TW486675B - Portable electronic medium - Google Patents

Portable electronic medium Download PDF

Info

Publication number
TW486675B
TW486675B TW89119160A TW89119160A TW486675B TW 486675 B TW486675 B TW 486675B TW 89119160 A TW89119160 A TW 89119160A TW 89119160 A TW89119160 A TW 89119160A TW 486675 B TW486675 B TW 486675B
Authority
TW
Taiwan
Prior art keywords
memory
substrate
portable electronic
electronic media
patent application
Prior art date
Application number
TW89119160A
Other languages
Chinese (zh)
Inventor
Hidetaka Ikeda
Original Assignee
Toshiba Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Corp filed Critical Toshiba Corp
Priority to TW89119160A priority Critical patent/TW486675B/en
Application granted granted Critical
Publication of TW486675B publication Critical patent/TW486675B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention is provided with a base board on which wiring is provided, a memory, installed on the base board by soldering, for storing data and a certification key, and a memory control LSI. The memory control LSI is a fabricated as a bare chip incorporating an internal memory for storing data and a certification key, and a control section for controlling the storing of data in the memory and the reproduction of the data from the memory. The bare chip is installed on the base board and covered with sealing resin. The bare chip is connected to the base board by gold wire bonding. The certification key stored in the memory is compared with the certification key stored in the internal memory. Based on the coincidence or non-coincidence between these keys, the control section determines whether or not the memory is an intended one.

Description

486675 Α7 Β7 五、發明說明(1 ) 發明背景 本發明與一種作用爲記億卡之可攜式電子媒體有ϋ ’ 在該卡中獨立安裝一種用於儲存資料之記億體及用於控制 記憶體之控制電路。 在將一種用於儲存資料之記憶體及用於控制記憶體之 控制電路(一控制L S I )獨立安裝在記憶卡(一基板) 處,通常.晕將他們焊接至基板上。 由於這種結構,記憶體容易更新並可拆卸控制L S I 加以分析。 另言之,只替換記憶體,或增加儲存容量可製造膺品 --------------裝--- (請先閱讀背面之注意事項再頁) 訂·. 發明簡要 -線· 本發明已經考慮以上狀況加以製造,並預期防止安裝 與使用中之控制電路不對應之記憶體,因此可防止使用這 種記憶體之膺品僞造。 本發明也預期用來防止輕易分析使用中之控制電路。 經濟部智慧財產局員工消費合作社印製 根據本發明,亦備置一種可攜式電子媒體,包含:一 上面備置有接線之基板;一安裝在基板上,甩於儲存資料 之第一記憶體;以及一控制電路,包含:一用於儲存資料 與第一記憶體狀態資訊之第二記憶體;以及一用於控制將 資料儲存在第一記憶體中作業與從第一記憶體讀取資料作 業之控制部件,第二記憶體與被製成安裝在基板上並連接 至基板之晶片的控制部件,檢查第一記憶體是否處於與儲 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -4- 486675 A7 •_B7___ 五、發明說明(2 ) 存在第二記憶體中之第一記憶體狀態資訊脗合狀態之控制 部件,由此決定第一記憶體是否爲預期之記憶體。 根據本發明,更備置一種可攜式電子媒體,包含:一 上面備置有接線之基板;一安裝在基板上,用於儲存資料 及利甩將第一認證鑰加以編碼所得到編碼資料之第一記憶 體;以及一控制電路,包含:一用於儲存'資料,一第二認 證鑰,一耀碼鑰,及一解碼程式之第二記憶體;以及一用 於控制將資料儲存在第一記憶體中作業與從第一記億體複 製資料作業之控制部件,第二記憶體與被製成安裝在基板 上並連接至基板之晶片的控制部件,利用儲存在第二記憶 體中之編碼鑰與解碼程式將儲存在第一記憶體中之編碼資 料加以解碼之控制部件,且更檢查一合成認證鑰是否與儲 存在第二記憶體中之認證鑰脗合,由此決定第一記憶體是 否爲預期之記億體。 以下將說明本發明之額外目的與優點,且從說明中, 一部份將是明顯的,或可利用本發明之實行而習得。本發 明之目的與優點可利用此後特別指出之手段與組合加以實 現並取得-。 數楨圖式簡述 被納入並構成一部份規格之隨圖說明本發明目前之優 選實施例,且隨同上述一般說明及下述優選實施例之詳細 說明作爲解釋本發明之原理。 第1圖表示根據本發明記憶卡之內部構造。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公漦) -1-------1----裝· — I (請先-H讀背面之注意事項再頁) 訂-· --線· 經濟部智慧財產局員工消費合作社印製 -5- 486675 經濟部智慧財產局員工消費合作社印製 A7 _B7 _五、發明說明(3 ) 第2圖表示記憶卡之內部構造。 第3圖表示記億卡之切面構造。 第4圖表示記憶卡之內部構造。 第5圖表示記憶卡之控制方塊圖。 第6圖表不根據第一實施例’儲存認>證鏡方式之實例 圖。 第7嫺說明當觸動第一實施例記億卡或當施加電源供 應電壓時,實施處理之流程圖。 第8圖表示根據第一實施例,儲存認證鑰方式之實例 圖。 第9圖表示根據第二實施例,儲存記憶體狀態資訊方 式之實例圖。 第1 0圖說明根據第二實施例,如何實施認證處理之 流程圖。 第1 1圖說明根據第二實施例,如何將在上次處理結 束處編輯之音樂資訊儲存在記億卡之記憶體中。 第1 2圖說明根據第二實施例,如何儲存記憶體狀態 資訊並實施認證處理之流程圖。 第1 3圖表示根據第二實施例,如何將記憶體狀態資 訊儲存在內部記憶體中。 第1 4圖表示根據第三實施例,如何儲存編碼資料, 一認證繪’ 一編碼鏡及一解碼程式。 第1 5圖說明根據第三實施例’如何實施認證處理之 流程圖。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱) " (請先閱讀背面之注意事項再 裝 頁) · · --線· 486675 A7 __ B7 五、發明說明(4) 第1 6圖表示根據第三實施例,如何儲存編碼資料, 一認證鑰,一編碼鑰及一解碼程式。 第1 7圖表示根據第四實施例,如何儲存編碼資料, 一認證鎗,一編碼鑰,一解碼程式及一編碼程式。 第1 8圖說明根據第四實施例,如何實施認證處理之 流程圖。 第1_ .9圖表示根據第四實施例,如何儲存編碼資料, 一認證鑰,一編碼鑰,一解碼程式及一編碼程式。 第2 0圖表示根據第五實施例之整個網際網路連接系 統。 第21圖說明一量販店如何使用第五實施例之網際網 路連接系統,俾能將網際網路連接資訊登記在一記憶卡中 --------------裝--- (請先閱讀背面之注意事項再本頁) -OJ· --線· 經濟部智慧財產局員工消費合作社印製 主要元件對照表 1 外部連結端 2 基板 3 記憶體控制L S 4、 3 b 記憶體 5 晶片組件 6 積體電路 7 機殻 2 a 表面 8 樹脂 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱) 486675 A7 B7_ 五、發明說明(5 ) 9 介面部件 3 a 控制部件 --------------裝·— (請先閱讀背面之注意事項再1{^本頁) 11. 16 0 個人電腦 12 蜂巢式電話 13 電子攝影機 14 電視機 15 _網際網路 16 量販店 150、 180 網際網路連結資訊 110 應用程式 17 便利商店 18 網際網路服務業者 19 訂戶 201、 203、 204 表單 202、 205、 206、 207、 208 信息 210. 211 伺服器 發明詳述 經濟部智慧財產局員工消費合作社印製 現將說明本發明之實施例。 第1至第3圖表示一記憶卡Μ ( — SD卡)之構造, 記憶卡Μ爲一可攜式電子媒體之實例。第1圖表示根據本 發明之記憶卡Μ內部構造,第2圖亦表示記憶卡Μ之內部 構造,且第3圖表示記憶卡之切面構造。 記憶卡Μ包含一備置外部連結端1之基板2。基板2 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -8 - 486675 A7 B7 五、發明說明(6) 上安裝了 一記憶體控制L S I (—控制電路,一控制器) --------------裝--- (請先閱讀背面之注意事項再頁) 3,一記憶體(一外部記憶體,一第一記憶體)4,晶片 組件5,及其它型I C。如第4圖中所示,記憶卡是接納 在一機殻7中。 在基板2之外部連結端1塗上一硬性鍍金層,俾能改 善抗接觸之特性。 在基_揮表面2 a上塗上一軟性金電鍍層,該表面爲備 置外部連結端1處之反面。 在表面2 a上,記憶體控制L S I 3 (記憶體控制 用裸晶片)爲焊接裸晶。基本記憶體控制L S I 3以金 線搭接連接至基板並覆以焊封樹脂8。然後,以焊接加以 安裝T S Ο P型記憶體4,晶片組件5與I C。 因記憶體控制L S I 3是以裸晶片安裝在基板2上 ,無法輕易加以分析鑰資料。 -線- 記憶卡Μ之控制電路將參考第5圖加以說明。 經濟部智慧財產局員工消費合作社印製 如第5圖中所示,記憶卡Μ包含:外部連結端1,經 由它資料可參考一外部設備(未示出)加以交換;一連接 至外部連結端1之介面部件9 ; 一連接至介面部件9之記 億體控制L S I 3 ;以及連接至記憶體控制L S I 3 ,用於控制儲存/複製資料之記億體4。介面部件9由晶 片組件5與I C 6 |&成。 記億體控制L S I 3包含一用於控制整個記憶體之 控制部件3 a,以及一用於儲存控制程式與資料之內部記 憶體(第二記億體)3 b。 -9- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱) 486675 A7 B7 五、發明說明(7 ) 當記憶卡Μ連接至外部設備(未示出)時,將電源供 應電壓施加於此。 --------------裝--- (請先閱讀背面之注意事項再1^4頁) 〔第一實施例〕 說明一實施例,其中,記憶體4之認證是利用以不可 改變方式儲存在內部記憶體3 b中之認證鑰及以不可改變 方式儲存在記億體4中之認證鑰。 如第6圖中所示,作爲認證鑰之唯一値是儲存在內部 記憶體3 b中。該値以不可改變方式加以儲存。 各記憶體4與內部記憶體3 b由一不可改變ROM部 份與一可改變一 R 0M部份組成。認證鑰儲存在未可改變 之R〇Μ部份。 參考第7圖中所示之流程圖,將說明當觸發第一實施 例之記憶卡或當施加電源供應電壓時所實施之處理。 -線· 經濟部智慧財產局員工消費合作社印製 首先,當觸發卡片或當從外部設備施加一電源供應電 壓時,控制部件3a執行一自我檢查(ST1)。在步驟 (S T 2 )中,如果自我檢查表示、0 K ",則控制部件 3 a從記憶體4讀出認證鑰(S T 3 ),並從內部記憶體 3 b進一步讀出認證鑰(S T 4 )。然後,控制部件3 a 比較這兩鑰之脗合性(ST5)。 如比較表示兩鑰彼此脗合,則控制部件3 a視記億體 4合乎認證(認證、〇 K " ) ( S T 6 )。然後’設定控 制部件3 a在待命狀態(S T 7 )。 如果在步驟ST2之自我檢查表示或步驟 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) •10- 486675 A7 B7 五、發明說明(8 ) S 丁 6之認證表示> N G 〃則控制部件3 a停止處理( S T 8 )。 如步驟ST2表示認證爲、NG",這意爲步驟 S T 5中之比較表示鑰有差異且記憶體4爲非符合認證之 記憶體。 以上,當觸發卡片或當施加電源供應電壓至外部設備 時,參考_符合認證之記憶體4之機殼。然而’應注意到每 次存取記憶體時,記憶體在一類似方式下是合乎認證的。 當儲存外部供應之音樂資訊或程式時,或當複製或執行儲 存在記憶體4中之音樂資訊或程式時,可存取記憶體4。 可使用儲存在內部記憶體3 b中加以認證記憶體4時 之認證鑰,加以認證外部設備與卡片Μ間之關係。而且’ 如第8圖中所示,用於認證記憶體4之內部認證鑰Κ 1及 用於認證外部設備之外部認證鑰Κ 2可儲存在卡片Μ之內 部記憶體3 b中。 〔第二實施例〕 利用以上構造,記憶體控制L S I 3能儲存記憶體 4之狀態(即,處理方式)。當接著存取記憶體4時’則 檢查表示記憶體4狀態之狀態資訊,看自從上次存取後’ 他們是否保持一樣。根據這種檢査,視記憶體4合乎認證 〇 在第二實施例狀況中,如第9圖中所示’當使用記憶 卡Μ處理到結束時,控制部件3 a將狀態資訊儲存在內部 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------------裝--- (請先閱讀背面之注意事項再頁) 訂·· •線· 經濟部智慧財產局員工消費合作社印製 -11 - 486675 A7 B7___ 五、發明說明(9 ) --------------裝--- (請先閱讀背面之注意事項再本頁) 記憶體3 b中之記憶體4。記憶體4上之狀態資訊包含: 上次處理所使用區域(FAT:檔案配置表);記憶體4 整體之檢查加總(一確認値):在上次處理結束時儲存在 記憶體4之檢查總合(一確認値):等。利用這種儲存, 內部記憶體3 b儲存關於上次處理所用區域(FAT :檔 案配置表)之資訊;記憶體4整體之檢查加總(一確認値 ):在上_次處理結束時儲存在記憶體4之檢查總合(一確 認値):或諸如此類者。 上述記憶體4爲一非揮發性記憶體並可維持在記憶體 4上次處理之狀態。內部記憶體3 b亦爲一非揮發性記憶 體並能將狀態資訊保持在記憶體4上。 當利用以上構造存取記憶體4時,說明關於如何實施 認證處理。在以下說明中,將參考第1 0圖中所示之流程 圖。 --線· 當儲存外部供應之音樂資訊或程式,或當複製或執行 儲存在記憶體4中之音樂資訊或程式時,可存取記憶體4 〇 經濟部智慧財產局員工消費合作社印製 當要存取記憶體4時,控制部件3 a檢查記憶體4之 儲存狀態(ST 1 1 )並決定上次處理時使用何區( FAT) ( S T 1 2 )。然後,控制部件3 a比較決定爲 在上次處理中已用過之這區域(FAT)與在記億體3 b 中登記爲在上次處理中已用過之區域(FAT)( S 丁 1 3 )。 如果比較表示兩區域彼此脗合,則控制部件3 a決定 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公嫠) -12- 486675 A7 B7 五、發明說明(10) 記憶體4合乎認證(認證、ο κ " ) ( s T 1 4 )。然後 ,開始對記億體4之存取處理(ST 15)。存取處理爲 ,例如儲存(寫入)資料,或複製(讀取)儲存資料。 執行存取處理後,控制部件3 a儲存表示內部記憶體 3b中存取處理所用區域(FAT)之資料(覆寫)( S 丁 1 6 )。 如果#驟S T 1 6中之比較表示區域差異,則控制部 件3 a決定認證爲且因此結束存取處理( S T 1 7 )。 上述中,參考一 F AT作爲表示在記億體4上之狀態 資訊。不用說,可以一類似方式使用記憶體4整體之檢查 加總(一確認値),在上次處理結束時,記憶體4中所儲 存之檢查總和(一確認値)或諸如此類者。 讓我們假定一種情況,在上次處理結束時,如第1 1 圖中所示,將音樂資訊〃儲存在記憶體4之位址〜 AAAA"中具長度爲。在這情況中,參考第 1 2圖中所示之流程圖,說明關於如何執行儲存記憶體狀 態資訊之處理及認證處理。 首先,控制部件3 a計算相當於音樂資訊Α Α "之檢 查加總> C C "(一確認値)(S T 2 1 )。486675 Α7 Β7 V. Description of the invention (1) Background of the invention The present invention is related to a portable electronic medium that functions as a memory card. '' An independent memory device for storing data and controlling memory is installed in the card. Control circuit. When a memory for storing data and a control circuit (a control L S I) for controlling the memory are independently installed on a memory card (a substrate), they are usually soldered to the substrate. Due to this structure, the memory is easy to update and can be removed and controlled for analysis. In other words, just replace the memory, or increase the storage capacity to make fakes -------------- install --- (Please read the precautions on the back before the page) Order .. Invention Brief-line · The present invention has been manufactured in consideration of the above situation, and it is expected to prevent the installation of a memory that does not correspond to the control circuit in use, and thus to prevent counterfeiting using such memory. The invention is also intended to prevent easy analysis of control circuits in use. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs according to the present invention, a portable electronic medium is also provided, including: a substrate on which wiring is placed; a first memory mounted on the substrate and thrown away to store data; and A control circuit includes: a second memory for storing data and state information of the first memory; and a control for controlling operations of storing data in the first memory and reading data from the first memory Control part, the second memory and the control part made of a wafer mounted on the substrate and connected to the substrate, check whether the first memory is in accordance with the Chinese national standard (CNS) A4 specification (210 X 297) (Mm) -4- 486675 A7 • _B7___ V. Description of the invention (2) The control unit of the state of the first memory state information in the second memory, which determines whether the first memory is the expected memory . According to the present invention, a portable electronic medium is further provided, including: a substrate on which wiring is provided; and a first mounted on the substrate for storing data and encoding the first authentication key by encoding A memory; and a control circuit including: a second memory for storing 'data, a second authentication key, a yoke key, and a decoding program; and a control for storing data in the first memory Control parts for in-volume operations and data copying operations from the first memory, the second memory and control parts made of wafers mounted on the substrate and connected to the substrate, using encoding keys stored in the second memory A control unit that decodes the encoded data stored in the first memory with a decoding program, and further checks whether a synthetic authentication key is combined with the authentication key stored in the second memory, thereby determining whether the first memory is Billion body for the expected. In the following, additional objects and advantages of the present invention will be explained, and a part of them will be obvious from the description, or can be learned through the practice of the present invention. The purpose and advantages of the present invention can be achieved and obtained by means and combinations specifically pointed out later. A brief description of the figures is included and constitutes a part of the specification to illustrate the presently preferred embodiment of the present invention, and to accompany the general description above and the detailed description of the following preferred embodiments as an explanation of the principles of the invention. Fig. 1 shows the internal structure of a memory card according to the present invention. This paper size is applicable to China National Standard (CNS) A4 specification (210 X 297 cm) -1 ------- 1 ---- packing · — I (please read the precautions on the back first and then the page) Order --- --- line Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs -5- 675675 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 _B7 _ V. Description of the invention (3) Figure 2 shows the internal structure of the memory card . Fig. 3 shows the cross-section structure of JiYi card. Figure 4 shows the internal structure of the memory card. Figure 5 shows the control block diagram of the memory card. Fig. 6 is a diagram showing an example of the "storage identification" method according to the first embodiment. The seventh example describes a flowchart of the process performed when the memory of the first embodiment is recorded or when a power supply voltage is applied. Fig. 8 is a diagram showing an example of a method of storing an authentication key according to the first embodiment. Fig. 9 is a diagram showing an example of a memory state information storage method according to the second embodiment. Fig. 10 is a flowchart showing how the authentication process is performed according to the second embodiment. FIG. 11 illustrates how the music information edited at the end of the last processing is stored in the memory of a memory card according to the second embodiment. Fig. 12 is a flowchart illustrating how to store memory state information and implement authentication processing according to the second embodiment. Fig. 13 shows how the memory status information is stored in the internal memory according to the second embodiment. Fig. 14 shows how to store encoded data, an authentication picture ', an encoding mirror and a decoding program according to the third embodiment. Fig. 15 is a flowchart showing how the authentication process is performed according to the third embodiment '. This paper size applies to China National Standard (CNS) A4 specifications (210 X 297 public love) " (Please read the precautions on the back before loading the page) · ·-line · 486675 A7 __ B7 V. Description of the invention (4) Figure 16 shows how to store encoded data, an authentication key, an encoding key and a decoding program according to the third embodiment. Figure 17 shows how to store encoded data, an authentication gun, an encoding key, a decoding program, and an encoding program according to the fourth embodiment. Fig. 18 is a flowchart showing how to perform authentication processing according to the fourth embodiment. Figures 1_.9 show how to store encoded data, an authentication key, an encoding key, a decoding program, and an encoding program according to the fourth embodiment. Fig. 20 shows the entire Internet connection system according to the fifth embodiment. Fig. 21 illustrates how a retail store uses the Internet connection system of the fifth embodiment and cannot register Internet connection information in a memory card. -(Please read the precautions on the back first, then this page) -OJ ---- Lines ・ Comparison of the main components printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy 1 External connection 2 Substrate 3 Memory control LS 4, 3 b Memory 5 Chip assembly 6 Integrated circuit 7 Chassis 2 a Surface 8 Resin This paper size is applicable to China National Standard (CNS) A4 specifications (210 X 297 public love) 486675 A7 B7_ V. Description of the invention (5) 9 Interface parts 3 a Control unit -------------- Installation · — (Please read the precautions on the back first and then 1 {^ This page) 11. 16 0 Personal computer 12 Cell phone 13 Electronic camera 14 TV机 15 _Internet 16 Mass retailers 150, 180 Internet link information 110 Apps 17 Convenience stores 18 Internet service providers 19 Subscribers 201, 203, 204 Forms 202, 205, 206, 207, 208 Information 210. 211 Server invention details consumer cooperation between employees of Intellectual Property Bureau, Ministry of Economic Affairs Printed embodiment will now be described embodiments of the present invention. Figures 1 to 3 show the structure of a memory card M (-SD card), which is an example of a portable electronic medium. Fig. 1 shows the internal structure of the memory card M according to the present invention, Fig. 2 also shows the internal structure of the memory card M, and Fig. 3 shows the cut structure of the memory card. The memory card M includes a substrate 2 with an external connection terminal 1. Substrate 2 This paper size is in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) -8-486675 A7 B7 V. Description of the invention (6) A memory control LSI (—control circuit, a controller) ) -------------- install --- (please read the precautions on the back first and then the page) 3, a memory (an external memory, a first memory) 4, a chip Module 5, and other types of IC. As shown in Fig. 4, the memory card is housed in a casing 7. A hard gold-plated layer is applied to the outer connection end 1 of the substrate 2 to improve the contact resistance characteristics. A soft gold plating layer is coated on the base surface 2a, and this surface is the reverse side where the external connection end 1 is provided. On the surface 2a, the memory control L S I 3 (bare chip for memory control) is a solder die. The basic memory control L S I 3 is connected to the substrate with gold wires and is covered with a solder resin 8. Then, the T S 0 P-type memory 4, the chip assembly 5 and IC are mounted by soldering. Because the memory control L S I 3 is mounted on the substrate 2 as a bare chip, the key data cannot be easily analyzed. -Line- The control circuit of the memory card M will be described with reference to FIG. 5. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs as shown in Figure 5, the memory card M includes: external connection terminal 1 through which information can be exchanged with reference to an external device (not shown); a connection to the external connection terminal 1 is an interface unit 9; 1 is a memory unit control LSI 3 connected to the interface unit 9; and is connected to a memory control LSI 3 for controlling a memory unit 4 for storing / copying data. The interface member 9 is made of a wafer module 5 and I C 6 | &. The memory controller L S I 3 includes a control unit 3 a for controlling the entire memory, and an internal memory (second memory) 3 b for storing control programs and data. -9- This paper size is in accordance with Chinese National Standard (CNS) A4 (210 X 297 public love) 486675 A7 B7 V. Description of the invention (7) When the memory card M is connected to an external device (not shown), the power supply Voltage is applied here. -------------- Install --- (Please read the precautions on the back and then page 1 ^ 4) [First Embodiment] Describe an embodiment in which the authentication of the memory 4 It is to use the authentication key stored in the internal memory 3 b in an immutable manner and the authentication key stored in the memory 4 in an immutable manner. As shown in Fig. 6, the only key serving as the authentication key is stored in the internal memory 3b. The badger is stored in an immutable manner. Each of the memory 4 and the internal memory 3 b is composed of an unchangeable ROM part and a changeable ROM part. The authentication key is stored in the unchangeable ROM section. Referring to the flowchart shown in Fig. 7, the processing performed when the memory card of the first embodiment is triggered or when a power supply voltage is applied will be explained. -Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs First, when a card is triggered or when a power supply voltage is applied from an external device, the control unit 3a performs a self-check (ST1). In step (ST 2), if the self-check indicates 0 K ", the control unit 3 a reads the authentication key (ST 3) from the memory 4 and further reads the authentication key (ST) from the internal memory 3 b 4). Then, the control section 3a compares the combination of the two keys (ST5). If the comparison shows that the two keys are combined with each other, the control unit 3 a considers that the billion body 4 meets the authentication (authentication, 0 K ") (S T 6). Then, the control unit 3a is set to the standby state (S T 7). If self-examination indication in step ST2 or step This paper size applies Chinese National Standard (CNS) A4 specification (210 X 297 mm) • 10- 486675 A7 B7 V. Description of the invention (8) S D6 certification indication > The NG rule control unit 3 a stops processing (ST 8). If step ST2 indicates that the authentication is "NG", this means that the comparison in step S T 5 indicates that the keys are different and the memory 4 is a non-certified memory. Above, when triggering a card or when applying a power supply voltage to an external device, refer to the case of the memory 4 that meets the certification. It should be noted, however, that each time the memory is accessed, the memory is authenticated in a similar manner. The memory 4 can be accessed when externally supplied music information or programs are stored, or when the music information or programs stored in the memory 4 are copied or executed. The authentication key stored when the authentication memory 4 is stored in the internal memory 3b can be used to authenticate the relationship between the external device and the card M. Moreover, as shown in FIG. 8, the internal authentication key K1 for the authentication memory 4 and the external authentication key K2 for the authentication of the external device can be stored in the internal memory 3b of the card M. [Second Embodiment] With the above configuration, the memory control L S I 3 can store the state of the memory 4 (that is, the processing method). When the memory 4 is accessed next ', the status information indicating the state of the memory 4 is checked to see if they have remained the same since the last access. Based on this inspection, the visual memory 4 is certified. In the second embodiment, as shown in FIG. 9 'When the processing using the memory card M is completed, the control unit 3 a stores the status information on the internal paper Standards are applicable to China National Standard (CNS) A4 specifications (210 X 297 mm) -------------- Installation --- (Please read the precautions on the back first and then the page) Order ·· • Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs -11-486675 A7 B7___ V. Description of Invention (9) -------------- Installation --- (Please read the note on the back first Note on this page) Memory 3 b Memory 4. The status information on memory 4 includes: the area used in the last processing (FAT: file allocation table); the total inspection of memory 4 (one confirmation): the inspection stored in memory 4 at the end of the last processing Summing up (a confirmation 値): Wait. With this storage, the internal memory 3 b stores information about the area used for the last processing (FAT: file allocation table); the total check of the memory 4 (one confirmation): stored at the end of the previous _ last processing Checkup of memory 4 (one confirmation): or the like. The memory 4 is a non-volatile memory and can be maintained in the state of the memory 4 last processed. The internal memory 3 b is also a non-volatile memory and can keep the status information on the memory 4. When the memory 4 is accessed using the above structure, how to perform the authentication process will be explained. In the following description, reference will be made to the flowchart shown in Fig. 10. --Line · When storing externally supplied music information or programs, or when copying or executing the music information or programs stored in memory 4, the memory 4 can be accessed. To access the memory 4, the control unit 3a checks the storage state (ST 1 1) of the memory 4 and decides which area (FAT) (ST 1 2) was used during the last processing. Then, the control unit 3a compares the area (FAT) determined to have been used in the previous process with the area (FAT) registered in the recorder 3b to be used in the last process (S Ding 1 3). If the comparison shows that the two areas are merged with each other, the control unit 3 a decides that the paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 cm) -12- 486675 A7 B7 V. Description of the invention (10) Memory 4 Qualified (certified, ο κ ") (s T 1 4). Then, the access processing to the memory bank 4 is started (ST 15). Access is handled as, for example, storing (writing) data, or copying (reading) stored data. After performing the access processing, the control unit 3a stores data (overwrite) indicating the area (FAT) used for the access processing in the internal memory 3b (S Ding 16). If the comparison in ## S T 1 6 indicates a regional difference, the control unit 3 a decides to authenticate and thus ends the access process (S T 1 7). In the above, reference is made to a FAT as the state information indicated on the recorder 4. It goes without saying that the check-up of the entire memory 4 (one confirmation) can be used in a similar manner. At the end of the last process, the check-up sum (one confirmation) stored in the memory 4 or the like can be used. Let us assume a case where, at the end of the last processing, as shown in FIG. 11, the music information 〃 is stored in the address of memory 4 ~ AAAA " with a length of. In this case, with reference to the flowchart shown in FIG. 12, a description will be given on how to perform the process of storing the memory state information and the authentication process. First, the control unit 3 a calculates a check sum equivalent to the music information Α Α " (C &) (a confirmation 値) (S T 2 1).

隨後,控制部件3 a將以下三樣加入至原先爲音樂資 訊備置之資訊ID,產生記憶體狀態資訊( ST22) : (i)記憶體4之儲存開始位址〜AAAA ";(ϋ )儲存資訊長度、B B 〃 :以及(iii )以上計算 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐〉 --- ------裝 i I (請先閱讀背面之注意事項再頁) 上α· ί線· 經濟部智慧財產局員工消費合作社印製 -13- 486675 A7 B7 五、發明說明(11) 之檢查總和、c C "(一確認値)。如第1 3圖中所示’ 這般產生之記憶體狀態資訊是儲存在內部記憶體3 13中( S 丁 2 3 )。 當即將存取記億體4時(S T 2 4 ) ’控制部件3 a 確認記億體4之儲存狀態(s τ 2 5 )並決定具長度~ BB〃之資訊在上次處理結束時是儲存在記憶體4之位址 、AAAA'中(ST26)。 然後,控制部件3 a計算相當於起自記憶體4位址" AAAA 〃並具長度〜BB 〃之資訊的檢查加總 (一確認値)(S T 2 7 )。 根據位址、AAAA,,長度及所計算之檢 查加總、C C 〃 (一確認値),控制部件3 a決定記億體 狀態資訊(S T 2 8 )。比較記憶體狀態資訊與在上次處 理中從內部記憶體3 b所讀出並使用之記憶體狀態資訊’ 俾能視他們是否彼此脗合(ST2 9)。 如果比較表示資訊脗合,則控制部件3 a視記憶體4 合乎認證(認證、〇 K " ) ( S T 3 0 )並執行對記億體 4之存取處理(ST31)。 如果在步驟S T 2 9中之比較表示資訊差異’則控制 部件3 a決定認證爲並結束存取處理(ST3 2 〔第三實施例〕 現將說明一實施例,其中,記億體4之認證是利用: 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------------裝--- (請先閱讀背面之注意事項再頁) 訂·· --線· 經濟部智慧財產局員工消費合作社印製 -14 - 經濟部智慧財產局員工消費合作社印製 486675 A7 B7 五、發明說明(12) 編碼資料爲以不可改變方式儲存在記億體4中之認證鑰; 以不可改變方式儲存在內部記憶體3 b中之認證鑰;解碼 程式;及編碼鑰。 在這實施例情況中,如第1 4圖中所示’記憶體4利 用唯一認證鑰儲存將一認證鑰加以編碼所得之編碼資料α 以不可改變方式加以儲存編碼資料。 如第_1 4圖中所示,內部記憶體3 b儲存一與將儲存 在記憶體中之編碼資料加以編碼前所使用之認證鑰相同之 認證鑰,一用於將儲存在記億體4中之編碼資料加以解碼 之解碼程式,以及根據解碼程式’當將編碼資料加以解碼 所用之一編碼鑰。這些鑰與程式是以不可改變方式加以儲 存的。 各記憶體4與內部記憶體3 b由一不可改變之R〇Μ 部份與一可改變之R 0Μ部份組成。認證鎗是儲存在不可 改變之R Ο Μ部份。 參考第1 5圖所示之流程圖,說明關於如何利用上述 構造對記憶體4加以認證。 首先,控制部件3 a從記憶體4讀出編碼資料( S T 4 1 )。然後,控制部件3 a根據儲存在內部記憶體 3 b之編碼鑰將所讀出之編碼資料加以解碼。對於這解碼 作業,執行儲存在內部記憶體3 b之解碼程式。結果’得 到一認證鑰(S T 4 2 )。而且,控制部件3 a比較認證 鑰與儲存在內部記億體3 b內認證鑰(ST4 3 )之脗合 性。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------------裝--- (請先閱讀背面之注意事項再頁) 幻: --線- -15- 486675 A7 B7 五、發明說明(13) 如果比較表示認證鑰脗合,則控制部件3 a視記憶體 4合乎認證(認證> Ο K " ) ( S T 4 4 )。 .— — — — — — — — — — —I· · I I (請先閱讀背面之注意事項再頁) 如果在步驟4 3之比較表示有差異,則控制部件3 a 決定認證爲、NG〃 (ST45)。 可使用儲存在內部記憶體3 b中,用於對記億體4加 以認證之認證鑰,加以認證外部設備與卡片Μ間之關係。 而且,如Jl 1 6圖中所示,用於認證記億體4之內部認證 鑰Κ 1與用於認證外部設備之外部認證鑰κ 2可儲存在卡 片Μ之內部記憶體3b中。 〔第四實施例〕 --線- 現將說明一實施例,其中,記憶體4之認證是利用執 行第三實施例之認證處理(步驟S T4 1 — 4 5 )及第二 實施例之認證處理(步驟ST11 — 14)。當從外部設 備接收資料並儲存在記憶體4時即視記憶體4合乎認證。 經濟部智慧財產局員工消費合作社印製 在第四實施例之情況,如第1 7圖中所示,事先儲存 根據唯一編碼鑰將一認證鑰加以編碼所得到之編碼資料^ 編碼資料是以不可改變之方式加以儲存的。 如第1 7圖中所示,內部記憶體3 b儲存一與將儲存 在記憶體4中之編碼資料加以編碼前所使用之認證鑰相同 之認證鑰,一用於將接收自外部設備之收接資料加以編碼 之編碼程式,一用於將儲存在記憶體4中之編碼資料加以 解碼之解碼程式,以及根據編碼程式,當將接收資料加以 編碼所用或根據解碼程式,當將編碼資料加以解碼所用之 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -16- 486675 A7 _ B7 五、發明說明(14) 經濟部智慧盼產局員工消費合作社印製 一編碼鎗。這些鑰與程式是以不可改變方式加以儲存的。 如第1 7圖中所示,內部記憶體3 b儲存關於上次處 理所用區域(F AT :檔案配置表)之資訊;記億體4整 體之檢查加總(一確認値);在上次處理結束時儲存在記 憶體4之檢查加總(一確認値);或諸如此類者。 各記憶體4與內部記憶體3 b由一不可改變之ROM 部份與一可改變之R 〇 Μ部份組成。認證鑰是儲存在不可 改變之R 0Μ部份。可改變之R 〇Μ部份爲一非揮發性記 億體並可維持在記憶體4上次處理之狀態。 參考第1 8圖所示之流程圖,說明關於利用上述構造 ,在從外部設備收到資料時,如何執行認證處理。 從外部設備一收到資料時(ST5 1),控制部件 3a根據第三實施例執行認證處理(ST52),並根據 第二實施例進行執行認證處理(S T 5 3 )。 如果各認證處理爲> 0 K " ( S T 5 4 ),控制部件 3 a根據儲存在內部記憶體3 b之編碼鑰將接收資料加以 編碼(ST5 5)。對於這種編碼作業,執行儲存在內部 記憶體3 b中之編碼程式。 然後,控制部件3 a將編碼資料儲存在記憶體4中( S T 5 6 )。 在這儲存作業後,控制部件3 a將表示記億體4狀態 之資料儲存在內部記憶體3b中(覆寫)(ST57) ° 如果任一認證處理爲、N G 〃 ,則控制部件3 a結束 處理(S T 5 8 )。 請 先 閱 讀 背 面 之 注Subsequently, the control unit 3 a adds the following three to the information ID originally prepared for the music information to generate memory state information (ST22): (i) the storage start address of the memory 4 ~ AAAA "; (ϋ) storage Information length, BB 〃: and (iii) above calculations The paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) --- ------ install i I (Please read the note on the back first Matters to be reprinted) Printed on the α · ί line · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs -13-486675 A7 B7 V. Sum of inspection of invention description (11), c C " As shown in Figure 3, the memory state information generated in this way is stored in the internal memory 3 13 (S Ding 2 3). When the memory 4 is about to be accessed (ST 2 4) 'Control unit 3 a Confirm Record the storage state (s τ 2 5) of the billion body 4 and determine the information with length ~ BB〃. At the end of the last processing, the information is stored in the address of memory 4, AAAA '(ST26). Then, the control unit 3 a Calculate the sum of the information equivalent to 4 addresses from memory " AAAA 〃 with length ~ BB ( (Recognition) (ST 2 7). Based on the address, AAAA, length, and the calculated check sum, CC 〃 (a confirmation 値), the control unit 3 a decides to record the status information of the billion body (ST 2 8). Compare The memory state information and the memory state information read out from the internal memory 3 b and used in the last process are 'not able to see whether they are combined with each other (ST2 9). If the comparison indicates that the information is combined, the control unit 3 a sees that the memory 4 meets the authentication (authentication, 0K ") (ST 3 0) and performs access processing to the memory 4 (ST31). If the comparison in step ST 2 9 indicates an information difference 'then The control unit 3 a decides to authenticate and ends the access process (ST3 2 [Third Embodiment] An embodiment will now be described in which the authentication of the recorder 4 is to use: This paper size applies the Chinese National Standard (CNS) A4 Specifications (210 X 297 mm) -------------- Installation --- (Please read the precautions on the back first, then the page) Order ·· --- Line · Intellectual Property Bureau Staff, Ministry of Economic Affairs Printed by Consumer Cooperatives -14-Printed by Consumers' Cooperatives of the Intellectual Property Bureau of the Ministry of Economy 486675 A7 B7 V. Inventions Explanation (12) The encoded data is the authentication key stored in the memory 4 in an immutable manner; the authentication key stored in the internal memory 3 b in an immutable manner; the decoding program; and the encoding key. In the case of this embodiment As shown in FIG. 14, the memory 4 uses the unique authentication key to store the encoded data α obtained by encoding an authentication key, and stores the encoded data in an unchangeable manner. As shown in FIG. 14, the internal memory 3 b stores an authentication key that is the same as the authentication key used before encoding the encoded data stored in the memory, and one is used to store the authentication key 4 A decoding program for decoding the encoded data in the encoding program, and an encoding key used when decoding the encoded data according to the decoding program. These keys and programs are stored in an immutable way. Each of the memory 4 and the internal memory 3 b is composed of an unchangeable ROM part and a changeable ROM part. Certified guns are stored in an immutable R OM section. With reference to the flowchart shown in FIG. 15, how to use the above structure to authenticate the memory 4 will be described. First, the control unit 3 a reads the coded data (S T 4 1) from the memory 4. Then, the control unit 3a decodes the read encoded data based on the encoding key stored in the internal memory 3b. For this decoding operation, a decoding program stored in the internal memory 3 b is executed. As a result, an authentication key (S T 4 2) is obtained. Moreover, the control unit 3a compares the combination of the authentication key with the authentication key (ST4 3) stored in the internal memory entity 3 b. This paper size applies to China National Standard (CNS) A4 specification (210 X 297 mm) -------------- Loading --- (Please read the precautions on the back first and then the page) Magic: --Line- -15- 486675 A7 B7 V. Description of the invention (13) If the comparison indicates that the authentication keys are combined, the control unit 3 a regards the memory 4 as being certified (authentication > 〇 K ") (ST 4 4) . . — — — — — — — — — — — — I · · II (please read the notes on the back first and then the page) If the comparison in step 4 3 shows a difference, the control part 3 a decides that the certification is NG〃 ( ST45). The relationship between the external device and the card M can be authenticated by using an authentication key stored in the internal memory 3 b for authenticating the memory 4. Moreover, as shown in the figure of J116, the internal authentication key K1 for authenticating the memory 4 and the external authentication key κ2 for authenticating the external device can be stored in the internal memory 3b of the card M. [Fourth Embodiment]-Line-An embodiment will now be described in which the authentication of the memory 4 is performed by performing the authentication processing of the third embodiment (step S T4 1-4 5) and the authentication of the second embodiment. Processing (steps ST11 to 14). When data is received from an external device and stored in the memory 4, the memory 4 is deemed to be authenticated. In the case of the fourth embodiment printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, as shown in FIG. 17, the encoded data obtained by encoding an authentication key based on the unique encoding key is stored in advance Change the way it is stored. As shown in FIG. 17, the internal memory 3 b stores an authentication key that is the same as the authentication key used before encoding the encoded data stored in the memory 4, and is used for receiving data received from an external device. Encoding program for encoding data, a decoding program for decoding the encoded data stored in the memory 4, and according to the encoding program, when receiving data is encoded or according to the decoding program, the encoded data is decoded The paper size used is in accordance with China National Standard (CNS) A4 (210 X 297 mm) -16- 486675 A7 _ B7 V. Description of the invention (14) A code gun is printed by the Consumer Cooperative of the Smart Hope Production Bureau of the Ministry of Economic Affairs. These keys and programs are stored in an immutable way. As shown in Figure 17, the internal memory 3b stores information about the area used for the last processing (FAT: File Allocation Table); check and add up the entire Yiyi 4 (one confirmation); at the last time Checksum (one confirmation) stored in memory 4 at the end of processing; or the like. Each of the memory 4 and the internal memory 3 b is composed of an unchangeable ROM portion and a changeable ROM component. The authentication key is stored in an immutable R OM part. The changeable ROM component is a non-volatile memory and can be maintained in the state of the last processing of the memory 4. With reference to the flowchart shown in FIG. 18, how to perform authentication processing when receiving data from an external device using the above-mentioned structure will be described. Upon receiving the data from the external device (ST5 1), the control unit 3a performs the authentication process according to the third embodiment (ST52), and performs the authentication process according to the second embodiment (ST 5 3). If each authentication process is > 0 K " (ST 5 4), the control unit 3a encodes the received data based on the encoding key stored in the internal memory 3b (ST5 5). For this encoding operation, an encoding program stored in the internal memory 3b is executed. Then, the control unit 3 a stores the encoded data in the memory 4 (S T 5 6). After this storage operation, the control unit 3 a stores the data indicating the state of the billionth body 4 in the internal memory 3 b (overwrite) (ST57) ° If any authentication process is NG 〃, the control unit 3 a ends Processing (ST 5 8). Please read the note on the back first

I •裝 f 訂 ▲ 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -17- 486675 A7 ___B7___ 五、發明說明(15) 當將儲存在記億體4中之編碼資料加以解碼複製時, 解碼作業之實施方式類似於上述之方式。 要儲存在記憶體4中之資料可爲音樂資訊或程式。 可使用儲存在內部記憶體3 b中,用於對記億體4力D 以認證之認證鑰,加以認證外部設備與卡片Μ間之關係。 而且,如第1 9圖中所示,用於認證記憶體4之內部認證 鑰Κ 1與ρ於認證外部設備之外部認證鑰Κ 2可儲存在卡 片Μ之內部記憶體3 b中。 〔第五實施例〕 現將說明使用上述具有認證功能之記憶卡Μ的一種方 式。 利用實例,參考第2 0與2 1圖將說明如何在網際網 路連結系統中使用記憶卡Μ。 第2 0圖表示將可對一合倂式記憶體加以認證之記憶 體Μ應用到此之網際網路連結系統。 參考第20圖,諸如一 PC (個人電腦)11,一蜂 巢式電話(或行動電話)1 2,一電子攝影機1 3及一 TV (電視)機1 4之各電子裝置備置一卡片插槽與一通 信介面(未示出)。將插槽設計成可接納一實際上大小等 於郵票之記憶卡Μ。記憶卡Μ包含一無法由外部加以存取 之隱藏式儲存區域。要連接至網際網路1 5等需要通信介 面,而通信介面之一實例爲數據機。 根據本實施例,記憶卡Μ之記憶體4儲存包含一使用 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ----------I---裝·-- (請先閲讀背面之注意事項再頁) - 經濟部智慧財產局員工消費合作社印製 -18- 486675 A7 ------ 五、發明說明(16) (請先閱讀背面之注意事項再uPF本頁) 者I D,一使用者密碼,〜郵件帳號,一郵件密碼,一 DN S伺服器位址’一存取點(存取用之電話號碼)等之 網際網路連結資訊1 5 〇。登記在記憶卡M之記憶體4中 之網際網路連結資訊1 5 〇資料格式之決定未參考電子裝 置(即,上述PC 11,蜂巢式電話12,電子攝影機 1 3與電視機1 4 )型式。 當將一記憶卡Μ***卡片插槽時,Pc: 1 1自動開 機並從卡片Μ之記憶體4讀出預定格式之網際網路連結資 訊1 5 0 °這記憶體4儲存用於自動連接至網際網路1 5 之應用程式1 1 0 (即一網際網路連結設定應用程式 110)。當觸發記憶卡Μ時,即執行處理對一合倂式記 憶體之認證,即與第一,第二及第三實施例有關說明之處 理。當記憶體認證爲Α Ο Κ "時,利用儲存在記憶卡Μ之 記憶體3b中儲存之認證鑰可對pc 1 1 (即一外部設 備)加以認證。當這些認證爲> 0 K "時,即執行應用程 式。 經濟部智慧財產局員工消費合作社印製 蜂巢式電話1 2,電子攝影機1 3,電視機1 4與其 它電子裝置亦備置可由一電腦加以讀取之一儲存媒體。儲 存媒體儲存網際網路連結設定應用程式(此後簡稱爲A應 用程式")。儲存媒體由一ROM,一磁碟機,一快閃式 記憶體等組成。應用程式1 1 0可經由一通信線路加以下 如上述,各電子裝置(PC 11,蜂巢式電話12 ,電子攝影機1 3等)備置一應用程式(即’一網際網路 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -19- 486675 A7 B7 五、發明說明(17) --------------裝--- (請先閱讀背面之注意事項再頁) 連結設定應用程式)。以這種·構造,使用者所需要的只是 攜帶記憶卡Μ,儲存網際網路連結資訊1 5 0之記億體4 ,並將其***任一電子裝置(即,PC 1 1,蜂巢式電 話1 2,電子攝影機1 3或電視機1 4)之卡片插槽中。 這麼做,可輕易建立對網際網路1 5之連結。記憶卡Μ並 未依電子裝置中任一特定裝置而加以設計。另言之,使用 者可選擇.睪使用之電子裝置並將記億卡Μ***所選擇裝置 之卡片插槽中。只是這麼做,使用者即可經由裝置連接到 網際網路。 經濟部智慧財產局員工消費合作社印製 關於這實施例,將說明將網際網路連結資訊1 5 0。 登記在記憶卡Μ之記憶體4中之商店。客戶(即使用者) 取一記憶卡Μ至商店或自商店購買一記憶卡Μ。然後,客 戶要求商店將網際網路連結資訊登記在記憶卡Μ之記億體 4中。在第2 0圖所說明之情況中,量販店1 6與一便利 商店1 7會登記網際網路連結資訊。爲了這種登記,量販 店1 6中之P C 1 6 0備置一可以電腦加以讀取之儲存 媒體,且這儲存媒體儲存登記網際網路連結資訊所用之資 訊1 8 0 (即網際網路連結資訊登記應用程式)。便利商 店1 7備置一資訊寫入終端機1 7 0,且這終端機1 7 0 之儲存媒體不只儲存在記憶卡Μ之記億體4中登記網際網 路連結資訊所用之應用程式(即,網際網路連結資訊登記 應用程式)而且儲存用於下載數位內容至記憶卡Μ或一 MD (即迷你磁碟)之一應用程式。 依此方式,量販店1 6與便利商店1 7當作可登記網 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -20- 486675 A7 B7__ 五、發明說明(18) 際網路連結資訊之服務商店。由於靠這些商店之登記服務 ,與網際網路服務業者1 8 (此後簡稱爲服務業者)簽約 之使用者(訂戶)可根據服務業者1 8或服務商店予以計 入。各服務業者1 8可根據訂戶1 9之人數而因此給予退 費1 9給系統業者(即,利用可攜式儲存媒體提供網際網 路連結系統之公司)或服務商店(即登記網際網路連結資 訊之商店如量販店1 6與便利商店1 7 )。 現將說明關於網際網路連結資訊登記服務商店如何利 用第2 0圖中所示系統將網際網路連結資登記(寫入) 在記憶卡Μ之記憶體4中。以下將參考第2 1圖。 當將使用者之記憶卡如箭頭a所示***P C ί 6 0 之卡片插槽中時,即啓動網際網路連結資訊登記應用程式 1 80。一服務業者淸單(服務業者淸單之表單)20 1 顯示在PC 160之顯示單元。(服務業者與提供第 20圖所示系統之公司簽約)。 經濟部智慧財產局員工消費合作社印製 • I I-----1!1_ 裝 i I (請先閲讀背面之注意事項再頁) ••線- 在服務業者淸單之表單2 0 1上,使用者選取一服務 業者或者量販店1 6之業務人員選取使用者要求之一服務 業者。PC 160回應這選取,執行應用程式180並 顯示表示對應於所選取服務業者之訂戶合約內容之信息 20 2。一確認按鍵20 2 a包含在表單中,且當按(選 取)確認按鍵時,即顯示一付款方法選擇表單203。當 在這表單上選擇一種付款方法時,則顯示一郵件帳號準備 表單204。輸入使用者想要之郵件帳號後,PC 1 6 0即連接至使用者所指定服務業者之伺服器2 1 0 ( 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -21 - 486675 A7 B7__ 五、發明說明(19) --------------裝·1 (請先閱讀背面之注意事項再1!^本頁) 這種連結經由網際網路建立)。使用者想要之付款方法與 郵件帳號因此傳送至伺服器2 1 0。如箭頭b所示,隨後 完成確認請求,並顯示連線確認信息2 0 5。 使用者指定之服務業者伺服器210檢查使用者想要 之郵件帳號視其是否已被指定給另一使用者。這種檢查依 第一至第三選擇次序加以完成。如其中之一郵件帳號尙未 被指定,.則決定將討論中之郵件帳號指定給使用者。如所 有郵件帳號皆已被指定,則伺服器2 1 0請求從量販店 1 6之PC 1 6 0輸入不同郵件帳號。 決定使用者想要之郵件帳號並將其指定給使用者後, 伺服器2 1 0決定一指定給使用者之使用者I D,使用者 密碼及郵件密碼。將這些資訊與網路連結所需資訊,包含 一 DN S伺服器位址與一存取點,傳輸至量販店1 6之 PC 16 0。 --線· 經濟部智慧財產局員工消費合作社印製 根據從服務業者之伺服器2 1 0所傳輸之資訊,量販 店1 6之P C 1 6 0產生預定格式之網際網路連結資訊 1 5 0。網際網路連結資訊包含一使用者I D,一使用者 密碼,一郵件密碼,一 D N S伺服器位址,及一存取點。 網際網路連結資訊1 5 0利用一媒體鑰,根據一預定演算 法加以編碼,以下將作說明。當已經啓動將插在P C 1 6 0卡片插槽中之記憶卡Μ記憶體4中編碼資訊之寫入 作業時,則顯示一信息2 0 6,表示正寫入資訊中。 當將資訊寫入記憶卡Μ之記憶體4中時,執行根據第 四實施例之認證。當記憶體認證爲a Ο Κ "時,可利用儲 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -22- 486675 A7 B7___ 五、發明說明(20) 存在記憶卡Μ之記憶體3 b中之認證鑰對P C 1 1 (即 一外部設備)加以認證。當這些認證爲a 0 K 〃時,則開 始寫入作業。 將網際網路連結資訊1 5 0寫入記憶卡Μ之記憶體4 後,PC 160顯示一質詢信息207,詢問使用者是 否利用一密碼保護記憶卡Μ中之資訊。 如果.要求根據密碼之保護,則PC 1 6 0提示使用 者指定一密碼。然後,PC 1 6 0根據一預定演算法將 使用者指定之密碼加以編碼,並將其儲存在記憶卡Μ中。 使用這編碼密碼爲一鑰,從記憶卡Μ取出一媒體鑰。利用 將密碼寫入記憶卡Μ中,PC 160完成一連串網際網 路連結資訊之寫入作業,即使用者登記處理。然後,如箭 頭c所示,PC 1 60顯示一表示完成使用者登記之信 息2 0 8並通知合約計數伺服器2 1 1經由網際網路完成 使用者登記。合約計數伺服器2 1 1由開發現有系統之事 業經營者(即系統提供公司)所擁有。另一方面,如未要 求根據密碼之保護,則P C 1 6 0立即顯示使用者登記 完成信息2 0 8並如箭頭c所示,通知合約計數伺服器 2 1 1已完成使用者登記。合約計數伺服器之通知包含與 使用者與其簽約之服務業者有關之資訊傳輸。 合約計數伺服器211儲存與網際網路服務業者簽約 使用者(訂戶)數量資料,並根據服務業者或網際網路連 結資訊登記服務商店加以計數使用者數量。每次從量販店 1 6之PC 1 6 0收到使用者登記完成之通知時,合約 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------------裝--- (請先閱讀背面之注意事項再本頁) 訂· --線· 經濟部智慧財產局員工消費合作社印製 -23 - 486675 A7 ___Β7 五、發明說明(21) 計數伺服器2 1 1增加一個訂戶數量到服務業者,且量販 店1 6 (即實施登記網際網路連結資訊服務,連接至該服 務業者之商店)增加一個訂戶數量。 如上述,將作爲一鎗使用之資料寫入一記憶體區,俾 能防止膺品記憶卡之製造。記憶體控制L S I對鑰資料力口 以認證,且只當檢測到脗合時才允許存取記憶體。 甚至假如記憶卡之記億體被替換成一較大儲存容量之 記憶體時,由記憶體控制L S I之認證未表示脗合,且因 此防止對記憶體之存取。 爲防止分析,可將記憶體中之鑰資料加以編碼。 本發明與一種記憶卡有關,該記憶卡包含:一用於儲 存資料之記憶體;一用於控制記憶體中資料儲存或用於控 制從記憶體複製資料之控制部件;以及包含控制部件所使 用內部記憶體之一記憶體控制L S I。控制部件比較儲存 在記憶體中之認證鑰與儲存在內部記憶體中之認證鑰,並 決定脗合與否。根據這決定,對記憶體加以認證。 對那些熟於這技術者將輕易產生額外之優點與修飾。 因此,本發明在其更廣方面不限於此處所示與說明之特定 細節與代表實施例。因此,只要不偏離所附申請專利項目 及其對等項目所定義之一般發明觀念之精神與範圍,皆可 做各種不同之修飾。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) — — — — — — — — — — — — I— · I I (請先閱讀背面之注意事項再本頁) 訂·- •線. 經濟部智慧財產局員工消費合作社印製 -24-I • Binding f ▲ This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) -17- 486675 A7 ___B7___ V. Description of the invention (15) When the coded data stored in the record billion 4 When it is decoded and copied, the implementation of the decoding operation is similar to that described above. The data to be stored in the memory 4 may be music information or a program. The relationship between the external device and the card M can be verified by using an authentication key stored in the internal memory 3 b for authenticating the memory 4 force D. Moreover, as shown in FIG. 19, the internal authentication key K1 used for the authentication memory 4 and the external authentication key K2 used to authenticate the external device may be stored in the internal memory 3b of the card M. [Fifth embodiment] A method of using the above-mentioned memory card M having an authentication function will now be described. Using an example, referring to Figures 20 and 21, how to use the memory card M in the Internet connection system will be explained. Fig. 20 shows an Internet connection system to which a memory M capable of authenticating a combined memory is applied. Referring to FIG. 20, each electronic device such as a PC (personal computer) 11, a cellular phone (or mobile phone) 12, an electronic camera 13 and a TV (television) 14 is provided with a card slot and A communication interface (not shown). The slot is designed to accept a memory card M which is actually the size of a stamp. The memory card M contains a hidden storage area that cannot be accessed from the outside. A communication interface is required to connect to the Internet, etc., and one example of the communication interface is a modem. According to this embodiment, the storage of the memory 4 of the memory card M includes a paper size that is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm). ·-(Please read the notes on the back first)-Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs -18-486675 A7 ------ V. Description of the invention (16) (Please read the notes on the back first Note on uPF page) User ID, a user password, ~ mail account, a mail password, a DNS server address, an access point (phone number for access), etc. 1 5 〇. The Internet connection information 15 registered in the memory 4 of the memory card M is determined without reference to the electronic device (ie, the above-mentioned PC 11, cellular phone 12, electronic camera 13 and television 1 4). . When a memory card M is inserted into the card slot, Pc: 1 1 automatically turns on and reads the Internet connection information of a predetermined format from the memory 4 of the card M 1 50 ° This memory 4 is stored for automatic connection to Internet 1 5 applications 1 1 0 (ie an Internet connection setting application 110). When the memory card M is triggered, the process of authenticating a combined memory is executed, that is, the explanations related to the first, second, and third embodiments. When the memory authentication is Α Κ ", the pc 1 1 (that is, an external device) can be authenticated by using the authentication key stored in the memory 3b of the memory card M. When these certifications are > 0 K ", the application is executed. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, cellular phones 12, electronic cameras 13, televisions 14 and other electronic devices are also provided with a storage medium that can be read by a computer. The storage medium stores an Internet connection setting application (hereinafter referred to as A application "). The storage medium consists of a ROM, a disk drive, a flash memory, and so on. Application program 1 10 can be added via a communication line as described above. Each electronic device (PC 11, cellular phone 12, electronic camera 1 3, etc.) is provided with an application program (that is, an Internet paper size applicable to China) Standard (CNS) A4 specification (210 X 297 mm) -19- 486675 A7 B7 V. Description of the invention (17) -------------- install --- (Please read the Note again page) link settings application). With this structure, all the user needs to do is carry a memory card M, store the Internet connection information 150 billion, and insert it into any electronic device (ie, PC 1 1, cellular phone 1 2. In the card slot of the electronic video camera 1 3 or the television 1 4). By doing so, a connection to the Internet 15 can be easily established. The memory card M is not designed for any particular device in the electronic device. In other words, the user can select the electronic device to be used and insert the memory card M into the card slot of the selected device. By doing so, users can connect to the Internet via their device. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs For this example, the Internet connection information 150 will be explained. Store registered in memory 4 of memory card M. The customer (ie, the user) takes a memory card M to the store or purchases a memory card M from the store. The customer then asked the store to register the Internet connection information in the memory card 4 of the card. In the case illustrated in FIG. 20, the mass merchandise store 16 and a convenience store 17 register Internet connection information. For this kind of registration, the PC 16 in the mass merchandiser store 16 has a storage medium that can be read by a computer, and this storage medium stores the information used to register the Internet link information 180 (that is, the Internet link information Register application). The convenience store 17 has an information writing terminal 170, and the storage medium of this terminal 170 is not only stored in the memory card M, the application 4 used to register Internet connection information (ie, Internet link information registration application) and an application for downloading digital content to a memory card M or an MD (ie, a mini disk). In this way, the mass merchandise store 16 and the convenience store 17 are regarded as the netbook paper size that can be registered. The Chinese national standard (CNS) A4 specification (210 X 297 mm) is applied. -20- 486675 A7 B7__ 5. Description of the invention (18) Service store for Internet link information. Due to the registration services of these stores, users (subscribers) contracted with Internet service providers 18 (hereinafter referred to as service providers) can be counted according to service providers 18 or service stores. Each service provider 18 may give a refund 19 to the system provider (ie, a company providing an Internet connection system using a portable storage medium) or a service store (ie, registering an Internet connection) based on the number of subscribers 19 Information stores such as mass merchandisers 16 and convenience stores 17). How the Internet link information registration service store uses the system shown in FIG. 20 to register (write) the Internet link information in the memory 4 of the memory card M will now be explained. Reference will be made to Figure 21 below. When the user's memory card is inserted into the card slot of PC 60 as shown by arrow a, the Internet link information registration application 1 80 is started. A service provider list (form of service provider list) 20 1 is displayed on the display unit of the PC 160. (The service provider signs a contract with a company that provides the system shown in Figure 20.) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs • I I ----- 1! 1_ Install i I (please read the precautions on the back page) •• Line-on the service provider's bill form 2 0 1 , The user selects a service provider or the salesperson 16's salesperson to select a service provider requested by the user. The PC 160 responds to this selection, executes the application program 180, and displays information indicating the contents of the subscriber contract corresponding to the selected service provider 20 2. A confirmation button 20 2 a is included in the form, and when the (select) confirmation button is pressed, a payment method selection form 203 is displayed. When a payment method is selected on this form, a mail account preparation form 204 is displayed. After entering the user's desired email account, PC 1 60 will connect to the server 2 1 0 of the service provider designated by the user (this paper size applies to China National Standard (CNS) A4 specification (210 X 297 mm)- 21-486675 A7 B7__ V. Description of the invention (19) -------------- Installation · 1 (Please read the precautions on the back before 1! ^ This page) This link is via the Internet Way established). The payment method and email account that the user wants are therefore sent to the server 2 1 0. As shown by arrow b, the confirmation request is then completed, and the connection confirmation message 2 0 5 is displayed. The user-designated service provider server 210 checks the mail account the user wants as if it has been assigned to another user. This inspection is performed in the first to third selection order. If one of the email accounts is not assigned, it is decided to assign the email account in question to the user. If all mail accounts have been specified, the server 2 0 requests a different mail account from the PC 16 of the mass merchandiser 16. After determining the mail account desired by the user and assigning it to the user, the server 2 10 determines a user ID, user password, and mail password assigned to the user. The information needed to connect this information to the network, including a DNS server address and an access point, is transmitted to PC 16 0 of the mass merchandiser 16. --Line · Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, based on the information transmitted from the server 2 1 0 of the service provider, the PC 1 6 of the mass merchandiser 16 generates the Internet link information in a predetermined format 1 5 0 . The Internet connection information includes a user ID, a user password, a mail password, a DNS server address, and an access point. The Internet connection information 150 is encoded using a media key according to a predetermined algorithm, which will be described below. When the writing operation of the encoded information in the memory card M memory 4 inserted in the PC 160 slot has been started, a message 2 0 6 is displayed, indicating that the information is being written. When information is written in the memory 4 of the memory card M, authentication according to the fourth embodiment is performed. When the memory certification is a Ο Κ ", the size of the paper can be used to store the Chinese national standard (CNS) A4 specification (210 X 297 mm) -22- 486675 A7 B7___ 5. Description of the invention (20) Memory card exists The authentication key in the memory 3 b of the M authenticates the PC 1 1 (that is, an external device). When these authentications are a 0 K 〃, the writing job starts. After the Internet connection information 150 is written into the memory 4 of the memory card M, the PC 160 displays a challenge message 207 to ask the user whether to protect the information in the memory card M with a password. If. Is required to be protected by a password, PC 1 60 prompts the user to specify a password. Then, the PC 160 encodes the password specified by the user according to a predetermined algorithm, and stores it in the memory card M. Using this encoded password as a key, a media key is taken from the memory card M. By writing the password into the memory card M, the PC 160 completes a series of writing operations of Internet connection information, that is, user registration processing. Then, as indicated by arrow c, the PC 1 60 displays a message 2 0 8 indicating completion of user registration and notifies the contract counting server 2 1 1 to complete the user registration via the Internet. The contract counting server 2 1 1 is owned by the operator (ie, the system provider) who develops the existing system. On the other hand, if protection by the password is not required, PC 160 displays the user registration completion information 2 0 8 immediately and as shown by the arrow c, notifies the contract counting server 2 1 1 that the user registration has been completed. The notification from the contract counting server includes the transmission of information related to the user and the service provider with whom he has contracted. The contract counting server 211 stores data on the number of users (subscribers) contracted with the Internet service provider, and registers the number of users based on the service provider or the Internet connection information registration service store. Each time a notification of user registration is received from PC 16 of the mass merchandiser store 16, the contract paper size applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -------- ------ Equipment --- (Please read the precautions on the back first, then this page) Ordering ----- Printed by the Consumers' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs -23-486675 A7 ___ Β7 V. Description of the Invention (21 ) The counting server 2 1 1 adds a number of subscribers to the service provider, and the mass merchandise store 16 (that is, implements the registration Internet link information service and connects to the service provider's store) increases the number of subscribers. As described above, writing data used as a shot into a memory area can prevent the manufacture of counterfeit memory cards. The memory controller authenticates the key data to the key data and allows access to the memory only when a coupling is detected. Even if the memory of the memory card is replaced by a memory with a larger storage capacity, the authentication of the memory-controlled L S I does not indicate a connection, and therefore access to the memory is prevented. To prevent analysis, the key data in memory can be encoded. The invention relates to a memory card, which comprises: a memory for storing data; a control part for controlling data storage in the memory or for controlling copying of data from the memory; and the use of the control part One of the internal memories is the memory control LSI. The control unit compares the authentication key stored in the memory with the authentication key stored in the internal memory, and decides whether or not to combine. Based on this decision, the memory is authenticated. Those skilled in the art will easily produce additional advantages and modifications. Therefore, the invention in its broader aspects is not limited to the specific details and representative embodiments shown and described herein. Therefore, as long as it does not deviate from the spirit and scope of the general concept of invention defined by the attached patent application and its equivalent, various modifications can be made. This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) — — — — — — — — — — — — I — · II (Please read the precautions on the back before this page) Order ·- • Line. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs-24-

