SECURITY CONTROL METHOD FOR DATA TRANSMISSION PROCESS OF SOFTWARE PROTECTION APPARATUS AND APPARATUS THEREOF
First Claim
1. A security control method for a data transmission process between a software protection apparatus and a computer, wherein data is transmitted in a cipher-text form between the computer running protected software and the software protection apparatus, and the method comprises the steps of:
- 1) encrypting or/and scrambling data or a command to be sent and generating the cipher text at a data sending end;
2) transmitting the cipher text;
3) decrypting or/and descrambling the received cipher text and generating a plain text or command at a data receiving end; and
4) performing a predetermined operation on the plain text or command.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a secure transmission method and apparatus, particularly to a security control method for a data transmission process and a software protection apparatus using the same, where data transmitted between a computer running protected software and the software protection apparatus is in a cipher-text form, and thus a plain text does not appear in a communication line during the whole process. Moreover, since a random number is involved for scrambling and the data is encrypted, hence commands sent from the protected software to and those returned from the software protection apparatus change constantly even when the same command is sent from the sending end. In this way, it will be more difficult for a cracker to crack, thus securing the transmission of private confidential data.
15 Citations
13 Claims
-
1. A security control method for a data transmission process between a software protection apparatus and a computer, wherein data is transmitted in a cipher-text form between the computer running protected software and the software protection apparatus, and the method comprises the steps of:
-
1) encrypting or/and scrambling data or a command to be sent and generating the cipher text at a data sending end; 2) transmitting the cipher text; 3) decrypting or/and descrambling the received cipher text and generating a plain text or command at a data receiving end; and 4) performing a predetermined operation on the plain text or command. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification