Multi-User License Authentication and Validation System to Protect Against Man in the Middle Attack

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 4

Abstract

Multi-user Software Authentication plays a vital role to authenticate and access software’s through online. Multi-user means multiple users are trying to access the software after purchasing through online with specified number of copies. Here copies indicate number of users to install and access the software through online process. In the existing work three tier process is used to authenticate multiple users and to validate users. In the three tier process, first tier is used to enter each user credentials for validation purpose. In the second tier user entered credentials are validated in the Tele- communication medium. After each user validation in the second tier, user registration details are sent to server for final authentication process. In this process each user is authenticated using three tier process which will take time and must posses Tele communication number. Tele communication framework is too expensive to implement. To overcome these problems a new two phase multi-user authentication framework is proposed. In the first phase, multi-user key registration process is proposed to each client registration verification and validation using proposed hash algorithm. In the second phase multi user activation code is verified to access software using proposed hash and encryption algorithm.

Authors and Affiliations

G. Syam Prasad , G. Samuel Vara P rasad Raju

Keywords

Related Articles

Energy Efficient Optimal Multicast Routing Protocol for MANETs

Power-efficient multicast routing is just one of the essential issues in the subject of mobile ad hoc networks. Multicasting is actually a phrase which means delivering data packets to several mobile nodes from an projec...

Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction

Machine Learning (ML) approaches have a great impact in fault prediction. Demand for producing quality assured software in an organization has been rapidly increased during the last few years. This leads to increase in d...

A Novel Technique in Cryptography for Data Hiding i n Digital Images

Visual cryptography [1],[6] an emerging technology used in the purpose of data hiding and other specific purposes, uses the characteristics of normal encryption[13] and decryption levels of many digital images. Generally...

Database Based Validation of Union of Two Multigranular Rough Sets

Most of the traditional tools for undertaking modeling, reasoning and other computing are found not only crisp but also highly deterministic and more precise in character which usually limits their applicability in real...

Error Resilient Schemes for Region of Interest based Video Coding

In video applications, not all regions of a particular frame are of equal importance. There are one or more regions in a video frame that have higher importance than the rest of the frame. In medical videos, only part of...

Download PDF file
  • EP ID EP110430
  • DOI -
  • Views 100
  • Downloads 0

How To Cite

G. Syam Prasad, G. Samuel Vara P rasad Raju (2014). Multi-User License Authentication and Validation System to Protect Against Man in the Middle Attack. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(4), 169-174. https://europub.co.uk/articles/-A-110430