Claims (1)

486675 A8B8C8D8 六、申請專利範圍 1·一種可攜式電子媒體,包含: 一上面備置有接線之基板; i I I I I I I---— la - I I (請先閲讀背面之注意事項再Λ本頁) 一安裝在基板上,用於儲存資料與一第一認證鑰之第 一記憶體;以及 一控制電路,包含··一用於儲存資料與一第二認證鑰 之第二記憶體;以及一用於控制將資料儲存在第一記憶體 中作業與從第一記憶體讀取資料作業之控制部件,該第二 記憶體與被製成安裝在基板上並連接至基板之晶片的該控 制部件, 檢查儲存在第一記憶體中之第一認證鑰是否與儲存在 第二記憶體中之第二認證鑰脗合之該控制部件,由此、决定 第一記憶體是否爲預期之記億體。 2 ·如申請專利範圍第1項之可攜式電子媒體’其中 •線- 該第一記憶體以焊接安裝在基板上;以及 該第二記憶體爲一安裝在基板上之裸晶片。 經濟部智慧財產局員工消費合作社印製 3 ·如申請專利範圍第1項之可攜式電子媒體’其中 之該第一與第二記憶體以一種不可改變方式儲存第二認證 鑰。 4 ·如申請專利範圍第1項之可攜式電子媒體’其中 之該第一與第二記憶體分別包含ROM部份,且認證鑰儲 存在ROM部份中。 5 ·如申請專利範圍第1項之可攜式電子媒體’其中 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 25- 486675 A8 B8 C8 ______ D8 六、申請專利範圍 該第一記憶體與該控制電路安裝在基板之一表面上; 以及 一塗上一硬性金層之外部連結端是備置在基板另一表 面上。 6 ·如申請專利範圍第1項之可攜式電子媒體,其中 之該第二記憶體儲存一用於控制部件之控制控制程式。 7·—種可攜式電子媒體,包含: 一上面備置有接線之基板; 一安裝在基板上,用於儲存資料之第一記憶體;以及 一控制電路,包含:一用於儲存資料與一第一記憶體 狀態資訊之第二記憶體;以及一用於控制將資料儲存在第 一記憶體中作業與從第一記憶體讀取資料作業之控制部件 ’該第二記憶體與被製成安裝在基板上並連接至基板之晶 片的該控制部件, 檢查第一記憶體是否處於與儲存在第二記憶體中之第 一記憶體狀態資訊脗合狀態之該控制部件,由此決定第一 記憶體是否爲預期之記憶體。 8 ·如申請專利範圍第7項之可攜式電子媒體,其中 該第一記憶體以焊接安裝在基板上;以及 該第二記憶體爲一安裝在基板上之裸晶片^ 9 ·如申請專利範圍第7項之可攜式電子媒體,其中 之該第一與第二記憶體爲非揮發性記億體。 1 0 ·如申請專利範圍第7項之可攜式電子媒體’其 _ ____ _ _ _ _ _ _ & i I <請先閲讀背面之注意事項再ijmf本頁) . 線- 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -26- 486675 A8 B8 C8 D8 經濟部智慧財產局員工消費合作社印製 六、申請專利範圍 中之該第一記憶體爲一非揮發性記憶體,且該第二記憶體 包含一裡面儲存第一記憶體狀態資訊之非揮發性記憶體部 份。 1 1 ·如申請專利範圍第7項之可攜式電子媒體,其 中: 該第一記憶體與該控制電路安裝在基板之一表面上; 以及 一塗上一硬性金層之外部連結端是備置在基板另一表 面上。 1 2 ·如申請專利範圍第7項之可攜式電子媒體,其 中之該第二記憶體儲存一用於控制部件之控制程式。 1 3 ·如申請專利範圍第7項之可攜式電子媒體,其 中之該第一記憶體狀態資訊包含至少其中之一:表示在上 次處理時是使用第一記憶體那一區域之資料;在上次處理 結束時所使用之一確認値;以及一關於第一記憶體實體之 確認値。 1 4 ·如申請專利範圍第1 3項之可攜式電子媒體, 其中,第一記憶體之該區域是由一啓始位址與一資料長度 加以定義。 15.—種可攜式電子媒體,包含: 一上面備置有接線之基板; 一安裝在基板上,用於儲存資料與利用將一第一認證 鑰加以編碼所得編碼資料之第一記憶體;以及 一控制電路,包含:一用於儲存資料之第二記憶體, ---— — — — — — — — — —— ^ i — (請先閲讀背面之注意事項再本頁) 訂· --線· 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -27 486675 A8B8C8D8 六、申請專利範圍 一第二認證鑰,一編碼鑰,及一解碼程式;以及一用於控 制將資料儲存在第一記憶體中作業與從第一記憶體複製作 業之控制部件,該第二記億體與被製成安裝在基板上並連 接至基板之晶片的該控制部件, 利用儲存在第二記憶體中之編碼鑰與解碼程式將儲存 在第一記憶體中之編碼資料加以解碼,並進而檢查一合成 認證鑰是否與儲存在第二記憶體中之認證鑰脗合之該控制 部件,由此,決定第一記億體是否爲預期之記憶體。 16·如申請專利範圍第15項之可攜式電子媒體, 其中: 該第一記憶體以焊接安裝在基板上;以及 該第二記憶體爲一安裝在基板上之裸晶片。 17·如申請專利範圍第15項之可攜式電子媒體, 其中之該第一與第二記憶體爲非揮發性記憶體。 18·如申請專利範圍第15項之可攜式電子媒體, 其中之該第一與第二記憶體包含非揮發性記憶體部份,第 一記憶體之非揮發性記憶體部份儲存該編碼資料,且第二 記憶體之非揮發性記憶體部份儲存該認證鑰,該編碼鑰, 及該解碼程式。 1 9 ·如申請專利範圍第1 5項之可攜式電子媒體, 其中: 該第一記憶體與該控制電路安裝在基板之一表面上; 以及 一塗上一硬式金層之外部連結端是備置在基板另一表 --------------裝--- (請先閱讀背面之注意事項再Φ本頁) 訂-· --線· 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -28- 486675 D8 六、申請專利範圍 面上。 2 〇 .如申請專利範圍第1 5項之可攜式電子媒體, 其中之該第二記憶體儲存一用於控制控制部件之控制程式 < l_i i n ϋ n n n I* ϋ I l Bi I · >1 I (請先閲讀背面之注意事項再頁) --線· 經濟部智慧財產局員工消費合作社印製 -29- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公藿)486675 A8B8C8D8 VI. Scope of patent application 1. A portable electronic media, including:-a substrate with wiring on it; i IIIII I ---- la-II (please read the precautions on the back before Λ this page) a A first memory mounted on a substrate for storing data and a first authentication key; and a control circuit including a second memory for storing data and a second authentication key; and a A control unit that controls the operation of storing data in the first memory and the operation of reading data from the first memory, the second memory and the control unit that is made into a wafer mounted on the substrate and connected to the substrate, inspects Whether the first authentication key stored in the first memory and the second authentication key stored in the second memory are combined with the control unit, thereby determining whether the first memory is the expected memory. 2 · The portable electronic media according to item 1 of the patent application, wherein: • The wire-the first memory is mounted on the substrate by soldering; and the second memory is a bare chip mounted on the substrate. Printed by the Employees 'Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 3 · If the portable electronic media in item 1 of the patent application', the first and second memories store the second authentication key in an unchangeable manner. 4 · If the portable electronic media in item 1 of the scope of patent application ', the first and second memories each include a ROM portion, and the authentication key is stored in the ROM portion. 5 · If the portable electronic media in item 1 of the scope of patent application 'wherein this paper size is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 25-486675 A8 B8 C8 ______ D8 The first memory and the control circuit are mounted on one surface of the substrate; and an external connection end coated with a hard gold layer is disposed on the other surface of the substrate. 6. If the portable electronic media of item 1 of the patent application scope, wherein the second memory stores a control control program for controlling the component. 7 · —A portable electronic medium including: a substrate on which wiring is provided; a first memory installed on the substrate for storing data; and a control circuit including: a for storing data and a A second memory of state information of the first memory; and a control unit for controlling operations of storing data in the first memory and reading data from the first memory; the second memory is made of The control part of the wafer mounted on the substrate and connected to the substrate, checks whether the first memory is in the state where the control part is combined with the first memory state information stored in the second memory, thereby determining the first Whether the memory is expected. 8 · If the portable electronic media according to item 7 of the patent application scope, wherein the first memory is mounted on the substrate by soldering; and the second memory is a bare chip mounted on the substrate ^ 9 · If applying for a patent The portable electronic media of the seventh item, wherein the first and second memories are non-volatile memory. 1 0 · If the portable electronic media in the scope of patent application No. 7 'its _ _ _ _ _ _ _ _ _ _ & i I < please read the precautions on the back before ijmf this page). Line-Ministry of Economy Wisdom Printed on the paper by the Consumers ’Cooperative of the Property Bureau Applies to Chinese National Standard (CNS) A4 (210 X 297 mm) -26- 486675 A8 B8 C8 D8 Printed by the Consumers’ Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs The first memory is a non-volatile memory, and the second memory includes a non-volatile memory portion that stores state information of the first memory. 1 1 · The portable electronic media according to item 7 of the scope of patent application, wherein: the first memory and the control circuit are mounted on a surface of a substrate; and an external connection end coated with a hard gold layer is provided On the other surface of the substrate. 1 2 · If the portable electronic media in item 7 of the patent application scope, wherein the second memory stores a control program for controlling the component. 1 3 · If the portable electronic media of item 7 of the patent application scope, wherein the first memory state information includes at least one of them: data indicating that the area of the first memory was used during the last processing; One confirmation card used at the end of the last processing; and one confirmation card for the first memory entity. 14 · If the portable electronic media of item 13 of the patent application scope, wherein the area of the first memory is defined by a starting address and a data length. 15. A portable electronic medium comprising: a substrate on which wiring is provided; a first memory mounted on the substrate for storing data and encoding data obtained by encoding a first authentication key; and A control circuit, including: a second memory for storing data, ----- — — — — — — — — — ^ i — (Please read the precautions on the back before this page) Order ·- Line · This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) -27 486675 A8B8C8D8 6. Application scope of patents-a second authentication key, an encoding key, and a decoding program; and a control program A control part for storing and storing data in the first memory, and a copying operation from the first memory, and the second memory part and the control part made of a wafer mounted on the substrate and connected to the substrate, and stored in the The encoding key and decoding program in the second memory decode the encoded data stored in the first memory, and then check whether a synthetic authentication key is the same as the authentication key stored in the second memory. The engagement of the control member, whereby the first memories determines whether the expected body of memory. 16. The portable electronic media according to item 15 of the application, wherein: the first memory is mounted on the substrate by soldering; and the second memory is a bare chip mounted on the substrate. 17. The portable electronic media according to item 15 of the application, wherein the first and second memories are non-volatile memories. 18. If the portable electronic media of item 15 of the patent application scope, wherein the first and second memories include a non-volatile memory portion, and the non-volatile memory portion of the first memory stores the code Data, and the non-volatile memory portion of the second memory stores the authentication key, the encoding key, and the decoding program. 19. The portable electronic media according to item 15 of the scope of patent application, wherein: the first memory and the control circuit are mounted on a surface of a substrate; and an external connection end coated with a hard gold layer is Prepared on another table of the substrate -------------- Installation --- (Please read the precautions on the back first, then Φ this page) The paper size printed by the consumer cooperative is applicable to the Chinese National Standard (CNS) A4 (210 X 297 mm) -28- 486675 D8 6. The scope of patent application. 2 〇. For example, the portable electronic media in the scope of patent application No. 15, wherein the second memory stores a control program for controlling the control component < l_i in ϋ nnn I * ϋ I l Bi I · > 1 I (Please read the precautions on the back before printing) --Line · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economics-29- This paper size applies to the Chinese National Standard (CNS) A4 (210 X 297 cm)
TW89119160A 2000-09-18 2000-09-18 Portable electronic medium TW486675B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW89119160A TW486675B (en) 2000-09-18 2000-09-18 Portable electronic medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW89119160A TW486675B (en) 2000-09-18 2000-09-18 Portable electronic medium

