International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124 | Views: 267

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014 | Popularity: 6.2 / 10


     

Generic Method for Prevention of Software Piracy

Nadeem Sajjad, Rohit Maheshwari


Abstract: Software piracy has been major issue for software industries. They have to pay a very large amount to protect their applications. There are several insurance schemes for the protection of software. But they all are very costly and provide services for a limited period of time. This paper will demonstrate a protector tool which can be developed in any platform very easily so that the vendor can protect the software not only for being pirated but also capable of limited period expiration of software. This strategy will provide easy and low cost protection which is more effective than MAC address authentication. This tool is very useful for desktop applications which use internet for their internal working, as it provides server based authentication, but is also feasible for those applications that do not use internet as it has client side authentication also.


Keywords: Hardware Based Authentication, SMS Authentication, Software Piracy, Software Protection, Low Cost Software Protection


Edition: Volume 3 Issue 8, August 2014


Pages: 220 - 223



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Nadeem Sajjad, Rohit Maheshwari, "Generic Method for Prevention of Software Piracy", International Journal of Science and Research (IJSR), Volume 3 Issue 8, August 2014, pp. 220-223, URL: https://www.ijsr.net/getabstract.php?paperid=2015272, DOI: https://www.doi.org/10.21275/2015272



Downloads: 656 | Views: 2004

Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj


Downloads: 401 | Views: 720

Computer Science & Engineering, India, Volume 7 Issue 11, November 2018

Pages: 1951 - 1955

Hadoop Performance Improvement using Metadata and Securing with Oauth Token

Swapnali A. Salunkhe, Amol B. Rajmane


Downloads: 386 | Views: 701

Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.


Downloads: 354 | Views: 700

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Downloads: 336 | Views: 689

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2148 - 2152

The Impact and Application of 3D Printing Technology

Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera


Top