Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for binding computer hardware and software

A computer hardware, computer technology, applied in the direction of computer security devices, computing, instruments, etc.

Active Publication Date: 2009-05-27
BEIJING EVOC INTELLIGENT TECH +1
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] But, in the method of above-mentioned prior art, all keys, no matter be public key or private key all are preset invariable
That is to say, once the encryption method is cracked or the key is copied, it can be copied and used in large quantities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for binding computer hardware and software
  • Method for binding computer hardware and software
  • Method for binding computer hardware and software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Because the present invention relates to the calling of BIOS, before introducing the present invention, at first the effect of computer BIOS and its work process are introduced:

[0036] 1. The first is the self-test process: After the computer is powered on, the system will have a process of checking each internal device, which is completed by a program usually called POST (Power On Self Test / power-on self-test) , which is also a function of the BIOS program. The complete self-inspection includes the test of CPU, 640K extended memory above 1M, ROM, motherboard, CMOS memory, serial and parallel ports, display card, soft hard disk subsystem and keyboard.

[0037] 2. If a problem is found during the self-inspection, the system will give a prompt message or whistle a warning. If there is no problem, start the initialization process after completing the self-test, that is, the BIOS will search for valid boot drives such as soft drives, hard drives, CDROMs, and network serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing the binding of computer hardware and software. Hardware identification codes are stored in the computer hardware, and the software includes permission files; the method comprises the following steps: A, reading the hardware identification codes and the permission files from the computer hardware and software respectively; B, by certifying the use validity of the obtained hardware identification codes and the permission files, the validity certification of an algorithm is performed; and C, after the certification passes, the software runs; and by using the updated algorithm, the hardware identification codes in the hardware and the permission files in the software are updated. Due to the adoption of the method, the dynamic change of binding elements is realized.

Description

technical field [0001] The invention relates to the technical field of computer hardware and software protection, in particular to a method for realizing computer hardware and software binding. Background technique [0002] Software manufacturers use various measures to protect their own software copyrights, and hardware manufacturers also need to protect their intellectual property rights. At present, there is a problem that based on X86 (X86 is the general series of Intel microprocessor families starting with 80286 microprocessors) Name) software can run on motherboards of different manufacturers, and the method based on software encryption is easy to crack, and will be copied in large numbers after cracking, causing huge economic losses to the software manufacturers. On the other hand, motherboards and other hardware produced by hardware manufacturers are also easy to be copied by other manufacturers, especially for manufacturers who manufacture both software and hardware...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/22G06F21/12
Inventor 李书朝
Owner BEIJING EVOC INTELLIGENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products