Cipher key distribution system effectively preventing illegitimate use
and charging of enciphered information
    1.
    发明授权
    Cipher key distribution system effectively preventing illegitimate use and charging of enciphered information 失效
    密钥分发系统有效防止加密信息的非法使用和收费

    公开(公告)号:US5651066A

    公开(公告)日:1997-07-22

    申请号:US431407

    申请日:1995-04-28

    CPC classification number: H04L9/083 H04L2209/08 H04L2209/56

    Abstract: A method and a system for cipher key distribution realizing an effective prevention of the illegitimate use and the illegitimate charging. A key request signal containing a first random number generated at each user terminal is transmitted from each user terminal to the key center, so as to indicate the cipher key required at each user terminal to the key center, and a terminal check signal containing a second random number generated at the key center is transmitted from the key center to each user terminal. Then, a terminal response signal containing the second random number and a value based on the first random number obtained according to the first random number generated at each user terminal and the second random number contained in the terminal check signal is transmitted from each user terminal to the key center, and the second random number and the value based on the first random number contained in the terminal response signal are checked at the key center, according to the second random number generated at the key center and the first random number contained in the key request signal, so as to confirm a legitimacy of an access from each user terminal. Then, a key distribution signal containing the cipher key requested by the key request signal is transmitted from the key center to each user terminal, only when the legitimacy of the access from each user terminal is confirmed.

    Abstract translation: 一种密钥分发方法和系统,有效防止非法使用和非法收费。 包含在每个用户终端产生的第一随机数的密钥请求信号从每个用户终端发送到密钥中心,以便指示每个用户终端对密钥中心所需的密码密钥,以及一个包含第二个密钥的终端检查信号 在密钥中心产生的随机数从密钥中心发送给每个用户终端。 然后,从每个用户终端发送包含第二随机数的终端响应信号和根据在每个用户终端处生成的第一随机数获得的第一随机数和终端检查信号中包含的第二随机数的值, 根据在键中心产生的第二随机数和包含在第一随机数中的第一随机数,在密钥中心检查基站中心和第二随机数以及基于终端响应信号中包含的第一随机数的值。 密钥请求信号,以便确认每个用户终端的访问的合法性。 然后,仅当从每个用户终端的访问的合法性得到确认时,将包含由密钥请求信号请求的密码密钥的密钥分发信号从密钥中心发送到每个用户终端。

    Software analysis protection method for changing the software pattern on
the memory of a user terminal
    2.
    发明授权
    Software analysis protection method for changing the software pattern on the memory of a user terminal 失效
    软件分析保护方法,用于更改用户终端内存上的软件模式

    公开(公告)号:US5699512A

    公开(公告)日:1997-12-16

    申请号:US431305

    申请日:1995-04-28

    CPC classification number: G06F21/14

    Abstract: A software analysis protection method capable of preventing an illegitimate use of a software reliably, by making a software analysis difficult without complicating or enciphering the software itself. Software parts dividing the software to be used at the user terminal are distributedly stored in the user terminal and the center, and the software parts stored in the center are transmitted to the user terminal and loaded into missing parts among the software parts stored in the user terminal on a memory so as to make the software operable at the user terminal. Then, the software as developed on the memory is operated at the user terminal. The software parts are down-loaded from the center to the user terminal such that an arranged pattern of the software as developed on the memory is changed at each time of a use of the software at the user terminal.

    Abstract translation: 一种软件分析保护方法,能够通过软件分析难以可靠地防止非法使用软件,而不会使软件本身复杂化或加密。 将在用户终端中使用的软件划分的软件部件被分布式存储在用户终端和中心,并且存储在中心的软件部分被发送到用户终端并且被加载到存储在用户中的软件部分中的缺失部分 终端在存储器上,以使软件在用户终端可操作。 然后,在用户终端上操作在存储器上开发的软件。 软件部分从中心下载到用户终端,使得在用户终端上使用软件的每个时间改变在存储器上开发的软件的排列模式。

Patent Agency Ranking