This paper is published in Volume-3, Issue-1, 2017
Area
Software Piracy
Author
B. Karpakavalli, Miss. R. Arunadevi
Org/Univ
Dhanalakshmi Srinivasan College of Arts and Science for Women, Tamil Nadu, India
Pub. Date
07 February, 2017
Paper ID
V3I1-1261
Publisher
Keywords
MAC Address

Citationsacebook

IEEE
B. Karpakavalli, Miss. R. Arunadevi. Software Piracy Production System, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
B. Karpakavalli, Miss. R. Arunadevi (2017). Software Piracy Production System. International Journal of Advance Research, Ideas and Innovations in Technology, 3(1) www.IJARIIT.com.

MLA
B. Karpakavalli, Miss. R. Arunadevi. "Software Piracy Production System." International Journal of Advance Research, Ideas and Innovations in Technology 3.1 (2017). www.IJARIIT.com.

Abstract

In this paper entitled as “software piracy protection system” is mainly used to protect the piracy of the system. Now a day’s and a number of users download the software without having the permission of the owner of the software, however, the software have the product key the unknown person also find the key and it’s used that software. A one user pays and download the software and it has them the specific product key of that software. The authorized user share the key to another user (like as friends, relatives and organizations etc), other users are using that software without buying and download. Overcome this problem to implement this project, it is used for the online process. First the user registers to the website when the user downloads the software, first, the user pays the amount for online and then starts the download the software. Mutually it read the MAC (Medium Access Control) address of the corresponding user. Then the owner of the software generates the product key of the corresponding downloaded software and it's sent to the user. After receiving the key, when the user installs the software on the system it asks the product key, the user type that product key. It checks the product key corresponds MAC address. If it is correct the software is installing, else the software is not installed on the system. In this system only allows the authorized person, because it checks the MAC address. The MAC address is the unique address of the system, so the MAC address is not used for another user.