Multi-User License Authentication and Validation System to Protect Against Man in the Middle Attack
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 4
Abstract
Multi-user Software Authentication plays a vital role to authenticate and access software’s through online. Multi-user means multiple users are trying to access the software after purchasing through online with specified number of copies. Here copies indicate number of users to install and access the software through online process. In the existing work three tier process is used to authenticate multiple users and to validate users. In the three tier process, first tier is used to enter each user credentials for validation purpose. In the second tier user entered credentials are validated in the Tele- communication medium. After each user validation in the second tier, user registration details are sent to server for final authentication process. In this process each user is authenticated using three tier process which will take time and must posses Tele communication number. Tele communication framework is too expensive to implement. To overcome these problems a new two phase multi-user authentication framework is proposed. In the first phase, multi-user key registration process is proposed to each client registration verification and validation using proposed hash algorithm. In the second phase multi user activation code is verified to access software using proposed hash and encryption algorithm.
Authors and Affiliations
G. Syam Prasad , G. Samuel Vara P rasad Raju
Tight Bounds on SINR with ZFBF and Feedback
The concept of Multiple Input Multiple Output (MIMO) is an advanced one in the field of wireless communications. The main objective behind the MIMO is providing high data rates to multiple users at a time. MIMO also aims...
Enhancing Rural Development in Tamilnadu through ICT: An Evaluation of Latest Technologies in the scheme MGNREGS
When e-governance indicates better governance, naturally, rural development becomes an essential part of it. It is so because developing countries like India depend on the villages and their welfare. Keeping this in mind...
Survey Paper for Maximization of Profit in Cloud Computing
The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. Today, it have the ability to utilize scalable, distributed computing environments within the confines...
A Review on Impersonation Attack in Mobile Ad-Hoc Network
An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration....
WiFiPos: An In/Out-Door Positioning Tool
Geographical location solutions have a wide diversity of applications, ranging from emergency services to access to tourist and entertainment services. GPS (Global Positioning System) is the most widely used system for o...