Certificate of authorization with watermark processing in computer system

Nai Wen Kuo, Huey Ming Lee, Tsang Yean Lee

Research output: Contribution to journalArticle

Abstract

We propose the safe treatment of the certificate of authorization in computer system. We insert the watermark in the certificate of authorization. We set encryption data tables and use them to encrypt the combined file of the certificate of authorization and watermark to produce these files of cipher text. Both of the owner and grantee keep their encrypted files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The processes that the certificate of authorization is encrypted and decrypted will be safer.

Original languageEnglish
Pages (from-to)2003-2008
Number of pages6
JournalICIC Express Letters
Volume4
Issue number5 B
Publication statusPublished - Oct 1 2010
Externally publishedYes

Keywords

  • Decrypt
  • Encrypt
  • Watermark

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Certificate of authorization with watermark processing in computer system'. Together they form a unique fingerprint.

  • Cite this

    Kuo, N. W., Lee, H. M., & Lee, T. Y. (2010). Certificate of authorization with watermark processing in computer system. ICIC Express Letters, 4(5 B), 2003-2008.