Tuesday, 15 September 2015

An Authentication System For Information Security Using Cued Click Point And One Time Session Key

Summary


The proposed authentication system works as follows: At the time of registration, after filling the signup form, the user creates a graphical password by first uploading a picture he or she chooses from his own system using “UploadImage1” button. The user then chooses any one status from given four options: Left-right, Right-Left, Top-bottom, and Bottom-top. The system will then divide the selected picture into a 3x3 grid and label each grid according to the selected status. When the user click on the “Next” button the window for creating image password level-2 is displayed. In this window user have to click on to the “UploadImage2” button to select the second picture as next image password. After selecting the picture the user must have to choose the option for labelling the grids in the picture. Then user click on to the “Next” button once more to select the third picture (image password) as in the previous levels. Finally click on the “Finish” button to complete the registration phase. For authentication the user first enters his userid. Then click on the “Next” button. At the same time a onetime random number key is issued by the system to the user’s mobile number given at the registration stage. For example suppose key is 386. Now the system displays four images which is not labelled. One among this is the first image uploaded by the user and rest of the three images are extra images displayed by the system for confusioning the hacker. Since the key is 386, the user must have to click on the grid 3 on the actual picture among the four images. Then click on “Next” button. Now another set of four images is displayed. Among these four images one will be the second image uploaded by the user during the registration stage and the other three images will be displayed by the system for protecting from hacker. From these four images the user have to correctly click on the grid 8 in the second image uploaded by him. Similarly, when we click on “Next” button another set of four images is displayed. Among these four images one will be the third image uploaded by the user and three images will be displayed by the system. The user must have to correctly click on the grid 5 according to the grid labeling option given to this image during the registration phase. If all the clicks in each level of images are correct then user can successfully logon to the system. Otherwise if there is any mistake in any of the click point(grid no.) system will displays an error message to the user.

http://www.ijert.org/view-pdf/4591/an-authentication-system-for-information-security-using-cued-click-point-and-one-time-session-key


No comments:

Post a Comment