Method and system for authenticating two-way hardware

An authentication method and authentication system technology, applied in the field of two-way hardware authentication methods and systems, can solve the problems of low security, easy to be tampered with, and misappropriation of legitimate user resources, etc., and achieve the effect of enhancing security

Active Publication Date: 2010-06-16
LENOVO (BEIJING) CO LTD
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, the BIOS of existing computers is injected with plaintext One Number, or plaintext SN (SerialNumber, identification number), which is easy to be compared and cracked, easily tampered with, easy to be copied, and easy to be forged
It will cause hackers to steal legitimate user resourc

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for authenticating two-way hardware
  • Method and system for authenticating two-way hardware
  • Method and system for authenticating two-way hardware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The invention provides a two-way hardware authentication method and system for realizing two-way authentication between a content server and a computer.

[0043] see figure 1 , which is a flow chart of the first embodiment of the two-way hardware authentication method of the present invention.

[0044] The two-way hardware authentication method described in the first embodiment of the present invention includes the following steps:

[0045] S100. Send the encrypted result of the user identification number generated by the production server in the production stage to the computer, and store the encrypted result as the computer identification number in the BIOS data block.

[0046] The computer identification number may be encrypted by the content server and stored in the BIOS data block.

[0047] In the production stage, the production server will first generate a USER (user) SN (for example: NA0608XXXXXX), which will be printed and pasted on the outside of the compute...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates a method for authenticating two-way hardware. The method comprises the following steps of: storing a computer mark number, a platform fingerprint, a platform fingerprint production certificate signature, and an address of a content server in a data block of a basic input/output system; extracting the address of the content server in the data block of the basic input/output system, and sending the address to a computer; building a connection between the computer and the content server according to the address of the content server; extracting a computer platform fingerprint, and verifying that the computer platform fingerprint is consistent with the platform fingerprint stored in the data block of the basic input/output system; and submitting the platform fingerprint production certificate signature to the content server to verify a production certificate; confirming that the data block of the basic input/output system is legal after passing the verification; sending a verification result of the content server to the computer through the service certificate signature; and confirming that the content server is legal after the computer passes the service certificate verification in the data block of the basic input/output system. The method and system for authenticating the two-way hardware realize two-way authentication between the content server and the computer.

Description

technical field [0001] The invention relates to an authentication method, in particular to a bidirectional hardware authentication method and system based on a basic input and output system. Background technique [0002] Existing computers will be written with specific information during the production stage as the unique identifier of the computer. The specific information written is not easy to be tampered with, copied and attacked. [0003] Generally, the computer manufacturer is provided with a server. When the user's computer is turned on and goes online, the server can immediately identify the computer because the computer has the unique identifier. The computing interface can download specific service content through the server. [0004] In fact, the relationship between the computer and the server that produces the computer is similar to the "Shenzhouxing" type of PC online identification requirements. That is, without user intervention, the computer can be automa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 李希喆刘娜
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products