Sie sind auf Seite 1von 4

THREE LEVEL SECURITY SYSTEMS

ABSTRACT
Increasing security has always been an issue since Internet and Web Development came
into existence, text based passwords is not enough to counter such problems, which is also an
anachronistic approach now. Therefore, this demands the need for something more secure along
with being more user-friendly. Therefore, we have tried to increase the security by involving a 3level security approach, involving text based password at Level 1, Image Based Authentication at
Level 2, and automated generated one-time password (received through an automated email to
the authentic user) at Level 3. And an assiduous effort has been done for thwarting Shoulder
attack, Tempest attack, and Brute-force attack at client side, through the use of unique image set
in the IBA System.

Existing System
The design of secure authentication protocols is quite challenging, considering that
various kinds of root kits reside in PCs (Personal Computers) to observe users behavior and to
make PCs untrusted devices. Involving human in authentication protocols, while promising, is
not easy because of their limited capability of computation and memorization. Therefore, relying
on users to enhance security necessarily degrades the usability. On the other hand, relaxing
assumptions and rigorous security design to improve the user experience can lead to security
breaches that can harm the users trust.

Disadvantage
1. It is non Security for Stored data.

Proposed System
In this Project, we demonstrate how careful visualization design can enhance not only the
security but also the usability of authentication. To that end, we propose two visual
authentication protocols: one is a one-time-password protocol, and the other is a password-based
authentication protocol. Through rigorous analysis, we verify that our protocols are immune to
many of the challenging authentication attacks applicable in the literature. Furthermore, using an
extensive case study on a prototype of our protocols, we highlight the potential of our approach
for real-world deployment: we were able to achieve a high level of usability while satisfying
stringent security requirements.

Advantages
1. It Support reasonable Image security and usability and appears to fit well with some
practical applications for improving online security.
Hardware requirements
Processor

: Any Intel Processor above 1 GHz

RAM

: 2 GB (min)

Hard Disk

: 100 GB (min)

Input device

: Standard Keyboard & Mouse

Output device

: Any High Resolution Monitor

Software requirements
Operating System

: Windows XP & Above

Front End

: C# .Net

Database

: MS SQL Server 2008

MOUDLES

The modules are,


User
1. Login
Text Authentication
Graphical Authentication
OTP (One-Time-Password)
2. Register
3. Insurance details
4. Claim using OTP
5. Status
Admin
1.
2.
3.
4.

Login
Insurance Update
User details
Report

Login
The login module allows the User/ Admin to their required process. The user login
consists of three level authentications.

Text Authentication
Graphical Authentication
OTP (One-Time-Password)

Register
The Register module allows user to create a new authentication.
Insurance Details
The Insurance Details module allows user to view the insurance policy details & updates.
Claim
The Claim module, helps user to claim the insurance policy if they needed.
Status
The status module helps to check the status of the insurance claim.

Insurance Update
The insurance update helps the administrator to update the details. It can be done only by
the Administrator.
User Details
The user details helps admin to view all the user details, claims and their updates.
Report
The report details helps to make a overall report on monthly or weekly basis, as required.

Das könnte Ihnen auch gefallen