Submit Search
Upload
Three-Layered Security for Banking Using QR Codes and OTP
•
0 likes
•
16 views
AI-enhanced title
IRJET Journal
Follow
https://irjet.net/archives/V7/i3/IRJET-V7I3349.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET Journal
Published pdf-2072-6-2072 kajal
Published pdf-2072-6-2072 kajal
MOHAMED RIYAZUDEEN
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET Journal
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET Journal
N044057478
N044057478
IJERA Editor
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
IRJET Journal
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET Journal
Bg24375379
Bg24375379
IJERA Editor
Recommended
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET Journal
Published pdf-2072-6-2072 kajal
Published pdf-2072-6-2072 kajal
MOHAMED RIYAZUDEEN
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET Journal
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET Journal
N044057478
N044057478
IJERA Editor
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
IRJET Journal
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET Journal
Bg24375379
Bg24375379
IJERA Editor
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET Journal
Novel Approach for Card Payment
Novel Approach for Card Payment
Editor IJCATR
IRJET- Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
IRJET Journal
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
IRJET Journal
Security Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage Devices
IRJET Journal
ATM (1)
ATM (1)
Kirthika C
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
Karteek Irukulla
Ieee+Hardware+List+2009
Ieee+Hardware+List+2009
pavan
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
Pay-Cloak:Biometric
Pay-Cloak:Biometric
ijtsrd
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET Journal
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
eSAT Publishing House
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
IJRTEMJOURNAL
IRJET - Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
IRJET Journal
000
000
Lakshminarayana Durgam
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET Journal
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
IRJET Journal
IOT based Industrial Automation using Raspberry Pi
IOT based Industrial Automation using Raspberry Pi
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
IRJET- Smart Trolley for Billing System
IRJET- Smart Trolley for Billing System
IRJET Journal
More Related Content
What's hot
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET Journal
Novel Approach for Card Payment
Novel Approach for Card Payment
Editor IJCATR
IRJET- Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
IRJET Journal
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
IRJET Journal
Security Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage Devices
IRJET Journal
ATM (1)
ATM (1)
Kirthika C
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
Karteek Irukulla
Ieee+Hardware+List+2009
Ieee+Hardware+List+2009
pavan
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
Pay-Cloak:Biometric
Pay-Cloak:Biometric
ijtsrd
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET Journal
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
eSAT Publishing House
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
IJRTEMJOURNAL
IRJET - Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
IRJET Journal
000
000
Lakshminarayana Durgam
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET Journal
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
IRJET Journal
IOT based Industrial Automation using Raspberry Pi
IOT based Industrial Automation using Raspberry Pi
IJTRET-International Journal of Trendy Research in Engineering and Technology
What's hot
(20)
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
Novel Approach for Card Payment
Novel Approach for Card Payment
IRJET- Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
Security Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage Devices
ATM (1)
ATM (1)
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
Ieee+Hardware+List+2009
Ieee+Hardware+List+2009
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
Pay-Cloak:Biometric
Pay-Cloak:Biometric
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
IRJET - Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
000
000
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
IOT based Industrial Automation using Raspberry Pi
IOT based Industrial Automation using Raspberry Pi
Similar to Three-Layered Security for Banking Using QR Codes and OTP
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
IRJET- Smart Trolley for Billing System
IRJET- Smart Trolley for Billing System
IRJET Journal
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
IRJET Journal
Basic Office Administration
Basic Office Administration
IRJET Journal
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET Journal
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET Journal
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
ijiert bestjournal
Secure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
ijtsrd
IRJET- Toll Plaza Payment using QR Code
IRJET- Toll Plaza Payment using QR Code
IRJET Journal
IRJET - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
IRJET - An Effective Embedded Smart Shopping Cart using QR Scanning Code
IRJET - An Effective Embedded Smart Shopping Cart using QR Scanning Code
IRJET Journal
IRJET - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
IRJET Journal
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
IRJET Journal
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
IRJET Journal
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET Journal
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
IRJET Journal
Similar to Three-Layered Security for Banking Using QR Codes and OTP
(20)
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET- Smart Trolley for Billing System
IRJET- Smart Trolley for Billing System
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
Basic Office Administration
Basic Office Administration
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
Secure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
IRJET- Toll Plaza Payment using QR Code
IRJET- Toll Plaza Payment using QR Code
IRJET - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - An Effective Embedded Smart Shopping Cart using QR Scanning Code
IRJET - An Effective Embedded Smart Shopping Cart using QR Scanning Code
IRJET - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Recently uploaded
(20)
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Internship report on mechanical engineering
Internship report on mechanical engineering
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
power system scada applications and uses
power system scada applications and uses
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Three-Layered Security for Banking Using QR Codes and OTP
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1821 THREE LAYERED SECURITY FOR BANKING Tanvi Gangawane1, Jemin Patel2, Sambhav Thole3 1Tanvi Gangawane, Dept of Information and Technology, Atharva College Of Engineering, Maharashtra, India 2Jemin Patel, Dept of Information and Technology, Atharva College Of Engineering, Maharashtra, India 3Sambhav Thole, Dept of Information and Technology, Atharva College Of Engineering, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Layered Security is one method of security to protect the user’s resources and data. one layered security consists the usage of login creditionals like username and password. It is the most commonly used system of authentication but it comes with a number of security risks such as stealing the secure and private information and keylogging attack. To overcome this issue we have enhanced the level of security by adding two more layers of security i.e authentication using QR code and OTP based authentication. Key Words: IMEI number, OTP, QR code, three layered security. 1. INTRODUCTION QR code is two dimensional matrix barcode whichstoresthe data in that dimension. Data is presentedassquaredotswith specific pattern in both horizontal as well as vertical dimension. Specific QR scanner can read those patterns and retrieves the stored data. In our approach, second layer is Authentication using QR code. For this, smartphone is used as QR scanner. Instead of executing the entireauthentication process on personal computer, the part of authentication is moved to the smartphone. This part of authentication enhances security greatly and offers protection against attack such as malware and keylogging attacks. User plays his/her role in visual authentication which boosts both the security of our system and reassuring to the user that they plays role in the process of authentication. It is not degrade the usability. 1.1 NEED A keylogger is a software designed to capture all of a user’s keyboard strokes, and then make use of themtoimpersonate a user in financial transactions. keylogger attacks are generally used in login procedures where username and password can stole by user’s keyboard strokes or moves.so there is need for authentication system which not only takes username and password but also acquire for another verification step. mostly user’s are insecure about their own account in manydomainasbank,healthcare,institutes.sothe secure and trustworthy authentication system is needed for people or user. 1.2 APPLICATION AND SCOPE Our protocols are generic and can be applied to many domains in authentication system. For example, ATM (Automated Teller Machine), personal computer. Furthermore, our design doesnotrequirean explicitchannel between the bank and the smartphone, which is desirable in many domains. SCOPE Besides the security of an authentication protocol, both usability and deploybility are equally important and critical for the acceptance of any protocol in modern computing settings. The authentication protocols which we used are generic and can be applied to many types of authentication. It gives better user experience. 2. LITERATURE SURVEY QR i.e. "Quick Response" code is a 2D matrix code that is designed by keeping two points under consideration, i.e. it must store large amount of data as comparedto1Dbarcodes and it must be decoded at high speed using any handheld device like phones. QR code provides high data storage capacity, fast scanning, omnidirectional readability, and many other advantages including, error- correction (so that damaged code can also be read successfully) and different type of versions. Different varieties of QR code symbols like logo QR code, encrypted QR code, iQR Code are also available so that user can choose among them according to their need. Now these days, a QR code is applied in different application streams related to marketing, security, academics etc. and gain popularity at a really high pace. Day by day more people are getting aware of this technologyand use it accordingly.