{"title":"Remote authentication of software based on machine's fingerprint","authors":"Dinghua He","doi":"10.1109/ICSESS.2012.6269524","DOIUrl":null,"url":null,"abstract":"Machine's fingerprint and encryption technique could be used to conduct remote register authentication of software to prevent unauthorized use. First of all, as fingerprint of machine fulfills the goal of one code for one machine, it can cut the loss caused by disclosure of register codes. Secondly, the introduction of encryption technique can prevent illegal interception of register code and fingerprint of machine. What's more, remote-register of software is beneficial for large scale distribution. It has been proved practically that this method could safeguard legal rights of developer efficiently.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Conference on Computer Science and Automation Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS.2012.6269524","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Machine's fingerprint and encryption technique could be used to conduct remote register authentication of software to prevent unauthorized use. First of all, as fingerprint of machine fulfills the goal of one code for one machine, it can cut the loss caused by disclosure of register codes. Secondly, the introduction of encryption technique can prevent illegal interception of register code and fingerprint of machine. What's more, remote-register of software is beneficial for large scale distribution. It has been proved practically that this method could safeguard legal rights of developer efficiently.