CN101398879B - Software authentication method - Google Patents
Software authentication method Download PDFInfo
- Publication number
- CN101398879B CN101398879B CN2007101224226A CN200710122422A CN101398879B CN 101398879 B CN101398879 B CN 101398879B CN 2007101224226 A CN2007101224226 A CN 2007101224226A CN 200710122422 A CN200710122422 A CN 200710122422A CN 101398879 B CN101398879 B CN 101398879B
- Authority
- CN
- China
- Prior art keywords
- software
- legal
- authentication
- smi
- execution result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Abstract
The invention discloses a software authentication method. The method includes the following steps: triggering system management interrupt (SMI) and actuating an interruption processing procedure corresponding to the interruption; confirming the current software to be a legal copy when the executing result of the interruption processing procedure is inosculated with a set authentication standard. Obviously, the software authentication method provided by the invention takes the SMI as a starting point of the authentication during the key operation for carrying out authentication and arranges the interruption processing procedure corresponding to the SMI into an invisible area, thereby being capable of ensuring the validity and the safety for authenticating the legal copy.
Description
Technical field
The present invention relates to computer technology, be specifically related to a kind of software authentication method.
Background technology
At present, legal original equipment manufacturer (OEM) software all is installed in the computing machine.OEM software is meant the special software sale version that must be filled to hard disk drive in advance in computing machine manufacturing process or be bound to computer hardware, and OEM software under any circumstance all must not break away from correlation computer and sell separately.
Yet along with the development of internet, a lot of OEM softwares are used as shared resource and have been placed on the network, and the general user only need download and install, and just can enjoy all functions of copyrighted software.This piracy software that can arbitrarily install has obviously been caused very serious harmful effect and impact to legal OEM software, therefore is necessary applied OEM software on the computing machine is authenticated, with the legal OEM software of effective protection.But do not occur real effectively software authentication method at present as yet, even also there are a lot of leaks in the SLP that VISTA uses of Microsoft 2.0 technical manuals, easy crack can't effectively be protected legal OEM software.
Summary of the invention
In view of this, fundamental purpose of the present invention is to provide a kind of software authentication method, improves the validity of differentiating copyrighted software.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of software authentication method, this method comprises:
Triggering system management interrupt (SMI) is also carried out this and is interrupted pairing interrupt handling routine; When the Valuation Standard of the execution result of this interrupt handling routine and setting matches, determine that current software is for legal.
Preferably, the method for described triggering SMI is:
Specify the suction parameter that triggers the SMI interrupt handling routine, and write this suction parameter to the SMI input/output port.
Preferably, the process of carrying out described interrupt handling routine is:
Character string in the setting regions is changed.
Preferably, this method further comprises:
Non-visible zone in operating system sets in advance described interrupt handling routine.
Preferably, judge that whether described execution result with the method that described Valuation Standard matches is:
Described execution result is compared with described Valuation Standard,, determine that execution result and Valuation Standard match if execution result is identical with Valuation Standard; Otherwise, determine that execution result and Valuation Standard misfit.
Preferably, this method further comprises:
Described execution result and described Valuation Standard misfit, and determine that current software is non-legal copy.
Preferably, described software is original equipment manufacturer's software.
Preferably, trigger before the described SMI, further the legal authentication information at described software authenticates, and authentication is passed through.
Preferably, the method that authenticates at the legal authentication information of described software is:
Obtain the content in the described legal authentication information position, judge whether the content of being obtained is legal authentication information, if pass through at the authentication that legal authentication information carries out; Otherwise, do not pass through at the authentication that legal authentication information carries out.
Preferably, this method further comprises:
Do not pass through at the authentication that described legal authentication information carries out, determine that current software is non-legal copy.
As seen, software authentication method provided by the present invention in the key operation that authenticates is the starting point of authentication with the system management interrupt, and the pairing interrupt handling routine of system management interrupt is placed invisible area; Therefore can guarantee to differentiate the validity and the security of copyrighted software.
Description of drawings
Fig. 1 is the software authentication process flow diagram of one embodiment of the invention;
Fig. 2 is the software authentication process flow diagram of another embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing the technology of the present invention is described in detail.
Referring to Fig. 1, Fig. 1 is the software authentication process flow diagram of one embodiment of the invention, and this flow process may further comprise the steps:
Step 101: trigger SMI.Particularly, can set in advance the pairing interrupt handling routine of SMI, and specify the suction parameter that triggers this SMI interrupt handling routine.When the suction parameter that can trigger this SMI interrupt handling routine is written into the SMI input/output port, then produce the SMI that can carry out described interrupt handling routine.
Step 102: carry out the pairing interrupt handling routine of SMI.Particularly, described interrupt handling routine can be the software program that is used to carry out any operation that sets in advance, as: be used for interrupt handling routine that the character string of setting regions (can use the DMI zone) is changed.
Step 103: whether the execution result of judging interrupt handling routine matches with the Valuation Standard that is provided with, if coincide, enters step 104; Otherwise, directly enter step 105.
Particularly, described execution result can be compared with described Valuation Standard,, just determine that execution result and Valuation Standard match if execution result is identical with Valuation Standard; Otherwise, determine that execution result and Valuation Standard misfit.
Step 104: determine OEM software for legal, and process ends.
Step 105: determine that OEM software is non-legal copy.
In actual applications, described interrupt handling routine normally is stored among the SMRAM, this zone is the non-visible zone in the operating system, and the cracker can't find and change the content in this zone in theory, and this also makes flow process shown in Figure 1 can really differentiate legal OEM software effectively.
In fact, flow process shown in Figure 1 has just been set forth fairly simple software authentication method, can also use the software authentication flow process of relative complex shown in Figure 2 and carry out software authentication, this authentication complicacy can further improve and cracks difficulty, has further improved validity and the security of differentiating copyrighted software.
Referring to Fig. 2, Fig. 2 is the software authentication process flow diagram of another embodiment of the present invention, and this flow process may further comprise the steps:
Step 201: obtain the content in the legal authentication information position.
Step 202: whether the content of being obtained in the determining step 201 is legal authentication information, if then the authentication of carrying out at legal authentication information is passed through, and enters step 203; Otherwise, do not pass through at the authentication that legal authentication information carries out, and directly enter step 207.
Step 203: trigger SMI.
Step 204: in SMI, described legal authentication information is changed.
Step 205: judge that whether the result that legal authentication information is changed matches with the Valuation Standard that is provided with, if coincide, enters step 206; Otherwise, directly enter step 207.
Step 206: determine OEM software for legal, and process ends.
Step 207: determine that OEM software is non-legal copy.
As seen from Figure 2, a verification process with respect to Fig. 1, flow performing shown in Figure 2 more complicated re-authentication process: before this legal authentication information at OEM software authenticated (since this legal copy authentication information exist be modified may, so need the authentication by after proceed the authentication operation relevant with SMI), proceed the authentication operation relevant afterwards again with SMI.Obviously, the re-authentication mode of this relative complex can further improve and cracks difficulty, thereby can further improve validity and the security of differentiating copyrighted software.
By the above as seen, software authentication method of the present invention in the key operation that authenticates is the starting point of authentication with SMI, and the pairing interrupt handling routine of SMI is placed invisible area; Therefore can guarantee to differentiate the validity and the security of copyrighted software.
Claims (8)
1. a software authentication method is characterized in that, this method comprises:
Triggering system management interrupt SMI also carries out this and interrupts pairing interrupt handling routine; Described interrupt handling routine sets in advance in the non-visible zone in operating system; Wherein, the process of carrying out described interrupt handling routine is: the character string in the setting regions is changed;
When the Valuation Standard of the execution result of this interrupt handling routine and setting matches, determine that current software is for legal.
2. method according to claim 1 is characterized in that, the method for described triggering SMI is:
Specify the suction parameter that triggers the SMI interrupt handling routine, and write this suction parameter to the SMI input/output port.
3. method according to claim 1 is characterized in that, judges that whether described execution result with the method that described Valuation Standard matches is:
Described execution result is compared with described Valuation Standard,, determine that execution result and Valuation Standard match if execution result is identical with Valuation Standard; Otherwise, determine that execution result and Valuation Standard misfit.
4. method according to claim 1 is characterized in that, this method further comprises:
Described execution result and described Valuation Standard misfit, and determine that current software is non-legal copy.
5. method according to claim 1 is characterized in that, described software is original equipment manufacturer's software.
6. according to each described method of claim 1 to 5, it is characterized in that trigger before the described SMI, further the legal authentication information at described software authenticates, and authentication is passed through.
7. method according to claim 6 is characterized in that, the method that authenticates at the legal authentication information of described software is:
Obtain the content in the described legal authentication information position, judge whether the content of being obtained is legal authentication information, if pass through at the authentication that legal authentication information carries out; Otherwise, do not pass through at the authentication that legal authentication information carries out.
8. method according to claim 6 is characterized in that, this method further comprises:
Do not pass through at the authentication that described legal authentication information carries out, determine that current software is non-legal copy.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007101224226A CN101398879B (en) | 2007-09-25 | 2007-09-25 | Software authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007101224226A CN101398879B (en) | 2007-09-25 | 2007-09-25 | Software authentication method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101398879A CN101398879A (en) | 2009-04-01 |
CN101398879B true CN101398879B (en) | 2011-04-27 |
Family
ID=40517426
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2007101224226A Active CN101398879B (en) | 2007-09-25 | 2007-09-25 | Software authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101398879B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6715074B1 (en) * | 1999-07-27 | 2004-03-30 | Hewlett-Packard Development Company, L.P. | Virus resistant and hardware independent method of flashing system bios |
CN1536479A (en) * | 2003-04-07 | 2004-10-13 | 英业达股份有限公司 | Protection method for embedded software |
CN1897005A (en) * | 2006-05-23 | 2007-01-17 | 施霖 | Protector against software running in non-authority computer |
-
2007
- 2007-09-25 CN CN2007101224226A patent/CN101398879B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6715074B1 (en) * | 1999-07-27 | 2004-03-30 | Hewlett-Packard Development Company, L.P. | Virus resistant and hardware independent method of flashing system bios |
CN1536479A (en) * | 2003-04-07 | 2004-10-13 | 英业达股份有限公司 | Protection method for embedded software |
CN1897005A (en) * | 2006-05-23 | 2007-01-17 | 施霖 | Protector against software running in non-authority computer |
Also Published As
Publication number | Publication date |
---|---|
CN101398879A (en) | 2009-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101122950B1 (en) | Method and system for limiting software updates | |
US8122256B2 (en) | Secure bytecode instrumentation facility | |
JP6239788B2 (en) | Fingerprint authentication method, apparatus, intelligent terminal, and computer storage medium | |
US8332930B2 (en) | Secure use of user secrets on a computing platform | |
JP5378460B2 (en) | System and method for protected operating system boot using state verification | |
EP1934810B1 (en) | Secure machine counting | |
US8271803B2 (en) | Anti-debugging protection of binaries with proxy code execution | |
US20060236122A1 (en) | Secure boot | |
CN105871915A (en) | Software network authentication binding method and system | |
JP2007148962A (en) | Subprogram, information processor for executing subprogram, and program control method in information processor for executing subprogram | |
Viticchié et al. | Reactive attestation: Automatic detection and reaction to software tampering attacks | |
CN111400723A (en) | TEE extension-based operating system kernel mandatory access control method and system | |
Main et al. | Software protection and application security: Understanding the battleground | |
JP4711824B2 (en) | Business administrator terminal, environmental management station terminal, network operator terminal, business operator terminal, business administrator terminal control method, environmental management station terminal control method, network operator terminal control method, and business operator program | |
CN101398879B (en) | Software authentication method | |
KR20090081200A (en) | Security system for internet site and method thereof | |
CN108563934B (en) | Fingerprint unlocking method and device | |
US8914895B1 (en) | Managing verification of input data | |
CN108990041B (en) | Method and equipment for setting main card and auxiliary card | |
Jurjens | Code security analysis of a biometric authentication system using automated theorem provers | |
CN107305607B (en) | One kind preventing the independently operated method and apparatus of backstage rogue program | |
EP2202661B1 (en) | Apparatus and method for protecting asset in computer system | |
Lv et al. | A software upgrade security analysis method based on program analysis | |
CN115203727A (en) | Neural network training method, device, terminal and storage medium | |
Abendroth et al. | Trusted Computing for Collaboration |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |