You are on page 1of 31

WELCOME

1 PASSWORD AUTHENTICATION REDEFINED


PASSWORD
AUTHENTICATION
REDEFINED

SHABEEBA T.K
HAFSATH M.K
SHAMNA K.K
NEJUMUDHEEN.N
RAMLA O.K

PRESENTED BY:
2 PASSWORD AUTHENTICATION REDEFINED
CONTENTS
3 PASSWORD AUTHENTICATION REDEFINED
Introduction
OBJECTIVES
LITERATURE SURVEY
USE-CASE DIAGRAM
DFD
design
FUTURE SCOPE
Conclusion
INTRODUCTION
4 PASSWORD AUTHENTICATION REDEFINED
SECURITY- It is the thing that all the computer users in the
world is running behind.

Most common method used for authentication is textual
password.

Eavesdropping, dictionary attack, social engineering and
shoulder surfing are well known vulnerabilities of this method.



INTRODUCTION
5 PASSWORD AUTHENTICATION REDEFINED

we are towards developing an authentication technology, which
is free from shoulder surfing and key board hacking.


SESSION PASSWORDS are generated for authentication. These
session passwords can be used only once and every login time a
new session password is generated.

INTRODUCTION
6 PASSWORD AUTHENTICATION REDEFINED
Helping The Blind
Current research on Usable Security are not paying any attention
to human disabilities.

Many blind people are now using screen reading software to use
thier computer.

There is still no system which offers efficient interaction between
blind user and machine.

The proposed authentication schemes for blind users use sounds for
generating session passwords.
OBJECTIVE
7 PASSWORD AUTHENTICATION REDEFINED
For Normal user

To make password authentication simpler
Providing secure authentication system using session password
Making the system very easy to handle
To provide tight security from shoulder surfing


For Blind user

To make their interaction with the computer more friendly apart from the
current software .
LITERATURE SURVEY
8 PASSWORD AUTHENTICATION REDEFINED
EXISTING SYSTEM

1. Haichangs Shoulder-Surfing Technique
The user is required to draw a curve across their password images orderly
rather than clicking on them directly.
LITERATURE SURVEY
9 PASSWORD AUTHENTICATION REDEFINED
2. Passface
The user sees a grid of nine faces and selects one face previously chosen
by the user as shown in figure
Draw a secret,Signature technique,Convex hull etc are similar techniques used.

Some screen reading softwares are also there for blind users, which is now most
popular.
LITERATURE SURVEY
10 PASSWORD AUTHENTICATION REDEFINED
PROPOSED SYSTEM
1. Pair-based Authentication Scheme:
During registration user submits his password
Minimum length of the password is 8 and it should contain even number
of characters
During the login phase, when the user enters his username an interface
consisting of a grid is displayed.
The grid is of size 6 x 6 and it consists of alphabets and numbers
LITERATURE SURVEY
11 PASSWORD AUTHENTICATION REDEFINED
Figure show that L is the intersection symbol for the pair AN
LITERATURE SURVEY
12 PASSWORD AUTHENTICATION REDEFINED
2. Hybrid Textual Authentication Scheme:
During registration, user should rate colors as shown in figure
The User should rate colors from 1 to 8 and he can remember it
The login interface consists of grid of size 88 and strips of colors as
shown in figure
LITERATURE SURVEY
13 PASSWORD AUTHENTICATION REDEFINED
LITERATURE SURVEY
14 PASSWORD AUTHENTICATION REDEFINED
LITERATURE SURVEY
14 PASSWORD AUTHENTICATION REDEFINED
Using sound clips

During registration phase, user should assign a value for each
of the sound clips played
The values are limited to a range between 0-9
User is assigned with a secret expression
LITERATURE SURVEY
15 PASSWORD AUTHENTICATION REDEFINED
LITERATURE SURVEY
15 PASSWORD AUTHENTICATION REDEFINED
login phase, the 6 sound clips are shuffled and played as 3 pairs
User evaluate his dedicated secret expression with each pair and
enter the result as session password
For evaluating, the variable a and b are given the values of the
first and second sound clips in a pair respectively.
5
Clip 4 Clip 1
2 1
2x2+1
18 16
Clip 3 Clip 5
Clip 2 Clip 6
DATA FLOW DIAGRAM
16 PASSWORD AUTHENTICATION REDEFINED
DFD for normal users
DATA FLOW DIAGRAM
17 PASSWORD AUTHENTICATION REDEFINED
DFD for blind users
UML DIAGRAM
18 PASSWORD AUTHENTICATION REDEFINED
USE CASE DIAGRAM
Interaction diagram
19 PASSWORD AUTHENTICATION REDEFINED
U:user S:server
inputdetails()
Confirm()
Success()
Sessionpass()
Success()
Verify()
design
20 PASSWORD AUTHENTICATION REDEFINED
design
21 PASSWORD AUTHENTICATION REDEFINED
design
22 PASSWORD AUTHENTICATION REDEFINED
design
23 PASSWORD AUTHENTICATION REDEFINED
design
24 PASSWORD AUTHENTICATION REDEFINED
design
25 PASSWORD AUTHENTICATION REDEFINED
design
26 PASSWORD AUTHENTICATION REDEFINED
FUTURE SCOPE
27 PASSWORD AUTHENTICATION REDEFINED
This authentication scheme can be applied in
ATMs so as to avoid shoulder surfing.

We also planned to integrate a web camera,
which will capture at the moment of unauthorized
accessing.

The authentication scheme can be included in
smart phones for security aspect.

The technique can be implemented in social
networking sites.
CONCLUSION
28 PASSWORD AUTHENTICATION REDEFINED
Through this project we are proposing pair based
authentication and a new authentication techniques based on
sounds for Normal users & Blind computer users respectively.

These schemes are completely new to the users and this will be
an apt scheme where user is demanding for security irrespective to
time.

The normal users will get tight security against hacking and as
a challenge we submitting the concept, providing security for
blind also.
REFERENCES
29 PASSWORD AUTHENTICATION REDEFINED

1. http://www.passface.com

2. Passlogix, site http://www.passlogix.com

3. Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu Uwe Aickelin,
A New Graphical Password Scheme Resistant to Shoulder-Surfing

4. Voice Recognition for Blind Computer Users.pdf


30 PASSWORD AUTHENTICATION REDEFINED
ANY QUESTIONS?
31 PASSWORD AUTHENTICATION REDEFINED
THANKING YOU ALL

You might also like