CN101739347B - Method for protecting proprietary commands of memory - Google Patents

Method for protecting proprietary commands of memory Download PDF

Info

Publication number
CN101739347B
CN101739347B CN2008101760124A CN200810176012A CN101739347B CN 101739347 B CN101739347 B CN 101739347B CN 2008101760124 A CN2008101760124 A CN 2008101760124A CN 200810176012 A CN200810176012 A CN 200810176012A CN 101739347 B CN101739347 B CN 101739347B
Authority
CN
China
Prior art keywords
lba
data segments
proprietary commands
transfer
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2008101760124A
Other languages
Chinese (zh)
Other versions
CN101739347A (en
Inventor
陈桮棬
詹立翔
张哲玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Prolific Technology Inc
Original Assignee
QIYAN ELECTRONIC CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by QIYAN ELECTRONIC CO Ltd filed Critical QIYAN ELECTRONIC CO Ltd
Priority to CN2008101760124A priority Critical patent/CN101739347B/en
Publication of CN101739347A publication Critical patent/CN101739347A/en
Application granted granted Critical
Publication of CN101739347B publication Critical patent/CN101739347B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method for protecting proprietary commands of a memory. In the method, a receiving end judges whether data segments in a logic block mode comprise the proprietary commands or not by utilizing logic block addresses contained in a header in the logic block mode; a preset operating function is utilized to establish relationship of preset digital values stored in a plurality of characteristic points and specific points of the data segments, so that the receiving end judges whether the data segments comprise the proprietary commands or not; and an operation system takes the proprietary commands stored in the data segments as general information and does not block the proprietary commands, so that the proprietary commands are protected to be securely transmitted to the receiving end and are executed.

Description

A kind of guard method of proprietary commands of memory
Technical field
The present invention relates to a kind of guard method of proprietary commands of memory, especially utilize the particular memory address to store proprietary commands,, and start this proprietary commands with screening by operating system.
Background technology
Along with the fast development that information is used, developed different data storage media, such as carry-on dish or memory card, and be extensive use of by general user at present based on the data storage media of flash memory.The manufacturer of dish or memory card is the characteristic and the lifting performance of increase product with oneself; such as the access speed that reads product ID or quickening data; usually can transmit and contain instruction or the executable application program that starts application-specific by the application program of transmitting terminal; and receive by the controller of memory card, further carry out this instruction or application program again.
Present operating system (Operation System) mainly is that (Logic BlockArea, LBA) pattern is come the storing media of access periphery to the employing logical blocks, makes these products originally use in the diversification of application and development trend.
Fig. 1 is the synoptic diagram of LBA pattern in the prior art.As shown in Figure 1, transmitting terminal, such as personal computer (Personal Computer, PC) 10, have application program (Application Program, AP) 12, the LBA unit of transfer 31 that will include gauge outfit 33 and data segments 35 is sent to storing media 20 through transmission interface 30, and wherein, transmission interface 30 can be USB (universal serial bus) (Universal SerialBus, USB) interface, storing media 20 comprise controller 22 and internal memory 24.The gauge outfit 33 of LBA unit of transfer 31 includes the LBA address, in order to the storage address of the data of specific data section 35.
Prior art mainly is divided into two big classes for the application of diversification: proprietary commands (Proprietarycommand) and direct puncture formula order (Through command).For proprietary commands, the host-host protocol of USB adopts the subset of commands (subset) of SCSI for the read-write of data, therefore can utilize the order field (Reserve field) of reservation to be used as proprietary commands, allow the controller of storing media can distinguish out physical data and proprietary commands, and then reach the application of diversification.And for the order of direct puncture formula; it then is the characteristic of utilizing archives economy; the archives that produce several specific sizes are placed in the protected location of storing media; making these archives to be capped writes and deletes; and utilize these archives editor's oneself direct puncture formula order to be passed in the storing media with transmission; because this direct puncture formula order itself also is the part of data, thus operating system can not stop, promptly the form of direct puncture formula order with data wrapped up.
The shortcoming of prior art is, proprietary commands makes the reserved field use-pattern to be regarded as system's invasion condition under the rigorous requirement of present operating system, therefore utilize off-gauge order without exception all can barred and can't use, therefore cause the application program of diversification can't continue development.
Another shortcoming of prior art is, the order of direct puncture formula can only realize in disclosed archives economy that such as the archives economy of Fat16 or Fat32, and the development time is longer, because must develop suitable archives behavior pattern, so that the order of direct puncture formula is programmed in these archives to archives economy.
Therefore need a kind of guard method of proprietary commands of memory, can the conformance with standard transmission specification can allow data and specific proprietary commands not be operated system again simultaneously and stop, with the shortcoming of solution prior art.
Summary of the invention
Fundamental purpose of the present invention is to provide a kind of guard method of proprietary commands of memory; make operating system that proprietary commands is considered as physical data and can not stop; receiving end can be with the mode of unique point and the block in the specific LBA scope; distinguish physical data and proprietary commands that transmitting terminal transmits, and then correct carrying out data access or carry out proprietary commands.
Another object of the present invention is to provide a kind of guard method of proprietary commands of memory; transmitting terminal is selected specified point address and a plurality of unique points address in this data segments of this LBA unit of transfer; a plurality of sign values are stored into these unique point addresses respectively; utilize operating function to calculate a calibration value and to be stored in this specified point address; the LBA unit of transfer that will include this calibration value and these sign values sends out with the LBA pattern, to screen by operating system.
Another object of the present invention is to provide a kind of guard method of proprietary commands of memory; receiving end is by taking out the LBA address in the gauge outfit of LBA unit of transfer; if LBA drops on the address outside the preset range; then carry out the proprietary commands in the data segments; if LBA drops on the address in this preset range; after bringing operating function into, the sign value of then taking out data segments in the LBA unit of transfer calculates the comparison value; and the calibration value of taking-up specified point address; if the comparison value is identical with calibration value; then carry out proprietary commands and end operation in the data segments; if comparison value and calibration value are inequality, then carry out general data store operation and end operation.
Therefore, according to the guard method of proprietary commands of memory provided by the present invention, can protect proprietary commands not stopped by operating system and be sent to storing media, and carry out proprietary commands, can solve all shortcomings of above-mentioned prior art by the controller of storing media.
Description of drawings
Fig. 1 is the synoptic diagram of LBA pattern in the prior art;
Fig. 2 is the phase one process flow diagram of the guard method of proprietary commands of memory of the present invention;
Fig. 3 is the subordinate phase process flow diagram of the guard method of proprietary commands of memory of the present invention;
Fig. 4 is the data segments synoptic diagram of the guard method of proprietary commands of memory of the present invention.
[primary clustering symbol description]
10 transmitting terminals, personal computer (PC)
12 application programs (AP)
20 storing medias
22 controllers
24 internal memories
30 transmission interfaces, USB interface
31 LBA units of transfer
33 gauge outfits
35 data segments
AX, BX, CX, DX unique point address
EX specified point address
S100 begins
The selected specified point address of S110 and a plurality of unique points address
S120 stores a plurality of signs and is worth these unique point addresses
S130 utilizes operating function to calculate calibration value
S140 is stored in the specified point address with calibration value
S150 sends out LBA unit of transfer
S200 begins
The S210 receiving end receives LBA unit of transfer
S220 is by taking out the LBA address in the gauge outfit
S230 LBA address is outside preset range
S240 carries out the proprietary commands in the data segments
S250 is by taking out the sign value in the data segments
S260 utilizes operating function to calculate the comparison value
S270 takes out the calibration value in the data segments
Whether comparison value of S280 is identical with calibration value
S290 carries out the general data store operation
S300 carries out the proprietary commands in the data segments
The S400 end operation
Embodiment
Following conjunction with figs. and element numbers are done more detailed description to embodiments of the present invention, can implement according to this after studying this instructions carefully so that ability is desired the technician.
The guard method of proprietary commands of memory of the present invention comprises two stages: the phase one is that transmitting terminal produces LBA unit of transfer, and subordinate phase is that receiving end is carried out proprietary commands.Transmitting terminal can be personal computer, notebook computer, personal digital assistant (Personal Digital Assistant, PDA) or other have the electronic installation of access memory data function, and receiving end can be memory card, with oneself dish or other have the device of internal memory.Below will describe the operation of phase one and subordinate phase respectively in detail.
Fig. 2 is the phase one process flow diagram of the guard method of proprietary commands of memory of the present invention.As shown in Figure 2, S100 begins by step, and enters step S110.In step S110, this transmitting terminal is a selected specified point address and a plurality of unique points address in this data segments of this LBA unit of transfer, enters step S120.In step S120, selected a plurality of sign values are stored into these unique point addresses respectively, enter step S130.In step S130, utilize an operating function to bring these sign values into to calculate a calibration value, enter step S140.In step S140, this calibration value is stored in this specified point address, enter step S150.
In step S150, this LBA unit of transfer that will include this calibration value and these sign values sends out with this LBA pattern, finishes to produce the operation of LBA unit of transfer.
Fig. 3 is the subordinate phase process flow diagram of the guard method of proprietary commands of memory of the present invention.As shown in Figure 3, S200 begins by step, and enters step S210.In step S210, this controller of this receiving end receives this LBA unit of transfer, enters step S220.In step S220,, enter step S230 by taking out this LBA address in this gauge outfit of this LBA unit of transfer.In step S230, if the LBA address is dropped on outside the preset range, then enter step S240, if the LBA address is dropped in the preset range, then enter step S250.In step S240, carry out this proprietary commands in this data segments, enter step S400.In step S250, in this data segments of this LBA unit of transfer, take out these unique point addresses, enter step S260.In step S260, these sign values calculate a comparison value after bringing this operating function into, enter step S270.In step S270, take out this calibration value of specified point address in the data segments, enter step S280.In step S280, if comparison value and calibration value are inequality, then enter step S290, if the comparison value is identical with calibration value, then enter step S300.In step S290, carry out the general data store operation, enter step S400.In step S300, carry out this proprietary commands in this data segments, enter step S400.In step S400, end operation.
Preset range among the step S230 be more than or equal to zero to smaller or equal to total section number of data segments (Total Sector Number, TSN).In addition, for further clearly demonstrating the characteristics of the inventive method, be example with four unique point addresses, be elaborated.
Fig. 4 is the data segments synoptic diagram of the guard method of proprietary commands of memory of the present invention.Shown in 4 figure, in the data segments 35 of LBA unit of transfer, choose four unique point address AX, BX, CX, DX and specified point address EX, wherein unique point address AX, BX, CX, DX difference storage mark value A, B, C, D.With sign be worth A, B, C, D bring among the operating function f, try to achieve calibration value E, promptly (C D), and deposits among the EX of specified point address E=f for A, B.Therefore, transmitting terminal is created in unique point address AX, BX, CX, DX and specified point address EX and has the data segments 35 of sign value A, B, C, D and calibration value E respectively.This operating function f can be the accumulation calculating function, promptly f (A, B, C, D)=A+B+C+D, and proprietary commands can be stored in the arbitrary address except that unique point address AX, BX, CX, DX and specified point address EX.
Receiving end takes out the data in unique point address AX, BX, CX, the DX, utilizes operating function to obtain the comparison value, promptly f (A, B, C, D), and the data of taking out specified point address EX, i.e. calibration value.If the comparison value is identical with calibration value, represent that the received LBA unit of transfer of present receiving end is a proprietary commands, so the controller of receiving end extracts order and carries out this proprietary commands from the data field of this section; If comparison value and calibration value are inequality, represent that the received LBA unit of transfer of present receiving end is general data, so the controller of receiving end is carried out general data access operation.
Be noted that present embodiment is to illustrate with four unique point addresses, but scope of the present invention is not limited to this, the number of unique point can be any positive integer, and operating function can be any machine equation.
Therefore, method of the present invention can allow proprietary commands be stored in the data segments with the form of general data, the system that can not be operated stops, and make receiving end can correctly receive this proprietary commands, and by stored sign value and the calibration value in LBA address and unique point address and specified point address, whether comprise proprietary commands in the judgment data section, and then carry out this proprietary commands.
The above is a preferred implementation of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from principle of the present invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (8)

1. the guard method of a proprietary commands of memory; this proprietary commands is sent to a receiving end by a transmitting terminal through a logical blocks LBA pattern; this proprietary commands is contained in the LBA unit of transfer; and this LBA unit of transfer comprises a gauge outfit and a data segments; this gauge outfit comprises a LBA address and this data segments comprises this proprietary commands; this receiving end comprises an internal memory and a controller, and described guard method may further comprise the steps:
Step 1: this transmitting terminal is a selected specified point address and a plurality of unique points address in this data segments of this LBA unit of transfer, enters step 2;
Step 2: selected a plurality of sign values are stored into these unique point addresses respectively, enter step 3;
Step 3: utilize an operating function to bring these sign values into, enter step 4 to calculate a calibration value;
Step 4: this calibration value is stored in this specified point address, enters step 5;
Step 5: this LBA unit of transfer that will include this calibration value and these sign values sends out with this LBA pattern, enters step 6;
Step 6: this controller of this receiving end receives this LBA unit of transfer, enters step 7;
Step 7:, enter step 8 by taking out this LBA address in this gauge outfit of this LBA unit of transfer;
Step 8: if this LBA address is dropped on outside the preset range, then enter step 9,, then enter step 10 if this LBA address is dropped in this preset range;
Step 9: carry out this proprietary commands in this data segments, enter step 16;
Step 10: in this data segments of this LBA unit of transfer, take out these stored sign values of these unique point addresses, enter step 11;
Step 11: these sign values calculate a comparison value after bringing this operating function into, enter step 12;
Step 12: take out this calibration value of this specified point address in this data segments, enter step 13;
Step 13: if should the comparison value identical, then enter step 14 with this calibration value, if should the comparison value and this calibration value inequality, then enter step 15;
Step 14: carry out this proprietary commands in this data segments, enter step 16;
Step 15: carry out the general data store operation, the data storing of this data segments of this LBA unit of transfer of being received in this internal memory, is entered step 16; And
Step 16: end operation.
2. guard method as claimed in claim 1 is characterized in that, described transmitting terminal is a personal computer.
3. guard method as claimed in claim 1 is characterized in that, described transmitting terminal is a notebook computer.
4. guard method as claimed in claim 1 is characterized in that, described transmitting terminal is a personal digital assistant.
5. guard method as claimed in claim 1 is characterized in that, described receiving end is a memory card.
6. guard method as claimed in claim 1 is characterized in that, described receiving end is a carry-on dish.
7. guard method as claimed in claim 1 is characterized in that, the preset range of described step 8 is more than or equal to zero to smaller or equal to a total section number, and this total section number is represented a total volume of this internal memory.
8. guard method as claimed in claim 1 is characterized in that, described operating function is an accumulation calculating function.
CN2008101760124A 2008-11-06 2008-11-06 Method for protecting proprietary commands of memory Active CN101739347B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101760124A CN101739347B (en) 2008-11-06 2008-11-06 Method for protecting proprietary commands of memory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101760124A CN101739347B (en) 2008-11-06 2008-11-06 Method for protecting proprietary commands of memory

Publications (2)

Publication Number Publication Date
CN101739347A CN101739347A (en) 2010-06-16
CN101739347B true CN101739347B (en) 2011-11-09

Family

ID=42462858

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101760124A Active CN101739347B (en) 2008-11-06 2008-11-06 Method for protecting proprietary commands of memory

Country Status (1)

Country Link
CN (1) CN101739347B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1501234A (en) * 2002-11-18 2004-06-02 �������ʿƿƼ����޹�˾ Method for transmitting command and data to portable storage device
CN1536481A (en) * 2003-04-09 2004-10-13 英业达股份有限公司 Device and method for updating flash memory contents
US20040221130A1 (en) * 2003-05-02 2004-11-04 Lai Jui Yang Method and device for a accessing non-volatile memory by PC and X-BOX
CN1567811A (en) * 2004-06-30 2005-01-19 *** An information transmission encryption method
US20070067603A1 (en) * 2005-09-16 2007-03-22 Yasunori Yamamoto Nonvolatile memory device and the method of generation of the address translation table

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1501234A (en) * 2002-11-18 2004-06-02 �������ʿƿƼ����޹�˾ Method for transmitting command and data to portable storage device
CN1536481A (en) * 2003-04-09 2004-10-13 英业达股份有限公司 Device and method for updating flash memory contents
US20040221130A1 (en) * 2003-05-02 2004-11-04 Lai Jui Yang Method and device for a accessing non-volatile memory by PC and X-BOX
CN1567811A (en) * 2004-06-30 2005-01-19 *** An information transmission encryption method
US20070067603A1 (en) * 2005-09-16 2007-03-22 Yasunori Yamamoto Nonvolatile memory device and the method of generation of the address translation table

Also Published As

Publication number Publication date
CN101739347A (en) 2010-06-16

Similar Documents

Publication Publication Date Title
CN101454746B (en) Method for communication with a multi-function memory card
US7356637B2 (en) Virtual IDE storage device with PCI express interface
EP2426607A2 (en) System and method of host request mapping
EP2973572B1 (en) System and method of reading data from memory concurrently with sending write data to the memory
EP1304665A2 (en) Apparatus and method for controlling a card device
JP4626582B2 (en) Card-type peripheral device and card communication system
EP2257879A1 (en) Providing device parameters
US20100186077A1 (en) System, controller, and method thereof for transmitting data stream
US20070214306A1 (en) Virtual usb flash memory storage device with pci express interface, controller and method thereof
KR20100088210A (en) Apparatus and method for downloadin contents using movinand in portable terminal
KR100921852B1 (en) Electronic apparatus, information processing apparatus, adapter apparatus, and information exchange system
US8265919B1 (en) Emulating a peripheral mass storage device with a portable device
KR100440972B1 (en) Apparatus and method for establishing data transfer mode by card insertion identification
US20130275652A1 (en) Methods and structure for transferring additional parameters through a communication interface with limited parameter passing features
CN101739347B (en) Method for protecting proprietary commands of memory
CN112732170A (en) Controller and data storage system having the same
CN101911035A (en) Bridge circuit interfacing a processor to external devices via memory address mapping
CN116049030A (en) Method and device for data access, electronic equipment and storage medium
CN101311914A (en) Electronic device and peripheral device matching system and its matching method
KR100638383B1 (en) Usb apparatus which is installed a smart card, and using method thereof
JP6360933B1 (en) Data processing method
US8656059B2 (en) Methods for exchanging administrative information through a communication interface with limited administrative information exchange features
CN106033321B (en) Respond read method and data transmission system
CN104298468B (en) Instruction executing method, connector and memorizer memory devices
CN103823704A (en) Flash memory simulation method and simulator

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20150915

Address after: Nangang Road, Nangang District Taipei city Taiwan Chinese 3 No. 48 7 floor

Patentee after: Wangjiu Science & Technology Co., Ltd.

Address before: Hsinchu City, Taiwan, China

Patentee before: Qiyan Electronic Co., Ltd.