Semiconductor device with copyright protection function

ABSTRACT

A semiconductor device includes a serial communication interface connector, a non-volatile semiconductor memory, a memory controller, and a memory reader/writer. The serial communication interface connector is capable of being connected to a serial communication interface terminal of electronic equipment. The memory controller includes a memory interface connected to the non-volatile semiconductor memory and a copyright protection function and controls the non-volatile semiconductor memory. The memory reader/writer includes a controller interface connected to the memory controller and a serial communication interface connected to the serial communication interface connector.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is based upon and claims the benefit of priority fromprior Japanese Patent Application No. 2007-215983, filed Aug. 22, 2007,the entire contents of which are incorporated herein by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This invention relates to a semiconductor device. For example, itrelates to a USB memory device with a copyright protection function.

2. Description of the Related Art

Recently, a universal serial bus (USB) memory using a flash memory hasbeen widely utilized as a removable recording medium for use in apersonal computer (PC).

The USB memory device, however, has no mechanism for protecting thecopyright of content recorded in the USB memory device and it cannotrecord the content which requires copyright protection, or even if itcan, the content cannot be reproduced in a PC and the like.

Jpn. Pat. Appln. KOKAI Publication No. 2003-317054 discloses a memoryhaving a USB interface and a secure digital (SD™) interface, which canbe switched between a USB function and an SD™ function. However, whenusing the USB function, the SD™ function is not available.

BRIEF SUMMARY OF THE INVENTION

A semiconductor device according to an aspect of the present inventionincludes:

a serial communication interface connector which is capable of beingconnected to a serial communication interface terminal of electronicequipment;

a non-volatile semiconductor memory;

a memory controller which includes a memory interface connected to thenon-volatile semiconductor memory and a copyright protection functionand which controls the non-volatile semiconductor memory; and

a memory reader/writer which includes a controller interface connectedto the memory controller and a serial communication interface connectedto the serial communication interface connector.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING

FIG. 1 is a block diagram of a USB memory device according to a firstembodiment of the invention;

FIG. 2 is a block diagram showing one example of the USB memory deviceaccording to the first embodiment;

FIG. 3 and FIG. 4 are block diagrams of the USB memories according tothe first embodiment, showing the state of content respectively in therecording time and the reproducing time;

FIG. 5 is a block diagram showing a first constitutional example of theUSB memory device according to the first embodiment;

FIG. 6 is an exploded perspective view of FIG. 5;

FIG. 7 is a block diagram showing a second constitutional example of theUSB memory device according to the first embodiment;

FIG. 8A is an exploded perspective view of FIG. 7 and FIG. 8B is aperspective view of a multi chip package;

FIG. 9 is a block diagram showing a third constitutional example of theUSB memory device according to the first embodiment;

FIG. 10 is an exploded perspective view of FIG. 9;

FIG. 11 is a concept view showing a first logical interface example of aUSB memory device according to a second embodiment of the invention;

FIG. 12 is a concept view showing one example of an SCSI command set atan endpoint EP0 in the writing data;

FIG. 13 is a concept view showing one example of SCSI data set at theendpoint EP1 in the writing data;

FIG. 14 is a diagram showing a mode of enabling/disabling an extensioncommand;

FIG. 15 is a diagram showing codes of extension commands;

FIG. 16 is a diagram showing the format of pass-through mode setcommand;

FIG. 17 is a diagram showing the format of data;

FIG. 18 is a diagram showing the format of an SD™ card execute command;

FIG. 19 is a diagram showing the format of a response get command;

FIG. 20 is a diagram showing the format of a hardware reset command;

FIG. 21A, FIG. 21B, FIG. 22A, FIG. 22B, FIG. 23A, and FIG. 23B aretiming charts showing the processing example of the command;

FIG. 24 is a flowchart showing the operation of the USB memory deviceaccording to the second embodiment;

FIG. 25 to FIG. 27 are block diagrams of the USB memories according tothe second embodiment;

FIG. 28 to FIG. 30 are concept views respectively showing the second tofourth logical interface examples of the USB memories according to thesecond embodiment; and

FIG. 31 is a block diagram of a memory system according to amodification of the first and second embodiments.

DETAILED DESCRIPTION OF THE INVENTION First Embodiment

A first embodiment of the present invention relates to the basicstructure of a semiconductor memory device.

FIG. 1 is a block diagram showing one basic example of a USB memorydevice with a copyright protection function according to the firstembodiment of the present invention.

As illustrated in FIG. 1, a USB memory device according to the firstembodiment includes a universal serial bus (USB) connector 4, anon-volatile semiconductor memory 5, a memory controller 6, and a USBreader/writer 7.

The USB connector 4 is configured to be connectable to a USB terminal 3of electronic equipment 2.

The non-volatile semiconductor memory 5 stores data.

The memory controller 6 includes a copyright protection function(copyright protection circuit) 10, a memory interface (memory I/F) 11connectable to the non-volatile semiconductor memory 5, and a controllerinterface (controller I/F) 12 connectable to the USB reader/writer 7.

The USB reader/writer 7 includes a controller interface (controller I/F)21 connectable to the memory controller 6 and a USB I/F 22 connectableto the USB connector 4.

The USB connector 4, the non-volatile semiconductor memory 5, the memorycontroller 6, and the USB reader/writer 7 are arranged on the samecircuit substrate 1. The non-volatile semiconductor memory has aconnector (not shown) connected to the memory controller. The connectorof the non-volatile semiconductor memory and the USB connector are alsoformed on the same circuit substrate 1.

FIG. 2 is a block diagram showing one specific example of the USB memorydevice with a copyright protection function according to the firstembodiment of the invention.

The electronic equipment 2 here is, by way of example, a personalcomputer (PC). The USB connector 4 of the USB memory device is connectedto the USB terminal 3 of the PC 2.

The USB connector 4 is connected to the USB I/F 22 of the USBreader/writer 7, for example, via two data lines.

The memory controller 6 is, by way of example, a secure digital (SD™)card controller. The controller I/Fs 12 and 21 are, for example, SD™card I/F. The SD™ card I/Fs 12 and 21 are connected to each other, forexample, via four data lines.

The copyright protection circuit 10 is, for example, a CPRM (CopyProtection for Prerecorded Media) circuit. The CPRM is a technology foruse in copyright protection, for example, in an SD™ card.

The non-volatile semiconductor memory 5 is, for example, a NAND-typeflash memory. The memory I/F 11 is, for example, a NAND interface (I/F).The NAND I/F 11 and the NAND-type flash memory 5 are connected to eachother, for example, via eight data lines.

This time, the processing performed in the recording time and thereproducing time of the content requiring the copyright protection willbe described in respect of the USB memory device with a copyrightprotection function according to this embodiment.

(Recording Time)

At first, the processing in recording the content in the NAND-type flashmemory 5 will be described using FIG. 3. FIG. 3 is a block diagram ofthe NAND-type flash memory 5, the SD™ card controller 6, and the USBreader/writer 7 which are included in the USB memory device, and a hostdevice (for example, personal computer (PC)) 2 connected to the USBmemory device. In FIG. 3, the USB connector 4 and the USB terminal 3 areomitted.

As illustrated, the PC 2 includes a media key generating circuit 60, afunction generating circuit 61, a first encryption circuit 62, and asecond encryption circuit 63. Further, the PC 2 stores a device key, acontent encryption key Kt, and content to be encrypted and recorded inthe NAND-type flash memory 5, in its internal memory.

The CPRM circuit 10 of the SD™ card controller 6 further includes anauthentication processing unit 13. The SD™ card controller 6 stores amedia key block (MKB), a media ID, and a media unique key Kmu, in itsinternal memory.

When recording the content, at first, the media key generating circuit60 in the PC 2 reads out the MKB from the CPRM circuit 10 of the SD™card controller 6. MKB is the data recorded in the CPRM circuit 10 whenthe SD™ card controller 6 and the NAND-type flash memory 5 aremanufactured, which is the media key encrypted, i.e., the secretencryption key. The MKB is used for revocation of the host device. Inother words, the host device's use of the content is controlledaccording to the MKB. Each host device is distinguished by each devicekey assigned to each host device from a viewpoint of the SD™ cardcontroller 6.

The media key generating circuit 60 in the PC 2 performs the MKBprocessing using the device key stored in the PC 2 itself and the MKBread from the SD™ card controller 6. The MKB processing is performed bydecoding the MKB using the device key. In the case of that the PC 2 isallowed to use the USB memory device, the PC 2 can get a media key afterthe decoding of the MKB. Otherwise, the PC 2 cannot get the media key orproceed to the next processing. In short, this host device is revoked.

The media key obtained by the media key generating circuit 60 is givento the function generating circuit 61. The function generating circuit61 reads out a media ID from the CPRM circuit 10 of the SD™ cardcontroller 6. The media ID is an ID uniquely assigned to each individualUSB memory device. The function generating circuit 61 generates apredetermined function G, using the media key and the media ID.

The first encryption circuit 62 encrypts the content encryption key Ktusing the function G and gets the encrypted content encryption key Kte.The second encryption circuit 63 encrypts the content using the contentencryption key Kt.

The function G generated by the function generating circuit 61 and theKte obtained by the first encryption circuit 62 are sent to theauthentication processing unit 13 of the CPRM circuit 10. In theauthentication processing unit 13, the authentication and key exchange(AKE) processing is performed. The AKE processing means a procedure forauthenticating the other party by exchanging data between the devicessharing the secret information. In the AKE processing, a method forexchanging data can be executed by only the devices sharing the secretinformation. The encrypted content encryption key Kte is stored in asecurity area of the NAND-type flash memory 5. In order to access to thesecurity area, it is necessary to be authenticated by the AKEprocessing. A media unique key Kmu is used as the shared secretinformation on which the AKE processing is based. The media unique keyKmu means the media ID encrypted by the media key. The authenticationprocessing unit 13 performs the AKE processing, using the function G andthe media unique key Kmu, and when the PC 2 is authenticated, it isallowed to access to the security area of the NAND-type flash memory 5.Consequently, the encrypted content encryption key Kte is stored in thehidden area of the NAND-type flash memory 5.

On the other hand, the content encrypted by the second encryptioncircuit 63 is recorded in the NAND-type flash memory 5 without theprocessing in the CPRM circuit 10. This is why the encrypted contentitself is not recorded in the security area of the NAND-type flashmemory 5.

According to the above, the encrypted content and the encryption key Ktenecessary for decoding the above are recorded in the NAND-type flashmemory 5.

(Reproducing Time)

The processing in reproducing the content recorded in the NAND-typeflash memory 5 will be described using FIG. 4. FIG. 4 is a block diagramof the NAND-type flash memory 5, the SD™ card controller 6, and the USBreader/writer 7 which are included in the USB memory device, and thehost device 2 (for example, PC) connected to the USB memory device. InFIG. 4, the USB connector 4 and the USB terminal 3 are omitted.

Also in the reproducing time of the content, similarly to the recordingtime, at first, a media key is generated by the media key generatingcircuit 60 and a function G is generated by the function generatingcircuit 61. The AKE processing is performed in the authenticationprocessing unit 13, using the function G and the media unique key Kmu.When the PC 2 is permitted to access to the memory, the contentencryption key Kte read from the security area of NAND-type flash memory5 is read by the PC 2. The encrypted content in the NAND-type flashmemory 5 is read by the PC 2 without the processing by the CPRM circuit10.

In the PC 2, a first decoding circuit 64 decodes the Kte using thefunction G and gets the content encryption key Kt. A second decodingcircuit 65 decodes the encrypted content using the content encryptionkey Kt.

The content obtained as mentioned above is reproduced by the PC 2.

The media key generating circuit 60, the function generating circuit 61,the first encryption circuit 62, the second encryption circuit 63, thefirst decoding circuit 64, and the second decoding circuit 65 in FIG. 3and FIG. 4 may be formed by hardware or these same functions may beprovided in the CPU of the PC 2.

(First Constitutional Example)

FIG. 5 is a block diagram showing a first constitutional example of theUSB memory device with a copyright protection function according to thefirst embodiment of the invention and FIG. 6 is an exploded perspectiveview of the USB memory device with a copyright protection function shownin FIG. 5.

As illustrated in FIG. 5, according to the first constitutional example,there are three semiconductor device packages on the circuit substrate1. They are a USB reader/writer chip package 7-2 packaging a USBreader/writer chip 7-1, an SD™ card controller chip package 6-2packaging an SD™ card controller chip 6-1, and a NAND-type flash memorychip package 5-2 packaging a NAND-type flash memory chip 5-1.

These three packages 5-2, 6-2, and 7-2 are arranged on the circuitsubstrate 1, as illustrated in FIG. 6.

The USB reader/writer chip package 7-2 is connected to the USB connector4 arranged on the circuit substrate 1 via wiring 31 formed on thecircuit substrate 1 and also connected to the SD™ card controller chippackage 6-2 via wiring 32 formed on the circuit substrate 1. The SD™card controller chip package 6-2 is connected to the NAND-type flashmemory chip package 5-2 via wiring 33 formed on the circuit substrate 1.

As illustrated in FIG. 6, for example, the circuit substrate 1 ispackaged by the upper package 41 and the lower package 42 in a way ofexposing the USB connector 4 to the outside, and thereby the USB memorydevice is formed.

(Second Constitutional Example)

FIG. 7 is a block diagram showing a second constitutional example of theUSB memory device with a copyright protection function according to thefirst embodiment of the invention, FIG. 8A is an exploded perspectiveview of the USB memory device with a copyright protection function shownin FIG. 7, and FIG. 8B is a perspective view showing an example of chiparrangement in a multi chip package.

As illustrated in FIG. 7, FIG. 8A, and FIG. 8B, the secondconstitutional example is different from the first constitutionalexample in that the NAND-type flash memory chip 5-1 and the SD™ cardcontroller chip 6-1 are packaged in one package 5-3. The package 5-3 isa so-called multi chip package (MCP) typed semiconductor device and isreferred to as an SD™ card function MCP 5-3 device in thisspecification.

As illustrated in FIG. 8B, the SD™ card controller chip 6-1 is arrangedon the NAND-type flash memory chip 5-1 as an example chip arrangement inthe MCP. Both are mutually connected via bonding wire 51.

The USB reader/writer chip package 7-2 is connected to the USB connector4 arranged on the circuit substrate 1 via the wiring 31 formed on thecircuit substrate 1 and also connected to the SD™ card function MCP 5-3via the wiring 33 formed on the circuit substrate 1.

As illustrated in FIG. 8A, for example, the circuit substrate 1 ispackaged by the upper package 41 and the lower package 42 in a way ofexposing the USB connector 4 to the outside, and thereby the USB memorydevice is formed.

Compared with the first constitutional example, the secondconstitutional example has such an advantage that the USB memory devicecan be downsized because the circuit substrate 1 can be downsized bypackaging the NAND-type flash memory chip 5-1 and the SD™ cardcontroller chip 6-1 into one package 5-3.

(Third Constitutional Example)

FIG. 9 is a block diagram showing a third constitutional example of theUSB memory device with a copyright protection function according to thefirst embodiment of the invention, and FIG. 10 is an explodedperspective view of the USB memory device with a copyright protectionfunction shown in FIG. 9.

As illustrated in FIG. 9 and FIG. 10, the third constitutional exampleis different from the first constitutional example in that the functionof the USB reader/writer chip 7-1 and the function of the SD™ cardcontroller chip 6-1 are integrated into one chip 7-3 and packaged in thepackage 7-4. The chip 7-3 is simply referred to as a controller chip inthis specification.

The controller chip 7-3 includes a USB I/F 22 and a NAND I/F 11 and thecontroller chip 7-3 converts the data transferred from the USB connector4 into that one writable in the NAND-type flash memory chip 5-1. On thecontrary, the controller chip 7-3 converts the data read from theNAND-type flash memory chip 5-1 into that reproducible in electronicequipment, such as PC having a USB terminal.

Compared with the first constitutional example, the third constitutionalexample has the same advantage; the USB memory device can be downsizedeasily because the number of semiconductor packages to be arranged onthe circuit substrate 1 can be decreased.

According to the USB memory device according to the first embodiment, itis possible to obtain a USB memory device with a copyright protectionfunction which can record and reproduce copyright protected content byconnecting the USB reader/writer 7 to the memory controller 6controlling the non-volatile semiconductor memory 5 with a copyrightprotection function.

Second Embodiment

A second embodiment relates to a logical interface on USB for making useof a copyright protection function built in the SD™ card also for theUSB memory device.

The USB terminal is provided in electronic equipment such as a PC(hereinafter, referred to as a host) and is used for connecting variouskinds of peripheral equipment (referred to as target) to the hostthrough high-speed serial communication. At present, the USB terminalcan be used to connect a removable recording medium such as anon-volatile semiconductor memory as the target, to the host. In the USBstandard, a recording medium capable of reading and writing datadirectly via the USB terminal, between the target and the host, isdefined as the USB mass storage class.

Data can be read from and written in a recording medium conforming tothe standard of the USB mass storage class by transferring the commandand data described, for example, according to the standard format ofsmall computer system interface (SCSI), using the bulk transfer by theUSB interface (USB I/F) between the host and itself. In the recordingmedium conforming to the standard of the USB mass storage class, thedata can be directly written from the host and directly read out to thehost without using a card reader or any special software. As the commanddescribed according to the standard format of SCSI, there is, forexample, an SCSI block device command, and an AT Attachment (ATA) blockread/write command is well known. In this specification, the commandsdescribed according to the standard of SCSI are all referred to as anSCSI command.

The SCSI command of the USB mass storage class provides an access meansfor directly writing data in a recording medium connected to the hostvia the USB terminal or directly reading data therefrom. The currentSCSI command is designed to provide the access means for directlywriting and reading data from the host with respect to the usual userdata of the recording medium. The current SCSI command does not providean access means to a copyright protection function, for example, anaccess means to the CPRM function included in the SD™ card.

In order to provide the access means to a copyright protection function,this embodiment provides an operation mode for exclusive use in accessto the copyright protection function, in a recording medium conformingto the standard of the USB mass storage class, for example, in anon-volatile semiconductor memory card conforming to the standard of theUSB mass storage class.

The logical interface on the USB has to be devised in order to realizethe operation mode for exclusive use in access to the copyrightprotection function.

Hereinafter, some examples of the devised logical interfaces thatrealize the above exclusive operation mode will be described as thesecond embodiment.

(First Logical Interface Example)

The logical interface according to a first example is an example whichcan be applied to the USB memories according to the first and secondexamples in the first embodiment.

In this example, there is prepared an operation mode for exclusive usein direct access to the memory controller from the host via the USBreader/writer.

In the exclusive operation mode, commands and data transmitted from thehost are transferred through the USB reader/writer in the USB memorydevice to the memory controller, for example, the SD™ card controller.This exclusive operation mode is hereinafter referred to as“pass-through mode” in this specification.

In this example, a new command is prepared in order to enable theexclusive operation mode. This new command will be later described indetail.

FIG. 11 is a view showing the first logical interface example of the USBmemory device according to the second embodiment of the invention. Thelogical interface shown in FIG. 11 is defined at a communicationinterface of the target (USB memory device), not the host. Thiscommunication interface is loaded on the USB reader/writer of the USBmemory device according to the embodiment.

As illustrated in FIG. 11, when the USB memory device according to theembodiment is connected to, for example, the USB terminal of the host,an end point (EP) is recognized as the mass storage class interface inthe communication interface, similarly to the general USB memory device.In this example, three end points, EP0 to EP2, are prepared in the massstorage class interface. The term “end point” refers to a theoreticalminimum unit of communication passage for connecting between the USBmemory device and the host device and is specified by the USB standard.

The end point EP0 is a control end point (control EP). That is, the endpoint EP0 is used for control of the USB device in, for example,configuration of the USB device, and can execute only control transfer.

Contrary to this, transfer of the SCSI command, data and response is allcarried out using the end points EP1, EP2 to enable bulk transfer. Ofthem, the end point EP1 is an end point for downstream (bulk in EP).Data and SCSI commands transferred from the host device 10 to the target(USB memory device) are sent by bulk transfer and set to the end pointEP1. The end point EP2 is end point for upstream (bulk out EP), in whichfor example, data transferred from the target (USB memory) to the hostdevice 10 is set.

As the SCSI command of this example, as well as ordinary commands foruse in the USB memory device, for example, the aforementioned ATA blockread/write command, the command for exclusive use in pass-through modeis defined as an extension command of the SCSI command. The extensioncommand is the SCSI command in which a memory controller command, forexample, an SD™ card command, is embedded. The embedded memorycontroller command is a command for enabling the copyright protectionfunction, and, for example, in case of the SD™ card command, theembedded command becomes a command (command for copyright protection)for enabling the CPRM function in the SD™ card controller. An example ofan embedded command is shown in FIG. 12.

FIG. 12 shows an example of the SCSI command set for the end point EP1in the writing data. A communication packet on the USB interface shownin FIG. 12 is set at the end point EP1. In this example, the extensioncommand (exclusive command for pass-through mode) is written in thecommunication packet, and the command and data (command for copyrightprotection, device key, and so on) is embedded in the communicationpacket. The communication packet conforms to the communication protocolof the USB memory device. The extension command is described accordingto the SCSI format and the extension command can be read out by the USBreader/writer. On the contrary, the embedded command (SD™ card command)conforms to the communication protocol different from the communicationprotocol of the USB memory device; in this example, the communicationprotocol of the memory card. The embedded command can be read out by thememory controller.

When the USB reader/writer in the USB memory device reads out theextension command to enable the pass-through mode, the USB reader/writerenables the pass-through mode. When the pass-through mode is enabled,thereafter, transfer of commands, data, and responses in thepass-through mode becomes possible and the SD™ command embedded in theextension command is transferred to the memory controller, for example,the SD™ card controller, passing through the USB reader/writer.

When the SD™ card controller reads out the command for copyrightprotection, which passes through the USB reader/writer, the copyrightprotection function in the SD™ card controller starts and, for example,access to the CPRM function in the SD™ card controller is granted. Thedata accompanying the command for copyright protection is also embeddedin the communication packet in addition to the command for copyrightprotection. The representative example of the accompanying data is thedevice key described in the first embodiment. Downstream data is thedata accompanying the command for copyright protection. FIG. 13 showsone example of downstream data.

FIG. 13 shows one example of the SCSI data (SCSI downstream data) set atthe end point EP1 in the writing data. The SCSI data shown in FIG. 13 isthe copyright protected content to be transferred to the USB memorydevice. The content is embedded in one communication packet on the USBinterface in the example. Although the communication packet itselfconforms to the communication protocol of the USB memory device, thecontent of the example conforms to the communication protocol of thememory card. When the pass-through mode is enabled, the content embeddedin the communication packet is transferred, passing through the USBreader/writer, to the memory controller, for example, the SD™ cardcontroller.

The command for copyright protection and the data accompanying thecommand for copyright protection (in the example, the device key and thecontent) are transferred to the SD™ card controller, passing through theUSB reader/writer. When the SD™ card controller receives the command anddata, the SD™ card controller encrypts the content based on the devicekey, media key block (MKB), and media ID, as described in the firstembodiment. Thereafter, the SD™ card controller writes the encryptedcontent in the non-volatile semiconductor memory, for example, theNAND-type flash memory.

A more detailed example of the above operation will be describedhereinafter.

The SCSI command and data (downstream data) set at the end point EP1 aretransferred from the mass storage class interface to the SCSI commandinterface. The data (upstream data) and response from the USB memorydevice according to the embodiment are set at the end point EP2 from thememory card, in this example from the SD™ card via the SCSI commandinterface.

When the SCSI command set at the end point EP1 is a normal command, forexample, an ATA block read/write command, the SCSI command interfaceperforms the SCSI command processing according to the normal massstorage class. The USB memory device according to the embodiment has amemory card, for example, an SD™ card, as a recording medium. The SCSIcommand interface in this example converts the command and datadescribed conforming to the standard format of the SCSI into the command(SD™ card command) and data for access to the memory card, for example,a memory area of the SD™ card. When the SCSI command is the normalcommand, for example, an ATA block read/write command, the copyrightprotection function is not used. Therefore, the data (downstream data)set at the end point EP1 is directly recorded in, for example, thememory area of the SD™ card.

As mentioned above, when the normal SCSI command is set at the end pointEP1, the USB memory device according to the embodiment operatesaccording to the normal SCSI command similarly to the general USB memorydevice. The USB memory device according to the embodiment can be used inthe same way as the general USB memory device. The operation when thenormal SCSI command is set is the same as that of a general USB memorydevice.

In contrast, when the SCSI command set at the end point EP1 is theextension command, for example, a command for exclusive use inpass-through mode, the SCSI command interface performs the SCSI commandprocessing for the pass-through mode. Namely, the SD™ card commandembedded in the SCSI command is taken out and transferred to the SD™card controller. This enables the SD™ card controller to have access tothe security area of the NAND-type flash memory.

The extension command, for example, the command for exclusive use inpass-through mode can be obtained, for example, by defining a venderunique command according to the SCSI protocol. The USB reader/writer canobtain a function of enabling the operation (pass-through operation) ofdirectly transferring the commands and data to the memory card, forexample, the SD™ card, by supporting the vendor unique command.

The logical interface of the USB memory device according to theembodiment has a first access mode of having access to the normal dataarea defined in the above communication interface, and a second accessmode of having direct access to a copyright protection function in thenon-volatile semiconductor memory. In other words, the above logicalinterface includes an interface used for the first access mode and aninterface used for the second access mode.

The above logical interface converts a command for use in the USB into acommand for use in an electric interface included in the non-volatilesemiconductor memory in the first access mode, and accesses to thenon-volatile semiconductor memory according to the converted command. Onthe other hand, in the second access mode, the logical interfaceaccesses directly to the non-volatile semiconductor memory according tothe command for use in the USB.

Hereinafter, an example of the extension command will be described. Therecording medium of the USB memory device in this example is the SD™card. The extension command according to the example can be applied toan example of another logical interface describe later, as well as tothe example of the first logical interface.

FIG. 14 is a view showing an example of a mode for enabling/disablingthe extension command, and a table showing whether each of the normalSCSI command (Normal Command) and the extension SCSI command (ExtensionCommand) is enabled or not in each media type (Media Type).

As illustrated in FIG. 14, the normal SCSI command is enabled when themedia type is the SD™ card or other media compatible with the SD™ card.

Further, the extension SCSI command is enabled when the media type isthe SD™ card, other media compatible with the SD™ card, or media similarto the SD™ card (Illegal Media).

As mentioned above, the normal SCSI command itself is not performed onthe SD™ card controller but is converted into the SD™ card command bythe USB reader/writer and then executed, while the SD™ card commandembedded in the extension SCSI command is directly performed on the SD™card controller by passing through the USB reader/writer.

Next, specific examples of the extension SCSI commands will be describedusing FIG. 15. FIG. 15 is a view showing a relation between eachextension SCSI command and each operation code.

As illustrated in FIG. 15, the following seven codes (Command Code) aredefined in the extension SCSI commands according to an example.

(1) Pass-through mode set command (SD™ Card Passthrough Mode)

operation code “D0h”

(2) SD™ card execute command without data (SD™ Execute (No Data))

operation code “D1h”

(3) SD™ card execute command with read (SD™ Execute (read from SD™Card))

operation code “D2h”

(4) SD™ card execute command with write (SD™ Execute (write to SD™Card)) operation code “D3h”

(5) Response get command (Get Response)

operation code “D4h”

(6) Reserved command (Reserved)

operation code “D5h”

(7) Hardware reset command (SD™ Hardware Reset)

operation code “D6h”

In this embodiment, the “h” after each numeral shows the hexadecimal ofthe numeral. For example, the operation code “D0h” is described as“1101_(—)0000” in binary notation.

Of the extension SCSI commands, the pass-through mode set command is acommand for changing the USB reader/writer from the normal operatingmode to the pass-through mode. As the operation code, “D0h” is used andthis “D0h” is given to the USB reader/writer in the USB memory devicefrom the host device 10.

The SD™ card execution command without data, SD™ card execution commandwith read and SD™ card execution command with write are commands foraccessing the SD™ card without accompanying data or by accompanyingdata. As the operation code, “D1h”, “D2h”, “D3h” are used and those aregiven from the host device to the USB reader/writer in the USB memorydevice.

The reservation command is allocated to codes of illegal commands.

The hardware reset command is a command for initialization of the SD™card and its firmware and as the operation code, “D6h” is used.

Next, an example of the format of each command will be described withreference to FIG. 16 to FIG. 20. FIG. 16 to FIG. 20 are conceptualdiagrams showing the format of each command and each row of each diagramshows 1-byte data, while a numeral indicated on the abscissa axisindicates the bit position of each 1-byte data.

<Pass Through Mode Set Command>

FIG. 16 is a conceptual diagram showing an example of the format of thepass-through mode set command. When the USB memory device is started,the pass-through mode is disabled. That is, the USB memory device is inthe normal operating mode. In this case, when the USB memory devicereceives a command codes other than the command code “D0h”, the USBmemory device sends back “illegal command error”. That is, USB memorydevice does not recognize any extension command other than “D0h”.

As shown in FIG. 16, “D0h” indicating the pass-through mode set commandis set at a head byte (0 byte position) of the pass-through mode setcommand as an operation code. To disable the pass-through mode, “0000”(“0h”) is set in the command mode and to enable the pass-through mode,“0001” (“1h”) is set. If with the command mode set to “0001”, thepass-through mode set command (code “D0h”) is executed, the pass-throughmode is changed from disable to enable in the USB memory device. As aresult, the pass-through mode is enabled so that the USB memory devicebecomes capable of executing codes “D1h” to “D6h”. In FIG. 16, “LUN”indicates a logic drive for use and “Control Byte” is a predeterminedvalue to be given to the command format.

<Response>

FIG. 17 shows an example of the format of the response. The response isa signal which is given from the SD™ card corresponding to a responseacquisition command and has a meaning of acknowledgement to a command.The relation between the response acquisition command and response willbe described later.

The response is exchanged between the host device and the USB memorydevice according to the format shown in FIG. 17. In FIG. 17, “WP”indicates presence/absence of write protect and when WP=“0”, write ispermitted, while when WP=“1”, write is prohibited. “Media type”indicates the type of media, shown in FIG. 14, which sends back theresponse. When Media Type=“0”, it indicates that medium is not presentand when Media Type=“1”, it indicates that the media is an SD™ card.When Media type=“2”, it indicates that the media is compatible with theSD™ card. When Media type=“3”, it indicates that the media is an illegalmedia which resembles an SD™ card. A relative card address (RCA) is heldat the 6^(th) and 7^(th) byte. The RCA is a value which the SD™ cardsets up itself at the time of initialization of the SD™ card and used asan input parameter for part of the SD™ card command. “Max LUN Number”indicates the number of logic drives.

<SD™ Card Execution Command>

FIG. 18 shows an example of the format of the SD™ card execution commandwithout data, SD™ card execution command with read and SD™ cardexecution command with write. If these commands are not classified, theyare called simply SD™ card execution commands.

The SD™ card execution command is a command which executes someprocessing by accessing the SD™ card actually. As described above, underthe pass-through mode, the SD™ card command is buried in the extensionSCSI command and transferred directly to the SD™ card controller. TheSCSI command in which this SD™ card command is to be buried is the SD™card execution command.

As shown in FIG. 18, an operation code is set at the first 0 byteposition. If no data is required for accessing the SD™ card controller,as the SD™ card execution command without data, “D1h” is set up. Toaccess the SD™ card controller for reading data, as the SD™ cardexecution command with read, “D2h” is set up. To access the SD™ cardcontroller for writing data, as the SD™ card execution command withwrite, “D3h” is set up.

“Send cmd12”, “Standby” and “ACMD” are set at lower three bits in next 1byte position. These are pieces of information indicating how totransfer the SD™ card command buried in the command to the SD™ cardcontroller.

“Send cmd12” is information indicating whether a predetermined commandcmd12 supported by the SD™ card 30 is to be executed in the SD™ card inwhich execution of a command is completed. The command cmd12 is acommand indicating that multi-block transfer to the SD™ card by the hostdevice is ended. The block mentioned here is a group of memory cellswhich hold data in the NAND type flash memory 5 and data held by memorycells in the same block is collectively erased.

“Standby” is information indicating a request command to the SD™ card inthe standby state.

“ACMD” indicates whether the request command is ACMD for a specialpurpose. The command for the special purpose is a command whichaccesses, for example, a lock/unlock function or copyright protectionfunction. Thus, if the request command is a command for the specialpurpose, ACMD=“1” and if it is a normal command, ACMD=“0”.

Then, the SD™ card command is buried in the lower six bits of the 2^(nd)bit and 3^(rd) to 6^(th) bytes position. The SD™ card command contains“SD™ command index”, which indicates the content of a command (read,write, and the like) and “SD™ Command Argument”, which indicatesinformation (address and the like) necessary for executing that command.

Data (“Data Transfer Length”) required for execution of a command suchas reading data and writing data are held at 7^(th) to 9^(th) bytesposition. As mentioned in the first embodiment, for example, when thesecurity area of the NAND-type flash memory is accessed, MKB, media key,function G, Kte, and the like are set in this “Data Transfer Length”.

“Response type” indicates a response type to be sent to the SD™ card. Asthe response type, “R1”, “R1b”, “R2” to “R6” are prepared. The detailsof such will be given later. If “response type” is “0000_(—)0011”, noresponse is sent (“No Res”) and if “0000_(—)0100”, “R1”, “R4” to “R6”are selected. If “0000_(—)0101”, “R1b” is selected, if “0000_(—)0110”,“R2” is selected and if “0000_(—)0111”, “R3” is selected.

<Hardware Reset Command>

FIG. 19 shows an example of the format of the hardware reset command.

As shown in FIG. 19, “D6h” is set at the first 0 byte position as anoperation code.

<Response Get Command>

FIG. 20 shows an example of the format of the response get command.

As shown in FIG. 20, “D4h” is set at the first 0 byte position as theoperation code.

Hereinafter, the relation between the response get command and theresponse will be described. Under the pass-through mode, SD™ cardcommand passes through the USB reader/writer and is sent directly to theSD™ card controller. On the other hand, at an operation mode other thanwhen the pass-through mode is selected, the SCSI command is converted toa command readable by the SD™ card controller in the USB reader/writerand sent into the SD™ card controller.

Some commands of the SD™ card request for a response to a command, andother commands do not request a response. However, such an action is notexpected under a normal SCSI command. Therefore, if a command whichrequests for a response is sent to the SD™ card 30, a response outputfrom the SD™ card controller is enclosed, for example, between the SD™card controller and the USB reader/writer. If the response is enclosedinside of the USB memory device, the action of the USB memory devicemight be unstable or the USB memory device might malfunction.

To eliminate such a fear, in this example, a response get code (GetResponse) is defined in one extension. Thus, the response get code isdefined in one of the extension commands and the defined response getcode is sent to the USB reader/writer. Consequently, a response outputfrom the SD™ card controller is never enclosed inside of the USB memorydevice, so that the response can be sent from the SD™ card controller tothe host device through the USB reader/writer and the USB connecter.Consequently, an advantage of eliminating one of the causes which makethe operation of the USB memory device unstable or the USB memory devicemalfunction can be secured.

FIG. 21A is a view showing an example of command processing for acommand which does not request the SD™ card for any response.

As the type of the command which does not request for any response,addressed (point-to-point) commands (ac) and broadcast commands (bc) areavailable. The response type of these commands is “No Res”. That is, inthe format shown in FIG. 18, the “Response Type” is “0000_(—)0011”.

When the SD™ card execution command without data (SD™ EXECUTE with nodata: “D1h”) with “No Res” is sent from the host device to the USBmemory device as shown in FIG. 21A, only that command is sent to the USBmemory device. The USB reader/writer of the USB memory device whichreceives that command transfers the SD™ card command (Command) embeddedin the received SCSI command to the SD™ card controller. The processingis ended here.

On the other hand, as the type of a command which requests for aresponse, broadcast commands with response (bcr) is available. Theresponse type of this command includes the aforementioned “R1”, “R1b”,“R2” to “R6” and the like. As for these response types, “R1” is a normalresponse, “R1b” is a normal response capable of optionally transferringa busy signal to a data line, “R2” is a response sent from a cardidentification number register (CID) or card specific data register(CSD) within the SD™ card controller, “R3” is a response sent from anoperation conditions register (OCR) within the SD™ card controller, “R4”and “R5” are responses attached to an illegal media which resembles theSD™ card, and “R6” is a response sent form a relative card addressregister (RCA) within the SD™ card. In this specification, the responsetypes “R1” to “R6” are generally called “With Res” and their details areomitted.

FIG. 21B is a diagram showing an example of command processing for acommand which requests the SD™ card for a response. Although theresponse types “R4” and “R5” are not shown because FIG. 21B shows anexample of using the SD™ card as a recording medium of USB memorydevice, the processing example for the response types “R4” and “R5” isthe same as in FIG. 21B.

As shown in FIG. 21B, when the SD™ card execution command without data(SD™ EXECUTE with no data: “D1h”) with the “With Res” is sent to the USBmemory device from the host, a response get command (Get Response:“D4h”) is sent after that command is sent. The related processingexample will be described.

The USB reader/writer which receives the command (“D1h”) with “With Res”transfers the SD™ card command (Command) embedded in the received SCSIcommand to the SD™ card controller. After the SD™ card controllerexecutes a processing following the received SD™ card command, the SD™card controller sends back a response. To get this response from the USBmemory device, the response get command (Get Response: “D4h”) is sent tothe USB memory device from the host. The USB reader/writer whichreceives the response get command fetches the response returned from theSD™ card controller following the received command and sends the fetchedout response (Response Data) to the host. The processing is ended here.

As a further command type, addressed (point-to-point) data transfercommands (adtc) is available. Specific examples of adtc are the SD™ cardexecution command with read and SD™ card execution command with write.Further, when the command type is adtc, a response is requested.

FIG. 22A is a diagram showing an example of command processing for theSD™ card execution command with read (single block read). As shown inFIG. 22A, when the SD™ card execution command with read (SD™ EXECUTEread from SD™ card: “D2h”) is sent to the USB memory device from thehost, the response get command (Get Response: “D4h”) is sent after thatcommand is sent.

The USB reader/writer which receives, for example, the SD™ cardexecution command with read transfers the SD™ card command (Command)embedded in the received SCSI command to the SD™ card controller. TheSD™ card controller executes data reading from the non-volatilesemiconductor memory following the received SD™ card command. Afterthat, the SD™ card controller sends back the response and sends dataread from the non-volatile semiconductor memory to the USBreader/writer. The USB reader/writer sends the received data (TransferData (read from SD™ card)) to the host. After sending of the receiveddata is ended, the response get command (Get Response: “D4h”) is sentfrom the host to the USB memory device. The USB reader/writer whichreceives the response get command fetches out a response sent back fromthe SD™ card controller following the received command, and the fetchedout response (Response Data) is sent to the host. The processing isended here.

FIG. 22B is a diagram showing an example of command processing for theSD™ card execution command with write (single block write). When the SD™card execution command with write (SD™ EXECUTE write to SD™ Card: “D3h”)is sent to the USB memory device from the host as shown in FIG. 22B, theresponse get command (Get Response: “D4h”) is sent after write data(Transfer Data (Write to SD™ Card)) subsequent to that command is sent.

For example, the USB reader/writer which receives the SD™ card executioncommand with write and write data transfers the SD™ card command(Command) embedded in the received SCSI command and the write data(Data) to the SD™ card controller. The SD™ card controller sends backthe response and executes writing of the write data to the non-volatilesemiconductor memory following the received command. After the writingis ended, the USB reader/writer sends the response get command (GetResponse: “D4h”) to the SD™ card controller. The USB reader/writerfetches out the response returned from the SD™ card controller followingthe received command and sends the fetched out response (Response Data)to the host. The processing is ended here.

FIG. 23A is a diagram showing an example of command processing for theSD™ card execution command with read (multiple block read).

The processing example shown in FIG. 23A is different from theprocessing example shown in FIG. 22A in that the processing exampleshown in FIG. 22A is single block read while the processing exampleshown in FIG. 23A is multiple block read. In the single block read, thedata length of read data is equal to or less than the block size of theSD™ card, and the data read is done in a single block. Contrary to this,in the multiple block read, the data length of read data exceeds theblock size of the SD™ card and the data read extends over plural blocks.This example indicates that the block size of the SD™ card is 512 bytes.The multiple block read is different from the single block read in thatthe read data is transferred from the SD™ card controller to the USBreader/writer dividedly, i.e., not in one go, but is otherwise the sameas in the single block read.

FIG. 23B is a diagram showing an example of command processing for theSD™ card execution command with write data (multiple block write).

In the processing example shown in FIG. 23B, the processing exampleshown in FIG. 22B, which is single block write, is changed to multipleblock write. This example is different from the processing example shownin FIG. 22B in that data write is of multiple block write, but isotherwise the same as in the single block write.

As described above, the pass-through mode can be achieved by the firstlogic interface of this embodiment. Hereinafter, a difference betweenthe normal operation mode and pass-through mode will be described simplywith reference to FIG. 24. FIG. 24 is a flow chart showing a flow of theoperation of the USB memory device.

As shown in FIG. 24, unless the USB reader/writer of the USB memorydevice receives a pass-through mode set command (step S10, NO), the USBreader/writer still remains in the normal operation mode (step S11).This operation mode is the same as a conventional USB device. That is,the USB reader/writer receives a normal (conventional) SCSI command fromthe host device (step S12). The USB reader/writer converts the receivedSCSI command to the SD™ card command and outputs to the SD™ cardcontroller (step S13). Then, the SD™ card controller executes theprocessing based on the received SD™ card command (step S14). Becausethe conventional SCSI command does not support the copyright protectionfunction, it can use only commands which agree with the communicationprotocol of the USB, so that it cannot access the security area of theNAND type flash memory (step S15).

When the pass-through mode set command is received in step S10 (stepS10, YES), the USB reader/writer makes the transition to thepass-through mode (step S21). This state is shown in FIG. 25. FIG. 25 isa block diagram of the USB memory device. As shown in figure, theextension SCSI command (pass-through mode set command: “D0h”) is sentfrom the host device 2 to the USB reader/writer in USB communicationprotocol format. Consequently, the USB reader/writer turns to thepass-through mode. After that, the USB reader/writer becomes capable ofreceiving other extension SCSI commands “D1h” to “D6h”.

Next, the USB reader/writer receives the SCSI command (extension SCSIcommand) in which the SD™ card command is embedded (step S22). Then, theUSB reader/writer (MPU of the USB reader/writer) allows the SD™ cardcommand of the extension SCSI commands embedded therein to pass throughand to be output to the SD™ card controller (step S24). Then, the SD™card controller executes the processing based on the SD™ card commandwhich passes through the USB reader/writer (step S24).

The state in Step S22 to S24 is shown in FIG. 26. FIG. 26 is a blockdiagram of the USB memory device, which shows the state in which thehost device 2 reads the MKB and the media ID from the SD™ cardcontroller 6.

As illustrated in FIG. 26, the extension SCSI command (Execute command:“D2h”) is transferred from the host device 2 to the USB reader/writeraccording to the format of the USB communication protocol. A readinginstruction of the MKB and media ID is embedded in the SCSI command inthe format of the SD™ card command (refer to FIG. 18). The USBreader/writer, which is in the pass-through mode, passes the SD™ cardcommand within the SCSI command and supplies it to the SD cardcontroller 6.

The USB reader/writer makes transition to the pass-through mode, therebyenabling access to the security area of the NAND-type flash memory (StepS25). This state is shown in FIG. 27. FIG. 27 is a block diagram of theUSB memory device, showing the state in which the host device 2 writesthe encryption key Kte in the security area of the NAND-type flashmemory 5. As illustrated in FIG. 27, the extension SCSI command (Executecommand: “D3h”) is transferred from the host device 2 to the USBreader/writer according to the format of the USB communication protocol.The encryption key Kte and its writing instruction are embedded in thisSCSI command in the format of the SD™ card command (refer to FIG. 18).The USB reader/writer, which is in the pass-through mode, passes the SD™card command within the SCSI command and outputs it to the SD cardcontroller 6. As the result, the SD™ card controller receives thewriting instruction of the encryption key Kte and writes the encryptionkey Kte in the security area of the NAND-type flash memory 5 accordingto the instruction. Needless to say, the AKE processing is performed inthe circuit 10 for CPRM, as mentioned in the first embodiment. Ofcourse, even in the pass-through mode, access to the normal area of theNAND-type flash memory is possible, and in this case, the processing inthe CPRM circuit is not necessary similar to the conventionaltechnology.

(Second Logical Interface Example)

In the first logical interface example shown in FIG. 11, the USBreader/writer converts the SCSI command on the USB into the SD™ cardcommand and converts the SD™ card command into the SCSI command, inreading and writing data not requiring the copyright protection (normalread and write). Access to the non-volatile semiconductor memory in theUSB memory device is executed according to the SD™ card command.

A second logical interface example is an example in which the USBreader/writer performs conversion between the SCSI command and the SD™card command, in reading and writing data not requiring the copyrightprotection (normal read and write).

FIG. 28 is a view showing the second logical interface example of theUSB memory device with a copyright protection function according to thesecond embodiment of the invention.

As illustrated in FIG. 28, in the second logical interface example, inthe normal read and write, access to the non-volatile semiconductormemory of the USB memory device is performed according to the SCSIcommand. In this example, the non-volatile semiconductor memory is theNAND-type flash memory, and the USB reader/writer directly accesses tothe NAND-type flash memory without converting into the SD™ card command.

On the other hand, in the reading and writing data (content) requiringthe copyright protection, the SD™ card command is embedded in the SCSIcommand similarly to the first logical interface example and access tothe non-volatile semiconductor memory is performed according to theembedded SD™ card command.

The second logical interface example is the same as the first logicalinterface example as for the logical interface on the USB between thehost and the USB reader/writer, except that the USB reader/writer doesnot perform the conversion between the SCSI command and the SD™ cardcommand in the normal read and write.

(Third Logical Interface Example)

FIG. 29 is a view showing a third logical interface example of the USBmemory device with a copyright protection function according to thesecond embodiment of the invention.

As illustrated in FIG. 29, the third logical interface example includesa USB interface used for the pass-through mode and a USB interface usedfor the mode other than the pass-through mode.

In the pass-through mode, the data (content) requiring the copyrightprotection is transferred between the host and the USB memory device,and in the mode other than the pass-through mode, the data (content) notrequiring the copyright protection is transferred between the host andthe USB memory device.

In the example, the command format on the USB interface in thepass-through mode and the communication protocol are the same as thoseof the first logical interface example. The transferred data is set atthe added end points EP3 and EP4 in this example.

The USB interface used in the mode other than the pass-through mode maybe, for example, the standard USB interface, for example, mass storageclass interface. In this example, the transfer data is set at the endpoints EP1 and EP2. Further, in this example, the USB reader/writerperforms the conversion between the SCSI command and the SD™ cardcommand in the normal read/write in the mode other than the pass-throughmode, similarly to the first logical interface example.

(Fourth Logical Interface Example)

FIG. 30 is a view showing a fourth logical interface example of the USBmemory device with a copyright protection function according to thesecond embodiment of the invention.

As illustrated in FIG. 30, the fourth logical interface example includesa USB interface used for the pass-through mode and a USB interface usedfor the mode other than the pass-through mode, similarly to the thirdlogical interface example.

The fourth logical interface example is different from the third logicalinterface example; the USB reader/writer accesses the non-volatilesemiconductor memory according to the SCSI command without commandconversion, similarly to the second logical interface example, althoughin the third logical interface example, it converts a command betweenthe SCSI command and the SD™ card command in the mode other than thepass-through mode.

The third and fourth logical interface examples have a complicatedinterface structure, compared with the case of using the SCSI command onone mass storage class interface like the first and second logicalinterface examples, but they have an advantage of decreasing arestriction on the driver structure of a host because the pass-throughmode is independent in these interfaces.

In the first to fourth logical interface examples, although thepass-through mode is realized by using the SCSI command similarly to themass storage class as the interface class for the pass-through mode, thecommand format can be converted into a command format that is not theSCSI command format.

In the first and fourth logical interface examples, although the classinterface example having a bulk end point has been described as the massstorage class interface for the pass-through mode, the logical interfacefor the pass-through mode may be formed by a class interface formed byonly a control end point (a default end point which can be shared withthe interface of each device class (HID (Human Interface Device: keyboard or mouse) and audio). In this case, the transfer in thepass-through mode is performed at low speed, however, the additional endpoint is not required and it is advantageous in the cost performance.

In the above embodiments, the case of forming the USB memory device bythe non-volatile semiconductor memory 5, the memory controller 6, andthe USB reader/writer 7 which are provided in the same case, has beendescribed. However, the non-volatile semiconductor memory 5 and thememory controller 6 may be provided in a case other than that of the USBreader/writer 7. Namely, for example, in the structure described in FIG.7, the SD™ card function MCP 5-3 and the USB reader/writer chip 7-1 maybe separated. This will be described using FIG. 31. FIG. 31 is a blockdiagram of the memory system according to the modification of the aboveembodiments.

As illustrated in FIG. 31, the memory system includes the USBreader/writer 7 and the SD™ card 30. The SD™ card 30 has the samestructure as that of the SD™ card function MCP 5-3 in FIG. 7 and thisMCP 5-3 forms the memory card (SD™ card) by itself. The USBreader/writer 7, having the structure including the USB reader/writerchip 7-1 and the USB connector 4 in FIG. 7, further includes the SD cardconnector. The SD™ card I/F 12 of the SD™ card 30 is connected to theSD™ card I/F/connector 29. Namely, the USB connector 4, the USBreader/writer function, and the SD card I/F/connector 29 are formed onthe same semiconductor substrate.

The above embodiments can be also applied to the structure shown in FIG.31. Namely, the structure in which the USB reader/writer 7 is connectedto the SD™ card 30 can be regarded as the same structure of the USBmemory device described in the above embodiments, and also in this case,the logical interface viewed from the USB I/F 22 can be regarded asbeing similar to the above embodiments.

Although the above embodiments have been described by way of example ofthe NAND-type flash memory used as the non-volatile semiconductormemory, the non-volatile semiconductor memory is not restricted to theNAND-type flash memory. For example, it may be replaced with the ANDflash memory.

Although in the above embodiments, the non-volatile semiconductor memoryadopts the CPRM function included in the SD™ card function as thecopyright protection function, the copyright protection function is notrestricted to the CPRM function included in the SD™ card function.

Additional advantages and modifications will readily occur to thoseskilled in the art. Therefore, the invention in its broader aspects isnot limited to the specific details and representative embodiments shownand described herein. Accordingly, various modifications may be madewithout departing from the spirit or scope of the general inventiveconcept as defined by the appended claims and their equivalents.

1-20. (canceled) 21: A device comprising: a controller which includes afirst processor processing commands transmitted from a host, thecontroller distinguishing at least two commands; and a memory whichincludes a security area capable of holding data and a second processorprocessing a command processed by the first processor, wherein when acommand transmitted from the host is an extension command includingcopyright protection information, the first processor does not execute atranslation process of the copyright protection information, when acommand transmitted from the host is not the extension command, thefirst processor executes the translation process of the copyrightprotection information and transmits, to the memory, a command to whichthe translation process is executed, the second processor receives acommand transmitted from the first processor, and performs anauthentication process with the host, the copyright protectioninformation initiates a copyright protection function, and the extensioncommand includes an operation code, a reserved area, argumentinformation, and length information. 22: The device according to claim21, wherein the memory is a component in which a second controller asthe second processor and a NAND flash memory are embedded. 23: Thedevice according to claim 21, wherein a third processor which executesthe copyright protection function outputs a response after receiving acommand. 24: The device according to claim 21, wherein access to thesecurity area is allowed after the second processor receives a commandfrom the host. 25: The device according to claim 21, a NAND flash memoryis embedded in the device, and the device is a memory device removablefrom the host. 26: A device comprising: a controller which includes aprocessor receiving commands from a host, the controller distinguishinga command including copyright protection information, from a command notincluding copyright protection information; and a memory which includesa security area capable of holding data, the memory receiving a commandfrom the processor, wherein when a command from the host is an extensioncommand for a copyright protection, the processor executes a process forthe copyright protection included in the extension command, when acommand from the host is not the extension command, the processortranslates the command and sends to the memory, and the memory includesa function of receiving a command from the processor and authenticatingwith the host. 27: The device according to claim 26, wherein the deviceis a memory device removable from the host. 28: The device according toclaim 27, wherein a second controller includes an authenticationfunction with the host is embedded to the memory. 29: The deviceaccording to claim 27, wherein a second processor which executes acopyright protection function outputs a response after receiving acommand.