Abstract:
A key transport method for transporting a key from a buffer memory to an encryption/decryption unit is provided. The method includes logically dividing bits of the key into key segments, wherein each of the key segments has a start position and a segment length. The method also includes setting a transmission length belonging to each of key segments based on the start positions and the segment lengths of the key segments; assigning a transmission bit stream belonging to each of the key segments from the bits of the key according to the start positions and the transmission lengths of the key segments; determining a transmission sequence; and sending the start position, the segment length and the transmission bit stream belonging to each of the key segments to the encryption/decryption unit from the buffer memory based on the transmission sequence. Accordingly, the method can transport the key safely.
Abstract:
An earphone plug applicable to different system specifications includes a terminal and a switch device. The earphone plug is inserted into an earphone jack of an external electronic device for transmitting signals by a plurality of exposed signal interfaces of the terminal. The switch device combined with the terminal has a first conductor and a second conductor. When the switch device is switched between a first mode and a second mode, the first conductor and the second conductor alternately contact with two of the signal interfaces. Thus, the signal transmission defined by the signal interfaces is changed and the earphone plug is applicable to electronic devices with different system specifications.
Abstract:
A data protecting method for a rewritable non-volatile memory module having physical blocks is provided, a plurality of logical block addresses is mapped to a part of the physical blocks. The method includes, configuring a plurality of virtual block addresses to map to the logical block addresses, grouping at least one virtual block address into a virtual block address area, and allocating the virtual block address area to an application. The method also includes, receiving an access command which is configured to instruct accessing a first virtual block address from the application. The method also includes: determining whether the first virtual block address belongs to the virtual block address area, if not, sending an error message to the application. Accordingly, the method can effectively prevent an application from accessing the data which can not be accessed by the application program.
Abstract:
A method of dynamically switching partitions for a memory card having a plurality of physical blocks is provided. The method includes configuring logical blocks for mapping to at least a portion of the physical blocks and dividing the logical blocks into first and second partitions; coupling the memory card to a host system and setting CSD corresponding to the memory card as a first default value corresponding to the first partition, wherein the host system requests the CSD to obtain the first default value and accesses the first partition according to the first default value; and setting the CSD corresponding to the memory card as a second default value corresponding to the second partition in response to a switch command from the host system, wherein the host system re-requests the CSD to obtain the second default value and accesses the second partition according to the second default value.
Abstract:
A key transport method for transporting a key from a buffer memory to an encryption/decryption unit is provided. The method includes logically dividing bits of the key into key segments, wherein each of the key segments has a start position and a segment length. The method also includes setting a transmission length belonging to each of key segments based on the start positions and the segment lengths of the key segments; assigning a transmission bit stream belonging to each of the key segments from the bits of the key according to the start positions and the transmission lengths of the key segments; determining a transmission sequence; and sending the start position, the segment length and the transmission bit stream belonging to each of the key segments to the encryption/decryption unit from the buffer memory based on the transmission sequence. Accordingly, the method can transport the key safely.
Abstract:
A data scrambling method for scrambling raw data from a host system is provided. The data scrambling method includes generating a random number and storing the random number into a storage unit. The data scrambling method also includes receiving a user password from the host system, generating a padded value by using a first function unit based on the random number and the user password, and generating a nonce value by using a second function unit based on the padded value and a key. The data scrambling method further includes generating scrambled data corresponding to the raw data by using a third function unit based on the nonce value and the raw data. Accordingly, the raw data of the host system can be effectively protected.
Abstract:
A data access method for accessing a rewritable non-volatile memory module via a data bus through a first and a second thread module, and a memory controller and a memory storage apparatus using the same are provided. In the present method, an access executing right is assigned to the second thread module to write page data. Whether an access command to be executed by the first thread module is received is determined when the second thread module writes a predetermined amount of page data into a predetermined number of physical pages. The access executing right is assigned to the first thread module when the access command is received, so that the first thread module executes the access command in a foreground mode and the second thread module executes an ongoing task in a background mode. Thereby, timeout caused by delayed response of the first thread module is effectively avoided.
Abstract:
An earphone plug applicable to different system specifications includes a terminal and a switch device. The earphone plug is inserted into an earphone jack of an external electronic device for transmitting signals by a plurality of exposed signal interfaces of the terminal. The switch device combined with the terminal has a first conductor and a second conductor. When the switch device is switched between a first mode and a second mode, the first conductor and the second conductor alternately contact with two of the signal interfaces. Thus, the signal transmission defined by the signal interfaces is changed and the earphone plug is applicable to electronic devices with different system specifications.
Abstract:
A method of dynamically switching partitions for a memory card having a plurality of physical blocks is provided. The method includes configuring logical blocks for mapping to at least a portion of the physical blocks and dividing the logical blocks into first and second partitions; coupling the memory card to a host system and setting CSD corresponding to the memory card as a first default value corresponding to the first partition, wherein the host system requests the CSD to obtain the first default value and accesses the first partition according to the first default value; and setting the CSD corresponding to the memory card as a second default value corresponding to the second partition in response to a switch command from the host system, wherein the host system re-requests the CSD to obtain the second default value and accesses the second partition according to the second default value.
Abstract:
Methods for preparing a patterned metal/metal oxide layer by using a solution type precursor or sol-gel precursor are provided and, especially, a method for preparing a patterned carrier transport of a solar cell and a method for preparing biomedical material are provided, which comprise the following steps: (A) providing a substrate, and a mold with designed patterns formed thereon; (B) coating the substrate with a solution of a precursor to form a precursor layer, wherein the precursor is a metal precursor or a metal oxide precursor; (C) pressing the mold together with the precursor layer to transfer the patterns of the mold onto the precursor layer; (D) curing or pre-curing the precursor layer; (E) removing the mold; and (F) conducting an optional post-treatment, if it being demanded, to further modify the properties of precursor layer.