Device for processing information and working method thereof

ABSTRACT

A device for processing information and the working method of the same are provided. The device for processing information comprises: a memory in which logic for driving a firmware is stored; a connector for connecting the memory to an external device; and a control unit for providing an interface with a host, for communicating with the host through the connector, and for reading and recording data on the memory. The control unit comprises: a first storing device in which a routine for calling the firmware logic stored in the memory is stored; and a processor for executing the firmware logic, stored in the memory, using the routine stored in the first storing device.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a Continuation of U.S. application Ser. No.12/089,186, filed Aug. 11, 2008, now U.S. Pat. No. 7,797,504 which isthe national phase under 35 U.S.C. §371 of PCT International ApplicationNo. PCT/KR2007/000528 which has an International filing date of Jan. 31,2007, which designated the United States of America and which claimspriority on Korean Patent Application No. 10-2006-0130958 filed on Dec.20, 2006. The entire contents of which are incorporated by referenceherein.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention is directed to a device for processinginformation, particularly, a device for processing information andworking method thereof.

2. Discussion of the Background Art

Recently, an information type of machine like personal computer, fax,scanner, printer, etc.; an A/V machine like TV, set-top box, DVD, VCR,audio, camcorder, game, etc.; and a control type of machine like coffeemaker, electric rice-cooker, refrigerator, washer, microwave oven,camera, etc. have progressed to transmit and receive a variety ofinformation through network.

These various machines used in network are connected as USB, IEEE1394,telephone line, power line, wireless LAN or Bluetooth. Generally, it isnot easy to construct total network because various machines in networkconstruct different sub-networks from each other, and each machine isoperated in different hardware and software platforms from each other.

Thus, as a method of constructing the total network, it is proposed toconstruct a common imaginary computer environment called middleware indispersed machines, and add an application thereto. The middleware issoftware for communication between different types of devices, andenables various machines to communicate in network. Also, the middlewareis placed between operating system and application program, andtransparently connects service client with application dispersed inservice client and server environment, and dispersed data. UPnP, one ofthe middleware technology, was proposed in UPnP forum. The UPnP forumwas established in Oct. 18, 1999, and is an association of about 200companies in the fields of home appliance, computer, home automation,and mobile apparatus. This forum establishes and announces the standardsof device and service on the basis of internet-based communicationstandard, and aims to control the devices by constructing a network inhome or office simply and easily.

In case of the total network described above, a simple network to beable to construct a network as easily as possible is desirable becausethere are many cases in which separate network managers do not exist,and users do not know the network well. Especially, a method to controla client at the same time the client connects to a host has beenstudied. Also, web-sync and PC-sync technology have been used forprocessing information of multi-media device like cellular phone or MP3player, or protecting copyright. These technologies are commonlyprovided through CD or separate storage media, in case of device driver,controlling S/W, and application S/W.

Recently, the performance of a terminal connected to wire or wirelessinternet is affected by a firmware that is a middle level of hardwareand software, as well as having hardware feature and software feature,and the main function of the terminal is embodied as software orfirmware. Since software and firmware having a variety of functions arelinked and operated, and so unexpected errors of software or firmwarethat were not shown in a developing stage are shown when users use it.To recover from these errors, previously in the art, users had todirectly download a cure file from the homepage of a devicemanufacturing company, or directly find and update a distributionversion file.

Also, new function can be added to a terminal by using software orfirmware only, without changing hardware, and so updating of softwareand firmware is frequently made. Thus, a new technology to automaticallyperform update of software and firmware has been required.

Moreover, in upgrading firmware, since program down module needed forupgrade is included in a firmware image upgraded. Thus, if upgradingfails, the program down module cannot be operated. In the case, specialtool, like JTAG, ROM writer, etc., is needed for recovering it. That is,the above kind of firmware is generally stored in mask ROM in acontroller set in a terminal. As is well-known, the mask ROM is a memoryin which contents are already recorded in a manufacturing process, andthe contents cannot be changed by users. Thus, if a semiconductorcompany manufactures a new type or standard of memory, a preexistingcontroller in the art cannot support the new memory because of the maskROM. Also, it is impossible to modify or upgrade firmware.

Further, to update firmware, users had to directly visit A/S center orconnect to the homepage.

SUMMARY OF THE INVENTION

One object of the present invention is to provide a device forprocessing information which automatically updates firmware recorded andstored inside of the device without extra input of user.

Another object of the present invention is to provide a device forprocessing information that can easily perform update of firmware,though the firmware is frequently updated, by recording a logic part incharge of driving of the firmware in a separate flash memory type ofmemory.

Especially, another object of the present invention is to provide adevice for processing information which divides the memory logically,stores a program or contents operated in a host in each divided area,and easily updates the program or contents.

Further, another object of the present invention is to provide aupdating method of the above device for processing information, acommunication method of the device with a host or server, and a workingmethod of the device.

DESCRIPTION OF DRAWINGS

FIG. 1 is a view for describing a use example of a device for processinginformation according to a preferable embodiment of the presentinvention;

FIG. 2 is a schematic block diagram illustrating a mobile communicationterminal according to a preferable embodiment of the present invention;

FIG. 3 is a schematic block diagram illustrating a MP3 player accordingto a preferable embodiment of the present invention;

FIG. 4 is a schematic block diagram illustrating a USB driver accordingto a preferable embodiment of the present invention;

FIG. 5 is a view illustrating a memory of a USB driver according to apreferable embodiment of the present invention;

FIG. 6 is a view illustrating constitution of the memory in FIG. 5 indetail;

FIGS. 7 to 11 are views illustrating constitution of the memoryaccording to another embodiment of the present invention; and

FIG. 12 is a flow chart illustrating an updating process of firmwareaccording to one embodiment of the present invention.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

The device for processing information according to one embodiment of thepresent invention comprises a memory in which a firmware logic isstored; a connecter that connects the memory to outside device; and acontroller that provides an interface to a host, communicates with thehost through the connecter, and reads and writes data to the memory,wherein the controller comprises a first storing means in which aroutine for calling the firmware logic stored in the memory is stored;and a processor of running the firmware logic stored in the memory byusing the routine stored in the first storing means.

The firmware driving method of the device for processing informationaccording to one embodiment of the present invention comprises: loadinga firmware logic stored in a first logic area of a memory in whichwriting and deleting by an unauthorized user are restricted, onto asecond storing means of a controller by using a firmware routine storedin a first storing means of the controller; and running the firmwarelogic loaded to the second storing means.

The communication method of a device for processing informationaccording to one embodiment of the present invention comprises:connecting the device for processing information with a host, andrunning a system software included in the device for processinginformation in the host; loading an identification information stored ina first logic area of a memory to which writing and deleting by anunauthorized user are restricted, transmitting the loaded identificationinformation to the host or a server connected with the host, andrequesting an authentication for connection; and running an applicationprogram or contents stored in the first logic area, or a second logicarea of the memory to which access is allowed by any user, in the host,when the authentication is approved.

Also, the data updating method of the device for processing informationaccording to one embodiment of the present invention comprises:connecting the device for processing information with a host, andrunning a system software included in the device for processinginformation in the host; loading an identification information or a datainformation of the device for processing information stored in a firstlogic area of a memory in which writing and deleting by an unauthorizeduser are restricted, and transmitting the loaded identificationinformation or a data information to a host or a server connected withthe host, and confirming the update command of data; requesting anauthentication for updating data stored in the first logic area in caseof receiving the updating command; and updating data of the first logicarea by receiving updated data from the host or server, when theauthentication is approved.

The information processing method of the device for processinginformation according to one embodiment of the present inventioncomprises: connecting the device for processing information with a host,and running a system software included in the device for processinginformation in the host; transmitting a command information for runningan application program or contents stored in a first logic area of amemory to which writing and deleting by an unauthorized user arerestricted, or a second logic area of the memory to which access isallowed to any user, to the host deciding whether to input a signalrequesting the application program or contents from the host; andrunning the application program or contents stored in the first logicarea or the second logic area in the host, when the signal requestingthe application program or contents is inputted.

In the device for processing information and working method thereofaccording to the present invention, the size of the controller can bereduced by storing the firmware logic in extra memory and storing thefirmware routine in ROM of the controller. Thus, evenmicromini-controller is easily operated.

Also, the device for processing information according to the presentinvention can easily update by storing the firmware logic in extramemory, and so the firmware update for adding a variety of functions isvery easy.

Also, the device for processing information according to the presentinvention can automatically update firmware inside when it is connectedto the host or extra-device, and so is highly trustworthy to a user whoupdates the firmware.

Also, the device for processing information according to the presentinvention can protect firmware from hacking by recording the firmwarelogic in an area which an unauthorized user cannot access.

Also, the device for processing information and working method thereofaccording to the present invention performs authentication throughunique authentication information of the device when it is connected tothe host, extra-server or extra-device to update firmware, and so theauthenticity of the product can be increased.

Also, the device for processing information according to the presentinvention divides a memory logically, stores a program or contentsoperated in the host in each divided area, easily performs update of theprogram or contents, and so can provide highly authentic product.

Hereinafter, preferred embodiments of the present invention will beexplained in more detail with reference to the accompanying drawings.

FIG. 1 is a view for describing a use example of the device forprocessing information according to one preferable embodiment of thepresent invention. FIG. 2 is a schematic block diagram illustrating amobile communication terminal according to the present invention. FIG. 3is a schematic block diagram illustrating a MP3 player according to thepresent invention. Also, FIG. 4 is a schematic block diagramillustrating a USB driver according to the present invention.

The device for processing information of the present invention can beembodied in a variety of examples as shown in FIG. 1. That is, it can beembodied as portable disk device 100, MP3 player 200, mobilecommunication terminal 300, etc., and is not limited thereto.

In the present embodiment, the device for processing information isexplained by MP3 player 200, portable disk device 100, or mobilecommunication terminal 300 only, but is not limited thereto, and mayinclude other device, for example, PDA, PMP, etc.

In FIG. 1, the device for processing information 100, 200 or 300 maycommunicate with a server 600 through a host 400 or a network 500, ormay organically operate by transmitting and receiving a signal with thehost 400.

First, the constitution of a mobile communication terminal 300 will bedescribed briefly.

In FIG. 2, the mobile communication terminal 300 comprises an operator310 to output operation of a user inputted as signal, an OTG 320 toconnect extra-peripheral device, a controller 340 to control a wholeoperation of the mobile communication terminal 300, a memory 330 storingan application program, a user data and a system data, (a user data anda system data, a memory 330 to store an application program), a powersupply 350 to supply power, a display 370 to receive and display anoutput signal from the controller 340 to outside, a camera 360, and aspeaker 380. Also, the mobile communication terminal 300 furthercomprises an outside communication part 390 comprising a GPS 391, anOFDM 392 to receive DMB broadcasting, a D/A converter 393 for voice anddata communication, a RF 394 to receive output of outside communicationpart 390 by wireless, and handle a received signal by wireless, and anantenna 395. Hereinafter, detail descriptions for the mobilecommunication terminal 300 are well know in the art, and so will beomitted.

Next, the constitution of MP3 player 200 will be described briefly.

In FIG. 3, the MP3 player 200 comprises an operator 210 outputtingsignal according to input of user (an operator 210 to output operationof a user inputted as signal), a connecter 220 to be connected with thehost 400 and transmit and receive an electric signal, a controller 240to control a whole operation of the MP3 player 200, a memory 230 storingan application software, a system data and a user data such as MP3files, and etc. (a user data and a system data like MP3 files, a memory230 to store an application software, etc.), a power supply 250, adisplay 260 to receive and display output signal from the controller240, and an earphone 270. Hereinafter, detail descriptions for the MP3player 200 are well know in the art, and so will be omitted.

Next, the constitution of the portable disk device 100 will be describedbriefly.

In FIG. 4, the portable disk device 100 comprises a connecter 110 to bephysically connected with the host 400 and transmit and receive anelectric signal, a controller 120 to control a whole operation of theportable disk device 100, a memory 130 storing data like a user data, asystem data, contents, and etc. (a user data and a system data, and amemory 130 to store data like contents, etc.).

In the constitution, the mobile communication terminal 300, the MP3player 200, and the portable disk device 100 have a connecting part 110,220 and 320 to connect with outside host 400, the controller 120, 240and 340, and the memory 130, 230 and 330, as common and essentialelements. The controller 120, 240 and 340 may further comprise otherelement to perform specific action according to each device, but haveprocessors 121, 241 and 341 for processing, ROM 123, 244 and 343, andRAM 122, 243 and 342, as essential elements. The RAM 122, 243 and 342included in the controller 120, 204 and 340 may be embodied as DRAM,SRAM, etc., and the ROM 123, 244 and 343 may be embodied as flash typeof ROM, etc.

Hereinafter, the constitution and operation of the present inventionwill be described by the portable disk device 100 as one example indetail, but is not limited thereto, and can be applied to a variety ofdevices for processing information, like the mobile communicationterminal 300 and the MP3 player 200 as well as the portable disk device100.

Also, in the present embodiment, the operation will be described underWindow environment of Microsoft Co. Ltd., as one example, but is notlimited thereto, and it is clear to a skilled artisan in the art that itcan be operated in a variety of OS (Operating System) environments.

FIG. 5 is a view illustrating the memory of the USB driver according toone embodiment of the present invention. FIG. 6 is a view illustratingthe constitution of the memory in FIG. 5 in detail. Also, FIGS. 7 to 11are views illustrating the constitution of the memory according toanother embodiment of the present invention.

In FIG. 4, the portable disk device 100 comprises the connecter 110, thecontroller 120, and the flash type of memory 130. The controller 120comprises the processor 121, the RAM 122, and the ROM 123.

In a prior portable disk device, firmware is burned in a mask type ofROM, and so update was not easy. Thus, in the present embodiment, aroutine for calling firmware is stored in the ROM 123, and a firmwarelogic is stored in the memory 130. Thus, update of firmware can beachieved only by updating the firmware logic stored in the memory 130.The memory 130 is made of a flash type, and so is easy to read andwrite, and can update firmware much more easily than one recorded in amask type of ROM in the art.

In case the processor 121 tries to load the firmware logic by using thefirmware routine recorded in the ROM 123, buffering can be done by usingthe RAM 122, and the execution can be done by making the firmware logicstay in the RAM 122 by the firmware routine.

In FIG. 5, the memory 130 in which the firmware logic according to thepresent embodiment was recorded includes a first logic area 131 and asecond logic area 132 that are divided logically.

The first logic area 131 is an area in which writing and deleting by anunauthorized user are restricted, and the second logic area 132 is anarea in which any user can read, write, watch, and delete contentsfreely. The area division like the above is set up at the time ofmanufacture, and the first logic area 131 is an area in which anauthorized user using a separate tool is allowed to write and delete.

The first logic area 131 is divided to a hidden area 131 a and anapplicable area 131 b, as shown in FIG. 6.

The hidden area 131 a is constructed as file system that Window OSsystem of Microsoft Co. Ltd. does not recognize. Only an authorized userusing separate tool (for example, API: Application Program Interface)can read, write, watch and delete data in the hidden area 131 a, whichan unauthorized user cannot access for reading, writing, watching anddeleting. Thus, the area is not displayed in the detector, Explorer.exe,loaded in Window of Microsoft Co. Ltd., and so an unauthorized usercannot access it.

In FIG. 7, a firmware logic 142 is recorded in the hidden area 131 a.Thus, for updating, a part of the function capable of accessing thehidden area 131 a among the functions of API is added to the systemsoftware 141, and then the firmware logic 142 recorded in the hiddenarea 131 a is updated by the system software 141.

Also, fundamental information of the potable disk device such as systemdata of VID (Vender ID, not shown), PID (Product ID, not shown), ESN(Electronic Serial Number, 143), etc. is recorded in the hidden area 131a.

In case the firmware logic 142 is recorded in the hidden area 131 a, itis preferable that the address information of the hidden area 131 a inwhich the firmware logic 142 is recorded is included in the firmwareroutine recorded in the ROM 123. Thus, the processor 121 of thecontroller 120 can access the firmware logic 142 by the addressinformation, and can load and perform the firmware logic 142.

Also, the system software 141 which operate in the host 400 and performssuch various functions as firmware update and access to the server 600may be recorded in the hidden area 131 a.

As shown in FIG. 7, the hidden area 131 a may be constructed as onewhich can store all of the system data, the firmware logic 142 and thesystem software 141, or may be plural ones which can store the systemdata, the firmware logic 142 and the system software 141 in eachseparate area.

Also, as shown in FIG. 8, the firmware logic 142 is recorded in theapplicable area 131 b so that the processor 121 of the controller 120can load and operate the firmware logic 142 recorded in the applicablearea 131 b by using routine of the ROM 123 onto the RAM 122.

The applicable area 131 b is one to recognize as CD-ROM (RW), set up tobe recognized as imaginary device under the Window of Microsoft. Co.Ltd. The function of Autorun.exe 144 including a driving commandinformation is operated in the applicable area 131 b. Thus, in case theportable disk device 100 is connected to the host 400, an applicationprogram 147 or contents 145 a to 145 n stored in a setting position ofthe memory 130 or the host 400 can be operated by the Autorun.exe 144.At this time, as shown in FIG. 9, applicable contents 145 or theapplication program 147 may be stored in the applicable area 131 bitself.

Also, re-writing (RW) can be done in the applicable area 131 b, whichalso can be done by the system software 141 or the API. The applicablearea 131 b is displayed as extra-host driver in Explorer.exe ofMicrosoft. Co. Ltd.

Also, reading and copying of recorded data, contents 145, or applicationprogram 147 are possible, but data, contents 145 or application program147 cannot be deleted because it is imaginary CD-ROM. Only, it is doneby the system software 141 or the API.

The sizes of hidden area 131 a and the applicable area 131 b may bevaried by the system software 141 that is stored in the hidden area 131a and operated by the host 400. The system software 141 is performed inthe host 400, but is operated as a middleware or a platform to a clientdevice. That is, it can run a variety of application programs 147 andplay contents 145 a to 145 n of multi-media file, etc., according toinput of a user, by predetermined programming logic, and can regulate asize between the above areas according to addition of the API function.

For example, in case the size of data stored in the hidden area 131 a isincreased by addition or updating of data, the size of the hidden area131 a is increased, and when the size of data in the hidden area 131 ais decreased by updating the size of the hidden area 131 a can bedecreased to use the applicable area 131 b or the second logic area 132more broadly.

On the other hand, all of the firmware logic 142 and the system software141 may not be stored in the hidden area 131 a, but as shown in FIG. 10,the firmware logic (not shown) may be stored in the hidden area 131 a,and the system software 141 having the function of firmware update maybe stored in a separate applicable area 131 b. It is preferable that thesystem software 141 is automatically run by the Autorun.exe 144 when theportable disk device 100 is connected to the host 400.

Also, as shown in FIGS. 7 to 11, contents 145 a to 145 n and applicationprogram 147, such as client program for VOIP communication, etc. may bestored in any one area of the hidden area 131 a, the applicable area 131b, and the second logic area 132.

The second logic area 132 is an area in which any user can freely readand write, and a user can freely record data, contents 145 a to 145 n,or application program 147, or read data stored in the second logic area132.

If the connecter 110 is connected to the host 400, the second logic area132 can be divided into an area which is immediately displayed in filefinder program, like Explorer.exe of Microsoft Co. Ltd., and a securityarea that is displayed in case a password or user information isinputted.

Also, in the first logic area 131, especially the hidden area 131 a, asshown in FIG. 11, derivation data 148 such as a cookie file 148 b, a logfile 148 c, a user ID, a password information 148 a, and etc. may berecorded. The derivation data 148 may be occurred while the portabledisk device 100 communicates with the host 400, the server 600, or otherdevice. (derivation data 148 occurring while the portable disk device100 communicates with the host 400, the server 600, or other device, forexample a cookie file 148 b, a log file 148 c, a user ID, a passwordinformation 148 a, etc., may be recorded.)

It is achieved by the system software 141. For example, in case of doingVOIP communication by running the client program for VOIP communication,when a user connects to the server providing VOIP service, and inputs IDand password for authentication, they are caught and stored in the firstlogic area 131, and the cookie file created when connecting to theserver is stored in the first logic area 131. So, in case ofre-connecting, connection can be simply made by using the cookie fileand the authentication information.

Hereinafter, the firmware update process of the portable disk device 100according to the present embodiment will be described in detail.

FIG. 12 is a flow chart illustrating the process of updating firmwareaccording to one embodiment of the present invention.

In FIG. 12, first, if a device, that is, a connecter 110 of the portabledisk device 100, is connected to the host 400 (S10), the host 400recognizes this (S11).

Next, the host 400 performs a well-known setting process forcommunication with the portable disk device 100, that is, communicationprotocol matching process (S12).

Then, an auto-executing program of the applicable area 131 b, that is,Autorun.exe 144, is loaded (S13), and then transmitted to the host 400(S14).

Accordingly, the host 400 performs the Autorun.exe 144 (514), and thenasks the portable disk device 100 (S15) for the system software 141.

Next, the portable disk device 100 transmits the system software 141stored in the hidden area 131 a or the applicable area 131 b of thefirst logic area 131 to the host 400 (S17).

The host 400 runs the system software 141 received from the portabledisk device 100 (S18), and is connected to a remote server 600 by thesystem software 141 (S19).

And, the server 600 requests an authentication information forauthentication of the portable disk device 100 that it intends toconnect (S20), through the system software 141, and then the systemsoftware 141 asks the portable disk device 100 for an identificationinformation for authentication and a version information of firmwaredriving now (S21).

Next, the portable disk device 100 transmits the identificationinformation comprising ESN 143 and firmware version information recordedin the first logic area 131 (the identification information recorded inthe first logic area 131, that is, ESN 143 and firmware versioninformation,) to the host 400 (S22), and then the system software 141operated in the host 400 transmits the ESN 143 to the server 600, andrequests authentication (S23).

The server 600 searches and matches a database (not shown) forauthentication by using (as) the ESN 143 (S24).

In case the authentication is not done, a message of non-authenticationis transmitted to the host 400 (S26).

When authenticated, a connection approval signal and a new firmwareversion information are transmitted to the host 400 (S25).

Then, the system software 141 of the host 400 decides update of firmwareby comparing a firmware information operating in the portable diskdevice 100 with a new firmware information received from the server 600(S27).

If it is decided that an old version of firmware is operated, the systemsoftware 141 asks the server 600 (S28) for updating data of thefirmware, receives newest firmware data, and transmits it to theportable disk device 100 for updating (S29 and S30).

On the other hand, in performing a step to determine update of firmwareof the system software 141, the firmware information may be stored inthe device itself, that is, the portable disk device 100, and theinformation about firmware can be obtained from the portable disk device100 according to operation of in the host 400.

Also, the decision of update of firmware may be performed in the server600, not the host 400. That is, if the host 400 is connected to theserver 600 through the system software 141, the system software 141transmits the firmware information stored in the portable disk device100 to the server 600. Accordingly, the server 600 decides whether toupdate or not by comparing a new firmware information with the firmwareinformation of the portable disk device 100. If decided that update isneeded, the data needed for update is transmitted to the host 400.

Also, the system software 141 operated in the host 400 provides a listof application programs 147 or contents 145 a to 145 n stored in thememory 130 of the portable disk device 100, and so makes them usable. Atthis time, selected application program 147 or contents 145 a to 145 nmay be automatically updated through communication with the server 600in case update is needed.

Also, when the system software 141 is operated, all of applicationprogram 147 or contents 145 a to 145 n stored in the hidden area 131 aand the applicable area 131 b as well as firmware can be automaticallyupdated.

Here, the program stored in the system area may be, for example, aprogram to control a remote device, a mail client program, a clientprogram for VOIP communication, etc.

Also, the ESN 143 may be used as authentication means for playingapplication program 147 or contents 145 a to 145 n stored in the memory130 of the portable disk device 100. That is, if a user requests playingof application program 147 or contents 145 a to 145 n, the systemsoftware 141 confirms and plays the ESN 143, (confirms the ESN 143 toplay,) thereby achieving the authentication for playing applicationprogram 147 or contents 145 a to 145 n.

Also, the portable disk device 100 of the present embodiment may beembodied in a multi-chip package type of the controller 120 and thememory 130. The multi-chip package is well-known in the art, and sodetailed descriptions thereon are omitted. If embodied in such amulti-chip package as the above, a slim type of portable disk device 100can be made. And, it is applicable to mobile communication terminal 300and MP3 player 200 enough to embody a slim type of device.

Also, in the present embodiment, the second logic area 132 is an areathat any user can freely access. Thus, if an application program 147 orcontents 145 a to 145 n are recorded in the second logic area 132, theuser can delete it. In this case, it can be made that the whole datarecorded in the second logic area 132 is recorded in the first logicarea 131, that is, the hidden area 131 a or the applicable area 131 b,and the data recorded in the first logic area 131 is copied onto thesecond logic area 132, in case any or all of the whole data is deleted,when the system software 141 confirms the second logic area 132.

This is to prevent deletion of the data by carelessness of a user. Forexample, in case an anti-virus program is stored, when the anti-virusprogram is removed from the second logic area 132, a backup anti-virusprogram of the first logic area 131 is automatically copied by thesystem software 141, whereby the user need not request A/S according tothe data deletion.

Although embodiments of the present invention have been described withreference to a number of illustrative embodiments thereof, it should beunderstood that numerous other modifications and embodiments can bedevised by those skilled in the art that will fall within the spirit andscope of the principles of this invention. More particularly, reasonablevariations and modifications are possible in the component parts and/orarrangements of the subject combination arrangement within the scope ofthe foregoing disclosure, the drawings and the appended claims withoutdeparting from the spirit of the invention. In addition to variationsand modifications in the component parts and/or arrangements,alternative uses will also be apparent to those skilled in the art.

According to the device for processing information and the workingmethod thereof, the firmware logic is separately stored in a memory andthe firmware routine is stored in the ROM of the control unit so thatthe size of the control unit can be significantly reduced and a verysmall-sized control unit can be implemented.

Moreover, the device for processing information according to the presentinvention is convenient to update by storing the firmware logic in aseparate memory and is very easy to update the firmware such thatvarious function are added.

Since the device for processing information of the present inventionautomatically updates the firmware when being connected to the host orother devices, high reliability of updating the firmware is achieved.

According to the device for processing information of the presentinvention, since the firmware logic is recorded in a region to which acertain user cannot access, the firmware is prevented from being hacked.

Moreover, according to the device for processing information and theworking method thereof in accordance with the present invention, theauthorization must be succeed with an identification information of theinformation processing apparatus when the device for processinginformation is connected to the host, a server, or other devices for theupdate of the firmware, so that the reliability increases.

According to the device for processing information of the presentinvention, since the memory is divided logically such that a program orcontents, executed in the host, are stored in the divided regions andthe update of the program or the contents is easily performed, a productwith high reliability can be provided.

1. An information processing device, comprising: a memory including afirst logic area and a second logic area; and a controller configured tocontrol the memory, and wherein the first logic area is not deletable,wherein the second logic area is recordable or deletable, wherein thecontroller is configured to store into the second logic area the samedata as at least one program or content stored in the first logic area,wherein the controller is configured to copy the data from the firstlogic area, and wherein if data recorded in the second logic area isdeleted, the controller is configured to automatically copy the datacorresponding to the deleted data from the first logic area to thesecond logic area.
 2. The information processing device of claim 1,wherein the first logic area further stores a firmware driving logic. 3.The information processing device of claim 2, wherein the first logicarea comprises: a hidden area which is accessible only by an authorizeduser, wherein the firmware driving logic is stored in the hidden area.4. The information processing device of claim 1, wherein the informationprocessing device is a Universal Serial Bus (USB) storage device.
 5. Theinformation processing device of claim 1, wherein the controllercomprises: a first storage unit configured to store a routine to call afirmware driving logic stored in the first logic area; and a processorconfigured to execute the firmware driving logic stored in the firstlogic area, using the routine stored in the first storage unit.
 6. Theinformation processing device of claim 5, wherein the controller furthercomprises: a second storage unit providing a space for loading andexecuting the firmware driving logic.
 7. The information processingdevice of claim 6, wherein the first storage unit is a Read Only Memory(ROM) and the second storage unit is a Random Access Memory (RAM). 8.The information processing device of claim 1, wherein the first logicarea further stores another program or contents.
 9. The informationprocessing device of claim 1, wherein the controller and the memory areformed in a multi-chip package type.
 10. The information processingdevice of claim 1, wherein the first logic area stores a system softwareto record or update a firmware driving logic, an application program, orcontents in the memory, by communicating with a host.
 11. Theinformation processing device of claim 10, wherein the system softwareis executed by the host, and wherein the system software is configuredto download the firmware driving logic from the host or a serverconnected to the host for recording or updating.
 12. The informationprocessing device of claim 10, wherein the system software is downloadedor updated from the host or a server connected to the host.
 13. Theinformation processing device of claim 1, wherein the first logic areais not deletable by a user, and the second logic area is recordable ordeletable by the user.
 14. An information processing device, comprising:a memory including a first logic area and a second logic area; and acontroller configured to control the memory, and wherein the first logicarea is not deletable, wherein the second logic area is recordable ordeletable, wherein the controller is configured to store into the secondlogic area the same data as at least one program or content stored inthe first logic area, wherein the controller is configured to copy thedata from the first logic area, and wherein the first logic areaincludes an applicable area in which watching and reading by any userare allowed.
 15. The information processing device of claim 14, whereinthe applicable area stores a driving command information for executingcontents or a program.
 16. An information processing device, comprising:a memory including a first logic area and a second logic area; and acontroller configured to control the memory, and wherein the first logicarea is not deletable, wherein the second logic area is recordable ordeletable, wherein the controller is configured to store into the secondlogic area the same data as at least one program or content stored inthe first logic area, wherein the controller is configured to copy thedata from the first logic area, and wherein the first logic areacomprises a hidden area which is accessible only by an authorized userand an applicable area in which watching and reading by any user areallowed.
 17. The information processing device of claim 16, wherein thecontroller comprises a first storage unit storing a routine to call afirmware driving logic stored in the first logic area, and wherein thefirst storage unit is configured to record an address information of thefirmware driving logic stored in the first logic area.