FINAL YEAR IEEE PROJECTS,
EMBEDDED SYSTEMS PROJECTS,
ENGINEERING PROJECTS,
MCA PROJECTS,
ROBOTICS PROJECTS,
ARM PIC BASED PROJECTS, MICRO CONTROLLER PROJECTS Z Technologies, Chennai
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 19 four factor password authentication
1. SECURITY USING FOUR FACTOR PASSWORD AUTHENTICATION
OBJECTIVE:
The main role of this system is providing more security while accessing the
card. Another one role is to avoid the hackers.
PROBLEM DIFINITION:
The main problem statement of our existing system is security. The security
level is relatively very low. Another problem found in our existing system is frauds. That
is detection and avidness’ of hackers is comprehensible. To rectify those problems, we
use four types of security in our proposed system.
ABSTRACT:
The project entitled as “Security Using Four Factor Password Authentication“.
In the scheme the remote user does not need to use smart cards. It is convenient for the
users to use a common storage device such as a universal serial bus memory. The
scheme is easy to implement. However, this authentication scheme is vulnerable to
impersonation attacks and middle man attacks. An attacker could impersonate legitimate
users to login and access the remote server. In addition, we analyze the security of Fan-
Chan-Zhang’s scheme. The scheme suffers from replay attacks and impersonation
attacks.
Z Technologies
www.ztech.in info@ztech.in call : 91760 91765
2. A password authentication scheme to provide authentication between the users
and the remote server. Since then, many password-based remote user authentication
schemes have been proposed. In a smartcard based password authentication scheme, the
smart card takes the password and Finger print from the users as input, computes the
login message and sends the login message to the server. The server checks the validity
of the user’s login message. In the mutual authentication situation, not only the server
can verify the user but also a user can verify the server.
The adversary is modeled as follows:
(a) The adversary can tap the communication channel between the users and the
server during the login and authentication phase.
(b) The adversary either can extract the information by obtaining the smart card or
can get a user’s password and Finger print. The adversary cannot do both, or the
adversary can login the server as a legitimate user.
EXISTING SYSTEM
• At present We Are Using Single Card or the Individual Card for the Different
Banks Like ICICI, AXIS, HDFC, Etc.,
• The Pin Number in the Negative Behind the Card
• There will be a only one PIN Number
DISADVANTAGES:
Z Technologies
www.ztech.in info@ztech.in call : 91760 91765
3. Less Security
Low Performance
PROPOSED SYSTEM
• All The Bank Must Be in the Single Card
• The Pin No is not present in the Negative
• There Will be Three Passwords
• PIN No and Authentication Password, Finger print and USIM card authentication
ADVANTAGES:
Four Types of Security prediction
High performance
Avoid Fraud Authentication
Secure Transaction
ALGORITHM USED:
1. Triple DES (Data Encryption Standard)
2. PCA (Principle Component Analysis)
ARCHITECTURE DIAGRAM:
Z Technologies
www.ztech.in info@ztech.in call : 91760 91765
4. RFID Authentication
PIN Code
USER Authentication Process
USIM Card
Authentication
Fingerprint
Authentication
SYSTEM REQUIREMENTS:
Hardware Requirements:
• Intel Pentium IV
• 256/512 MB RAM
• 1 GB Free disk space or greater
• 1 GB on Boot Drive
• 1 Network Interface Card (NIC)
Z Technologies
www.ztech.in info@ztech.in call : 91760 91765
5. Software Requirements:
• MS Windows XP/2000
• MS IE Browser 6.0/later
• MS Dot Net Framework 2.0
• MS Visual Studio.NET 2005
• MS SQL Server 2000
• Language :ASP.Net(VB.NET)
APPLICATIONS:
1. Bank
2. Military
3. Detective Agencies
4. Administrative Offices
Z Technologies
www.ztech.in info@ztech.in call : 91760 91765