Original Publication Date: 2004-Nov-05
Included in the Prior Art Database: 2004-Nov-05
The basis of this disclosure is to use a "check sum" or similar method to allow a system unit to recognise authentic components when installed into the system. If an unapproved or counterfeit component is added, a warning will be flagged to the user or system administrator
There are an increasing number of incidents of counterfeit or non-IBM* approved components being added to IBM PC equipment in the Field. This disclosure is to apply a code check whereby a system unit can recognise and authentic components and warn the user at start up if such a part is present.
This disclosure describes a method of software coding of the system bios to analyse details of components present in the system unit. Authentic components will have an encrypted check sum taken from specific areas of the BIOS recognition data or plug and play data in the hardware, the BIOS will repeat the encryption and compare it to the code stored in the hardware. This or a similar identification/encryption algorithm allowing the component to be recognised as IBM approved could be used. If the component is not IBM approved then a warning is flagged to the user or administrator allowing them to accept the part if it was acquired knowingly. If however the user or administrator has unknowingly acquired a component that is counterfeit or not IBM approved, then the user or administrator can be prompted to take appropriate action to report the incident.
A proprietary security code will be programmed into approved IBM parts using an encryption algorithm during the lBM box manufacturing, FRU, CRU, CSP or Option processes (Note 1). For example a coded check sum of specific data locations from within the BIOS recognition data and/or plug and play information of the part. When the part is first installed (Note 2) into a system unit or the first boot after a BIOS reflash, the BIOS will interro...