Multi-User License Authentication and Validation System to Protect Against Man in the Middle Attack

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 4

Abstract

Multi-user Software Authentication plays a vital role to authenticate and access software’s through online. Multi-user means multiple users are trying to access the software after purchasing through online with specified number of copies. Here copies indicate number of users to install and access the software through online process. In the existing work three tier process is used to authenticate multiple users and to validate users. In the three tier process, first tier is used to enter each user credentials for validation purpose. In the second tier user entered credentials are validated in the Tele- communication medium. After each user validation in the second tier, user registration details are sent to server for final authentication process. In this process each user is authenticated using three tier process which will take time and must posses Tele communication number. Tele communication framework is too expensive to implement. To overcome these problems a new two phase multi-user authentication framework is proposed. In the first phase, multi-user key registration process is proposed to each client registration verification and validation using proposed hash algorithm. In the second phase multi user activation code is verified to access software using proposed hash and encryption algorithm.

Authors and Affiliations

G. Syam Prasad , G. Samuel Vara P rasad Raju

Keywords

Related Articles

Tight Bounds on SINR with ZFBF and Feedback

The concept of Multiple Input Multiple Output (MIMO) is an advanced one in the field of wireless communications. The main objective behind the MIMO is providing high data rates to multiple users at a time. MIMO also aims...

Enhancing Rural Development in Tamilnadu through ICT: An Evaluation of Latest Technologies in the scheme MGNREGS

When e-governance indicates better governance, naturally, rural development becomes an essential part of it. It is so because developing countries like India depend on the villages and their welfare. Keeping this in mind...

Survey Paper for Maximization of Profit in Cloud Computing

The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. Today, it have the ability to utilize scalable, distributed computing environments within the confines...

A Review on Impersonation Attack in Mobile Ad-Hoc Network

An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration....

WiFiPos: An In/Out-Door Positioning Tool

Geographical location solutions have a wide diversity of applications, ranging from emergency services to access to tourist and entertainment services. GPS (Global Positioning System) is the most widely used system for o...

Download PDF file
  • EP ID EP110430
  • DOI -
  • Views 114
  • Downloads 0

How To Cite

G. Syam Prasad, G. Samuel Vara P rasad Raju (2014). Multi-User License Authentication and Validation System to Protect Against Man in the Middle Attack. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(4), 169-174. https://www.europub.co.uk/articles/-A-110430