3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
#54
[attachment=10031]
Sign-up Module:
This module is used to register the user’s 3-D password. After filling the user id the user are allowed to select the 3-D object. Here the user can select the object by giving the values in x, y, z co-ordinates. According to the type of picture the user can give the passwords, it may be either Textual password or Graphical password or Parameter password. These passwords are stored in the database (ie, REGI table). If the user want more security they can register more number of passwords. But the user must remember the type and sequence of password selection. After register the passwords the user must give their user name and register number for application purpose.
Sign-in Module:
The sign-in module is used to validate the person or user. Here also the user first give the user id. After that only the user are allowed to select the password. The user must select the objects in the sequence of they registered during the sign up phase. Here the passwords are stored in the LOGIN table. After that, the values in LOGIN table is compared with the values in REGI table. The user can view the messages, only if the values are in both table. If the order or passwords are not equal then it returns the error message as, ”You are not a valid user” and also the can’t view the messages
Change Password:
If an existing user has to change their password first they have to enter their old password. The old password is compared to already existing registered password. If the passwords are equal, the user is valid user then our system allows the user to register their new password.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: data flow diagram for 3d password for more authentication, disadvantages of 3d password for more secure authentication, 3d password detection technology report, 3d password for secure authentication pdf, power point presentation on 3g passwords for more secure authentication, what origin is, 3d password for more secure authentication abstract and modules,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report - by seminar class - 11-03-2011, 04:54 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,976 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,841 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 26,002 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,714 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,103 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,334 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,519 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,656 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,436 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,443 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: