Multi-User License Authentication and Validation System to Protect Against Man in the Middle Attack
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 4
Abstract
Multi-user Software Authentication plays a vital role to authenticate and access software’s through online. Multi-user means multiple users are trying to access the software after purchasing through online with specified number of copies. Here copies indicate number of users to install and access the software through online process. In the existing work three tier process is used to authenticate multiple users and to validate users. In the three tier process, first tier is used to enter each user credentials for validation purpose. In the second tier user entered credentials are validated in the Tele- communication medium. After each user validation in the second tier, user registration details are sent to server for final authentication process. In this process each user is authenticated using three tier process which will take time and must posses Tele communication number. Tele communication framework is too expensive to implement. To overcome these problems a new two phase multi-user authentication framework is proposed. In the first phase, multi-user key registration process is proposed to each client registration verification and validation using proposed hash algorithm. In the second phase multi user activation code is verified to access software using proposed hash and encryption algorithm.
Authors and Affiliations
G. Syam Prasad , G. Samuel Vara P rasad Raju
A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting
One of the key security threats on the Internet are the compromised machines that can be used to launch various security attacks such as spamming and spreading malware, accessing useful information and DDoS. Attackers fo...
Classification of Diabetes Mellitus using Modified Particle Swarm Optimization and Least Squares Support Vector Machine
Diabetes Mellitus is a major health problem all over the world. Many classification algorithms have been applied for its diagnoses and treatment. In this paper, a hybrid algorithm of Modified-Particle Swarm Optimization...
Adaptive Mobile Video Streaming and Efficient Social Video Sharing in Cloud
The mobile phones grow to be an essential part of our everyday life, with smart phone sales at present greater than before very much and also user demands to run lots of applications have enhanced. The victory of next in...
A Study of Local Binary Pattern Method for Facial Expression Detection
Face detection is a basic task for expression recognition. The reliability of face detection & face recognition approach has a major role on the performance and usability of the entire system. There are several ways...
Analysis on the Performance of Wireless Protocols
In this paper by concentrating on various wireless technologies like Bluetooth (802.15.1),Ultra wide band (802.15.3) ,ZigBee (802.15.4) and Wi-Fi(802.11),their performance was analyzed based on the are a of coverage and...