tool MP decides that the authorization for the electronic device 205 is out of date. In practice, for example, the mass production software tool MP decides whether the electronic device 205 is connected to the Internet, and then compares the build date information with a date of the network clock time to decide whether an interval between the build date information and the network clock time is longer than an authorized time interval such as three months if the electronic device is currently connected to Internet.
  • the mass production software tool MP will finish and will not execute the initialization of the flash memory device 210 . Instead, if the time interval is shorter than the authorized time interval, the mass production software tool MP is arranged to execute other verification steps.
  • the mass production software tool MP in Step 340 B determines whether the authorization for the manufacturer 105 is out of date or not by comparing the build date information with the system clock time of electronic device 205 itself to decide whether the build date information is out of date. If the build date information is out of date, the mass production software tool MP decides that the authorization for the electronic device 205 is out of date. In practice, for example, the mass production software tool MP decides whether the electronic device 205 is connected to the Internet, and then compares the build date information with a date of the system clock time to decide whether an interval between the build date information and the system clock time is longer than an authorized time interval such as three months if the electronic device 205 cannot be connected to Internet.
  • the mass production software tool MP will finish and will not execute the initialization of the flash memory device 210 . Instead, if the time interval is shorter than the authorized time interval, the mass production software tool MP is arranged to execute other verification steps.
  • the mass production software tool MP in Step 350 is arranged to retrieve the registry information from the electronic device 205 so as to obtain registry date information which is arranged to record or mark the total usage time of the mass production software tool MP executed by of such electronic device 205 if the electronic device 205 has been authorized.
  • the registry date information may record the total hours or total minutes which have been consumed by the execution of the mass production software tool MP on the electronic device 205 if the electronic device 205 has been authorized.
  • content of the registry date information is empty.
  • the mass production software tool MP After being activated may record a first time and record a second time when being closed/deactivated (or the execution of tool MP is completed), and the tool MP calculates how many hours/minutes consumed by the tool MP for the first time execution on the electronic device based on the first time and second time to derive and obtain a first value in hours. Then the tool MP updates the registry date information as the calculated first value.
  • the mass production software tool MP after being activated also records a first time and records a second time when being closed/deactivated (or the execution of tool MP is completed), and the tool MP calculates how many hours/minutes consumed by the tool MP for the second time execution on the electronic device 205 based on the first time and second time to derive and obtain a second value in hours. Then the tool MP updates the registry date information as the calculated second value plus the first value. The registry date information is accumulated.
  • the mass production software tool MP in Step 355 is arranged to determine whether the value currently recorded at the registry date information is greater than a total authorization usage time value (in hours/minutes) corresponding to the build date information so as to further determine whether the build date information is out of date or not. If the value currently recorded at the registry date information is greater than the total authorization usage time value such as a value of 150 (i.e. 150 hours, but not limited), the mass production software tool MP is arranged to close or deactivate itself execution. If the value currently recorded at the registry date information is smaller than the total authorization usage time value, the mass production software tool MP then is arranged to execute other verification steps.
  • a total authorization usage time value in hours/minutes
  • the mass production software tool MP in Step 360 is arranged to obtain at least one of CPU ID, MAC address, hard disk serial number, and so on of the electronic device 205 to calculate or derive corresponding unique information of electronic device 205 .
  • Step 365 the mass production software tool MP determines whether any unique information recorded in the decrypted configuration file matches to the corresponding unique information of such electronic device 205 .
  • unique information recorded in the encrypted configuration file generated by the flash memory controller provider is a sequence of encoded/encrypted data having 16 Bytes (but not limited), and the corresponding unique information in the decrypted configuration file may comprise information of at least one of central processing unit identification (CPU ID), MAC address, a hard disk serial number, and so on for one valid/authorized device.
  • CPU ID central processing unit identification
  • MAC address MAC address
  • a hard disk serial number a hard disk serial number
  • the mass production software tool MP is arranged to retrieve the same type information of the electronic device 205 . For example, the mass production software tool MP retrieves the CPU ID, MAC address, and a hard disk serial number of the electronic device 205 . Then the mass production software tool MP compares the two sets of information to determine if the two sets of information are identical so as to decide whether the electronic device
  • the mass production software tool MP is arranged to start to execute the flash memory initialization, otherwise, the mass production software tool MP is arranged to decide that the flash memory initialization fails and close or deactivate its execution.
  • the mass production software tool MP in Step 370 is arranged to send a command from the CPU 2051 to the flash memory controller 2101 via the bus, interface circuit 2053 , and USB interface to control the flash memory controller 2101 to clear all system blocks of the flash memory 2102 .
  • the controller 2101 clears the mapping of logical block addressing (LBA).
  • the mass production software tool MP in Step 375 controls the controller 2101 to perform a pretest operation to scan all blocks in the flash memory 2102 .
  • the controller 2101 is arranged to scan the each block by writing data into the each block, then reading data from the each block, and then comparing the read data and written data so as to determine if the each block can be correctly accessed so as to decide whether the each block is a good block or a bad block.
  • the controller 2101 during the pretest operation is arranged to record a good/bad block result of the each block in the flash memory 2102 .
  • the mass production software tool MP in Step 380 controls the controller 2101 to establish corresponding table(s) comprising a good/bad block table, a page size table, a block number table, and/or other tables (but not limited).
  • the controller 2101 is arranged to collect all the good/bad block results recorded in the flash memory 2102 to generate and establish the good/bad block table that is then stored in the flash memory 2102 .
  • the mass production software tool MP in Step 385 transmits data of an ISP (In-System Programming) firmware via the USB interface to the controller 2101 which is arranged to transfer the ISP firmware into the flash memory 2102 .
  • the ISP firmware is used by the controller 2101 to access and manage the flash memory 2102 .
  • the controller 2101 is restarted to identify, read, and use the ISP firmware stored or recorded in the flash memory 2102 .
  • the mass production software tool MP in Step 390 controls the controller 2101 to perform a format operation up on data blocks of the flash memory 2102 by sending a format command to the controller 2101 wherein the format command for example is a format command in Windows.
  • the flash memory initialization is successfully completed (Step 392 ), and the flow of flash memory initialization is ended.
  • the method/process of the invention can verify whether an electronic device is a valid/authorized device by merely comparing the device unique information without comparing build date information with specific time information.
  • the modification also falls within the scope of the invention.
  • the order of the step of comparing the device's unique information can be exchanged with that of the step of comparing the build date information with the specific time information.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Techniques For Improving Reliability Of Storages (AREA)
  • Stored Programmes (AREA)

Abstract

A method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory includes: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file; comparing unique information of the electronic device with unique information recorded in the temporarily decrypted configuration file to determine whether the electronic device is valid/authorized; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation application of U.S. application Ser. No. 16/541,117, filed on 2019 Aug. 14, the contents of which are incorporated herein by reference.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The invention relates to a flash memory initialization validation scheme, and more particularly to a scheme capable of avoiding other persons applying a flash memory mass production software tool in different operations/devices.
  • 2. Description of the Prior Art
  • Generally speaking, a flash memory manufacturer can easily get or obtain a mass production software tool provided by a flash memory controller provider. The flash memory manufacturer may use the mass production software tool to perform various kinds of flash memory tests but does not use the controller provided by the flash memory controller provider. It is difficult for the controller provider to sell its controller products. Thus, it is important to provide a novel protection solution to bind the mass production software tool with authorized/valid devices of the manufacturer and a validation process to check whether an electronic device (e.g. a computer) is authorized.
  • SUMMARY OF THE INVENTION
  • Therefore one of the objectives of the invention is to provide methods for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory, electronic devices, and corresponding computer readable mediums, to solve the above mentioned problems.
  • According to embodiments of the invention, a method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory is disclosed. The memory device is to be coupled to the electronic device via a USB interface, and the method comprises: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; retrieving build date information from the temporarily decrypted configuration file; comparing time information included within the build date information with specific time information to determine whether the build date information is out of date; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices when the build date information is not out of date; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
  • According to the embodiments, a method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory is disclosed. The memory device is to be coupled to the electronic device via a USB interface, and the method comprises: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
  • According to the embodiments, an electronic device for activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory is disclosed. The memory device is to be coupled to the electronic device via a USB interface, and the electronic device comprises a memory for storing the mass production software tool and a processing unit coupled to the memory. The processing unit is arranged for: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
  • According to the embodiments, an electronic device for activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory is disclosed. The memory device is to be coupled to the electronic device via a USB interface. The electronic device comprises a memory for storing the mass production software tool and a processing unit coupled to the memory. The processing unit is arranged for: using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool; decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices; retrieving build date information from the temporarily decrypted configuration file; comparing time information included within the build date information with specific time information to determine whether the build date information is out of date; comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices when the build date information is not out of date; and performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
  • These and other objectives of the present invention will no doubt become obvious to those of ordinary skill in the art after reading the following detailed description of the preferred embodiment that is illustrated in the various figures and drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is an overview system diagram showing a relation between multiple flash memory initialization devices PC_1˜PC_N of a flash memory manufacturer and a flash memory controller provider which is arranged to provide a mass production software tool MP for the flash memory manufacturer according to an embodiment of the invention.
  • FIG. 2 is a diagram of an electronic device for performing a flash memory initialization operation upon a memory device according to an embodiment of the invention.
  • FIG. 3 is a diagram of a first part of a flowchart of a method/process executed by the mass production software tool MP to verify whether an electronic device is a valid flash memory initialization device so as to decide whether to initialize a memory device including a flash memory controller and a flash memory according to the embodiment of FIG. 2.
  • FIG. 4 is a diagram of a second part of a flowchart of a method/process executed by the mass production software tool MP to verify whether an electronic device is a valid flash memory initialization device so as to decide whether to initialize a memory device including a flash memory controller and a flash memory according to the embodiment of FIG. 2.
  • DETAILED DESCRIPTION
  • FIG. 1 is an overview system diagram showing a relation between multiple flash memory initialization devices PC_1˜PC_N of a flash memory manufacturer 105 and a flash memory controller provider 110 which is arranged to provide a mass production software tool MP for the flash memory manufacturer 105 according to an embodiment of the invention.
  • As shown in FIG. 1, the flash memory initialization devices PC_1˜PC_N such as personal computers are respectively used by the flash memory manufacturer 105 in a factory to initialize memory devices each including a flash memory controller and a flash memory. To successfully initialize memory devices, each flash memory initialization device of the flash memory manufacturer 105 needs to get authorization of the mass production software tool MP provided from the flash memory controller provider 110.
  • For example, the flash memory controller provider 110 authorizes N electronic devices of the manufacturer 105 as valid flash memory initialization devices and provides a small application software tool AP for the flash memory manufacturer 105 wherein the small application software tool AP is arranged to collect and generate corresponding unique information of each electronic device which executes such tool AP. Then, the flash memory controller provider 110 is arranged to ask the flash memory manufacturer 105 to return the corresponding unique information of all the authorized/valid electronic devices back to the flash memory controller provider 110. In this example, the flash memory controller provider 110 may receive the corresponding unique information INFO_1˜INFO_N of the N electronic devices PC_1˜PC_N, and then is arranged to encrypt or encode the corresponding unique information INFO_1˜INFO_N of the N electronic devices PC_1˜PC_N to generate an encrypted/encoded configuration file which is to be packaged in the mass production software tool MP. In addition, for each of the corresponding unique information INFO_1˜INFO_N, the flash memory controller provider 110 generates a build date so as to finally generate build date information of corresponding unique information INFO_1˜INFO_N. The smallest record unit of one build date may be hours (but not limited), and different electronic devices PC_1˜PC_N may record partially identical/different date information. The flash memory controller provider 110 then provides the mass production software tool MP including the encrypted/encoded configuration file for the flash memory manufacturer 105. The encrypted/encoded configuration file cannot be easily cracked by the flash memory manufacturer 105 or other persons, and is used to verify whether an electronic device is used as a valid flash memory initialization device for initializing a memory device including a flash memory controller and a flash memory. After receiving the mass production software tool MP from the flash memory controller provider 110, the flash memory manufacturer 105 is arranged to active and execute the mass production software tool MP on its initialization devices to initialize memory devices.
  • FIG. 2 is a diagram of an electronic device 205 for performing a flash memory initialization operation upon a memory device 210 according to an embodiment of the invention. The electronic device 205 for example is one of the flash memory initialization devices PC_1˜PC_N of flash memory manufacturer 105, and it comprises a CPU 2051, a memory 2052, and an interface circuit 2053 wherein the bus is connected between the CPU 2051, memory 2052, and interface circuit 2053 to transfer data/signals/commands. The memory 2052 for example is a random access memory to store the mass production software tool MP. The memory device 210 for example is a thumb drive, a pen drive, a memory card such as SD card, a stick, a disk, an SSD (solid state drive) which can electrically connect to the electronic device 205 via the USB interface; however, this is not intended to be a limitation. The memory device 210 for example is a USB flash device (UFD) and comprises the flash memory controller 2101 and the flash memory 2102.
  • FIG. 3 and FIG. 4 show a flowchart of a method/process executed by the mass production software tool MP to verify whether an electronic device is a valid flash memory initialization device so as to decide whether to initialize a memory device including a flash memory controller and a flash memory according to the embodiment of FIG. 2. The detailed description of steps is described in the following
  • Step 305: Start;
  • Step 310: A user such as an operator of the manufacturer manually activates or starts the mass production software tool MP to run the mass production software tool MP on the CPU 2051 of electronic device 205;
  • Step 315: the mass production software tool MP retrieves or loads its encrypted configuration file;
  • Step 320: the mass production software tool MP decrypts the encrypted configuration file to generate a temporarily decrypted configuration file;
  • Step 325: the mass production software tool MP retrieves and loads build date information from the temporarily decrypted configuration file;
  • Step 330: the mass production software tool MP retrieves or obtains a network clock time from the Internet and a system clock time of the electronic device 205;
  • Step 335: the mass production software tool MP determines whether the electronic device 205 is connected to the Internet; if the electronic device 205 is connected to the Internet, the flow proceeds to Step 340A, otherwise, the flow proceeds to Step 340B;
  • Step 340A: the mass production software tool MP compares the build date information with the network clock time to decide whether the build date information is out of date; if the build date information is out of date, the flow proceeds to Step 345, otherwise, the flow proceeds to Step 350;
  • Step 340B: the mass production software tool MP compares the build date information with the system clock time to decide whether the build date information is out of date; if the build date information is out of date, the flow proceeds to Step 345, otherwise, the flow proceeds to Step 350;
  • Step 345: Close the mass production software tool MP, i.e. not executing the mass production software tool MP;
  • Step 350: the mass production software tool MP retrieves registry time information recorded in the electronic device 205; the registry time information for example is stored in the memory 2052;
  • Step 355: the mass production software tool MP compares the build date information with the registry time information to decide whether the build date information is out of date; if the build date information is out of date, the flow proceeds to Step 345, otherwise, the flow proceeds to Step 360;
  • Step 360: the mass production software tool MP obtains corresponding unique information of such electronic device 205;
  • Step 365: the mass production software tool MP compares the corresponding unique information of electronic device 205 with information of the decrypted/decoded configuration file to decide whether the corresponding unique information of electronic device 205 exists in the decrypted/decoded configuration file; if yes, the flow proceeds to Step 370, otherwise, the flow proceeds to Step 345;
  • Step 370: clear system blocks of the flash memory 2102;
  • Step 375: perform pretest upon all blocks of the flash memory 2102;
  • Step 380: establish information tables;
  • Step 385: download ISP firmware from the electronic device 205 to the flash memory 2102 via the USB interface;
  • Step 390: perform format operation upon data blocks of the flash memory 2102;
  • Step 392: Complete the execution of the mass production software tool MP and save/record a total usage time at the registry time information; and
  • Step 394: End.
  • For example, the encrypted configuration file of the mass production software tool MP is implemented by using the INI file format which is an informal standard for configuration files for some computing platforms or software programs. The encrypted configuration file is not easily cracked by other persons or by a flash memory manufacturer. Thus, the build date information and information of the encrypted/encoded configuration file is not easily modified.
  • After the mass production software tool MP is manually activated by the user (Step 310) to run the mass production software tool MP on the CPU 2051, the mass production software tool MP is arranged to load its encrypted configuration file (Step 315) and then decrypts such file to generate the temporarily decrypted configuration file (Step 320). Form the temporarily decrypted configuration file, the mass production software tool MP can obtain corresponding unique information of one or more valid/authorized electronic devices PC_1˜PC_N of the manufacturer 105 and corresponding build date information associated with the unique information. Corresponding unique information of each valid/authorized electronic device for example comprises at least one of central processing unit identification (CPU ID), MAC address, and a hard disk serial number (but not limited).
  • The mass production software tool MP in Step 325 loads the build date information of all valid/authorized electronic devices and in Step 330 tries to obtain a network clock time from the Internet and a system clock time of the electronic device 205. Then in Step 335 the mass production software tool MP determines whether the electronic device 205 can be connected to the Internet.
  • The mass production software tool MP in Step 340A determines whether the authorization for the manufacturer 105 is out of date or not by comparing the build date information with the network clock time from the internet to decide whether the build date information is out of date. If the build date information is out of date, the mass production software tool MP decides that the authorization for the electronic device 205 is out of date. In practice, for example, the mass production software tool MP decides whether the electronic device 205 is connected to the Internet, and then compares the build date information with a date of the network clock time to decide whether an interval between the build date information and the network clock time is longer than an authorized time interval such as three months if the electronic device is currently connected to Internet. If such time interval is longer than the authorized time interval, the mass production software tool MP will finish and will not execute the initialization of the flash memory device 210. Instead, if the time interval is shorter than the authorized time interval, the mass production software tool MP is arranged to execute other verification steps.
  • Similarly, the mass production software tool MP in Step 340B determines whether the authorization for the manufacturer 105 is out of date or not by comparing the build date information with the system clock time of electronic device 205 itself to decide whether the build date information is out of date. If the build date information is out of date, the mass production software tool MP decides that the authorization for the electronic device 205 is out of date. In practice, for example, the mass production software tool MP decides whether the electronic device 205 is connected to the Internet, and then compares the build date information with a date of the system clock time to decide whether an interval between the build date information and the system clock time is longer than an authorized time interval such as three months if the electronic device 205 cannot be connected to Internet. If such time interval is longer than the authorized time interval, the mass production software tool MP will finish and will not execute the initialization of the flash memory device 210. Instead, if the time interval is shorter than the authorized time interval, the mass production software tool MP is arranged to execute other verification steps.
  • The mass production software tool MP in Step 350 is arranged to retrieve the registry information from the electronic device 205 so as to obtain registry date information which is arranged to record or mark the total usage time of the mass production software tool MP executed by of such electronic device 205 if the electronic device 205 has been authorized. For example, the registry date information may record the total hours or total minutes which have been consumed by the execution of the mass production software tool MP on the electronic device 205 if the electronic device 205 has been authorized. In practice, before the mass production software tool MP is executed on the electronic device 205 for the first time, content of the registry date information is empty. For the first time execution of the tool MP, the mass production software tool MP after being activated may record a first time and record a second time when being closed/deactivated (or the execution of tool MP is completed), and the tool MP calculates how many hours/minutes consumed by the tool MP for the first time execution on the electronic device based on the first time and second time to derive and obtain a first value in hours. Then the tool MP updates the registry date information as the calculated first value.
  • For the second time execution, the mass production software tool MP after being activated also records a first time and records a second time when being closed/deactivated (or the execution of tool MP is completed), and the tool MP calculates how many hours/minutes consumed by the tool MP for the second time execution on the electronic device 205 based on the first time and second time to derive and obtain a second value in hours. Then the tool MP updates the registry date information as the calculated second value plus the first value. The registry date information is accumulated.
  • The mass production software tool MP in Step 355 is arranged to determine whether the value currently recorded at the registry date information is greater than a total authorization usage time value (in hours/minutes) corresponding to the build date information so as to further determine whether the build date information is out of date or not. If the value currently recorded at the registry date information is greater than the total authorization usage time value such as a value of 150 (i.e. 150 hours, but not limited), the mass production software tool MP is arranged to close or deactivate itself execution. If the value currently recorded at the registry date information is smaller than the total authorization usage time value, the mass production software tool MP then is arranged to execute other verification steps.
  • The mass production software tool MP in Step 360 is arranged to obtain at least one of CPU ID, MAC address, hard disk serial number, and so on of the electronic device 205 to calculate or derive corresponding unique information of electronic device 205.
  • Then in Step 365 the mass production software tool MP determines whether any unique information recorded in the decrypted configuration file matches to the corresponding unique information of such electronic device 205. In practice, unique information recorded in the encrypted configuration file generated by the flash memory controller provider is a sequence of encoded/encrypted data having 16 Bytes (but not limited), and the corresponding unique information in the decrypted configuration file may comprise information of at least one of central processing unit identification (CPU ID), MAC address, a hard disk serial number, and so on for one valid/authorized device. The mass production software tool MP is arranged to retrieve the same type information of the electronic device 205. For example, the mass production software tool MP retrieves the CPU ID, MAC address, and a hard disk serial number of the electronic device 205. Then the mass production software tool MP compares the two sets of information to determine if the two sets of information are identical so as to decide whether the electronic device 205 is such valid/authorized device.
  • If matched, the mass production software tool MP is arranged to start to execute the flash memory initialization, otherwise, the mass production software tool MP is arranged to decide that the flash memory initialization fails and close or deactivate its execution.
  • For the flash memory execution, the mass production software tool MP in Step 370 is arranged to send a command from the CPU 2051 to the flash memory controller 2101 via the bus, interface circuit 2053, and USB interface to control the flash memory controller 2101 to clear all system blocks of the flash memory 2102. For example, the controller 2101 clears the mapping of logical block addressing (LBA).
  • Then, the mass production software tool MP in Step 375 controls the controller 2101 to perform a pretest operation to scan all blocks in the flash memory 2102. For example, for each block, the controller 2101 is arranged to scan the each block by writing data into the each block, then reading data from the each block, and then comparing the read data and written data so as to determine if the each block can be correctly accessed so as to decide whether the each block is a good block or a bad block. The controller 2101 during the pretest operation is arranged to record a good/bad block result of the each block in the flash memory 2102.
  • The mass production software tool MP in Step 380 controls the controller 2101 to establish corresponding table(s) comprising a good/bad block table, a page size table, a block number table, and/or other tables (but not limited). For example, the controller 2101 is arranged to collect all the good/bad block results recorded in the flash memory 2102 to generate and establish the good/bad block table that is then stored in the flash memory 2102.
  • Then, after the corresponding tables have been established and recorded in the flash memory 2102, the mass production software tool MP in Step 385 transmits data of an ISP (In-System Programming) firmware via the USB interface to the controller 2101 which is arranged to transfer the ISP firmware into the flash memory 2102. The ISP firmware is used by the controller 2101 to access and manage the flash memory 2102. Then, the controller 2101 is restarted to identify, read, and use the ISP firmware stored or recorded in the flash memory 2102.
  • The mass production software tool MP in Step 390 controls the controller 2101 to perform a format operation up on data blocks of the flash memory 2102 by sending a format command to the controller 2101 wherein the format command for example is a format command in Windows. After the format operation is completed, the flash memory initialization is successfully completed (Step 392), and the flow of flash memory initialization is ended.
  • In other embodiments, the method/process of the invention can verify whether an electronic device is a valid/authorized device by merely comparing the device unique information without comparing build date information with specific time information. The modification also falls within the scope of the invention. Additionally, in other embodiments, the order of the step of comparing the device's unique information can be exchanged with that of the step of comparing the build date information with the specific time information.
  • In addition, based on the above description, it should be appreciated that various embodiments of the invention include a method, electronic device/apparatus, and computer-readable medium for formula-based document retention. The above specification, examples and data provide a complete description of the manufacture and use of the composition of the invention. Many embodiments of the invention can be made without departing from the spirit and scope of the invention.
  • Those skilled in the art will readily observe that numerous modifications and alterations of the device and method may be made while retaining the teachings of the invention. Accordingly, the above disclosure should be construed as limited only by the metes and bounds of the appended claims.

Claims (6)

What is claimed is:
1. A method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory, the memory device is to be coupled to the electronic device via a USB interface, and the method comprises:
using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool;
decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices;
retrieving build date information from the temporarily decrypted configuration file;
comparing time information included within the build date information with specific time information to determine whether the build date information is out of date;
comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices when the build date information is not out of date; and
performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
2. The method of claim 1, wherein the specific time information comprises at least one of a network clock time from Internet, a system clock time of the electronic device, and registry time information recorded in the electronic device.
3. A method for using an electronic device to activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory, the memory device is to be coupled to the electronic device via a USB interface, and the method comprises:
using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool;
decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices;
comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices; and
performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
4. An electronic device for activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory, the memory device is to be coupled to the electronic device via a USB interface, and the electronic device comprises:
a memory, for storing the mass production software tool; and
a processing unit, coupled to the memory, for:
using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool;
decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices;
comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices; and
performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
5. An electronic device for activate a mass production software tool to initialize a memory device including a flash memory controller and a flash memory, the memory device is to be coupled to the electronic device via a USB interface, and the electronic device comprises:
a memory, for storing the mass production software tool; and
a processing unit, coupled to the memory, for:
using the mass production software tool to retrieve an encrypted configuration file included by the mass production software tool;
decrypting the encrypted configuration file to generate a temporarily decrypted configuration file which records unique information of multiple valid/authorized flash memory initialization devices;
retrieving build date information from the temporarily decrypted configuration file;
comparing time information included within the build date information with specific time information to determine whether the build date information is out of date;
comparing a central processing unit identification (CPU ID) or a hard disk serial number of the electronic device with the unique information of the multiple valid/authorized flash memory initialization devices recorded in the temporarily decrypted configuration file to determine whether the electronic device is a valid/authorized flash memory initialization device in the multiple valid/authorized flash memory initialization devices when the build date information is not out of date; and
performing a flash memory initialization operation upon the flash memory when the electronic device is valid/authorized.
6. The electronic device of claim 5, wherein the specific time information comprises at least one of a network clock time from Internet, a system clock time of the electronic device, and registry time information recorded in the electronic device.
US17/481,322 2019-08-14 2021-09-22 Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory Abandoned US20220004638A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/481,322 US20220004638A1 (en) 2019-08-14 2021-09-22 Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US16/541,117 US11157624B2 (en) 2019-08-14 2019-08-14 Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory
US17/481,322 US20220004638A1 (en) 2019-08-14 2021-09-22 Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US16/541,117 Continuation US11157624B2 (en) 2019-08-14 2019-08-14 Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory

Publications (1)

Publication Number Publication Date
US20220004638A1 true US20220004638A1 (en) 2022-01-06

Family

ID=74567332

Family Applications (2)

Application Number Title Priority Date Filing Date
US16/541,117 Active 2039-12-18 US11157624B2 (en) 2019-08-14 2019-08-14 Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory
US17/481,322 Abandoned US20220004638A1 (en) 2019-08-14 2021-09-22 Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US16/541,117 Active 2039-12-18 US11157624B2 (en) 2019-08-14 2019-08-14 Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory

Country Status (3)

Country Link
US (2) US11157624B2 (en)
CN (1) CN112394967B (en)
TW (1) TWI749523B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11157624B2 (en) * 2019-08-14 2021-10-26 Silicon Motion, Inc. Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068441A (en) * 2007-06-25 2007-11-07 华为技术有限公司 Permission identifying method, identification center and certification system
US20150134534A1 (en) * 2013-11-14 2015-05-14 Clarence Edwin Lai Software Protection Method for Preventing Unauthorized Usage
US20150294093A1 (en) * 2014-04-11 2015-10-15 Canon Kabushiki Kaisha Management system, information processing device, management server, control method therefor, and program
US20180276067A1 (en) * 2017-03-24 2018-09-27 Phison Electronics Corp. Data protecting method and memory storage device
US20190097810A1 (en) * 2017-09-28 2019-03-28 Intel Corporation System and method for reconfiguring and deploying soft stock-keeping units
US20190317673A1 (en) * 2018-04-11 2019-10-17 Phison Electronics Corp. Wear leveling method, memory control circuit unit and memory storage apparatus
US20200272708A1 (en) * 2019-02-22 2020-08-27 Yokogawa Electric Corporation Computer system, computer apparatus, and license management method
US11157624B2 (en) * 2019-08-14 2021-10-26 Silicon Motion, Inc. Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004030518A (en) 2002-06-28 2004-01-29 Murata Mach Ltd Program data update method and data readout method of electronic device
TW200536333A (en) * 2004-02-09 2005-11-01 Matsushita Electric Ind Co Ltd License information management apparatus and license information management method
US20080147964A1 (en) * 2004-02-26 2008-06-19 Chow David Q Using various flash memory cells to build usb data flash cards with multiple partitions and autorun function
US7272500B1 (en) * 2004-03-25 2007-09-18 Avaya Technology Corp. Global positioning system hardware key for software licenses
US7640424B2 (en) * 2005-10-13 2009-12-29 Sandisk Corporation Initialization of flash storage via an embedded controller
CN100487678C (en) * 2006-08-23 2009-05-13 晶天电子(深圳)有限公司 Electronic data flash memory card with flash memory controller
US8452967B2 (en) * 2007-08-31 2013-05-28 Microsoft Corporation Using flash storage device to prevent unauthorized use of software
US8112682B2 (en) * 2009-04-23 2012-02-07 Sandisk Il Ltd Method and device for bad-block testing
CN102033820A (en) * 2009-09-29 2011-04-27 北京爱国者存储科技有限责任公司 Flash memory device and network authentication method thereof
TWI448967B (en) 2011-07-11 2014-08-11 Wistron Neweb Corp Updating method of software and computer readable medium
US9767298B2 (en) * 2012-01-12 2017-09-19 Sony Corporation Information storage device, information processing system, information processing method, and program
US9128822B2 (en) * 2012-06-22 2015-09-08 Winbond Electronics Corporation On-chip bad block management for NAND flash memory
KR102188062B1 (en) * 2014-02-28 2020-12-07 삼성전자 주식회사 Method for operating data storage device and method for operating system having the device
JP6314859B2 (en) 2015-01-28 2018-04-25 株式会社デンソー Electronic control device and software rewriting system
US10372104B2 (en) * 2015-02-27 2019-08-06 Rockwell Automation Technologies, Inc. Industrial automation control system content protection
TWI550616B (en) * 2015-07-03 2016-09-21 力晶科技股份有限公司 Flash memory apparatus and initialization method for programming operation thereof
US11216571B2 (en) * 2017-02-13 2022-01-04 Hewlett-Packard Development Company, L.P. Credentialed encryption
CN108877858B (en) * 2017-05-10 2021-02-19 慧荣科技股份有限公司 Storage device and refreshing method
CN107169344B (en) 2017-05-10 2020-04-21 威盛电子股份有限公司 Method for blocking unauthorized application and apparatus using the same
CN108304698B (en) * 2018-01-25 2021-04-06 深圳市广和通无线股份有限公司 Product authorized use method and device, computer equipment and storage medium
US20190347383A1 (en) * 2018-05-12 2019-11-14 Ching-Ming Lai Software Protection Method Based on A License File

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068441A (en) * 2007-06-25 2007-11-07 华为技术有限公司 Permission identifying method, identification center and certification system
US20150134534A1 (en) * 2013-11-14 2015-05-14 Clarence Edwin Lai Software Protection Method for Preventing Unauthorized Usage
US20150294093A1 (en) * 2014-04-11 2015-10-15 Canon Kabushiki Kaisha Management system, information processing device, management server, control method therefor, and program
US20180276067A1 (en) * 2017-03-24 2018-09-27 Phison Electronics Corp. Data protecting method and memory storage device
US20190097810A1 (en) * 2017-09-28 2019-03-28 Intel Corporation System and method for reconfiguring and deploying soft stock-keeping units
US20190317673A1 (en) * 2018-04-11 2019-10-17 Phison Electronics Corp. Wear leveling method, memory control circuit unit and memory storage apparatus
US20200272708A1 (en) * 2019-02-22 2020-08-27 Yokogawa Electric Corporation Computer system, computer apparatus, and license management method
US11157624B2 (en) * 2019-08-14 2021-10-26 Silicon Motion, Inc. Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory

Also Published As

Publication number Publication date
TWI749523B (en) 2021-12-11
US11157624B2 (en) 2021-10-26
US20210049278A1 (en) 2021-02-18
TW202107322A (en) 2021-02-16
CN112394967B (en) 2023-08-08
CN112394967A (en) 2021-02-23

Similar Documents

Publication Publication Date Title
TWI667590B (en) Data storage devices and methods for encrypting and updating firmware thereof
TW480443B (en) Virus resistant and hardware independent method of flashing system BIOS
US9946661B2 (en) Command executing method, memory controller and memory storage apparatus
US9678760B2 (en) Memory card and storage system having authentication program and method for operating thereof
US8954705B2 (en) Memory space management method and memory controller and memory storage device and memory storage using the same
TWI451248B (en) Data protecting method, memory controller and memory storage apparatus
US8996933B2 (en) Memory management method, controller, and storage system
US20130212368A1 (en) Data protecting method, memory controller and memory storage device
JP7096829B2 (en) How and system to verify data deletion process
US20110066818A1 (en) Storage device, memory controller, and data protection method
US20220004638A1 (en) Scheme of using electronic device to activate mass production software tool to initialize memory device including flash memory controller and flash memory
US9575885B2 (en) Data storage apparatus for scrambled data and management method thereof
US20130262748A1 (en) Data protecting method, memory controller and memory storage device using the same
TWI493341B (en) Memory storage device and repairing method thereof
TWI710906B (en) Method and apparatus for performing access control between host device and memory device
TWI396090B (en) Flash memory apparatus, data storage system, and method for sending special instructions to a flash memory apparatus
KR20210060867A (en) Data storage device and operating method thereof
CN107168650B (en) Method and device for processing data in memory of BIOS
TWI614684B (en) Field firmware upgrading method and computer-readable medium
TWI841473B (en) Method for performing configuration management of memory device in predetermined communications architecture with aid of electronic fuse data preparation, memory controller of memory device, memory device, electronic device, host device, and computer-readable medium
JP6999679B2 (en) Data erasure method and equipment
KR20160017583A (en) Memory card and storage system having authentication program and method for operating thereof
US9880831B2 (en) Field firmware upgrading method and computer-readable medium
TWI817645B (en) Method for performing communications specification version control of memory device in predetermined communications architecture with aid of compatibility management, memory device, electronic device, memory controller of memory device, and associated computer-readable medium
US20170185537A1 (en) Data storage device and control method thereof

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION