CN101369300B - Computer authentication method and software and hardware using the same - Google Patents
Computer authentication method and software and hardware using the same Download PDFInfo
- Publication number
- CN101369300B CN101369300B CN200810169365.1A CN200810169365A CN101369300B CN 101369300 B CN101369300 B CN 101369300B CN 200810169365 A CN200810169365 A CN 200810169365A CN 101369300 B CN101369300 B CN 101369300B
- Authority
- CN
- China
- Prior art keywords
- computing machine
- bios
- hardware
- software
- output system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 230000002093 peripheral effect Effects 0.000 claims description 9
- 238000010586 diagram Methods 0.000 description 6
- 238000013475 authorization Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 230000002459 sustained effect Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
A computer authentication method comprises: providing software and a computer, wherein the computer at least is provided with a basic input/output system (BIOS), for storing authentication data in advance, and the software executes the following steps on the computer, comprising: performing hardware scanning and identifying whether the computer is an authenticated one, if true, transmitting function call to BIOS to acquire the authentication data.
Description
Technical field
The invention relates to computer authentication, especially about computer software and the mutual method that authenticates of hardware.
Background technology
For the hardware and software of electronic product, for example motherboard chip driver corresponding with it often developed simultaneously in the hope of reaching best user mode.
Yet, computer hardware on stream, the Basic Input or Output System (BIOS) of computing machine (BasicInput/Output System, BIOS) and the research and development of peripheral hardware chip and integrated reality be the work of suitable time and effort consuming, but because software is very easily scattered and the illegal characteristic of using, the software of corresponding these hardware is often transferred on other hardware platform by the person who is ambitious or tenacious of purpose to be used, and causes not at all easy hardware of developing but can't be sold smoothly, thereby hardware manufacturer is sustained a great loss.
Therefore, how avoiding above-mentioned situation to take place real is that the visitor does not allow slow and important topic that need to be resolved hurrily.
Summary of the invention
In view of this, the invention provides a kind of computer authentication, comprise and software is provided and computing machine is provided, this computing machine has Basic Input or Output System (BIOS) (Basic Input/Output System at least, BIOS), and this BIOS stores verify data in advance, wherein, this software can be carried out the following step on this computing machine, comprise carry out hardware scanning with this computing machine of identification whether be can authentic computing machine, if this computing machine for can authentic computing machine, then sending function call out to this BIOS to capture this verify data.
The present invention also provides a kind of software of the authentication method that uses a computer, it can carry out the following step on computing machine, comprise that whether carry out hardware scanning is can authentic computing machine with this computing machine of identification, if this computing machine is can authentic computing machine, then sending function is called out Basic Input or Output System (BIOS) (the Basic Input/Output System to this computing machine, BIOS) to judge whether whether there is verify data among this BIOS, and when this BIOS has this verify data, capture this verify data, wherein this software needs this verify data ability normal operation.
The present invention also provides a kind of computing machine of the authentication method that uses a computer, comprise Basic Input or Output System (BIOS) (Basic Input/Output System, BIOS), it stores verify data in advance, wherein send function and call out when capturing this verify data when this BIOS of this computing machine receives software, then this verify data is sent to ad-hoc location, and notifies this software to this ad-hoc location to capture this verify data.
For above-mentioned purpose of the present invention, feature and advantage can be become apparent, preferred embodiment cited below particularly also cooperates appended graphic elaborating.
Description of drawings
Fig. 1 is the synoptic diagram of hardware and software in the computing machine.
Fig. 2 is a process flow diagram of the computing machine 100 of Fig. 1 being implemented the computing machine authentication according to the present invention.
Fig. 3 is the detailed method process flow diagram of step S204 among Fig. 2 of the present invention.
[main element label declaration]
100~computing machine, 110~hardware, 112~BIOS, 114~chip, 116~chip, 118~chip, 120~software, 122~driver, 124~application program, 130~verify data, S204~S206~step, S304~S308~step.
Embodiment
Fig. 1 is the synoptic diagram of hardware 110 and software 120 in the computing machine 100.Comprise hardware 110 and software 120 in the computing machine 100.One of most important element is Basic Input or Output System (BIOS) (Basic Input/Output System in the hardware 110 of computing machine 100, BIOS) 112, it often is known as firmware (firmware code) again as the bridge that communicates with between hardware 110 and the software 120.In addition, hardware 110 still can comprise the chip 114~118 on some motherboards etc., carries out different functions respectively.In addition, software 120 has driver 122 and application program (Application Program) 124 etc., wherein driver 122 can directly carry out various controls to hardware 110, and application program 124 then can be carried out various application to hardware 110 indirectly by driver.
Fig. 2 is a process flow diagram of the computing machine 100 of Fig. 1 being implemented computer authentication according to the present invention.Please in the lump with reference to figure 1; in one embodiment; computer authentication of the present invention is implemented on computer hardware 110 and the software 120 simultaneously; when hardware 110 and software 120 are worked in coordination and when finishing computer authentication of the present invention; then computing machine 100 normal operation that begins; make hardware 110 and software 120 become each other special-purpose software and hardware by this, avoid the purpose illegally used and reach protection computing machine 100 total systems.
Before flow process in Fig. 2 is carried out, wherein the BIOS112 of computing machine 100 must store verify data 130 in advance, can be when hardware development by the research staff with the interruption resident program of this verify data 130 and other BIOS (as INT10h etc.) burning in the lump in this BIOS112.For example, above-mentioned interruption resident program INT10h purpose is carried out the task relevant with Video service receiving BIOS interrupt call (BIOS Interrupt call), be the prior art that those skilled in the art were familiar with.Yet, this verify data 130 is different from the interruption resident program of prior art, and this verify data 130 can be defined by the developer of hardware 110 voluntarily according to the present invention, does not receive general BIOS interrupt call, thereby having to a certain degree confidentiality, its content and function will describe in detail in the back.
Among Fig. 2, this software 110 is carried out the following step according to embodiments of the invention on this computing machine, comprises among the step S204, and 110 pairs of computing machines of this software 100 carry out whether hardware scanning is can authentic computer hardware with this computing machine of identification.It should be noted that among the present invention hardware and software each other after exploitation, promptly be set and make before disengaging and have specificity each other, in the present embodiment hereat, can authentic hardware promptly refer to the hardware that this software 110 is exclusive.Referring again to Fig. 3, this carries out the detailed method process flow diagram of hardware scanning for Fig. 2 step 204 of the present invention.Among the step S302, software 110 is obtained its specification data to judge that whether it be can authentic BIOS, if judged result is non-, then carries out step S208 and the flow process of method ends on the BIOS112 of this hardware 120; If judged result is for being, then as described in the step S304, software 110 is tested to peripheral hardware hardware such as the chip 114 of this BIOS112 by this BIOS112, and shown in step S306, give record after obtaining the specification data of this chip 114, and then continuing next peripheral hardware hardware of check such as chip 116, its intermediate step S304 and S306 carry out repeatedly up to finishing this hardware scanning operation.Afterwards, shown in step S308, software 110 judges that all elements in the whole hardware 110 comprise that whether BIOS112, chip 114~118 and even whole hardware structure are can authentic hardware, if judged result is non-, then carry out step S208 and the flow process of method ends.If above-mentioned judged result is for being then to carry out next step S206.
Shown in step S206, when this hardware 110 is can authentic hardware, software 120 is that sending function is called out (Function Call) to this BIOS112.In embodiments of the present invention, this function is called out and can be set up on their own by the developer, similar in appearance to aforesaid BIOS interrupt call but both and inequality, its purpose is to capture this verify data 130; In other words, verify data 130 also only could be captured when this function calling is sent to BIOS112.In one embodiment, when BIOS112 receives after this function calls out, then this verify data 130 is sent to ad-hoc location for example among the storer, and notifies this software 120 to this ad-hoc location to capture this verify data 130.It should be noted that, this verify data 130 can comprise the data that make this software 120 be able to normal operation, for example: authorization code, part instruction repertorie sign indicating number etc., certified success perhaps can be carried out smoothly by the part instruction repertorie sign indicating number of this verify data 130 and software is by obtaining the authorization code in this verify data 130.In other embodiments, the form that this verify data 130 also can packed data is stored among this BIOS112, and for the data in response to this form, those skilled in the art also can set this software 120 for have this verify data 130 decompressing functions software.
One preferred embodiment of computer authentication of the present invention finishes in the preamble introduction.In sum, the present invention's computer authentication in this embodiment must be implemented on software 120 and the hardware 110 simultaneously.Yet in other embodiments; single with regard to software; whether software is if can carry out step S204 of the present invention~S206 on the authentic computing machine uncertain; then this software can the normal operation in response to authentic hardware; also can be in response to can't authentic hardware and decommission; avoid software to be used on the not authentic hardware with being intended to by this, can reach the aforementioned hardware and software development person's of protection rights and interests equally.
At last, the persond having ordinary knowledge in the technical field of the present invention, under the spirit that does not break away from claims scope of the present invention, can the disclosed notion of the present invention and embodiment be the basis, design and revise other easily in order to reach the framework identical with target of the present invention.
Claims (14)
1. computer authentication, wherein this computing machine has Basic Input or Output System (BIOS), and this method comprises:
Store in advance and be used for making that the software that is exclusively used in hardware is able to the verify data of normal operation in this Basic Input or Output System (BIOS);
Whether with identification this computing machine be can authentic computing machine, wherein this hardware scanning comprises this Basic Input or Output System (BIOS) in this computing machine is scanned and by this Basic Input or Output System (BIOS) a plurality of peripheral hardware hardware in this computing machine scanned if carrying out hardware scanning;
If this computing machine be can authentic computing machine, then the sending function calling to this Basic Input or Output System (BIOS) to capture this verify data, make this software be installed on this computing machine.
2. computer authentication according to claim 1, wherein authentication method is carried out by this software, and this software needs this verify data ability normal operation.
3. computer authentication according to claim 2 wherein when this Basic Input or Output System (BIOS) of this computing machine receives this function calling, then is sent to ad-hoc location with this verify data, and notifies this software to this ad-hoc location to capture this verify data.
4. computer authentication according to claim 3, wherein this ad-hoc location is a storer.
5. computer authentication according to claim 2, wherein this software is driver, can directly send this function to this Basic Input or Output System (BIOS) and call out.
6. computer authentication according to claim 2, wherein this software is application program, can send this function to this Basic Input or Output System (BIOS) indirectly by driver and call out.
7. computer authentication according to claim 1 wherein scans in order to obtain the specification data of this Basic Input or Output System (BIOS) this Basic Input or Output System (BIOS) in this computing machine.
8. computer authentication according to claim 1 wherein scans in order to obtain the specification data of these peripheral hardware hardware a plurality of peripheral hardware hardware in this computing machine by this Basic Input or Output System (BIOS).
9. computer authentication according to claim 8, wherein these peripheral hardware hardware comprise the motherboard chip.
10. computer authentication according to claim 1, wherein this verify data is a packed data.
11. computer authentication according to claim 10, wherein when this verify data was packed data, then this packed data needed to decompress.
12. one kind is utilized the software authentication computer approach, comprising:
Whether with identification this computing machine be can authentic computing machine, wherein this hardware scanning comprises this Basic Input or Output System (BIOS) in this computing machine is scanned and by this Basic Input or Output System (BIOS) a plurality of peripheral hardware hardware in this computing machine scanned if carrying out hardware scanning;
If this computing machine be can authentic computing machine, then the sending function Basic Input or Output System (BIOS) of calling out to this computing machine is used for the verify data that the feasible software that is exclusively used in hardware is able to normal operation to judge whether whether to have in this Basic Input or Output System (BIOS); And
When this Basic Input or Output System (BIOS) has this verify data, capture this verify data, make this software be installed on this computing machine.
13. computer authentication according to claim 12, wherein this software needs this verify data ability normal operation.
14. the computing machine of the authentication method that uses a computer comprises:
Basic Input or Output System (BIOS), it stores in advance and is used for making that the software that is exclusively used in hardware is able to the verify data of normal operation;
Whether wherein carry out hardware scanning is can authentic computing machine with this computing machine of identification, wherein this hardware scanning comprises this Basic Input or Output System (BIOS) in this computing machine is scanned and by this Basic Input or Output System (BIOS) a plurality of peripheral hardware hardware in this computing machine scanned, send function and call out when capturing this verify data when this Basic Input or Output System (BIOS) of this computing machine receives software, then this verify data is sent to ad-hoc location, and notify this software to this ad-hoc location to capture this verify data, make this software be installed on this computing machine.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810169365.1A CN101369300B (en) | 2008-10-14 | 2008-10-14 | Computer authentication method and software and hardware using the same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810169365.1A CN101369300B (en) | 2008-10-14 | 2008-10-14 | Computer authentication method and software and hardware using the same |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101369300A CN101369300A (en) | 2009-02-18 |
CN101369300B true CN101369300B (en) | 2010-09-15 |
Family
ID=40413111
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200810169365.1A Active CN101369300B (en) | 2008-10-14 | 2008-10-14 | Computer authentication method and software and hardware using the same |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101369300B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101877850B (en) * | 2009-04-29 | 2014-01-01 | 华为技术有限公司 | Access authentication method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1405673A (en) * | 2001-09-17 | 2003-03-26 | 实密科技股份有限公司 | Software registration programme combined with hardware information of user |
CN1746807A (en) * | 2005-09-29 | 2006-03-15 | 浪潮电子信息产业股份有限公司 | Anti-fogery method of parts of famous-brand computer |
CN101075281A (en) * | 2007-04-13 | 2007-11-21 | 中国瑞达系统装备公司 | Method for logining BIOS based on fingerprint verification |
-
2008
- 2008-10-14 CN CN200810169365.1A patent/CN101369300B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1405673A (en) * | 2001-09-17 | 2003-03-26 | 实密科技股份有限公司 | Software registration programme combined with hardware information of user |
CN1746807A (en) * | 2005-09-29 | 2006-03-15 | 浪潮电子信息产业股份有限公司 | Anti-fogery method of parts of famous-brand computer |
CN101075281A (en) * | 2007-04-13 | 2007-11-21 | 中国瑞达系统装备公司 | Method for logining BIOS based on fingerprint verification |
Also Published As
Publication number | Publication date |
---|---|
CN101369300A (en) | 2009-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106600259B (en) | Mobile payment method and device and mobile terminal | |
JP6239788B2 (en) | Fingerprint authentication method, apparatus, intelligent terminal, and computer storage medium | |
CN109376078B (en) | Mobile application testing method, terminal equipment and medium | |
CN103065072B (en) | Improve Java software and crack the method and device of difficulty, copyright authentication method | |
TWI811663B (en) | Method and apparatus for generating software test reports | |
JP2003303338A (en) | System, method and program for fingerprint authentication | |
US20120173435A1 (en) | Handy terminal and payment method to be used in same | |
TW201426593A (en) | Method and apparatus for information verification | |
CN113726943A (en) | Control method and electronic device | |
JP2018109909A (en) | Similarity determination program, similarity determination method, and information processing apparatus | |
CN113486316A (en) | User identity authentication method and device, electronic equipment and readable storage medium | |
CN102156826A (en) | Provider management method and system | |
JP5702352B2 (en) | User terminal, reliability management server, unauthorized remote operation prevention method, and unauthorized remote operation prevention program | |
JP2018109910A (en) | Similarity determination program, similarity determination method, and information processing apparatus | |
CN108304697B (en) | Method and device for detecting APP secondary packaging and mobile terminal | |
CN101369300B (en) | Computer authentication method and software and hardware using the same | |
CN112882957A (en) | Test task validity checking method and device | |
CN107346197B (en) | Information display method and device | |
CN103336918B (en) | Electronic hard disk system authorization method and device | |
CN112465497A (en) | Payment method, payment device, electronic equipment and medium | |
US20170149739A1 (en) | Systems and methods for flexibly securing data | |
CN111859322A (en) | Identity verification method and device and electronic equipment | |
JP2008071174A (en) | Application software providing system, information processor, management device, application software providing method, information processing method and program | |
CN102053862B (en) | Method and device for inspecting material files in instant messenger | |
CN106997261A (en) | Using hidden method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |