USER'S INSTRUCTIONS: The project work you are about to view is on "two factor authentication login system using otp with sms". Please, sit back and study the below research material carefully. This project topic (two factor authentication login system using otp with sms) have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this "two factor authentication login system using otp with sms" project research material is to reduce the stress of moving from one school library to another all in the name of searching for "two factor authentication login system using otp with sms" research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.
DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.
ACKNOWLEDGEMENT
The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.
PROJECT DESCRIPTION: This work "two factor authentication login system using otp with sms" research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of "two factor authentication login system using otp with sms" visible for everyone, then the complete material on "two factor authentication login system using otp with sms" is to be ordered for. Happy viewing!!!
The paper examined the design and implementation of a two-factor authentication login system using OTP with SMS. The quest for the application of tighter security measures to web, desktop and mobile applications developed has been a major concern to a lot of people. Faced with the challenges of poor security and vulnerability of users, resulting to applications being hacked by unauthorized people, the researcher delved into developing a more secured login application that sends a secret passcode to the registered phone number of a user for identification purpose. The aim of the application is basically to ensure that users are safe, and all logins are authorized. The application was developed with PHP, MySQL, CSS, BOOTSTRAP and HTML technologies.
CHAPTER ONE
1.0 INTRODUCTION
1.1 INTRODUCTION
With the development of science and technology and means of storage and exchange of information in different ways, or so-called transfer of data across the network from one site to another site, became to look at the security of data and information is important; we need to provide protection for the information of the dangers that threaten them or attack them through the use of tools to protect information from internal or external threats. In addition to the procedures adopted to prevent access information into the hands of unauthorized persons through communications and to ensure the authenticity of these communications.
Today security concerns are on the ascent in all areas. Most systems today rely on static passwords to verify the user’s identity. Users have a propensity to use obvious passwords, simple password, easily guessable password and same password for multiple accounts, and even write their passwords, store them on their system or asking the websites for remembering their password etc. Utilization of static passwords in this expanded dependence on access to IT systems progressively presents themselves to Hackers, ID Thieves and Fraudsters. In addition, hackers have the preference of using numerous techniques / attacks such as guessing attack, shoulder surfing attack, dictionary attack, brute force attack, snooping attack, social engineering attack etc. to steal passwords so as to gain access to their login accounts. Quite a few techniques, strategies for using passwords have been proposed but some of which are especially not easy to use and practice. To solve the password problem in banking sectors and also for online transaction two factor authentications using OTP and ATM pin / cards have been implemented.
The project aims and objectives that will be achieved after completion of this project are discussed in this subchapter. The aims and objectives are as follows: Avoid the risks related to the use password.
Limit the unauthorized access to accounts.
Verification of the person requesting access to the system.
Building authentication process with low cost.
To take advantage of users smartphone’s
1.2 STATEMENT OF THE PROBLEMS
In recent years, increased interest institutions and organizations in the security aspects of their networks and systems, and among these aspects to verify that the person requesting access to the system that he is the person who claims that he/she is, this process called Authentication, in most systems are using a password only to access the system for login process. Below are some problems and risks for the use of password in the user authentication process:
Recently it became Breakthroughs systems, websites and personal accounts are a large and different ways, because of weak protection of those systems methods so it was necessary to find ways more secure to protect those systems.
Passwords become easier to guess.
Short passwords are easy to guess and crack.
Equipment and software often has standard pre-configured passwords (default passwords).
Most people they have many account use same password for all these accounts.
1.3 SIGNIFICANCE OF THE STUDY
With the development of computer science progressed accordingly ways to hack, and different ways plus sensitivity of data; as a result, the greater the need to find solutions to overcome the weaknesses those hackers exploits it, we will give a proposal for two level user authentications to access the system.
1.4 SCOPE OF THE STUDY
The two way mobile authentication system is an innovative technology used to solve the existing problems of the present one factor authentication which is a simple username and a password. The two way mobile authentication solves this problem by using a strong authentication with the combination of ―something you know‖, ―something you have‖ and ―something you are‖. When compared the above three methods individually, all the methods have some vulnerabilities. Something you know—may be shared, something you have –may be stolen and something you are stronger but it is expensive to use in all the cases. So the combination provides a stronger authentication.
The project is aimed towards the realization of a strong two factor authentication using mobile device to
Provides with a cost effective and user friendly authentication.
Avoids the use of a simple username and password system which is not secure anymore.
Using the mobile as your authentication token.
Ease to use any existing applications on web.
No additional use of hardware.
Easy to deploy.
DEFINITION OF TERMS
Authentication: the process or action of proving or showing something to be true, genuine, or valid.
System: Physical component of a computer that is used to perform certain task.
Data: Numbers, Text or image which is in the form suitable for Storage in or processing by a computer, or incomplete information.
Information: A meaning full material derived from computer data by organizing it and interpreting it in a specified way.
Input: Data entered into a computer for storage or processing.
Output: Information produced from a computer after processing.
Information System: A set of interrelated components that collect (or retrieve), process, store and distribute information to support decision making and control in an organization.
Computer: Computer is an electronic device that accepts data as Input, processes data and gives out information as output to the user.
Software:-Software is set of related programs that are designed by the manufacturer to control the hardware and to enable the computer perform a given task.
Hardware: - Hardware is a physical part of a computer that can be touched, seen, feel which are been control by the software to perform a given task.
Database: - Database is the collection of related data in an organized form.
Programming: - programming is a set of coded instruction which the computers understands and obey.
Technology: -Technology is the branch of knowledge that deals with the creation and use technical and their interrelation with life, society and the environment, drawing upon such as industrial art, engineering, applied science and pure science.
Algorithm: A set of logic rules determined during the design phase of a data matching application. The ‘blueprint’ used to turn logic rules into computer instructions that detail what step to perform in what order.
Application: The final combination of software and hardware which performs the data matching.
Data matching database: A structured collection of records or data that is stored in a computer system.
Data integrity: The quality of correctness, completeness and complain with the intention of the creators of the data i.e ‘fit for purpose’
Password: This is a secret code that a user must type into a computer to enable he/she access it or its applications. This is made up of numbers, letters, characters or contribution of any of the above categories.
PHP: Hypertext Preprocessor (the name is a recursive acronym) This is a Programming language known as a server-side scripting language. It was used in the developing of this software.
Identification: The act of recognizing and naming someone or something.
Verification: Evidence that establishes or confirms the accuracy or truth of something.
Query language: A database query language and report writer allows users to interactively interrogate the database, analyze its data and update it according to the user’s privileges on data. It also controls the security of the database.
API: a set of functions and procedures that allow the creation of applications which access the features or data of an operating system, application, or other service.
CHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of "two factor authentication login system using otp with sms" is also available. Order full work to download. Chapter two of "two factor authentication login system using otp with sms" consists of the literature review. In this chapter all the related works on "two factor authentication login system using otp with sms" were reviewed.
CHAPTER THREE: The complete chapter three of "two factor authentication login system using otp with sms" is available. Order full work to download. Chapter three of "two factor authentication login system using otp with sms" consists of the methodology. In this chapter all the method used in carrying out this work was discussed.
CHAPTER FOUR: The complete chapter four of "two factor authentication login system using otp with sms" is available. Order full work to download. Chapter four of "two factor authentication login system using otp with sms" consists of all the test conducted during the work and the result gotten after the whole work
CHAPTER FIVE: The complete chapter five of "two factor authentication login system using otp with sms" is available. Order full work to download. Chapter five of "two factor authentication login system using otp with sms" consist of conclusion, recommendation and references.
To "DOWNLOAD" the complete material on this particular topic above click "HERE"
Do you want our Bank Accounts? please click HERE
To view other related topics click HERE
To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE
Do you want us to research your new topic? if yes, click "HERE"
Do you have any question concerning our post/services? click HERE for answers to your questions
For more information contact us through any of the following means:
Mobile No :+2348146561114 or +2347015391124 [Mr. Innocent]
Email address :engr4project@gmail.com