Unlock instant, AI-driven research and patent intelligence for your innovation.
Method for generating flash memory identification code
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of identification code and flash memory, which is applied in the computer field, can solve problems such as unsolvable, resource occupation, lack of security measures for physical copying, etc., to achieve the effect of eliminating copying behavior and improving security
Inactive Publication Date: 2012-05-23
SHENZHEN SED ELECTRONICS GROUP
View PDF3 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
Most of the existing security protection for mobile storage devices represented by flash memory devices is implemented by external protocols and passwords, and there is no effective security measure for physical copying, because the existing technology cannot find a unique association with each specific flash memory. Although it can be compared by setting user fingerprint data, this cannot solve the problem that the same customer illegally copies legal data flash memory devices to multiple flash memory devices. At the same time, setting fingerprint data on flash memory devices will also take up a lot of resources.
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0037] The difference between the total space of the flash memory and the available space and all bad block indexes are used as identification data;
[0038] Total space 128*1024*1024=134218728 bytes
[0039] 1024 bytes are 1 logical block
[0040] The total logical space is 128*1024=131072 blocks
[0041] The number of logical blocks in available space is 130667 blocks
[0042] All bad block indexes 131072-130867 = 205, listed as follows:
[0043] 12, 201, 1923, 2300...1310303.
[0044] The identification data of the flash memory are 131072-130667, 12, 201, 1923, 2300, ... 1310303.
[0045] In this way, when the flash memory is initially used, these identification data are generated. Every time data is read and written, it must be verified by the read and write program to determine whether the currently read and written flash memory has the same identification data as the object to be read and written. , if consistent, read and write legal, otherwise refuse to read and w...
Embodiment 2
[0047] The total flash memory space, bad block space and all bad block indexes are used as identification data;
[0048] Taking the above flash memory as an example, the identification data are 131072, 205, 12, 201, 1923, 2300, ... 1310303.
Embodiment 3
[0050] The total space of the flash memory, the free space and some bad block indexes are used as identification data;
[0051] Some bad blocks can choose odd or even block index as bad block data.
[0052] Taking the above flash memory as an example, if the bad block index in odd order is used as the bad block data, the identification data are 131072, 130667, 12, 923, ... 1310303.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides a method for generating a flash memory identification code. The method comprises the following steps: A1) performing physical available position detection on flash memory, converting available physical positions into available logical positions, performing bad-block identification on unavailable physical positions and forming a FLASH data table; A2) generating a bad-block index record table on the basis of the FLASH data table according to the corresponding relation between the physical positions and the logical positions; and A3) taking an index record comprising bad-block identification as a unique identification code of the flash memory. As the unique identification code generated for the flash memory by the method comes from block defects formed by uncontrollablefactors in the process of manufacturing semiconductors, the unique identification code has unpredictable and immutable characteristics so as to provide a basic unpredictable and immutable identification code for application programs of flash memory devices and then prevent the content of the flash memory from being read and copied illegally.
Description
technical field [0001] The invention relates to computer technology, in particular to a method for generating flash memory identification codes formed by uncontrollable physical defects. Background technique [0002] In today's network society, information disseminates rapidly, and various software and data that require legal authorization to use are all added with various anti-copy technologies to prevent software and data from being illegally copied, disseminated and used. In the past, common methods to prevent software and data from being copied are usually realized by pure software programs, that is, a mechanism that must be authenticated (such as entering a password) to start the software is added to the software, but pure software programs often have their own unpredictable features. As well as traceable loopholes, it is easy to be cracked by those who are interested in research, or use a hardware copy device to completely copy the software in the storage medium, so th...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.