New Online Modules Model of Software Copy Protection in Serial-Based Method
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 8
Abstract
One of the most significant concerns of software corporations is protect their products against unauthorized copying. Since now the researchers proposed some copy protection models that all of them have weakness to protect against unauthorized copying. The goal of this paper is propose novel model of serial-based method that more security against illegal usage and offered Online Modules model,in serial-based method that it spilt the software to two parts as well. Fist part run in client and second part run in web service,when the software needs to use the second part then the software connect to the web service and the server check the software license. If the license has been valid then run the second part. This model compares with online activation model in serial-based method and we will show the proposed model has more secure against unauthorized copying .
Authors and Affiliations
Bhawana Parihar , Neha Bora
On Q-Fuzzy Normal Subgroups
In this paper, we introduce the concept of Q-fuzzy normal group and Q-fuzzy left ( right) cosets and discussed some of its properties.
Redundancy Efficient Crosstalk Avoidance Scheme in VLSI Circuits
In deep sub micrometer design interconnect delay has become a major factor. Crosstalk is highly evident in deep sub micrometer design. Crosstalk depends on different data patterns that are transmitted on the bus. For the...
Effect of Couple Stress Fluid on Peristaltic Motion in a Uniform and Non-Uniform Annulus
Peristalsis is now well known to physiologists to be one of the major mechanisms for fluid transport in many biological systems. In particular, a mechanism may be involved in swallowing food through the esophagus, in uri...
Image Steganography Using Dynamic LSB with Blowfish Algorithm
The past few years have seen an increasing interest in using images as cover media for Steganography communication.The basic structure of Steganography is made up of three components: cover image, message, and the...
Mathematical Analysis of the Control of the Spread of Infectious Disease in a Prey-Predator Ecosystem
We present a model for the mathematical analysis of the control of the spread of an infectious disease in a predator-prey ecosystem. In this work, we present a compartmental mathematical model expressed by a sy...