Summary
The proposed authentication system works as
follows: At the time of registration, after
filling the signup form, the user creates a
graphical password by first uploading a
picture he or she chooses from his own system
using “UploadImage1” button. The user then
chooses any one status from given four
options: Left-right, Right-Left, Top-bottom,
and Bottom-top. The system will then divide
the selected picture into a 3x3 grid and label
each grid according to the selected status.
When the user click on the “Next” button the
window for creating image password level-2
is displayed. In this window user have to click
on to the “UploadImage2” button to select the
second picture as next image password. After
selecting the picture the user must have to
choose the option for labelling the grids in the
picture. Then user click on to the “Next”
button once more to select the third picture
(image password) as in the previous levels.
Finally click on the “Finish” button to
complete the registration phase. For authentication the user first enters his
userid. Then click on the “Next” button. At
the same time a onetime random number key
is issued by the system to the user’s mobile
number given at the registration stage. For
example suppose key is 386. Now the system displays four images which is not labelled.
One among this is the first image uploaded by
the user and rest of the three images are extra
images displayed by the system for
confusioning the hacker. Since the key is 386,
the user must have to click on the grid 3 on
the actual picture among the four images.
Then click on “Next” button. Now another set
of four images is displayed. Among these four
images one will be the second image uploaded
by the user during the registration stage and
the other three images will be displayed by the
system for protecting from hacker. From these
four images the user have to correctly click on
the grid 8 in the second image uploaded by
him. Similarly, when we click on “Next”
button another set of four images is displayed.
Among these four images one will be the third
image uploaded by the user and three images
will be displayed by the system. The user
must have to correctly click on the grid 5
according to the grid labeling option given to
this image during the registration phase. If all
the clicks in each level of images are correct
then user can successfully logon to the system. Otherwise if there is any mistake in
any of the click point(grid no.) system will
displays an error message to the user.
http://www.ijert.org/view-pdf/4591/an-authentication-system-for-information-security-using-cued-click-point-and-one-time-session-key
No comments:
Post a Comment