Method for generating flash memory identification code

A technology of identification code and flash memory, which is applied in the computer field, can solve problems such as unsolvable, resource occupation, lack of security measures for physical copying, etc., to achieve the effect of eliminating copying behavior and improving security

Inactive Publication Date: 2012-05-23
SHENZHEN SED ELECTRONICS GROUP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the existing security protection for mobile storage devices represented by flash memory devices is implemented by external protocols and passwords, and there is no effective security measure for physical copying, because the existing technology cannot find a unique association with each specific flash memory. Although it can be compared by setting user fingerprint data, this cannot solve the problem that the same customer illegally copies legal data flash memory devices to multiple flash memory devices. At the same time, setting fingerprint data on flash memory devices will also take up a lot of resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating flash memory identification code
  • Method for generating flash memory identification code
  • Method for generating flash memory identification code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] The difference between the total space of the flash memory and the available space and all bad block indexes are used as identification data;

[0038] Total space 128*1024*1024=134218728 bytes

[0039] 1024 bytes are 1 logical block

[0040] The total logical space is 128*1024=131072 blocks

[0041] The number of logical blocks in available space is 130667 blocks

[0042] All bad block indexes 131072-130867 = 205, listed as follows:

[0043] 12, 201, 1923, 2300...1310303.

[0044] The identification data of the flash memory are 131072-130667, 12, 201, 1923, 2300, ... 1310303.

[0045] In this way, when the flash memory is initially used, these identification data are generated. Every time data is read and written, it must be verified by the read and write program to determine whether the currently read and written flash memory has the same identification data as the object to be read and written. , if consistent, read and write legal, otherwise refuse to read and w...

Embodiment 2

[0047] The total flash memory space, bad block space and all bad block indexes are used as identification data;

[0048] Taking the above flash memory as an example, the identification data are 131072, 205, 12, 201, 1923, 2300, ... 1310303.

Embodiment 3

[0050] The total space of the flash memory, the free space and some bad block indexes are used as identification data;

[0051] Some bad blocks can choose odd or even block index as bad block data.

[0052] Taking the above flash memory as an example, if the bad block index in odd order is used as the bad block data, the identification data are 131072, 130667, 12, 923, ... 1310303.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for generating a flash memory identification code. The method comprises the following steps: A1) performing physical available position detection on flash memory, converting available physical positions into available logical positions, performing bad-block identification on unavailable physical positions and forming a FLASH data table; A2) generating a bad-block index record table on the basis of the FLASH data table according to the corresponding relation between the physical positions and the logical positions; and A3) taking an index record comprising bad-block identification as a unique identification code of the flash memory. As the unique identification code generated for the flash memory by the method comes from block defects formed by uncontrollablefactors in the process of manufacturing semiconductors, the unique identification code has unpredictable and immutable characteristics so as to provide a basic unpredictable and immutable identification code for application programs of flash memory devices and then prevent the content of the flash memory from being read and copied illegally.

Description

technical field [0001] The invention relates to computer technology, in particular to a method for generating flash memory identification codes formed by uncontrollable physical defects. Background technique [0002] In today's network society, information disseminates rapidly, and various software and data that require legal authorization to use are all added with various anti-copy technologies to prevent software and data from being illegally copied, disseminated and used. In the past, common methods to prevent software and data from being copied are usually realized by pure software programs, that is, a mechanism that must be authenticated (such as entering a password) to start the software is added to the software, but pure software programs often have their own unpredictable features. As well as traceable loopholes, it is easy to be cracked by those who are interested in research, or use a hardware copy device to completely copy the software in the storage medium, so th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G11C16/22G11C16/20G11C29/04G06F12/14
Inventor 方泽南
Owner SHENZHEN SED ELECTRONICS GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products