29-10-2013, 12:05 PM
Graphical Password authentication system.docx (Size: 109.41 KB / Downloads: 26)
ABSTRACT
Using the Form factor Card to saving and maintaining the patient’s recordsfrom birth to end of his life. Form factor Card has a microprocessor chip inside, enabling it to store information.Patient’s clearly identifiable by means of a photo and ID. This avoids the risk of misuse connected with conventional cards. Also eradicate fake doctors by registering their qualifications into the government and getting their unique ID.For security, patient data can only be read when patient and physician have been authenticated.
CHAPTER 1
INTRODUCTION
1.1 ABOUT THE PROJECT
A Graphical Password authentication system should encourage strong passwords while maintaining memorability. We propose that authentication schemes allow user choice while influencing users toward stronger passwords. In our system, the task of selecting weak passwords (which are easy for
attackers to predict) is more tedious, discouraging users from making such choices. In effect, this approach makes choosing a more secure password the path of least resistance. Rather than increasing the burden on users, it is easier to follow the system’s suggestions for a secure password--a feature lacking in most passwords.
1.2 OBJECTIVES
The objective of my project is to prevent an unauthorized user from gaining access to confidential information of an individual or organization and to increase the performance of a knowledge-based authentication mechanism in security systems. Since existing graphical password schemes make use of larger memory space and require long-term password memorability, unlike this our security system provides higher level of security with less number of drawbacks.
To motivate administrators and employees to maintain the responsibility for, ownership of and knowledge about information security, in order to minimize the risk of security incidents. Ensure compliance with current laws, regulations and guidelines.
To ensure the availability and reliability of the network infrastructure and the services supplied and operated by concern. Ensure flexibility and an acceptable level of security for accessing information systems from off- campus. Ensure the protection of personal data (privacy)
CHAPTER 2
SYSTEM ANALYSIS
2.1 EXISTING SYSTEM
The most common computer authentication method is for a user to submit a user name and a text password. The vulnerabilities of this method have been well known. One of the main problems is guessing attacks.
Studies have shown that users tend to pick short passwords or passwords that are easy to remember. Unfortunately, these passwords can also be easily guessed or broken. According to a recent Computer world news articles, the security team at a large company ran a network password cracker and within 30 seconds, they identified about 80% of the passwords. On the other hand, passwords that are hard to guess or break are often hard to remember. Studies showed that since user can only remember a limited number of passwords, they tend to write them down or will use the same passwords for different accounts.
2.1.1 DRAWBACKS
The problems of knowledge-based authentication, typically text-based passwords, are well known. Users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember.
Text passwords are the most popular user authentication method, but have security and usability problems.
Users maintaining same password for multiple applications. Because of easy memorability.
2.2 PROPOSED SYSTEM
To address the problems with traditional username password authentication, alternative authentication methods, such as Graphical Password have been used.We propose that authentication schemes allow user choice while influencing users towards stronger passwords.Using a graphical password, users click on images rather than type alphanumeric characters. We have designed a new and more secure graphical password system, called Click Points.
In our project we propose the concept of creating graphical password to provide secured authentication.This system solves the problem of remembering several click-points by replacing multiple image sequence with a single window containing a set of images.The visual representation of the images is in form of 4x4 matrix which includes both elements and the non-elements.Since the window frame contains 16 images it is completely impossible for the attackers to guess the sequence of click-points on the images. Additionally our proposed work introduces a sound signature technique that improves the remembrance of the password. Our work also includes shuffling the sequence of images contained in the window frame.The proposed system performs well in terms of security, accuracy and ease of use.