CN101777105B - Computer booting anti-counterfeit authentication method based on BIOS - Google Patents

Computer booting anti-counterfeit authentication method based on BIOS Download PDF

Info

Publication number
CN101777105B
CN101777105B CN201010100796XA CN201010100796A CN101777105B CN 101777105 B CN101777105 B CN 101777105B CN 201010100796X A CN201010100796X A CN 201010100796XA CN 201010100796 A CN201010100796 A CN 201010100796A CN 101777105 B CN101777105 B CN 101777105B
Authority
CN
China
Prior art keywords
bios
computer
counterfeit
booting
method based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201010100796XA
Other languages
Chinese (zh)
Other versions
CN101777105A (en
Inventor
赵林
陈凯锋
刘一帆
白向春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Acer Computer Shanghai Co ltd
Original Assignee
ACER COMPUTER (SHANGHAI) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ACER COMPUTER (SHANGHAI) Co Ltd filed Critical ACER COMPUTER (SHANGHAI) Co Ltd
Priority to CN201010100796XA priority Critical patent/CN101777105B/en
Publication of CN101777105A publication Critical patent/CN101777105A/en
Application granted granted Critical
Publication of CN101777105B publication Critical patent/CN101777105B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a computer booting anti-counterfeit authentication method based on BIOS, which belongs to the technical field of computer application. The invention aims to provide a computer anti-counterfeit method which has high reliability, is easy to be operated, has low cost and simultaneously does not affect the customer experience; the method comprises the following steps: (a) a booting authentication unit is implanted in BIOS; (b) the booting authentication unit suspends a booting procedure after computer booting, the only ID of the computer is read, encrypted and obtained the ciphertext; (c) a user sends the encrypted file to a remote anti-counterfeit authentication server through an information sending method; (d) the anti-counterfeit authentication server decrypts the encrypted file and authenticates the only ID, and returns an activation code to the user after authenticates no error; and (e) the user inputs the activation code to the booting authentication unit, and the booting authentication unit continues the booting procedure after no error is authenticated. The computer booting anti-counterfeit authentication method based on BIOS can be used for computer anti-counterfeit.

Description

A kind of computer booting anti-counterfeit authentication method based on BIOS
Technical field
The present invention relates to fake certification, relate in particular to a kind of computer booting anti-counterfeit authentication method, belong to the Computer Applied Technology field based on BIOS.
Background technology
Mainly through on the hardware of computing machine, pasting pressure sensitive adhesive, means such as frangible subsides realize existing computing machine method for anti-counterfeit.Defectives such as although these class methods are very universal, it exist to be prone to is forged, and the antifalse effect influence factor is many.
The illegal businessman of on the market some utilizes these defectives, and the computing machine that the user is returned is used as completely new product and is sold to the client, and the client then can't confirm whether the product of its purchase belongs to this type of afterproduct through present false proof means or other simple modes.
The businessman that simultaneously also has some to play one's cards well, with the part hardware in the hardware replacement brand of computer poor quality, or even pretend to be brand of computer to sell, grievous injury consumer's interests, also damaged the rights and interests of computer brand manufacturer simultaneously.
Existing computing machine method for anti-counterfeit can't prevent or solve this type of problem.
Therefore, it is high to develop a kind of reliability, and easy operating is with low cost, the computing machine method for anti-counterfeit that does not influence the customer experience degree simultaneously safeguard for the prestige of computing machine production firm and consumer's rights and interests protection for all have very important realistic meaning.
Summary of the invention
The objective of the invention is to overcome the problem that exists in the prior art, a kind of computer booting anti-counterfeit authentication method based on BIOS is provided.
The inventive method is according to the characteristic of PC; Through in BIOS, implanting a start authentication unit; Read the unique identification information of computer and encrypt and show; The user submits to the remote counterfeit deterrence authentication server through sending note or modes such as phone or network with displaying contents, through deciphering and relevant checking, returns active coding and gives the user.If success then can normally get into system, otherwise return error message.
Specifically, the inventive method comprises the following steps:
A) in BIOS, implant a start authentication unit;
B) said start authentication unit is ended start-up routine behind computer booting, reads the unique identification of computing machine and encrypt to obtain ciphertext, is shown in computer screen;
C) user is sent to a remote counterfeit deterrence authentication server through an information sender formula with said ciphertext;
D) said fake certification server is deciphered said ciphertext and is verified said unique identification, verifies an active coding to be returned to the user after errorless;
E) said user imports said start authentication unit with said active coding, and the said start authentication unit in the errorless back of empirical tests continues said start-up routine.
Said unique identification comprises sequence number and ID.Said ID comprises CPU ID, BOIS sign, MAC Address, hard disk sign, one or more in the component identification information such as video card sign.
Said information sender formula is the mode through note or phone or computer network (LAN, wide area network, the Internet etc.).
Said start authentication unit can be a software agent that obtains through programming; It also can be a hardware body; Be mounted on the USB device of said computing machine such as one according to the PMP ROM standard of BIOS; Said USB device loads after with the BIOS self check, and ends this start-up routine before the os starting in said computing machine.
On the basis of above-mentioned steps,, can adopt following manner in order to save the trouble of user's subsequent authentication:
Mode 1. said start authentication units verify that the errorless back of said active coding stores said active coding, and in computer starting program after this, directly read said active coding and start-up routine.Said active coding preferably is stored in the shielded zone, in case active coding is had a mind to or deletion by mistake, and maybe be such as the user with the deletion of active coding mistake when the installing operating system.Said shielded zone can be implicit subregion (such as HPA, HOSTPROTECTEDAREA), also can be to be 0 sector before the initial sector 3F, any one subregion that also can right and wrong C dish.Different according to needed safe coefficient, can adopt different modes.
Mode 2. said start authentication units are said computer installation one activation marker, and after said start authentication unit verified that said active coding is errorless, said activation marker was set to activate, directly move said start-up routine behind the after this said computer booting.
Encryption and decryption process of the present invention can adopt general encryption and decryption technology, does not have particular restriction.
Compare with prior art, advantage of the present invention embodies a concentrated reflection of:
Through the inventive method can effectively solve the illegal dealer that exists on the market with old fill new, the situation of passing a fake product off as a genuine one, thus effectively protect consumer's interests.
2. can make computing machine production firm obtain sales data timely and effectively through the inventive method, make things convenient for stock control and sales incentive.
3. the inventive method operation is convenient, with low cost, and reliability is high, is easy to promote the use of.
Description of drawings
Fig. 1 is the booting anti-counterfeit checking process flow diagram of the embodiment of the invention 1;
Fig. 2 is provided with process flow diagram for the activation marker of the embodiment of the invention 1, and a is used for Windows, and b is used for DOS;
Fig. 3 is the booting anti-counterfeit checking process flow diagram of the embodiment of the invention 2.
Embodiment
Combine accompanying drawing that the present invention is further described through specific embodiment below.
Embodiment 1
The user buys a computing machine, implants a start authentication module among the BIOS of this computing machine.
After the user starts shooting first; This start authentication module reads activation marker, and this moment, activation marker was set to un-activation, so this module hang up system start-up program; And read the SN+ID of computing machine; This SN+ID encrypted eject theactivewindow, this window display string, the SN+ID after promptly encrypting after forming a string short character.
The user sends a telegraph computer vendors; And this character string informed customer service, and customer service is its input validation system, and verification system deciphering back judges whether this SN and ID have been kept in the database and can both mate; If not; Then notify the user to make a mistake, if checking is errorless, the active coding that then verification system generates and this SN+ID is corresponding also is shown to customer service.
Customer service is through this active coding of user that tells by telephone.
The user with this opening computer authentication module of this active coding input after, this active coding of this module verification is errorless, then the activation marker of this computing machine is made as and activates and start the operating system.
After this, after the each start of user, this start authentication module can successfully read activation marker, so shut-down operation system start-up program no longer.The process flow diagram of present embodiment is as shown in Figure 1.
Relevant therewith, Fig. 2 has provided computer vendors is provided with SN+ID and activation marker in hard disc of computer before computing machine dispatches from the factory process flow diagram, and Fig. 2 a representes the set-up mode under the Windows system, and Fig. 2 b representes the set-up mode under the DOS system.
Embodiment 2
Present embodiment is based on the situation identical with embodiment 1, and difference is, on the computing machine that the user buys, articulates a USB device according to the PMP ROM standard of BIOS, and this USB device plays embodiment 1 described start authentication module.This equipment loads after with the BIOS self check, and ends this start-up routine before the os starting in said computing machine.
The difference of present embodiment and embodiment 1 is that also the user accomplishes whole verification process through note by means of third party's SMS platform.Fig. 3 is the process flow diagram of present embodiment.

Claims (8)

1. the computer booting anti-counterfeit authentication method based on BIOS comprises the following steps:
A) in BIOS, implant a start authentication unit;
B) said start authentication unit is ended start-up routine behind computer booting, reads the unique identification of computing machine and encrypt to obtain ciphertext, is shown in computer screen;
C) user is sent to a remote counterfeit deterrence authentication server through an information sender formula with said ciphertext;
D) said fake certification server is deciphered said ciphertext and is verified said unique identification, verifies an active coding to be returned to the user after errorless;
E) said user imports said start authentication unit with said active coding, and the said start authentication unit in the errorless back of empirical tests continues said start-up routine.
2. the computer booting anti-counterfeit authentication method based on BIOS as claimed in claim 1 is characterized in that said unique identification comprises sequence number and ID.
3. the computer booting anti-counterfeit authentication method based on BIOS as claimed in claim 2 is characterized in that said ID comprises CPU ID, BOIS sign, MAC Address, one or more in hard disk sign and the video card sign.
4. the computer booting anti-counterfeit authentication method based on BIOS as claimed in claim 1 is characterized in that, said information sender formula is the mode through note or phone or computer network.
5. the computer booting anti-counterfeit authentication method based on BIOS as claimed in claim 1; It is characterized in that; Said start authentication unit is one to be mounted on the USB device of said computing machine; Said USB device loads after with the BIOS self check, and ends this start-up routine before the os starting in said computing machine.
6. the computer booting anti-counterfeit authentication method based on BIOS as claimed in claim 1; It is characterized in that; Said start authentication unit verifies that the errorless back of said active coding stores said active coding, and in computer starting program after this, directly reads said active coding and start-up routine.
7. the computer booting anti-counterfeit authentication method based on BIOS as claimed in claim 6 is characterized in that said active coding is stored in the shielded zone.
8. the computer booting anti-counterfeit authentication method based on BIOS as claimed in claim 1; It is characterized in that; Said start authentication unit is said computer installation one activation marker; After said start authentication unit verified that said active coding is errorless, said activation marker was set to activate, directly moved said start-up routine behind the after this said computer booting.
CN201010100796XA 2010-01-25 2010-01-25 Computer booting anti-counterfeit authentication method based on BIOS Expired - Fee Related CN101777105B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010100796XA CN101777105B (en) 2010-01-25 2010-01-25 Computer booting anti-counterfeit authentication method based on BIOS

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010100796XA CN101777105B (en) 2010-01-25 2010-01-25 Computer booting anti-counterfeit authentication method based on BIOS

Publications (2)

Publication Number Publication Date
CN101777105A CN101777105A (en) 2010-07-14
CN101777105B true CN101777105B (en) 2012-04-25

Family

ID=42513565

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010100796XA Expired - Fee Related CN101777105B (en) 2010-01-25 2010-01-25 Computer booting anti-counterfeit authentication method based on BIOS

Country Status (1)

Country Link
CN (1) CN101777105B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916348A (en) * 2010-08-16 2010-12-15 武汉天喻信息产业股份有限公司 Method and system for safely guiding operating system of user
CN102446251B (en) * 2011-08-24 2015-01-14 杭州华三通信技术有限公司 Device activation realizing method and equipment
CN104035914B (en) * 2013-03-04 2017-06-27 联想(北京)有限公司 A kind of password initial methods and electronic equipment
CN104158659B (en) * 2014-07-21 2015-11-11 小米科技有限责任公司 Anti-counterfeit authentication method, device and system
US9426130B2 (en) 2014-07-21 2016-08-23 Xiaomi Inc. Methods, devices and systems for anti-counterfeiting authentication
CN105335147A (en) * 2014-08-11 2016-02-17 联想(北京)有限公司 Information processing method and electronic equipment
CN104573474B (en) * 2014-09-10 2019-01-11 中电科技(北京)有限公司 A kind of identity generation system and method based on UEFI
CN105718762B (en) * 2014-12-05 2019-02-01 中国长城科技集团股份有限公司 A kind of BIOS authentication method and device
CN106919859B (en) * 2015-12-25 2020-09-18 研祥智能科技股份有限公司 Basic input output system protection method and device
CN105825096A (en) * 2016-03-11 2016-08-03 合肥联宝信息技术有限公司 Startup control method, computer equipment and server
CN108270570A (en) * 2017-01-03 2018-07-10 龙源创新数字传媒(北京)股份有限公司 A kind of touch screen hardware identification facility
CN107545637A (en) * 2017-09-13 2018-01-05 广东亚太天能科技股份有限公司 The Activiation method and server of a kind of electronic lock
CN107729761A (en) * 2017-10-30 2018-02-23 青岛海信电器股份有限公司 A kind of Activiation method of encryption device, encryption device
CN108364182A (en) * 2017-11-21 2018-08-03 阿里巴巴集团控股有限公司 A kind of commodity antifake check method, device and equipment
CN110968841B (en) * 2018-09-29 2023-03-10 欧姆龙(上海)有限公司 Activation method, device and system of programmable logic controller
CN109325324A (en) * 2018-09-29 2019-02-12 韩浩杨 Computer booting verifies system
CN110673861B (en) * 2019-08-12 2022-03-18 深圳市国科亿道科技有限公司 Protection method based on BIOS software

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6067625A (en) * 1996-11-25 2000-05-23 Samsung Electronics Co., Ltd. Computer security system having a password recovery function which displays a password upon the input of an identification number
CN1458587A (en) * 2002-05-15 2003-11-26 纬创资通股份有限公司 Method and system for turning-on user's end computr system through network
CN1925392A (en) * 2006-09-08 2007-03-07 四川长虹电器股份有限公司 Method for identification of equipment validity

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6067625A (en) * 1996-11-25 2000-05-23 Samsung Electronics Co., Ltd. Computer security system having a password recovery function which displays a password upon the input of an identification number
CN1458587A (en) * 2002-05-15 2003-11-26 纬创资通股份有限公司 Method and system for turning-on user's end computr system through network
CN1925392A (en) * 2006-09-08 2007-03-07 四川长虹电器股份有限公司 Method for identification of equipment validity

Also Published As

Publication number Publication date
CN101777105A (en) 2010-07-14

Similar Documents

Publication Publication Date Title
CN101777105B (en) Computer booting anti-counterfeit authentication method based on BIOS
CN110677418B (en) Trusted voiceprint authentication method and device, electronic equipment and storage medium
US8967477B2 (en) Smart card reader with a secure logging feature
US11776348B2 (en) Contactless card personal identification system
CN111404696B (en) Collaborative signature method, security service middleware, related platform and system
CN103051451A (en) Encryption authentication of security service execution environment
JP5827692B2 (en) Bound data card and mobile host authentication method, apparatus and system
CN105917612B (en) Cryptographic watermarking of content in a fuel dispensing environment
US20090287917A1 (en) Secure software distribution
CN104199654A (en) Open platform calling method and device
CN108171019B (en) Anti-counterfeiting verification method, anti-counterfeiting verification system, anti-counterfeiting verification device and storage medium
CN103401844A (en) Operation request processing method and system
CN101138242A (en) An interactive television system
CN104199657A (en) Call method and device for open platform
KR20190008333A (en) A processing method for preventing a replication attack, and a server and a client
CN106357392A (en) Memory device and authentification method
CA2886164C (en) Method for verifying the authenticity of a terminal, corresponding device and program
CN114040221B (en) Anti-copy method for security authentication based on double signatures of set top box server side
CN113780016B (en) Verification system and verification method for preventing commodity and marked trademark thereof from being imitated
CN102271170A (en) Method of providing server address for electronic product through mobile storage equipment
TWM578432U (en) System for assisting a financial card holder in setting password for the first time
KR102562228B1 (en) Method and apparatus for transmitting personal information message
CN109660355B (en) Method, device, storage medium and terminal for preventing POS terminal from being illegally tampered
CN108809651B (en) Key pair management method and terminal
CN116723026A (en) Login verification method, login verification device, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: HU'NAN QIU ZEYOU PATENT STRATEGIC PLANNING CO., LT

Free format text: FORMER OWNER: QIU ZEYOU

Effective date: 20101101

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 410005 28/F, SHUNTIANCHENG, NO.185, FURONG MIDDLE ROAD, CHANGSHA CITY, HU'NAN PROVINCE TO: 410205 JUXING INDUSTRY BASE, NO.8, LUJING ROAD, CHANGSHA HIGH-TECH. DEVELOPMENT ZONE, YUELU DISTRICT, CHANGSHA CITY, HU'NAN PROVINCE

TA01 Transfer of patent application right

Effective date of registration: 20101108

Address after: 3, No. 168 middle Tibet Road, No. 200001, Shanghai, Huangpu District

Applicant after: Acer Computer (Shanghai) Co.,Ltd.

Address before: 200120, 36 building, International Building, 360 South Road, Pudong New Area, Pudong, Shanghai, Shanghai

Applicant before: Shanghai Beijing University Founder Technology Computer System Co.,Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120425

CF01 Termination of patent right due to non-payment of annual fee