Software authentication method
An authentication method and software technology, applied in the computer field, can solve problems such as easy cracking, inability to effectively protect genuine OEM software, adverse effects of genuine OEM software, etc., to achieve the effect of ensuring effectiveness and security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] The technology of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0028] see figure 1 , figure 1 It is a software authentication flow chart of an embodiment of the present invention, and the process includes the following steps:
[0029] Step 101: Trigger SMI. Specifically, an interrupt handler corresponding to the SMI may be preset, and an entry parameter triggering the SMI interrupt handler may be specified. When the entry parameter capable of triggering the SMI interrupt handler is written into the SMI input and output port, an SMI capable of executing the interrupt handler is generated.
[0030] Step 102: Execute the interrupt handler corresponding to the SMI. Specifically, the interrupt processing program may be a preset software program for performing any operation, such as: an interrupt processing program for changing the character string in the setting area (the DMI area may be used).
[0031] Step 10...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 