A New Scheme for Minimizing Software Piracy using Combination of Smart Card and Physical Attribute with applied Crypto System
J. Swapna Priya1, Sk. Abdul Kareem2, M. Gargi3
1J. Swapna Priya, Assistant Professor in Department of Information Technology, Vignan’s Lara Institute of Technology and Science, Vadlamudi, Guntur..
2Sk. Abdul Kareem, Assistant Professor in Department of Information Technology, Vignan’s Lara Institute of Technology and Science, Vadlamudi, Guntur.
3M. Gargi, Asst.Professor under Computer Science and Engineering Department in Vignan’s Lara Institute of Technology and Science, Vadlamudi.
Manuscript received on November 01, 2012. | Revised Manuscript received on November 02, 2012. | Manuscript published on November 05, 2012. | PP: 62-67 | Volume-2 Issue-5, November 2012. | Retrieval Number: E1003102512/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Software Companies make huge effort in developing a software product and licenses it, illegal use of these software products is commonly termed as Software Piracy. It is a difficult problem in Information Technology Industry since inception. Our software distribution channel must be flexible for both the new users and the existing users. The denial of service is the bad effect of the complex methods involved in the security structures. So, we have taken care of the above factor seriously and came up with a unique solution. Secondly, depending on the number of legalized installation, the system of security must be flexible, this we have addressed in the paper. A smart card and physical token address combination produces the unique identification carries to a back end process which builds an extremely flexible and robust solution in software piracy eradication. This paper presents a robust software protection scheme based on the use of smart cards, physical serializer and cryptographic techniques.
Keywords: Software protection, smart cards, cryptography, information commerce.