SECURITY USING FOUR FACTOR PASSWORD AUTHENTICATIONOBJECTIVE:             The main role of this system is providing more se...
A password authentication scheme to provide authentication between the usersand the remote server. Since then, many passwo...
 Less Security         Low PerformancePROPOSED SYSTEM •   All The Bank Must Be in the Single Card • The Pin No is not pr...
RFID Authentication                            PIN Code         USER             Authentication      Process              ...
Software Requirements:        • MS Windows XP/2000        • MS IE Browser 6.0/later        • MS Dot Net Framework 2.0     ...
Upcoming SlideShare
Loading in …5
×

Psdot 19 four factor password authentication

302 views
246 views

Published on

FINAL YEAR IEEE PROJECTS,
EMBEDDED SYSTEMS PROJECTS,
ENGINEERING PROJECTS,
MCA PROJECTS,
ROBOTICS PROJECTS,
ARM PIC BASED PROJECTS, MICRO CONTROLLER PROJECTS Z Technologies, Chennai

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
302
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Psdot 19 four factor password authentication

  1. 1. SECURITY USING FOUR FACTOR PASSWORD AUTHENTICATIONOBJECTIVE: The main role of this system is providing more security while accessing thecard. Another one role is to avoid the hackers.PROBLEM DIFINITION: The main problem statement of our existing system is security. The securitylevel is relatively very low. Another problem found in our existing system is frauds. Thatis detection and avidness’ of hackers is comprehensible. To rectify those problems, weuse four types of security in our proposed system.ABSTRACT: The project entitled as “Security Using Four Factor Password Authentication“.In the scheme the remote user does not need to use smart cards. It is convenient for theusers to use a common storage device such as a universal serial bus memory. Thescheme is easy to implement. However, this authentication scheme is vulnerable toimpersonation attacks and middle man attacks. An attacker could impersonate legitimateusers to login and access the remote server. In addition, we analyze the security of Fan-Chan-Zhang’s scheme. The scheme suffers from replay attacks and impersonationattacks. Z Technologies www.ztech.in info@ztech.in call : 91760 91765
  2. 2. A password authentication scheme to provide authentication between the usersand the remote server. Since then, many password-based remote user authenticationschemes have been proposed. In a smartcard based password authentication scheme, thesmart card takes the password and Finger print from the users as input, computes thelogin message and sends the login message to the server. The server checks the validityof the user’s login message. In the mutual authentication situation, not only the servercan verify the user but also a user can verify the server.The adversary is modeled as follows: (a) The adversary can tap the communication channel between the users and the server during the login and authentication phase. (b) The adversary either can extract the information by obtaining the smart card or can get a user’s password and Finger print. The adversary cannot do both, or the adversary can login the server as a legitimate user.EXISTING SYSTEM • At present We Are Using Single Card or the Individual Card for the Different Banks Like ICICI, AXIS, HDFC, Etc., • The Pin Number in the Negative Behind the Card • There will be a only one PIN NumberDISADVANTAGES: Z Technologies www.ztech.in info@ztech.in call : 91760 91765
  3. 3.  Less Security  Low PerformancePROPOSED SYSTEM • All The Bank Must Be in the Single Card • The Pin No is not present in the Negative • There Will be Three Passwords • PIN No and Authentication Password, Finger print and USIM card authenticationADVANTAGES:  Four Types of Security prediction  High performance  Avoid Fraud Authentication  Secure TransactionALGORITHM USED: 1. Triple DES (Data Encryption Standard) 2. PCA (Principle Component Analysis)ARCHITECTURE DIAGRAM: Z Technologies www.ztech.in info@ztech.in call : 91760 91765
  4. 4. RFID Authentication PIN Code USER Authentication Process USIM Card Authentication Fingerprint AuthenticationSYSTEM REQUIREMENTS: Hardware Requirements: • Intel Pentium IV • 256/512 MB RAM • 1 GB Free disk space or greater • 1 GB on Boot Drive • 1 Network Interface Card (NIC) Z Technologies www.ztech.in info@ztech.in call : 91760 91765
  5. 5. Software Requirements: • MS Windows XP/2000 • MS IE Browser 6.0/later • MS Dot Net Framework 2.0 • MS Visual Studio.NET 2005 • MS SQL Server 2000 • Language :ASP.Net(VB.NET)APPLICATIONS: 1. Bank 2. Military 3. Detective Agencies 4. Administrative Offices Z Technologies www.ztech.in info@ztech.in call : 91760 91765

×