Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
MULTIFACTOR AUTHENTICATION
ABSTRACT
TECHNOLOGIES USED
Admin
Upload Questions
Exam Time Table Scheduling
Graphical Authentication
Admin
Upload Questions
This module is only accessed by admin. Administrators have
separate username and password for upload university questions. This
module contains Department Name, Question Uploaded Date and Time,
Question code, Subject Name, Regulation etc.,
Graphical Authentication
Authentication
Two authentication securities are maintained. The First one is
HOD. The HOD gives the correct username and mailed the vector points
are send to handheld device. It is click-based graphical password scheme
called Graphical password authentication. It can be viewed as a
combination of click Points. A password consists of ten click points per
image.
An important usability goal for authentication systems is to support
users in selecting better passwords, thus increasing security by expanding
the effective password space. We use persuasion to influence user choice
in click-based graphical passwords, encouraging users to select more
random, and hence more secure, click-points. Our resulting scheme
significantly reduces hotspots while still maintaining its usability.
The users forgot the password points the secret question will be
asked by admin. The user can get the click points through handheld
device.
Download Questions
The word or PDF representation is very useful for staff for easy
SYSTEM STUDY
EXISTING SYSTEM
In the existing system, Brostoff and sasse carried out an empirical study of passfaces,
which illustrates well how a graphical password recognition system typically operates.
Blonder-style passwords are based on cued recall. A user clicks on several previously
chosen locations in a single image to log in. As implemented by Passlogix Corporation,
the user chooses several predefined regions in an image as his or her password. To log in
the user has to click on the same regions in effect, cued click points (ccp) is a proposed
alternative to passpoints.
Screen Recording can be used to capture or clip any area of your desktop screen.
Once launched, you simply drag the window to the area you want to capture, set the size
of the area to clip and then click the check-mark to take the screenshot. It captures the
passwords that pass through your network adapter, and display them on the screen
instantly.
Disadvantage:
The problem with this scheme is that the number of predefined regions is small,
perhaps a few dozens in a picture. The password may have to be up to 12 clicks for
adequate security, again tedious for the user. Another problem of this system is it secretly
records computer screen while silently running in the background.
Proposed System:
In the proposed work we have integrated mobile key signature to help in recalling the
password. No system has been devolved so far which uses signature in graphical
password authentication. Study says that signature can be used to recall facts like images,
text etc. To create detailed vector user has to select images and clicks on image at click
points of his choice. Profile vector is created for both HOD and Staffs for secure
downloading.
Profile Vectors-
Software Requirements: