Abstract
We propose the safe treatment of the certificate of authorization in computer system. We insert the watermark in the certificate of authorization. We set encryption data tables and use them to encrypt the combined file of the certificate of authorization and watermark to produce these files of cipher text. Both of the owner and grantee keep their encrypted files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The processes that the certificate of authorization is encrypted and decrypted will be safer.
Original language | English |
---|---|
Pages (from-to) | 2003-2008 |
Number of pages | 6 |
Journal | ICIC Express Letters |
Volume | 4 |
Issue number | 5 B |
Publication status | Published - Oct 1 2010 |
Externally published | Yes |
Keywords
- Decrypt
- Encrypt
- Watermark
ASJC Scopus subject areas
- Control and Systems Engineering
- General Computer Science