Product Key to Intercept Copyright Infringement

  • Unique Paper ID: 146525
  • Volume: 4
  • Issue: 12
  • PageNo: 906-909
  • Abstract:
  • In Dynamic SLK (Software License Key) Management Using PK (Product Key) Generator, Software publishers have used digital rights management, specifically copy-protection techniques to prevent unauthorized and illegal copying of their software products. Common forms of prevention are copy protection techniques based on physical tokens. While physical tokens provide better protection from unauthorized copying than intangible ones, the protected digital content becomes unsuitable for online distribution. This project investigates the role of copy-protection techniques based on physical and intangible tokens in software piracy prevention using AES (Advanced Encryption Standard) Encryption Algorithm. Advanced Encryption Standard (AES) is used for increase data security and confidentiality. In this proposed approach data is encrypted. This project presents the general implications for a software publisher's anti-piracy and online distribution policy.
add_icon3email to a friend

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{146525,
        author = {Sharanya K R and Nisha Saranga and Thashreefa and Naidile V J},
        title = {Product Key to Intercept Copyright Infringement},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {4},
        number = {12},
        pages = {906-909},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=146525},
        abstract = {In Dynamic SLK (Software License Key) Management Using PK (Product Key) Generator, Software publishers have used digital rights management, specifically copy-protection techniques to prevent unauthorized and illegal copying of their software products. Common forms of prevention are copy protection techniques based on physical tokens. While physical tokens provide better protection from unauthorized copying than intangible ones, the protected digital content becomes unsuitable for online distribution. This project investigates the role of copy-protection techniques based on physical and intangible tokens in software piracy prevention using AES (Advanced Encryption Standard) Encryption Algorithm. Advanced Encryption Standard (AES) is used for increase data security and confidentiality.  In this proposed approach data is encrypted. This project presents the general implications for a software publisher's anti-piracy and online distribution policy.},
        keywords = {piracy ,serial key ,AES algorithm},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 4
  • Issue: 12
  • PageNo: 906-909

Product Key to Intercept Copyright Infringement

Related Articles

Join Our IPN

IJIRT Partner Network

Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.

Join Now arrowright18x

Recent Conferences

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024

Submit inquiry arrowright18x