Knowledge Based Security Using Drm

نویسندگان

  • M. VARUN KUMAR
  • S. RAJESH KUMAR
  • N. VANI
  • S. SWETHA
چکیده

To take precautionary secures to the software is combat work. The analysis of avoiding the unauthorized access to the software will be done by the knowledge based security using Digital Rights Management. DRM is a standard code. The DRM will embed with source code which will protect from piracy. Knowledge based DRM and biometric based DRM are the two methods using in security process. In the proposed system, knowledge based security is given in the software by using DRM. The DRM application is elaborated and set with the questions, based on the relative answers for the desire authoritative information the concept will work. This concept was delivered to the consumer during software sales. Set of general questions will be created and saved in the source code and it will embed with application software. The collection of knowledge based answers will be stored in the created database. Those answers will embedded with the database using DRM. When the user wants to use the software it will ask questions and we need to give correct answers those given answers will match to the database. When it matches with the database answers it will permit the user to use software. If it mismatch with the database it will not allow using software. Using this software it will give better secure. Keyword: DRM (Data Rights Management).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity Based Drm System with Total Anonymity and Device Flexibility Using Ibes

Most of the Digital Rights Management (DRM) systems fail to cover all requirements like user anonymity, user fairness, security and others. Device based DRM systems, adopted by most providers, lack user fairness and mostly follow proprietary formats. On the contrary, Smart Card DRM systems satisfy user anonymity and fairness, but have certain vulnerabilities, as identified in this paper. We pro...

متن کامل

Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme

We introduce Nuovo DRM, a digital rights management scheme aimed to provide formal and practical security. The scheme is based on a recent DRM scheme, which we formally specify in the μCRL process algebraic language. The original scheme stated the following security requirements: effectiveness, secrecy and resistance of content masquerading. We formalise these security requirements as well as s...

متن کامل

A Flexible and Open DRM Framework

Current DRM implementations rely on obfuscating the inner working of the DRM client. Moreover, the rights to consume content are rather device bound than person bound. We present a first step towards an open DRM framework which is based on the security of its building blocks. The presented framework binds the right to consume content to persons instead of to devices. An extension of the current...

متن کامل

A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management

Digital Rights Management (DRM) is a type of access-control technology that is used by diverse content providers to restrict the use of digital content. Enterprise Digital Rights Management (E-DRM) is an application of DRM techniques for managing the control of access to sensitive documents in an enterprise. In this paper, we propose a group key distribution system for E-DRM based on the concep...

متن کامل

Secure and Privacy-Preserving DRM for Mobile Devices with Web Service Security∗ – An Experience Report –

Preserving the customer’s privacy has to be a major concern when implementing a commercial DRM system. In [12] a privacy-preserving digital rights management (DRM) architecture based on the widely used Open Mobile Alliance (OMA) DRM [17] specification for mobile devices has been suggested. In this paper the design of a possible implementation of the proposed architecture is explained which uses...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013