[1] An open source confirmationof-idea verification framework that uses a two-figure authentication by joining a secret key and a camera-prepared cell phone, going about as a confirmation token. Advanced cell isutilizedfordecodingthe QR code. The code is scan with the QR code scanner of cell phone. IMEI number of a telephone which is enlist by the client and the arbitrary number, where irregular number is created by the arbitrary number capacity requirement.[2] Presence system is one of the important components in the lecture process and student attendance recap is one of the elements in various aspects of lecture assessment. Presence has been carried out by signing students. The use of telecommunications technology which is now growing rapidly is the smart phone where one of the operating systems used in smart phones is the Android operating system, Android provides an open platform for users to create their own applications that have been used if various
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1822 mobile devices. In addition to the development of communication technology, there is also a Quick Response Code or QR Code that has the meaning of a code that can convey information quickly with a quick response. QR Code can not only store horizontal information such as barcodes but can also store information vertically. This study aims to build a presence system using an Android operating system. [3] 3. PROPOSED SYSTEM FOR PROJECT Fig -1: Proposed System 1. Terminal A user’s terminal i.e desktop computer or laptop. The user log in with username and password byusingterminal.When server generates QR code, then the QR code displays on terminal. OTP dialog box displays on terminal. OTP submits to server by using terminal. on successful login the bank account webpage opens on terminal. 2. Server Server is the system entity which performs back-end operations by interacting with theterminal.Servergenerates QR code and sends to terminal. On successful QR visual login server sends OTP to smartphone.server-sent-OTPsubmitsto server from terminal. Sever checks for successful or unsuccessful authentication. 3. Smartphone: Smartphone scans QR code which is displayed on terminal. On sucessful QR code visual login, smartphone receives OTP from server. 4. METHODOLOGY In our approach terminal, server and smartphone each has important role. On terminal, user log in with username and password. The login creditionals sends to server. Server receives the creditionals and checks in database for registered user. Once the user is found as registeredinonline banking account, then server starts to fetch IMEI number related to that particular user and encrypts it into QR code using QR generator. IMEI number encrypted into QR code using encryptionkey. NewformedQRcodesendstoterminal. Where smartphone is camera equipped in it . the application with QR scanner is in smartphone. Smartphone has IMEI number same as registered user encrypted IMEI number. That’s why smartphoneapplicationscannerdecryptspattern hidden in QR code. QR code get scanned by smartphone i.e Visual login of QR code. Once QR codedecrypts, themessageofsuccessfulvisuallogin sends to server. Server generates 3D OTP i.e three layered of security. Server sends OTP to smartphone. Internet connection should be moderate for procedure. User use this OTP on terminal. On successful OTP verification, server will give user access to his bank account web page. 4.1 ALGORITHM USED Encrk(ꞏ): an encryption algorithm whichtakesa keyk anda message M from set M and outputs a cipher-text C in the set C. Decrk(ꞏ): a decryption algorithmwhichtakesa ciphertextC in C and a key k, and outputs a plain-text (or message) M in the set M. Sign(ꞏ): a signature generation algorithm which takes a privatekey SK and a message M from the setM,andoutputsa signature. Verf(ꞏ): a signature verification algorithm which takes a public key PK and a signed message (M, _), and returns valid or invalid. QREnc(ꞏ): a QR encoding algorithm whichtakesa stringS in S and outputs a QR code QRDec(ꞏ): a QR decoding algorithm which takes a QR code and returns a string S in S. RSA Algorithm: RSA is the algorithm used by modern computers to encrypt and decrypt messages. This is also called public key cryptography. 5. RESULT AND ANALYSIS For User Login Fig -2: User Login
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1823 Once the user completes registration process for bank account the user can log in to his/her system withusername and password anytime. Fig -3: QR code generation After successful user login, QR code will display on user’s terminal. This QR code will get scanned by smartphone with scanner in it. 5.1 COMPARATIVE ANALYSIS Table-1: Comparative Analysis based on security 6. CONCLUSION Our work provides extra security with thenormal methodof on-line authentication of banking which incorporates username and password. However, by adding QR code authentication the safety measures for banking is secure. At the end, with one time password authentication which completes fulfilment for user login for his/herbank account. REFERENCES [1] Sumit Tiwari, “An Introduction To QRCodeTechnology,” inInternational Conference onInformationTechnology,2016 [2] Chirag Patil, Umesh Naik, Pallavi Vartak, “Online Session Security System using QR code,OTP and IMEI,” in Imperial Journal of Interdisciplinary Research (IJIR) Vol-3, Issue-3, 2017 [9] Sonawane Shamal, Khandave Monika, Nemade Neha, “Secure AuthenticationforOnlineBankingUsing QR Code,”in International Journal of Emerging TechnologyandAdvanced Engineering,2016
Download now