Unlock instant, AI-driven research and patent intelligence for your innovation.

Software authentication method

An authentication method and software technology, applied in the computer field, can solve problems such as easy cracking, inability to effectively protect genuine OEM software, adverse effects of genuine OEM software, etc., to achieve the effect of ensuring effectiveness and security

Active Publication Date: 2009-04-01
LENOVO (BEIJING) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of pirated software that can be installed at will obviously has a very serious adverse effect and impact on the genuine OEM software. Therefore, it is necessary to authenticate the OEM software used on the computer to effectively protect the genuine OEM software.
But there is no real and effective software certification method yet. Even the SLP 2.0 technical specification used by Microsoft's VISTA has many loopholes, which are easy to be cracked and cannot effectively protect genuine OEM software.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authentication method
  • Software authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The technology of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0028] see figure 1 , figure 1 It is a software authentication flow chart of an embodiment of the present invention, and the process includes the following steps:

[0029] Step 101: Trigger SMI. Specifically, an interrupt handler corresponding to the SMI may be preset, and an entry parameter triggering the SMI interrupt handler may be specified. When the entry parameter capable of triggering the SMI interrupt handler is written into the SMI input and output port, an SMI capable of executing the interrupt handler is generated.

[0030] Step 102: Execute the interrupt handler corresponding to the SMI. Specifically, the interrupt processing program may be a preset software program for performing any operation, such as: an interrupt processing program for changing the character string in the setting area (the DMI area may be used).

[0031] Step 10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software authentication method. The method includes the following steps: triggering system management interrupt (SMI) and actuating an interruption processing procedure corresponding to the interruption; confirming the current software to be a legal copy when the executing result of the interruption processing procedure is inosculated with a set authentication standard. Obviously, the software authentication method provided by the invention takes the SMI as a starting point of the authentication during the key operation for carrying out authentication and arranges the interruption processing procedure corresponding to the SMI into an invisible area, thereby being capable of ensuring the validity and the safety for authenticating the legal copy.

Description

technical field [0001] The invention relates to computer technology, in particular to a software authentication method. Background technique [0002] Computers today come with genuine original equipment manufacturer (OEM) software installed. OEM software refers to the special software sales version that must be pre-installed on the hard drive or bound to the computer hardware during the computer manufacturing process. OEM software cannot be sold separately from the relevant computer under any circumstances. [0003] However, with the development of the Internet, a lot of OEM software is placed on the Internet as a shared resource, and ordinary users only need to download and install it to enjoy all the functions of the genuine software. This kind of pirated software that can be installed at will obviously has caused very serious adverse effects and impact on genuine OEM software, so it is necessary to authenticate the OEM software used on the computer to effectively protect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06F21/10G06F21/44
Inventor 周振生
Owner LENOVO (BEIJING) CO LTD