Multi-User License Authentication and Validation System to Protect Against Man in the Middle Attack
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 4
Abstract
Multi-user Software Authentication plays a vital role to authenticate and access software’s through online. Multi-user means multiple users are trying to access the software after purchasing through online with specified number of copies. Here copies indicate number of users to install and access the software through online process. In the existing work three tier process is used to authenticate multiple users and to validate users. In the three tier process, first tier is used to enter each user credentials for validation purpose. In the second tier user entered credentials are validated in the Tele- communication medium. After each user validation in the second tier, user registration details are sent to server for final authentication process. In this process each user is authenticated using three tier process which will take time and must posses Tele communication number. Tele communication framework is too expensive to implement. To overcome these problems a new two phase multi-user authentication framework is proposed. In the first phase, multi-user key registration process is proposed to each client registration verification and validation using proposed hash algorithm. In the second phase multi user activation code is verified to access software using proposed hash and encryption algorithm.
Authors and Affiliations
G. Syam Prasad , G. Samuel Vara P rasad Raju
J48 Classifier Approach to Detect Characteristic of Bt Cotton base on Soil Micro Nutrient
Agriculture is an emerging research field that is experiencing a constant development. In agriculture area problem of efficient knowledge exploitation and acquisition is very popular. In agriculture decision making proce...
Survey Paper for Maximization of Profit in Cloud Computing
The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. Today, it have the ability to utilize scalable, distributed computing environments within the confines...
IPv4 Mobility Support
Mobile computing offers mobile users anytime, anywhere bi-directional reliable access to the Internet. Mobile IP as a network layer routing protocol has been designed by the IETF (Internet Engineering Task Force) to prov...
LWRP: Low Power Consumption Weighting Replacement Policy using Buffer Memory
As the performance gap between memory and processors has increased, then it leads to the poor performance. Efficient virtual memory can overcome this problem. And the efficiency of virtual memory depends on the replaceme...
A Survey on an Effective Defense Mechanism against Reactive Jamming Attacks in WSN
A Wireless Sensor Network (WSN) is a self-configure network of sensor nodes communicate among themselves using radio signals and deployed in quantity to sense, monitor and to understand the physical world. A jammer is an...