SlideShare a Scribd company logo
1 of 19
COOKIES AUTHENTICATION
CSIT-555
PRESENTED BY:
ROSHAN SILWAL
DEFINITION OF NEED
• A Web server has no memory so the hosted Web site that the user is
visiting transfers a cookie file of the browser on the computer's hard disk
so that the Web site can remember who is the user and the user
preferences. This message exchange allows the Web server to use this
information to present the user with customized Web pages.
• Cookies allow online marketers and retailers deliver that personable
experience with their customers.
DEFINITION OF NEED
• Authentication cookies are the most common method used by web
servers to know whether the user is logged in or not, and which account
they are logged in with
• For example, the Google search engine once used cookies to allow users
(even non-registered ones) to decide how many search results per page
they wanted to see.
SCOPE OF PROJECT
•Our system authenticates the cookies.
•Our system verifies information provided by user.
•It grants access to authorized user.
•It denies access to unauthorized users.
ASSUMPTIONS MADE
• We have assumed testing data as client’s user id and password
only.
• We have used demo number of authorized clients.
• Our database is dynamic, where we can edit number of fields.
SOLUTION APPROACH
1. We first researched about cookies.
2. We found reasons to authenticate it.
3. We discussed among group members and formed a flowchart to approach
solution.
4. We used php for coding our system.
5. We also created a database to store information.
WHAT ARE COOKIES ?
• A cookie is a text file that a website stores on a client’s computer to
maintain information about the client during and between browsing
sessions.
• Are designed to hold a small amount of data specific to a particular
client and website, and can be accessed either by the web server or the
client computer
• Useful for:
• Shopping carts
• User communities
• Personalized sites
• Not recommended for storing sensitive data
• Store a unique identification string that will match a user held securely
in a database
COOKIES AUTHENTICATION
• In web services, the cookie is authenticated by providing the
user name and password.
• In addition, some web services may ask the security question
that was created during the sign up phase to make the user
account more secure.
BENEFITS OF COOKIES AUTHENTICATION
• Cookies give customized experience and helps user.
• Cookies are simple to use and implement
• It occupies less memory, and these are stored in clients
computer which saves memory burden on server.
• Cookies can be set to expire as per requirement. We can assign
it for particular time-frame.
PROPOSED MODEL
Proposed model
We have proposed a model for the implementation of the project
which is given below. Firstly, we enter the URL for the login
process then it will be sent to the server and sends the message
back to the server. The authenticate script takes the name and
given password. Now this name and password will be compared
with the name and password stored in the database and then
carried out the authentication process [6]. This is also clearly
explaining in the below flowchart.
PROPOSED MODEL CONTINUED
Start
Is
user
valid
?
Verify user
Process
request
end
ALGORITHM
1. Start
2. Create a form to input user-id and password.
3. Send the entered user-id and password to the server.
4. Validate and compare the user-id and password
a. Goto step 2 if not valid
b. Goto step 5 if valid
ALGORTHM CONTD….
5. Display the successful message
6. Ask user for next request and continue.
7.Stop
FLOWCHART MAIN
SCRENSHOT OF LOGIN FORM CREATED
SCREENSHOT FOR DIFFERENT INPUTS
SCREENSHOTS OF VALID AND INVALID
LOGIN ATTEMPTS
DEMO
Cookies authentication

More Related Content

What's hot

Distributed document based system
Distributed document based systemDistributed document based system
Distributed document based system
Chetan Selukar
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
sumitjain2013
 

What's hot (20)

Introduction to Parallel Computing
Introduction to Parallel ComputingIntroduction to Parallel Computing
Introduction to Parallel Computing
 
Unit 5
Unit 5Unit 5
Unit 5
 
cloud computing: Vm migration
cloud computing: Vm migrationcloud computing: Vm migration
cloud computing: Vm migration
 
web mining
web miningweb mining
web mining
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Distributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query ProcessingDistributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query Processing
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management System
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
 
Distributed document based system
Distributed document based systemDistributed document based system
Distributed document based system
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
Privacy issues in the cloud
Privacy issues in the cloudPrivacy issues in the cloud
Privacy issues in the cloud
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Web mining (1)
Web mining (1)Web mining (1)
Web mining (1)
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorization
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
T9. Trust and reputation in multi-agent systems
T9. Trust and reputation in multi-agent systemsT9. Trust and reputation in multi-agent systems
T9. Trust and reputation in multi-agent systems
 
3. challenges
3. challenges3. challenges
3. challenges
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
 

Similar to Cookies authentication

Similar to Cookies authentication (20)

Session and Cookies.pdf
Session and Cookies.pdfSession and Cookies.pdf
Session and Cookies.pdf
 
Sessions&cookies
Sessions&cookiesSessions&cookies
Sessions&cookies
 
Session and cookies,get and post
Session and cookies,get and postSession and cookies,get and post
Session and cookies,get and post
 
APEX & Cookie Monster
APEX & Cookie MonsterAPEX & Cookie Monster
APEX & Cookie Monster
 
session and cookies.ppt
session and cookies.pptsession and cookies.ppt
session and cookies.ppt
 
SSL and Wordpress
SSL and WordpressSSL and Wordpress
SSL and Wordpress
 
Using cookies and sessions
Using cookies and sessionsUsing cookies and sessions
Using cookies and sessions
 
16 cookies
16 cookies16 cookies
16 cookies
 
EVOLVE'13 | Enhance | Permission Sensitive Caching | Paul McMahon & Jason Rap...
EVOLVE'13 | Enhance | Permission Sensitive Caching | Paul McMahon & Jason Rap...EVOLVE'13 | Enhance | Permission Sensitive Caching | Paul McMahon & Jason Rap...
EVOLVE'13 | Enhance | Permission Sensitive Caching | Paul McMahon & Jason Rap...
 
COOKIES.pptx
COOKIES.pptxCOOKIES.pptx
COOKIES.pptx
 
SCWCD : Session management : CHAP : 6
SCWCD : Session management : CHAP : 6SCWCD : Session management : CHAP : 6
SCWCD : Session management : CHAP : 6
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
MCSA 70-412 Chapter 06
MCSA 70-412 Chapter 06MCSA 70-412 Chapter 06
MCSA 70-412 Chapter 06
 
Introduction to Web Security
Introduction to Web SecurityIntroduction to Web Security
Introduction to Web Security
 
Security asp.net application
Security asp.net applicationSecurity asp.net application
Security asp.net application
 
Enterprise java unit-2_chapter-3
Enterprise  java unit-2_chapter-3Enterprise  java unit-2_chapter-3
Enterprise java unit-2_chapter-3
 
Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Te...
Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Te...Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Te...
Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Te...
 
Startup Institute NY - Authentication, Validation, and Basic Testing
Startup Institute NY - Authentication, Validation, and Basic TestingStartup Institute NY - Authentication, Validation, and Basic Testing
Startup Institute NY - Authentication, Validation, and Basic Testing
 
Web security
Web securityWeb security
Web security
 

Recently uploaded

Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 

Recently uploaded (20)

Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 

Cookies authentication

  • 2. DEFINITION OF NEED • A Web server has no memory so the hosted Web site that the user is visiting transfers a cookie file of the browser on the computer's hard disk so that the Web site can remember who is the user and the user preferences. This message exchange allows the Web server to use this information to present the user with customized Web pages. • Cookies allow online marketers and retailers deliver that personable experience with their customers.
  • 3. DEFINITION OF NEED • Authentication cookies are the most common method used by web servers to know whether the user is logged in or not, and which account they are logged in with • For example, the Google search engine once used cookies to allow users (even non-registered ones) to decide how many search results per page they wanted to see.
  • 4. SCOPE OF PROJECT •Our system authenticates the cookies. •Our system verifies information provided by user. •It grants access to authorized user. •It denies access to unauthorized users.
  • 5. ASSUMPTIONS MADE • We have assumed testing data as client’s user id and password only. • We have used demo number of authorized clients. • Our database is dynamic, where we can edit number of fields.
  • 6. SOLUTION APPROACH 1. We first researched about cookies. 2. We found reasons to authenticate it. 3. We discussed among group members and formed a flowchart to approach solution. 4. We used php for coding our system. 5. We also created a database to store information.
  • 7. WHAT ARE COOKIES ? • A cookie is a text file that a website stores on a client’s computer to maintain information about the client during and between browsing sessions. • Are designed to hold a small amount of data specific to a particular client and website, and can be accessed either by the web server or the client computer • Useful for: • Shopping carts • User communities • Personalized sites • Not recommended for storing sensitive data • Store a unique identification string that will match a user held securely in a database
  • 8. COOKIES AUTHENTICATION • In web services, the cookie is authenticated by providing the user name and password. • In addition, some web services may ask the security question that was created during the sign up phase to make the user account more secure.
  • 9. BENEFITS OF COOKIES AUTHENTICATION • Cookies give customized experience and helps user. • Cookies are simple to use and implement • It occupies less memory, and these are stored in clients computer which saves memory burden on server. • Cookies can be set to expire as per requirement. We can assign it for particular time-frame.
  • 10. PROPOSED MODEL Proposed model We have proposed a model for the implementation of the project which is given below. Firstly, we enter the URL for the login process then it will be sent to the server and sends the message back to the server. The authenticate script takes the name and given password. Now this name and password will be compared with the name and password stored in the database and then carried out the authentication process [6]. This is also clearly explaining in the below flowchart.
  • 12. ALGORITHM 1. Start 2. Create a form to input user-id and password. 3. Send the entered user-id and password to the server. 4. Validate and compare the user-id and password a. Goto step 2 if not valid b. Goto step 5 if valid
  • 13. ALGORTHM CONTD…. 5. Display the successful message 6. Ask user for next request and continue. 7.Stop
  • 15. SCRENSHOT OF LOGIN FORM CREATED
  • 17. SCREENSHOTS OF VALID AND INVALID LOGIN ATTEMPTS
  • 18. DEMO