CN101777105A - Computer booting anti-counterfeit authentication method based on BIOS - Google Patents

Computer booting anti-counterfeit authentication method based on BIOS Download PDF

Info

Publication number
CN101777105A
CN101777105A CN201010100796A CN201010100796A CN101777105A CN 101777105 A CN101777105 A CN 101777105A CN 201010100796 A CN201010100796 A CN 201010100796A CN 201010100796 A CN201010100796 A CN 201010100796A CN 101777105 A CN101777105 A CN 101777105A
Authority
CN
China
Prior art keywords
computer
bios
booting
counterfeit
method based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201010100796A
Other languages
Chinese (zh)
Other versions
CN101777105B (en
Inventor
赵林
陈凯锋
刘一帆
白向春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Acer Computer Shanghai Co ltd
Original Assignee
Shanghai Founder Technology Computer System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Founder Technology Computer System Co Ltd filed Critical Shanghai Founder Technology Computer System Co Ltd
Priority to CN201010100796XA priority Critical patent/CN101777105B/en
Publication of CN101777105A publication Critical patent/CN101777105A/en
Application granted granted Critical
Publication of CN101777105B publication Critical patent/CN101777105B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Abstract

The invention discloses a computer booting anti-counterfeit authentication method based on BIOS, which belongs to the technical field of computer application. The invention aims to provide a computer anti-counterfeit method which has high reliability, is easy to be operated, has low cost and simultaneously does not affect the customer experience; the method comprises the following steps: (a) a booting authentication unit is implanted in BIOS; (b) the booting authentication unit suspends a booting procedure after computer booting, the only ID of the computer is read, encrypted and displayed on a computer monitor; (c) a user sends the encrypted file to a remote anti-counterfeit authentication server through an information sending method; (d) the server decrypts the encrypted file and authenticates the only ID, and returns an activation code to the user after authenticates no error; and (e) the user inputs the activation code to the booting authentication unit, and the booting authentication unit continues the booting procedure after no error is authenticated. The computer booting anti-counterfeit authentication method based on BIOS can be used for computer anti-counterfeit.

Description

A kind of computer booting anti-counterfeit authentication method based on BIOS
Technical field
The present invention relates to fake certification, relate in particular to a kind of computer booting anti-counterfeit authentication method, belong to the Computer Applied Technology field based on BIOS.
Background technology
Mainly by paste pressure sensitive adhesive on the hardware of computing machine, means such as frangible subsides realize existing computing machine method for anti-counterfeit.Although these class methods are very universal, defective such as it exists easily forges, and the antifalse effect influence factor is many.
The illegal businessman of on the market some utilizes these defectives, and the computing machine that the user is returned is used as completely new product and is sold to the client, and the client then can't determine whether the product of its purchase belongs to this type of afterproduct by present false proof means or other simple modes.
The businessman that simultaneously also has some to play one's cards well, with the part hardware in the hardware replacement brand of computer poor quality, or even pretend to be brand of computer to sell, grievous injury consumer's interests, also damaged the rights and interests of computer brand manufacturer simultaneously.
Existing computing machine method for anti-counterfeit can't prevent or solve this type of problem.
Therefore, develop a kind of reliability height, easy operating, with low cost, the computing machine method for anti-counterfeit that does not influence simultaneously the customer experience degree safeguard for the prestige of computing machine production firm and consumer's rights and interests protection for all have very important realistic meaning.
Summary of the invention
The objective of the invention is to overcome problems of the prior art, a kind of computer booting anti-counterfeit authentication method based on BIOS is provided.
The inventive method is according to the characteristic of PC, by in BIOS, implanting a start authentication unit, read the unique identification information of computer and encrypt and show, the user submits to the remote counterfeit deterrence authentication server by sending note or modes such as phone or network with displaying contents, through deciphering and relevant checking, return active coding and give the user.If success then can normally enter system, otherwise return error message.
Specifically, the inventive method comprises the following steps:
A) in BIOS, implant a start authentication unit;
B) described start authentication unit is ended start-up routine behind computer booting, reads the unique identification of computing machine and encrypt to be shown in computer screen;
C) user is sent to a remote counterfeit deterrence authentication server by an information sender formula with described ciphertext;
D) described server is deciphered described ciphertext and is verified described unique identification, verifies an active coding to be returned to the user after errorless;
E) described user imports described start authentication unit with described active coding, and the described start authentication unit in the errorless back of empirical tests continues described start-up routine.
Described unique identification comprises sequence number and ID.Described ID comprises CPU ID, BOIS sign, MAC Address, hard disk sign, one or more in the component identification information such as video card sign.
Described information sender formula is the mode by note or phone or computer network (LAN (Local Area Network), wide area network, the Internet etc.).
Described start authentication unit can be a software agent that obtains by programming, it also can be a hardware body, be mounted on the USB device of described computing machine such as one according to the PMP ROM standard of BIOS, described USB device loads after with the BIOS self check, and ends this start-up routine before the os starting in described computing machine.
On the basis of above-mentioned steps,, can adopt following manner in order to save the trouble of user's subsequent authentication:
Mode 1. described start authentication units verify that the errorless back of described active coding stores described active coding, and directly read described active coding and start-up routine in computer starting program after this.Described active coding preferably is stored in the shielded zone, in case active coding is had a mind to or deletion by mistake, and may be such as the user with the deletion of active coding mistake when the installing operating system.Described shielded zone can be implicit subregion (such as HPA, HOST PROTECTED AREA), also can be to be 0 sector before the initial sector 3F, any one subregion that also can right and wrong C dish.According to needed safe coefficient difference, can be in different ways.
Mode 2. described start authentication units are described computer installation one activation marker, and after described start authentication unit verified that described active coding is errorless, described activation marker was set to activate, directly move described start-up routine behind the after this described computer booting.
Encryption and decryption process of the present invention can adopt general encryption and decryption technology, does not have particular restriction.
Compare with prior art, advantage of the present invention embodies a concentrated reflection of:
By the inventive method can effectively solve the illegal dealer that exists on the market with old fill new, the situation of passing a fake product off as a genuine one, thus effectively protect consumer's interests.
2. can make computing machine production firm obtain sales data timely and effectively by the inventive method, make things convenient for stock control and sales incentive.
3. the inventive method operation is convenient, and with low cost, the reliability height is easy to promote the use of.
Description of drawings
Fig. 1 is the booting anti-counterfeit checking process flow diagram of the embodiment of the invention 1;
Fig. 2 is provided with process flow diagram for the activation marker of the embodiment of the invention 1, and a is used for Windows, and b is used for DOS;
Fig. 3 is the booting anti-counterfeit checking process flow diagram of the embodiment of the invention 2.
Embodiment
In conjunction with the accompanying drawings the present invention is further described below by specific embodiment.
Embodiment 1
The user buys a computing machine, implants a start authentication module among the BIOS of this computing machine.
After the user starts shooting first, this start authentication module reads activation marker, this moment, activation marker was set to un-activation, so this module hang up system start-up program, and read the SN+ID of computing machine, this SN+ID encrypted eject theactivewindow, this window display string, the SN+ID after promptly encrypting after forming a string short character.
The user sends a telegraph computer vendors, and this character string informed customer service, customer service is with its input validation system, verification system deciphering back judges whether this SN and ID have been kept in the database and can both mate, if not, then notify the user to make a mistake, if checking is errorless, then verification system generates and the active coding of this SN+ID correspondence and be shown to customer service.
Customer service is by this active coding of user that tells by telephone.
After the user imported this opening computer authentication module with this active coding, this active coding of this module verification was errorless, then the activation marker of this computing machine was made as to activate and start the operating system.
After this, after the each start of user, this start authentication module can successfully read activation marker, so shut-down operation system start-up program no longer.The process flow diagram of present embodiment as shown in Figure 1.
Relevant therewith, Fig. 2 has provided computer vendors is provided with SN+ID and activation marker in hard disc of computer before computing machine dispatches from the factory process flow diagram, and Fig. 2 a represents the set-up mode under the Windows system, and Fig. 2 b represents the set-up mode under the DOS system.
Embodiment 2
Present embodiment is based on the situation identical with embodiment 1, and difference is, on the computing machine that the user buys, articulates a USB device according to the PMP ROM standard of BIOS, and this USB device plays embodiment 1 described start authentication module.This equipment loads after with the BIOS self check, and ends this start-up routine before the os starting in described computing machine.
The difference of present embodiment and embodiment 1 is that also the user finishes whole verification process by note by means of third party's SMS platform.Fig. 3 is the process flow diagram of present embodiment.

Claims (8)

1. the computer booting anti-counterfeit authentication method based on BIOS comprises the following steps:
A) in BIOS, implant a start authentication unit;
B) described start authentication unit is ended start-up routine behind computer booting, reads the unique identification of computing machine and encrypt to be shown in computer screen;
C) user is sent to a remote counterfeit deterrence authentication server by an information sender formula with described ciphertext;
D) described server is deciphered described ciphertext and is verified described unique identification, verifies an active coding to be returned to the user after errorless;
E) described user imports described start authentication unit with described active coding, and the described start authentication unit in the errorless back of empirical tests continues described start-up routine.
2. the computer booting anti-counterfeit authentication method based on BIOS as claimed in claim 1 is characterized in that described unique identification comprises sequence number and ID.
3. the computer booting anti-counterfeit authentication method based on BIOS as claimed in claim 2 is characterized in that described ID comprises CPU ID, BOIS sign, MAC Address, one or more in hard disk sign and the video card sign.
4. the computer booting anti-counterfeit authentication method based on BIOS as claimed in claim 1 is characterized in that, described information sender formula is the mode by note or phone or computer network.
5. the computer booting anti-counterfeit authentication method based on BIOS as claimed in claim 1, it is characterized in that, described start authentication unit is one to be mounted on the USB device of described computing machine, described USB device loads after with the BIOS self check, and ends this start-up routine before the os starting in described computing machine.
6. the computer booting anti-counterfeit authentication method based on BIOS as claimed in claim 1, it is characterized in that, described start authentication unit verifies that the errorless back of described active coding stores described active coding, and directly reads described active coding and start-up routine in computer starting program after this.
7. the computer booting anti-counterfeit authentication method based on BIOS as claimed in claim 6 is characterized in that described active coding is stored in the shielded zone.
8. the computer booting anti-counterfeit authentication method based on BIOS as claimed in claim 1, it is characterized in that, described start authentication unit is described computer installation one activation marker, after described start authentication unit verifies that described active coding is errorless, described activation marker is set to activate, directly moves described start-up routine behind the after this described computer booting.
CN201010100796XA 2010-01-25 2010-01-25 Computer booting anti-counterfeit authentication method based on BIOS Expired - Fee Related CN101777105B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010100796XA CN101777105B (en) 2010-01-25 2010-01-25 Computer booting anti-counterfeit authentication method based on BIOS

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010100796XA CN101777105B (en) 2010-01-25 2010-01-25 Computer booting anti-counterfeit authentication method based on BIOS

Publications (2)

Publication Number Publication Date
CN101777105A true CN101777105A (en) 2010-07-14
CN101777105B CN101777105B (en) 2012-04-25

Family

ID=42513565

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010100796XA Expired - Fee Related CN101777105B (en) 2010-01-25 2010-01-25 Computer booting anti-counterfeit authentication method based on BIOS

Country Status (1)

Country Link
CN (1) CN101777105B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916348A (en) * 2010-08-16 2010-12-15 武汉天喻信息产业股份有限公司 Method and system for safely guiding operating system of user
CN102446251A (en) * 2011-08-24 2012-05-09 杭州华三通信技术有限公司 Device activation realizing method and equipment
CN104035914A (en) * 2013-03-04 2014-09-10 联想(北京)有限公司 Password initializing method and electronic device
CN104158659A (en) * 2014-07-21 2014-11-19 小米科技有限责任公司 Anti-fake verifying method, device and system
CN104573474A (en) * 2014-09-10 2015-04-29 中电科技(北京)有限公司 UEFI (Unified Extensible Firmware Interface)-based identity label generation system and UEFI-based identity label generation method
CN105335147A (en) * 2014-08-11 2016-02-17 联想(北京)有限公司 Information processing method and electronic equipment
CN105718762A (en) * 2014-12-05 2016-06-29 中国长城计算机深圳股份有限公司 Basic input output system (BIOS) authentication method and apparatus
CN105825096A (en) * 2016-03-11 2016-08-03 合肥联宝信息技术有限公司 Startup control method, computer equipment and server
US9426130B2 (en) 2014-07-21 2016-08-23 Xiaomi Inc. Methods, devices and systems for anti-counterfeiting authentication
CN106919859A (en) * 2015-12-25 2017-07-04 研祥智能科技股份有限公司 Basic input output system guard method and device
CN107545637A (en) * 2017-09-13 2018-01-05 广东亚太天能科技股份有限公司 The Activiation method and server of a kind of electronic lock
CN107729761A (en) * 2017-10-30 2018-02-23 青岛海信电器股份有限公司 A kind of Activiation method of encryption device, encryption device
CN108270570A (en) * 2017-01-03 2018-07-10 龙源创新数字传媒(北京)股份有限公司 A kind of touch screen hardware identification facility
CN109325324A (en) * 2018-09-29 2019-02-12 韩浩杨 Computer booting verifies system
CN110673861A (en) * 2019-08-12 2020-01-10 深圳市国科亿道科技有限公司 Protection method based on BIOS software
WO2020063328A1 (en) * 2018-09-29 2020-04-02 欧姆龙株式会社 Activation method, apparatus and system for programmable logic controller
TWI729857B (en) * 2017-11-21 2021-06-01 開曼群島商創新先進技術有限公司 Commodity anti-counterfeiting verification method, device and equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100223484B1 (en) * 1996-11-25 1999-10-15 윤종용 A computer system having password recovery function and a recovery method of that
CN1458587A (en) * 2002-05-15 2003-11-26 纬创资通股份有限公司 Method and system for turning-on user's end computr system through network
CN1925392A (en) * 2006-09-08 2007-03-07 四川长虹电器股份有限公司 Method for identification of equipment validity

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916348A (en) * 2010-08-16 2010-12-15 武汉天喻信息产业股份有限公司 Method and system for safely guiding operating system of user
CN102446251A (en) * 2011-08-24 2012-05-09 杭州华三通信技术有限公司 Device activation realizing method and equipment
CN102446251B (en) * 2011-08-24 2015-01-14 杭州华三通信技术有限公司 Device activation realizing method and equipment
CN104035914B (en) * 2013-03-04 2017-06-27 联想(北京)有限公司 A kind of password initial methods and electronic equipment
CN104035914A (en) * 2013-03-04 2014-09-10 联想(北京)有限公司 Password initializing method and electronic device
WO2016011739A1 (en) * 2014-07-21 2016-01-28 小米科技有限责任公司 Method, device, and system for anti-counterfeiting verification
US9426130B2 (en) 2014-07-21 2016-08-23 Xiaomi Inc. Methods, devices and systems for anti-counterfeiting authentication
CN104158659A (en) * 2014-07-21 2014-11-19 小米科技有限责任公司 Anti-fake verifying method, device and system
CN105335147A (en) * 2014-08-11 2016-02-17 联想(北京)有限公司 Information processing method and electronic equipment
CN104573474B (en) * 2014-09-10 2019-01-11 中电科技(北京)有限公司 A kind of identity generation system and method based on UEFI
CN104573474A (en) * 2014-09-10 2015-04-29 中电科技(北京)有限公司 UEFI (Unified Extensible Firmware Interface)-based identity label generation system and UEFI-based identity label generation method
CN105718762A (en) * 2014-12-05 2016-06-29 中国长城计算机深圳股份有限公司 Basic input output system (BIOS) authentication method and apparatus
CN105718762B (en) * 2014-12-05 2019-02-01 中国长城科技集团股份有限公司 A kind of BIOS authentication method and device
CN106919859A (en) * 2015-12-25 2017-07-04 研祥智能科技股份有限公司 Basic input output system guard method and device
CN106919859B (en) * 2015-12-25 2020-09-18 研祥智能科技股份有限公司 Basic input output system protection method and device
CN105825096A (en) * 2016-03-11 2016-08-03 合肥联宝信息技术有限公司 Startup control method, computer equipment and server
CN108270570A (en) * 2017-01-03 2018-07-10 龙源创新数字传媒(北京)股份有限公司 A kind of touch screen hardware identification facility
CN107545637A (en) * 2017-09-13 2018-01-05 广东亚太天能科技股份有限公司 The Activiation method and server of a kind of electronic lock
CN107729761A (en) * 2017-10-30 2018-02-23 青岛海信电器股份有限公司 A kind of Activiation method of encryption device, encryption device
TWI729857B (en) * 2017-11-21 2021-06-01 開曼群島商創新先進技術有限公司 Commodity anti-counterfeiting verification method, device and equipment
CN109325324A (en) * 2018-09-29 2019-02-12 韩浩杨 Computer booting verifies system
WO2020063328A1 (en) * 2018-09-29 2020-04-02 欧姆龙株式会社 Activation method, apparatus and system for programmable logic controller
CN110673861A (en) * 2019-08-12 2020-01-10 深圳市国科亿道科技有限公司 Protection method based on BIOS software
CN110673861B (en) * 2019-08-12 2022-03-18 深圳市国科亿道科技有限公司 Protection method based on BIOS software

Also Published As

Publication number Publication date
CN101777105B (en) 2012-04-25

Similar Documents

Publication Publication Date Title
CN101777105B (en) Computer booting anti-counterfeit authentication method based on BIOS
CN110677418B (en) Trusted voiceprint authentication method and device, electronic equipment and storage medium
KR101895243B1 (en) Integration of payment capability into secure elements of computers
US8967477B2 (en) Smart card reader with a secure logging feature
US20240087394A1 (en) Contactless card personal identification system
CN111404696B (en) Collaborative signature method, security service middleware, related platform and system
CN103051451A (en) Encryption authentication of security service execution environment
US20140188732A1 (en) Secure provisioning manifest for controlling peripherals attached to a computer
CN107979467B (en) Verification method and device
CN101529366A (en) Identification and visualization of trusted user interface objects
JP5827692B2 (en) Bound data card and mobile host authentication method, apparatus and system
CN105917612B (en) Cryptographic watermarking of content in a fuel dispensing environment
US20090106548A1 (en) Method for controlling secured transactions using a single physical device, corresponding physical device, system and computer program
CN104199654A (en) Open platform calling method and device
CN104199657A (en) Call method and device for open platform
CN106357392A (en) Memory device and authentification method
JP5183517B2 (en) Information processing apparatus and program
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
US9672505B2 (en) Method for verifying the authenticity of a terminal, corresponding device and program
CN107704756B (en) Security verification method and system before system upgrade
CN113794679B (en) Method and system for preventing automatic script number robbing
KR102160892B1 (en) Public key infrastructure based service authentication method and system
CN102271170A (en) Method of providing server address for electronic product through mobile storage equipment
CN113780016B (en) Verification system and verification method for preventing commodity and marked trademark thereof from being imitated
CN115859389B (en) Software serial number authorization method and system based on privately-distributed deployment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: HU'NAN QIU ZEYOU PATENT STRATEGIC PLANNING CO., LT

Free format text: FORMER OWNER: QIU ZEYOU

Effective date: 20101101

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 410005 28/F, SHUNTIANCHENG, NO.185, FURONG MIDDLE ROAD, CHANGSHA CITY, HU'NAN PROVINCE TO: 410205 JUXING INDUSTRY BASE, NO.8, LUJING ROAD, CHANGSHA HIGH-TECH. DEVELOPMENT ZONE, YUELU DISTRICT, CHANGSHA CITY, HU'NAN PROVINCE

TA01 Transfer of patent application right

Effective date of registration: 20101108

Address after: 3, No. 168 middle Tibet Road, No. 200001, Shanghai, Huangpu District

Applicant after: Acer Computer (Shanghai) Co.,Ltd.

Address before: 200120, 36 building, International Building, 360 South Road, Pudong New Area, Pudong, Shanghai, Shanghai

Applicant before: Shanghai Beijing University Founder Technology Computer System Co.,Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120425