Computer booting anti-counterfeit authentication method based on BIOS

A verification method and computer technology, applied in computer security devices, internal/peripheral computer component protection, computing, etc., can solve problems such as damage to the rights and interests of computer brand manufacturers, many factors affecting the anti-counterfeiting effect, damage to the interests of consumers, etc., and achieve convenient sales. Incentive, easy to promote and use, the effect of protecting interests

Active Publication Date: 2010-07-14
宏电脑上海
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this type of method is very popular, it has the disadvantages of being easy to forge and having many factors affecting the anti-counterfeiting effect.
[0003] Some unscrupulous merchants in the market take advantage of these flaws to sell the computers returned by users as brand-new products to customers, but customers cannot determine whether the products they buy belong to such secondary products through current anti-counterfeiting means or other simple methods
[0004] At the same time, there are also some clever merchants who replace part of the hardware in the brand computer with inferior hardware, or even sell it as a brand computer, which seriously damages the interests of consumers and also damages the rights and interests of computer brand manufacturers.
[0005] Existing computer anti-counterfeiting methods cannot prevent or solve such problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer booting anti-counterfeit authentication method based on BIOS
  • Computer booting anti-counterfeit authentication method based on BIOS
  • Computer booting anti-counterfeit authentication method based on BIOS

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] A user purchases a computer, and a power-on authentication module is implanted in the BIOS of the computer.

[0032] After the user turns on the computer for the first time, the power-on verification module reads the activation flag. At this time, the activation flag is set to be inactive, so the module suspends the operating system startup program, and reads the SN+ID of the computer, and encrypts the SN+ID to form a An activation window pops up after a short string of characters, and the window displays the string, that is, the encrypted SN+ID.

[0033] The user calls the computer manufacturer and informs the customer service of the string. The customer service inputs it into the verification system. After the verification system decrypts it, it judges whether the SN and ID have been stored in the database and whether they match. If not, the user is notified that an error occurred. , if the verification is correct, the verification system will generate an activation c...

Embodiment 2

[0039] This embodiment is based on the same situation as Embodiment 1, the difference is that on the computer purchased by the user, a USB device is attached according to the PMP ROM specification of the BIOS, and this USB device plays the role of the power-on verification module described in Embodiment 1 . The device is loaded after the BIOS self-test, and stops the startup program before the operating system in the computer is started.

[0040] The difference between this embodiment and Embodiment 1 is that the user completes the entire verification process by means of a third-party short message platform through a short message. Fig. 3 is a flowchart of this embodiment.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer booting anti-counterfeit authentication method based on BIOS, which belongs to the technical field of computer application. The invention aims to provide a computer anti-counterfeit method which has high reliability, is easy to be operated, has low cost and simultaneously does not affect the customer experience; the method comprises the following steps: (a) a booting authentication unit is implanted in BIOS; (b) the booting authentication unit suspends a booting procedure after computer booting, the only ID of the computer is read, encrypted and displayed on a computer monitor; (c) a user sends the encrypted file to a remote anti-counterfeit authentication server through an information sending method; (d) the server decrypts the encrypted file and authenticates the only ID, and returns an activation code to the user after authenticates no error; and (e) the user inputs the activation code to the booting authentication unit, and the booting authentication unit continues the booting procedure after no error is authenticated. The computer booting anti-counterfeit authentication method based on BIOS can be used for computer anti-counterfeit.

Description

technical field [0001] The invention relates to anti-counterfeiting verification, in particular to a BIOS-based anti-counterfeiting verification method for starting a computer, and belongs to the technical field of computer applications. Background technique [0002] Existing computer anti-counterfeiting method mainly realizes by pasting self-adhesive stickers, fragile stickers and other means on the hardware of the computer. Although this type of method is very popular, it has defects such as easy forgery and many factors affecting the anti-counterfeiting effect. [0003] Some unscrupulous merchants in the market take advantage of these defects to sell the computers returned by users as brand new products to customers, but customers cannot determine whether the products they buy belong to such secondary products through current anti-counterfeiting means or other simple methods. [0004] At the same time, there are also some clever merchants who replace part of the hardware...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/20G06F9/445G06F21/71
CPCH04L9/32
Inventor 赵林陈凯锋刘一帆白向春
Owner 宏电脑上海
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products