SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
License Generator Using MAC Address for Industrial Application
Prof. Ruchi Rautela1, Mr. Rahul Parandwal2, Mr. Pankaj Upadhyay3
Professor, Dept. of MCA, Vivekanand Education Society’s Institute of Technology, Mumbai, India 1
PG Student, Dept. of MCA, NCRD’s Sterling Institute of Management Studies, Navi Mumbai, India2 PG
Student, Dept. of MCA, Vivekanand Education Society’s Institute of Technology, Mumbai, India3
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - A license generator can be developed to
generate particular license key for the legal users as a way
of protecting their application from being used illegally
(i.e. pirated). A license generator generates unique
number or encryption key that identify the legal user of
software application. The generated basic license key is
used for the particular program and advance key is used
for the subprogram and option which is selected by the
user. It also help to generate license key for a particular
time period. License generator using mac address and
time code key will provide more security for the
application and avoid piracy.
Key Words: MAC address, Time Code, Encryption,
Decryption, Basic Key and Advance Key.
1. INTRODUCTION
To stop the illegal usage of software application,
company always tries to create unique serial key or
product key for particular application but hackers
crack this serial key through some auto generated
program. To solve the above problem of hacking or
illegal usage, it is required to create license key that
will help to be unique for each user and also this
license key will be associated with the selected
program.
This application is protected with a serial number key.
If you type it in, the software verifies it algorithmically,
rather than looking up a huge database. A license key is
a specific software-based key for a particular program.
It certifies that the copy of the program is original.
License generator protect software from losses due to
software piracy and enable end-user organizations to
comply with software license agreements. The
primary benefit of this License generator is to reduce
the difficulty and increase operational transparency
in order to prevent software misuse [4].
2. LITERATURE SURVEY
Previous work done: Serialization was used with the
help of Data Output Stream, & Data Input Stream that
saves the data content of your objects as simple types
and creates License File. Serialization had to capture
entire “graphs” of interconnected objects and put them
back together on the receiving end but if there is any
problem in serialization process then the original data
content cannot be obtained (Decrypted). It was done in
VB, which provides powerful mechanism for
Serialization. It creates License File by serialization and
store it in Objects and it does not contain Database [1].
Thus this paper overcomes the problem by providing-
1) Uniquely generated Basic Key.
2) Uniquely generated Advance Key.
3) Uniquely generated Time code Key for
particular time period.
4) It is done in C# and uses AES instead of
Serialization.
5) It stores the data contents in Database.
3.0 PROCESS TO ENCRYPT APPLICATION
3.1 Basic License Key:
license generates a key by entering MAC Address &
program mask for the particular program. User
This sequence is typically entered by the user during
the operation of program, and is then passed to a
verification function in the program. This function
manipulates the key sequence according to a
mathematical algorithm and attempts to match the
results to a set of valid solutions [4].
selects type of License (Limited, Unlimited) and
generate encryption key over two conditions:
1) If user select Limited type then license key is
generate for limited period
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2930
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
2) If user select unlimited type then license key is
generate for unlimited Period.
Generate License on MAC address and
performed operation to make license key. The
Basic License key entered it accessible for user
to use the selected Program.
Algorithm for Basic License Encryption
Start
Accept mac address and mask of particular
Result = (program mask XOR mac address) and
append with mac address
Select license type mask (limited, unlimited, online)
If license type is
equals unlimited
False
Limited
True
License type XOR with
mac address and
append with the result
and convert into
Select start date, hexadecimal form end
date and
combine the result
and XOR with mac
License type XOR with
mac address and append
Convert result into with the result and convert
into hexadecimal formhexadecimal format
and generate time
Generate basic license
3.2 Advance License Key :
Advance License key is generated after Basic License
Key is created. Advance License key is generated for
Sub-Programs and Options whereas Basic License
key is only for Programs. User able to select multiple
sub program or options within a particular program.
For every selected Sub-Program, generate Advance
License key for the security of Software Application.
If user enters Advance License Key then user is able
to do operation on selected subprogram and option.
Algorithm for Advance License Encryption
start
Accept basic license key
Select sub-program and option by user and
accept subprogram mask
Result = (sub program mask XOR basic address) and
convert result into hexadecimal format
Generate advance license key
End
3.3 Time Code license key :
Time Code generator is use when the selected License
Type is Limited. Time Code is accepting different Mask
for different License type in the Application i.e. Limited,
Unlimited. After selecting Limited License type it will
asks the Start Date & End Date for a particular time
period. On clicking Generate Time Code, a unique Time
Code Key is generated.
End
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2931
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
