-
公开(公告)号:US20210374254A1
公开(公告)日:2021-12-02
申请号:US17022057
申请日:2020-09-15
Applicant: DELTA ELECTRONICS, INC.
Inventor: Hao-Chieh CHANG , Chia-Lin LIU , Wan-Sheng NI
Abstract: A software protection method includes decrypting an encrypted executable file by a processor, and the steps of decrypting include the following steps. A linking instruction is executed in a first execution environment; based on the linking instruction, a signature corresponding to the encrypted executable file is generated in the first execution environment; based on the signature and a hash table, a decryption algorithm is performed and a key is generated in the first execution environment; and the key is transmitted from the first execution environment to a second execution environment that is different from the first execution environment. The encrypted executable file is in the second execution environment. A software protection system is also disclosed herein.
-
公开(公告)号:US20190182045A1
公开(公告)日:2019-06-13
申请号:US16218507
申请日:2018-12-13
Applicant: DELTA ELECTRONICS, INC.
Inventor: Wan-Sheng NI , Wen-Yu CHUANG , Hao-Chieh CHANG , Edwin Lupito LOE
Abstract: A transmission system includes a first security unit coupling to application ends, a second security unit coupling to a user end, and a server. The server sends a first attribute key to the first security unit based on attributes of the application ends and sends a second attribute key to the second security unit based on attributes of the user end. To enable one application end, the first security unit encrypts a session key with the first attribute key, opens a socket, and sends the encrypted session key to the server. When the second security unit receives a request for the application end, the server sends the encrypted session key to the second security unit. The second security unit decrypts the encrypted session key with the second attribute key and connects to the socket. The second security unit interchanges information with the first security unit via the session key.
-