Method of managing file structure in memory card and its related technology
A technology of file structure and management method, applied in memory systems, internal/peripheral computer component protection, electrical components, etc., can solve problems such as inability to achieve legitimacy management
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] figure 1 It is a structural block diagram showing main parts for realizing the file structure management method in the memory card according to Embodiment 1 of the present invention. exist figure 1 Among them, 101 is a memory card such as an SD memory card, and 102 is a mobile phone device. The mobile phone device 102 executes a normal method for managing the file structure in the memory card 101 . Alternatively, a recording medium recording a program for executing the method by a computer is mounted and executed by the mounted computer.
[0051] The mobile phone device 102 has a control unit 104 , a RAM 108 , and a memory card interface 103 inside. There are many other components, but they are not directly related to the present invention, so descriptions are omitted.
[0052] The mobile phone device 102 performs data communication in addition to audio communication, especially communication of multimedia content data including moving images and still images, and v...
Embodiment 2
[0135] In Embodiment 1 of the present invention, the starting point is to confirm whether the content storage folder exists in the normal area, but in Embodiment 2 of the present invention, the starting point is to confirm whether the first management file exists in the normal area. Next, the method of managing the file structure in the memory card according to the second embodiment will be described.
[0136] Figure 11 It shows the legitimacy verification processing flow of the file structure management system according to Embodiment 2 of the present invention. quote figure 1 and figure 2 .
[0137] First, when the memory card 101 is mounted on the mobile phone device 102, and encrypted data is reproduced and moved on the memory card 101, the management and verification process of the file structure management system in the normal area 106 is first started.
[0138] First, by the control unit 104 of the mobile phone device 102, in step S71, it is checked whether there i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 