Publications (1)

Publication Number Publication Date
TW486675B true TW486675B (en) 2002-05-11

Family

ID=21661200

Family Applications (1)

Application Number Title Priority Date Filing Date
TW89119160A TW486675B (en) 2000-09-18 2000-09-18 Portable electronic medium

Country Status (1)

Country Link
TW (1) TW486675B (en)

Similar Documents

Publication Publication Date Title
US6490667B1 (en) Portable electronic medium
US8166531B2 (en) Device registration system, device registration server, device registration method, device registration program, storage medium, and terminal device
US7729925B2 (en) System and method for facilitating real time transactions between a user and multiple entities
US9152911B2 (en) Switching between internal and external antennas
US7303136B2 (en) Storage device
JP4417226B2 (en) Product purchase method, product purchase system, product purchase program, and recording medium
US20030220841A1 (en) Method and system for merchant-to-merchant referrals and item brokering
US20020073042A1 (en) Method and apparatus for secure wireless interoperability and communication between access devices
WO2002001376A1 (en) Host computer, mobile communication device, program, and recording medium
JP5534186B2 (en) Information processing system, information processing server, information processing method, information processing program, etc.
WO2001052212A1 (en) Secure electronic commerce system
EP1197826B1 (en) Secured portable electronic device
US6707892B2 (en) Application terminal
TW486675B (en) Portable electronic medium
TWM427626U (en) Smart card and integrated circuit film for smart card
JP4898055B2 (en) Ticket transfer system
JP2009043271A (en) Service providing system, terminal device, and program
KR20100013363A (en) Ic card based on global platform and method for oprating it and recording medium
KR101191820B1 (en) Electronic Commerce Service Method by Using VOIP and System Thereof
KR100550367B1 (en) Portable electronic medium
GB2412211A (en) Device and user registration
JP3072734U (en) Mobile case with communication function
JP2003259039A (en) Communication method, communication system, storage medium, and program
JP2004206384A (en) Portable information storage medium, information processing device, software distribution system, information processing method and computer-readable storage medium
TW584813B (en) SIM card authentication method of electronic communication device

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees