International Scientific Journal of Engineering and Management

An International Scholarly || Multidisciplinary || Open Access || Indexing in all major Database & Metadata
ISSN: 2583-6129

Impact Factor: 6.674

A STRONG AND PRACTICAL AUTHENTICATION MECHANISM USING PASSTEXT AND ONE MINUTE PASSCODE

  • Version
  • Download 6
  • File Size 1.19 MB
  • File Count 1
  • Create Date 15 May 2024
  • Last Updated 15 May 2024

A STRONG AND PRACTICAL AUTHENTICATION MECHANISM

USING PASSTEXT AND ONE MINUTE PASSCODE

1 Ramya M R, 2 Abijith U, 3 Charan K, 4 Nalini V, 5 Shibivarsan J

 1Assistant Professor, Department of Information Technology, Nandha College of Technology, Erode-638 052

 2,3,4,5 UG-Final year, Department of Information Technology, Nandha  College of Technology,Erode-638 052

1 ramyamanidhiva@gmail.com ,2 abiabijitj@gmail.com, 3 charankathirvel17@gmail.com ,4 nalini.v2003@gmail.com ,      5varsanshibi@gmail.com

                                                                

ABSTRACT

     In this modern world, hacking is growing faster, and there is no privacy for personal data. Therefore, we have decided to create passwords using new methods. This project demonstrates that there is no secret shared between the user and strangers; it presents a one minute challenge to unlock private data. Our project generates random codes minute by minute, and each password is only valid for just one minute, which is called OMP (One Minute Passcode). Therefore, the user doesn't know the correct password at all times. These passkeys are then sent to the user's mobile phone using the Twilio method, which is more secure and provided by Google to communicate through secret authentication methods and tokens. Thus, hacking becomes impossible with this level of complexity. In the future, if there's a possibility of hacking, we will update the cipher methods to unlock the data. Nowadays, the usage of PCs and mobile phones has increased rapidly. What if the passwords are not known by the user or strangers in this modern technology. Our  project ensures privacy between users and hackers or strangers; secret passwords may sometimes be compromised, but random passwords will never be known to users or strangers. This idea is used here to maintain safety while unlocking our privacy or private sectors by creating random codes and sending them to the user's mobile IP value or number. We can easily unlock our device in a non-hackable form using brute force and Twilio, which are the main components of our data protection system. In the older authentication method, there were only 6-digit numbersto unlock data, which were available only for apps. Like an OTP, this method randomly generates a 6-digit code to unlock the private sector, which is available on the same phone or PC. This makes it easy for hackers to access details using your phone number or email. These passkeys are dynamic and not stable at all times, and theirsize istoo small. A relational database plays a major role here, we also use the emergency password method for user convenience.

 

KEYWORDS: Security Authentication, Twilio, Database, Spyware attacks, Hacking, Password  Authentication,Database.


Download

Author's Blog

What is the difference between a Research Paper and a Review Paper?

A research paper and a review paper are both scholarly documents, but they serve different purposes and have different characteristics.research...
Read More
Author's Blog

What is DOI?

A Digital Object Identifier (DOI) is a unique alphanumeric string that is used to identify and provide a persistent link...
Read More
Author's Blog

What do you need to do during production of your Research Paper?

During the production of a research paper, the following steps need to be taken: conducting research, organizing and analyzing data,...
Read More
Author's Blog

What are the advantages of publishing a research paper?

Publishing a research paper can have many advantages for researchers, including: Career advancement, professional recognition, opportunities for collaboration, increased visibility,...
Read More
Author's Blog

Ways to Support your Academic Wellbeing which preparing the Research Paper/Article

To support your academic wellbeing while publishing a research paper, it's important to set realistic goals, manage your time effectively,...
Read More
Author's Blog

How to improve your Research Paper writing Skills?

Read extensively: One of the best ways to improve your research paper skills is to read extensively in your field...
Read More
Author's Blog

Is DOI compulsory to publish a research paper in a Journal?

DOI is not strictly required to publish a research paper, but it is highly recommended. Basically, the International Scientific Journal...
Read More
Author's Blog

In what ways does research paper give weight to career development?

Publishing a research paper can give weight to a researcher's career development in several ways, such as: establishing oneself as...
Read More
Author's Blog

How to develop a Research Paper from Scratch

Developing a research paper involves several steps including: choosing a topic, conducting background research, formulating a research question or hypothesis,...
Read More
Author's Blog

How Plagiarism report plays crucial role in Research Paper Publication?

Plagiarism is a major concern in the academic and research community, as it undermines the integrity of the research and...
Read More