Method and system for authenticating two-way hardware
An authentication method and authentication system technology, applied in the field of two-way hardware authentication methods and systems, can solve the problems of low security, easy to be tampered with, and misappropriation of legitimate user resources, etc., and achieve the effect of enhancing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The invention provides a two-way hardware authentication method and system for realizing two-way authentication between a content server and a computer.
[0043] see figure 1 , which is a flow chart of the first embodiment of the two-way hardware authentication method of the present invention.
[0044] The two-way hardware authentication method described in the first embodiment of the present invention includes the following steps:
[0045] S100. Send the encrypted result of the user identification number generated by the production server in the production stage to the computer, and store the encrypted result as the computer identification number in the BIOS data block.
[0046] The computer identification number may be encrypted by the content server and stored in the BIOS data block.
[0047] In the production stage, the production server will first generate a USER (user) SN (for example: NA0608XXXXXX), which will be printed and pasted on the outside of the compute...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com