Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of managing file structure in memory card and its related technology

A technology of file structure and management method, applied in memory systems, internal/peripheral computer component protection, electrical components, etc., can solve problems such as inability to achieve legitimacy management

Inactive Publication Date: 2005-04-06
PANASONIC CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the management of the file structure in the memory card, it is impossible to realize the legitimacy management in the state of distinguishing between the normal area and the authentication area, and further improvement of security is desired.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of managing file structure in memory card and its related technology
  • Method of managing file structure in memory card and its related technology
  • Method of managing file structure in memory card and its related technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] figure 1 It is a structural block diagram showing main parts for realizing the file structure management method in the memory card according to Embodiment 1 of the present invention. exist figure 1 Among them, 101 is a memory card such as an SD memory card, and 102 is a mobile phone device. The mobile phone device 102 executes a normal method for managing the file structure in the memory card 101 . Alternatively, a recording medium recording a program for executing the method by a computer is mounted and executed by the mounted computer.

[0051] The mobile phone device 102 has a control unit 104 , a RAM 108 , and a memory card interface 103 inside. There are many other components, but they are not directly related to the present invention, so descriptions are omitted.

[0052] The mobile phone device 102 performs data communication in addition to audio communication, especially communication of multimedia content data including moving images and still images, and v...

Embodiment 2

[0135] In Embodiment 1 of the present invention, the starting point is to confirm whether the content storage folder exists in the normal area, but in Embodiment 2 of the present invention, the starting point is to confirm whether the first management file exists in the normal area. Next, the method of managing the file structure in the memory card according to the second embodiment will be described.

[0136] Figure 11 It shows the legitimacy verification processing flow of the file structure management system according to Embodiment 2 of the present invention. quote figure 1 and figure 2 .

[0137] First, when the memory card 101 is mounted on the mobile phone device 102, and encrypted data is reproduced and moved on the memory card 101, the management and verification process of the file structure management system in the normal area 106 is first started.

[0138] First, by the control unit 104 of the mobile phone device 102, in step S71, it is checked whether there i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of managing a file structure in a memory card comprises the steps of verifying whether or not a first management file exists in a general area of a memory card which is generally accessible, verifying whether or not available information on an encryption key stored in the first management file exists, when existence of the first management file is verified, and verifying whether or not a second management file exists in an authentication area which requires an authentication process for accessing a memory, when existence of the available information on said encryption key is verified.

Description

technical field [0001] The present invention relates to a normal / abnormal management method of file structures in various memory cards including SD (Secure Digital) memory cards. Background technique [0002] There is an SD memory card as a compact, large-capacity, and security-enhanced recording medium associated with digital network equipment. The memory card has a large capacity and can perform high-speed data input and output, and is mostly used for recording image information, especially animation image information and music information. The SD memory card is equipped with a copyright management function of allowing viewing (reproduction) only to a person who has received a valid license from a valid copyright owner as standard. [0003] However, in the management of the file structure in the memory card, it is impossible to realize the validity management in the state of distinguishing between the normal area and the authentication area, and further improvement of sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/00G06F1/00G06F12/14G06F17/30G06F21/79H04L9/00
CPCG06F21/79G06F12/00
Inventor 和田纮幸藤村一哉平光美纪
Owner PANASONIC CORP