Friday 26th of April 2024
 

Dynamic Matrices from Hardware Fingerprint and Its Application in Software Copyright Protection


Ning Huang

This paper presents a scheme of software copyright protection based on dynamic matrices from hardware fingerprint and user\'s information. It is mainly as follows. (1)Introduces the basic idea of software copyright protection; (2)Introduces the alphabetic operation of field F37; (3)Uses hardware fingerprint and user\'s information to create dynamic matrices to design an affine mapping of F37 to generate a registration code; (4) Uses the invert mapping to verify a registration code. (5)Gives concrete examples. Data and keys are used in a way to prevent sharing registration code with any other computer. The text submitted to the vendor by the user is not the source plaintext for the registration code. Real plaintext is hidden in the software, unknown to the outsiders. It is deceptive to possible adversaries. Attacks for a legal registration code from the submitted text will not success. Experimental results and analysis illustrate the algorithm viable and secure.

Keywords: Copyright, Fingerprint, Matrices, Protection, Software, Registration

Download Full-Text


ABOUT THE AUTHOR

Ning Huang
Ning Huang, born in 1958, received Master\'s degree in applied mathematics and computer science from Jiangxi University, China in 1991, awarded senior engineer of the Industrial and Commercial Bank of China in 2001. He is now with Center of Modern Educational Technology, Gannan Normal University, Ganzhou, China,as an associate professor. His research interests include information security and digital campus.


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »