Multi-User License Authentication and Validation System to Protect Against Man in the Middle Attack
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 4
Abstract
Multi-user Software Authentication plays a vital role to authenticate and access software’s through online. Multi-user means multiple users are trying to access the software after purchasing through online with specified number of copies. Here copies indicate number of users to install and access the software through online process. In the existing work three tier process is used to authenticate multiple users and to validate users. In the three tier process, first tier is used to enter each user credentials for validation purpose. In the second tier user entered credentials are validated in the Tele- communication medium. After each user validation in the second tier, user registration details are sent to server for final authentication process. In this process each user is authenticated using three tier process which will take time and must posses Tele communication number. Tele communication framework is too expensive to implement. To overcome these problems a new two phase multi-user authentication framework is proposed. In the first phase, multi-user key registration process is proposed to each client registration verification and validation using proposed hash algorithm. In the second phase multi user activation code is verified to access software using proposed hash and encryption algorithm.
Authors and Affiliations
G. Syam Prasad , G. Samuel Vara P rasad Raju
Energy Efficient Optimal Multicast Routing Protocol for MANETs
Power-efficient multicast routing is just one of the essential issues in the subject of mobile ad hoc networks. Multicasting is actually a phrase which means delivering data packets to several mobile nodes from an projec...
Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction
Machine Learning (ML) approaches have a great impact in fault prediction. Demand for producing quality assured software in an organization has been rapidly increased during the last few years. This leads to increase in d...
A Novel Technique in Cryptography for Data Hiding i n Digital Images
Visual cryptography [1],[6] an emerging technology used in the purpose of data hiding and other specific purposes, uses the characteristics of normal encryption[13] and decryption levels of many digital images. Generally...
Database Based Validation of Union of Two Multigranular Rough Sets
Most of the traditional tools for undertaking modeling, reasoning and other computing are found not only crisp but also highly deterministic and more precise in character which usually limits their applicability in real...
Error Resilient Schemes for Region of Interest based Video Coding
In video applications, not all regions of a particular frame are of equal importance. There are one or more regions in a video frame that have higher importance than the rest of the frame. In medical videos, only part of...