CN101398879B - Software authentication method - Google Patents

Software authentication method Download PDF

Info

Publication number
CN101398879B
CN101398879B CN2007101224226A CN200710122422A CN101398879B CN 101398879 B CN101398879 B CN 101398879B CN 2007101224226 A CN2007101224226 A CN 2007101224226A CN 200710122422 A CN200710122422 A CN 200710122422A CN 101398879 B CN101398879 B CN 101398879B
Authority
CN
China
Prior art keywords
software
legal
authentication
smi
execution result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2007101224226A
Other languages
Chinese (zh)
Other versions
CN101398879A (en
Inventor
周振生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN2007101224226A priority Critical patent/CN101398879B/en
Publication of CN101398879A publication Critical patent/CN101398879A/en
Application granted granted Critical
Publication of CN101398879B publication Critical patent/CN101398879B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a software authentication method. The method includes the following steps: triggering system management interrupt (SMI) and actuating an interruption processing procedure corresponding to the interruption; confirming the current software to be a legal copy when the executing result of the interruption processing procedure is inosculated with a set authentication standard. Obviously, the software authentication method provided by the invention takes the SMI as a starting point of the authentication during the key operation for carrying out authentication and arranges the interruption processing procedure corresponding to the SMI into an invisible area, thereby being capable of ensuring the validity and the safety for authenticating the legal copy.

Description

A kind of software authentication method
Technical field
The present invention relates to computer technology, be specifically related to a kind of software authentication method.
Background technology
At present, legal original equipment manufacturer (OEM) software all is installed in the computing machine.OEM software is meant the special software sale version that must be filled to hard disk drive in advance in computing machine manufacturing process or be bound to computer hardware, and OEM software under any circumstance all must not break away from correlation computer and sell separately.
Yet along with the development of internet, a lot of OEM softwares are used as shared resource and have been placed on the network, and the general user only need download and install, and just can enjoy all functions of copyrighted software.This piracy software that can arbitrarily install has obviously been caused very serious harmful effect and impact to legal OEM software, therefore is necessary applied OEM software on the computing machine is authenticated, with the legal OEM software of effective protection.But do not occur real effectively software authentication method at present as yet, even also there are a lot of leaks in the SLP that VISTA uses of Microsoft 2.0 technical manuals, easy crack can't effectively be protected legal OEM software.
Summary of the invention
In view of this, fundamental purpose of the present invention is to provide a kind of software authentication method, improves the validity of differentiating copyrighted software.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of software authentication method, this method comprises:
Triggering system management interrupt (SMI) is also carried out this and is interrupted pairing interrupt handling routine; When the Valuation Standard of the execution result of this interrupt handling routine and setting matches, determine that current software is for legal.
Preferably, the method for described triggering SMI is:
Specify the suction parameter that triggers the SMI interrupt handling routine, and write this suction parameter to the SMI input/output port.
Preferably, the process of carrying out described interrupt handling routine is:
Character string in the setting regions is changed.
Preferably, this method further comprises:
Non-visible zone in operating system sets in advance described interrupt handling routine.
Preferably, judge that whether described execution result with the method that described Valuation Standard matches is:
Described execution result is compared with described Valuation Standard,, determine that execution result and Valuation Standard match if execution result is identical with Valuation Standard; Otherwise, determine that execution result and Valuation Standard misfit.
Preferably, this method further comprises:
Described execution result and described Valuation Standard misfit, and determine that current software is non-legal copy.
Preferably, described software is original equipment manufacturer's software.
Preferably, trigger before the described SMI, further the legal authentication information at described software authenticates, and authentication is passed through.
Preferably, the method that authenticates at the legal authentication information of described software is:
Obtain the content in the described legal authentication information position, judge whether the content of being obtained is legal authentication information, if pass through at the authentication that legal authentication information carries out; Otherwise, do not pass through at the authentication that legal authentication information carries out.
Preferably, this method further comprises:
Do not pass through at the authentication that described legal authentication information carries out, determine that current software is non-legal copy.
As seen, software authentication method provided by the present invention in the key operation that authenticates is the starting point of authentication with the system management interrupt, and the pairing interrupt handling routine of system management interrupt is placed invisible area; Therefore can guarantee to differentiate the validity and the security of copyrighted software.
Description of drawings
Fig. 1 is the software authentication process flow diagram of one embodiment of the invention;
Fig. 2 is the software authentication process flow diagram of another embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing the technology of the present invention is described in detail.
Referring to Fig. 1, Fig. 1 is the software authentication process flow diagram of one embodiment of the invention, and this flow process may further comprise the steps:
Step 101: trigger SMI.Particularly, can set in advance the pairing interrupt handling routine of SMI, and specify the suction parameter that triggers this SMI interrupt handling routine.When the suction parameter that can trigger this SMI interrupt handling routine is written into the SMI input/output port, then produce the SMI that can carry out described interrupt handling routine.
Step 102: carry out the pairing interrupt handling routine of SMI.Particularly, described interrupt handling routine can be the software program that is used to carry out any operation that sets in advance, as: be used for interrupt handling routine that the character string of setting regions (can use the DMI zone) is changed.
Step 103: whether the execution result of judging interrupt handling routine matches with the Valuation Standard that is provided with, if coincide, enters step 104; Otherwise, directly enter step 105.
Particularly, described execution result can be compared with described Valuation Standard,, just determine that execution result and Valuation Standard match if execution result is identical with Valuation Standard; Otherwise, determine that execution result and Valuation Standard misfit.
Step 104: determine OEM software for legal, and process ends.
Step 105: determine that OEM software is non-legal copy.
In actual applications, described interrupt handling routine normally is stored among the SMRAM, this zone is the non-visible zone in the operating system, and the cracker can't find and change the content in this zone in theory, and this also makes flow process shown in Figure 1 can really differentiate legal OEM software effectively.
In fact, flow process shown in Figure 1 has just been set forth fairly simple software authentication method, can also use the software authentication flow process of relative complex shown in Figure 2 and carry out software authentication, this authentication complicacy can further improve and cracks difficulty, has further improved validity and the security of differentiating copyrighted software.
Referring to Fig. 2, Fig. 2 is the software authentication process flow diagram of another embodiment of the present invention, and this flow process may further comprise the steps:
Step 201: obtain the content in the legal authentication information position.
Step 202: whether the content of being obtained in the determining step 201 is legal authentication information, if then the authentication of carrying out at legal authentication information is passed through, and enters step 203; Otherwise, do not pass through at the authentication that legal authentication information carries out, and directly enter step 207.
Step 203: trigger SMI.
Step 204: in SMI, described legal authentication information is changed.
Step 205: judge that whether the result that legal authentication information is changed matches with the Valuation Standard that is provided with, if coincide, enters step 206; Otherwise, directly enter step 207.
Step 206: determine OEM software for legal, and process ends.
Step 207: determine that OEM software is non-legal copy.
As seen from Figure 2, a verification process with respect to Fig. 1, flow performing shown in Figure 2 more complicated re-authentication process: before this legal authentication information at OEM software authenticated (since this legal copy authentication information exist be modified may, so need the authentication by after proceed the authentication operation relevant with SMI), proceed the authentication operation relevant afterwards again with SMI.Obviously, the re-authentication mode of this relative complex can further improve and cracks difficulty, thereby can further improve validity and the security of differentiating copyrighted software.
By the above as seen, software authentication method of the present invention in the key operation that authenticates is the starting point of authentication with SMI, and the pairing interrupt handling routine of SMI is placed invisible area; Therefore can guarantee to differentiate the validity and the security of copyrighted software.

Claims (8)

1. a software authentication method is characterized in that, this method comprises:
Triggering system management interrupt SMI also carries out this and interrupts pairing interrupt handling routine; Described interrupt handling routine sets in advance in the non-visible zone in operating system; Wherein, the process of carrying out described interrupt handling routine is: the character string in the setting regions is changed;
When the Valuation Standard of the execution result of this interrupt handling routine and setting matches, determine that current software is for legal.
2. method according to claim 1 is characterized in that, the method for described triggering SMI is:
Specify the suction parameter that triggers the SMI interrupt handling routine, and write this suction parameter to the SMI input/output port.
3. method according to claim 1 is characterized in that, judges that whether described execution result with the method that described Valuation Standard matches is:
Described execution result is compared with described Valuation Standard,, determine that execution result and Valuation Standard match if execution result is identical with Valuation Standard; Otherwise, determine that execution result and Valuation Standard misfit.
4. method according to claim 1 is characterized in that, this method further comprises:
Described execution result and described Valuation Standard misfit, and determine that current software is non-legal copy.
5. method according to claim 1 is characterized in that, described software is original equipment manufacturer's software.
6. according to each described method of claim 1 to 5, it is characterized in that trigger before the described SMI, further the legal authentication information at described software authenticates, and authentication is passed through.
7. method according to claim 6 is characterized in that, the method that authenticates at the legal authentication information of described software is:
Obtain the content in the described legal authentication information position, judge whether the content of being obtained is legal authentication information, if pass through at the authentication that legal authentication information carries out; Otherwise, do not pass through at the authentication that legal authentication information carries out.
8. method according to claim 6 is characterized in that, this method further comprises:
Do not pass through at the authentication that described legal authentication information carries out, determine that current software is non-legal copy.
CN2007101224226A 2007-09-25 2007-09-25 Software authentication method Active CN101398879B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007101224226A CN101398879B (en) 2007-09-25 2007-09-25 Software authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007101224226A CN101398879B (en) 2007-09-25 2007-09-25 Software authentication method

Publications (2)

Publication Number Publication Date
CN101398879A CN101398879A (en) 2009-04-01
CN101398879B true CN101398879B (en) 2011-04-27

Family

ID=40517426

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007101224226A Active CN101398879B (en) 2007-09-25 2007-09-25 Software authentication method

Country Status (1)

Country Link
CN (1) CN101398879B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6715074B1 (en) * 1999-07-27 2004-03-30 Hewlett-Packard Development Company, L.P. Virus resistant and hardware independent method of flashing system bios
CN1536479A (en) * 2003-04-07 2004-10-13 英业达股份有限公司 Protection method for embedded software
CN1897005A (en) * 2006-05-23 2007-01-17 施霖 Protector against software running in non-authority computer

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6715074B1 (en) * 1999-07-27 2004-03-30 Hewlett-Packard Development Company, L.P. Virus resistant and hardware independent method of flashing system bios
CN1536479A (en) * 2003-04-07 2004-10-13 英业达股份有限公司 Protection method for embedded software
CN1897005A (en) * 2006-05-23 2007-01-17 施霖 Protector against software running in non-authority computer

Also Published As

Publication number Publication date
CN101398879A (en) 2009-04-01

Similar Documents

Publication Publication Date Title
KR101122950B1 (en) Method and system for limiting software updates
US8122256B2 (en) Secure bytecode instrumentation facility
JP6239788B2 (en) Fingerprint authentication method, apparatus, intelligent terminal, and computer storage medium
US8332930B2 (en) Secure use of user secrets on a computing platform
JP5378460B2 (en) System and method for protected operating system boot using state verification
EP1934810B1 (en) Secure machine counting
US8271803B2 (en) Anti-debugging protection of binaries with proxy code execution
US20060236122A1 (en) Secure boot
CN105871915A (en) Software network authentication binding method and system
JP2007148962A (en) Subprogram, information processor for executing subprogram, and program control method in information processor for executing subprogram
Viticchié et al. Reactive attestation: Automatic detection and reaction to software tampering attacks
CN111400723A (en) TEE extension-based operating system kernel mandatory access control method and system
Main et al. Software protection and application security: Understanding the battleground
JP4711824B2 (en) Business administrator terminal, environmental management station terminal, network operator terminal, business operator terminal, business administrator terminal control method, environmental management station terminal control method, network operator terminal control method, and business operator program
CN101398879B (en) Software authentication method
KR20090081200A (en) Security system for internet site and method thereof
CN108563934B (en) Fingerprint unlocking method and device
US8914895B1 (en) Managing verification of input data
CN108990041B (en) Method and equipment for setting main card and auxiliary card
Jurjens Code security analysis of a biometric authentication system using automated theorem provers
CN107305607B (en) One kind preventing the independently operated method and apparatus of backstage rogue program
EP2202661B1 (en) Apparatus and method for protecting asset in computer system
Lv et al. A software upgrade security analysis method based on program analysis
CN115203727A (en) Neural network training method, device, terminal and storage medium
Abendroth et al. Trusted Computing for Collaboration

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant