SECURITY USING FOUR FACTOR PASSWORD AUTHENTICATIONOBJECTIVE: The main role of this system is providing more security while accessing thecard. Another one role is to avoid the hackers.PROBLEM DIFINITION: The main problem statement of our existing system is security. The securitylevel is relatively very low. Another problem found in our existing system is frauds. Thatis detection and avidness’ of hackers is comprehensible. To rectify those problems, weuse four types of security in our proposed system.ABSTRACT: The project entitled as “Security Using Four Factor Password Authentication“.In the scheme the remote user does not need to use smart cards. It is convenient for theusers to use a common storage device such as a universal serial bus memory. The schemeis easy to implement. However, this authentication scheme is vulnerable to impersonationattacks and middle man attacks. An attacker could impersonate legitimate users to loginand access the remote server. In addition, we analyze the security of Fan-Chan-Zhang’sscheme. The scheme suffers from replay attacks and impersonation attacks.
A password authentication scheme to provide authentication between the users andthe remote server. Since then, many password-based remote user authentication schemeshave been proposed. In a smartcard based password authentication scheme, the smartcard takes the password and Finger print from the users as input, computes the loginmessage and sends the login message to the server. The server checks the validity of theuser’s login message. In the mutual authentication situation, not only the server canverify the user but also a user can verify the server.The adversary is modeled as follows: (a) The adversary can tap the communication channel between the users and the server during the login and authentication phase. (b) The adversary either can extract the information by obtaining the smart card or can get a user’s password and Finger print. The adversary cannot do both, or the adversary can login the server as a legitimate user.EXISTING SYSTEM • At present We Are Using Single Card or the Individual Card for the Different Banks Like ICICI, AXIS, HDFC, Etc., • The Pin Number in the Negative Behind the Card • There will be a only one PIN Number
DISADVANTAGES: Less Security Low PerformancePROPOSED SYSTEM • All The Bank Must Be in the Single Card • The Pin No is not present in the Negative • There Will be Three Passwords • PIN No and Authentication Password, Finger print and USIM card authenticationADVANTAGES: Four Types of Security prediction High performance Avoid Fraud Authentication Secure TransactionALGORITHM USED: 1. Triple DES (Data Encryption Standard) 2. PCA (Principle Component Analysis)
ARCHITECTURE DIAGRAM: RFID Authentication PIN Code USER Authentication Process USIM Card Authentication Fingerprint AuthenticationSYSTEM REQUIREMENTS: Hardware Requirements: Intel Pentium IV 256/512 MB RAM 1 GB Free disk space or greater 1 GB on Boot Drive 1 Network Interface Card (NIC)
Software Requirements: MS Windows XP/2000 MS IE Browser 6.0/later MS Dot Net Framework 2.0 MS Visual Studio.NET 2005 MS SQL Server 2000 Language :ASP.Net(VB.NET)APPLICATIONS: 1. Bank 2. Military 3. Detective Agencies 4. Administrative Offices