Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate bet
Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions.
대표청구항▼
1. A method of processing a message received at a memory card, comprising: in a controller of a memory card operatively coupled to a host for exchanging commands and data with the host according to a base card protocol, the controller: receiving a first command conforming to a first card protocol an
1. A method of processing a message received at a memory card, comprising: in a controller of a memory card operatively coupled to a host for exchanging commands and data with the host according to a base card protocol, the controller: receiving a first command conforming to a first card protocol and encapsulating a first message part of a plurality of message parts of a message formatted in a second card protocol, where the first command comprises a marker and the first message part;extracting the first message part from the first command in response to detecting the marker within the first command;receiving a subsequent command in the first card protocol, where the subsequent command comprises a subsequent parameter and encapsulates a subsequent message part of the plurality of message parts; andextracting the subsequent message part from the subsequent command upon determining that the subsequent parameter corresponds to message parts already received. 2. The method of claim 1, wherein the first command further comprises a first parameter, and wherein the first parameter and the subsequent parameter are logical block addresses, and wherein determining that the subsequent parameter corresponds to the message parts already received comprises determining if the subsequent parameter corresponds to a sum of the first parameter and a size of the message parts already received. 3. The method of claim 1, wherein the first command further comprises a first parameter, and wherein the first parameter and the subsequent parameter are message set identifiers, and wherein determining that the subsequent parameter corresponds to the message parts already received comprises determining that the subsequent parameter equals the first parameter. 4. The method of claim 1, wherein detecting the marker comprises detecting that the first command is directed to a predetermined address range within the memory card. 5. The method of claim 1, wherein the message comprises an encapsulated command in the second card protocol, further comprising executing the encapsulated command. 6. The method of claim 5, further comprising: receiving an embedded data result in response to executing the encapsulated command;forming a result message in the second card protocol, wherein the result message comprises the embedded data result; andtransmitting the result message to the host in a data field of a response to a second command received from the host. 7. The method of claim 6, wherein the first command further comprises a first parameter, and wherein the first parameter and the subsequent parameter are message set identifiers, and wherein determining that the subsequent parameter corresponds to the message parts already received comprises determining that the subsequent parameter equals the first parameter. 8. The method of claim 7, further comprising, in response to determining that the first message part does not comprise an entire message, setting a flag to indicate that a remainder of the plurality of message parts has not been received. 9. A memory card, comprising: a memory; anda controller in communication with the memory and operatively coupled to a host for exchanging commands and data with the host according to a base card protocol, the controller operative to: receive a first command in the base card protocol, where the first command comprises a marker, and a first embedded message part of a plurality of embedded message parts of an embedded message formatted in an extended card protocol;extract the first embedded message part from the first command in response to detecting the marker within the first command;receive a subsequent command in the base card protocol, where the subsequent command comprises a subsequent parameter and a subsequent embedded message part of the plurality of embedded message parts; andextract the subsequent embedded message part from the subsequent command upon determining that the subsequent parameter corresponds to embedded message parts already received. 10. The memory card of claim 9, wherein the first command further comprises a first parameter, and wherein the first parameter and the subsequent parameter are logical block addresses, and wherein determining that the subsequent parameter corresponds to the embedded message parts already received comprises determining that the subsequent parameter corresponds to a sum of the first parameter and a size of the embedded message parts already received. 11. The memory card of claim 9, wherein the first command further comprises a first parameter, and wherein the first parameter and the subsequent parameter are message set identifiers, and wherein determining that the subsequent parameter corresponds to the embedded message parts already received comprises determining that the subsequent parameter equals the first parameter. 12. The memory card of claim 9, wherein detecting the marker comprises detecting that the first command is directed to a predetermined address range within the memory card. 13. The memory card of claim 9, wherein the embedded message comprises an embedded command in the extended card protocol, further comprising executing the embedded command. 14. The memory card of claim 13, wherein the controller is further operative to: receive an embedded data result in response to executing the embedded command;form a result message in the extended card protocol, wherein the result message comprises an embedded data result; andtransmit the result message to the host in a data field of a response to a second command received from the host. 15. The memory card of claim 13, wherein the controller is further operative to, in response to determining that the first embedded message part does not comprise an entire embedded message, set a flag to indicate that a remainder of the plurality of embedded message parts has not been received. 16. A method of reading data from a memory card, comprising: in a controller of a memory card operatively coupled to a host for exchanging commands and data with the host according to a base card protocol, the controller: receiving a first command formatted in the base card protocol, wherein the first command is directed to a first logical block address and carries an embedded read data message formatted in an extended card protocol;extracting the embedded read data message from the first command in response to detecting the embedded read data message in the first command;determining that a subsequently received second command formatted in the base card protocol is directed to the first logical block address; andtransferring data from the memory card to the host according to the embedded read data message. 17. The method of claim 16, further comprising: subsequently receiving a third command formatted in the base card protocol at the memory card;determining that the third command is directed to an address corresponding to the first logical block address and an amount of data transferred in response to the second command; andtransferring additional data from the memory card to the host according to the embedded read data message. 18. The method of claim 16, wherein the first command is a write and the second command is a read. 19. The method of claim 16, wherein detecting the embedded read data message in the first command comprises detecting a marker in the first command. 20. A memory card, comprising: a memory; anda controller in communication with the memory and operatively coupled to a host for exchanging commands and data with the host according to a base card protocol, the controller configured to: receive a first command formatted in the base card protocol, wherein the first command is directed to a first logical block address and carries an embedded read message formatted in an extended card protocol;in response to detecting the embedded read data message in the first command, extract the embedded read data message from the first command;determine that a second command formatted in the base card protocol and subsequently received at the memory card is directed to the first logical block address; andtransfer data from the memory card to the host according to the embedded read data message. 21. The memory card of claim 20, the controller further operative to: subsequently receive a third command formatted in the base card protocol at the memory card;determine that the third command is directed to an address corresponding to the first logical block address and an amount of data transferred in response to the second command; andtransfer additional data from the memory card to the host according to the embedded read data message. 22. The memory card of claim 20, wherein detecting the embedded read data message in the first command comprises detecting a marker in the first command. 23. A method of receiving a command in a memory card, comprising: in a memory card operatively coupled to a host for exchanging commands and data with the host according to a transfer protocol, receiving at the memory card an embedded command in an embedded protocol within a message in a storage command protocol, the receiving by the memory card including:receiving a transfer command from the host, wherein the transfer command comprises a data field;detecting the message in the data field of the transfer command;extracting the message from the transfer command;if a storage marker and an embedded marker are detected in the message: extracting the embedded command from the message. 24. The method of claim 23, further comprising: if a storage marker and an embedded marker are detected in the message, transmitting the embedded command to an embedded command processing unit in the memory card; andif a storage marker and an embedded marker are not detected in the message, transmitting the message to a storage command processing unit in the memory card, wherein upon receipt a storage command in the storage command protocol can be extracted from the message. 25. The method of claim 23, further comprising: receiving a second message in accordance with the storage command protocol in a data field of a second transfer command in accordance with the transfer protocol, wherein the second message comprises embedded data in the embedded protocol, and the embedded data is associated with the embedded command;extracting the embedded data from the second message; andtransmitting the embedded data to the embedded command processing unit. 26. The method of claim 23, further comprising: receiving an embedded data result in accordance with the embedded protocol from the embedded command processing unit;forming a result message in the storage command protocol, wherein the result message comprises the embedded data result; andtransmitting the result message to the host in a data field of a response to a second transfer command. 27. A memory card, comprising: a memory; anda controller in communication with the memory and operatively coupled to a host for exchanging commands and data with the host according to a transfer protocol, the controller operative to: receive at the memory card an embedded command in an embedded protocol within a message in a storage command protocol, the receiving by the memory card including: receiving a transfer command from the host, wherein the transfer command comprises a data field;detect the message in the data field of the transfer command;extract the message from the transfer command; andif a storage marker and an embedded marker are detected in the message:extract the embedded command from the message. 28. The memory card of claim 27, wherein the controller is further operative to: if a storage marker and an embedded marker are detected in the message, transmit the embedded command to an embedded command processing unit in the memory card; andif a storage marker and an embedded marker are not detected in the message, transmit the message to a storage command processing unit in the memory card, wherein upon receipt a storage command in the storage command protocol can be extracted from the message. 29. The memory card of claim 27, wherein the controller is further operative to: receive a second message in accordance with the storage command protocol in a data field of a second transfer command in accordance with the transfer protocol, wherein the second message comprises embedded data in the embedded protocol, and the embedded data is associated with the embedded command;extract the embedded data from the second message; andtransmit the embedded data to the embedded command processing unit. 30. The memory card of claim 27, further operative to: receive an embedded data result in accordance with the embedded protocol from the embedded command processing unit;form a result message in the storage command protocol, wherein the result message comprises the embedded data result; andtransmit the result message to the host in a data field of a response to a second transfer command.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (69)
Kisliakov,Andrew, Access control for a microprocessor card.
Norman J. Rasmussen ; Brad W. Hosler ; Darren Abramson ; Michael J. McTague, Apparatus and method for dedicated interconnection over a shared external bus.
Lai, Chen Nan; Cheng, Tsair-Jinn; Chien, Shang Chin; Lin, Chanson, Control device applicable to flash memory card and method for building partial lookup table.
Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
Lofgren Karl M. J. ; Stai Jeffrey Donald ; Gupta Anil ; Norman Robert D. ; Mehrotra Sanjay, Device and method for controlling solid-state memory system.
Jones, Thomas C.; Brackenridge, Billy, Digital content distribution, transmission and protection system and method, and portable device for use therewith.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
Lamming, Michael G.; MacLean, Allan; Frayling, Anthony F., Method and apparatus for processing document service requests originating from a mobile computing device.
Xue, Xinjian; Graves, Bradley J.; Morey, Michael G.; Risk, Gregory M.; Hobson, Douglas G.; Aldridge, Amy S.; Taylor, Richard S., Method and system for determination of delivery status of email sent to multiple recipients through multiple protocols.
Marlatt,Teri L., Method for issuing vendor specific requests for accessing ASIC configuration and descriptor memory while still using a mass storage class driver.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Chorley Bernard J. (Hampton GB2) Parkin Graeme I. P. (London GB2) Wichmann Brian A. (Woking GB2) Elsom Simon M. (Feltham GB2), Software protection device.
Getsin, Evgeniy M.; Lamkin, Allan B.; Collart, Todd R., System, method and article of manufacture for remote unlocking of local content located on a client device.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Abbott,Shawn D.; Afghani,Bahram; Sotoodeh,Mehdi; Denton, III,Norman L.; Long,Calvin W., USB-compliant personal key with integral input and output devices.
Fruhauf,Serge; Leaming,Taylor J.; Pomet,Alain C., Universal serial bus (USB) smart card having enhanced testing features and related system, integrated circuit, and methods.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.