You are on page 1of 15

AUTHENTICATION SCHEMES FOR SESSION PASSWORD USING COLOUR AND IMAGES

By Bineet kumar Rahul shukla Hareesh bg Rajashekaraiah

3/14/12

PROPOSED ARCHITECTURE

3/14/12

USECASE DIAGRAMS

3/14/12

USECASE DIAGRAMS

3/14/12

CLASS DIAGRAM
ADMIN admin name admin id password_Check() password_Change( ) IMAGE image name image size LOGIN add() edit() delete() USER user name user id add_User() edit_User() delete_User() 3/14/12 login status login time check_Textpswd () change_Pswd() VISUAL VERIFICATION CODE random_Search() retreive_Text() compare_Text()

SESSION PASSWORD retreive_Image( ) pair_Image() random_Matrix( ) store_Session() carry _Session()

SEQUENCE DIAGRAM

3/14/12

ACTIVITY DIAGRAM

3/14/12

E-R DIAGRAM
F-name Mname Admin-name M-Admin Lname
Fromuser-id Touser-id

E-datetime Esubject E-mail Econcat

Adminpasswor d

Adminid

Emailno

Click to edit Master subtitle style Admin -id


Userpassword User3/14/12 email Userphone Userid Username Fname Mname Lname

M-usn

MODULE DESCRIPTION
1.
.

USER REGISTRATION
With the help of this module user can able to register himself and enter into the mailing system. While the user is registering he has to provide his personal information and textual password.

For session password user has to 3/14/12 select colour or image option

2.ADMIN SESSION

Admin is the super user he can able to enter into his session using user ID and password. Once he has entered into the session he can able to view the user details and he can update the details. Admin can able to maintain colour images and graphics images in his session. He can able to change his password .

3/14/12

3.

LOGIN FACE User has to enter into his session to send the mail or to view the mails which are received in his mailbox. The main purpose of this application is to avoid password hacking as 3/14/12

User has to enter the image content in the text box given, if image content and user typed content are same then he can able to enter his text password one more time and try for login into his home page. If the typed content does not match with the image content, again seven images are picked from the data base and displayed to him. This process is repeated for 3 times and if the user is not provided correct information then the current application is closed. This system helps to avoid password hacking by automated programs which are kept on providing new-new words to hack the password.
3/14/12

Once the text password entry is over, session password system is invoked.

Suppose user selected four

3/14/12

4.EMAIL SYSTEM

Once user successfully entered into his session he can able to send and receive the emails from other users. For mail sending and receiving this system uses SMTP (Simple Mail Transfer Protocol) with JMS (Java Mail Server).

3/14/12

5.Visual Verification Code (VVC)

The Visual Verification Code (VVC) contribution is an answer to harmful automated scripts that create large numbers of user accounts. This will be 3/14/12 very useful method for

You might also like