SlideShare a Scribd company logo
COOKIES AUTHENTICATION
CSIT-555
PRESENTED BY:
ROSHAN SILWAL
DEFINITION OF NEED
• A Web server has no memory so the hosted Web site that the user is
visiting transfers a cookie file of the browser on the computer's hard disk
so that the Web site can remember who is the user and the user
preferences. This message exchange allows the Web server to use this
information to present the user with customized Web pages.
• Cookies allow online marketers and retailers deliver that personable
experience with their customers.
DEFINITION OF NEED
• Authentication cookies are the most common method used by web
servers to know whether the user is logged in or not, and which account
they are logged in with
• For example, the Google search engine once used cookies to allow users
(even non-registered ones) to decide how many search results per page
they wanted to see.
SCOPE OF PROJECT
•Our system authenticates the cookies.
•Our system verifies information provided by user.
•It grants access to authorized user.
•It denies access to unauthorized users.
ASSUMPTIONS MADE
• We have assumed testing data as client’s user id and password
only.
• We have used demo number of authorized clients.
• Our database is dynamic, where we can edit number of fields.
SOLUTION APPROACH
1. We first researched about cookies.
2. We found reasons to authenticate it.
3. We discussed among group members and formed a flowchart to approach
solution.
4. We used php for coding our system.
5. We also created a database to store information.
WHAT ARE COOKIES ?
• A cookie is a text file that a website stores on a client’s computer to
maintain information about the client during and between browsing
sessions.
• Are designed to hold a small amount of data specific to a particular
client and website, and can be accessed either by the web server or the
client computer
• Useful for:
• Shopping carts
• User communities
• Personalized sites
• Not recommended for storing sensitive data
• Store a unique identification string that will match a user held securely
in a database
COOKIES AUTHENTICATION
• In web services, the cookie is authenticated by providing the
user name and password.
• In addition, some web services may ask the security question
that was created during the sign up phase to make the user
account more secure.
BENEFITS OF COOKIES AUTHENTICATION
• Cookies give customized experience and helps user.
• Cookies are simple to use and implement
• It occupies less memory, and these are stored in clients
computer which saves memory burden on server.
• Cookies can be set to expire as per requirement. We can assign
it for particular time-frame.
PROPOSED MODEL
Proposed model
We have proposed a model for the implementation of the project
which is given below. Firstly, we enter the URL for the login
process then it will be sent to the server and sends the message
back to the server. The authenticate script takes the name and
given password. Now this name and password will be compared
with the name and password stored in the database and then
carried out the authentication process [6]. This is also clearly
explaining in the below flowchart.
PROPOSED MODEL CONTINUED
Start
Is
user
valid
?
Verify user
Process
request
end
ALGORITHM
1. Start
2. Create a form to input user-id and password.
3. Send the entered user-id and password to the server.
4. Validate and compare the user-id and password
a. Goto step 2 if not valid
b. Goto step 5 if valid
ALGORTHM CONTD….
5. Display the successful message
6. Ask user for next request and continue.
7.Stop
FLOWCHART MAIN
SCRENSHOT OF LOGIN FORM CREATED
SCREENSHOT FOR DIFFERENT INPUTS
SCREENSHOTS OF VALID AND INVALID
LOGIN ATTEMPTS
DEMO
Cookies authentication

More Related Content

What's hot

Human computer interaction-web interface design and mobile eco system
Human computer interaction-web interface design and mobile eco systemHuman computer interaction-web interface design and mobile eco system
Human computer interaction-web interface design and mobile eco system
N.Jagadish Kumar
 
Online Hostel Management System Proposal
Online Hostel Management System Proposal Online Hostel Management System Proposal
Online Hostel Management System Proposal
farhanamusthafa
 
farming assistant web service
farming assistant web servicefarming assistant web service
farming assistant web service
Surbhi Sharma
 
Student Management System Project Abstract
Student Management System Project AbstractStudent Management System Project Abstract
Student Management System Project Abstract
Udhayyagethan Mano
 
Application server
Application serverApplication server
Application server
nava rathna
 
Domain Controller.pptx
Domain Controller.pptxDomain Controller.pptx
Domain Controller.pptx
ENTERTAINMENTHASNOEN
 
Web server architecture
Web server architectureWeb server architecture
Web server architecture
Tewodros K
 
Internet Domain Names
Internet Domain NamesInternet Domain Names
Internet Domain Names
Ross University School of Medicine
 
Windows Server 2012 Installation and Configurtion Superiorgrw
Windows Server 2012 Installation and Configurtion SuperiorgrwWindows Server 2012 Installation and Configurtion Superiorgrw
Windows Server 2012 Installation and Configurtion Superiorgrw
Awais Amjad
 
Hms ppt
Hms pptHms ppt
Hms ppt
Shabana Riyas
 
Presentation of database management system
Presentation of database management systemPresentation of database management system
Presentation of database management system
Md. Touhidur Rahman
 
Cookie testing
Cookie testingCookie testing
Cookie testing
BugRaptors
 
Conditional Access System
Conditional Access SystemConditional Access System
Internet cookies
Internet cookiesInternet cookies
Internet cookies
Abhi Bhardwaj
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
Dr. Sunil Kr. Pandey
 
UML Diagrams For Online Course Portal
UML Diagrams For Online Course PortalUML Diagrams For Online Course Portal
UML Diagrams For Online Course Portal
HarieHaren GV
 
IRJET- Placement Management and Prediction System using Data Mining and Cloud...
IRJET- Placement Management and Prediction System using Data Mining and Cloud...IRJET- Placement Management and Prediction System using Data Mining and Cloud...
IRJET- Placement Management and Prediction System using Data Mining and Cloud...
IRJET Journal
 
Online Movie ticket booking Project
Online Movie ticket booking ProjectOnline Movie ticket booking Project
Online Movie ticket booking Project
SHAZIA JAMALI
 
Design process design rules
Design process  design rulesDesign process  design rules
Design process design rules
Preeti Mishra
 
Hostel Management System Proposal Report.pdf
Hostel Management System Proposal Report.pdfHostel Management System Proposal Report.pdf
Hostel Management System Proposal Report.pdf
ShohedulIslam3
 

What's hot (20)

Human computer interaction-web interface design and mobile eco system
Human computer interaction-web interface design and mobile eco systemHuman computer interaction-web interface design and mobile eco system
Human computer interaction-web interface design and mobile eco system
 
Online Hostel Management System Proposal
Online Hostel Management System Proposal Online Hostel Management System Proposal
Online Hostel Management System Proposal
 
farming assistant web service
farming assistant web servicefarming assistant web service
farming assistant web service
 
Student Management System Project Abstract
Student Management System Project AbstractStudent Management System Project Abstract
Student Management System Project Abstract
 
Application server
Application serverApplication server
Application server
 
Domain Controller.pptx
Domain Controller.pptxDomain Controller.pptx
Domain Controller.pptx
 
Web server architecture
Web server architectureWeb server architecture
Web server architecture
 
Internet Domain Names
Internet Domain NamesInternet Domain Names
Internet Domain Names
 
Windows Server 2012 Installation and Configurtion Superiorgrw
Windows Server 2012 Installation and Configurtion SuperiorgrwWindows Server 2012 Installation and Configurtion Superiorgrw
Windows Server 2012 Installation and Configurtion Superiorgrw
 
Hms ppt
Hms pptHms ppt
Hms ppt
 
Presentation of database management system
Presentation of database management systemPresentation of database management system
Presentation of database management system
 
Cookie testing
Cookie testingCookie testing
Cookie testing
 
Conditional Access System
Conditional Access SystemConditional Access System
Conditional Access System
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
UML Diagrams For Online Course Portal
UML Diagrams For Online Course PortalUML Diagrams For Online Course Portal
UML Diagrams For Online Course Portal
 
IRJET- Placement Management and Prediction System using Data Mining and Cloud...
IRJET- Placement Management and Prediction System using Data Mining and Cloud...IRJET- Placement Management and Prediction System using Data Mining and Cloud...
IRJET- Placement Management and Prediction System using Data Mining and Cloud...
 
Online Movie ticket booking Project
Online Movie ticket booking ProjectOnline Movie ticket booking Project
Online Movie ticket booking Project
 
Design process design rules
Design process  design rulesDesign process  design rules
Design process design rules
 
Hostel Management System Proposal Report.pdf
Hostel Management System Proposal Report.pdfHostel Management System Proposal Report.pdf
Hostel Management System Proposal Report.pdf
 

Similar to Cookies authentication

Session and Cookies.pdf
Session and Cookies.pdfSession and Cookies.pdf
Session and Cookies.pdf
HamnaGhani1
 
Sessions&cookies
Sessions&cookiesSessions&cookies
Sessions&cookies
Tirthika Bandi
 
APEX & Cookie Monster
APEX & Cookie MonsterAPEX & Cookie Monster
APEX & Cookie Monster
Christian Rokitta
 
session and cookies.ppt
session and cookies.pptsession and cookies.ppt
session and cookies.ppt
Jayaprasanna4
 
SSL and Wordpress
SSL and WordpressSSL and Wordpress
SSL and Wordpress
Peg Perry
 
Using cookies and sessions
Using cookies and sessionsUsing cookies and sessions
Using cookies and sessions
Nuha Noor
 
COOKIES.pptx
COOKIES.pptxCOOKIES.pptx
COOKIES.pptx
18csjeyavarthini
 
SCWCD : Session management : CHAP : 6
SCWCD : Session management : CHAP : 6SCWCD : Session management : CHAP : 6
SCWCD : Session management : CHAP : 6
Ben Abdallah Helmi
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
CloudIDSummit
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
CloudIDSummit
 
MCSA 70-412 Chapter 06
MCSA 70-412 Chapter 06MCSA 70-412 Chapter 06
MCSA 70-412 Chapter 06
Computer Networking
 
Introduction to Web Security
Introduction to Web SecurityIntroduction to Web Security
Introduction to Web Security
Kamil Lelonek
 
Security asp.net application
Security asp.net applicationSecurity asp.net application
Security asp.net application
ZAIYAUL HAQUE
 
Enterprise java unit-2_chapter-3
Enterprise  java unit-2_chapter-3Enterprise  java unit-2_chapter-3
Enterprise java unit-2_chapter-3
sandeep54552
 
Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Te...
Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Te...Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Te...
Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Te...
Matthew Gerrior
 
Startup Institute NY - Authentication, Validation, and Basic Testing
Startup Institute NY - Authentication, Validation, and Basic TestingStartup Institute NY - Authentication, Validation, and Basic Testing
Startup Institute NY - Authentication, Validation, and Basic Testing
Matthew Gerrior
 
Web security
Web securityWeb security
Web security
Muhammad Usman
 

Similar to Cookies authentication (20)

Session and Cookies.pdf
Session and Cookies.pdfSession and Cookies.pdf
Session and Cookies.pdf
 
Sessions&cookies
Sessions&cookiesSessions&cookies
Sessions&cookies
 
Session and cookies,get and post
Session and cookies,get and postSession and cookies,get and post
Session and cookies,get and post
 
APEX & Cookie Monster
APEX & Cookie MonsterAPEX & Cookie Monster
APEX & Cookie Monster
 
session and cookies.ppt
session and cookies.pptsession and cookies.ppt
session and cookies.ppt
 
SSL and Wordpress
SSL and WordpressSSL and Wordpress
SSL and Wordpress
 
Using cookies and sessions
Using cookies and sessionsUsing cookies and sessions
Using cookies and sessions
 
16 cookies
16 cookies16 cookies
16 cookies
 
EVOLVE'13 | Enhance | Permission Sensitive Caching | Paul McMahon & Jason Rap...
EVOLVE'13 | Enhance | Permission Sensitive Caching | Paul McMahon & Jason Rap...EVOLVE'13 | Enhance | Permission Sensitive Caching | Paul McMahon & Jason Rap...
EVOLVE'13 | Enhance | Permission Sensitive Caching | Paul McMahon & Jason Rap...
 
COOKIES.pptx
COOKIES.pptxCOOKIES.pptx
COOKIES.pptx
 
SCWCD : Session management : CHAP : 6
SCWCD : Session management : CHAP : 6SCWCD : Session management : CHAP : 6
SCWCD : Session management : CHAP : 6
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
MCSA 70-412 Chapter 06
MCSA 70-412 Chapter 06MCSA 70-412 Chapter 06
MCSA 70-412 Chapter 06
 
Introduction to Web Security
Introduction to Web SecurityIntroduction to Web Security
Introduction to Web Security
 
Security asp.net application
Security asp.net applicationSecurity asp.net application
Security asp.net application
 
Enterprise java unit-2_chapter-3
Enterprise  java unit-2_chapter-3Enterprise  java unit-2_chapter-3
Enterprise java unit-2_chapter-3
 
Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Te...
Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Te...Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Te...
Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Te...
 
Startup Institute NY - Authentication, Validation, and Basic Testing
Startup Institute NY - Authentication, Validation, and Basic TestingStartup Institute NY - Authentication, Validation, and Basic Testing
Startup Institute NY - Authentication, Validation, and Basic Testing
 
Web security
Web securityWeb security
Web security
 

Recently uploaded

BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
Google
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptxText-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
ShamsuddeenMuhammadA
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Game Development with Unity3D (Game Development lecture 3)
Game Development  with Unity3D (Game Development lecture 3)Game Development  with Unity3D (Game Development lecture 3)
Game Development with Unity3D (Game Development lecture 3)
abdulrafaychaudhry
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 

Recently uploaded (20)

BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptxText-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Game Development with Unity3D (Game Development lecture 3)
Game Development  with Unity3D (Game Development lecture 3)Game Development  with Unity3D (Game Development lecture 3)
Game Development with Unity3D (Game Development lecture 3)
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 

Cookies authentication

  • 2. DEFINITION OF NEED • A Web server has no memory so the hosted Web site that the user is visiting transfers a cookie file of the browser on the computer's hard disk so that the Web site can remember who is the user and the user preferences. This message exchange allows the Web server to use this information to present the user with customized Web pages. • Cookies allow online marketers and retailers deliver that personable experience with their customers.
  • 3. DEFINITION OF NEED • Authentication cookies are the most common method used by web servers to know whether the user is logged in or not, and which account they are logged in with • For example, the Google search engine once used cookies to allow users (even non-registered ones) to decide how many search results per page they wanted to see.
  • 4. SCOPE OF PROJECT •Our system authenticates the cookies. •Our system verifies information provided by user. •It grants access to authorized user. •It denies access to unauthorized users.
  • 5. ASSUMPTIONS MADE • We have assumed testing data as client’s user id and password only. • We have used demo number of authorized clients. • Our database is dynamic, where we can edit number of fields.
  • 6. SOLUTION APPROACH 1. We first researched about cookies. 2. We found reasons to authenticate it. 3. We discussed among group members and formed a flowchart to approach solution. 4. We used php for coding our system. 5. We also created a database to store information.
  • 7. WHAT ARE COOKIES ? • A cookie is a text file that a website stores on a client’s computer to maintain information about the client during and between browsing sessions. • Are designed to hold a small amount of data specific to a particular client and website, and can be accessed either by the web server or the client computer • Useful for: • Shopping carts • User communities • Personalized sites • Not recommended for storing sensitive data • Store a unique identification string that will match a user held securely in a database
  • 8. COOKIES AUTHENTICATION • In web services, the cookie is authenticated by providing the user name and password. • In addition, some web services may ask the security question that was created during the sign up phase to make the user account more secure.
  • 9. BENEFITS OF COOKIES AUTHENTICATION • Cookies give customized experience and helps user. • Cookies are simple to use and implement • It occupies less memory, and these are stored in clients computer which saves memory burden on server. • Cookies can be set to expire as per requirement. We can assign it for particular time-frame.
  • 10. PROPOSED MODEL Proposed model We have proposed a model for the implementation of the project which is given below. Firstly, we enter the URL for the login process then it will be sent to the server and sends the message back to the server. The authenticate script takes the name and given password. Now this name and password will be compared with the name and password stored in the database and then carried out the authentication process [6]. This is also clearly explaining in the below flowchart.
  • 12. ALGORITHM 1. Start 2. Create a form to input user-id and password. 3. Send the entered user-id and password to the server. 4. Validate and compare the user-id and password a. Goto step 2 if not valid b. Goto step 5 if valid
  • 13. ALGORTHM CONTD…. 5. Display the successful message 6. Ask user for next request and continue. 7.Stop
  • 15. SCRENSHOT OF LOGIN FORM CREATED
  • 17. SCREENSHOTS OF VALID AND INVALID LOGIN ATTEMPTS
  • 18. DEMO