gpas phase2
DESCRIPTION
gpas phase 2TRANSCRIPT
PHASE 2
GPASPHASE 2Design
Team 01
GRAPHICAL PASSWORD AUTHENTICATION SYSTEM (GPAS)
BRAIN STORMING FOR DESIGN ALTERNATIVES:A brain storming session was conducted among the users to identify the design alternatives and results were noted down.DESIGN ALTERNATIVES: Alphanumeric Graphical Biometric Card system Pattern locksCOMPARATIVE TABLE:The table below compares the different design alternatives on the basis of certain parameters:PARAMETERSALPHANUMERICGRAPHICALBIOMETRIC
SecurityLess secureModerate securityHighly secure
User friendlyLess user friendlyMore user friendlyModerately user friendly
Feasibility Less costLess costMore cost
Design complexityLess complexLess complexMore complex
Maintenance No maintenanceneededNo maintenance neededMaintenance required
Ease of remembranceEasy to forget over long periodsEasily recallableRemembrance is not required
Additional Hardware Not requiredNot requiredRequired
Based on the above comparison we choose the graphical method of designing the password authentication system.The below reasons favor the GPAS: Graphical passwords are easy to recall They are more secure than the frequently used alphanumeric type It is feasible Less complexity in design and requires no additional hardwareDESIGN REQUIREMENTS FOR GPAS:HARDWARE USED:UTLPKITSOFTWARE USED:UBUNTU OSECLIPSE IDEPROGRAMMING LANGUAGE:CDETAILED DESIGN:The LOGIN module: To implement the login module featuring the entry of user name and password a GLCD on the kit is used.CLCD on the UTLP kit displays instructions for the user to proceed.
BLOCK DIAGRAM: MODULE 1
GRAPHICAL AUTHENTICATION SYSTEM CLCD
GLCD
QUIT LOGIN
SIGN IN
CONSOLE IMAGE 1 IMAGE 2 IMAGE 3 IMAGE 4 PASSWORD USERNAMEMODULE 2: LOGIN
GLCD GLCD
IMAGE 1
PASSWORD CORRECT PA
CLCD GLCD
FLOW CHART:MODULE 1
START
STOP LOGIN MODULEIF SIGN INSIGN IN MODULEQUIT MODULE IF LOGINNNN NO YES
YES NO
LOGIN MODULE:
START
ENTER USERNAME
IF VALID
ENTER PASSWORD STOP ACCESS TO ACCOUNT IF VALIDNO
YES
NO
YES
CONCLUSION:Based on the research done to study the difficulty of cracking graphical passwords it is found that there are no reports of real cases of breaking graphical passwords. Thus this system is proven to be efficient to be used.REFERENCES:The International journal of science & technolodge (www.theijst.com)Student sample solution:Anonymous
GPASPage 8