抽象的な

Secure Internet-Banking with Visual Authentication Protocols

S.Saravana Kumar, R.Senthil Kumar, P.Venkatraman, M.Thamodharan, S.Vishnu Prashod

The major threat in authentication involved in the banking sector is key logging. Key logging refers to monitoring the action of user without their knowledge and illegally accessing it for their own purpose. It can be done either through hardware, software and acoustic analysis. key logging, an approach to counter key logging by the use of authentication protocols which have not provided desired security. Thus, we propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements.

免責事項: この要約は人工知能ツールを使用して翻訳されており、まだレビューまたは確認されていません