SOFTWARE PROTECTION METHOD AND SYSTEM THEREOF

    公开(公告)号:US20210374254A1

    公开(公告)日:2021-12-02

    申请号:US17022057

    申请日:2020-09-15

    Abstract: A software protection method includes decrypting an encrypted executable file by a processor, and the steps of decrypting include the following steps. A linking instruction is executed in a first execution environment; based on the linking instruction, a signature corresponding to the encrypted executable file is generated in the first execution environment; based on the signature and a hash table, a decryption algorithm is performed and a key is generated in the first execution environment; and the key is transmitted from the first execution environment to a second execution environment that is different from the first execution environment. The encrypted executable file is in the second execution environment. A software protection system is also disclosed herein.

    DATA TRANSMISSION SYSTEM WITH SECURITY MECHANISM AND METHOD THEREOF

    公开(公告)号:US20190182045A1

    公开(公告)日:2019-06-13

    申请号:US16218507

    申请日:2018-12-13

    Abstract: A transmission system includes a first security unit coupling to application ends, a second security unit coupling to a user end, and a server. The server sends a first attribute key to the first security unit based on attributes of the application ends and sends a second attribute key to the second security unit based on attributes of the user end. To enable one application end, the first security unit encrypts a session key with the first attribute key, opens a socket, and sends the encrypted session key to the server. When the second security unit receives a request for the application end, the server sends the encrypted session key to the second security unit. The second security unit decrypts the encrypted session key with the second attribute key and connects to the socket. The second security unit interchanges information with the first security unit via the session key.

Patent Agency Ranking