WO2010129336A2 - Method and system for providing a data module lock to device hardware - Google Patents
Method and system for providing a data module lock to device hardware Download PDFInfo
- Publication number
- WO2010129336A2 WO2010129336A2 PCT/US2010/032765 US2010032765W WO2010129336A2 WO 2010129336 A2 WO2010129336 A2 WO 2010129336A2 US 2010032765 W US2010032765 W US 2010032765W WO 2010129336 A2 WO2010129336 A2 WO 2010129336A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer
- list
- circuit card
- compatible
- circuit
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4411—Configuring for operating with peripheral devices; Loading of device drivers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/22—Microcontrol or microprogram arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/54—Link editing before load time
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4418—Suspend and resume; Hibernate and awake
Definitions
- the present invention relates generally to computer systems, and more particularly to methods for ensuring component circuit cards run only on an approved computing device.
- Modern personal computers including notebook computers, employ a number of plug-in modules or cards for providing networking and communication capabilities.
- notebook computers are typically assembled and sold to consumers including a built-in wireless (e.g., WiFi transceiver) communication card.
- notebook computers may be manufactured including a cellular network communication card.
- Such communication cards include embedded memory used for programming the functionality of the communication card itself.
- communication cards also are embedded data cards.
- the U.S. Federal Communication Commission regulates the telecommunication industry, including specific rules for intentional and non intentional radiating equipment.
- the FCC has issued regulations governing cellular and PCS communication systems which includes requirements for devices such as cellular or PCS external or embedded data cards used with notebook computers.
- FCC regulations are intended to protect consumer health and minimize interference with other electronic equipment or licensed radio services.
- the transmitter manufacturer must obtain authorization from the FCC by demonstrating compliance with the relevant sections of Title 47 of the Code of Federal Regulations.
- the FCC Beyond requiring certification of transmitter components, the FCC also requires computers and components to confirm that installed components have been certified for the computer. Such a compatibility determination ensures that radio transmission functionality is only enabled with components that have been tested and shown to be compatible with a particular model computer. This regulation protects against consumers inadvertently installing a circuit card or other component into a computer for which it has not been tested, which could lead to violations of FCC product certification requirements. Thus, WWAN module vendors are required to configure their computer products to perform a compatibility determination for each installed component.
- FIG. 1 illustrates a typical method used by computer manufactures to confirm that a component circuit card connected to the computer is certified for use with the computer prior to being enabled.
- the BIOS routine may provide power to the card, step 1, in order to obtain its identification (ID) number, step 3.
- ID identification
- PnP ID Plug-and-Play Identification
- the card ID includes a number identifying the manufacturer, known as a vendor ID (VID), and a number identifying the particular model or product, known as a product ID (PID).
- VIP vendor ID
- PID product ID
- the vendor ID and product ID referred to herein as a PNP ID, is a number globally unique to a particular FCC certified product.
- the BIOS routine then compares the PNP ID number received from the card to a list of numbers authorized for use with the computer, step 5. This PNP ID list is normally stored in the computer's nonvolatile memory (e.g. electronically programmable read-only memory - EPROM) along with the BIOS software.
- nonvolatile memory e.g. electronically programmable read-only memory - EPROM
- the FCC further requires that component circuit cards with wireless transmitters themselves perform a compatibility test to ensure that they are only used in the computers for which they have been certified.
- the component manufacturers must now include compatibility testing as part of the functionality of component circuit cards.
- FIG. 2 illustrates an example method used by circuit card manufacturers to comply with this FCC requirement.
- the method for complying with the FCC regulations described above and illustrated in FIG. 2 requires nonvolatile memory and software stored on the circuit card dedicated to complying with this compatibility test requirement. This undesirably adds to the complexity and cost of the circuit card.
- circuit card has been certified for a particular computer as part of the circuit card's software download application stored on the computer's hard drive and executed by the computer's processor.
- the various embodiments enable FCC compliant circuit cards that are less complex and more affordable.
- FIG. 1 is a process flow diagram of a prior art method for a computer to ensure a circuit card is certified for use in the computer.
- FIG. 2 is a process flow diagram of a prior art method for a circuit card to ensure that it is certified for use in a host computer.
- FIG. 3 is a system block diagram of a typical computer suitable for use in an embodiment.
- FIG. 4 is a process flow diagram of an embodiment.
- FIG. 5 is a process flow diagram of an alternative embodiment.
- FIG. 6 is a process flow diagram of an alternative embodiment. DETAILED DESCRIPTION
- the term "computer” refers to any form of computing device, including in particular notebook computers and portable computing devices.
- the terms “card”, “circuit card”, and “embedded data card” refer to a circuit component that can be included in a computer system to provide a particular transmitter functionality and for which separate FCC certification is required.
- a card may be in the form of a single integrated circuit, a chipset or a circuit card containing a number of integrated circuits and circuit elements which may be stalled in a computer system.
- the card is a communication card, such as a wireless transceiver or a cellular network transceiver, which when installed enables a computer to communicate with an external wireless network.
- the various embodiments apply to any circuit element in which card authentication must be confirmed and operating software must be downloaded to the circuit element in order for it to function.
- the various embodiments described herein shift the compatibility testing to software which runs on the computer processor as part of the initialization process of loading operating software from the computer's hard disk onto the circuit card.
- the circuit card need not include nonvolatile memory, nor store software instructions for performing the compatibility testing.
- circuit cards used in modern computer systems include their own onboard processor which must be configured with software instructions in order for the circuit card to function.
- processor-equipped circuit cards include wireless telecommunication cards (e.g., WiFi and cellular network transceiver cards) and GPS receiver cards.
- Such circuit cards typically include a processor that is configured with operating software and random access memory for storing the software instructions as well as data.
- Such circuit cards are not able to function without being programmed with their own operating software.
- Some circuit cards include nonvolatile memory that stores the operating software instructions used to program its onboard processor. However, some circuit cards require the operating instructions to be loaded to nonvolatile memory on the circuit card in order to program its onboard processor.
- a circuit card that uses volatile memory and is programmed by software stored on the computer's hard drive can be made less expensive and can easily be upgraded by distributing new operating software to consumers (e.g., by providing software updates via the Internet).
- an initializing software routine (referred to herein as a "circuit card initialization software routine") running on the host computer must download the circuit card's operating software to the circuit card's volatile memory.
- Such circuit card initialization software may be part of the host computer's boot routine, one of the software applications that is run during start up, or part of a component driver software, all of which are well known in the computer arts.
- FIG. 3 is a component diagram of the basic elements of a computer system 50 that may implement the various embodiments.
- a typical computer 50 will include a processor 51, such as a microprocessor or microcomputer, nonvolatile memory 52, such as an EPROM, hard disk memory 54, and a circuit card 56.
- the circuit card 56 may be any of a variety of circuit cards, integrated circuit chips, circuit boards or component devices subject to FCC compatibility testing requirements.
- the circuit card 56 may include a volatile memory 57 and card processor 58 which is programmed by operating software instructions stored in the volatile memory 57.
- the card processor 58 must be provided with operating parameters and/or programmed with at least some operating software stored on the computer's hard disk memory 54.
- the circuit card 56 may be included within the computer 50 as an integral component card, or may be an external component, such as an external modem, as illustrated by the dashed line.
- the computer processor 51 can be initially configured with BIOS software and configuration data stored on the nonvolatile memory 52. As part of the startup sequence, the computer processor 51 will be configured with software instructions downloaded from the computer's hard disk memory 54. In the various embodiments, the software instructions downloaded to the computer processor 51 includes a circuit card initialization software routine stored on the hard disk 54. The circuit card initialization software routine causes the processor 51 to perform steps of the various embodiment methods, as well as load operating data and/or software instructions to the circuit card's volatile memory 57 which the card processor 58 needs to perform its functions.
- the computer processor 51 can be configured with software instructions stored on the hard disk memory 54 to access the computer's PNP ID list stored in the computer's nonvolatile memory 52 to determine whether the circuit card 56 is compatible with the computer 50. Additionally, the computer processor 51 may also access other information related to the circuit card 56, such as manufacturing strings, system IDs, etc. that are useful for determining compatibility of a circuit card with a notebook system. If the compatibility test described in more detail below with reference to FIGs. 4-6 is successful, the processor 51 can download circuit card operating software from the hard disk 54 to nonvolatile memory 57 in the circuit card 56. Once so programmed, the circuit card processor 58 can perform the functions of the circuit card 56.
- the circuit card initialization software routine operating on the computer's processor 51 causes the processor 51 to perform the circuit card compatibility testing prior to downloading the circuit card's operating software.
- the circuit card initialization software routine will typically be stored on the computer's hard drive memory 54 at the time the corresponding circuit card is installed. For example, if the circuit card 56 is installed in the computer 50 by the OEM, the OEM will ensure that it has the appropriate circuit card initialization software routine stored on hard disk memory 54 provided with the computer 50.
- the product package may include a tangible storage medium, such as a compact disk, that the consumer can insert into the corresponding recorder (e.g., a compact disk drive (not shown)) to upload the circuit card initialization software routine prepare to the computer's hard drive memory 54.
- a tangible storage medium such as a compact disk
- the circuit card initialization software routine may be stored in nonvolatile memory 52 (such as FLASH memory) instead of a hard drive memory 54, such as in mobile devices that employ electronic memory rather than magnetic disc memory (e.g., cellular telephones, PDAs, etc.).
- the computer 50 may execute a generic circuit card software installation routine that is able to the perform circuit card compatibility test of the embodiments described below using a PNP ID number stored on the hard disk memory 54 for each circuit card to be tested. In this manner, the compatibility test can be completed without the need to first energize the circuit card 56 or to include nonvolatile memory or circuitry on the circuit card 56 that can provide its ID to the computer's processor 51.
- FIG. 4 illustrates an example process flow diagram of an embodiment.
- the circuit card initialization software routine will be activated, step 30. This routine may be called as part of the computer's BIOS process.
- the circuit card initialization software routine causes the computer's processor 51 to query the computer's PNP ID list, step 32. This may be accomplished by the processor 51 accessing the PNP ID list from the computer's BIOS EPROM memory 52. For example, the PNP ID list may be accessed using a standard Microsoft call for the BIOS information.
- circuit card initialization software routine causes the processor 51 to check the PNP ID list for the PNP ID of the circuit card 56, step 34. To do this, the circuit card initialization software routine may recall the circuit card's ID from a data field stored on the computer's hard disk memory 54. Alternatively, the circuit card's ID may be programmed within the code of the compatibility test software routine. If the circuit card is listed on the computer's PNP ID list, test 36, the circuit card initialization software routine proceeds to download the operating software to the circuit card, step 38. Once the circuit card has been programmed, the circuit card can begin normal operation, step 40.
- the circuit card operating software download may be terminated, step 42.
- This leaves an uncertified card i.e., a card that is not certified or otherwise listed on the PNP ID list
- circuit card initialization software routine may also cause the processor to remove power to the circuit card in the event that the circuit card's ID is not listed on the computer's PNP ID the list, step 44.
- circuit card's operating software will be deleted from the circuit card's volatile memory whenever the circuit card 56 is de-energized, this embodiment necessarily complies with the FCCs requirement for circuit card authentication at cold power up. Since the circuit card 56 will not run without its operating software, even if the compatibility test is not performed, the circuit card 56 will not operate.
- the timing of the compatibility test within the computer's initialization routine can vary depending upon the manufacturer's preferences.
- the circuit card initialization software routine may run whenever the computer 50 itself is started (i.e., from a cold power up). In this manner, the circuit card 56 will be checked and activated as part of the computer's overall startup sequence.
- the circuit card initialization software routine may be run when the circuit card 56 is activated, such as when a user elects to activate a particular functionality. For example, if a computer 50 is configured so that wireless communication cards are not activated (e.g., settings appropriate for using the computer on a commercial airline), then the compatibility test need not be performed. However, if a user subsequently elects to activate the computer's wireless communication capability, the circuit card initialization software routine would be activated causing the compatibility test to be run at that time.
- FIG. 5 An alternative embodiment is illustrated in FIG. 5 which may be implemented in computer systems which include "hibernate" or “standby” partial operating modes.
- a hibernate or standby mode the computer 50 is left in a state from which a rapid restart is possible.
- power may continue to be supplied to some memory modules in order to maintain software and/or data in memory. Since the FCC only requires that the compatibility tests to be performed every time the computer 50 performs a cold power up, there is no regulatory need to perform the steps of the process described above with reference to FIG. 4.
- the circuit card initialization software routine may be activated, step 30, when the computer is returned to normal operation from standby or hibernate conditions.
- the embodiment illustrated in FIG. 5 may permit a more rapid restart from any hibernate or standby condition by eliminating the need to perform the compatibility test. Since the compatibility test need only be conducted when a cold power up is conducted, this embodiment complies with the FCC requirements. Some additional steps may also be included to ensure an incompatible circuit card is not energized following restart from a hibernate or standby condition.
- the circuit card initialization software routine may also include a test 48 of a flag variable stored in the computer's memory (e.g., 52 or 54) that is maintained during hibernate or standby states that indicates whether the prior conduct of the circuit card compatibility test was successful.
- the embodiment illustrated in FIG. 6 ensures that an incompatible circuit card will not be activated even when the computer 50 is recovering from a hibernate or standby condition. This embodiment may also bypass conducting the compatibility test if a prior test is already indicated that the circuit card 56 is not compatible.
- the embodiments have a number of advantages. By performing the compatibility test using the computer's processor 51 and software stored on the computer's hard disk memory 54, the circuit card 56 can be made less complex, and thus less expensive. There may be no need for nonvolatile memory on the circuit card 56 (which otherwise would be required to store software instructions for performing the compatibility test), thereby potentially eliminating an expensive component from the design of the circuit card. Even if a nonvolatile memory is part of the circuit card 56 for its other functional purposes, the nonvolatile memory need not be filled with the compatibility test software instructions, leaving more memory available for other card functions. The embodiment also eliminates the complexity associated with providing software in the circuit card 56 which is capable of accessing memory within the computer's BIOS.
- circuit cards may be manufactured for a variety of computers, including computers yet to be designed and built, this advantage of eliminates the challenge of designing circuit card software which can access particular memory in a variety of different computer architectures.
- the embodiments enabled the circuit card 56 to be simpler and less expensive in design than would otherwise be required to comply with the FCC requirements.
- circuit card compatibility test software on the computer's hard drive makes it more vulnerable to alteration by users than if the software is embedded within the nonvolatile memory of the circuit card.
- this may not be a concern because the FCC requirements are intended to protect consumers from inadvertently installing an incompatible circuit card in a computer system, and not to defeat concerted efforts to modify or sabotage the computer system. This protects typical consumers rather than protect against hackers.
- the circuit card initialization software routine may be encrypted or protected by a digital signature so that the computer processor can detect if the software routine has been modified and prevent operation if it has.
- the circuit card initialization software routine may be stored in a hidden file or in hidden memory locations on the hard drive in order to make it more difficult for users to locate and modify the software files.
- the hardware used to implement the foregoing embodiments may be processing elements and memory elements configured to execute a set of instructions, wherein the set of instructions are for performing method steps corresponding to the above methods.
- some steps or methods may be performed by circuitry that is specific to a given function.
- An exemplary storage medium is coupled to a processor such that the processor can read information from, and write information to, the storage medium.
- the storage medium may be integral to the processor.
- the processor and the storage medium may reside in an ASIC.
- the ASIC may reside in a user terminal or mobile device.
- the processor and the storage medium may reside as discrete components in a user terminal or mobile device.
- the steps and/or actions of a method or algorithm may reside as one or any combination or set of codes and/or instructions on a machine readable medium and/or computer readable medium, which may be incorporated into a computer program product.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010800190665A CN102414662A (en) | 2009-04-28 | 2010-04-28 | Method and system for providing a data module lock to device hardware, system and method for confirming that a circuit card is compatible with a computer |
JP2012508643A JP5526225B2 (en) | 2009-04-28 | 2010-04-28 | System and method for verifying that a circuit card is compatible with a computer |
KR1020117028258A KR101379522B1 (en) | 2009-04-28 | 2010-04-28 | Method and system for providing a data module lock to device hardware, system and method for confirming that a circuit card is compatible with a computer |
EP10717948A EP2435910A2 (en) | 2009-04-28 | 2010-04-28 | Method and system for providing a data module lock to device hardware, system and method for confirming that a circuit card is compatible with a computer |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/431,075 | 2009-04-28 | ||
US12/431,075 US8209528B2 (en) | 2009-04-28 | 2009-04-28 | Method and system for certifying a circuit card lacking any non-volatile memory as being compatible with a computer |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2010129336A2 true WO2010129336A2 (en) | 2010-11-11 |
WO2010129336A3 WO2010129336A3 (en) | 2011-02-17 |
Family
ID=42993153
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2010/032765 WO2010129336A2 (en) | 2009-04-28 | 2010-04-28 | Method and system for providing a data module lock to device hardware |
Country Status (6)
Country | Link |
---|---|
US (1) | US8209528B2 (en) |
EP (1) | EP2435910A2 (en) |
JP (1) | JP5526225B2 (en) |
KR (1) | KR101379522B1 (en) |
CN (1) | CN102414662A (en) |
WO (1) | WO2010129336A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9779040B2 (en) | 2015-03-23 | 2017-10-03 | Fujitsu Limited | Portable device, system, and information processing apparatus |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011050740A1 (en) * | 2009-10-30 | 2011-05-05 | 北京飞天诚信科技有限公司 | Method for identifying multi-seat card reader and communication method and system with main computer thereof |
US8930939B2 (en) * | 2011-06-25 | 2015-01-06 | International Business Machines Corporation | Comparing system engram with product engram to determine compatibility of product with system |
US9058190B2 (en) * | 2011-06-25 | 2015-06-16 | International Business Machines Corporation | Comparing system engram with product engram to determine compatibility with system |
US9558329B2 (en) * | 2014-06-19 | 2017-01-31 | Dell Products L.P. | License management using a basic input/output system (BIOS) |
US10764942B2 (en) * | 2015-04-09 | 2020-09-01 | Echelon Corporation | Systems, apparatuses, and methods for provisioned networking |
TWI697772B (en) * | 2019-05-08 | 2020-07-01 | 立端科技股份有限公司 | Automatic test host operating system test method and test system thereof |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5038320A (en) * | 1987-03-13 | 1991-08-06 | International Business Machines Corp. | Computer system with automatic initialization of pluggable option cards |
EP0515760B1 (en) | 1991-05-31 | 1996-02-28 | International Business Machines Corporation | Communication controller having line adapters loadable with an application program |
CA2230150C (en) * | 1995-08-21 | 2007-02-06 | Cornel Sirbu | Conditional access method and device |
US5822614A (en) | 1996-05-31 | 1998-10-13 | Unisys Corporation | Self-identifying peripheral device |
US5930496A (en) * | 1997-09-26 | 1999-07-27 | Compaq Computer Corporation | Computer expansion slot and associated logic for automatically detecting compatibility with an expansion card |
EP1042893A1 (en) | 1997-12-19 | 2000-10-11 | Vivid Technology Pte. Ltd. | Multiprotocol reconfigurable network adapter |
US7072728B2 (en) * | 1999-11-19 | 2006-07-04 | Dell Products L.P. | Method for assembling hardware components in a computer system |
US7522614B1 (en) * | 2003-02-28 | 2009-04-21 | 3Com Corporation | Multi-service access platform for telecommunications and data networks |
CN1612117A (en) * | 2003-10-29 | 2005-05-04 | 林晖 | Internet link secure authentication method and IC card authentication hardware |
JP2005352826A (en) * | 2004-06-11 | 2005-12-22 | Oki Electric Ind Co Ltd | Automatic system compatible with plug-and-play function |
US20060136338A1 (en) * | 2004-12-16 | 2006-06-22 | Intel Corporation | Techniques for filtering attempts to access component core logic |
US8214541B2 (en) | 2006-06-07 | 2012-07-03 | Dell Products L.P. | Method and system for uniquely identifying peripheral component devices |
CN201348781Y (en) * | 2008-12-26 | 2009-11-18 | 鸿富锦精密工业(深圳)有限公司 | Circuit board |
-
2009
- 2009-04-28 US US12/431,075 patent/US8209528B2/en active Active
-
2010
- 2010-04-28 CN CN2010800190665A patent/CN102414662A/en active Pending
- 2010-04-28 EP EP10717948A patent/EP2435910A2/en not_active Withdrawn
- 2010-04-28 JP JP2012508643A patent/JP5526225B2/en not_active Expired - Fee Related
- 2010-04-28 KR KR1020117028258A patent/KR101379522B1/en not_active IP Right Cessation
- 2010-04-28 WO PCT/US2010/032765 patent/WO2010129336A2/en active Application Filing
Non-Patent Citations (1)
Title |
---|
None |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9779040B2 (en) | 2015-03-23 | 2017-10-03 | Fujitsu Limited | Portable device, system, and information processing apparatus |
Also Published As
Publication number | Publication date |
---|---|
US8209528B2 (en) | 2012-06-26 |
EP2435910A2 (en) | 2012-04-04 |
KR20120002552A (en) | 2012-01-05 |
JP2012525647A (en) | 2012-10-22 |
JP5526225B2 (en) | 2014-06-18 |
US20100274998A1 (en) | 2010-10-28 |
WO2010129336A3 (en) | 2011-02-17 |
CN102414662A (en) | 2012-04-11 |
KR101379522B1 (en) | 2014-03-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8209528B2 (en) | Method and system for certifying a circuit card lacking any non-volatile memory as being compatible with a computer | |
US8010959B2 (en) | System and method for updating device drivers | |
TWI643130B (en) | SYSTEM AND METHOD FOR AUTO-ENROLLING OPTION ROMs IN A UEFI SECURE BOOT DATABASE | |
US9792440B1 (en) | Secure boot for vehicular systems | |
US9110679B1 (en) | Pre-boot management of drivers and programs | |
EP1213937B1 (en) | Method for backup and restore for JAVA applications of a portable cellular phone. | |
US8554686B2 (en) | Anti-hack protection to restrict installation of operating systems and other software | |
EP1566726A1 (en) | Detachable device, control circuit, control circuit firmware program, information processing method and circuit design pattern in control circuit, and log-in method | |
US7308570B2 (en) | System and method for booting embedded systems using removable storage | |
US20120117369A1 (en) | Platform boot with bridge support | |
US20060101310A1 (en) | Device, system and method for verifying integrity of software programs | |
TW201333691A (en) | Secure option ROM control | |
US9069939B2 (en) | Method and apparatus for storing a software license | |
EP2887221A1 (en) | Device for processing information and working method thereof | |
EP3163489A1 (en) | Token-based control of software installation and operation | |
US9110678B1 (en) | Automated BIOS enhancements and upgrades | |
US8214825B2 (en) | Electronic device and method for installing software | |
CN113536248A (en) | Computing device configurable for secure boot | |
WO2011120774A1 (en) | Method for managing usb devices | |
US8117431B2 (en) | Method for loading system locked pre-installation certification | |
CN113051576A (en) | Control method and electronic device | |
GB2363218A (en) | A method of accessing application data for a peripheral device | |
KR20040092575A (en) | Wireless Communication Terminal for preventing illegal Copy of Software and Method for detecting illegal Copy of Software using it |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201080019066.5 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10717948 Country of ref document: EP Kind code of ref document: A2 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2159/MUMNP/2011 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012508643 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010717948 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20117028258 Country of ref document: KR Kind code of ref document: A |