Algorithm for Time Code Key Encryption
Start
Initialize day, month, and year and
store it in result
Enter start date, end date and combine
the result
Result XOR with mac address
Convert the result into
hexadecimal form and generate
time code key
False
Basic license key
is equals to new
generated license
Invalid True
key
Activation successful.
End
4.2 Advance License Key :
End
4.0 PROCESS TO DECRYPT APPLICATION
4.1 Basic License Key:
License Decryption is done on the Client’s side. It
asks for the MAC Address and the basic license key of
the program. For activate license user enters the
Basic Key and if the key match the selected Program
license is activated. If License is Limited then user
will have to enter Time Code key and basic key for
activating license.
Algorithm for Basic License Decryption
start
Accept basic license and store it
Obtain mac address and
perform license generation
operation for selected
program
Advance License can be activated only after Basic
License is activated. Advance License is for Sub-
Program & Options and is generated unique key. If
license type is limited then user enter mac address,
basic license key and time code key for particular
program. If user want to activate license for
subprogram or option so need to enter generated
advance license key if the Key matches then the Sub-
Program can be activated. If Key does not match then
the Advance License can’t be activated.
Algorithm for Advance License Decode
start
Accept basic license and advance key
Advance license subprogram XOR
with option mask and store it in result
Compare result with basic license key
False
If match
found
License key is
Trueinvalid
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2932
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
Activate sub program or option
End
4.3 Time Code Key :
The Time Code generated in generation process is
provided to the Client and particular Program or
Sub-Program can be activated.
Algorithm for Time Code Key Decryption
Start
Accept generated time code key for
particular program
Time code key XOR mac
address
False
If date is
valid
Enter a valid True
date
Activate license for time
period
End
5.0 Proposed System
The proposed system facilitates us a strong and
secure online encryption and decryption system.
When application is encrypt the program it
generates license key and combination of basic
key and advance key with some mathematical
operation and able to generate license for
selected program.
Only the programmer can make changes in it to
encryption system. Same as for decrypt data on client
side which is easy to decrypt the generated license
key and able to do activate particular program who is
authorized user.
ENCRYPTION:
EncryptedData Program Encrypti
Data (Basic
Mask
o
n
Key)
Sub Encrypted
Encryptiprogram Key
mask on
(Advance
Option
Mask
Block diagram of Data Encryption
DECRYPTION:
Encrypted Decryption Program Data
Data Mask
(Basic
Key)
Encrypted
Key Decryption Sub-Program
(Advance mask
Key)
Option
Mask
Block diagram of Data Decryption
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2934
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
Algorithm for Proposed System:
AES is a new algorithm which can be used to
protect data. The same generated license key is
used by the symmetric-key which helps to encrypt
and decrypt data.
Encryption:
Step1: accept the program mask, data and
generate basic key.
Step2: accept subprogram mask, option, and data
and generate advance key.
Decryption: Fig 2 Generate Advance License Key
Step1: accept generated basic key and decrypt the
program to activate basic license.
Step2: accept generated basic and advance
symmetric key to decrypt sub program or option
to activate Advance License.
6.0 Result
This figure shows the actual implementation of
generating license key. Fig 1 shows to generate
basic key for program. Fig 2 shows to generate
advance license key for subprogram or option. Fig
3 shows to generate key for time period. Fig 4
shows to activate key for unlimited time. Fig 5
shows to activate key for limited period. Fig 6
Fig 3 Generate Key for particular Time Periodshows to activate sub program. Fig 7 shows to
activate option.
Fig 1Generate Basic License key
Fig 4 Activate license for Unlimited Time
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2935
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
Activation confirmation
Fig 5 Activate license for Limited time
Fig 6 Activate Advance License key for Subprogram
Fig 7 Activate Advance License key for Option
7.0 CONCLUSION
This help to provide more security for the
application. A key generator is used
any cryptographic protocols to generate a
sequence number. This sequence is used as an
encryption key at one end of communication, and
as a decryption key at the other [2]. The Basic
Key & Advance Key cannot be hacked easily as
the keys are generated by Encryption process.
So, it provides security to the product as it stops
illegal usage of the software. This License
Generator primarily focuses on providing ease
and operational transparency to the Client in
order to prevent software misuse. It is user
friendly application [1].
If user select License type i.e. (online) then key
generated over the internet and also decrypt on
server side. License key which generate and it
may verified by within the software itself or, over
the Internet via online license verification system
it provide easiness to the user.
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2936
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
8.0 REFERENCES-
[1]“License File Generator Using MAC Address”
Anirudha A. Kolpyakwar1 , Piyush M. Dhande2 ,
Pallavi A. Chaudhari3
[2]https://security.stackexchange.com/question
s/24 33/license-key-serial-number-generator-
and-checker
[3] https://en.wikipedia.org/wiki/Product_key
[4]http://www.webopedia.com/TERM/L/license_ge
nerator.html
[5] https://en.wikipedia.org/wiki/License_manager
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2937

More Related Content

What's hot

Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2
Cybera Inc
 
SecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password SolutionSecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password Solution
Rafidah Ariffin
 
API SECURITY by krishna murari and vikas maurya
API SECURITY by krishna murari and vikas mauryaAPI SECURITY by krishna murari and vikas maurya
API SECURITY by krishna murari and vikas maurya
Krishna Murari
 

What's hot (19)

Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
Additional license authorizations
Additional license authorizationsAdditional license authorizations
Additional license authorizations
 
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPA countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGP
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass System
 
ToTP
ToTPToTP
ToTP
 
Srs of skype
Srs of skypeSrs of skype
Srs of skype
 
98-381 Dumps Questions
98-381 Dumps Questions98-381 Dumps Questions
98-381 Dumps Questions
 
IRJET- Secure Android Application Development and Security Assessment
IRJET- Secure Android Application Development and Security AssessmentIRJET- Secure Android Application Development and Security Assessment
IRJET- Secure Android Application Development and Security Assessment
 
Online java compiler with security editor
Online java compiler with security editorOnline java compiler with security editor
Online java compiler with security editor
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2
 
SecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password SolutionSecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password Solution
 
Android Based Smart Department
Android Based Smart DepartmentAndroid Based Smart Department
Android Based Smart Department
 
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
API SECURITY by krishna murari and vikas maurya
API SECURITY by krishna murari and vikas mauryaAPI SECURITY by krishna murari and vikas maurya
API SECURITY by krishna murari and vikas maurya
 
Wifi Direct Based Chat And File Transfer Android Application
Wifi Direct Based Chat And File Transfer Android ApplicationWifi Direct Based Chat And File Transfer Android Application
Wifi Direct Based Chat And File Transfer Android Application
 
Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2
 
10 1 otp all
10 1 otp all10 1 otp all
10 1 otp all
 

Similar to License Generator using MAC Address for Industrial Application

Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotection
Himanshu Arora
 
Software design specification
Software design specificationSoftware design specification
Software design specification
SubhashiniSukumar
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
Susmitha Reddy
 

Similar to License Generator using MAC Address for Industrial Application (20)

Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotection
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing Security
 
[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protection[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protection
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
 
Software design specification
Software design specificationSoftware design specification
Software design specification
 
Category Based Application Engine
Category Based Application EngineCategory Based Application Engine
Category Based Application Engine
 
Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
 
Github-Source code management system SRS
Github-Source code management system SRSGithub-Source code management system SRS
Github-Source code management system SRS
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
Cyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netCyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .net
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
Writing RPG Applications Using Cryptographic Services APIs
Writing RPG Applications Using Cryptographic Services APIsWriting RPG Applications Using Cryptographic Services APIs
Writing RPG Applications Using Cryptographic Services APIs
 
IRJET- Build a Secure Web based Code Editor for C Programming Language
IRJET-  	  Build a Secure Web based Code Editor for C Programming LanguageIRJET-  	  Build a Secure Web based Code Editor for C Programming Language
IRJET- Build a Secure Web based Code Editor for C Programming Language
 
ANET SureLog SIEM IntelligentResponse
ANET SureLog  SIEM IntelligentResponseANET SureLog  SIEM IntelligentResponse
ANET SureLog SIEM IntelligentResponse
 
50120140503011
5012014050301150120140503011
50120140503011
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and Secure
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 
Software_Documentation_Trade-D
Software_Documentation_Trade-DSoftware_Documentation_Trade-D
Software_Documentation_Trade-D
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 

License Generator using MAC Address for Industrial Application

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 License Generator Using MAC Address for Industrial Application Prof. Ruchi Rautela1, Mr. Rahul Parandwal2, Mr. Pankaj Upadhyay3 Professor, Dept. of MCA, Vivekanand Education Society’s Institute of Technology, Mumbai, India 1 PG Student, Dept. of MCA, NCRD’s Sterling Institute of Management Studies, Navi Mumbai, India2 PG Student, Dept. of MCA, Vivekanand Education Society’s Institute of Technology, Mumbai, India3 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - A license generator can be developed to generate particular license key for the legal users as a way of protecting their application from being used illegally (i.e. pirated). A license generator generates unique number or encryption key that identify the legal user of software application. The generated basic license key is used for the particular program and advance key is used for the subprogram and option which is selected by the user. It also help to generate license key for a particular time period. License generator using mac address and time code key will provide more security for the application and avoid piracy. Key Words: MAC address, Time Code, Encryption, Decryption, Basic Key and Advance Key. 1. INTRODUCTION To stop the illegal usage of software application, company always tries to create unique serial key or product key for particular application but hackers crack this serial key through some auto generated program. To solve the above problem of hacking or illegal usage, it is required to create license key that will help to be unique for each user and also this license key will be associated with the selected program. This application is protected with a serial number key. If you type it in, the software verifies it algorithmically, rather than looking up a huge database. A license key is a specific software-based key for a particular program. It certifies that the copy of the program is original. License generator protect software from losses due to software piracy and enable end-user organizations to comply with software license agreements. The primary benefit of this License generator is to reduce the difficulty and increase operational transparency in order to prevent software misuse [4]. 2. LITERATURE SURVEY Previous work done: Serialization was used with the help of Data Output Stream, & Data Input Stream that saves the data content of your objects as simple types and creates License File. Serialization had to capture entire “graphs” of interconnected objects and put them back together on the receiving end but if there is any problem in serialization process then the original data content cannot be obtained (Decrypted). It was done in VB, which provides powerful mechanism for Serialization. It creates License File by serialization and store it in Objects and it does not contain Database [1]. Thus this paper overcomes the problem by providing- 1) Uniquely generated Basic Key. 2) Uniquely generated Advance Key. 3) Uniquely generated Time code Key for particular time period. 4) It is done in C# and uses AES instead of Serialization. 5) It stores the data contents in Database. 3.0 PROCESS TO ENCRYPT APPLICATION 3.1 Basic License Key: license generates a key by entering MAC Address & program mask for the particular program. User This sequence is typically entered by the user during the operation of program, and is then passed to a verification function in the program. This function manipulates the key sequence according to a mathematical algorithm and attempts to match the results to a set of valid solutions [4]. selects type of License (Limited, Unlimited) and generate encryption key over two conditions: 1) If user select Limited type then license key is generate for limited period © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2930
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 2) If user select unlimited type then license key is generate for unlimited Period. Generate License on MAC address and performed operation to make license key. The Basic License key entered it accessible for user to use the selected Program. Algorithm for Basic License Encryption Start Accept mac address and mask of particular Result = (program mask XOR mac address) and append with mac address Select license type mask (limited, unlimited, online) If license type is equals unlimited False Limited True License type XOR with mac address and append with the result and convert into Select start date, hexadecimal form end date and combine the result and XOR with mac License type XOR with mac address and append Convert result into with the result and convert into hexadecimal formhexadecimal format and generate time Generate basic license 3.2 Advance License Key : Advance License key is generated after Basic License Key is created. Advance License key is generated for Sub-Programs and Options whereas Basic License key is only for Programs. User able to select multiple sub program or options within a particular program. For every selected Sub-Program, generate Advance License key for the security of Software Application. If user enters Advance License Key then user is able to do operation on selected subprogram and option. Algorithm for Advance License Encryption start Accept basic license key Select sub-program and option by user and accept subprogram mask Result = (sub program mask XOR basic address) and convert result into hexadecimal format Generate advance license key End 3.3 Time Code license key : Time Code generator is use when the selected License Type is Limited. Time Code is accepting different Mask for different License type in the Application i.e. Limited, Unlimited. After selecting Limited License type it will asks the Start Date & End Date for a particular time period. On clicking Generate Time Code, a unique Time Code Key is generated. End © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2931
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 Algorithm for Time Code Key Encryption Start Initialize day, month, and year and store it in result Enter start date, end date and combine the result Result XOR with mac address Convert the result into hexadecimal form and generate time code key False Basic license key is equals to new generated license Invalid True key Activation successful. End 4.2 Advance License Key : End 4.0 PROCESS TO DECRYPT APPLICATION 4.1 Basic License Key: License Decryption is done on the Client’s side. It asks for the MAC Address and the basic license key of the program. For activate license user enters the Basic Key and if the key match the selected Program license is activated. If License is Limited then user will have to enter Time Code key and basic key for activating license. Algorithm for Basic License Decryption start Accept basic license and store it Obtain mac address and perform license generation operation for selected program Advance License can be activated only after Basic License is activated. Advance License is for Sub- Program & Options and is generated unique key. If license type is limited then user enter mac address, basic license key and time code key for particular program. If user want to activate license for subprogram or option so need to enter generated advance license key if the Key matches then the Sub- Program can be activated. If Key does not match then the Advance License can’t be activated. Algorithm for Advance License Decode start Accept basic license and advance key Advance license subprogram XOR with option mask and store it in result Compare result with basic license key False If match found License key is Trueinvalid © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2932
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 Activate sub program or option End 4.3 Time Code Key : The Time Code generated in generation process is provided to the Client and particular Program or Sub-Program can be activated. Algorithm for Time Code Key Decryption Start Accept generated time code key for particular program Time code key XOR mac address False If date is valid Enter a valid True date Activate license for time period End 5.0 Proposed System The proposed system facilitates us a strong and secure online encryption and decryption system. When application is encrypt the program it generates license key and combination of basic key and advance key with some mathematical operation and able to generate license for selected program. Only the programmer can make changes in it to encryption system. Same as for decrypt data on client side which is easy to decrypt the generated license key and able to do activate particular program who is authorized user. ENCRYPTION: EncryptedData Program Encrypti Data (Basic Mask o n Key) Sub Encrypted Encryptiprogram Key mask on (Advance Option Mask Block diagram of Data Encryption DECRYPTION: Encrypted Decryption Program Data Data Mask (Basic Key) Encrypted Key Decryption Sub-Program (Advance mask Key) Option Mask Block diagram of Data Decryption © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2934
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 Algorithm for Proposed System: AES is a new algorithm which can be used to protect data. The same generated license key is used by the symmetric-key which helps to encrypt and decrypt data. Encryption: Step1: accept the program mask, data and generate basic key. Step2: accept subprogram mask, option, and data and generate advance key. Decryption: Fig 2 Generate Advance License Key Step1: accept generated basic key and decrypt the program to activate basic license. Step2: accept generated basic and advance symmetric key to decrypt sub program or option to activate Advance License. 6.0 Result This figure shows the actual implementation of generating license key. Fig 1 shows to generate basic key for program. Fig 2 shows to generate advance license key for subprogram or option. Fig 3 shows to generate key for time period. Fig 4 shows to activate key for unlimited time. Fig 5 shows to activate key for limited period. Fig 6 Fig 3 Generate Key for particular Time Periodshows to activate sub program. Fig 7 shows to activate option. Fig 1Generate Basic License key Fig 4 Activate license for Unlimited Time © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2935
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 Activation confirmation Fig 5 Activate license for Limited time Fig 6 Activate Advance License key for Subprogram Fig 7 Activate Advance License key for Option 7.0 CONCLUSION This help to provide more security for the application. A key generator is used any cryptographic protocols to generate a sequence number. This sequence is used as an encryption key at one end of communication, and as a decryption key at the other [2]. The Basic Key & Advance Key cannot be hacked easily as the keys are generated by Encryption process. So, it provides security to the product as it stops illegal usage of the software. This License Generator primarily focuses on providing ease and operational transparency to the Client in order to prevent software misuse. It is user friendly application [1]. If user select License type i.e. (online) then key generated over the internet and also decrypt on server side. License key which generate and it may verified by within the software itself or, over the Internet via online license verification system it provide easiness to the user. © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2936
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 8.0 REFERENCES- [1]“License File Generator Using MAC Address” Anirudha A. Kolpyakwar1 , Piyush M. Dhande2 , Pallavi A. Chaudhari3 [2]https://security.stackexchange.com/question s/24 33/license-key-serial-number-generator- and-checker [3] https://en.wikipedia.org/wiki/Product_key [4]http://www.webopedia.com/TERM/L/license_ge nerator.html [5] https://en.wikipedia.org/wiki/License_manager © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2937