USB-Privacy: Security To Software Using USB

Authors

  • Hemangi R. Patil Dept. of Computer, Datta Meghe College of Engineering, Airoli, Navi Mumbai
  • Snehal A. Nawale Dept. of Computer, Datta Meghe College of Engineering, Airoli, Navi Mumbai
  • Jayshree R. Sanap Dept. of Computer, Datta Meghe College of Engineering, Airoli, Navi Mumbai
  • Chandrashekhar M. Raut Dept. of Computer, Datta Meghe College of Engineering, Airoli, Navi Mumbai

Keywords:

USB (Universal Serial Bus), Machine Specific, Dongle, Piracy, Vendor

Abstract

The general way of providing a security to any software or application, is, a key verification. If we share this key and try to use the software on different machines. . We can create the copies of the software. This is basically known as a `piracy`. To prevent such a illegal activities, there are many security applications present in the market nowadays. But piracy prevention can be achieved by simply making it machine specific. The software is provided with USB-drive which is when connected check for the valid machine and allow using the software only on the valid machine. This paper will explain the concept in detail.

 

References

Cryptographic primitives. “handbook of applied cryptography” by menezes

Modern cryptosystems .Jwezy Wojdylo.September 21, 2001.Cryptography, jerzy wojdylo, 9/21/01. Overview of Classical cryptography.

Public-key cryptography processor, ieee j.Solid-state cir-cuits, vol. …Rsa and ecc Crypto processor.”

Kryptonite-A Programmable Crypto processor

Paul C. Van Oorschot Alfred J. Menezes and Scott A.Vanstone,Handbook of applied cryptography, CRC presses Inc., Florida, 1996.

Bruce schneier, applied cryptography (2nd ed.), johnwiley and sons, inc., New York, 1996.

Downloads

Published

2017-08-30

How to Cite

[1]
H. R. Patil, S. A. Nawale, J. R. Sanap, and C. M. Raut, “USB-Privacy: Security To Software Using USB”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 5, no. 4, pp. 70–72, Aug. 2017.

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.