Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

e-ISSN: 2582-5208

International Research Journal of Modernization in Engineering Technology and Science


( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:07/July-2022 Impact Factor- 6.752 www.irjmets.com
THREE LEVEL PASSWORD AUTHENTICATION SYSTEM
N Chaitra*1, Pratibha*2, Dr. Rajashree V Biradar*3
*1,2BE Scholar, Department Of Computer Science And Engineering, Ballari Institute Of Technology
And Management, Ballari, Karnataka, India.
*3Professor, Department Of Computer Science And Engineerinf Ballari Institute Of Technology
And Management, Ballari, Karnataka, India.
ABSTRACT
Authentication is the proper validation and rights management of the user for accessing the resources of any
information system. It is now beyond any doubt that user authentication is the most critical element in the field
of Information Security. Authentication is one of the most important security service provided to system by the
different authentication schemes. To protect any system, authentication must be provided so that only
authorized persons can have right to use or handle that system and data related to that system securely. In
order for authentication system to be practical, three level authentications are designed to provide additional
security. There are many schemes that had been proposed but still have their weaknesses. For our information,
the three level authentication is the combination of three existing scheme which is text-based password,
pattern lock and one time password (OTP) to form a better protection One of the approaches normally in use is
the common authentication procedure in which a user needs only a user name and password, in other to make
use of an authentication and authorization system in which every client has the right to access the data and
applications which are only appropriate to his or her job. A password is a secret word or phrase that gives users
access to computer resources such as programs, files, messages etc. Password security is a significant issue for
authenticating process and different researchers in the past have proposed techniques such as salting, hashing
to make the process most secured.
Keywords: Text Password, Graphic Image Password, OTP Password.
I. INTRODUCTION
We provide a self-guaranteed secure program and its success methods to overcome the risks of illegal attacks.
This method ensures the security of a program by giving method level security that bolsters the further
implemented security measures. One of the most common computer authentications is for a user to submit a
username and text password but the vulnerabilities of this method is plenty One of the main problems that
could arise is the difficulty of remembering passwords. Studies have shown that user usually tends to pick short
passwords so that the passwords are easy to remember .This passwords can also be guessed. To protect any
system, authentication must be provided so that only authorized persons can have right to use or handle that
system and data related to that system securely. In order for authentication system to be practical, three level
authentications are designed to provide additional security. There are many schemes that had been proposed
but still have their weaknesses. For our information, the three level authentication is the combination of three
existing scheme which is text-based password, pattern lock and one time password (OTP) to form a better
protection One of the approaches normally in use is the common authentication procedure in which a user
needs only a user name and password, in other to make use of an authentication and authorization system in
which every client has the right to access the data and applications which are only appropriate to his or her job

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[1950]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:07/July-2022 Impact Factor- 6.752 www.irjmets.com
II. METHODOLOGY
System Architecture

Fig 1: system architecture


System Architecture is a theoretical blueprint for the construction and performance of a system. In this figure
the user should provide user’s details like user name and user conventional password which is as strong as
much and difficult to guess. Users have to register with his/her mobile number along with one security
question for validation phase of authentication. At pattern lock the security has been imposed using patterns
where the user will be asked to select a pattern as difficulty level which is unique for each and every individual
user. User needs to select an folder for locking it and by using the picture based password and text password
the folder gets locked. Similarly if user wants to unlock the folder first the user has to type his/her mobile
number then otp will be generated to the registered mobile number then by using picture based password and
text based password the folder gets unlocked.

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[1951]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:07/July-2022 Impact Factor- 6.752 www.irjmets.com
Dataflow Diagram

Fig 2: Dataflow diagram


III. MODEL AND ANALYSIS
One-time password is a password that is valid for
only one login session or transaction, on a
computer system or other digital device. At this
level, after successful with the 2 levels, the system
will generate one-time password and send them
through email or SMS to the users as it has a high
potential to reach all the customers with a low
One-time password technique
total cost of ownership or Smartphone can be
used as token or platform for creating OTP. Then
the users need to login with the password that
valid for a short period only. This scheme is
secure enough because the system will generate
the password and available for a short period
only. Thus, it is hard to crack
This authentication system uses end user’s visual
Pattern based password
memory. Using nine points in a three by-three
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[1952]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:07/July-2022 Impact Factor- 6.752 www.irjmets.com
grid, a user creates a drag pattern. This method
belongs not only to the something you know
category, which is based on memory, but also to
the behavior pattern recognition category, since it
utilizes finger motion memory. The number of
available secret patterns in this system. However,
the number of pattern provided is limited. Hence,
this locking feature is the most widely used by the
general public.
Third level is text based authentication password.
User authentication through textual password is
very common in computer system because it is
easy to use. This schema is popular since last 4
decades, for its easiness, cost effectiveness,
simplicity to all users. Text passwords are text
based mechanism. They contain alphanumeric
and or special keyboard characters. A password is
a secret word or phrase that gives users access to
computer resources Such as programs, files,
Text based password messages, printers, internet, etc. It is for ensuring
unauthorized users not access the resources of
user’s account. Password should not be easily
guessed by someone. This is the reason why we
need a strong secure protection from attackers. At
this level, users need to register the user ID and
text password in the system. The password can be
numeric’s, alphabets and any characters that
make sure it is strong. To login, users need to re-
enter the information that being selected in the
registration process.
IV. RESULTS AND DISCUSSION

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[1953]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:07/July-2022 Impact Factor- 6.752 www.irjmets.com

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[1954]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:07/July-2022 Impact Factor- 6.752 www.irjmets.com

V. CONCLUSION
This project describes the importance of multifactor authentication is overcoming the security threats and this
system can be used in high security applications like Internet banking. The limitation of this project is that it
may be time consuming for the user to cross multiple levels to login successful. Keeping this limitation aside
and considering the security, high level of security can be achieved through the successive levels of
authentication. Several new authentication methods which emerges day today and those which tightens
security can be combined to form levels of authentication in future.
VI. REFERENCES
[1] Laiu Varghese, Nadia Mathew, Sumy Saju, Vishnu K Prasad 2014, 3-Level password Authentication
system.
[2] Mughele Ease Sophia 2015, THREE –LEVEL PASSWORD AUTHENTICATION.
[3] Fawaz A. Alsulaiman and Abdulmotaleb El Saddik, Senior Member, IEEE 2008 Three–Dimensional
Password for more Secure Authentication.
[4] Anushka Khade, Ashwini Bansode, Anushka Dhanve , 3 level password authentication system IEEE-
Papers Three level password authentication system
[5] A Hassan(2005): Database security and auditing and protecting data integrate and accessibility first
edition and course technology.
[6] M Manjunath, K Ishtataq Ahmad and Suchitra (2013): Security implementation of three level password
system based authentication.
[7] Nagesh D Kambli and Dharani J(2015): Implementation of security system using three level
authentication. International journal of engineering development and research at 2014 IGEDR.
[8] Brunelli R template matching technique in computer vision: Theory and practice retrieve Sep 2019.

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[1955]

You might also like