Paper Title:
A Kind of Copyright Protection Method Based on Computer Fingerprint
  Abstract

This paper advances a kind of method based on binding of computer Fingerprint and Related registration information of software, it can encapsulate digital content with encryption algorithm in order to authenticating the legal registered users by employing authentication technology and plug-in technology on the base of cooperation of Server and Client. The method of realizing the collection of machine fingerprint by using interruption technology is explained in detail and the encryption algorithm adopted is described detailedly.

  Info
Periodical
Advanced Materials Research (Volumes 181-182)
Edited by
Qi Luo and Yuanzhi Wang
Pages
825-829
DOI
10.4028/www.scientific.net/AMR.181-182.825
Citation
M. S. Li, "A Kind of Copyright Protection Method Based on Computer Fingerprint", Advanced Materials Research, Vols. 181-182, pp. 825-829, 2011
Online since
January 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Chun Jiang Pang
Chapter 5: Information Processing and Computational Science
Abstract:This paper analyzes a sort of color still image algorithm based on the Logistic map sorting, and verifies the confidentiality. Further, this...
850
Authors: Ai Ping Deng, Ben Xiao
Chapter 6: Algorithm Design
Abstract:It urgently needs to solve the information security issues of RFID system at present. In order to increase the security of RFID Secure...
1695
Authors: Chun Ying Gu, Rui Ying Fang
Chapter 6: Communication and Network
Abstract:Currently, Email is one of the most popular applications in people’s life. A secure email requires that the email system can provide...
1075
Authors: Jun Feng Wang, Shan Wang, Yu Hong Liu
Chapter 5: Algorithm Design and Applications
Abstract:The double-byte character asymmetric encryption is always the difficult problem in information encryption technology, to choose algorithm not...
1518
Authors: Wang Bin, Chong Ran Jiang, Jing Li
Chapter 3: Network and Computer Technology. Applied Methods of Computing
Abstract:The paper designs a hard disk encryption system with pure software realization, the system uses the Windows driver development technology,...
172